24 research outputs found

    Detection and Localization of Wireless Jammer using XBee module

    Get PDF
    Now days, wireless technologies has becomes more popular and affordable. In every field e.g. government sector, education, business, military, medical etc. use of wireless network have been increased which enables broad class of new applications. These applications make work easier and faster but one threat which is harmful i.e. jamming attack. The wireless jammer continually emits a radio signal along the same frequency that the wireless nodes use. Jamming technology generally does not discriminate between desirable and undesirable communication. A jammer can block all radio communication on any device that operates on radio frequencies within its range which create nuisance in our critical communication services. Most reliable solution to avoid nuisance is detection and localization of wireless jammer which helps to take further security actions. This project aims to detect wireless jammer and find the location of wireless jammer by experimental setup. DOI: 10.17762/ijritcc2321-8169.15017

    Detection and Localization of Wireless Jammer

    Get PDF
    In recent years, wireless technology has become more advanced, popular and affordable. Because of this broad class of new applications such as traffic monitoring, patient tracking, patient monitoring, video conferencing, video surveillance cameras monitoring of places like public buildings, banks, malls, railway stations etc. has increased which utilizes wireless networks. These applications are totally depends on wireless communication for their successful deployment. Security is most important issue to avoid nuisance in both routine and critical communications services. One threat for the security of wireless network is jamming attack. Jamming attacks can severely affect the performance of Wireless Networks due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. This will help to take further security actions. This project aims to find the location of wireless jammer by simulation method using MATLAB software

    A Survey on Efficient Life Detection System Using Microwave Signal

    Get PDF
    Thousands of persons killed as a reason behind earthquake. The on top of words is not the headlines of the newspaper, however, such news come back once the disaster destroyed the sector. The disaster within the big apple town at ‘World Trade Center’ claimed lives of quite 5000 individuals. It absolutely was aforementioned if survivors have been found and rescue earlier the numbers of victims are lower. There is without stopping to the amount of lives lost because the results of such disasters as landslides, folded tunnels and avalanches. The microwave life detection system is developed for the search and rescue of victims at bay underneath the dust of folded building throughout the earthquake or different disasters. The projected system utilizes L-band frequency that is ready to notice metabolic process and heart fluctuations. The operation principle relies on physicist frequency shift of the radiation mirrored from the buried victim. The schematic diagram of microwave Transmitting/Receiving (T/R) and litter cancellation scheme square measure enclosed during this report. During this report varied components of a microwave life detection system like antenna, directional mechanical device, and splitter has been mentioned. By advent of this technique the planet death rate as a reason behind an earthquake might decrease to larger extent

    Supply Chain Tracing and Anti-Counterfeiting with Distributed Ledger Technology

    Get PDF
    In recent times, there has been a rampant proliferation of counterfeit products that has left a trail of devastation in the manufacturing sectors. The repercussions of this extend to companies, impacting their brand reputation, revenue streams and overall profitability. Industries like agriculture, banking, electronics, and high-value deliveries uses the emergence of blockchain technology as a powerful tool to discern between authentic and counterfeit items. Its potential as a means to curtail the influx of fake products in the market is substantial. Blockchain technology, at its core, operates as a decentralized and distributed digital ledger system, meticulously recording transactions within interconnected blocks across multiple databases. The inherent security of this technology ensures the immutability of these blocks, rendering them invulnerable to alteration or hacking. By leveraging blockchain technology, consumers can independently verify the authenticity of a product, eliminating the need for reliance on third-party intermediaries. Incorporating recent technological advancements, the utilization of Quick Response (QR) codes offers a robust approach to combat the proliferation of counterfeit goods. The integration of blockchain technology with QR codes serves as a means to uphold the integrity of products. This innovative system securely stores product details and unique codes in the form of blocks,  where QR codes play a pivotal role in collecting and matching these unique codes with entries in the blockchain database. If the QR code matches with entries in the database, the user receives a confirmation of the product's authenticity; otherwise, an alert is triggered, signaling the presence of a counterfeit product

    Colour matching on wool using natural and synthetic dyes

    No full text
    303-308Wool fabric samples were dyed using natural dyes and mordants singly and in their binary mixtures. Computer colour matching system was used to evaluate these dyeings and generate matching dyeing recipes for synthetic trichromatic acid dyes which are ecofriendly. After dyeing with acid dyes, the natural dyed and acid dyed samples were evaluated for colour differences and it has been observed that in almost all cases, good matchings are observed for the natural dyed wool samples. This indicates that selective classes of synthetic dyes, which exhaust to higher levels and have proven non-toxicity, could be used with due concern to ecology and economy

    PSOC HARDWARE OF THE LSB IMAGE STEGANOGRAPHY

    No full text
    This paper demonstrates an information covering technique that utilizations lifting arrangements to effectively cover information in shading pictures. Productive information stowing without end should achieve the extraction of the hid data from the photo with abnormal state of data uprightness. Current examples bolster using electronic picture records as the cover archive to hide another propelled report that contains the secret message or information. Particular surges of cutting edge media can be used as a cover stream for a riddle message. Stenography is the strength of forming secret messages so that selective the sender and the proposed recipient think about the hid message. This paper introduces a method for riddle message encoding that makes use of wavelets. Wavelets isolate the stream into high and low repeat section parts called purposes of intrigue and examples

    Eco-friendly and economic method for Knoevenagel condensation by employing natural catalyst

    No full text
    1172-1175<span style="mso-bidi-font-weight: bold" lang="EN-GB">A simple, eco-friendly and economic method for Knoevenagel condensation of substituted aromatic as well as heteroaromatic aldehydes with malononitrile catalyzed by pineapple juice at room temperature in the absence of any organic solvent is described. </span

    Dyeing of wool with <i>Acacia pennata</i>

    No full text
    350-352Wool fabric has been dyed with an aqueous extract from the bark of Acacia pennata containing tannin as the major colourant. Dyeing with the combination of extracts of Acacia pennata and banana stem has also been carried out and improvement in depth of colour without altering the tone observed. The colour of the fabrics has been evaluated on computer colour matching system in terms of K/S and L* a* b* colour coordinates. The dyeing shows moderate to good fastness to washing, light and rubbing
    corecore