International journal of recent technology and engineering, Jul 30, 2019
In today's fast paced world, monitoring systems are necessary to track the changes in the environ... more In today's fast paced world, monitoring systems are necessary to track the changes in the environment for better understanding of current scenarios and predictions thereof. The same is true for fuel tanks in vehicles as well. By keeping strict track of fuel intake and consumption, vehicles can be made more fuel and cost efficient. This can be done using remote monitoring and data collection systems deployed at the site of the fuel storage tank. This proposed monitoring device is built on Atmega16 computer that takes fuel tank level information from its sensors and analyses this data at the sensor edge to find patterns using edge analytics technology. These patterns and data are streamed to the internet, either an android app or a website. This paper presents the implementation of such a monitoring system based on Internet of Things (IoT) technology to protect the fuel customers from theft at the gas stations and formulate better conservation strategies.
Solar energy is emerged as a most important source of renewable energy and are now widely used fo... more Solar energy is emerged as a most important source of renewable energy and are now widely used for industrial and domestic applications. Such systems are based on a solar collector, they are designed to collect the sun's energy and to convert it into either electrical power or thermal energy. Here we are utilizing solar energy to at home. Usually power is sent by the department and billing will be done to the supplied load. The conventional Electrical billing system where the Electric Power bill given at the end of the month can be paid at Power distribution offices or at e-seva centers. This billing system is little time consuming and very expensive. This traditional Electrical billing system can be replaced with intelligent energy metering system by utilizing the solar power at home and also to send the remaining amount of power to the electricity department if at all excess amount of power is produced. We are using ATmega328 as our controller. This is the heart of the entire ...
Information is the key source to mankind and securing it is the biggest task. Unauthorized access... more Information is the key source to mankind and securing it is the biggest task. Unauthorized access of information deals with the security. For securing the data many cryptographic lgorithmshasbeenproposed,fromallofthealgorithms Advanced Encryption Standard (AES) is one of the most widely used algorithm for data encryption and decryption. Many researchers have put their effort to develop a new prototype of cryptographic algorithm and triedtoimplementinFPGAsystem.AESisanetworkof all possible cases of data are scramble, which has mathematical operations performed and itseach output bit depends on every input bit. The encryption process and the decryption process of image isdone with using AES 128 bit encryption algorithm. The m*n image data is turned into a binary or hexadecimal format by using MATLABsyntaxandcreatea textfile.Byusingthis text file as an input and cipher text is fed to the AES for encryption and decryption process. The entire design is functionally simulated using ModelS...
International Journal of Recent Technology and Engineering (IJRTE), 2019
In today’s fast paced world, monitoring systems are necessary to track the changes in the environ... more In today’s fast paced world, monitoring systems are necessary to track the changes in the environment for better understanding of current scenarios and predictions thereof. The same is true for fuel tanks in vehicles as well. By keeping strict track of fuel intake and consumption, vehicles can be made more fuel and cost efficient. This can be done using remote monitoring and data collection systems deployed at the site of the fuel storage tank. This proposed monitoring device is built on Atmega16 computer that takes fuel tank level information from its sensors and analyses this data at the sensor edge to find patterns using edge analytics technology. These patterns and data are streamed to the internet, either an android app or a website. This paper presents the implementation of such a monitoring system based on Internet of Things (IoT) technology to protect the fuel customers from theft at the gas stations and formulate better conservation strategies.
Wireless Communication Networks and Internet of Things, 2018
Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communicat... more Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communication entitled Long-Term Evolution-Advanced (LTE-A). Security always plays a vital role in communication. Device-to-device (D2D) communication in LTE-A in between user equipments can be carried out using Secure Data Sharing Strategy (SeDS) via evolved node B (eNB) and Gateway (GW). But, communication between eNB and GW is not secure. And if this part of system will not be secure, further communication may get hampered. In this paper, implementation of optimised protocol has been shown. The proposed protocol enhances security in data communication between the nodes.
2015 International Conference on Pervasive Computing (ICPC), 2015
In this paper, we are trying to improve spectral efficiency, coverage, data capacity and channel ... more In this paper, we are trying to improve spectral efficiency, coverage, data capacity and channel capacity for 5G technology. Improvement in these parameters for 5G will make it more advanced, efficient and flexible. In order to achieve above parameters one can follow encoding technique based on Fastqz compression algorithm, then interleaving concept by using Prime interleaver. Afterword's, Trellis Coded Modulation with advanced technique of Extended Min-Sum algorithm (T-EMS), can be implemented to improve spectral efficiency followed by tunable polyphase filter.
Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communicat... more Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communication entitled Long-Term Evolution-Advanced (LTE-A). Security always plays a vital role in communication. Device-to-device (D2D) communication in LTE-A in between user equipments can be carried out using Secure Data Sharing Strategy (SeDS) via evolved node B (eNB) and Gateway (GW). But, communication between eNB and GW is not secure. And if this part of system will not be secure, further communication may get hampered. In this paper, implementation of optimised protocol has been shown. The proposed protocol enhances security in data communication between the nodes.
International journal of recent technology and engineering, Jul 30, 2019
In today's fast paced world, monitoring systems are necessary to track the changes in the environ... more In today's fast paced world, monitoring systems are necessary to track the changes in the environment for better understanding of current scenarios and predictions thereof. The same is true for fuel tanks in vehicles as well. By keeping strict track of fuel intake and consumption, vehicles can be made more fuel and cost efficient. This can be done using remote monitoring and data collection systems deployed at the site of the fuel storage tank. This proposed monitoring device is built on Atmega16 computer that takes fuel tank level information from its sensors and analyses this data at the sensor edge to find patterns using edge analytics technology. These patterns and data are streamed to the internet, either an android app or a website. This paper presents the implementation of such a monitoring system based on Internet of Things (IoT) technology to protect the fuel customers from theft at the gas stations and formulate better conservation strategies.
Solar energy is emerged as a most important source of renewable energy and are now widely used fo... more Solar energy is emerged as a most important source of renewable energy and are now widely used for industrial and domestic applications. Such systems are based on a solar collector, they are designed to collect the sun's energy and to convert it into either electrical power or thermal energy. Here we are utilizing solar energy to at home. Usually power is sent by the department and billing will be done to the supplied load. The conventional Electrical billing system where the Electric Power bill given at the end of the month can be paid at Power distribution offices or at e-seva centers. This billing system is little time consuming and very expensive. This traditional Electrical billing system can be replaced with intelligent energy metering system by utilizing the solar power at home and also to send the remaining amount of power to the electricity department if at all excess amount of power is produced. We are using ATmega328 as our controller. This is the heart of the entire ...
Information is the key source to mankind and securing it is the biggest task. Unauthorized access... more Information is the key source to mankind and securing it is the biggest task. Unauthorized access of information deals with the security. For securing the data many cryptographic lgorithmshasbeenproposed,fromallofthealgorithms Advanced Encryption Standard (AES) is one of the most widely used algorithm for data encryption and decryption. Many researchers have put their effort to develop a new prototype of cryptographic algorithm and triedtoimplementinFPGAsystem.AESisanetworkof all possible cases of data are scramble, which has mathematical operations performed and itseach output bit depends on every input bit. The encryption process and the decryption process of image isdone with using AES 128 bit encryption algorithm. The m*n image data is turned into a binary or hexadecimal format by using MATLABsyntaxandcreatea textfile.Byusingthis text file as an input and cipher text is fed to the AES for encryption and decryption process. The entire design is functionally simulated using ModelS...
International Journal of Recent Technology and Engineering (IJRTE), 2019
In today’s fast paced world, monitoring systems are necessary to track the changes in the environ... more In today’s fast paced world, monitoring systems are necessary to track the changes in the environment for better understanding of current scenarios and predictions thereof. The same is true for fuel tanks in vehicles as well. By keeping strict track of fuel intake and consumption, vehicles can be made more fuel and cost efficient. This can be done using remote monitoring and data collection systems deployed at the site of the fuel storage tank. This proposed monitoring device is built on Atmega16 computer that takes fuel tank level information from its sensors and analyses this data at the sensor edge to find patterns using edge analytics technology. These patterns and data are streamed to the internet, either an android app or a website. This paper presents the implementation of such a monitoring system based on Internet of Things (IoT) technology to protect the fuel customers from theft at the gas stations and formulate better conservation strategies.
Wireless Communication Networks and Internet of Things, 2018
Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communicat... more Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communication entitled Long-Term Evolution-Advanced (LTE-A). Security always plays a vital role in communication. Device-to-device (D2D) communication in LTE-A in between user equipments can be carried out using Secure Data Sharing Strategy (SeDS) via evolved node B (eNB) and Gateway (GW). But, communication between eNB and GW is not secure. And if this part of system will not be secure, further communication may get hampered. In this paper, implementation of optimised protocol has been shown. The proposed protocol enhances security in data communication between the nodes.
2015 International Conference on Pervasive Computing (ICPC), 2015
In this paper, we are trying to improve spectral efficiency, coverage, data capacity and channel ... more In this paper, we are trying to improve spectral efficiency, coverage, data capacity and channel capacity for 5G technology. Improvement in these parameters for 5G will make it more advanced, efficient and flexible. In order to achieve above parameters one can follow encoding technique based on Fastqz compression algorithm, then interleaving concept by using Prime interleaver. Afterword's, Trellis Coded Modulation with advanced technique of Extended Min-Sum algorithm (T-EMS), can be implemented to improve spectral efficiency followed by tunable polyphase filter.
Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communicat... more Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communication entitled Long-Term Evolution-Advanced (LTE-A). Security always plays a vital role in communication. Device-to-device (D2D) communication in LTE-A in between user equipments can be carried out using Secure Data Sharing Strategy (SeDS) via evolved node B (eNB) and Gateway (GW). But, communication between eNB and GW is not secure. And if this part of system will not be secure, further communication may get hampered. In this paper, implementation of optimised protocol has been shown. The proposed protocol enhances security in data communication between the nodes.
Uploads
Papers by payal tayade