International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION Kalpesh Adhatrao1, Aditya Gaykar2, Rohit Jha3, Vipul Honrao4 Department of Computer Engineering, Fr. C.R.I.T., Vashi, Navi Mumbai, India 1 kalpesh.adhatrao@gmail.com, 2adityagaykar@gmail.com, 3rohit305jha@gmail.com 4 mithunhonrao2000@gmail.com
Abstract The emerging threats to user privacy over the internet are increasing at an alarming rate. Signingin from an unreliable terminal into a web account may result in compromising private details of a user such as username and password, by means of keylogger software. Such software are capable of recording keystrokes secretly, via covert channels without the knowledge of the user. In this paper we propose a secure method for signing in using Quick Response (QR) codes with mobile authentication. Through this method, the user can securely sign-in into a web account by authenticating the user session on an unreliable terminal browser, using a mobile device.
Keywords- Access tokens, Asymmetric key cryptography, CAPTCHA, Login authentication, QR code
I.
INTRODUCTION In today’s digital age, the need to secure user privacy is at its peak. There are many news reports
of privacy breaches and identity thefts over the internet, compromising secret details of internet users around the world. These threats are primarily caused due to faulty login systems for web accounts on various websites, the most common being the manual password based login where the user enters a username or an email address in combination with a password. Other login techniques involve biometric authentication, online keyboards and password entry using eye tracking. These existing systems have several vulnerabilities hidden in them, which are not yet addressed to avoid possible threats. For instance, the manual method of entering the username and password combination can prove to be a disaster over an unreliable terminal, as a possibly-existent keylogger software may steal the private login credential of the user. A user is left unnoticed about this activity and is only made aware when damage is already done to his/her virtual privacy. II.
LITERATURE SURVEY
A. Existing login systems 1. Simple password-based login It is the simplest and oldest method of entity authentication, where password is something that the claimant knows. This authentication scheme is used in the form of Fixed Password, One-Time Password or Challenge-Response. A Fixed Password is one that is used over and over for every access. A One-Time Password, as the name implies, is used only once. In this case, the user has a list of acceptable, distinct passwords, each of which can be used just once. In this way, an attacker is
www.giapjournals.com
Page 1
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
incapable of stealing the identity of users. The advantage of password-based login systems is that they are cheap and simple, requiring only elementary software technology. 2. Challenge-Response login method In this method, authentication is done without communication of a password. Instead, a user’s identity is verified based on his/her response to a challenge. The challenge is a time-varying value such as a random number or a timestamp that is sent by the verifier. The claimant applies a function to the challenge and sends the result, called the response, to the verifier. This response shows that the claimant knows the secret, which is the password to authenticate a user. The advantage of using a Challenge-Response method for login is that since there is no transfer of the password between the user and server, it becomes difficult to obtain login details by intercepting the communication information. 3. Virtual keyboard Virtual Keyboards are commonly used as an on-screen input method in devices with no physical keyboard. Users input password by tapping keys of a virtual keyboard built into the device. Usually, a Virtual Keyboard has fewer buttons/keys than a normal computer keyboard. The advantage of using this method is that the susceptibility to keylogger is overcome. In order to increase safety further, the keys may be displayed in a random, shuffled order every time. This prohibits tracking of mouse movements and clicks. 4. Biometric authentication Biometric authentication or Biometrics is the measurement of physiological or behavioral features that identify and authenticate an individual. These physiological and behavioral features are also called biometric identifiers. A physiological biometric authentication system identifies users using fingerprint scans, iris scans, retina scans, facial recognition, palm prints, voice recognition and DNA tests [1]. A behavioral biometric authentication system identifies users based on signatures, typing rhythm, gait and voice. The advantage of biometrics is that the information can be used to uniquely identify an individual in spite of variations in time [2]. B. Threats and vulnerabilities in existing systems 1. Keylogger A keylogger is surveillance software or spyware capable of recording and encrypting every keystroke that is made [3]. A keylogger can even record instant messages, email and any information a user types using a keyboard in a log file. This file can also be sent to a specified receiver. In this way, an attacker can obtain sensitive information from victims. 2. Shoulder surfing Shoulder surfing refers to using direct observation techniques, such as looking over someone’s shoulder, to get information [4]. It is commonly used to obtain passwords, PINs, security codes, and similar data [5]. 3. Screen capturing software www.giapjournals.com
Page 2
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
Screen capturing refers to the act of copying what is currently displayed on a screen to a file or printer. If the system is in graphic mode, the screen capture will result in a graphic file containing a bitmap of the image. If the system is in text mode, the screen capture will normally load a file with ASCII codes. Screen capturing software can be used by attackers to “grab” screenshots containing login information from victims. For instance, even if a user is entering details using an online keyboard, the malicious software may take images for every click and send them to the attacker. 4. Issues in biometric authentication Certain physical characteristics such as voice, gait and fingerprints may differ with time. So, it is prudent to not have authentication solely based on biometrics. Besides, the physical and behavioral characteristics of an individual are non-revocable, non-secret and thus pose a physical threat to the user [6]. Since biometrics is currently in its nascent stages, the technology is expensive and not mature yet. 5. Accessing a password file An attacker can break into a system and gain access to the password file. The file may then be read by the attacker, or the contents may even be modified so that the actual users would be unable to access their accounts. 6. Dictionary attack on passwords A dictionary attack uses a targeted technique of successively trying all words in an exhaustive list, called dictionary that is a pre-arranged list of values. It tries only those possibilities which are most likely to succeed, typically derived from a list of words [7]. Dictionary attacks succeed because many people have a tendency to choose passwords which are short, those with length 7 characters or less, single words found in dictionaries or simple, easily predicted variations on words, such as appending a digit. 7. Mouse/cursor and eye tracking Mouse and eye tracking software have been used to study the spatial and temporal dynamics in usability testing, psychology and cognitive science, and are available for free use. Using mouse tracking software, an attacker would be able to generate images of the cursor paths and time spent at a few points to track a victim’s login procedure, such as that while using on-screen and online keyboards. By measuring the point of gaze and motion of an eye relative to the head, it is possible for an attacker to determine the on-screen keys, buttons and other interactive content accessed by a victim. III. PROPOSED AUTHENTICATION SYSTEM A. System architecture We propose a new login system, which strengthens the virtual privacy of a user. The objective is to provide a reliable login technique for the user, operating on an unreliable terminal, such as one in a cyber cafe. Fig. 1 describes the architecture of the entire authentication system.
www.giapjournals.com
Page 3
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
In our implementation, a user’s mobile phone (with an active data connection) acts as a helper device to authenticate the user on the host machine. This enables login into a web account securely without entering any private login details on the host machine. The interfacing between the host machine and the mobile phone is done using Quick Response Codes, commonly known as QR codes, and Asymmetric key technique. Two unique, random public and private pairs of access tokens, also known as asymmetric key pairs, are generated for every user login session. The private access token is stored as a session variable on web browser of the host machine. The QR code is then generated, consisting of an encoded mobile website URL (Uniform Resource Locator) along with the public access token for the user session. The data within this QR code is accessible using barcode scanner applications commonly found on smart mobile devices. The scanned URL is then used to access the mobile website through a mobile browser for authentication. This authentication initiates a trigger on the web server and causes a background update on the host machine, using the unique private key present for the user session. After the login is successful, the pair of access tokens is then discarded, and user is forwarded to access the user account. If the login is unsuccessful or the login process is terminated without completing it then the asymmetric key pair is discarded automatically after a period of 10 minutes. Since the allotted time is quite sufficient to complete the entire process. B. Advantages of proposed system Our authentication system overcomes the vulnerabilities resulting due to use of keyloggers deployed by attackers covertly over unreliable terminals, since the terminal keyboard is not used at all. By shoulder surfing, an attacker can only look at the characters being entered through the keyboard and as the authentication system uses asymmetric key technique, even if some unauthorised person gets access to the QR code and scans it to gain access to the mobile website and the public key, the private key would still belong to the user session on the terminal web browser operated by the user himself. Thus users of this system are safe from shoulder surfing attacks. As one can notice, this system is also secure from screen-capturing, mouse and eye tracking software. Besides, encryption of data being communicated and also of stored passwords prevents unauthorized access and modification to information. This security is strengthened by limiting the lifetime of the access tokens being generated. IV. TECHNOLOGIES USED A. CAPTCHA CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart". It is a program that protects websites against bots by generating tests that humans can pass but current computer programs cannot. In our implementation, CAPTCHA is used to make sure that only humans are asking for mobile authentication [8]. B. SHA-1 Access tokens are 10-character long pseudo-random alphanumeric keys generated through a PHP (PHP: Hypertext Preprocessor) script. This string is then encrypted using SHA-1 (Secure Hash www.giapjournals.com
Page 4
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
Algorithm - 1), which is available as a built-in function in PHP and generates a 160-bit hexadecimal string [9]. C. QR codes Due to its fast readability and large storage capacity compared to traditional UPC (Universal Product Codes) barcodes, the QR code has become popular for a variety of applications including storing URLs [10]. Also, apps for scanning QR codes are available on almost all smartphones and tablet PCs [11]. We have used the Google API (Application Programming Interface) to generate QR codes of access tokens. D. jQuery jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event handling, animating, and Ajax interactions for rapid web development [12]. Our implementation makes use of it to continuously ping the server to check for occurrence of a successful login by the user through a mobile phone. E. PHP & MySQL PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source, general-purpose, server-side scripting language that is especially suited for web development and can be embedded into HTML [13]. It forms the front end of our implementation. MySQL is the most popular open source Relational Database Management System (RDBMS) which is developed, distributed, and supported by Oracle Corporation. It has been used to store user profile data as well as encrypted keys and the random tokens generated during the authentication process [14]. F. Android SDK The Android SDK provides the API libraries and developer tools necessary to build, test, and debug apps for the Android platform [15]. We have used the Android SDK to develop an application for the Android platform, which would assist users to login in from their mobile devices. V. IMPLEMENTATION The entire concept of mobile authentication has been implemented on our website http://www.compag.in. On the website login page, the user is provided with a link titled “Try mobile auth”. Fig. 2 describes a Data Flow Diagram for this concept. In Fig. 3, we have shown the login procedure in the form of a Sequence Diagram. The following section illustrates the steps under implementation. 1. Mobile website for login authentication Our implementation mainly involves use of user’s mobile device as a helper. The mobile phone would be involved only for the job of authentication and once that is accomplished, the user is then forwarded to access the web account. But to make mobile device support login authentication, a mobile website using jQuery mobile API was developed which would enable the user to use the
www.giapjournals.com
Page 5
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
mobile web pages, specially designed, considering the universal mobile browser support of different smart phones, today available in the market. 2. CAPTCHA test On the Desktop website, after clicking the link “Try mobile auth”, the user has to pass the CAPTCHA test. For this purpose, we have used reCAPTCHA by Google, which has provision for an audio translation for people with visual disabilities. Additionally, an option to reload CAPTCHAs is available to users. After successfully completing the CAPTCHA test the user session is initiated. 3. Generating pair of Asymmetric access tokens and QR code A randomization algorithm generates two unique strings having length of 10 characters. SHA algorithm is applied over these strings for encryption to get public and private access tokens respectively. Private access token is added as an argument in the page URL, whereas public access token is then set into the user session and a QR code is generated on the web page, with encoded mobile URL having the public access token. As session starts, public access token in the user session is compared with the one containing in the QR code to check the uniqueness of the user. If some other user tries to access the same URL from different terminal, in that case user’s session data will produce a mismatch for public access token as that in the QR code. This user will be considered invalid and would be shown a 401 error. 4. Database Manipulations Database has a table which stores all the data related to the process of mobile authentication which includes attributes for public and private access token’s hashes, User ID, date and time of authentication, and also a Boolean attribute which is used to verify success of CAPTCHA test. After successfully passing the CAPTCHA test, hashed public and private access tokens are stored in the database with their corresponding verify flag set to 1. The User ID field has a default value as 0 for that tuple which indicates mobile authentication is not yet completed. On successful login from the mobile phone, using the mobile URL with public access token as a parameter, the User ID attribute of the tuple to which the public access token belongs, will get updated to the User ID of the user who has logged in from the mobile phone, and the tuple is marked authenticated when the value changes from 0 to 1. 5. Implementing instant query response via jQuery The QR code is scanned by the user using the mobile device. The mobile website URL thus obtained is opened in a mobile browser and the user has to complete the manual login procedure of entering the email and password. Meanwhile, on the mobile device, user’s terminal client browser repeatedly pings the database server after fixed interval of time using jQuery GET request API, to check whether user has been authenticated successfully on the mobile phone. Once the request is made, the corresponding tuple on the database server is traced and if it is marked authenticated, the session is again initiated for the user to access the web account. Simultaneously, the tuple from the
www.giapjournals.com
Page 6
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
database table is discarded and the user is then forwarded to access the homepage of the personal web account. 6. Mobile application for instant login authentication The implementation using the mobile website is further extended to deploy the mobile authentication concept using a mobile application which can be installed independently on a mobile device operating on various mobile platforms. Fig. 5 and 6 show the user interface of the mobile application. The advantages of using a mobile application over using a mobile website would be that one can avoid logging in repeatedly for different mobile authentication sessions. The most important capability of a client mobile application is that it can be remember the user using local database, once he or she has logged into the application. Thus, whenever the user wishes to use mobile authentication, he or she just has to open the application and scan the QR code. The application would use values from the local mobile database to authenticate the public access token to the database server. The user is then forwarded to access the web account on the terminal browser. Usage of this application eliminates the need for repeated logins on mobile website every time the user wishes to use mobile authentication, making it more user-friendly and time-efficient. If the user is already signed in to the website through this application and scans the QR code, his/her home page will be automatically displayed on the terminal browser. If the user logs out from the mobile application, he/she would have to enter the login details the next time after scanning the generated QR code. Fig. 5 and Fig. 6 show the mobile application interface. VI. FUTURE WORK A web service of the current implementation can be developed so that various web applications can make use of it for their login mechanism. The current implementation makes use of periodic polling from client to the web server to check whether the authentication has been completed successfully from the mobile device. This method of periodic polling may overload the server when a considerably large number of user clients poll the web server at the same time which can also leads to denial of service. Thus, instead of using periodic polling, a persistent connection between server and client can be set up using HTML5’s WebSocket API. Through this connection, the web server can push authentication data into client asynchronously, thereby reducing the load on the server as well as wastage of resources occurring in the case of continuous request/response paradigm of the periodic polling. VII. CONCLUSION Today’s standard methods for logging into websites are subject to a variety of attacks. We have presented and implemented an alternate and secure approach for entering user login details by using mobile devices such as cell phones, smartphones and tablet PCs equipped with active data connection as input devices. This method completely eliminates threats arising due to keylogger software, shoulder surfing and cursor tracking, thus securing login procedures on unknown or public computers.
www.giapjournals.com
Page 7
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
ACKNOWLEDGMENT We are grateful to Ms. M. Kiruthika and Ms. Smita Dange for their guidance and support.
SCREENSHOTS
Fig. 1. Architecture Diagram
Fig. 2. Data Flow Diagram
www.giapjournals.com
Page 8
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
Fig. 3. Sequence Diagram
Fig. 4. Submitting login details on the website's mobile version
www.giapjournals.com
Page 9
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
Fig. 5. Screen for scanning QR code in the mobile application
Fig. 6. Submitting login details in the mobile application
www.giapjournals.com
Page 10
International Journal of Student Research in Technology & Management Vol 1(1) pg 01-11
REFERENCES [1] Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the ACM, 43(2), p. 91- 98. DOI 10.1145/328236.328110. [2] Advantages and disadvantages of Biometrics, http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of% 20technologies [3] Keylogger, http://www.webopedia.com/TERM/K/keylogger.html [4] Shoulder surfing, http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security) [5] Kumar, M., Garfinkel, T., Boneh, D., & Winograd, T. (2007). “Reducing Shoulder-surfing by Using Gaze-based Password Entry” [6] Disadvantages and advantages of Biometrics, http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics [7] Dictionary attack, http://searchsecurity.techtarget.com/definition/dictionary-attack [8] CAPTCHA, http://www.captcha.net/ [9] SHA-1 function in PHP, http://php.net/manual/en/function.sha1.php [10]
About QR codes, http://www.qrcode.com/en/aboutqr.html
[11]
“Global Growth in Mobile Barcode Usage - Q4 / 2010", 3GVision, 5 January 2011.
[12]
jQuery, http://jquery.com/
[13]
What is PHP, http://php.net/manual/en/intro-whatis.php
[14]
What is MySQL, http://dev.mysql.com/doc/refman/4.1/en/what-is-mysql.html
[15]
Android SDK, http://developer.android.com/sdk/index.html
www.giapjournals.com
Page 11
International Journal of Student Research in Technology & Management Vol 1(1), pg 12-17
ANDROID-ARM BASED SWITCH CONTROL USING SMART PHONE 1
Santosh ET, 2Vidhya V, 3Satish Kumar R Department of Electronics & Telecommunication Engineering Rajiv Gandhi College of Engineering, Chennai, India 1 etsant.18@gmail.com, 2vidhu2992@gmail.com, 3satzkumr7@yahoo.com Abstract The main idea behind this proposal is to provide an ease off access to the user by providing full control over his/her entire home. Due to modern city life we never find time to check any of our electric appliances, switches, thermostats, air conditioners and so on, whether they are regularly switched off when not in use. We are not even aware whether our doors are locked, before we leave to work. This results in Energy wastage, security risk, and eventually leads to stress. In our method we suggest an all in one method to control our appliances by using a simple android mobile phone. Though there are many home automation techniques which are operated in considerably high power and carrying a remote is necessary. We suggest an ease off method by using an Android phone with minimal power specifications. The main purpose of this concept is to conserve energy just by means of using his/her Android Smart phone and to provide an easy access in the process to the user.
I.
INTRODUCTION:
A typical ARM (Advanced RISC Machine) processor is one which controls its hardware peripherals using programming techniques. The programming concept is based on reduced instruction set computing (RISC), by means of which the hardware can be controlled by user program. We thought of giving the ARM processor an ANDROID operating system controlled instruction sets, due to its Open source license agreement. The main advantage of an android is that every hardware peripherals can be individually programmed according to the user. By developing an android application, it can be installed in the smart phone and the user interface generates certain codes which can be fed into the ARM processor. If this ARM processor is connected to the main circuit board, then the user can control all his appliances, through 2G/3G data connections. II.
ARM PROCESSOR:
A typical The ARM7TDMI-S is a general purpose 32-bit microprocessor, which offers high performance and very low power consumption. The ARM architecture is based on Reduced Instruction Set Computer (RISC) principles, and the instruction set and related decode mechanism are much simpler than those of micro programmed Complex Instruction Set Computers. This simplicity results in a high instruction throughput and impressive real-time interrupt response from a small and cost-effective processor core. www.giapjournals.com
Page 12
International Journal of Student Research in Technology & Management Vol 1(1), pg 12-17 Pipeline techniques are employed so that all parts of the processing and memory systems can operate continuously. Typically, while one instruction is being executed, its successor is being decoded, and a third instruction is being fetched from memory. The ARM7TDMI-S processor also employs a unique architectural strategy known as THUMB, which makes it ideally suited to high-volume applications with memory restrictions, or applications where code density is an issue. ARM7TDMI-S can be operated in two modes • The standard 32-bit ARM instruction set. • A 16-bit THUMB instruction set. Depending upon the user need either mode can be used. In our proposal it is operated in 32 bit mode. III.
BLOCK DIAGRAM:
Fig 1.1 LPC2148 Architecture
Fig 1.1 shows the general block diagram of ARM&TDMI-S processor. Here for our purpose we use LPC 2148 NXP IC for controlling the relay circuits and switches.
www.giapjournals.com
Page 13
Internaational Journ nal of Studen nt Research in Technologgy & Manageement V 1(1), pg 12-17 Vol IV.
A ANDROID:
Android has h broken into i our worlld due to itss open sourcee license agrreement. It iss a LINUX based operating system whicch allows thee user to moodify its operrating system m software acccording to his/her h h desire. Thhe main advaantage is that user can creeatively modiify or create applications to enhance his/her OS. A Another imporrtant aspect of o Android iss that due to its open handdset alliance and open GL L, any hardware peripherals can c be program mmed individdually accordiing to their neeeds. O of the haardware units that are founnd in Smart phone p is Gyrooscopes, whicch can For instance: One o o the mobile from portrrait to of sense the gravity. Thiis can be eitther used to change the orientations u the appliications develloped. landscapee (or) to steer a vehicle in a racing gamee depending upon V.
A ANDROID AR RCHITECT TURE:
m Architecturre Fig 1.2Android system
oped accordinng to the aboove architectuure and can be used to conntrol any harddware Any app can be develo peripheralls. www.giapjjournals.com
Paage 14
International Journal of Student Research in Technology & Management Vol 1(1), pg 12-17 VI.
METHODOLOGY:
STAGE I: The ARM processor is placed in the main circuit board. Each of its Chip-select pins is connected to the circuits of the appliances via the relay circuits provided by us. The ARM processor is programmed in embedded C programming language and the code is burnt using KIEL MICROVISION software. For this purpose GPIO pins are used. These pins tracks the appliances condition whether it is ON or OFF. STAGE II: The next step is developing an Android application. The application interface consists of an android app which contains toggle switches and denoting the corresponding appliance or relay. An application is developed in Android platform using ECLIPSE IDE development software / ADOBE FLASH BUILDER. The source code is written and the interface file .apk is generated and installed in user’s android mobile. STAGE III: On the other side the ARM processor is connected through Ethernet connection via RJ45 cable IEEE 802.3. This ensures the ARM processor is in data connection as the data pins are connected to the relay circuits of appliances. The IP of user’s mobile phone is configured according to the IP of ARM processor. When the user opens the applications and begins to interact with the toggle switch provided, the underlying code is debugged by the ARM processor and the corresponding appliance is controlled. Every code is unique and it is matched Since the ARM processor is operated at 3.3V, and can be made to operate in INTERUPT mode, less power is consumed. The main advantage is that the user can control his/her appliance anywhere irrespective of distance since it uses standalone connection using 3G and Ethernet IEEE 802.3. LOGIC DIAGRAM: The below mentioned diagram shows the logic connection of how everything is connected. The main advantage is that it can also be done using ZIGBEE module in the case of user doesn’t use Ethernet connection.
www.giapjournals.com
Page 15
International Journal of Student Research in Technology & Management Vol 1(1), pg 12-17
VII.
FUTURE ENHANCEMENTS:
The Proposed methodology can be enhanced by porting the ANDROID OS in ARM processor. And it can perform more enhanced tasks like notifying the user about any danger. It can be implemented in retail shops and universities and any other public sectors where one can easily check up their appliances. VIII.
CONCLUSION:
Thus the traditional method of controlling relays through GSM module by typing message and receiving message through SMS can besmartly changed by our proposal, where user can control just by using a simple application. IX.
CURRENT WORK PROGRESS:
Currently we are working keenly in developing an Android app. This is the main task for us since the app should generate different codes for each toggle switch interface. ARM processor porting will be completed before 25 and the project is expected by us to get completed by 1st of March 2013.
www.giapjournals.com
Page 16
International Journal of Student Research in Technology & Management Vol 1(1), pg 12-17
REFERENCES: 1. Vance, Ashlee (27 July 2011). "Steve Perlman's Wireless Fix". Bloomberg Businessweek. Bloomberg.Retrieved 3 November 2012. 2. "UI Overview | Android Developers". Developer.android.com. Retrieved 2012-09-15. 3. "ARM Cores Climb Into 3G Territory" by Mark Hachman, 2002.
www.giapjournals.com
Page 17
International Journal of Student Research in Technology & Management Vol 1(1), pg 18-21
SWITCHES ON FINGERTIPS Raunak Borwankar1, Aditya Shenoy2, Gaurav Pednekar3 , Purva Sawant4 Department of Electronics Telecommunication, Don Bosco Institute of Technology, Kurla (West), Mumbai 400 070, India 1
raun_borwankar@yahoo.co.in , 2aditya.shenoy1893@gmail.com, 3gpednekar@gmail.com , 4 sawant.purva@gmail.com
Abstract The document gives information on controlling all electrical devices viz. Tube lights, airconditioners, computers, fans of every floor of the building from a single computer. To perform this task the main functional components are micro-controller and RS-485.This application can be accessed by the users anywhere anytime and from any device like desktop or laptop. This project is aimed at consumption of electricity by switching off the appliances. It is the future of corporate world due its various applications. Keywords: Technology, Electricity , Micro-Controller , RS-485, Communication , Parameter I.
INTRODUCTION
This Technology make use of Micro-Controller , Rs-485 to control electrical devices. This Technology is very useful in corporate offices which helps in saving Electricity to a large extent. It can be also used in were quickly we have to cut the power supply of a particular place because of Fire or Gas Leaks. The technology currently used involves connection of every device individually to MCB’s. In order to switch on and off, we need to adjust MCB. This project can control devices directly from PC. II.
MAIN BODY
The components used are MICRO-CONTROLLER (AVR ATMEGA 8) and Rs-485. First we make segments of electrical appliances that are to be operated by computer .For convenience we use separate relay boards for different appliances .Then connect those segments to respected relay board . The Host from where the operating takes place consist of a computer, micro-controller and Rs-485. The Micro-controller used is an AVR ATMEGA 8 so it is directly connected to pc through USB port . AVR ATMEGA 8:
www.giapjournals.com
Page 18
International Journal of Student Research in Technology & Management Vol 1(1), pg 18-21
It is 8-bit micro-controller and consists of a variety of internal oscillators, timers, UARTs, SPIs, Pulse Width Modulation, pull-up resistors, ADCs, Analog Comparators and Watch-Dog Timers in it . RS 485
•
Device needs to send & receive serial data to multiple locations at long distance.
•
Provides RS485 interface to microcontrollers though their TX and RX pins to transmit/receive the serial data at long distance.
•
Also provides reliable two wire RS485 link that can work up to 1.2 Km long twisted pair cable.
•
When connected to any microcontroller serial UART pins the module can communicate in a bidirectional manner with any existing serial communication applications.
•
.It can Transmit and Receive serial data at 9600 bps . Also it can be directly interface with microcontroller uart txd ,rxd pins. It works on merely 5 volts.
•
The computer and micro-controller are connected by a RS-232 . RS- 485 communication and micro-controller are connected through pins. Both sides can be microcontroller. If you need PC at the other side, the PC can have RS232 to RS485 converter or USB to RS485 Converter.
www.giapjournals.com
Page 19
International Journal of Student Research in Technology & Management Vol 1(1), pg 18-21
•
The Rx-in of RS485 is connected to Txd of Micro-controller, while the Tx-out of RS485 is connected to Rxd of micro-controller .
The RS-485 is basically used to transfer data .The two RS-485 are connected through two pins.And then the RS-485 is connected to Micro-controller .The Micro-controller is then connected to relay board . Their is a Micro-controller and a RS-485 on every floor of a building .The micro-controller at host is provided with a parameter to select floor and then the control moves to the micro-controller on that very floor through a series of RS-485 .The selected micro-controller is then fed with parameters to select relay boards .If the appliances are to be closed all at once then we have to make use of SSR .These SSR are then connected to Relay Board .The Micro-controller is to be provided with a parameter in order to bring SSR in action . The Relay board is provided with external AC supply through SSR .The Micro-controller and RS-485 is given 5 volts externally. III.
CONCLUSIONS
The paper introduces about pc controlled electronic devices which can have a wide scope in future as it saves energy to a great extent. It can also be used in commercial buildings to a great effect with ease. It ensures safety and security with its various applications. IV.
CURRENT WORK PROGRESS
The technology currently uses RS-485 for communication purpose.Using sensors gas leak or fire break is detected.At a time any number of appliances can be controlled. This project can be extende to keep a check on the number of people in the room and accordingly controlling appliances. The future scope in developing this project is powerline communication.
www.giapjournals.com
Page 20
International Journal of Student Research in Technology & Management Vol 1(1), pg 18-21
REFERENCES 1. http://www.engadget.com/2012/08/19/bluetooth-bulb-lets-you-switch-on-time-dim-and-color/ 2. http://www.codeproject.com/Articles/7239/Control-Electrical-Appliances-using-PC 3. http://soe.rutgers.edu/sites/default/files/gset/CCL.pdf
www.giapjournals.com
Page 21
International Journal of Student Research in Technology & Management Vol 1 (1), pg 22-26
SURVEILLANCE SYSTEM Yatendra Bhargava, Dheeraj Bhargava Dept of Computer Science, Department of Mechanical Engineering Maharishi Arvind Institute of Engineering & Technology, Jaipur Swami Keshwanand Institute of Technology, Jaipur, Rajasthan bhargavadheeraj04@gmail.com
Abstract Disturbed by the gruesome terror attacks in the country, including the one at “Taj Hotel” in Mumbai forced us to develop a product which enforces to capture the terrorist and ensures civilian’s safety without having any use of ammunition, arms or any life loss. The system works with sensors attached on window panes of a building where surveillance is to be made. These sensors are then connected to a heating element and CCTV cameras. When the sensors are activated from a distance with a laser beam, the heating element spew chemicals on the terrorists to make them unconscious and the cameras start automatically.
I.
INRODUCTION
In this dramatic and corporate world security has been an essential thing in the present day scenario. So for the security reason from terrorist and other groups we are developing a project which enforces to capture the terrorist and the civilian’s safe without having any use of ammunition or any arms. Let’s have an example of attack on “Hotel Taj”, at that time Indian Defense team was in fail condition that how to locate the position of terrorist and capture them. So to conclude over this problem we had developed this gadget which helps the Defense team to locate the position of terrorist and make them capture by switching on the security camera and blow some vaporized chemical which makes them unconscious and then after terrorist can be easily captured.
II.
COMPONENTS AND PROCESS
A device when activated by a laser beam from a distance as far as half-a-kilometer can take control over CCTV cameras and spew chemicals on the terrorists to make them unconscious. The system works with sensors attached on windowpanes of a building where surveillance is to be made. These sensors are then connected to a heating element and CCTV cameras. When the sensors are activated from a distance with a laser beam, the heating element and the cameras start automatically. "The sensors have IR-Diode element, www.giapjournals.com
Page 22
International Journal of Student Research in Technology & Management Vol 1 (1), pg 22-26
which detects laser beams, and timer IC-555 which produces oscillation and acts as an electronic switch to start the heating element and camera. The system runs on 12 volt battery which can operate 7-8 cameras". Block diagram
Circuit diagram
www.giapjournals.com
Page 23
International Journal of Student Research in Technology & Management Vol 1 (1), pg 22-26
Components used: i.
Timer ic-555
ii.
Resistances(220E,10k,47k,220k,1M)
iii.
Transistors(Bc-548,Bc-558)
iv.
Capacitors(10Mf,220Mf)
v.
Relays(9 volts)
vi.
Transformer(12 volt)
vii.
Dc-motor
viii.
Electrolytic L.E.D
ix.
Light depending resistance
x.
Speaker
xi.
Diodes
xii.
Regulator ic-7808
Besides it, we try to save human efforts. Here in this paper we introduce that gadget which fulfills the requirement by completing the job without having any physical appearance of human at that place. This gadget mainly plays an important role at the place where we need to operate any electronic device having no personal appearance there. It means that we can operate it from any corner of this world. It is applicable for both urban and rural areas. ž Farmers feel indolent to irrigate their fields at the time of hazy morning during winters. They have to go 2-3 km’s apart from their house to the field to switch on their main power of water motor. Here the problem can be easily sort out using this gadget. The switch of water motor can be easily operated being distance apart of it by just making a call to the place where we have to just make the irrigation start. III.
HOW THIS GAGET WORKS:
Here we use electro-magnetic wave theory with a combination of wireless technology (i.e. cell-phone) on a platform of timer ic-555.
www.giapjournals.com
Page 24
International Journal of Student Research in Technology & Management Vol 1 (1), pg 22-26
When the electro-magnetic waves radiated from cell phone given to an electrolytic L.E.D then, L.E.D lights up & activate the oscillator circuit with the help of light depending resistance which in result works as a kind of switching transmitter. The whole apparatus makes the user independent of manual working to do any of the work except doing a call to the target where a cell phone is placed. When this cell phone rings or vibrates it radiates electromagnetic waves. Here no need of any person to attend a call. The cell phone works in any of the mode (i.e. silent, vibrate or ringing). The above gadget is just attached to the appliance which a person needs to operate. IV.
CURRENT STATUS & PROPOSED
We had developed our prototype and it has been showcased at different national exhibitions and gets exposure through media. This technological project has following features: •
Cost effective: This gadget includes cheap components which reduces its price to 300/- only
•
User friendly: Nowadays mobile phone has a good approach to every human so any person can operate this gadget easily without having pre-training for this.
•
Upgradable: This gadget generally operates only one of the device at a time, but it can be Upgraded to operate multi-device with the help of DTMF (Dual Tone Multiple Frequency) technique.
•
Portable: The components used in this gadget are small in size. Hence makes the gadget Portable.
•
Practical use: The gadget has a wide application in rural and urban area. It can be used in Agriculture, offices, laboratories, homes.
•
Industrial production: small and cheap components are imposed in this gadget which can be readily available for its production.
Proposed Budget: The gadget 2 can be made with a little amount of 300/- only, which is an easy approach to everyone. A cell phone is also required for this purpose mainly the cheap models of nokia3310, nokia-2626, and nokia-1650. The gadget 1 costs 1500/- only. Hence the whole surveillance system cost will be 1800/- only.
www.giapjournals.com
Page 25
International Journal of Student Research in Technology & Management Vol 1 (1), pg 22-26
V.
CONCLUSION
Security concerns have risen to alarming levels as terrorism and unseen dangers lurking around cause huge damage to human life and intellectual property. To safeguard these hi-tech attacks and intrusions we need equally sophisticated security device and can make our society secured. REFERENCES
1. www.scribd.com/.../Block-Diagram-of-IC-Timer-Such-as-555-and-Itsworking 2. www.microwaves101.com/encyclopedia/absorbingradar1.cfm 3. William Stallings, ‘Wireless Communications and Networks’
www.giapjournals.com
Page 26
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
MOVING TARGET INDICATION RADAR Abhinav Singh, Vaibhav Shah, Anurag Sarnaik Thakur College of Engg. and Technology, Thakur Village, Kandivli(E), Mumbai-400101, India vaibhav.shah222@gmail.com
Abstract MTI (Moving Target Indication) radar systems have been built for many years, based on system concepts evolved in the early 1950's. Digital techniques now permit easier implementation, but do not change the basic concepts; staggered repetition periods to eliminate blind speeds; and MTI cancellers with the velocity response shaped by feed forward and feedback techniques. Radar MTI may be specialized in terms of the type of clutter and environment: airborne MTI (AMTI), ground MTI (GMTI), etc., or may be combined mode: stationary and moving target indication (SMTI).The most common approach takes advantage of the Doppler effect. Many of the existing systems are very successful considering their performance, measured in terms of MTI improvement factor or sub clutter visibility. In this paper the basic MTI concepts and definitions are presented, and the real problems of modern surface-based MTI radar systems are discussed. I.
INTRODUCTION
RADAR (Radio Detection and Ranging) is a system used mainly in defence applications which is used to locate the target, that is, to find its exact position in the range which it covers. The drawback of conventional pulse RADAR is that it can determine only the range, that is, the distance of the target from RADAR antenna. It cannot determine whether the target is moving or not and in which direction it is moving. Thus in order to determine the motion of the target we use MTI (Moving Target Indication) RADAR. MTI RADAR has become a boon for detecting motion of the targets in the field of RADAR Engineering. MTI RADAR is defined as the RADAR in which the Doppler effect can be employed to differentiate between stationary and moving targets, with the former suppressed and only the latter displayed. In this process, the permanent echoes as well as those from very slow moving objects (if desired) are not displayed on the PPI (plan position indicator), and the radar controller can pay attention to the real aircraft. Along with the detection of moving targets it also eliminates the effect of stationary objects or stationary clutters. This can be achieved by using the Delay line cancellor. II.
EVOLUTION OF RADAR
Previously, RADAR systems were very simple. There were no separate antennas for transmitter and receiver. A single antenna used to function as transmitter and receiver. A gaseous device was called as duplexer was used to separate the transmitter and receiver subsystems. For certain time the single www.giapjournals.com
Page 27
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
antenna used to work as a transmitter while for other time it used to function as a receiver. The transmitting and receiving functions were time multiplexed. The received echo was demodulated, amplified and compared with the threshold level. But the disadvantage was that the doppler frequency shift due to motion of the target was not detected. Thus such a RADAR could not detect moving target. It was used only to detect stationary targets. After World War-I when aircrafts were used in war for the first time there was a need to detect moving targets in which the conventional RADAR failed. Also as the aviation industry progressed there was also a need to control the motion of aircrafts to prevent fatal accidents. Thus a special RADAR system to detect moving targets was developed called as MTI (Moving Target Indication) RADAR was developed. Another type of RADAR used to detect moving targets was Pulse Dopplar RADAR. Both the RADAR systems used the concept of Dopplar frequency shift or dopplar effect to detect the moving targets. History was made when Croydon airport of London was the first airport to use ATC(Air Traffic Control) system in the year 1921. It used the RADARS used to detect moving targets. ІІІ. DOPPLER FREQUENCY SHIFT Doppler shift is an apparent change in frequency (or wavelength) due to the relative motion of two objects. Either one or both of the objects may be moving with respect to the ground. Radar systems exploit the Doppler shift to provide an indication of relative speed. When the two objects are approaching each other (closing), the Doppler shift causes a shortening of wavelength - or increase in frequency. When the two objects are receding from each other (opening), the Doppler shift causes a lengthening of wavelength - or decrease in frequency. In case of an MTI RADAR, when the target is moving towards the RADAR, the frequency of the echo received from the target increases whereas if the target is moving away from the RADAR, the frequency of the echo received from the target decreases. Difference in the transmitted frequency and received frequency from the target is called as dopplar frequency and is denoted by fd. ІV. DIFFERENCE BETWEEN PULSE DOPPLER RADAR AND MTI RADAR Both this RADAR basically depends on same principle of Doppler frequency shift.But there are some difference that are some differences. MTI RADAR uses low pulse repetition frequency while pulse Doppler uses high and medium pulse repetition frequency.MTI RADAR has no range ambiguity while range ambiguity may occur in pulse Doppler. Improvement factor need not to be improved in MTI RADAR while in pulse Doppler improvement in Improvement factor is needed. Usually magnetron oscillator is commonly used as transmitter ,in pulse Doppler high power klyston amplifier is used as transmitter. MTI RADAR uses analog delay line canceller while in pulse Doppler it uses analog filter banks.MTI RADAR receives less clutter signal while pulse Doppler RADAR receives more clutter signals. www.giapjournals.com
Page 28
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
V. WORKING
Fig.1 - Pulse Radar A simple CW radar
consists of a transmitter, receiver, indicator, and the necessary antennas. In
principle, the CW radar may be converted into a pulse radar as shown in Fig. 1 by providing a power amplifier and a modulator to turn the amplifier on and off for tllc purpose of generating pulses. The chief difference between the pulse radar and the CW radar is that a small portion of the CW oscillator power that generates the transmitted pulses is diverted to the receiver to take the place of the local oscillator. It acts as the coherent reference needed to detect the doppler frequency shift. If the CW oscillator voltage is represented as
and the doppler-shifted echo-signal voltage is
Where: A2 = amplitude of reference signal A3 = amplitude of signal received from a target
at a range R,
fd = doppler frequency shift t = time c = velocity of propagation
www.giapjournals.com
Page 29
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
Fig.2 - A scope display Moving targets may be distinguished from stationary targets by observing the video output on an Ascope (amplitude vs. range). A single sweep on an A-scope might appear as in Fig.2. This sweep slows several fixed targets and two moving targets indicated by the two arrows. O n the basis of a single sweep, moving targets cannot be distinguished from fixed targets. ( It may be possible to distinguish extended ground targets from point targets by the string of the echo pulses. However, this is not a reliable means of discriminating moving from fixed targets since some fixed targets can look like point targets, e.g., a water tower. Also, some moving targets such as aircraft flying in formation can look like extended targets.) Successive A-scope sweeps (pulse-repetition intervals) are shown in Fig.. Echoes fromfixed targets remain constant throughout, but echoes from moving targets vary in amplitude from sweep to sweep at a rate corresponding to the doppler frequency. A) MTI operation The block diagram of a more common MTI radar employing a power amplifier is shown.The significant difference between this MTI configuration and that Figure is the manner in which the reference signal is generated. In Fig.3, the coherent reference is supplied by at oscillator called the coho, which stands for coherent oscillator. The coho is a stable oscillator whose frequency is the same as the intermediate frequency used in the receiver. In addition to providing the reference signal the output of the coho. is also mixed with the local-oscillator frequency.The local oscillator- must be a stable oscillator and is called stalo.. The RF echo signal is heterodyned with the stalo signal to produce the IF frequency just as in the superheterodyne reciever. They serve in both the receiver and the transmitter mode.The characteristic feature of coherent MTI radar is that the transmitted signal must be coherent (in phase) with the reference signal in the receiver. This is accomplished in the radar
www.giapjournals.com
Page 30
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
system diagramed in Fig.3 by generating the transmitted signal from rile coho reference signal. The function of the stalo is to provide the necessary frequency translation from the IF to the transmitted frequency. Although the phase of the stalo influences the phase of the transmitted signal, any stalo phase shift is canceled on reception because the stalo that generates the transmitted signal also acts as the local oscillator in the receiver. The reference signal from the coho and the IF echo signal are both fed into a mixer called the phase detector. The phase detector differs from the normal amplitude detector since its output is proportional to the phase difference between the two input signals.
Fig.3-MTI block diagram B) Delay Line Canceller
Fig.4 – Delay Line Canceller
www.giapjournals.com
Page 31
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
The simple MTI delay-line canceller shown in Fig.4 is an example of a time-domain filter. The capability of this device depends on the quality of the medium used is the delay line. The Pulse modulator delay line must introduce a time delay equal to the pulse repetition interval. For typical ground-based air-surveillance radars this might be several milliseconds. Delay times of this magnitude cannot be achieved with practical electromagnetic transmission lines. By converting the electromagnetic signal to an 'acoustic signal it is possible to utilize delay lines of a reasonable physical length since the velocity of propagation of acoustic waves is about that of electromagnetic waves. After the necessary delay is introduced by the acoustic line, the signal is converted back to an electromagnetic signal for further processing. The early acoustic delay lines developed during World War 11 used liquid delay lines filled with either water or mercury.' Liquid delay lines were large and inconvenient to use. They were replaced in the mid-1950s by the solid fused-quartz delay line that used multiple internal reflections to obtain a compact device. These analog acoustic delay lines were, in turn supplanted in the early 1970s by storage devices based on digital computer technology. The use of digital delay lines requires that the output of the MTI receiver phase-detector be quantized into a sequence of digital words. The compactness and convenience of digital processing allows the implerfientation of more complex delay-line cancellers with filter characteristics not practical with analog met holds. One of the advantages of a time-domain delay-line canceller as compared to the more conventional frequency-domain filter is that a single network operates at all ranges and does not require a separate filter for each range resolution cell. Frequency-domain doppler filterbanks are of interest in some forms of MTI and pulse-doppler radar.
Fig.5 – Delay Line Canceller Working www.giapjournals.com
Page 32
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
C) Filter characteristics of the delay-line canceler The delay-line canceler acts as a filter which rejects the d-c component of clutter. Because of its periodic nature, the filter also rejects energy in the vicinity of the pulse repetition frequency and its harmonics.The video signal received from a particular target at a range R, is V1 = k sin (2Πfdt - Φ,)………………………………..Eqn 1 where Φ = phase shift and k = amplitude of video signal. The signal from the previous transmission, which is delayed by a time T = pulse repetition interval, is V2 = k sin [2Πfd (t - T) – Φ]……………………………Eqn 2. Everything else is assumed to.remain essentially constant over the interval T so that k is the same for both pulses. The output from the subtractor is V = V1, - V2 =2k sin Π fd Tcos [2Π fd(t – T/2) - Φ]….Eqn 3 It is assumed that the gain through the delay-line canceller is unity. The output from the canceller consists of a cosine wave at the doppler frequency& with an amplitude 2k sin ΠfdT: Thus the amplitude of the canceled video output is a function of the doppler frequency shift and the pulserepetition interval, or prf. The magnitude of the relative frequency-response of the delay-line canceller [ratio of the amplitude of the output from the delay-line canceller, 2k sin (Πfd T), to the amplitude of the normal radar video kj is shown in Fig.6.
Fig.6 - Delay Line Frequency Response VI. DIGITAL SIGNAL PROCESSING The introduction of practical and ecorlomical digital processing to MTI radar allowed a significant increase in the options open to the signal processing designer. The convenience of digital processing meant that multiple delay-line cancelers with tailored frequency-response can be obtained.
www.giapjournals.com
Page 33
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
Fig.7 – Digital MTI Signal Processor A simple block diagram of a digital MTI processor is shown in Fig. 7. From the output of the IF amplifier the signal is split into two channels. One is denoted I, for in-phase channel. The other is denoted Q, for quadrature channel, since a 90" phase change (∏/2 radians) is introduced into the coho reference signal at the phase detector. The purpose of the quadrature channel is to eliminate the blind speeds. VII. BLIND SPEED LIMITATION The response of the single-delay-line canceller will be zero whenever the argument ΠfdT in the amplitude factor of is 0, Π , 2Π, . .., etc., or when
where r l = 0, 1, 2, . . . , and j, = pulse repetition frequency. The delay-line canceller not only eliminates the d-c component caused by clutter (n = 0), but unfortunately it also rejects any moving target whose doppler frequency happens to be the same as the prf or a multiple there of. Those relative target velocities which result in zero MTI response are called blind speeds are given by v = nλ/2T=nλfp/2 n = l , 2 , 3, ... where vn, is the nth blind speed. The blind speeds are one of the limitations of pulse MTI radar which do not occur with CW radar. They are present in pulse radar because doppler is measured by discrete samples -(pulses) at the prf rather than continuously. If the first blind speed is to be greater than the maximum radial velocity www.giapjournals.com
Page 34
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
expected from the target, the product ,IF must be large. Thus the MTI radar must operate at long wavelengths (low frequencies) or with high pulse repetition frequencies, or both. Unfortunately, there are usually constraints other than blind speeds which determine the wavelength and the pulse repetition frequency. Therefore blind speeds might not be easy to avoid. Low radar frequencies have the disadvantage that antenna beamwidths, for a given-size antenna, are wider than at the higher frequencies and would not be satisfactory in applications where angular accuracy or angular resolution is important. The pulse repetition frequency cannot always be varied over wide limits since it is primarily determined by the unambiguous range requirement. A) Staggered Pulse Repetitive Frequency The use of more than one pulse repetition frequency offers additional flexibility in the design of MTI doppler filters. It not only reduces the effect of the blind speeds , but it also allows a sharper lowfrequency cutoff in the frequency response than might be obtained with a cascade of single-delay-line cancelers with sinn nf,T response. The blind speeds of two independent radars operating at the same frequency will be different if their pulse repetition frequencies are different. Therefore, if one radar were " blind " to moving targets, it would be unlikely that the other radar would be " blind" also. Instead of using two separate radars, the same result can be obtained with one radar which time-shares its pulse repetition frequency between two or more different values (multiple prf's). The pulse repetition frequency might be switched every other scan or every time the antenna is scanned a half beam width, or the period might be alternated on every other pulse. When the switching is pulse to pulse, it is known as a staggered prf. An example of the composite (average) response of an MTI radar operating with two separate pulse repetition frequencies on a time-shared basis is shown in Fig. 7. repetition frequencies are in the ratio of 5 : 4. Note that the first blind speed of the composite response is increased several times over what it would be for a radar operating on only a single pulse repetition frequency. Zero response occurs only when the blind speeds of each prf coincide. VIII . OTHER LIMITATIONS TO MTI PERFORMANCE There are limitations to the performance of MTI radar. The degradation in the performance of MTI radar are caused due to following reasons: A) Antenna scanning modulation The duration of echo signal received from a target or a clutter scatterer as antenna of pulse radar scans is given by to=Nb/fp=Өb/Өs where Nb=number of pulses received fp=pulse reptition frequency Өb=antenna beamwidth in degrees Өs=antenna scanning rate in degree/second
www.giapjournals.com
Page 35
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
The bandwidth of the frequency spectrum is inversally proportional to the time duration to. Consequently,even if the clutter scatterer were perfectly stationary and there were no instabilities in equipment ,there would be still finite spectral spread due to finite duration of echo signal. This limitation has been called antenna scanning modulation ,but it is basically due to finite time on target.The longer time on the target,less will be the spread in the clutter spectrum.
Fig.7 – Staggered PRF B.)Internal fluctuations of clutter Echoes from mountains, rocks, buildings, water towers ,fences, thick tree trunks, hills
usually
stationary in nature. Many other sources of clutter echoes however can be in motion .These include echoes from sea, rain, chaff, rees, large vegetations, structures blowing in wind etc. The amplitude and phase fluctuations of
windblown structures results in widened frequency spectrum of clutter echo that can be a
limitation on performance of MTI radar.
www.giapjournals.com
Page 36
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
C) .Equipment instabilities Changes in amplitude, frequency or phase of stalo and coho oscillators as well as changes in pulse to pulse characteristics of transmitted signal or errors in timing can result in uncancelled clutter echoes and causes limit to improvement factor of MTI radar that can be achieved. D). Limiting A limiter in the MTI receiver has sometimes been used to reduce the clutter to the level of receiver noise.The hard
limiters used in MTI
radar
cause quite
serious degradation
of
the
MTI
performance.Instead a limiter should be set above the receiver noise by an amount equal to MTI radar improvement factor. IX. APPLICATIONS A) Astronomy Redshift of spectral lines in the optical spectrum of a supercluster of distant galaxies (right), as compared to that of the Sun (left). The Doppler effect for electromagnetic waves such as light is of great use in astronomy and results in either a so-called redshift or blueshift. It has been used to measure the speed at which stars and galaxies are approaching or receding from us, that is, the radial velocity. This is used to detect if an apparently single star is, in reality, a close binary and even to measure the rotational speed of stars and galaxies. The use of the Doppler effect for light in astronomy depends on our knowledge that the spectra of stars are not continuous. They exhibit absorption lines at well defined frequencies that are correlated with the energies required to excite electrons in various elements from one level to another. The Doppler effect is recognizable in the fact that the absorption lines are not always at the frequencies that are obtained from the spectrum of a stationary light source. Since blue light has a higher frequency than red light, the spectral lines of an approaching astronomical light source exhibit a blueshift and those of a receding astronomical light source exhibit a redshift. Among the nearby stars, the largest radial velocities with respect to the Sun are +308 km/s (BD15°4041, also known as LHS 52, 81.7 light-years away) and -260 km/s (Woolley 9722, also known as Wolf 1106 and LHS 64, 78.2 light-years away). Positive radial velocity means the star is receding from the Sun, The Doppler effect is used in some types of radar, to measure the velocity of detected objects. A radar beam is fired at a moving target — e.g. a motor car, as police use radar to detect speeding motorists — as it approaches or recedes from the radar source. Each successive radar wave has to travel farther to reach the car, before being reflected and re-detected near the source. As each wave has to move farther, the gap between each wave increases, increasing the wavelength. In some situations, the radar www.giapjournals.com
Page 37
International Journal of Student Research in Technology & Management Vol 1 (1), pg 27-38
beam is fired at the moving car as it approaches, in which case each successive wave travels a lesser distance, decreasing the wavelength. In either situation, calculations from the Doppler effect accurately determine the car's velocity. Moreover, the proximity fuze, developed during World War II, relies upon Doppler radar to detonate explosives at the correct time, height, distance, etc. B) RADAR Gun Police use a radar detector to determine the speed of a car as it moves down the highway. Radar waves are transmitted from the police car at a certain frequency. Recall that waves have both amplitude and frequency. When the waves bounce off a moving object their frequency is effected. As the radio waves bounce of a car that is moving toward the detector the frequency of the wave decreases. If the waves bounce of a car moving away from the detector the frequency of the wave increases. The detector uses the difference in the transmitted and received wave frequencies to determine the speed of the car. C) Military purpose In aviation, aircraft are equipped with radar devices that warn of obstacles in or approaching their path and give accurate altitude readings. The first commercial device fitted to aircraft was a 1938 Bell Lab unit on some United Air Lines aircraft. Such aircraft can land in fog at airports equipped with radarassisted ground-controlled approach systems in which the plane's flight is observed on radar screens while operators radio landing directions to the pilot. X. CONCLUSION Here we have presented a special application of radar ie. MTI radar which is far more superior to ordinary radar. The basic principle involved and its operation has been elaborated along with its limitations. MTI radar can be used for various air borne as well as ground based applications and shows a lot of promise in the near future. REFERENCES 1. Introduction to RADAR system by Merrill I.Skolnik 2. RADAR Systems by V.S. Bagad 3. Wikipedia.com 4. Britinca.com 5. Modern RADAR systems by Hamish Meikle
www.giapjournals.com
Page 38
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
UNIQUE IDENTIFICATION, INFORMATION & SURVEILLANCE SYSTEM FOR VEHICLES Pradip Mule 1, Jatin Patil 2, Sunil Khatri 3, Ronak Khandelwal 4 Department of EXTC, University of Mumbai, Mumbai, India 1
pradipmule@gmail.com, 2 jatinpatil6763@gmail.com
Abstract Number of vehicles is an ever-increasing commodity in present era, this growth asks for some drastic revolution in surveillance and information system regarding the safety and security as a prime concern. So, we are generalizing on the evolution of such a system which will be capable of providing an integrated platform in the areas of Unique Identification, User Authentication, Surveillance (tracking) & Accident recognition. So, "Unique Identification, Information & Surveillance System for Vehicles" is a system which will utilize the benefits of existing technologies including (GSM) Global System for Mobile communication, (GPS) Global Positioning System, (RFID) Radio Frequency Identification for ultimately fulfilling the foreseen vision. The proceeding content will reveal a general outlook to achieve the foresaid objectives. Key Words: - GPS, GSM, RFID, SIM, Identification, Authentication, Surveillance I. EVOLUTION OF IDEA
If you lose a pen, what will you do? Of course you will buy a new pen but can you do the same if it happens to your car? Government is spending a lot of money on the projects which involves large numbers of vehicles like trucks and even they are provided with free diesel and petrol depending upon the distance they are covering while completing their responsibilities, but do Government really know whether this vehicles are really completing their responsibilities or not ? Do Government really know whether they are lying or not? There are thousands of complaints in police station about lost or stolen vehicles, But is it practically possible to get back all those vehicles to their owners with our conventional system? If serious accident happens and there is no one around for help, do you think those people will survive? We are losing around 86% people who met an accident just because we are not able to provide them immediate medical help, are we? We always blame police department for not being on time but just think from another point of view, do they get appropriate information on time? What if I lose my only key of my car? What option do I have except breaking my car lock? What if someone uses a fake numberplate while doing an illegal thing and unfortunately that numberplate matches with my numberplate? What can I do in such situations?
www.giapjournals.com
Page 39
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
Vehicles play a very important role in everyone’s life .Our national security totally dependent upon these vehicles, because there is no such crime which does not involve any unauthorized access of any vehicle. Till when we will be silent in front of all such questions? So here we are providing answers to each and every question related to safety and security of vehicles. Our system is utilising the benefits of existing technologies to fulfil our motive. II. INTRODUCTION
Aim of this paper is to discuss such a system which will be able to provide excellent way to keep a track of each and every vehicle irrespective of boundary limits and also the features provided by system regarding safety and security. The entire system implementation can be divided into following Modules. •
Surveillance
•
Unique Identification
•
User Authentication
•
Accident Recognition
While discussing each module we will be following a simple pattern starting from the drawbacks of traditional system and how this system can tackle those drawbacks with an ease. We will also emphasize on the features which can prove the system performance to maximum level possible. III. SURVEILLANCE
Surveillance has always been the necessity in many industrial and other fields. It can be of a great advantage to improve the efficiency of an organization. Thus we want to develop a GPS based low cost passive surveillance system which has various applications. The system consist of a vehicle unit which is equipped with a GPS receiver which plots the position and a GSM module which handles the communication link between the car unit and the base unit which must be under civic bodies like police authorities. The information can be viewed on electronic maps via the Internet or specialized software. Thus the car location can be tracked by the owner of the car or by police activities. Current tracking systems have their roots in the shipping industry. A corporation with large fleets of vehicles requires some sort of system to determine where each vehicle was at any given time and where it would be in future, which will be helpful in enhancing the efficiency as well as the accuracy of the company in taking decisions and providing great service to their customers. Thus surveillance system can be of great help in such Corporations for effective fleet management.
www.giapjournals.com
Page 40
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
Fig. 1. Example of Surveillance System IV. UNIQUE IDENTIFICATION
Nowadays we use a physical number plate for identifying all the vehicles which is a traditional method. But there are various cases in which criminals have been using fake or multiple number plates. Actually seeing we know that the number plate is not at all connected to the internal engine of the car hence removing the number plate or threatening it becomes very easy, which is the task of removing two screws only. Hence to get reed of these problems we want to make an unique identification system which will be electronic, which can be integrated to engine, which can be programmed in such a way that any kind of threatening to the system can to reported to the authority such as police or the car owner. By using SIM (Subscriber Identity Module)cards can be easily used for providing the unique identification in an electronic way. Every SIM card is unique in its own sense hence there is no need of further explanation for the numerous advantages which will reduce Identification Vulnerabilities. This Identification can be used for the global safety and security as a prime concern.
Fig. 2. SIM(Subscriber Identification Module) card www.giapjournals.com
Page 41
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49 V. USER AUTHENTICATION
We have been using mechanical locks from years for our houses, our cars. But mechanical locks has their own disadvantages one of which is that even if you are the real master of that lock it won’t let you access until you have the Key. And sometime due to some work or our human behavior we do mistakes and misplace the keys. And which results into loss. Even some times some wrong people access your key for some time and replicate it and use it against you. So we thought of replacing these keys with and Electronic Identification system i.e. RFID (Radio Frequency Identification). So the owner of the car can have multiple RFID tags which he can use for accessing the car. Owner can maintain a database in which he can easily add or remove authorisation of various tags. Hence car owner, his family members and close friends can easily access the car without worrying about the keys, depending upon his wish. Whenever anybody access the car and ignites the engine a Text Message will be sent to the car owner with the ID which is used to access the car. Any authentication system is required to have few characteristics one of which is that it must be accurate, as well as user should be comfortable to use it. And RFID is an excellent system which maintains an utmost balance in between accuracy and comfort.
Fig. 3. Using RFID Tag
VI. ACCIDENT RECOGNITION
Most of times in accidents, it has been observed that possibility of rescuing the person who met an accident is 86%. Lives of those 86% of people are dependent upon how early they get medical help.
www.giapjournals.com
Page 42
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
So we want our system to inform civic bodies nearer to accident spot about the accident by means of A Message. So police, Ambulance, Fire Brigade will get instant Message informing about the accident with exact location in no time. Due to the exact information about location and intensity of an accident an ambulance can easily determine a shorter route to reach at the exact location in minimum amount of time. Police force and fire brigade team can make a proper guess of what kind of help is required at that particular accident site depending upon the intensity of the accident. So such kind of electronic information system will work independently and hence not only the persons who met an accident but also the policemen and other civic bodies will get help from this system to handle their responsibilities.
Fig. 4. Points of maximum Stress In case of accident For triggering the system about the accident we have to rely on sensors. But while selecting a sensor we must be very sure that it won’t give any false alarms or any missed alarms, this is totally depends upon the threshold level decided by the programmer. An array of such stress sensors can be situated in car and depending upon their outputs it can be easily determined when actually a car had faced an accident and what the intensity off that accident is. The GPS receiver will take down the co-ordinates which will be transmitted to the nearest civic bodies in the form of a Text Message. Such civic bodies include Police, Fire Brigade and Ambulance. Hence everyone will get exact amount of help at the instant of accident without any delay. VII.
SYSTEM ELEMENTS
For implementing all the features stated above we need to have a constant interaction between following hardware • GPS Receiver
www.giapjournals.com
Page 43
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
• GSM Module • RFID Reader • Stress sensors • Microcontroller The performance of the system is totally dependent upon the performance of these hardware modules, and their interaction with Microcontroller. These hardware modules and their responsibilities can be explained as below A. GPS Receiver
GPS receiver plays an important role in this entire system. It is responsible for providing the exact coordinates all over the entire earth by contacting the Geo-synchronous satellites orbiting around the earth for the purpose of Global positioning system. For providing the exact co-ordinates GPS need to receive signal from at least 4 satellites. Accuracy of GPS receiver is entirely dependent upon the accuracy of the internal clock of GPS receiver. Exact synchronisation of GPS clock and clock of satellite can provide ultimate accuracy of 0.8 meter for both horizontal and vertical measurements. B. GSM Module
Most popular low cost GSM modules available in market consist of SIM 300 and SIM 900.Responsibility of GSM module to handle the entire communication in the form of messaging. The communication between Microcontrollers with GSM is done by using AT commands. It can be easily programmed to send a pre defined Message in the occurrence of particular event .For surveillance systems it is programmed to send the position of the car after every half an hour; it can also send the coordinates (position) of the car on the reception of a request message from owner of the car. After every successful ignition of the car engine it will send the ID number which is accessing the vehicle along with the position details. It has a very crucial responsibility of jamming the engine of the car in the case when it will receive a Pre-Defined message from the Owner. Setting such pre defined messages is totally dependent upon the owner, he can personalize it in any way he want. C. RFID reader
RFID reader is a kind of RF transponder .For detecting the tag it transmits a RF signal which gets modulated by RFID tag and then it receives the modulated signal. And depending upon the modulated signal it recognizes what is the tag number. RFID Tag has a capability of modulating the RF signal as per their Identification numbers. following are the different tags available for use.
www.giapjournals.com
Page 44
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
TABLE I: VARIOUS RFID TAGS Type of Tag
Frequency
Reading Distance(m)
RFID Passive
138KHz-13.5MHz
0.04-3
RFID Active
13.85MHz
3-10
RFID Passive Programmable
138KHz-13.5MHz
0.04-3
RFID Active Programmable
138KHz-13.5MHz
3-10
Data Tag
13.85MHz-985MHz
3-10
RF Location Tag
303MHz-5.8MHz
1-100
D. Stress Sensors
Stress sensors are the having the responsibility of detecting the accident without any false recognition. The Impact of accidents are very high hence the stress sensors used must have the capability to withstand extreme stress. E. Microcontroller
Microcontroller does have a high amount of responsibility in this system. Ultimately taking the coordinates from GPS, transmitting them, analysing the stress sensors values and deciding whether the accident is happened or not are the prime tasks handled by Microcontroller. VIII.
ALGORITHMS
A. Getting CO-ordinates from GPS An
example
string
has
been
given
and
explained
below:
$GPGGA,100156.000,2650.9416,N,07547.8441,E,1,08,1.0,442.8,M,-42.5,M,,0000*71 1.
A string always start from ‘$’ sign
2.
GPGGA :Global Positioning System Fix Data
3.
‘,’ Comma indicates the separation between two values
4.
100156.000 : GMT time as (hr):01(min):56(sec):000(ms)
5.
2650.9416,N: Latitude 26(degree) 50(minutes) 9416(sec)North
6.
07547.8441, E: Longitude 075(degree) 47(min) 8441(sec) East
7.
1 : Fix Quantity 0= invalid data, 1= valid data, 2=DGPS fix
8.
08 : Number of satellites currently viewed.
9.
1.0: HDOP
10. 442.8,M : Altitude (Height above sea level in meter) 11. -42.5, M: 12.
Geoids height
__, DGPS data
www.giapjournals.com
Page 45
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
13. 0000: DGPS data 14. *71: checksum Algorithm Step 1 Start. Step 2 Receive one character from GPS Step 3 Check whether the first character is ‘$’ if yes then go to next step or else go to step 2. Step 4 Receive one character from GPS Check whether the first character is ‘G’ if yes then go to next step or else go to step 2 Step 5 Receive one character from GPS Check whether the first character is ‘P’ if yes then go to next step or else go to step 2 Step 6 Receive one character from GPS Check whether the first character is ‘G’ if yes then go to next step or else go to step 2 Step 7 Receive one character from GPS Check whether the first character is ‘G’ if yes then go to next step or else go to step 2 Step 8 Receive one character from GPS Check whether the first character is ‘A’ if yes then go to next step or else go to step 2 Step 9 Receive one character from GPS Check whether the first character is ‘,’ if yes then go to next step or else go to step 2 Step 10 Keep on receiving characters from GPS until you receive next ‘,’and then go to next step Step 11 Receive next characters and save them as latitude until you get next ‘,’ Step 12 Receive next character and save it as latitude direction. Step 13 Repeat Step 11 and 12 for longitude and longitude direction Step 14 Send Latitude, Latitude Direction ,longitude , longitude direction Step 15 Stop B.GSM Module functioning We programmed our GSM module to work in two different modes • Normal Mode • Emergency mode In normal mode GSM provides two different options first options enables the system in RESPONCE method in which the GSM will only send the co-ordinates if it receives a predefined message from Owner . And in other option the system will be following TIMER method in which the system will send the co-ordinates after a definite time interval set by the owner of the car. In Emergency mode GSM provides a very important feature which is known as EMERGENCY SHUTDOWN. After getting a message “EMERGANCY SHUTDOWN” from the owner GSM will
www.giapjournals.com
Page 46
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
automatically shut the car’s Engine down. Which can be used for the safety purpose and also provide ultimate control of owner over his car. Algorithm for Normal mode Step 1
Start
Step 2
Wait for receiving “CALL READY” from GSM
Step 3
Check the network whether the network strength is sufficient for proper functioning or not
Step 4
Go on following next steps again and again until the network is proper
Step 5
Ask the user to check whether he want to go for RESPONCE or TIMER method
Step 6
If he chooses RESPONCE then follow steps from 7 to 10 again and again
Step 7
Take co-ordinates from GPS receiver
Step 8
Wait until GSM module receives a message
Step 9
Read the message
Step 10
Compare the message and if it is “COMMAND REPORT” then send the Co-ordinates or else go to step no8
Step 11
IF he chooses TIMER then follow steps from 12 to 14 again and again
Step 12
Take co-ordinates from GPS receiver
Step 13
Wait for some predefined time
Step 14
Send the Co-ordinates and Go back to step 12
Step 15
Stop
Algorithm for Normal mode Step 1 Start Step 2 Wait until GSM module receives a message Step 3 Check whether the message is from the owner of the car or not if not then go back to step no 2 Step 4 Read the message Step 5 Compare the message and if it is “EMERGANCY SHUTDOWN” then Shut the engine of the car down and report he owner through the message about the position of the car. If not then go back to step 2 Step 6 Stop C. RFID Authentication Owner of the car will be provided with the abilities to modify the RFID database of those persons who can access the car. But every time when a person who wish to start the engine of the car he has to provide one of those RFID tags which are entered into the database by the owner. After every successful ignition of engine owner of the car will be reported by the means of a message containing the Identification number who is accessing the car. www.giapjournals.com
Page 47
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
Algorithm Step 1 Start Step 2 Wait until a tag is available to read Step 3 Read the Unique ID of that tag Step 4 Compare the tag details with the database and if it matches then go to step no 6 or else follow the next step Step 5 Report the threat to owner with position of the car and go to step no 8 Step 6 Ignite the engine of the car Step 7 Report owner with the ID who is accessing the car Step 8 STOP D. Accident recognition Accuracy of accident recognition totally depends upon the threshold set by a programmer. Too high threshold can lead to some missed indications of accidents and too low threshold can lead to false indication of accidents which can increase the unnecessary burden on those civic bodies which are going to get this false indications. Hence it is very critical parameters for accident recognition. Such kind of electronic information system will make the system self dependent system. Algorithm Step 1 Start Step 2 Keep on following next steps again and again until the car’s engine is on. Step 3 Keep on checking the local civic bodies depending upon the database maintained Step 4 Keep a track of the stress sensor values situated on the car Step 5 If value of sensor crosses threshold level send an indication of accident with exact location to all the civic bodies and owner of the car Step 6 Stop IX. APPLICATIONS
1) National Security This system can be very useful to have a ultimate control and surveillance of all the vehicles including important persons whose security is the prime concern for the nation. 2) Municipalities Municipalities can use Tracking System for efficiently managing the utility Services, like Garbage Disposal or Water Supply. Fitting the Vehicle Tracking System can help the municipalities in increasing the number of trips by spotting the idle time of Garbage Collector or Water Tanker. It can also helps the municipalities in improving the fuel consumption of the vehicles since Diesel issued can be linked to the distance travelled. 3) Tourism department www.giapjournals.com
Page 48
International Journal of Student Research in Technology & Management Vol 1 (1), pg 39-49
Tourism department can monitor the vehicle performance and vehicle position by fitting the System on the vehicles of the Tourism Department. 2 ways communication provided along the system shall help the Driver as well as Controller in emergency management. 4) State Transport Organizations: Tracking System is invaluable to Transport Organizations in the following 1. Online tracking to know the position of the vehicle 2. Vehicle Monitoring to know the unscheduled stops and speed violations 3. Improve the Mileage of Vehicle 4. Route Allocation & Planning 5. Emergency Handling 6. Reduce idle time. 5) Commercial fleet operator Commercial Fleet Operators like Tour Operators or Truck Operators can use the system for online tracking, vehicle monitoring & planning. Vehicle tracking system becomes indispensable to those who are carrying valuable items in remote places. 6) Bank or high security vehicles With the ATMs gaining popularity, more & more vehicles are being used for transporting cash. These vehicles when fitted with this system, makes the cash handling more secure. 7) Police , Fire Brigade & Ambulances These all civic bodies can perform their operations and responsibilities up to their maximum limits if they get integrated with such system. X. CONCLUSION
We have successfully designed and implemented Unique Identification, Information and surveillance system for vehicles with remarkable results. We are interested in enhancing this system in every way possible for the fulfilments of the ever-growing greed of human beings. This system will surely prove its existence, preciseness and accuracy in upcoming future. REFERENCES 1. http://www.tutorialspoint.com/gsm/gsm_architecture.html. 2. http://www.palowireless.com/gps/howgpsworks.asp. 3. http://en.wikipedia.org/wiki/Global_Positioning_System. 4. http://www.trimble.com/gps/howgps-triangulating.shtml. 5. http://www.gpsinformation.org/dale/nmea.html. 6. Electronic Devices and Circuit Theory, Robert L. Boylestad Louis Nashelsky, Sixth Edition. Page no: 821
www.giapjournals.com
Page 49
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
SPEECH CONTROLLED ROBO-CAR Pradeep L. Yadav1, Manali N. Tawde2 Prof. Sanjay 3B.Deshmukh, 4Dimple M. Kothari EXTC Department Dwarkadas J. Sanghvi College of Engineering, Vile-Parle (West), Mumbai 1
pradeepyadav28081989@gmail.com, 2tawdemn@gmail.com, 3s_deshmukh@rediff.com, 4
dimpskothari_28@yahoo.com
Abstract The main goal of this paper is to introduce “hearing” sensor and also the speech synthesis to the robotic car such that it is capable to interact with human through Spoken Natural Language (NL). Speech recognition (SR) is a prominent technology, which helps us to introduce “hearing” as well as Natural Language (NL) interface through Speech for the interaction. The most challenging part of the entire system is designing and interfacing various stages together. Our approach was to get the analog voice signal being digitized. The frequency and pitch of words be stored in a memory. These stored words will be used for matching with the words spoken. When the match is found, the system outputs the address of stored words. Hence we have to decode the address and according to the address sensed, the car will perform the required task. Since we wanted the car to be wireless, we used RF module. The address was decoded using microcontroller (DSPIC30F) and then applied to RF module. This together with driver circuit at receivers end made complete intelligent systems.
I. INTRODUCTION Think about a creating a car which would be controlled by your voice. By giving a command, the car would drive you to your destination. The voice recognition algorithm we used could be applied to daily life; for example it would be most helpful to disabled people to perform their daily work [1]. We created a speech controlled car using various electrical and mechanical domains such as digital signal processing, analog circuit design, and interfacing the car. When we say voice control, the first term to be considered is Speech Recognition i.e. making the system to understand human voice. Speech recognition is a technology where the system understands the words (not its meaning) given through speech. The purpose of this project is to build a robotic car which could be controlled using voice commands. Generally these kinds of systems are known as Speech Controlled Automation Systems (SCAS). Our system will be a prototype of the same. We are not aiming to build a robot which can recognize a lot of words. Our basic idea is to develop some sort of menu driven control for our robot, where the menu is
www.giapjournals.com
Page 50
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
going to be voice driven. What we are aiming at is to control the robot using following voice commands. Robot which can do these basic tasks:• move forward • Move back • Turn right • Turn left • Load • Release • Stop ( stops doing the current job ) • Speed control • Obstacle detection
II.
RELATED WORK
Voice enabled devices basically use the principal of speech recognition. It is the process of electronically converting a speech waveform (as the realization of a linguistic expression) into words (as a best-decoded sequence of linguistic units). Converting a speech waveform into a sequence of words involves several essential steps: 1. A microphone picks up the signal of the speech to be recognized and converts it into an electrical signal. A modern speech recognition system also requires that the electrical signal be represented digitally by means of an analog-to-digital (A/D) conversion process, so that it can be processed with a digital computer or a microprocessor. 2. This speech signal is then analyzed (in the analysis block) to produce a representation consisting of salient features of the speech. The most prevalent feature of speech is derived from its short-time spectrum, measured successively over short-time windows of length 20–30 milliseconds overlapping at intervals of 10–20ms.Each short-time spectrum is transformed into a feature vector, and the temporal sequence of such feature vectors thus forms a speech pattern. 3. The speech pattern is then compared to a store of phoneme patterns or models through a dynamic programming process in order to generate a hypothesis (or a number of hypotheses) of the phonemic unit sequence. (A phoneme is a basic unit of speech and a phoneme model is a succinct representation of the signal that corresponds to a phoneme, usually embedded in an utterance.) A speech signal inherently has substantial variations along many dimensions.
www.giapjournals.com
Page 51
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
III.
ALGORITHM
A HMM, in simple terms is a model which is used to model a system about which we know nothing except its input and output sequences. A number of HMM models are proposed in the literature [2] such as left right, cyclic etc. We assume the left right model (Bakis model) in this paper. We train the HMM so that it produces an output which closely matches the available output sequence. A HMM is characterized by (i) N, the number of states in the model. Although the states are hidden, for many practical applications there is often some physical significance attached to the states or to sets of states of the model. (ii) M, the number of distinct observation symbols per state, i.e., physical output of the system being modeled. (iii) The state transition probability distribution A= {aij} where aij = P[q t+1 =j/qt =i], 1≤ i,j ≤N, aij can be greater than or equal to 0. (iv) The observation symbol probability distribution in state j, B= {bj(k)}, where bj (k) = P[Vk at qt = j] 1≤ j ≤N, 1≤ k≤N (v) The initial state distribution S= {Si} where Si = P [qt = i]1≤ i ≤N The speech recognition problem is: Given an observation sequence O= O0 O1 O2 . . . OT-1
where each Ot is data representing speech
which has been sampled at fixed intervals, and a number of potential models M, each of which is a representation of a particular spoken utterance (e.g. word or sub-word unit), find the model M which best describes the observation sequence, in the sense that the probability P (M|O) is maximized (i.e. the probability that M is the best model given O).
IV.
CIRCUIT DIAGARAM
Fig.1 resembles the simple block diagram of the system. A voice recognition is used as the transmitter. The receiver is the robotic car that includes a, microcontroller and motor drivers, RF module.
www.giapjournals.com
Page 52
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
Fig1: Block Diagram V.
MOTOR DRIVER CIRCUIT
The L293D (Fig. 3.2) is a quad, high-current, half-H driver designed to provide bidirectional drive currents of up to 600 mA at voltages from 4.5V to 36V. It makes it easier to drive the DC motors
Fig2: Motor Diver The L293D consists of four drivers. Pins IN1 through IN4 and OUT1 through OUT4 are input and output pins, respectively, of driver 1 through driver 4. Drivers 1 and 2, and drivers 3 and 4 are enabled by enable pin 1 (EN1) and pin 9 (EN2), respectively. When enable input EN1 (pin 1) is high, drivers 1 and 2 are enabled and the outputs corresponding to their inputs are active. Similarly, enable input EN2 (pin 9) enables drivers 3 and 4 [2], [3]. VI.
dsPIC30F SPEECH RECOGNITION
The dsPIC30F Speech Recognition Library provides voice control of embedded applications that require an alternative user interface. With a vocabulary of up to 100 words, the Speech Recognition Library www.giapjournals.com
Page 53
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
allows users to control their application vocally. The Speech Recognition Library is an ideal front end for hands-free products such as modern appliances, security panels and cell phones. The Speech Recognition Library has very modest memory and processing requirements and is targeted for the dsPIC30F5011, dsPIC30F5013, dsPIC30F5012 and dsPIC30F5014 processor. Items discussed in this paper are: • Overview of the dsPIC30F Speech Recognition Library • Speech Recognition Process Flow Overview of the dsPIC30F Speech Recognition Library: The dsPIC30F Speech Recognition Library provides an audio interface to a user’s application program, allowing the user to control the application by uttering discrete words that are contained in a predefined word library. The words chosen for the library are specifically relevant to the interaction between the application program and the user. Upon recognition of a word, the application program takes an appropriate action, as shown in Figure
Fig3: Speech Recognition Module Overview of speech recognition The dsPIC30F Speech Recognition Library uses a recognition algorithm based on discrete Hidden Markov Model (HMM) of words (one HMM model for each word in an application word library). A word spoken through a microphone connected to the dsPIC30F application board is analyzed on a frameby-frame basis using RASTA-PLP- algorithm and quantized into feature vectors of sound characteristics against a vector codebook. The quantized feature vectors are then examined to determine what word HMM model they most closely match. The dsPIC30F Speech Recognition Library can operate with a word library of up to 100 words. The word library is built around a keyword that is readily interpreted. Depending on the operating mode used, this keyword can be used to self-test the library and to trigger a recognition session. Successful recognition requires the words to be separated by a pause of at least onehalf second but less than some specified period (normally programmed for five seconds). After a pause
www.giapjournals.com
Page 54
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
that times out, a new recognition session must be started. Optionally, the operating mode can be set to disable self-testing and/or keyword activation. When keyword activation is disabled, there is no timeout. Words must only be separated by at least 500 milliseconds
www.giapjournals.com
Page 55
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
VII.
CONCLUSION
Speech is the primary, and the most convenient means of communication between people. Whether due to technological curiosity to build machines that mimic humans or desire to automate work with machines, research in speech and speaker recognition, as a first step toward natural human-machine communication, has attracted much enthusiasm over the past five decades. We have also encountered a number of practical limitations which hinder a widespread deployment of application and services. In most speech recognition tasks, human subjects produce one to two orders of magnitude less errors than machines. There is now increasing interest in finding ways to bridge such a performance gap. What we know about human speech processing is very limited. Although these areas of investigations are important the significant advances will come from studies in acousticphonetics, speech perception, linguistics, and psychoacoustics. Future systems need to have an efficient way of representing, storing, and retrieving knowledge required for natural conversation. This paper attempts to provide a comprehensive survey of research on speech recognition and to provide some year wise progress to this date. Although significant progress has been made in the last two decades, there is still work to be done, and we believe that a robust speech recognition system should be effective under full variation in:
environmental conditions, speaker
variability etc. Speech Recognition is a challenging and interesting problem in and of itself. We have attempted in this paper to provide a comprehensive cursory, look and review of how much speech recognition technology progressed in the last 60 years. Speech recognition is one of the most integrating areas of machine intelligence, since, humans do a daily activity of speech recognition. Speech recognition has attracted scientists as an important discipline and has created a technological impact on society and is expected to flourish further in this area of human machine interaction.
REFERENCES 1. Sadaoki Furui, 50 years of Progress in speech and Speaker Recognition Research, ECTI Transactions on Computer and Information Technology,Vol.1. No.2 November 2005. 2. W. M. Campbell_, D. E. Sturim W. Shen D. A. Reynolds_, J. Navr´atily “The MIT- LL/IBM Speaker recognition System using High performance reduced
Complexity recognition” MIT Lincoln Laboratory
IBM 2006. 3. Zahi N.Karam,William M.Campbell “A new Kernel for SVM MIIR based Speaker recognition “MIT Lincoln Laboratory, Lexington, MA, USA.
www.giapjournals.com
Page 56
International Journal of Student Research in Technology & Management Vol 1 (1), pg 50-57
4. Asghar .Taheri, Mohammad Reza Trihi et.al, Fuzzy Hidden Markov Models for speech recognition on based FEM Algorithm, Transaction on engineering Computing and Technology V4 February 2005,IISN,1305-5313 5. GIN-DER WU AND YING LEI “A Register Array based Low power FFT Processor for speech recognition” Department of Electrical engineering national Chi Nan university Puli ,545 Taiwan 6. Nicolás Morales1, John H. L. Hansen2 and Doorstep T.Toledano1 “MFCC Compensation for improved recognition filtered and band limited speech” Center for SpokenLanguage Research, University of Colorado at Boulder, Boulder (CO), USA 7. M.A.Anusuya , S.K.Katti “Speech Recognition by Machine: A Review” International journal of computer science and Information Security 2009. 8. Goutam Saha, Ulla S. Yadhunandan “ Modifield MelFrequency Cepstral coefficient” Department of Electronics and Electrical communication Engineering India, Institute of International Journal of Computer Applications (0975 – 8887)Volume 10– No.3, November 2010 9. Technology ,Kharagpur Kharagpur-721302 West Bengal,India.
www.giapjournals.com
Page 57
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
POWER THEFT DETECTION USING WIRELESS SYSTEM: A DISTRIBUTED APPROACH FOR POWER THEFT PREVENTION 1
Amar Pawade, 2Nadeem Shaikh, 3Bhushan Chowdhri , 4Ansari Shariq Department of Electronics, MHSSCOE
1
2
chowdhrib@yahoo.com, amaroct@yahoo.co.in, 3shariqakhtar1492@gmail.com, 4nadeemshaikh259@gmail.com
Abstract Electricity is indispensable to our daily life. Traditional remote meter reading system uses telephone lines and Modem to transmit data and control signals, but with the drawbacks of high maintenance costs, poor scalability and instable performance of Modem that is charged for too long. The objective of this project is to design a system in order to avoid the displeasure for the users from paying hefty bill irrespective of use of the electricity due to theft using Gsm module. Key Terms - Power Theft, GSM Module, PC Interface, Current Sensors.
I. INTRODUCTION
Electricity is now more than a necessity. The need of electricity is increasing day by day. With increasing need of electricity the power theft is also increasing. It has become a must to develop a system to avoid the increasing theft. With the development of GSM network and its increasing popularity, GSM Modem and Short Message are gradually used to transmit information but there are still a few shortcomings, such as the unsatisfactory real-time ability to control the theft of electricity when user is not at home. The objective of this project is to design a system in order to avoid the displeasure for the users from paying hefty bill irrespective of use of the electricity due to theft .Utility companies are under pressure. Growing populations are using increasing amounts of power, which is putting a strain on existing supplies. In many countries the increase in demand is growing at a faster rate than transmission capacity and the cost of providing power is also increasing due to higher fuel prices and increases in the cost of construction and capital expenses. This project provides an overview of Wireless Sensor Network for Power Management, including the cost savings as well as theft indicator cum prevention system it can provide. It then looks at how fits into this picture, and the ways in which it is ideally suited for the development. Our project uses PIC microcontroller along with relay drivers, sensors and GSM module to detect power theft as well as wastage of energy in malls and hotels.
II. MARKET SURVEY
Such system is not available in the market but it has only manual system. Microcontroller based system
www.giapjournals.com
Page 58
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
is not available yet it’s a prototype system what we are trying to develop since the microcontroller and GSM is an exciting, challenging, and growing field; it will pervade industry for decades to come. To meet the challenges of this growing technology, we will have to conversant with the programmable aspect of the microcontroller. Programming is a process of problem solving and communicating in a strange language of mnemonics. The projects could be developed significantly faster and much easily using a microcontroller. III.
BLOCK DIAGRAM In this project you start or stop the meter by a unique number sms via gsm system. This PIN number is sent to microcontroller. Here the microcontroller is the flash type re programmable microcontroller which we have already programmed with PIN number. So the typed PIN number is compared with stored number if the PIN number is valid the microcontroller activates the relay driver circuit. Relay output is directly given to meter system. Now we can start the meter. This is for the purpose of theft identification and prevention. The microcontroller is also programmed to limit the power consumption to a certain limit for particular periods of time. The microcontroller will switch off the ligths and fans if the consumption limit is exceeded for a particular time of the day.
LCD Display
Sim card interface
Gsm modem
Gsm interface
pic 16f877 Micro Controller
Current sensor 1
Current sensor 2
Fig 1
www.giapjournals.com
Page 59
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
Brief methodology: The project is designed with: • Current sensor • Gsm • Pc interface • Lcd display • Pic 16f877
IV. HARDWARE AND SOFTWARE
A. CURRENT SENSOR: The Wilson WCS2720 has precise solutions for AC or DC current sensing in industrial, commercial, and communications systems. The device package allows for easy implementation by the customer. Typical load detection and management, switch mode power supplies, and over current fault protection. The device is not intended for automotive applications. The device consists of a precise, low-offset, linear Hall circuit with a copper conduction path located near the surface of the die. Applied current flowing through this copper conduction path generates a magnetic field which the
PC INTERFACE
Relay Driver circuit
Relay (optional)
Device 1
www.giapjournals.com
Page 60
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
close proximity of the magnetic signal to the Hall transducer. A precise, proportional voltage is provided by the low-offset, chopper-stabilized BiCMOS Hall IC, which is programmed for accuracy after packaging. The output of the device has a positive slope (>VIOUT(Q)) when an increasing current flows through the primary copper conduction path (from pins 1 and 2, to pins 3 and 4), which is the path used for current sampling. The internal resistance of this conductive path is 1.2 mΩ typical, providing low power loss. B. MICROCONTROLLER PIC 16F877 : This is the heart of the circuitry. It is the main block which takes the inputs and processes it and gives the output. All the other blocks work in accordance with the microcontroller. • Only 35 single-word instructions to learn • All single-cycle instructions except for program branches, which are two-cycle • Operating speed: DC – 20 MHz clock input DC – 200 ns instruction cycle • Up to 8K x 14 words of Flash Program Memory, Up to 368 x 8 bytes of Data Memory (RAM), Up to 256 x 8 bytes of EEPROM Data Memory • Pinout compatible to other 28-pin or 40/44-pin PIC16CXXX and PIC16FXXX microcontrollers C. GSM The diagram below shows the flow of the data via a GSM module. The first embedded device is the microcontroller which sends the data to the module. The module then via wireless link will send the data to the GSM receiver in mobile phone. The mobile phone here acts as a second embedded device which reads the data.
Fig.2 More and more applications emerged with the rapid development of wireless data services, such as meter navigation, remote monitoring, wireless Internet access, wireless POS, etc. Thus, more and more devices need to be able to do wireless communication.
www.giapjournals.com
Page 61
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
With this background, Sky microwave Corp. develops its MOD 9001 BENQ GSM/GPRS Modem. Users of this product can add wireless communication capability easily to their own products, and then, develop many applications. The MOD 9001 BENQ GSM/GPRS Modem mostly fits the need of data transfer, with SMS data communication, GPRS data navigation, Circuit Switch / Data Connectivity, TCP/IP protocol etc. Because the easy setting up in SCM (Single Chip Micyoco), it is convenient for network data communication. The MOD 9001 BENQ GSM/GPRS Modem with small size, which fits both embedded application and external peripheral equipment. The AT command set and RS232 interface will offer easy data connection without any extra circuit control. Traditionally, the above applications use digital cellular, CDPD or other wire-line modem to do communication, and these technologies are of the disadvantages of high communication expense, limited communication range, dial before communications, etc. When we begin to use MOD 9001 BENQ GSM/GPRS Modem, all these problems disappeared D. MAX232 A standard serial interfacing for PC, RS232C, requires negative logic, i.e., logic '1' is -3V to -12V and logic '0' is +3V to +12V. To convert a TTL logic, say, TxD and RxD pins of the uC chips thus need a converter chip. A MAX232 chip has long been using in many uC boards. It provides 2-channel RS232C port and requires external 10uF capacitors. This I.C. also includes two receivers and two transmitters in the same package. This is useful in many cases when you only want to use the Transmit and Receive data Lines. You don't need to use two chips, one for the receive line and one for the transmission. This is very essential for continuous monitoring of the power consumed. It will be essential for linking the computer with the microcontroller. Below shows the connection diagram of max 232.
Fig. 3
www.giapjournals.com
Page 62
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
E. 16X2 LCD DISPLAY Features: •
Maximum input voltage: 5.3VDC
•
Operating input voltage: 5VDC
•
8-bit interface data bus
•
Controller: HD47780 equivalent
•
Character font size: 0.125"W x 0.200"H
•
16 pin/terminals
•
Display size: 2.5"L x 0.7"W
•
Module size: 3.4"L x 1.2"W x 0.5"T
Description: This is a 16 character by 2 line display, with the standard HD44780 chipset. It works great with any microcontroller and it is very easy to interface. This LCD has 8-bit parallel interface. It is possible to use all 8 bits plus 3 control signals or 4 bits plus the control signals. LCD is used as a backup for computer. It is essential for displaying the provider and users power consumption. Below shows the pin diagram of lcd display.
Fig. 4
www.giapjournals.com
Page 63
International Journal of Student Research in Technology & Management Vol 1 (1), pg 58-64
F. SOFTWARE: The software used in programming the PIC is PIC BASIC PRO Compiler. The compiler is the tool that converts your BASIC program into Assembly Language. PBP is a compiler. PBP depends on an IDE for user interface, and an assembler to finish the conversion to machine-language. The assembler is the tool that converts the Assembly Language into machine language. The assembler runs after the compiler, and is normally invoked automatically. PBP is designed to use Microchip's MPASM assembler, which is included with MPLAB. a. ADVANTAGE: 1. Low power consumption. 2. It helps both customer and msebs. 3.
This project is very useful to the government and private msebs as well as to the finance company.
VI. APPLICATION: 1. It can be used in domestic households. 2. It can be implemented in malls where huge amounts of power is wasted. 3. It can also be implemented in schools and collages. VII. CONCLUSION: The challenges and “green� legislation that utilities are facing today, combined with increased demand from consumers for more flexible offerings and cost savings, make this project both timely and inevitable. Wireless open standard technology is being selected around the world as the energy management and efficient technology of choice. Implementing this project with an open standard such as GSM helps to keep costs down, ensure interoperability, and future-proof investments made by both utilities and consumers. Consumers and businesses will see changes they never dreamed possible. REFERENCES [1] Muhammad Ali Mazidi and Janice Gillespe, The 8051 Microcontroller and Embedded Systems, I/O Programming, Printice Hall [2] Kenneth J. Ayala, The 8051 Microcontroller: Architecture, Programming, and Applications, 8051 Architecture, Penram International Publications, 1997 [3] Rangan C S, Sharma G R, Mani V S V, Instrumentation Devices and Systems, Instrumentation Amplifiers and Signal Conditioning, Tata-McGraw-Hill Ltd [4]http://www.picotech.com/experiments/calculating_heart_rate/ [5]http://www.mytutorialcafe.com/Microcontroller%20Project%20Thesis%20RTC%204051.htm [6]http://www.bioenabletech.com/gsm_gprs_gps_mobile_m2m_india.htm www.giapjournals.com
Page 64
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
BIONIC CONTACT LENS Girish Sukhwani1, Dinesh Kalra2, Deepak Punjabi3 EXTC Department, T.E, V.E.S Institute of Technology 1 girishsukhwani92@gmail.com, 2dkalra25@yahoo.com, 3dpunjabi2013@gmail.com
Abstract Have you ever wished that you could see the world around in front of your eyes as seen by protagonist in science fiction movies like Terminator and Robocop? This is now possible using Bionic contact lens. Keywords - Contact lens, Virtual display, Fresnel lens, Micro fabrication technique, Miniature cameras, Bio-Sensing I. INTRODUCTION
Fig 1: Bionic Contact Lens From desktops to laptops, iphones, computers have shrunk to sizes unimaginable by their original creators. Now researchers have established one of the smallest device but yet a computer that could give a new meaning to the phrase “The eye of the beholder” In next 20 years internet will be on our contact lens, we would simply ‘BLINK’
and we will be online. It’s already more science then
fiction. Bionic contact lens could be the beginning of the Computer Human Interface of the future. Your smart lens would tell you what is relevant and what to ignore. Bionic contact lenses are being developed to provide a virtual display that could have a variety of uses from assisting the visually impaired to the video game industry. The lens will eventually have functional electronic circuits and infrared lights to create a virtual display. If someone speaks in Chinese no problem Bionic contact lens will translate Chinese into English subtitles underneath your picture
www.giapjournals.com
Page 65
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
II. DEVELOPMENT Students and researchers at the University of Washington lead by Dr Babak Parviz (Associate Professor, University of Washington) that can do a lot more than just help you see better. They are trying to convert pieces of plastic and polymer to a functional system that resemble a kind of complexity in cellular form. Antenna picks up radio frequency energy that is transmitted by an antenna elsewhere. While chip harvests the energy and transforms it into voltage that can power the LED. Electrical engineers are working to display directly display on the lens that would transmit information directly on the lens.
Fig 2: Virtual Display Image III. TECHNOLOGY •
Researchers built the circuits from layers of metal only a few nanometers thick, about one thousandth the width of a human hair, and constructed light-emitting diodes one third of a millimeter across. This contact lens is embedded with light-emitting diodes; electronic circuits control circuits, communication circuits, and miniature antennas into the lens using custom-built optoelectronic components. Those components will eventually include hundreds of LEDs and much of the hardware is semitransparent. Array of LED pixels is used in lens to form an active display. They then sprinkled the grayish powder of electrical components onto a sheet of flexible plastic. The shape of each tiny component dictates which piece it can attach to, a micro fabrication technique known as self-assembly. Capillary forces – the same type of forces that make water move up a plant's roots, and that cause the edge of a glass of water to curve upward – pull the pieces into position. A kind of actuated mirror would scan the beams from a red, a green, and a blue laser to generate an image. The resolution of the image would be limited primarily by the narrowness of the beams, and the lasers would obviously have to be extremely small.
•
LED’s- Form images in front of the eye, such as words, charts, and photographs. The LED chips they built so far are 300 µm in diameter, and the light-emitting zone on each chip is a
www.giapjournals.com
Page 66
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
60-µm-wide ring with a radius of 112 µm. They are trying to reduce that by an order of magnitude. The goal of reseacherers is to make an array of 3600 10-µm-wide pixels spaced 10 µm apart.. •
Antenna-Antenna picks up radio frequency energy that is transmitted by an antenna elsewhere
•
Chip-The chip harvests the energy and transforms it into voltage that can power the LED
•
All these components could be positioned on the lenses outside of the transparent part of the eye. Information will appear in front of the user as if it is suspended in the air.
•
Display-The display can be turned on and off. For the display to be worked its pixels must be shrunk arranged and focused and then balanced to give a study image on constantly moving eyeball.
•
Image quality- Researchers could overcome that obstacle by precisely adjusting the angle of incoming light emitted by diodes on the contact lens.
•
Energy- Antenna picks up radio frequency waves and turn them into energy
that is
transmitted by an antenna elsewhere while chip harvests the energy and transforms it into voltage that can power the LED also very small lasers can be used to ensure that the image is in focus at all times and eliminate the need for micro lenses. •
Circuit binding-To bind circuits with the lens, the researchers constructed a multiple receptor sites that attracted a different component by mimicking capillary forces that plants used to push water up thought their roots.
•
Virtual display technology- A virtual retinal display (VRD), also known as a retinal scan display (RSD) or retinal projector (RP), is a display technology that draws a raster display (like a television) directly onto the retina of the eye. In bionic lens the display is floating in front of the user using virtual display technology. However, the portion of the visual area where imagery appears must still intersect with optical elements of the display system. It is not possible to display an image over a solid angle from a point source unless the projection system can bypass the lenses within the eye.
•
Micro fabrication technique- Micro fabrication technique is used for image formation where thousands of free floating pixels are sand witch on a circuit board between two pieces of glass when they pour the liquid into the sand witch the pixels stick to the matter on the circuit board. One of the obstacles for the team was resolving the fundamental incompatibility between the fabrication process for microchips and light-emitting diodes and the types of polymers used for contact lenses. To get around the issue, the researchers first constructed electronic circuits from ultra-thin metal layers — each only one-thousandth the width of a human hair — and fashioned diodes so small that nearly 100 could fit within an inch. On the lens itself, the researchers created multiple receptor sites that each attracted a separate component by exploiting the same capillary forces that push water up through a plant’s roots.
www.giapjournals.com
Page 67
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
This micro fabrication technique allowed the tiny parts to self-assemble on the surface of the lens and bind themselves together to form the different devices. For the prototype, the group successfully integrated an antenna, tiny metal wires for an electronic circuit, and red lightemitting diodes onto the lens surface. •
Fresnel lenses-The researchers tackled the limitation of the minimum focal distance of the human eye by incorporating a set of Fresnel lenses into the device that correctly focus the projected image on the retina. The prototype lens consisted of an antenna to harvest power sent out by an external source and an integrated circuit to store this energy and transfer it to a transparent sapphire chip containing a single blue LED. It was fitted to a rabbit eye to evaluate the effects and safety of the lens on the cornea and the body.
•
Image management-The researchers tackled the limitation of the minimum focal distance of the human eye by incorporating a set of Fresnel lenses which is less than 1 micrometer thick and placed it on the surface of the contact lens about 360 micrometers away from the LED
•
Pixel Management-Of the high-tech miniature display, the researchers they have only one controllable pixel and they have provided the first proof-of-concept technology demonstrations for producing multipixel and in-focus images using a contact lens by producing multipixel micro-LED array chips on transparent substrates and micrometer-scale Fresnel lenses that can be integrated into a contact lens.
Fig 3: Working IV. APPLICATIONS According to the researchers, from the University of Washington, some of the possible applications include the following: •
Zooming in on and out of distant objects-Miniature cameras with adaptive lenses could be incorporated, able to zoom in on something far away or to look at something very close.
www.giapjournals.com
Page 68
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
•
Get useful facts to pop up in your field of view.
•
Holographic driving panels.
•
Surfing the Web- Using flexible display screen contact lenses.
•
Visual aids for vision-impaired people.
•
Immersive video games.
•
Used by drivers and pilots-drivers and pilots could obtain route, weather, or vehicle status information and could see a vehicle's speed projected onto the windshield.
•
Bio-sensing- on the surface of the contact lens there are a lot of biomarkers already present that are important for monitoring health care like transmit medical information like glucose , sodium, and potassium levels, blood-sugar levels directly to your doctor using internet
•
Personalized wide-screen TV-The combination of contact lens with embedded optoelectronic and electronic devices could well be the beginning of the Computer Human Interface of the future.
•
Recording images-with an array of lenses wirelessly connected to a wearable computer it is able to record images.
•
Gaming- Video-game players could immerse themselves in a virtual world without restricting their range of motion.
•
UW Contact Lens-to capture the imagination of the public is its promise of bionic vision.
•
Tourism-It would offer the ability to see the ancient ruins, overlayed with what the buildings originally looked like and for buildings to be labeled in a real/virtual mixed tour.
•
Sporting event-players might be labeled, the ball/puck tracked, distances marked.
•
For military personnel on the battlefield.
•
For disaster response teams in a crisis where saving time and doing things efficiently means saving lives.
•
Direction- to orient and identify landmark on the map.
Fig 4: Computer Human Interface www.giapjournals.com
Page 69
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
V. LIMITATIONS • First challenge is designing the surface of the lens so the electronics didn't block regular vision. • The next problem is how to attach the electronic components thinner than a human hair to the delicate polymer of a contact lens. • Building the lenses is a challenge because materials that are safe for use in the body, such as the flexible organic materials used in contact lenses, are delicate. • Display circuitry couldn't be made small and light enough to be placed on a contact lens without a noticeable increase in the lens's weight. • Micro fabrication Technique- Direct placement would probably damage the lens. So researchers built a separate, nano-size metal component and mixed them together so that they appeared like a fine powder. This powder was then placed in a vial of fluid and poured over a pitted lens surface. Each pit corresponded to a particular component. • Another big obstacle which is resolved is the incompatibility between the fabrication process for microchips and light- emitting diodes and the types of polymers used for contact lenses. • Focusing on image quality- Researchers overcomes this obstacle by precisely adjusting the angle of incoming light emitted by diodes on the contact lens. • How to give power supply-Researchers are working on the issue of how to run displays or biosensors without the need of batteries. So far they have mounted antenna which collects radio frequency waves and turns them into useful. VI. CONCLUSION We conclude that even though blindness is a large problem in the world, there have been major advances that may one day lead to everyone having beyond perfect vision. From the medical procedure involving a lot of machinery and time bionic vision has come very far. A person can now record their entire life just by blinking or possibly connect their contact lenses with a wireless device. REFERENCES 1. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6103638 2. http://spectrum.ieee.org/biomedical/bionics/augmented-reality-in-a-contact-lens/0 3. http://www.washington.edu/news/2011/11/22/big-step-forward-for-safety-of-bionic-contactlenses/
www.giapjournals.com
Page 70
International Journal of Student Research in Technology & Management Vol 1 (1), pg 65-71
4. http://depts.washington.edu/ntethics/casestudies/Visions%20of%20Bionic%20Lenses%20Foresight%20for%20the%20Future.pdf 5. http://spectrum.ieee.org/tech-talk/biomedical/bionics/wireless-display-on-a-contact-lens 6. http://www.washington.edu/news/2011/11/22/big-step-forward-for-safety-of-bionic-contactlenses/ 7. http://www.engr.washington.edu/facresearch/highlights/ee_contactlens.html 8. http://www.ee.washington.edu/news/2011/Bionic_contact_lens.html 9. http://www.cbsnews.com/8301-501465_162-57329542-501465/bionic-contact-lens-could-projectfloating-emails/
www.giapjournals.com
Page 71
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
MAGNETIC LEVITATION TRANSPORTATION SYSTEM Prachita Mane1, Prof. Trupti Mane2, Kanchan Shinde, KomalVarpe, Snehal Gaikwad Instrumentation Department, Mumbai University Vidyavardhini’s campus, K. T. Marg, Vasai Road [W], Thane pmane576@gmail.com1, tpmane@rediffmail.com2
Abstract This paper involves the design and hardware implementation of control system required for “Magnetic levitation of transportation system.”The maglev transportation system is more stable for levitation of vehicle by utilizing lead compensator.It is found that the designed system can suspend the medium of 250gms of object at a distance of about 10mm below the magnet surface while taking 1.2A of current through the magnets. Maglev systems are currently in use for applications such as bearings, highspeed trains, and manufacturing. With a streamlining of the high-precision maglev system, many unanticipated applications will develop for the future. Keywords: Levitation, electromagnets, magnetization, Hall Effect, lead compensator.
I.
INTRODUCTION
Magnetic levitation has evolved into an important consideration in designing systems requiring low losses due to friction and low energy consumption. Applications range from high-speed rail transportation systems to various industrial applications (e.g., magnetic bearings). Magnetism and closed-loop control system are the secrets to making an object float in mid- air. Magnetically-levitating (“maglev”) train technology is a high-speed transportation solution capable of contributing to pollution reduction and energy efficiency. It utilizes a linear synchronous motor for propulsion and permanent magnets for stabilization and levitation. The train can remain suspended above the ground by maintaining a constant air gap between the magnets and the rail above. The propulsion of the proposed EMS(Electro-magnetic suspension) system can be achieved by integrating the functioning linear synchronous motor.
II.
PRINCIPLE OF MAGNETIC LEVITATION
Fig.1) shows the basic control system setup of the magnetic levitation system. Its magnetic field creates an upward attractive force on any magnetic object placed below.
www.giapjournals.com
Page 72
I International Journal of Stu udent Researcch in Technoloogy & Manageement Vol 1 (1), pg 72-81
Fig..1) Basic setu up of magnettic levitation A positionn sensor deteects the verticcal position of the object and a passes thiis informationn to the contrroller. The contrroller then adjjusts the curreent to the elecctromagnet acctuator basedd on the object position to create c a stable leevitation.
III.
B BLOCK DIAG GRAM
Fig.2 Block B diagraam Permanent Magnet M Track N- Pole S- Pole
Electrom magnet Co oi l Position Senssor
Linear Propulsion Coil
Electro onic Controller
Levitated Veh hicle
Power Supply Input
Fig.3 Detaailed block diiagram
www.giapjjournals.com
Paage 73
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
Fig.3) shows the block diagram of the proposed system there are two systems involved in this project namely Levitation and Linear propulsion. Any object placed in space has tendency to attract towards earth because of gravitational force this can be counteracted by simply controlling current flowing through an electromagnet which in turn controls the generated magnetic force. This phenomenon is called as “magnetic levitation”. Levitation is achieved by controlling the current in the electromagnet based on the feedback of position sensor. According to the literature we can levitate the object more than 1mm with respect to track. “Propulsion” means to push forward or drive an object forward. Linear propulsion is provided by the linear propulsion coil which will be made of copper wire. The principle of linear propulsion is based on Fleming’s left hand rule. By controlling the current in the coil we can control the speed of the vehicle. The direction of motion is controlled by controlling the current direction in the linear propulsion coil.
IV. PROJECT MODEL
Fig 4 General Arrangement of Magnetic levitation transportation system Fig 4) shows the general arrangement of our Project Model as shown levitation electromagnets (Solenoid coil) will be suspended below the track so as to stabilize the system from other disturbances. Track consists of Permanent magnets. Linear motion will be provided by the linear propulsion coil. All other support will be made of wood or any other light weight material which is easy to fabricate. V. COMPONENT REQUIREMENT A. Permanent magnet The track of the maglev train is made up of permanent magnet array which creates attractive magnetic force to lift the train and hold it in place. There are four classes of permanent magnets: •
Neodymium Iron Boron (NdFeB or NIB)
www.giapjournals.com
Page 74
I International Journal of Stu udent Researcch in Technoloogy & Manageement Vol 1 (1), pg 72-81
•
S Samarium Cobalt (SmCo)
•
A Alnico
•
C Ceramic or Feerrite
In our prooject NdFeB (neodymium m) type of permanent magnnet is used beecause they have h higher energy density means m high maagnetism.
Fig.5 Perrmanent Maagnet B. Electroomagnets An electrromagnetic co oil (or simply a "coil") is formed whhen a conducctor (usually an insulated solid copper wire) w is woun nd around a core or forrm to create an inductorr or electrom magnet. In maglev m systemeleectromagnet is used as mooving object(ttrain) which is attracted by b permanentt magnet track. By controllinng the current through the electromagnet e t, position of the train is coontrolled.
Fig.66 working prrinciple of electromagnett
= Where, F is the foorce in newton n B is the magnetic m field in teslaA is thhe area of thee pole faces inn square meteer µ0 is the permeability p of o free space -7 In the case of free spacce (air), μo = 4π×10 4 HM-1
www.giapjjournals.com
Paage 75
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
C. Position Sensor
Fig.7 The Principle of Hall Effect A Hall effect sensor is a transducer that varies its output voltage in response to a magnetic field. It is used in maglev system as a position sensor.
Fig.8 Hall sensor VI. MATHEMATICAL MODELLING OF SYSTEM The mathematical model of the project is built by writing appropriate differential equations in accordance to the typical mechanical and electrical principles of the components. The following four equations describe the system. 1) Force actuator model:
www.giapjournals.com
Page 76
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
3
I(s)…………………….(1) ……………………….(2)
2) Electromagnet equation: ………………………………….(3) 3) Sensor equation: ……………………………………(4) From these equations transfer function of the system is found. The transfer function of the system is the ratio of the position of vehicle below the magnet Y(s) to the current through the magnet I(s). Hence, It can be expressed as, V s V s
G s So, System transfer function:
C
Following parameters are the constant of the magnet, the resistance and the inductance of the magnetic coil, the gain of the sensor and the steady-state current and the equilibrium position of a given mass of vehicle. The parameters obtained are given in table (1) Table (1) Parameters for magnetic levitation system
www.giapjournals.com
Parameters
Abbreviations
Value
Equilibrium distance
Y0
10e-3
Equilibrium current
I0
1.2
Mass of the object
M
250g
Force constant
C
0.3
Coil resistance
R
3.3Ω
Page 77
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
Coil inductance
L1
2.5e-3
Sensor gain
a
3.80
b
0.115
From the above values transfer function is obtained as 2.518 006 1320 2943 3.885 006 For above transfer function root locus is drawn using MATLAB.
Fig. 9) Uncompensated root locus The above root locus indicates that desired performance cannot be achieved just by adjusting the system gain. So it is necessary to reshape the root locus to meet the desired specifications by inserting lead compensator.Lead compensation equation is D(s)= k s+30 s+300 Now, selecting the value of gain k=46 we get compensated root locus as,
www.giapjournals.com
Page 78
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
Fig.10) compensated root locus From the circuit diagram shown in figure R1, R2 and C form the compensator network where as R3 and R4 formsthe compensator gain (K) .The transfer function between R1 R2 and C is ratio of the input voltage to the controller V1 to the output voltage V2. =
By carefully selecting R1=330KΩ and C = 0.1μF, R2 is calculated to be 37KΩ. While carry out this calculation it is important to avoid cancellation between numerator and denominator because some of the terms will disappear.
Fig.11) lead compensator www.giapjournals.com
Page 79
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
The constant gain K is selected 46 from the root locus. Therefore the compensator above will be used inproviding the gain; this is given by K= 1+ Rf / R0= 46 Rr = 45* R0 R0= 10KΩ Rf = 45 KΩ
VII. CONCLUSION This magnetic levitation system is found to be unstable, because of the system nonlinearity. So the system is linearized about an operating point and is implemented using analog controller (Lead Compensator). The propulsion system can be developed that forces a levitating electromagnet (vehicle) to slide along a series of permanent magnets through the use of alternating magnetic fields. This project demonstrates the feasibility of magnetic levitation for number of diverse applications. This type of actuation can be used in harsh environments (corrosive, vacuum, etc.) where traditional mechanical or hydraulic actuators might not survive.
VIII.ACKNOWLEDGEMENT We would like to thank “Department of Instrumentation, Vidyavardhini’s College of Engineering, Vasai” for supporting and providing all the required facilities.
REFERENCE 1. “Design and implementation of a phase lead compensator for magnetic levitation” by Dahiru Sani Shu’aibu and Sanusi Sani Adamu, Bayero University ,kano Nigeria 2. Mukherji B.N “practical op-amp project” BPB publications Delhi Madras Hyderabad, 1980. 3. Theraja B.L. (1998), “A text book of Electrical Technology” S.CHAND &Company ltd, Ram Nagar, New Delhi. 4. Lundberg, K. H., Lilienkamp, K. A., Marsden, G., Low-Cost Magnetic Levitation Project Kits, IEEE Control Magazine, oct.2004, p.65-69 5. “Design ,development and testing of an electromagnet for magnetic levitation system” by Dahirusanishu’aibu and sansuisaniadamu, department of electrical engineering, Bayero university, Kano Nigeria
www.giapjournals.com
Page 80
International Journal of Student Research in Technology & Management Vol 1 (1), pg 72-81
6. “Design of a small scale prototype for a stabilized permanent magnet levitated vehicle� By Geoffrey A. Long,O.James Fiske, Brad E. Paden, launch point technologies, Goleta, California, USA 7. Development of a real-time digital control system with a hardware-in-the-loop magnetic levitation device for reinforcement of control education Shiakolas,P.S.;Piyabongkarn, D.Education ,IEEE Transactioson Volume 46, Issue 1, Feb 2003Page(s):79-87Digital Object Identifier 10.1109/TE.2002.808268 8. Real-time adaptive control using neural generalized predictive control Haley, P.;Soloway, D.;Gold, B. American Control Conference, 1999. Proceedings of the 1999Volume 6, Issue , 1999 Page(s):4278 - 4282 vol.6 Digital Object Identifier 10.1109/ACC.1999.786371 9. On the development of a real-time digital control system using x PC-Target and a magnetic levitation device Shiakolas,P.S.;Piyabongkarn,D.Decision and Control, 2001. Proceedings of the 40th IEEE Conference on Volume 2, Issue , 2001 Page(s):1348 - 1353 vol.2 Digital Object Identifier10.1109/.2001.981077. 10. Review of Maglev Train Technologies Hyung-Woo Lee1, Ki-Chan Kim2, and Ju Lee2 Korea Railroad Research Institute, Uiwang 437-757, Korea Department of Electrical Engineering, Hanyang University, Seoul 133-791, Korea
www.giapjournals.com
Page 81