295 research outputs found

    Smart Poultry House Monitoring System Using IoT

    Get PDF
    In modern India, the poultry industry is one of the largest and fastest growing segments of the agrarian economy. Due to standardized farming management and excellent manufacturing practices, chicken output has been steadily increasing in recent years. Automation is crucial in the modern world, and the Internet of Things (IoT) concept is also evolving rapidly. It is possible to automate manual processes using acertain technique. The project's objective is to use IoT technologies to automate management-related chores on a chicken farm. Environmental factors like temperature and humidity are just a few that have an impact on chicken wellness. By keeping an eye on the chicks according to their cycle, the proprietor is informed. The weight of the chicken is taken into consideration for high - quality manufacturing. If all these factors remain consistent, chicken production and quality increase

    Network Security in Organizations using Intrusion Detection System based on Honeypots

    Get PDF
    The role of the Internet is increasing and many technical, commercial and business transactions are conducted by a multitude of users that use a set of specialized / sophisticated network applications. Today we face threats of the network which cause enormous damage to the community day by day to the Internet. In this context, the task of network monitoring and surveillance is of utmost relevance and honeypots are promising tools for information and understanding of "areas of interest" of the attackers, and the possible relationship between blackhat teams. In this situation, people are increasingly trying to prevent their network security using traditional mechanisms, including firewalls, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a practitioner security, of course, they are tools that are intended to be attacked or interacted with other information about the attackers, their motives and tools. In this paper, we describe a comparative analysis of various IDS and their usefulness on various aspects. Two major categories of HoneyPot viz. low interaction honeypot and high-interaction honeypot have also been discussed in detail. In this paper, low-interaction honeypot is used as a traffic filter. Activities such as port scanning can be effectively detected by the weak interaction honeypot and stop there. Traffic that cannot be processed by the weak interaction honeypot is delivered over high-interaction honeypot. In this case, the weak interaction honeypot is used as a proxy for high-interaction honeypot then offer optimal realism

    Prototype Kandang Pintar Untuk Anak Ayam Dengan Monitoring Pengendalian Amonia Dan Pembersihan Kotoran Otomatis

    Get PDF
    Ayam pedaging merupakan bisnis usaha yang menjanjikan, tetapi ada berbagai permasalahan terkait dengan kebersihan kandang yang ditimbulkan oleh kotoran ayam dan bau amonia. Bahaya yang ditimbulkan antara lain produktivitas dan pertumbuhan ayam menjadi lambat. Oleh karena itu, dari permasalahan tersebut diperlukan sebuah sistem monitoring pengendalian gas amonia serta pembersihan kotoran secara otomatis. Sensor MQ135 digunakan untuk mengetahui kadar gas amonia dan DHT11 untuk membaca suhu kandang. Jika sensor MQ-135 membaca nilai konsentrasi gas amonia (>=20ppm) maka akan menghidupkan kipas dc selama beberapa detik sampai nilai amonia dibawah 20 ppm, jika gas amonia melebihi atau sama dengan 30ppm maka akan menghidupkan kipas dc dan menghidupkan pompa air sebagai pembersihan kotoran pada kandang selama beberapa detik sampai kotoran bersih. Blynk sebagai monitoring yang menampilkan hasil pembacaan dari sensor MQ-135 dan DHT11 di handphone, dan juga hasil dari pembacaan sensor-sensor akan tersimpan google sheet. Hasil dari penelitian ini menunjukkan bahwa prototipe kandang pintar berhasil memonitor kadar amonia di dalam kandang dan membersihkan kotoran secara otomatis. Sensor amonia berhasil mendeteksi kadar amonia yang tinggi dan memberikan notifikasi pada pengguna. Sistem pembersih kotoran otomatis berhasil membersihkan kotoran secara otomatis. Alat ini dapat membantu peternak meningkatkan kesehatan dan kenyamanan anak ayam secara efektif dan efisien

    Performance Evaluation of LoRa 915 MHz for Health Monitoring with Adaptive Data Rate

    Get PDF
    One of the problem factors in transmitting LoRa data using a small bit rate (bytes) of a maximum of 125 kbps is the amount of packet loss. This is because many end nodes send data to the server simultaneously; transmitting data effectively needs to be done because this is a major thing. So one mechanism that can be done is to use the Adaptive Data Rate method on the LoRa module. This research discusses the Adaptive Data Rate shown explicitly by the way it works and the effect it gives if ADR is applied to transmitting LoRa data. And how much influence on packet Loss (bytes). Adaptive Data Rate on LoRa Transmission is essential for regulating power on LoRa in terms of battery power saving; LoRa runs in UHF, which is in the 300 MHz-3 GHz range; LoRa in this research works at 915 MHz-920 MHz depending on the type of devices used. LoRa works with power or supply voltage of 2.1- 3.6 Volt DC, high sleep currents between 7.66 A up to 34 mA; in this research, LoRa is M2M between LoRa Transmitter and Receiver, which communicate alternately in sending sensor data with the delay method used for monitoring human health such as Pulse sensors, ECG sensors, and other sensors and these sensors' data is displayed in realtime using Thingspeak Application Server

    Air Force Institute of Technology Research Report 2015

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems Engineering and Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Air Force Institute of Technology Research Report 2015

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems Engineering and Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Regulating Mass Surveillance as Privacy Pollution: Learning from Environmental Impact Statements

    Get PDF
    Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides a quick summary of the Privacy Impact Notices ( PINs ) proposal to make a case in principle for the utility and validity of PINs. Next, the Article explains how environmental law responded to a similar set problems (taking the form of physical harms to the environment) with the National Environmental Policy Act of 1969 ( NEPA ), requiring Environmental Impact Statement ( EIS ) requirements for environmentally sensitive projects. Given the limitations of the current federal privacy impact analysis requirement, the Article offers an initial sketch of what a PIN proposal would cover and its application to classic public spaces, as well as virtual spaces such as Facebook and Twitter. The Article also proposes that PINs apply to private and public data collection -including the NSA\u27s surveillance of communications. By recasting privacy harms as a form of pollution and invoking a familiar (if not entirely uncontroversial) domestic regulatory solution either directly or by analogy, the PINs proposal seeks to present a domesticated form of regulation with the potential to ignite a regulatory dynamic by collecting information about the privacy costs of previously unregulated activities that should, in the end, lead to significant results without running afoul of potential U.S. constitutional limits that may constrain data retention and use policies. Finally, the Article addresses three counterarguments focusing on the First Amendment right to data collection, the inadequacy of EISs, and the supposed worthlessness of notice-based regimes

    A Decentralized Architecture for Active Sensor Networks

    Get PDF
    This thesis is concerned with the Distributed Information Gathering (DIG) problem in which a Sensor Network is tasked with building a common representation of environment. The problem is motivated by the advantages offered by distributed autonomous sensing systems and the challenges they present. The focus of this study is on Macro Sensor Networks, characterized by platform mobility, heterogeneous teams, and long mission duration. The system under consideration may consist of an arbitrary number of mobile autonomous robots, stationary sensor platforms, and human operators, all linked in a network. This work describes a comprehensive framework called Active Sensor Network (ASN) which addresses the tasks of information fusion, decistion making, system configuration, and user interaction. The main design objectives are scalability with the number of robotic platforms, maximum flexibility in implementation and deployment, and robustness to component and communication failure. The framework is described from three complementary points of view: architecture, algorithms, and implementation. The main contribution of this thesis is the development of the ASN architecture. Its design follows three guiding principles: decentralization, modularity, and locality of interactions. These principles are applied to all aspects of the architecture and the framework in general. To achieve flexibility, the design approach emphasizes interactions between components rather than the definition of the components themselves. The architecture specifies a small set of interfaces sufficient to implement a wide range of information gathering systems. In the area of algorithms, this thesis builds on the earlier work on Decentralized Data Fusion (DDF) and its extension to information-theoretic decistion making. It presents the Bayesian Decentralized Data Fusion (BDDF) algorithm formulated for environment features represented by a general probability density function. Several specific representations are also considered: Gaussian, discrete, and the Certainty Grid map. Well known algorithms for these representations are shown to implement various aspects of the Bayesian framework. As part of the ASN implementation, a practical indoor sensor network has been developed and tested. Two series of experiments were conducted, utilizing two types of environment representation: 1) point features with Gaussian position uncertainty and 2) Certainty Grid maps. The network was operational for several days at a time, with individual platforms coming on and off-line. On several occasions, the network consisted of 39 software components. The lessons learned during the system's development may be applicable to other heterogeneous distributed systems with data-intensive algorithms

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
    • …
    corecore