RFID and Sensor Networks Research Papers (original) (raw)
"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more
""
In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services.
However it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful. Some scholars have interestingly argued that, “in the Internet nobody knows you are a dog”. This raises some legal issues and concerns.
This paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers.
In Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes
In Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security.
Part III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments.
And Part IV, Personal Assessment basically in Tanzanian Laws.
""
Solid waste management is currently a crucial problem in urban areas. The overflowing dustbins create an unsanitary state which can cause various health hazards including irritation in the nose, throat and lungs. To tackle these... more
Solid waste management is currently a crucial problem in urban areas. The overflowing dustbins create an unsanitary state which can cause various health hazards including irritation in the nose, throat and lungs. To tackle these circumstances, effective management of waste is necessary. The Internet of Things (IoT) has influenced our world significantly. There has been a considerable amount of research in the field of Waste Management using IoT technology. This paper reviews various IoT-based approaches presented by different researchers for solving this problem, and it provides a comparative study of the available solutions.
In this paper, node localization algorithms in wireless sensor networks are researched, the traditional algorithms are studied, and some meaningful results are obtained. For the localization algorithm and route planning of WSN exists a... more
In this paper, node localization algorithms in wireless sensor networks are researched, the traditional algorithms are studied, and some meaningful results are obtained. For the localization algorithm and route planning of WSN exists a big localization error in wireless communication. WSN communication system is researched. According to the anchor nodes and unknown nodes, a new localization algorithm and route planning method of WSN are proposed in this paper. At the same time, a new genetic algorithm of route planning of WSN is proposed. The performance of the node density and localization error is simulated and analyzed. The simulation results show that the performance of proposed WSN localization algorithm and route planning method are better than the traditional algorithms.
This papaer entitled electronic toll collection system based on Radio Frequncy Identification System explained in detail based on current issue at toll collection system. There are some obstacles faced every day where the users spent... more
This papaer entitled electronic toll collection system based on Radio Frequncy Identification System explained in detail based on current issue at toll collection system. There are some obstacles faced every day where the users spent their valuable time in queue at tollgate due to traffic congestion as well as using traditional manual method in most existing toll ETC system to collect toll from road users. Besides that, the barrier design where each vehicle stop waiting until barrier lift which consider source of time delay. To tackle stated problems, an electronic toll collection system is proposed which based on RFID technology. The integrated system consists of two main sections, electronic sides where all input data received from while database management office is where all necessary information stored. To compare the current ETC system, in this research elaborated internet of things where all data transmit through cloud and then to the main office in real time. Not only that, ...
In metro cities we can see you a huge rush at shopping malls on holidays and weekends. This becomes even more when there are huge offers and discounts. Now a days people purchase a variety of items and put them in the trolley. After total... more
In metro cities we can see you a huge rush at shopping malls on holidays and weekends. This becomes even more when there are huge offers and discounts. Now a days people purchase a variety of items and put them in the trolley. After total purchasing one should approach counter for billing purpose. By using barcode reader the cashier prepares the bill which is a time consuming process. This results in long queues at the billing counters. This project presents an idea to develop a system in shopping malls to overcome the above problem. To achieve this all products in the mall should be equipped with RFID tags and all trolleys should be equipped with a RFID reader and LCD screen. When one puts any product in the trolley its code will be detected automatically, the item name and cost will be displayed on the LCD, thereby the cost gets added to the total bill. If we wish to remove the product from the trolley, you can take away the product and the amount of that specific product gets deducted from total amount and the same information passes to the central billing unit via Zigbee module. Hence the billing can be done in the trolley itself thereby saving a lot of time to customers. Along with this DC Motors are added to the trolley to make its movement easier and at the same time, low cost vacuum cleaners are placed at the bottom of the trolley for cleaning purpose.
- by Darwin Nesakumar and +1
- •
- RFID, RFID and Sensor Networks, Smart shopping trolley
This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides... more
This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides recommendations, regarding the installation of sensors in the building. We also present the communication protocols of the computer network used in order to ensure the efficient communication between the space examined and the sensor network. Finally, we describe the process of creating a website, which is designed to store and view the data.
در این مقاله یک طرح جدید و مقاوم پیشنهاد می شود که مبتنی بر همزمانی اطلاعات مخفی می باشد. طرح یک تایید هویت چند جانبه تگ و ریدر برای سرور و سرور برای تگ و ریدر، برخلاف پروتکل های بررسی شده انجام می دهد. یعنی ارتباط بین تگ ریدر و ریدر سرور... more
در این مقاله یک طرح جدید و مقاوم پیشنهاد می شود که مبتنی بر همزمانی اطلاعات مخفی می باشد. طرح یک تایید
هویت چند جانبه تگ و ریدر برای سرور و سرور برای تگ و ریدر، برخلاف پروتکل های بررسی شده انجام می دهد. یعنی ارتباط
بین تگ ریدر و ریدر سرور هر دو نا امن فرض شده اند. استفاده از توابع هش در طرح محدود شده و برخی مقادیر هش مورد - -
استفاده، از قبل توسط سرور روی تگ ذخیره می شود تا تگ مجبور به محاسبه ی آن در هر بار پرس و جو نباشد و تنها یک بار
هش را در تگ محاسبه می کنیم. از شیوه ی تغییر ID تگ و ریدر در هر پرس و جو استفاده می شود که به صورت امن و همگام
انجام می شود و سبب می شود تا پروتکل در برابر حملاتی مانند استراق سمع، بازپخش، ردیابی و DOS مقاوم باشد. ما از تابع
PRNG برای تولید اعداد شبه تصادفی استفاده کرده ایم. آنالیز های امنیتی مربوطه به این طرح نیز نشان می دهد که طرح
پیشنهادی در برابر حملات مقاوم می باشد.
Internet of Things (IoT) envisages a world of connected devices paired with automation systems that aid everyone in their daily activities and communities at large. One of the most prominent use cases of IoT is emergency services. Based... more
Internet of Things (IoT) envisages a world of connected devices paired with automation systems that aid everyone in their daily activities and communities at large. One of the most prominent use cases of IoT is emergency services. Based on the lessons learned from the tragic Grenfell Tower incident in the UK, we designed an IoT framework that aims at supporting rescue services to quickly locate and identify victims in an event of emergency by using a range of heterogeneous smart systems. Based on the framework design, a prototype is developed using a RFID access control and a drone system. We also incorporate design specifications that minimise the risk of data and privacy breaches.
Indoor positioning systems (IPS) locate objects in closed structured such as warehouses, hospitals, libraries, and office building, where Global Positioning System (GPS) typically does not work due to poor satellite reception. Inherently,... more
Indoor positioning systems (IPS) locate objects in closed structured such as warehouses, hospitals, libraries, and office building, where Global Positioning System (GPS) typically does not work due to poor satellite reception. Inherently, indoor positioning is a vital challenge facing the industry for a long time. Most of the available IPS operate based on optical tracking, motor encoding, and active RFID tags, often limited in their accuracy or high hardware cost. Answering this challenge, this paper presents new passive radio frequency identification (RFID) based localization system for indoor positioning through a mobile robot. The concept is based on placing passive RFID tags in a uniform triangular fashion for low tag density, and using an RFID reader on a mobile robot for localization and navigation. The inputs to proposed systems are location coordinates stored on the RFID tags, and their respective time of arrivals as read by the RFID reader. The proposed system first estimates its location using a centroid method, and utilizes time difference of arrival (TDOA) to accurately estimate its position, and uses trigonometric identities to estimate its current orientation. Experimental results demonstrate the proposed system can effectively perform indoor positioning and navigate to its destination with an average accuracy of 0.07m, while avoiding any obstacles in the path.
Cilj: Poizvedeti za najbolj primerno označbo za vodenje inventarja - prenosni računalnik. Namen: Analiza in ocena najprimernejše označbe za vodenje evidence inventarja. Pregledati ponudbo trga in ugotoviti, kje so prednosti in napake... more
Cilj: Poizvedeti za najbolj primerno označbo za vodenje inventarja - prenosni računalnik.
Namen: Analiza in ocena najprimernejše označbe za vodenje evidence inventarja. Pregledati ponudbo trga in ugotoviti, kje so prednosti in napake označb ki so na trgu. Ugotoviti kakšna so tveganja napak in prednosti ter upravičiti izbiro najbolj primernega.
In the field of Wireless Sensor Networks (WSNs), the problem of Sybil attacks has been widely considered by researchers. However, among the existing solutions, lightweight models are very limited. To accomplish this, the authors suggest a... more
In the field of Wireless Sensor Networks (WSNs),
the problem of Sybil attacks has been widely considered by
researchers. However, among the existing solutions, lightweight
models are very limited. To accomplish this, the authors suggest
a lightweight Sybil attack detection framework (LSDF) in this
paper. This framework has two components: first, evidence
collection; second, evidence validation. Every node in the network
collects the evidences by observing the activities of neighboring
nodes. These evidences are validated by running sequential
hypothesis test to decide whether neighboring node is a benign
node or Sybil node. With extensive simulations, it was revealed
that the LSDF can detect Sybil activity accurately with few
evidences.
With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem... more
With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem of improving information security by looking at organizations under the lens of Socio-technical systems. The main objective of this study is to ascertain if Net Assessment, one of the principal frameworks for analyzing the United States’ national security strategy, can be used to improve an organization’s capabilities in the field of information and cyber security through its multidisciplinary and holistic approach. To reach this goal, the study identifies and analyzes the aspects Net Assessment offers which are not
included in current information security risk management and assessment methodologies.
The research follows an inductive process, designed using a qualitative approach which makes use of content analysis, comparative analysis and purposive sampling. The first step drafts
a list of current information security risk assessment and risk management methodologies, and then isolates a representative sample. The second step identifies and analyzes existing metaanalytical methods and models devoted to the appraisal, selection, and indexing of risk management and assessment methods. It then defines a categorization framework capable of
accurately capturing the different risk management and assessment method’s functionalities. A third step maps the coverage of the two selected methodologies (NIST and ISO) against the identified functionality categories. After a critical analysis of Net Assessment, and a reasoned estimate of its main differences and capabilities in the context of information security, Net Assessment’s features are mapped in the category list.
The comparison of the features of the three methodologies identifies Net Assessment as a very credible avenue for improving multiple aspects currently neglected by the International
Organization for Standardization (ISO) and National Institute of Standards and Technology (NIST) frameworks. The study results maintain that, if implemented as a companion to these standards, Net Assessment may improve an organization’s security strategy, its allocation of funding for security, provide more accurate estimates of risks and threats, better alignment between potential risks and countermeasures, and improve the inputs for real time and automatic tools.
Food Spoilage has determinal effects in terms of health risks for the consumers as well as increased cost for producers. It is characterized by any change in the food product that renders it unattractive and unsuitable for consumption. A... more
Food Spoilage has determinal effects in terms of health risks for the consumers as well as increased cost for producers. It is characterized by any change in the food product that renders it unattractive and unsuitable for consumption. A practical application of wireless networks for food quality management by wirelessly monitoring pH level changes in food with a pH sensor. Our System consists of RFID Tag, pH sensor, RFID reader and server. This application requires two different kinds of modules: sensor module and wireless module. Sensor module collects the pH value of food and transmits the information to wireless module. Once the information is reached wirelessly, it is forwarded to the central unit through RFID. The central unit manages and monitors the network, as well as stores all the received data. Simulation is done through LabVIEW with display of results for continuous monitoring of pH values that could identify food spoilage. It also determines the food calorie and nutrition measuring system and nutritional fact table that can help patients and dietitians to measure and manage daily food intake.
Sensor air yang digunakan pada rangkaian ini dapat dibuat menggunakan PCB yang dibuat jalur seperti yang ditunjukkan pada gambar dengan menyablon jalur berdekatan antara masukan dan keluaran. Masukan dihubungkan dengan pin ATMega8,... more
Sensor air yang digunakan pada rangkaian ini dapat dibuat menggunakan PCB yang dibuat jalur seperti yang ditunjukkan pada gambar dengan menyablon jalur berdekatan antara masukan dan keluaran. Masukan dihubungkan dengan pin ATMega8, sedangkan keluaran dihubungkan dengan ground. Prinsip penting dari sensor ini adalah ketika sensor terkena air hujan maka jalur antara masukan dan keluaran akan terhubung, sehingga nilai tegangan di pin ATMega8 akan bernilai nol karena langsung ter-ground-kan. sensor hujan adalah alat yang mudah untuk mendeteksi hujan. Sensor ini dapat digunakan sebagai saklar ketika hujan jatuh melalui papan hujan dan juga untuk mengukur intensitas curah hujan. Output analog digunakan dalam pendeteksi tetes hujan berbentuk jumlah curah hujan.
This paper presents the design of UHF RFID read/write (R/W) antenna for the variety of smart shelf retail applications. Antenna operation is based on the EM coupling between the open-ended or shorted MS feed line and periodic planar metal... more
This paper presents the design of UHF RFID read/write (R/W) antenna for the variety of smart shelf retail applications. Antenna operation is based on the EM coupling between the open-ended or shorted MS feed line and periodic planar metal strips of certain layout. The proposed antenna can be easily customized for the required volume of smart shelf RFID interrogation. Several antenna prototypes have been designed, produced and measured. The antenna performance has been evaluated in UHF RFID system for the simultaneous detection of arbitrary oriented tagged apparel items placed on the antenna surface. The proposed antenna demonstrates excellent ability to provide strong and uniform E-field distribution at the distances up to 50 cm form the antenna surface.
We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done... more
We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done onboard and remotely, the distributed nature of the system and some exercises on futurology (anticipating trends can shed some light on upcoming designs). IET will bring great visibility to your work. You are welcome to suggest another topic/chapter title if you feel it would be more suitable. Each chapter should be around 20-25 pages each and can be submitted as a Word or Latex File. The IET will send you additional information (formatting, permission form, etc.) with the contributor's agreement once you have agreed to contribute to the book. Visit http:// www.theiet.org/resources/author-hub/books/index.cfm to get all information you need as a contributor to an IET research-level book. Each book is expected to have a total number of 500 printed pages (based on approximately 550 words per page with a 20% allowance for figures and tables). We have included a tentative schedule and list of topics below. If this is something you would consider, please send me the title of your chapter, a short description/abstract of the chapter content, and your full contact details. We will expect original content and new results for this book. You can, of course, reuse published material but the percentage of material reuse for the chapter should be less than 40%. The IET will run a piracy software on the full manuscript to control that you are including original material and will reject chapters who contain a large amount of already-published material so please do take this into consideration.
RFID sensor networks perpetually stream sensor data without batteries. Cameras are power hungry but provide richer information than conventional sensor network nodes. Battery-free, RF-powered camera sensor nodes combine many of the... more
RFID sensor networks perpetually stream sensor data without
batteries. Cameras are power hungry but provide richer information
than conventional sensor network nodes. Battery-free,
RF-powered camera sensor nodes combine many of the attractive
features of RFID sensor networks with those of cameras.
However, prior battery-free cameras have no notion of
3D location, which is desirable for creating large scale networks
of battery free cameras.
In this work we propose using battery-free RFID sensor tags
enhanced with on-board cameras to enable a network of distributed
tags to optically determine the 3D location and pose
of each camera tag given known reference tags enhanced with
LEDs. Experimental results show that the camera tags are
capable of determining their position with an average accuracy
of [x, y, z] = [15.92cm, 4.39cm, 1.03cm] at an LEDsto-Camera
range within 3.6m.
- by Yi Zhao and +2
- •
- Localization, RFID localization, RFID Technology, Camera
In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these... more
In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these goals, we implement a three steps methodology: first, we associate a weight to roles; second, we identify and remove the user-permission assignments that can not belong to a role having a weight ex-ceeding a given threshold; third, we restrict the problem of finding a candidate role-set for the given system configuration using only the user-permission assignments that have not been removed in step two (that is, user-permission assignments that belong to roles having a weight exceeding the given threshold). We formally show —proof of our results are rooted in graph theory — that this methodol-ogy achieves the intended goals. Finally, we discuss practical applications of our approach to the role mining problem. 1
This papaer entitled electronic toll collection system based on Radio Frequncy Identification System explained in detail based on current issue at toll collection system. There are some obstacles faced every day where the users spent... more
This papaer entitled electronic toll collection system based on Radio Frequncy Identification System explained in detail based on current issue at toll collection system. There are some obstacles faced every day where the users spent their valuable time in queue at tollgate due to traffic congestion as well as using traditional manual method in most existing toll ETC system to collect toll from road users. Besides that, the barrier design where each vehicle stop waiting until barrier lift which consider source of time delay. To tackle stated problems, an electronic toll collection system is proposed which based on RFID technology. The integrated system consists of two main sections, electronic sides where all input data received from while database management office is where all necessary information stored. To compare the current ETC system, in this research elaborated internet of things where all data transmit through cloud and then to the main office in real time. Not only that, there is some enhancement based on barrier design where, gate is remained open for all vehicles with sufficient tags without requiring to stop to eliminate time delay.By check system throughput compare to existing toll systems, various tests have been carried out in different method where proposed system throughput much higher percentage the current system.
It is not hard to see that the need for clean water is growing by considering the decrease of the water sources day by day in the world. Potable fresh water is also used for irrigation, so it should be planned to decrease fresh water... more
It is not hard to see that the need for clean water is growing by considering the decrease of the water sources day by day in the world. Potable fresh water is also used for irrigation, so it should be planned to decrease fresh water wastage. With the development of the technology and the availability of cheaper and more effective solutions, the efficiency of the irrigation increased and the water loss can be reduced. In particular, Internet of things (IoT) devices have begun to be used in all areas. We can easily and precisely collect temperature, humidity and mineral values from the irrigation field with the IoT devices and sensors. Most of the operations and decisions about irrigation are carried out by people. For people, it is hard to have all the real time data such as temperature, moisture and mineral levels in the decision-making process and make decisions by considering them. People usually make decisions with their experience. In this study, a wide range of information fro...
One of the major issues in Target-coverage problem of wireless sensor network is to increase the network lifetime. This can be solved by selecting minimum working nodes that will cover all the targets. This paper proposes a completely new... more
One of the major issues in Target-coverage problem of wireless sensor network is to increase the network
lifetime. This can be solved by selecting minimum working nodes that will cover all the targets. This
paper proposes a completely new method, in which minimum working node is selected by modified Ant
colony Algorithm. Experimental results show that the lever of algorithmic complication is depressed and
the searching time is reduced, and the proposed algorithm outperforms the other algorithm in terms.
Now a days many health servicing devices are available, but they are not connected to any system. We are proposing an E-health card integrated with smart medicine box. The card will consist of an unique Id to maintain confidentiality of... more
Now a days many health servicing devices are available, but they are not connected to any system. We are proposing an E-health card integrated with smart medicine box. The card will consist of an unique Id to maintain confidentiality of health related details in it. The data will be updated and fetched from our cloud database at real time. Information in the card can be retrieved and modified in the available departments of hospitals, laboratories, ambulances, pharmacies and other required places with the help of card readers. The basic idea is to provide exact checkup to the patient by the simple and secure access to the data stored within the card from any required place with the help of cloud connection rather than carrying the whole bunch of documents together. Whereas the medicine box system can be monitored by the patient and pharmacist as it will be linked to our online portal of respective users. This portal will be used to configure the medicine box by calculating the weight of each pill and notifiying the user regarding the unavailability of the pills and the data can also be used to maintain the health history of the user.
— This paper presents a system to monitor pick-up/drop-off of school children to enhance the safety of children during the daily transportation from and to school. The system consists of two main units, a bus unit and a school unit. The... more
— This paper presents a system to monitor pick-up/drop-off of school children to enhance the safety of children during the daily transportation from and to school. The system consists of two main units, a bus unit and a school unit. The bus unit the system is used to detect when a child boards or leaves the bus. This information is communicated to the school unit that identifies which of the children did not board or leave the bus and issues an alert message accordingly. The system has a developed web-based database-driven application that facilities its management and provides useful information about the children to authorized personal. A complete prototype of the proposed system was implemented and tested to validate the system functionality. The results show that the system is promising for daily transportation safety.
In this work, two embroidered chipless octagonal-shaped RFID tags on cotton fabric for wearable applications are presented. The first tag is designed by using silver-coated polyamide conductive fibre (HC12) and the second tag is... more
In this work, two embroidered chipless octagonal-shaped RFID tags on cotton fabric for wearable applications are presented. The first tag is designed by using silver-coated polyamide conductive fibre (HC12) and the second tag is embroidered by using highly conductive Vectran (LIBERATOR 40) which is a highly conductive multifilament yarn spun from Liquid Crystal Polymers (LCP), on cotton fabrics. The proposed tag's design uses a Frequency Selective Surface (FSS) technique for the frequency range of 8 to 18GHz and fabricated by using commercial ZSK Technical Embroidery System JCZA. The tag design is composed of six concentric octagonal loop resonators with one unitary element. The desired data bits are obtained by a series of comparative experiments for Radar Cross Section (RCS) in an anechoic chamber. The experimental results obtained show that the 4-bit data codeword is accurately retrieved with the variation of distance by up to 1.8m at 0dBm. Moreover, the experimental results include on-body RCS measurements and the bending effects on both of the tags. The tags are compared to the state of the art tags in a comparative table.
Being an alternative to conventional wired sensors, wireless sensor networks (WSNs) are extensively used in Structural Health Monitoring (SHM) applications. Most of the Structural Damage Detection (SDD) approaches available in the SHM... more
Being an alternative to conventional wired sensors, wireless sensor networks (WSNs) are extensively used in Structural Health Monitoring (SHM) applications. Most of the Structural Damage Detection (SDD) approaches available in the SHM literature are centralized as they require transferring data from all sensors within the network to a single processing unit to evaluate the structural condition. These methods are found predominantly feasible for wired SHM systems; however, transmission and synchronization of huge data sets in WSNs has been found to be arduous. As such, the application of centralized methods with WSNs has been a challenge for engineers. In this paper, the authors are presenting a novel application of 1D Convolutional Neural Networks (1D CNNs) on WSNs for SDD purposes. The SDD is successfully performed completely wireless and real-time under ambient conditions. As a result of this, a decentralized damage detection method suitable for wireless SHM systems is proposed. The proposed method is based on 1D CNNs and it involves training an individual 1D CNN for each wireless sensor in the network in a format where each CNN is assigned to process the locally-available data only, eliminating the need for data transmission and synchronization. The proposed damage detection method operates directly on the raw ambient vibration condition signals without any filtering or preprocessing. Moreover, the proposed approach requires minimal computational time and power since 1D CNNs merge both feature extraction and classification tasks into a single learning block. This ability is prevailingly cost-effective and evidently practical in WSNs considering the hardware systems have been occasionally reported to suffer from limited power supply in these networks. To display the capability and verify the success of the proposed method, large-scale experiments conducted on a laboratory structure equipped with a state-of-the-art WSN are reported.
Navigation and guidance systems are a critical part of any autonomous vehicle. In this paper, a novel sensor grid using 40 KHz ultrasonic transmitters is presented for adoption in indoor 3D positioning applications. In the proposed... more
Navigation and guidance systems are a critical part of any autonomous vehicle. In this paper, a novel sensor grid using 40 KHz ultrasonic transmitters is presented for adoption in indoor 3D positioning applications. In the proposed technique, a vehicle measures the arrival time of incoming ultrasonic signals and calculates the position without broadcasting to the grid. This system allows for conducting silent or covert operations and can also be used for the simultaneous navigation of a large number of vehicles. The transmitters and receivers employed are first described. Transmission lobe patterns and receiver directionality determine the geometry of transmitter clusters. Range and accuracy of measurements dictate the number of sensors required to navigate in a given volume. Laboratory experiments were performed in which a small array of transmitters was set up and the sensor system was tested for position accuracy. The prototype system is shown to have a 1-sigma position error of about 16 cm, with errors between 7 and 11 cm in the local horizontal coordinates. This research work provides foundations for the future development of ultrasonic navigation sensors for a variety of autonomous vehicle applications.
This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides... more
This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides recommendations, regarding the installation of sensors in the building. We also present the communication protocols of the computer network used in order to ensure the efficient communication between the space examined and the sensor network. Finally, we describe the process of creating a website, which is designed to store and view the data.
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code... more
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information through short messaging system (SMS) is the best solution to replace the current system. Results from observational studies on the new system, the implementation of QR code tag on the briefcase with QR Tag Scanner application was able to overcome the difficulties encountered in identifying the true owner of the briefcase found. However, improvements to the Identity Detection System Owner Phone Bags Students Using QR Codes to do from time to time in order to create a more efficient system.
The San Julián’s stone is the main material used to build the most important historical buildings in Alicante city (Spain). This paper describes the analysis developed to obtain the relationship between the static and the dynamic modulus... more
The San Julián’s stone is the main material used to build the most important historical buildings in Alicante city (Spain). This paper describes the analysis developed to obtain the relationship between the static and the dynamic modulus of this sedimentary rock heated at different temperatures. The rock specimens have been subjected to heating processes at different temperatures to produce different levels of weathering on 24 specimens. The static and dynamic modulus has been measured for every specimen by means of the ISRM standard and ultrasonic tests, respectively. Finally, two analytic formulas are proposed for the relationship between the static and the dynamic modulus for this stone. The results have been compared with some relationships proposed by different researchers for other types of rock. The expressions presented in this paper can be useful for the analysis, using non-destructive techniques, of the integrity level of historical constructions built with San Julián’s stone affected by fires.
The development of technology in the world is growing rapidly. In connection with the growth of these technologies, many houses or apartments implement the smart home system. The implementation of the smart home system is useful to the... more
The development of technology in the world is growing rapidly. In connection with the growth of these technologies, many houses or apartments implement the smart home system. The implementation of the smart home system is useful to the security of a home especially on the access of appliances and others that should implement smart environments. One of these systems is implementing radio frequency identification (RFID). This paper has used a method of identification implementing radio waves on the certain frequency combined with an Arduino microcontroller as the core to process input and output (I/O) components that are connected to the database through the interface application. The expected result of making this device can provide an additional security option in a real implementation to be able accessing a door to maximize a security by providing validation of the access rights using RFID tag that read by the RFID reader.
A classification algorithm is applied to UHF radio frequency identification (RFID) system to estimate the indoor position of a passive tag utilizing a received signal strength indicator (RSSI). Passive tag signals are collected by... more
A classification algorithm is applied to UHF radio frequency identification (RFID) system to estimate the indoor position of a passive tag utilizing a received signal strength indicator (RSSI). Passive tag signals are collected by conventional UHF RFID reader antenna located at two different positions. K-NN and curve fitting are used for distance estimation and examined at different frequencies within the range 902-928 MHz to find suitable frequencies which can minimize the average error. In the proposed method, the measured RSSI values are compared with the fingerprint database in different frequencies to find the nearest neighbor. The best accuracy achieved at frequency range 926-928 MHz is 18.3 cm. The monitoring system is composed of a reader and tags under test, which makes the proposed system robust, easy to set up, and with low cost. The limitation of the proposed method is also discussed.
With the advancement of motorization and robotization, modern unrest has happened in all pieces of the world. This has expanded the expectations for everyday comforts of the humanity and furthermore added to the financial development of... more
With the advancement of motorization and robotization, modern unrest has happened in all pieces of the world. This has expanded the expectations for everyday comforts of the humanity and furthermore added to the financial development of the nation. IoT has changed itself to suite different fields. This undertaking is to plan IoT based transport passage observing framework which is actualized utilizing RFID reader and Arduino Mega. A model of the product must be created to catch the subtleties of the vehicle number, driver subtleties, passage and leave time of the specific vehicle alongside date. Entry time of vehicle ought to be caught utilizing RFID tag. It is then put away in the database in three squares, first the transports entering the grounds on schedule, at that point the transports entering the grounds late. At last the transports which never entered the grounds is put away in a different square and a notice is sent to the administrator as a SMS. Our paper presents test consequences of the framework to proficiently screen the college transport entering and leaving the grounds.
In this paper a brief study of various designs of microstrip patch antenna used for Radio Frequency Identification (RFID) applications in Ultra High Frequency band (860-960MHZ) is presented. Various characteristics of different antenna... more
In this paper a brief study of various designs of microstrip patch antenna used for Radio Frequency Identification (RFID) applications in Ultra High Frequency band (860-960MHZ) is presented. Various characteristics of different antenna structures are also discussed. The main problem of RFID reader antenna is its size, these antennas should be small in size and achieving circular polarization. So it is necessary to design a small size antenna with required specifications.
It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As... more
It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx
A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As Well As Big Corporations .Even Very Big Companies like GOOGLE; FACEBOOK; APPLE; AMAZON; MICROSOFT etc. etc. are investing In Cloud Computing... Do Get This Stuff....
Ghana like most developing countries has most of the toll booths across the country managed manually which more often than not is beset with many problems-the lack of transparency and accountability being main examples. Many at times... more
Ghana like most developing countries has most of the toll booths across the country managed manually which more often than not is beset with many problems-the lack of transparency and accountability being main examples. Many at times personnel entrusted to run such systems mismanage the funds. In some cases, the daily sales are not properly accounted for and the infrastructure is not properly maintained. Considering various electronic tollbooths systems that have been deployed in many parts of the world and the innumerable advantages they bring to such countries; it is safe to say that this project will address the challenges faced in developing countries in relation to toll collection. This paper thus proposes the design of an electronic tollbooth collection and management system suitable for the local needs in developing countries particularly Ghana. The proposed system leverages the unique identification on Radio Frequency Identification (RFID) tags and uses it to identify a particular user"s account that has been registered with the system. This unique identity read by the RFID reader is relayed to the microcontroller unit responsible for processing the data and transmitting it wirelessly to an online server in charge of identifying the account the unique ID is associated with and additionally handling the deductions from the specified user"s account. Feedback from this process is sent back to the microcontroller unit so the user receives a response about the status of the transaction. By this, accountability is achieved causing a domino effect of reduced traffic congestion, reduced fuel consumption, and carbon monoxide emissions and as well as the reduction in the travel time.
The health diagnosis of agricultural structures is critical to detecting damages such as cracks in concrete, corrosion, spalling, and delamination. Agricultural structures are susceptible to environmental degradation due to frequent... more
The health diagnosis of agricultural structures is critical to detecting damages such as cracks in concrete, corrosion, spalling, and delamination. Agricultural structures are susceptible to environmental degradation due to frequent exposure to water, organic effluent, farm chemicals, structural loading, and unloading. Various sensors have been employed for accurate and real-time monitoring of agricultural building structures, including electrochemical, ultrasonic, fiber-optic, piezoelectric, wireless, fiber Bragg grating sensors, and self-sensing concrete. The cost–benefits of each type of sensor and utility in a farm environment are explored in the review. Current literature suggests that the functionality of sensors has improved with progress in technology. Notable improvements made with the progress in technology include better accuracy of the measurements, reduction of signal-to-noise ratio, and transmission speed, and the deployment of machine learning, deep learning, and arti...