24 research outputs found
Detection and Localization of Wireless Jammer using XBee module
Now days, wireless technologies has becomes more popular and affordable. In every field e.g. government sector, education, business, military, medical etc. use of wireless network have been increased which enables broad class of new applications. These applications make work easier and faster but one threat which is harmful i.e. jamming attack. The wireless jammer continually emits a radio signal along the same frequency that the wireless nodes use. Jamming technology generally does not discriminate between desirable and undesirable communication. A jammer can block all radio communication on any device that operates on radio frequencies within its range which create nuisance in our critical communication services. Most reliable solution to avoid nuisance is detection and localization of wireless jammer which helps to take further security actions. This project aims to detect wireless jammer and find the location of wireless jammer by experimental setup.
DOI: 10.17762/ijritcc2321-8169.15017
Detection and Localization of Wireless Jammer
In recent years, wireless technology has become more advanced, popular and affordable. Because of this broad class of new applications such as traffic monitoring, patient tracking, patient monitoring, video conferencing, video surveillance cameras monitoring of places like public buildings, banks, malls, railway stations etc. has increased which utilizes wireless networks. These applications are totally depends on wireless communication for their successful deployment. Security is most important issue to avoid nuisance in both routine and critical communications services. One threat for the security of wireless network is jamming attack. Jamming attacks can severely affect the performance of Wireless Networks due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. This will help to take further security actions. This project aims to find the location of wireless jammer by simulation method using MATLAB software
A Survey on Efficient Life Detection System Using Microwave Signal
Thousands of persons killed as a reason behind earthquake. The on top of words is not the headlines of the newspaper, however, such news come back once the disaster destroyed the sector. The disaster within the big apple town at ‘World Trade Center’ claimed lives of quite 5000 individuals. It absolutely was aforementioned if survivors have been found and rescue earlier the numbers of victims are lower. There is without stopping to the amount of lives lost because the results of such disasters as landslides, folded tunnels and avalanches. The microwave life detection system is developed for the search and rescue of victims at bay underneath the dust of folded building throughout the earthquake or different disasters. The projected system utilizes L-band frequency that is ready to notice metabolic process and heart fluctuations. The operation principle relies on physicist frequency shift of the radiation mirrored from the buried victim. The schematic diagram of microwave Transmitting/Receiving (T/R) and litter cancellation scheme square measure enclosed during this report. During this report varied components of a microwave life detection system like antenna, directional mechanical device, and splitter has been mentioned. By advent of this technique the planet death rate as a reason behind an earthquake might decrease to larger extent
Supply Chain Tracing and Anti-Counterfeiting with Distributed Ledger Technology
In recent times, there has been a rampant proliferation of counterfeit products that has left a trail of devastation in the manufacturing sectors. The repercussions of this extend to companies, impacting their brand reputation, revenue streams and overall profitability. Industries like agriculture, banking, electronics, and high-value deliveries uses the emergence of blockchain technology as a powerful tool to discern between authentic and counterfeit items. Its potential as a means to curtail the influx of fake products in the market is substantial. Blockchain technology, at its core, operates as a decentralized and distributed digital ledger system, meticulously recording transactions within interconnected blocks across multiple databases. The inherent security of this technology ensures the immutability of these blocks, rendering them invulnerable to alteration or hacking. By leveraging blockchain technology, consumers can independently verify the authenticity of a product, eliminating the need for reliance on third-party intermediaries. Incorporating recent technological advancements, the utilization of Quick Response (QR) codes offers a robust approach to combat the proliferation of counterfeit goods. The integration of blockchain technology with QR codes serves as a means to uphold the integrity of products. This innovative system securely stores product details and unique codes in the form of blocks, where QR codes play a pivotal role in collecting and matching these unique codes with entries in the blockchain database. If the QR code matches with entries in the database, the user receives a confirmation of the product's authenticity; otherwise, an alert is triggered, signaling the presence of a counterfeit product
Colour matching on wool using natural and synthetic dyes
303-308Wool
fabric samples were dyed using natural dyes and mordants singly and in their
binary mixtures. Computer colour matching system was used to evaluate these
dyeings and generate matching dyeing recipes for synthetic trichromatic acid dyes
which are ecofriendly. After dyeing with acid dyes, the natural dyed and acid
dyed samples were evaluated for colour
differences
and it has been observed that in almost all cases, good matchings are observed
for the natural dyed wool samples. This indicates that selective classes of
synthetic dyes, which exhaust to higher levels and have proven non-toxicity, could
be used with due concern to ecology and economy
PSOC HARDWARE OF THE LSB IMAGE STEGANOGRAPHY
This paper demonstrates an information covering technique that utilizations lifting arrangements to effectively cover information in shading pictures. Productive information stowing without end should achieve the extraction of the hid data from the photo with abnormal state of data uprightness. Current examples bolster using electronic picture records as the cover archive to hide another propelled report that contains the secret message or information. Particular surges of cutting edge media can be used as a cover stream for a riddle message. Stenography is the strength of forming secret messages so that selective the sender and the proposed recipient think about the hid message. This paper introduces a method for riddle message encoding that makes use of wavelets. Wavelets isolate the stream into high and low repeat section parts called purposes of intrigue and examples
Eco-friendly and economic method for Knoevenagel condensation by employing natural catalyst
1172-1175<span style="mso-bidi-font-weight:
bold" lang="EN-GB">A simple, eco-friendly and economic method for
Knoevenagel condensation of substituted aromatic as well as heteroaromatic
aldehydes with malononitrile catalyzed by pineapple juice at room temperature
in the absence of any organic solvent
is described.
</span
Dyeing of wool with <i>Acacia pennata</i>
350-352Wool fabric has been dyed with an aqueous
extract from the bark of Acacia pennata containing tannin as the major colourant.
Dyeing with the combination of extracts of Acacia pennata and banana stem
has also been carried out and improvement in depth of colour without altering the
tone observed. The colour of the fabrics has been evaluated on computer colour
matching system in terms of K/S and L* a* b*
colour coordinates. The dyeing shows moderate to good fastness to washing, light
and rubbing