This document describes a microcontroller-based annunciator system that detects faulty conditions such as fires and informs operators through audible and visual alerts. The system uses various sensors to monitor conditions and provides the information to an AT89C51 microcontroller. If an abnormality is detected, the microcontroller alerts owners and initiates responses through a DTMF generator. It can also control devices like relays to regulate temperatures or turn on water pumps to extinguish fires. The system was tested experimentally and results were found to match computational analyses with less than 2% error, likely due to potentiometer loading effects. In conclusion, such automation improves safety and efficiency in industrial and other settings.
This document discusses supervisory control and data acquisition (SCADA) systems. It describes the typical hardware and software architectures of SCADA, including distributed databases, data servers, programmable logic controllers, and field buses. The document outlines common SCADA functions such as access control, human-machine interface, trending, alarm handling, logging, archiving, report generation, and automation. It also mentions SCADA development tools and data access mechanisms. In conclusion, the document states that SCADA systems offer more front-end functionality, efficient storage, and device-oriented configuration than distributed control systems.
SCADA systems are used to monitor and control geographically dispersed assets, like pipelines, power grids, and water distribution systems. SCADA systems connect to physical equipment like sensors and valves and gather data which is sent to centralized data acquisition systems for monitoring and processing. Key components of SCADA systems include remote terminal units for data collection, programmable logic controllers, telemetry systems for data transfer, and human-machine interfaces for display of information. SCADA systems provide advantages like reduced costs and increased efficiency for monitoring large remote assets.
SCADA PROJECTS ABSTRACT-Scada for power station substation monitoring and aut...ASHOKKUMAR RAMAR
This project uses an embedded system to measure various power station parameters and transmit them via serial interface to a PC. The SCADA system allows monitoring and control of remote terminals from a central computer. It supports automatic protection functions like tripping loads if a transformer overheats. Measured analog and logic parameters are transmitted at 9600 baud rate for real-time monitoring on a screen with graphical tracking of changes.
Monitoring and Controlling Of Electric Overhead Travelling Crane Using PLC an...paperpublications3
Abstract: PLC and SCADA are the two new approaches used to control the motion of Electric Overhead travelling crane. Ladder logic diagram for EOT Cranes are designed for motion using variable frequency drives and contactor logic and performance of various parameters are analyzed and compared and image of E.O.T crane are designed in SCADA software and communication between PLC and Scada is done with the help of Siemens simulator .There is a provision of hydraulic motor for motion in main hoist if power failure of cranes takes place to avoid the unsafe condition and work under extreme condition.
SCADA stands for Supervisory Control and Data Acquisition. It refers to a system that collects data from sensors at remote locations and sends it to a central computer for monitoring and control. The central monitoring system communicates with remote terminal units or programmable logic controllers through communication links. SCADA systems allow operators to monitor entire systems in real-time with little human intervention through functions like data acquisition, supervisory control, alarms, logging, and trending.
SCADA systems collect data from remote locations and transmit it to a central control station. They use RTUs to collect and format data at remote sites, PLCs to monitor input devices and control output devices, HMIs for operators to interface with controllers, telemetry systems to wirelessly transmit data, and data acquisition to measure physical phenomena and convert it to digital values for analysis. Overall, SCADA systems allow centralized monitoring and control of equipment in various locations.
This document outlines Work Package 1 for the SLOPE project which will take place from January to June 2014. The objectives are to define requirements, analyze the system, identify user needs, review current processes, define necessary data and sensors, and specify the system architecture and interfaces. Task 1.3 focuses on defining the Human Machine Interface (HMI) requirements, especially for on-field devices. It will be led by Graphitech and involve several other partners to mockup interfaces for different scenarios like planning, harvesting, and resource management. The HMI will need to support tasks like 3D forest visualization, machine operation, and an online enterprise resource planning system.
SCADA stands for Supervisory Control And Data Acquisition. SCADA software system is a device monitoring and controlling framework. The supervisory control includes, taking action and control through remote locations for various control mechanisms and processes.The front-end UI of Mobile App or Web dashboard along with backend business logic, database and a Gateway (as depicted in the above block diagram) manifests a SCADA solution for control and monitoring of devices in an IoT network.
https://www.embitel.com/blog/embedded-blog/what-is-scada-system-and-software-solution
This document provides an overview of power system automation and data acquisition systems. It discusses:
1) The role of data acquisition systems in power system automation and how they collect data from the power network using sensors and send it to programmable logic controllers and computers.
2) The key components of power system automation including electrical protection, control, measurement, monitoring, and data communication.
3) The architecture of power system automation including three levels - field equipment, protection/control equipment, and operator displays - connected by communication networks.
SCADA systems are used to monitor and control geographically dispersed systems. They involve data acquisition from sensors, transmission of data via communication networks to a central control system, data presentation through HMIs, and remote control of equipment. Key components include RTUs that interface with field sensors and devices, programmable logic controllers that connect to sensors and convert signals to digital data, and HMIs that present data to operators and allow control of the system. SCADA systems are commonly used in industries like oil and gas, water treatment, manufacturing, and electric power grids.
Hi friends
This PPT consist of automation information ,what is PLC,need of PLC applications,components of PLC ,PLC operations,Timers , Some Program, etc
instead of this it consists SCADA ,what is SCADA,need of SCADA,brands of SCADA, tags ,features of SCADA, Dynamic process graphic , script security etc.......
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATIONkamal soni
AUTOMATION ,SCADA AND POWER SYSTEM AUTOMATION
PLC(PROGRAMMABLE LOGIC CONTROLLER)
PLC OPERATION
Block diagram of a PLC
Supervisory
Control
And
Data
Acquisition
Human Machine Interface
Intelligent Electronic Device
Instrument Transformers
This document provides an overview of supervisory control and data acquisition (SCADA) systems. It defines SCADA and describes its typical components, including field instrumentation, remote stations, communication networks, and central monitoring systems. It also discusses telemetry, data acquisition, differences between SCADA and distributed control systems, common system configurations, communication modes, example applications, benefits, and limitations of SCADA systems. The document provides details on human-machine interfaces and interaction techniques used in SCADA.
This seminar report presentation discusses the application of a supervisory control and data acquisition (SCADA) system. SCADA systems are used to remotely control equipment via coded signals over communication channels. The presentation will cover intelligent electronic devices, instrument transformers, transducers, meters, digital fault recorders, protective relays, and smart meters. It will also discuss the advantages and disadvantages of SCADA systems and power system automation. The government of India is integrating state power utilities and building a unified load dispatch center, demonstrating the increasing importance of automation.
overview of plc and dcs...
A general information about the common plcs used and how SCADA software is used for virtualising the entire plant equipments and sensors and control them within a single control room.
The document discusses the integration of expert systems with SCADA for power grid management. It describes two key expert system applications: (1) An Intelligent Alarm Processor (IAP) that analyzes faults and provides quick diagnoses; and (2) A Power System Restoration (PSR) system that generates switching sequences and advice for restoring power during emergencies. The expert systems can reduce operator cognitive load, provide faster response to events, minimize errors, and help avoid critical situations.
Scada system architecture, types and applicationsUchi Pou
This document discusses the architecture, types, and applications of SCADA (Supervisory Control and Data Acquisition) systems. It describes the basic components of SCADA systems including human-machine interfaces, programmable logic controllers, remote terminal units, communication infrastructure, and SCADA programming. It outlines the four generations of SCADA systems from early monolithic to modern networked and internet-based systems. Finally, it provides examples of SCADA applications in manufacturing, wastewater treatment, power systems, and wireless SCADA systems.
1. Madhya Pradesh Power Transmission Company Ltd. awarded a turnkey contract in September 2013 to establish a state-of-the-art transmission SCADA system to improve operational efficiency.
2. The project included establishing 3 control centers to monitor over 300 substations across the state, implementing the system for 2 years, and providing maintenance and support for 5 additional years.
3. Benefits of the SCADA system include automatic monitoring and reporting, improved control and operation of substations, reduced transmission losses and improved power supply quality.
IRJET- Implementation of Automated Urban Drinking Water Supply and Leakage Id...IRJET Journal
This document describes a proposed system to automate urban drinking water supply and identify leaks using Programmable Logic Control (PLC) and Supervisory Control and Data Acquisition (SCADA). The system would minimize human error, reduce water wastage from leaks, theft and faults in pipes. Sensors would monitor water pressure and flows. PLCs would control pumps and valves locally, while a central SCADA system would allow remote monitoring and control. Data from sensors would be transmitted to the SCADA system via RTUs to identify leaks and optimize water distribution in real-time. This could help reduce supply costs and more efficiently match demand with a scarce water supply in urban areas of India.
This document summarizes a training seminar on industrial automation. It introduces the hosting organization, Advance Technology, and discusses several topics related to industrial automation including programmable logic controllers (PLCs), PLC components and programming, input/output modules, selection criteria, applications, and supervisory control and data acquisition (SCADA) systems. The document provides an overview of the key concepts that were covered in the training seminar.
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
This document discusses improving latency in distributed cloud data centers through virtualization and automation. It begins by explaining the benefits of distributed over centralized data centers, such as lower latency and financial benefits from positioning services close to customers. Virtualizing data centers increases utilization and flexibility. Automation streamlines operations and provisioning. The document proposes using a virtual network with components like switches and virtual LANs to connect virtualized distributed data centers and improve latency. Automating configuration management avoids manual errors and complexity in managing dynamic cloud environments.
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...IOSR Journals
CeO2–ZrO2 oxides were prepared by the surfactant-templated method using cetyl trimethyl ammonium bromide (CTAB) as template and modified with chromium nitrate. These were characterized by XRD, FT-IR, TEM, SEM, BET and TPD-CO2. The XRD data showed that as prepared CeO2-ZrO2 powder particles have single phase cubic fluorite structure. HRTEM shows mesoscopic ordering. Average particle size is 12-13 nm as calculated from particle histogram. The nitrogen adsorption/desorption isotherm were classified to be type IV isotherm, typical of mesoporous material. The presence of uni-modal mesopores are confirmed by the pore size distribution which shows pore distribution at around 60 A°. Catalytic activity was studied towards liquid-phase oxidation of benzene.
Uncompressed Image Steganography using BPCS: Survey and AnalysisIOSR Journals
Abstract: Steganography is the art and science of hide secret information in some carrier data without leaving
any apparent evidence of data alternation. In the past, people use hidden tattoos, invisible ink or punching on
papers to convey stenographic data. Now, information is first hide in digital image, text, video and audio. This
paper discusses existing BPCS (Bit Plane Complexity Segmentation) steganography techniques and presences
of some modification. BPCS technique makes use of the characteristics of the human visible system. BPCS
scheme allows for large capacity of embedded secret data and is highly customized. This algorithm offers higher
hiding capacity due to that it exploits the variance of complex regions in each bit plane. In contrast, the BPCS
algorithm provided a much more effective method for obtaining a 50% capacity since visual attacks did not
suffice for detection.
Keywords: BPCS, Data security, Information hiding, Steganography, Stego image
Effect of bio-finishes on designer’s naturally coloured cotton khadi stripe f...IOSR Journals
Abstract: The present study involves the eco-friendly naturally coloured cotton DDCC-1 and white cotton
yarns which were used to produce pin and medium stripe khadi fabrics and given special bio-finishes viz.,
enzymatic de-sizing, bio-polishing and silicon softener finish and further tested to know their impact on different
structural, performance and durable properties. Multiple linear regressions were used to analyse their influence
on one another. It was found that on special finishing, both WC and DDCC-1 yarns became finer and slight
increase in cloth count; considerable reduction in bending length; improvement in crease recovery angle and
drapability of both the stripe fabrics was observed. Whereas, tensile strength and elongation were reduced; and
no considerable change was observed in abrasion and pilling. Keywords: DDCC-1, Designer’s fabrics, enzyme finish, medium stripe, naturally coloured cotton, physical
properties, pin stripe, softener wash, and special finish
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...IOSR Journals
This document describes a new efficient distributed arithmetic (NEDA) technique for implementing a high speed 1-D discrete wavelet transform (DWT) using a 9/7 filter on a Xilinx Virtex4 FPGA. The key aspects of the NEDA technique are that it uses adders as the main component and does not require multipliers, subtraction, or ROM. Simulation results show the proposed NEDA architecture requires fewer logic resources and has a shorter maximum path delay compared to existing distributed arithmetic techniques.
Convolution Theorem for Canonical Cosine Transform and Their PropertiesIOSR Journals
The document discusses the convolution theorem for the generalized canonical cosine transform. It begins with an introduction to fractional Fourier transforms and linear canonical transforms. It then defines the generalized canonical cosine transform and introduces a special type of convolution for this transform. The main result is that the convolution theorem holds for the generalized canonical cosine transform: the transform of the convolution of two functions is equal to the convolution of the individual transforms of the two functions. The theorem is stated and a proof is provided. Finally, some properties of the canonical cosine transform are mentioned.
This document describes an error compensation technology for straightening linear guide rails based on a wireless sensor network. The technology aims to improve the accuracy of straightening machines by establishing a strain-deflection model and error compensation model using data from wireless strain sensors. An experiment was conducted where strain gauges in a full-bridge circuit configuration measured the strain on a linear guide rail during the straightening process. The feasibility of using the measured strain data and an error compensation scheme to improve the precision of the straightening stroke model was demonstrated.
Information Security Management System: Emerging Issues and ProspectIOSR Journals
This document discusses information security management systems (ISMS). It begins by defining ISMS as a collection of policies related to information technology risks and information security management. It notes that while many organizations have implemented ISMS frameworks focused on technology, information security also needs to be addressed at the organizational and strategic level. The document then provides an overview of common elements of ISMS, including risk assessment, policy development, and implementation. It discusses the impact of networks and the internet in driving increased focus on information security. In summary, the document outlines key concepts regarding ISMS and argues the need for holistic ISMS approaches in organizations.
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...IOSR Journals
This document discusses the numerical simulation and design optimization of the intake and spiral case for a low head vertical turbine. It begins by introducing the research scope, which is to study the pressure and velocity fields in the spiral case through numerical simulation in order to reduce hydraulic losses. It then provides details on the design of the spiral case, including equations used and factors considered like flow rate and head. The document presents results of the CFD analysis, showing pressure counters, velocity streamlines, and a calculated hydraulic loss of 0.2273697 meters for the spiral case. It concludes that the purpose was to analyze flow behavior in the spiral case to minimize hydraulic losses based on Reynolds-averaged N-S equations and non-structured grid CFD
Penetrating Windows 8 with syringe utilityIOSR Journals
This document discusses penetrating Windows 8 remotely using Metasploit framework and syringe utility. It begins with an introduction to penetration testing and Windows 8 security. It then describes using Metasploit to generate a payload, encoding it to evade detection, and injecting it into a Windows 8 system using syringe. This allows establishing a meterpreter session and compromising the system by migrating processes and accessing the C drive. It concludes that Windows 8 has strong security but syringe injections allow compromising it, and more exploits could be found to enhance efficacy.
Effects of Different Home Storage Conditions and Preservation on Some Chemica...IOSR Journals
This document summarizes a study that investigated the effects of different home storage conditions and preservation techniques on the chemical constituents of tomatoes. Tomatoes were subjected to three post-harvest treatments: without preservative (control), preserved with groundnut oil, and preserved with salt. The samples were then stored under different conditions for 8 weeks. Chemical analyses found that the total soluble solids, insoluble solids, pH, sugar, salt, ascorbic acid and ash contents decreased in fresh and dehydrated samples over time, while acidity increased. Powdered tomato samples maintained their chemical constituents best over the 8-week period. The results suggest that powdering is an effective preservation technique worthy of further investigation.
A Hierarchical Clustering Algorithm Based Computer Aided Molecular Modeling w...IOSR Journals
This document presents a novel hierarchical clustering algorithm for color image segmentation of Haematoxylin and Eosin (H&E) stained images of colon cancer. The algorithm aims to classify differences between benign and malignant tumor cells. It involves reading an input color image, coarse representation using 25 bins, hierarchical clustering to segment the image into classes, and outputting the segmented image. Intermediate steps include filtering, normalization, and segmentation of nuclei into a separate image in MATLAB for real-time simulation. Results show the algorithm improves color segmentation accuracy over previous k-means clustering approaches and provides features for region of interest classification of benign and malignant tissues.
How Cognitive Science Has Influenced the Applied Science of HCI “The evolutio...IOSR Journals
Cognitive science research has influenced the applied science of human-computer interaction (HCI) in several ways:
1) It has provided insights into how humans process information and make decisions, which has informed the design of user-friendly interfaces.
2) Research on topics like perception, memory, and problem-solving has helped interface designers create intuitive systems that are easy for users to understand and learn.
3) By applying findings on cognition, HCI research has also contributed to areas like education technology and made the internet a more effective learning tool.
The document proposes a system to bridge socially enhanced virtual communities for business collaborations. The system discovers relevant existing businesses and potential business alliances through a semi-automated approach using broker discovery. Brokers help connect separate groups within a professional virtual community and find new relevant groups to join. Metrics are used to support discovering and selecting brokers to improve interactions, relationships, and trust between members of the virtual communities.
A Novel Approach of Text Steganography based on null spacesIOSR Journals
This document presents a new approach to text steganography that hides a secret message in a cover text by adding or removing extra whitespace (null spaces). The approach converts the secret message into binary and hides each bit by adding an extra space in the cover text for a bit value of 1, or leaving the space unchanged for a bit value of 0. Previous approaches to text steganography include substituting synonyms, abbreviations, or different spellings to encode message bits, but these can alter the meaning of the text. The proposed approach uses whitespace manipulation, which does not affect the meaning or readability of the cover text.
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesIOSR Journals
This document proposes a Quorum-based Medium Access Control (QMAC) protocol to improve energy efficiency in wireless sensor networks. QMAC enables sensor nodes to sleep longer under light traffic loads by only waking up during assigned "quorum time frames". Each node selects one row and column from a grid as its quorum set. This ensures any two nodes' quorums will intersect at some time, allowing communication while keeping individual duty cycles low. Results show QMAC conserves more energy and maintains low latency compared to existing protocols that require nodes to wake up at every time frame regardless of traffic.
Effective Bug Tracking Systems: Theories and ImplementationIOSR Journals
The document discusses effective bug tracking systems and proposes four directions to enhance them:
1. Tool oriented improvements like making setup and installation simpler for open source tools like Bugzilla.
2. Information oriented improvements like ensuring bug reports capture essential details needed to fix issues.
3. Process oriented improvements like simplifying bug reporting and notification processes.
4. User oriented improvements like reducing complexity and improving usability.
The authors developed a prototype bug tracking application to demonstrate how following these directions can help software developers more easily understand and quickly resolve bugs.
This document summarizes a study on the impact of emotion on prosody analysis in speech. The study analyzed speech samples recorded from actors expressing different emotions like love, anger, calm, sadness and neutral. It measured acoustic parameters like vowel duration, fundamental frequency, jitter and shimmer for the different emotions. The results showed that speech expressing love had longer vowel durations, while sad speech had longer durations for certain vowels. This indicates emotion impacts prosodic features of speech, which is important for applications like speech recognition and synthesis systems.
Modeling of Vortex Induced Vibration based Hydrokinetic Energy ConverterIOSR Journals
This document presents a model for a vortex induced vibration (VIV) based hydrokinetic energy converter. It discusses the working principle and advantages of VIV energy conversion. Key parameters in the VIV phenomenon like natural frequency, reduced velocity, Reynolds number and Strouhal number are defined. Equations to characterize the fluid-structure interaction and determine dynamic response, lift force, power extracted, and efficiency are formulated. Physical features affecting the mathematical model like stagnation point, separation point, boundary layer and shear layer are also discussed. The model aims to predict dynamic response and power output to optimize energy extraction from slow-moving water currents.
This document summarizes a research paper on synthesizing speech using a small microcontroller. It describes designing a speech synthesis system using a microcontroller to perform various speech commands. The system uses a PIC18F1320 microcontroller and a TTS256 speech synthesizer chip which concatenates recorded speech segments to generate synthesized speech. Software is developed using MPLAB to control the system and synthesize speech. The system is tested to ensure it can interface with the user, control an audio playback device using the microcontroller, and synthesize speech within the microcontroller.
This document summarizes a project to automate online monitoring of compressed air status in an industry with alarms. Sensors measure air pressure, temperature, dew point, and vibrations. A PIC microcontroller displays the sensor readings on an LCD and sounds an alarm if vibrations exceed a limit. The same data is sent wirelessly to a PC using Zigbee. The PC allows remotely controlling the compressor and dryer power. The automation aims to safely manage air quality without constant human monitoring and reduce costs compared to wired networks.
Review of Online Monitoring of status of air for Automation with alarmiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...Sheikh R Manihar Ahmed
1. The document discusses a fault detection and diagnosis system for induction machines. It includes a microcontroller, sensors, ADC, and LCD display.
2. The system works by setting threshold values for parameters like temperature and current. It then continuously monitors these parameters and compares them to the thresholds.
3. If a parameter exceeds its threshold, the system isolates the specific fault, displays it on the LCD, and triggers an alarm. The user can acknowledge the fault to stop the alarm.
Hardware and Logic Implementation of Multiple Alarm System for GSM BTS RoomsZac Darcy
Cellular communication becomes the major mode of communication in present century. With the
development of this phase of communication the globalization process is also in its peak of speed. The
development of cellular communication is largely depending on the improvement and stability of Base
Transceiver Station (BTS) room. So for the purpose of the development of cellular communication a large
numbered BTS rooms are installed throughout the world. To ensure proper support from BTS rooms there
must be a security system to avoid any unnecessary vulnerability. Therefore multiple alarm system is
designed to secure the BTS rooms from any undesired circumstances. This system is designed with a PIC
Microcontroller as a main controller and a several sensors are interfaced with it to provide high
temperature alarm, smoke alarm, door alarm and water alarm. All these alarms are interfaced with the
alarm box in the BTS room which provides the current status directly to Network Management Centre
(NMC) of a Global System for Mobile (GSM) communication network.
Hardware and logic implementation of multiple alarm system for gsm bts roomsZac Darcy
Cellular communication becomes the major mode of communication in present century. With the development of this phase of communication the globalization process is also in its peak of speed. The development of cellular communication is largely depending on the improvement and stability of Base Transceiver Station (BTS) room. So for the purpose of the development of cellular communication a large numbered BTS rooms are installed throughout the world. To ensure proper support from BTS rooms there must be a security system to avoid any unnecessary vulnerability. Therefore multiple alarm system is designed to secure the BTS rooms from any undesired circumstances. This system is designed with a PIC Microcontroller as a main controller and a several sensors are interfaced with it to provide high temperature alarm, smoke alarm, door alarm and water alarm. All these alarms are interfaced with the alarm box in the BTS room which provides the current status directly to Network Management Centre (NMC) of a Global System for Mobile (GSM) communication network.
IRJET- Information Logging and Investigation of Control Framework Utilizing D...IRJET Journal
This document discusses the design and implementation of an information logging and investigation system using different communication protocols. The system is designed to automatically and configurable log fault data packets from various sensors to monitor system performance. It uses LabVIEW software to design program codes to read, monitor, and display system parameters in real-time from sensors measuring temperature, humidity, etc. The system has hardware components like a microcontroller and sensors, and can interface with devices using protocols like UART, CAN, Ethernet to extract and log data and transmit it to an end user.
The Design of Multi-Platforms Rail Intelligence Flatness Detection SystemIJRESJOURNAL
ABSTRACT: In this paper,we design a Multi-platforms intelligent system for flatness detection of rail welding headbased on thedevelopment environment of Android software .The system uses a STM32 chip as control core, a handheld smart terminal or personal computer as the carrier. The datas transmitted to intelligent terminal or computer through the bluetooth communication technology are processed rapidly, the data curve is drawed and the flatness characteristic parameters of the measured rail welding head is identified. The system provides a friendly intuitive monitoring and operation interface, has the characteristics of fast, reliable, energy saving, high accuracy, etc.
This document describes an embedded tsunami warning system that uses capacitive sensors and a microcontroller to detect changes in underwater pressure and send warning messages via mobile devices. The system includes an AT89C2051 microcontroller programmed to transmit sensor signals via infrared LED to a TSOP1738 receiver. If the receiver detects abnormal pressure levels, it triggers an alarm and sends SMS messages using a connected PC. The system aims to provide timely tsunami warnings through its low-cost, accurate, and long-lasting embedded design. Future enhancements could incorporate additional sensors and criteria to reduce false alarms before issuing tsunami warnings.
IRJET- Design and Implementation of Automated System as a Waiter in RestaurantIRJET Journal
This document describes the design and implementation of an automated system to serve as a waiter in a restaurant. The system uses various technologies like microcontrollers, wireless communication, and line following robots to replace human waiters. It aims to reduce customer wait times. The system consists of modules like an entrance module to seat customers, a customer module to take orders wirelessly, a chef module to receive orders, and a line following trolley module to deliver food. The system is designed to guide customers through the dining process automatically from seating to billing. While installation costs are high, it is intended to reduce labor costs through automation.
The document discusses programmable logic controllers (PLCs). It defines PLCs as digital electronic devices that use programmable memory to store instructions to control machines and industrial processes (sentence 1). PLCs were invented to replace sequential relay circuits for machine control and are now widely used for automation in factories, amusement rides, and other industrial applications (sentences 2-3). The document then provides details on the history and development of PLCs, their basic components and functions, programming methods, applications, advantages and disadvantages (sentences 4-15). It concludes by discussing trends in PLC usage, such as their suitability for hazardous environments and the growing market for programmable automation controllers (sentences 16-18).
Real Time Condition Monitoring of Power Plant through DNP3 ProtocolIJRES Journal
condition monitoring plays an important role in the functioning of heavy rotating systems. The working of these systems need to be monitored continuously and the reading are to taken into account. This mechanism became easy with the generation of the microprocessors. The readings can be acquired and stored them into the servers. With the advent of increasing internet facility’s the data acquiring, controlling and sharing has became an easy task through various protocols. Using this techniques the systems readings are noticed by the operator, even though he is not concerning machine.
This document discusses direct digital control (DDC), which uses a computer as an integral part of an industrial control loop. It describes the structure of a DDC system, including analog to digital converters to transform sensor signals and digital to analog converters to control actuators. Two common algorithms - position and velocity - are discussed for programming digital PID controllers. DDC offers advantages over analog control like flexibility to implement complex control schemes and improve process effectiveness, efficiency, and energy use. Examples of DDC applications in industries like steel, cement, and water treatment are provided.
IRJET- Building Monitoring using Wireless SystemIRJET Journal
This document discusses a building monitoring system using a wireless sensor network. The system monitors parameters like water tank level, gas leaks, fires and power failures. Sensors detect these parameters and send the data wirelessly via Bluetooth to a display and buzzer. The system aims to provide automated and low-power building monitoring to reduce manual effort and increase efficiency. It can detect issues and notify building occupants and security quickly to prevent hazards. The system was tested and able to accurately detect sensor readings and display notifications as intended.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document describes a system for monitoring transformer oil temperature using a PIC microcontroller. The system continuously monitors the oil temperature and automatically shuts down the transformer if the temperature exceeds safe limits. It displays the temperature readings for users. The system is designed to make transformers more secure and intelligent by detecting problems early to prevent costly failures or loss of service. It can cut operational and maintenance costs for transformers.
This document proposes an automatic license issuing system that uses sensors to monitor a driver's behavior during a driving test. The system aims to replace the current manual process of evaluating driving tests. Sensors like force sensors, piezo sensors, MEMS accelerometers, smoke sensors, and an LCD display are mounted on a test vehicle. The sensors collect data on the driver's control of the vehicle and emissions. This data is sent wirelessly via a ZigBee module to a remote server for analysis. The server compares the test data to reference data to evaluate the driver's performance and determine if a license should be issued. The goal is to objectively assess driving ability and prevent illegal or unsafe licenses from being issued.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
IRJET- FPGA Implementation of an Improved Watchdog Timer for Safety Critical ...IRJET Journal
This document describes the design and implementation of an improved configurable windowed watchdog timer that can be used in safety-critical applications. The proposed watchdog timer operates independently of the processor using a dedicated clock. It uses a windowed approach with service, frame, and controller windows that can be configured via software. The design was implemented in an FPGA and its effectiveness in detecting faults was validated by injecting faults through software. It was also implemented and tested in applications like an ATM and space launch vehicle control systems.
Medical remotely caring with COVID-19 virus infected people using optimized w...TELKOMNIKA JOURNAL
A human arm makes many functions that a robotic arm always programmed to make same functions. The human limbs motion can be captured using sensors that they will always copy hand movement. The rapid spread of the Coronavirus (COVID-19) virus and contacting the infections make the number of patients doubled in short time. The system proposed in this research can protect clinicians against infection with virus by reducing the contact with the infected and treat them remotely. This system type can be useful in different other fields of industrial works and defense where dangerous and delicate task can be done remotely without actual touch. Xbee shield is used to allow a hand glove flex sensor to communicate with the robotic arm using Zigbee wirelessly. Zigbee here is based on Xbee module from Max stream that can be communicate outdoor for 300 feet with the line of sight and indoor for 100 feet. Proportional, integral and derivative (PID) controller used in the proposed system to achieve smooth movement of limbs. The desired signal comes from flex sensor that connected to each limb. Kalman estimator proposed to find current state of each limb. In order to get better performance, particle swarm optimization (PSO) is used.
Similar to Annunciator for Hazard Prevention & Temperature Control (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Annunciator for Hazard Prevention & Temperature Control
1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 5, Issue 6 (May. - Jun. 2013), PP 45-48
www.iosrjournals.org
www.iosrjournals.org 45 | Page
Annunciator for Hazard Prevention & Temperature Control
Prof. Ms. Manjeet G. Granthi1
, Prof. Mrs. Mohini S. Rajule2
1
Lecturer in Electronics & Telecommunication Dept. MIT College Aurangabad-431005
2
Lecturer in Electronics & Telecommunication Dept. MIT College Aurangabad-431005
Abstract: It is a microcontroller based annunciator system that detects different faulty condition and inform
operator about it. It not only informs and announces about the faulty condition but also takes an initial to
control the hazard.The system will consist of sensor which gives view of the condition to be monitored. If any
abnormal condition arises then it gives indication to microcontroller. Microcontroller is programmed by user
according to need. The Microcontroller may inform to the owner of a property about the condition abnormality
and it set the driver on to take the remedial actions.
Keywords - Annunciator, AT89C51, DTMF, EPROM
I. Introduction
Today all instrumentation system pertaining to industrial process control as well as domestic
applications, like elevator control are centralized air conditioning control; involve some type of automatic fault
finding facility. This facility detects the faulty condition of the operation towards it, enabling him to take
suitable remedial action to ensure the proper operation of the system. One such method is annunciation.
Annunciator is a device giving audible as well as visible indication of several physical parameters. Annunicator
is a pilot device. A pilot device protects the process loop from serious hazardous condition by alerting the
operator about the erroneous condition about the process. Process is a group of physical unit devices, which
acts together to get desired objectives or output. Annunciator is device in which activation of a visual or a
mechanical indicator called annunciator takes place when a remote switch or device has been activated as result
of fault in certain part of the system. An audio alarm may also be associated with annunciator.
II. SYSTEM DEVELIPMENT
A. Block Diagram
The system will consist of sensor which gives view of the condition to be monitored. If any abnormal
condition arises then it gives indication to microcontroller. Microcontroller is programmed by user according to
need. The Microcontroller may inform to the owner of a property about the condition abnormality and it set the
driver on to take the remedial actions.
It consists of microcontroller. A smoke detector detects the fire and sends to microcontroller through
signal conditiones. The signal conditioner gives the conditioned information indicated to microcontroller. The
microcontroller sends the indication to fire brigade and also inform to the other no. specified to it according to
priority through DTMF Generator. A DTMF generator is already program with the contact no. to be dialed
according to priority. It also gives indication to voice recorder for giving alarm indication and keeps record of it.
Microcontroller drives relay to control the fire.The relay turns ON and OFF to control the temperature. The relay
also turns ON and OFF,the water pumps to turn off fire. The set up can also be used to monitor temperature
continuously.
Fig1. Block Diagram
The above figure is showing the block diagram of annunciator for hazard prevention and temperature control
which consist of different blocks as Micro controller, DTMF Generator, RTC, Relay Driver, ADC, Voice
recorder, Sensor and Signal conditioner.
2. Annunciator for Hazard Prevention & Temperature Control
www.iosrjournals.org 46 | Page
B. Micro Controller.
The microcontroller used is 89C51. The microcontroller should have a capability to distinguish between
the condition in normal and abnormal states. It also should take quick action after detection of danger. It should
have real time so we used MCS 89C51. The features of 89C51 microcontroller are given below.
Features :
Compatible with MCS-51 products.
4K Bytes of In-System Reprogrammable Flash Memory
Fully Static operation : 0 Hz to 24 MHz
Three-level program Memory lock
128 x 8 bit Internal RAM
32 Programmable I/o Lines.
Two 16 bit Timer/Counters
Six Interrupt Sources
Programmable Serial Channel
The AT89C51 is a low power, high-performance CMOS 8-bit micro Computer with 4K bytes of Flash
programmable and erasable read only memory (EPROM). The device is manufactured using Atmel's high density
nonvolatile memory technology and is compatible with the industry-standard MCS-51 instruction set and pin out.
The on-chip Flash allows the program memory to be reprogrammed in system or by a Conventional non volatile
memory programmer. By combining a versatile 8 bit CPU with flash on a monolithic chip, the Atmel AT89C51 is
a powerful microcomputer, which provides a highly flexible and cost-effective solution to many embedded
control applications.
II. PERFORMANCE ANALYSIS
In the automated place, the system performance can be done by providing a direct software interface
between the fire Alarm system and all other elements of the automation system. All large industries have
annunciator panels for various alarms. Indeed some fire departments can display floor plans of building in the
command center at a fire. It is logical next step to plug these displays into the alarm system to see the current
status of place and then make a prediction of next five minutes. Performance analysis involves gathering formal
and informal data to help customers and sponsors define and achieve their goals. Performance analysis uncovers
several perspectives on a problem or opportunity, determining any and all drivers towards or barriers to
successful performance, and proposing a solution system based on what is discovered. Performance analysis is
the front end of the front end. It's what we do to figure out what to do. Some synonyms are planning, scoping,
auditing, and diagnostics.
A. System Testing
System Testing is a critical element of measure of quality assurance and it represents the ultimate
review of specifications and design. The system is tested during the above methods by verification of the results
obtained by different methods. A number of both public-domain and commercial performance tools, explaining
how each is used to collect and display performance data. While the tools exhibit important differences, there
are also many similarities, and frequently our choice of tool will be driven more by availability than by the
features provided.
Paragraph is a portable trace analysis and visualization package developed at Oak Ridge National
Laboratory for message-passing programs. It was originally developed to analyze traces generated by a
message-passing library called the Portable Instrumented Communication Library (PICL) but can in principle be
used to examine any trace that complies to its format. Like many message-passing systems, PICL can be
instructed to generate execution traces automatically, without programmer intervention. Paragraph is an
interactive tool. Having specified a trace file, the user instructs Paragraph to construct various displays
concerning processor utilization, communication, and the like. The trace files consumed by Paragraph include,
by default, time-stamped events for every communication operation performed by a parallel program. Paragraph
performs on-the-fly data reduction to generate the required images. Users also can record events that log the
start and end of user-defined ``tasks.'' Paragraph's processor utilization displays allow the user to distinguish
time spent computing, communicating, and idling. Communication time represents time spent in system
communication routines, while idle time represents time spent waiting for messages. These displays can be used
to identify load imbalances and code components that suffer from excessive communication and idle time costs.
which shows a Gantt chart (top part) and a space time diagram (bottom part) for a parallel climate model
executing on 64 Intel DELTA processors. In the space-time diagram, the color of the lines representing
communications indicates the size of the message being transferred. The climate model is a complex program
with multiple phases. Initially, only processor 0 is active. Subsequently, the model alternates between
3. Annunciator for Hazard Prevention & Temperature Control
www.iosrjournals.org 47 | Page
computation and communication phases. Some of the communication phases involve substantial idle time,
which should be the subject of further investigation.
Communication displays can be used both to obtain more detailed information on communication
volumes and communication patterns and to study causal relationships, The communication matrix on the left
and the circle on the right both show instantaneous communication patterns. The colors in the communication
matrix indicate communication volume, as defined by the scale above the matrix. Most matrix entries are on the
diagonal, which indicates mostly nearest-neighbor communication. Another display in the top right presents
cumulative data on processor utilization.
A disadvantage of Paragraph is that the relationship between performance data and program source is
not always clear. This problem can be overcome in part by explicitly logging events that record the start and end
of ``tasks'' corresponding to different phases of a program's execution. Paragraph provides task Gantt and task
histogram displays to examine this information. Of the portable tools described here, Paragraph is probably the
simplest to install and use. Because it operates on automatically generated traces, it can be used with little
programmer intervention. Paragraph displays are particularly intuitive, although the inability to scroll within
display windows can be frustrating. Upshot is a trace analysis and visualization package developed at Argonne
National Laboratory for message-passing programs. It can be used to analyze traces from a variety of message-
passing systems: in particular, trace events can be generated automatically by using an instrumented version of
MPI. Alternatively, the programmer can insert event logging calls manually. Upshot's display tools are designed
for the visualization and analysis of state data derived from logged events. A state is defined by a starting and
ending event. (For example, an instrumented collective communication routine can generate two separate
events on each processor to indicate when the processor entered and exited the routine.) The Upshot Gantt chart
display shows the state of each processor as a function of time. States can be nested, thereby allowing multiple
levels of detail to be captured in a single display. States can be defined either in an input file or interactively
during visualization.
B. Calibration
Table 1. Calibration of analog input voltage in accordance with temperature in degree centigrade.
Reference voltage
(mv)
Temp in deg
Celsius
10 1
20 2
50 5
100 10
200 20
300 30
400 40
500 50
C. Theoretical Computations:
Vref-The reference voltage
Vin – input voltage set to 5V
Tout – output temperature
Output temp. is given by
Tout = (Vin X 2.56)/ Vref
For e.g. Vin = 5V and Vref = 387mV, then Tout will be
Tout =( 5 X 2.56)/387
Tout = 33o
C
Table 2 Comparison of Computational and experimental methods
Computational
output temp. (o
C)
Experimental
output temp (o
C)
%
Error
33 32.5 1.5
39 39.5 -1.5
54 53 1.85
58 57.9 0.17
72 71.6 0.5
4. Annunciator for Hazard Prevention & Temperature Control
www.iosrjournals.org 48 | Page
80 80.1 0.12
90 89.8 1.66
102 102.7 0.29
107 106.5 0.37
123 123.1 0.48
131 130 0.76
Comparison of computational and experimental
analysis
-20
0
20
40
60
80
100
120
140
1 2 3 4 5 6 7 8 9 10 11
%Error
Temp.indegcelsius
Computational output
temp. (oC)
Experimental output temp
(oC)
% Error
Fig.2 Comparison of Computational and Experimental Analysis
D. Justification for error:
The error introduced is due to loading effect of potentiometer used for temperature measurement. Since
the system is a wide range system which is to be used for large varying temperatures and the voltages, therefore
the care needs to be taken during the selection of the critical devices used , with regards to their operational
ranges and the input provided in order to get the precise output with respect to the input.
III. CONCLUSION
In today's complex design needs and more efficient integration and reliability and lower cost devices. In
the era of globalization and free economy everyday a new product is being launched in the market. Gone are the
days when a particular brand was having monopoly in Indian markets. In the present scenario when competition
is the keyword in the market, quality and minimum price is the mantra of success.
The automation is playing a vital role in the global world keeping the human needs in focus. The life is
becoming fully atomized and safety is given first priority with help of advance products and services of the
same which are made available at your doorstep. The economy is also changed according to the human needs
and therefore quality products and innovative products are also gearing their importance in changing technology
everyday the world has come at our door with full information through internet engines. The idea has struck to
mind that at various parts of industries, offices, banks, big malls, and educational institute etc, there is a big
problem of the security and safety from the fire hazards which will destroy and damage the properties of the
above mentioned organizations. This tends to think and use goods and products, which saves time and also save
unnecessary cost. The designing of Annunciator for Hazard Prevention & Temperature Control has come to
reality by developing the product through appropriate software and hardware.
REFERENCES
[1] Kenneth J Ayala, " The 8051 microcontroller" Architecture, programming & applications, 2nd Edition, penram international
publishing (India).
[2] Ajay V Deshmukh, " Microcontroller” Theory & applications, Tata Mc Graw Hill publishing company ltd., New Delhi.
[3] Muhammad Ali Mazidi, Janice Gillispie Mazidi," The 8051 Microcontroller & Embedded Systems" Pearson Education.
[4] AK Sawhney, " Electrical & Electronic measurements & instrumentation, 7th edition, Dhanpat Rai & Co. (p) Ltd., pp. 975-1000
[5] H.S.Kalsi, " Electronic instrumentation," Second edition, The Mcgraw- Hill Companies pp. 22-60,
[6] http://www.google.com.
[7] Manual of “Fire Alarm System”, by Photain Control System pp. 13-27
[8] Security Standard Technical Specification Manual pp. 110-128. http://www.allfirealarms.com.