Iot Based Coal Mine Safety System

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 79

IOT BASED COAL MINE SAFETY SYSTEM

ABSTRACT
The Coal mining industry is very important for the nation’s economy. The Need
for coal is high now a days. Coal plays a vital role in generation of electricity, steel
and cement production. Now a days thousands of miners lose them from mining
accidents each year mainly from underground coal mining. Coal mining is considered
much more dangerous than hard rock mining. Most of the deaths occur in developing
countries such as India, Argentina, Armenia and rural parts of developed countries.
Keeping this in mind we design a helmet for the safety of mine workers. In our system
we are detecting dangerous gas such as methane and carbon monoxide and
temperature and humidity and Fire in underground area and nRF24L01 are used for
transferring collected values. To save mine workers life in underground mining smart
system have been developed. The sensors are connected to a microcontroller which is
place in underground coal mining areas which detects the value and sends through
IOT which is placed in the system. The system also consists of microcontroller and
LCD display. The dangerous gases, temperature and fire parameters are detected using
gas sensor, temperature sensor and fire sensor if the collected values of sensors are
compared with limit, if its greater than the system gives alert signal as well as turns on
the LCD and shows the status. The status of the gas sensors and temperature sensor
values are transmitting to the mine workers by using IOT. By transmitting that
detected information from the sensor to the miners’ helmet we can give warning so
they can take safety precautions.

This project uses regulated 5V, 500mA power supply. Unregulated 12V DC is
used for relay. 7805 three terminal voltage regulator is used for voltage regulation.
Bridge type full wave rectifier is used to rectify the ac output of secondary of 230/12V
step down transformer.
CHAPTER 1
INTRODUCTION TO EMBEDDED SYSTEMS

1.1 INTRODUCTION:

Microcontroller are widely used in Embedded Systems products. An


Embedded product uses the microprocessor (or microcontroller) to do one task &
one task only. A printer is an example of Embedded system since the processor
inside it perform one task only namely getting the data and printing it. Although
microcontroller is preferred choice for many Embedded systems, there are times
that a microcontroller is inadequate for the task. For this reason, in recent years
many manufactures of general-purpose microprocessors such as INTEL, Motorola,
AMD & Cyrix have targeted their microprocessors for the high end of Embedded
market. One of the most critical needs of the embedded system is to decrease
power consumptions and space. This can be achieved by integrating more functions
into the CPU chips. All the embedded processors have low power consumptions in
additions to some forms of I/O, ROM all on a single chip. In higher performance
Embedded system, the trend is to integrate more & more function on the CPU chip
& let the designer decide which feature he/she wants to use.

1.2 EMBEDDED SYSTEM:

Physically, embedded systems range from portable devices such as


digital watches and MP3 players, to large stationary installations like traffic lights,
factory controllers, or the systems controlling nuclear power plants. Complexity
varies from low, with a single microcontroller chip, to very high with multiple
units, peripherals and networks mounted inside a large chassis or enclosure

In general, "embedded system" is not an exactly defined term, as many


systems have some element of programmability. For example, Handheld
computers share some elements with embedded systems such as the operating
systems and microprocessors which power them but are not truly embedded
systems, because they allow different applications to be loaded and peripherals to
be connected. Embedded systems span all aspects of modern life and there are
many examples of their use. Telecommunications systems employ numerous
embedded systems from telephone switches for the network to mobile phones at
the end-user. Computer networking uses dedicated routers and network bridges to
route data.

Examples of Embedded System:

 Automated teller machines (ATMS).


 Integrated system in aircraft and missile.
 Cellular telephones and telephonic switches.
 Computer network equipment, including routers timeservers and firewalls
 Computer printers, Copiers.
 Disk drives (floppy disk drive and hard disk drive)
 Engine controllers and antilock brake controllers for automobiles.
 Home automation products like thermostat, air conditioners sprinkles
and security monitoring system.
 House hold appliances including microwave ovens, washing machines, TV
sets DVD layers/recorders.
 Medical equipment.
 Measurement equipment such as digital storage oscilloscopes, logic
analyzers and spectrum analyzers.
 Multimedia appliances: internet radio receivers, TV set top boxes.
 Small hand-held computer with P1M5 a n d other applications.
 Programmable logic controllers (PLC’s) for industrial automation and
monitoring.
 Stationary video game controllers.

1.3 CHARACTERISTICS:

Embedded systems are designed to do some specific tasks, rather than be


a general-purpose computer for multiple tasks. Some also have real-time
performance constraints that must be met, for reasons such as safety and usability;
others may have low or no performance requirements, allowing the system
hardware to be simplified to reduce costs.
Embedded systems are not always standalone devices. Many embedded
systems consist of small, computerized parts within a larger device that serves a
more general purpose. For example, the Gibson Robot Guitar features an
embedded system for tuning the strings, but the overall purpose of the Robot Guitar
is, of course, to play music. Similarly, an embedded system in an automobile
provides a specific function as a subsystem of the car itself.

The software written for embedded systems is often called firmware,


and is usually stored in read-only memory or Flash memory chips rather than a disk
drive. It often runs with limited computer hardware resources: small or no
keyboard, screen, and little memory.

1.4 MICROPROCESSOR (MP):

A microprocessor is a general-purpose digital computer central


processing unit (CPU). Although popularly known as a “computer on a chip” is in
no sense a complete digital computer. The block diagram of a microprocessor CPU
is shown, which contains an arithmetic and logical unit (ALU), a program
counter (PC), a stack pointer (SP), some working registers, a clock timing circuit,
and interrupt circuits.

Seria
CPU
RAM ROM l
I/O Port Timer COM
General
MICROCONTR Port
OLLERS (MC)-
Purpose

Fig 1.1 Block diagram of microprocessor

1.5 MICROCONTROLLER (MC):

Figure shows the block diagram of a typical microcontroller. The design


incorporates all of the features found in micro-processor CPU: ALU, PC, SP,
and registers. It also added the other features needed to make a complete
computer: ROM, RAM, parallel I/O, serial I/O, counters, and clock circuit.
Fig 1.2 Microcontroller

1.6 Comparison between microprocessor and


microcontroller

The microprocessor must have many additional parts to be


operational as a computer whereas microcontroller requires no additional
external digital parts.
1. The prime use of microprocessor is to read data, perform
extensive calculations on that data and store them in the mass storage
device or display it. The prime functions of microcontroller is to read
data, perform limited calculations on it, control its environment based on
these data. Thus, the microprocessor is said to be general-purpose digital
computers whereas the microcontroller is intended to be special purpose
digital controller.
2. Microprocessor need many opcodes for moving data from the
external memory to the CPU, microcontroller may require just one or
two, also microprocessor may have one or two types of bit handling
instructions whereas microcontrollers have many.
Peripherals:

Embedded Systems talk with the outside world via peripherals, such as
 Serial Communication Interfaces (SCI): RS-232, RS-422, RS-
485etc
 Synchronous Serial Communication Interface: I2C, JTAG, SPI,
SSC and ESSI
 Universal Serial Bus (USB)
 Networks: Ethernet, Controller Area Network, LAN networks,
etc.
 Timers: PLL(s), Capture/Compare and Time Processing Units
 Discrete IO: aka General Purpose Input/output (GPIO)
 Ana log to Digital/Digital to Analog (ADC/DAC)

Tools:

As for other software, embedded system designers use compilers,


assemblers, and debuggers to develop embedded system software.
However, they may also use some more specific tools:

 Utilities to add a checksum or CRC to a program, so the


embedded system can check if the program is valid.
 For systems using digital signal processing, developers may use a
math workbench such as MATLAB, Simulink, Mathcad, or
Mathematica to simulate the mathematics. They might also use
libraries for both the host and target which eliminates developing
DSP routines as done in DSP nano RTOS and Unison Operating
System.
 Custom compilers and linkers may be used to improve
optimization for the particular hardware.
 An embedded system may have its own special language or
design tool, or add enhancements to an existing language such as
Forth or Basic.
 Another alternative is to add a Real-time operating system or
Embedded operating system, which may have DSP capabilities
like DSP Nano RTOS.
CHAPTER 2

OVERVIEW OF THE PROJECT

2.1 INTRODUCTION:
Mining Industry can be categories as the most essential application
for any developed country. It provides extraction and discovery of the
underground materials. From Iron, gold, coal and diamond. Internet of
Things is an information and Communication Technology (ICT) used to
represent Wireless Sensor Network (WSN) communications, using the
defined protocol IEEE 802.14.5 that enables Low Rate- Wide Area
Network (LR-WAN) to communicate using specific modulation
technique. The basic examples are, ZigBee, LORA and Sigfox network
and more. Each of them has its own benefits and disadvantages,
depending on the project application and requirements the protocols are
shortlisted. LR-WAN is the defined protocol to be used for technique
which provides long transmission range over low bit rate power while
the operating frequency is fixed. Which in return benefits the material
fabrication cost. IOT can be used in most of the developed application
such as, smart parking system, smart building management and smart
energy monitoring system. The architecture of IOT consists of three
techniques materials web-based model (things), protocol (Wireless) and
monitoring devices (Sensors) (GYU, 2014) (NAGARAJA, 2017) (Raed
et al, 2018).
Pranjal Hazarika (2016) proposed the implementation of safety
helmet system for coal mining industry, to outdo the hazardous gas using
methane and carbon monoxide gas sensor. After that, the sensors are
deployed to sense and identify the level of sensed gas. In addition,
whenever the sensed gas exceeds the specified amount an alarm trigger
will occur alerting the miners and preventing an upcoming incident.
(NAGARAJA, 2017), proposed a smart helmet model for mining
industry to identify that occurs with dangerous events. The proposed
system is able to measure quality of air, removal of minor helmet, and
object crash on the helmet. Quality of air is used to measure humidity
and gas using sensors. Gas is determined by the demarcation level of
carbon monoxide as well as humidity sensor to detect the humidity in the
environment. An IR sensor used to detect the removal helmet from the
minor’s head. And Pressure sensor is placed in the helmet by fixing the
neck injury criteria to 34 PSI it is considered as hazard events when it
overcome the value. Rashmi Vashisth & Sanchit Gupta (2017), proposed
smart helmet to reduce the incrimination of motorbike accidents. Where
the system consists of two sections helmet and bike. Each of them works
in synchronization using Radio Frequency module to send Wireless
communication between each other. GSM module is established for
SMS message. Praveen Kulkarni & Sangam (2017) proposed a new
method of monitoring the environment surrounded by a smart helmet,
which can achieve variety of safety factors (temperature, gas, collision)
gases that is poisoned to be around the minor. The researchers developed
the system with ARM processor and communicated with ZigBee
protocol to retrieve and send the data. Lathapriya & Dhanalakshmi
(2017) proposed a new smart and safety system that is capable of
providing the environment information such as, Temperature, pressure
and alert the control room when a collision happens or helmet is being
removed by the minor. Panic switch button is applied to provide
supportive methods for the minor in case of emergency situations.
The underground mine is not fully discovered yet. Hence, their
critical work in the underground may results in dangerous events that
can increase the concentration of the harmful gases. Hazardous gases
and surrounding climate may change significantly without being noticed
by them are the first problem that may causes death to them. Moreover,
the complex structure of the mine can trigger obstacle to fall down on
the miner’s head that may results in serious injuries was considered the
second problem to the miners. Therefore, the objectives of the proposed
system are to design SHS for mining industry application with the usage
of IoT automated system to detect and control the significant results
from the LPG, Smoke and CO gases and alert the control room center
with the help of a Graphical User Interface. To design a monitoring
system that monitors the climate changes and update the management
with real time data. To Integrate both systems and evaluate the power
consumption of the designed helmet system.

2.2 EXISTING SYSTEM

Bluetooth based:
This present device A fee of effective Bluetooth based wireless mine
supervising device with Bluetooth is offered right here. Here we layout a
clever helmet, which allow the helmet as a mobile sensor node of
Bluetooth wi-fi sensor networks, accumulating parameters the
temperature, humidity and illumination stage of underground
environment and will alert the valuable management unit in case of
extraordinary situation. We additionally design a voice transmission
system, based totally at the equal low-price wireless networks. So, with
environmental monitoring, the cool miners can talk with manage centers
or with different miners through wireless Bluetooth verbal exchange.

Zigbee Based:
In the existing system the helmet is fixed with the gas sensor which
could sense the hazardous gases such as the carbon monoxide and
methane at the coal miners working environment, In the suspect of the
hazardous event the microcontroller sends the alarm to the control room,
here the data transmission is done through the ZigBee, which has the low
consumption of the power, affordable price and low maintenance. The
main disadvantage of the existing system is scalability, ZigBee tends to
transmit the data over the small distance. The low data coverage will
lead to the inefficient data transmission, which in turn leads to the delay
of the data transmission at the receiver end. This makes the life of the
coal miners unsecured.
2.3 PROPOSED SYSTEM
In mining industry worker safety is very important issue. Every year,
thousands of miners die in accidents and many more get injured,
especially in the processes of the coal mining and hard rock mining. The
main reason of accidents are gas or dust explosions, gas intoxications,
improper use of explosives, electrical burn, fires, collapsing of mine
structures, rock falls from roofs, flooding, workers
stumbling/falling/slipping, or errors from malfunctioning or improperly
used mining equipment. In coal mine use of personal protective
equipment like helmet, shoes etc. are not proper and proper
arrangements were not there to check if the person is wearing personal
protective equipment or not. The proper supervision for worker wears
the protective element is very important factor for consideration.
Underground mines are very dark so any miners are fall unconscious
because of suffocation or falling of structure, supervisor don’t know
about his health condition and proper treatment is not provided him in
time. The main reason for miner death is harmful gases explosions. In
coal mines carbon monoxide, methane, LPG gases existing and they are
very harmful for human body.
The proper supervision and proper communication are very important
requirement of mining industries. The smart helmet provides a real time
monitoring of harmful gases, proper light intensity for work, humidity
and miner is wearing the helmet or not. The harmful gases like carbon
monoxide, LPG, Methane and also temperature are monitor using this
system. The wired communication network is not so effective because
when natural calamity or a roof fall occurred, wired network is damages,
so it is very difficult and costly to reinstall the entire system. The
effective solution for communication from base station to underground
mine is IOT based wireless network.
The smart helmet for mining industry consists of various sensors
which are fixed on the helmet. The sensors used are Gas Sensor,
Temperature Sensor, Humidity Sensor, and Liquid sensor to detect
weather the miner wearing helmet or not. By using IOT module the mine
information like environmental parameters in mine or wearing helmet or
not can be seen anywhere anytime by using internet. So, the proper
action can take within time to rescue the miner.

2.3.1 BLOCK DIAGRAM OF PROPOSED SYSTEM

FIRE
RPS
SENSOR

LM35 IOT

ESP 32
GAS DC MOTOR
SENSOR (ROBO)

HUMIDITY LCD
SENSOR

Fig 2.1 Block Diagram

HARDWARE COMONENTS
 Power Supply
 ESP32
 LM35
 Gas Sensor
 Humidity Sensor
 Fire Sensor
 DC Motor
 LCD

2.3.3 SOFTWARE COMPONENTS


 Arduino IDE
 Proteus

2.3.4 TECHNOLOGY USED


 IOT Technology
CHAPTER 3
IOT TECHNOLOGY

3.1INTRODUCTION OF IOT TECHNOLOGY

1. The term "Internet of Things" has come to describe a number of


technologies and research disciplines that enable the Internet to
reach out into the real world of physical objects.
2. The Internet of Things, also called The Internet of Objects,
refers to a wireless network between objects.
3. From any time, any place connectivity for anyone, we will now
have connectivity for anything!

Fig 3.1 IOT Technology

1.1.1 THE VISION

To improve human health and well-being is the ultimate goal of any


economic, technological and social development. The rapid rising and
aging of population are one of the macro powers that will transform the
world dramatically, it has caused great pressure to food supply and
healthcare systems all over the world, and the emerging technology
breakthrough of the Internet-of-Things (IoT) is expected to offer
promising solutions (National Information Council 2008). Therefore, the
application of IoT technologies for the food supply chain (FSC) (so-
called Food-IoT) and in-home healthcare (IHH) (so-called Health-IoT1)
have been naturally highlighted in the strategic research roadmaps
(European Commission Information Society 2009). To develop
practically usable technologies and architectures of IoT for these two
applications is the final target of this work. The phrase "Internet of
Things" (IoT) was coined at the beginning of the 21st century by the
MIT Auto-ID Center with special mention to Kevin Ashton (Ashton
2009) and David L. Brock (Brock 2001). As a complex cyber- physical
system, the IoT

Integrates all kinds of sensing, identification, communication,


networking, and informatics devices and systems, and seamlessly
connects all the people and things upon interests, so that anybody, at any
time and any place, through any device and media, can more efficiently
access the information of any object and any service (ITU 2005,
European Commission Information Society 2008 and 2009).
“Ubiquitous” is the distinct feature of IoT technologies, so the IoT is
often related to ubiquitous identification (Sheng et al. 2010), ubiquitous
sensing (ITU-T, 2008), ubiquitous computing (Fried Ewald and Raabe
2011), ubiquitous intelligence (Zheng et al. 2008), etc. As shown in
Figure 1-1, a vivid description of this vision has been illustrated in a
report by The Economist in 2007 (The Economist 2007).

A vivid description of the vision of Internet-of-Things


(Authorized by Jon Berkeley) The impact caused by the IoT to human
life will be as huge as the internet has caused in the past decades, so the
IoT is recognized as “the next of internet”. A part of the enabling
technologies are sensors and actuators, Wireless Sensor Network
(WSN), Intelligent and Interactive Packaging (I2Pack), real-time
embedded system, Microelectromechanical Systems (MEMS), mobile
internet access, cloud computing, Radio Frequency Identification
(RFID), Machine-to-Machine (M2M) communication, human machine
interaction (HMI), middleware, Service Oriented Architecture (SOA),
Enterprise Information System (EIS), data mining, etc. With various
descriptions from various viewpoints, the IoT has become the new
paradigm of the evolution of information and communication technology
(ICT).

3.2 CHARACTERISTICS FOR INTERNET OF


THINGS: -

 Event driven

 Ambient intelligence

 Flexible structure

 Semantic sharing

 Complex access technology

Anyone who says that the Internet has fundamentally changed


society may be right, but at the same time, the greatest transformation
actually still lies ahead of us. Several new technologies are now
converging in a way that means the Internet is on the brink of a
substantial expansion as objects large and small get connected and
assume their own web identity.

Following on from the Internet of computers, when our servers


and personal computers were connected to a global network, and the
Internet of mobile telephones, when it was the turn of telephones and
other mobile units, the next phase of development is the Internet of
things, when more or less anything will be connected and managed in
the virtual world. This revolution will be the Net’s largest enlargement
ever and will have sweeping effects on every industry — and all of our
everyday lives.

Smart connectivity with existing networks and context-aware


computation using network resources is an indispensable part of IoT.
With the growing presence of Wi-Fi and 4G-LTE wireless Internet
access, the evolution towards ubiquitous information and communication
networks is already evident. However, for the Internet of Things vision
to successfully emerge, the computing paradigm will need to go beyond
traditional mobile computing scenarios that use smart phones and
portables, and evolve into connecting everyday existing objects and
embedding intelligence into our environment. For technology to
disappear from the consciousness of the user, the Internet of Things
demands: a shared understanding of the situation of its users and their
appliances, software architectures and pervasive communication
networks to process and convey the contextual information to where it is
relevant, and the analytics tools in the Internet of Things that aim for
autonomous and smart behavior. With these three fundamental grounds
in place, smart connectivity and context-aware computation can be
accomplished.

A radical evolution of the current Internet into a Network of


interconnected objects that not only harvests information from the
environment (sensing) and interacts with the physical world (actuation/
command/control), but also uses existing Internet standards to provide
services for information transfer, analytics, applications, and
communications. Fueled by the prevalence of devices enabled by open
wireless technology such as Bluetooth, radio frequency identification
(RFID), Wi-Fi, and telephonic data services as well as embedded sensor
and actuator nodes, IoT has stepped out of its infancy and is on the verge
of transforming the current static Internet into a fully integrated Future
Internet.

The Internet revolution led to the interconnection between


people at an unprecedented scale and pace. The next revolution will be
the interconnection between objects to create a smart environment. Only
in 2011 did the number of interconnected devices on the planet overtake
the actual number of people. Currently there are 9 billion interconnected
devices and it is expected to reach 24 billion devices by 2020. According
to the GSMA, this amounts to $1.3 trillion revenue opportunities for
mobile network operators alone spanning vertical segments such as
health, automotive, utilities and consumer electronics.

3.3DEFITNITION OF INTERNET OF THINGS (IoT)

“Today computers—and, therefore, the Internet—are almost


wholly dependent on human beings for information. Nearly all of the
roughly 50 petabytes(a petabyte is 1,024 terabytes) of data available on
the Internet were first captured and created by human beings— by
typing, pressing a record button, taking a digital picture, or scanning a
bar code. Conventional diagrams of the Internet … leave out the most
numerous and important routers of all - people. The problem is, people
have limited time, attention and accuracy—all of which means they are
not very good at capturing data about things in the real world. And that's
a big deal. We're physical, and so is our environment … You can't eat
bits, burn them to stay warm or put them in your gas tank. Ideas and
information are important, but things matter much more. Yet today's
information technology is so dependent on data originated by people that
our computers know more about ideas than things. If we had computers
that knew everything there was to know about things—using data they
gathered without any help from us—we would be able to track and count
everything, and greatly reduce waste, loss and cost. We would know
when things needed replacing, repairing or recalling, and whether they
were fresh or past their best. The Internet of Things has the potential to
change the world, just as the Internet did. Maybe even more so”.

“Things are active participants in business, information and social


processes where they are enabled to interact and communicate among
themselves and with the environment by exchanging data and
information sensed about the environment, while reacting autonomously
to the real/physical world events and influencing it by running processes
that trigger actions and create services with or without direct human
intervention.”
“The Internet of Things represents an evolution in which objects are
capable of interacting with other objects. Hospitals can monitor and
regulate pacemakers’ long distance, factories can automatically address
production line issues and hotels can adjust temperature and lighting
according to a guest's preferences, to name just a few examples.”

3.4 24 HOURS IN FUTURE WITH INTERNET OF


THINGS
How many devices do you currently own? Three, four or more?
A laptop, a tablet, a smartphone or even a smart watch and a smart band
or the new Nike smart shoes maybe? It goes without saying that
technology has become an indispensable part of our lives.

Here is how 24 hours would like in the future with IoT-

I wouldn’t need to set an alarm for the next day. My smartphone


will pick up the time of my meeting from my digital calendar will
connect to estimate the real time traffic and predict my travelling time to
the meeting venue will analyze how much time I usually take to get
ready AND finally it will calculate how early I need to wake up!

My smart heater would know that I am up and it will adjust the


water temperature according to my preference.

When I'll be ready to leave the house, the smart refrigerator will
tell me that there is milk and fruits for my breakfast and I shouldn’t eat
cheese today because I didn’t exercise yesterday. It is so smart that if any
food item has finished or expired- it will connect to the supermarket on
the internet, order my groceries and I would be able to pay sitting from
anywhere anytime through my mobile wallet.

When I am finished eating breakfast, my smart car will turn the


AC on so that as soon as I start driving there is a favorable temperature
in the car and smart radio will be automatically turned to my favorite
radio station. When let's say I get back from a yoga class, my smart
clothing will know that I am sweating and this data will be sent to my
smart home temperature system which will adjust the room temperature
as soon as I enter the house to make me feel comfortable.

These devices are so smart that they would be collecting data from my
physical movements and will monitor my activities and behavior to
do predictive analysis of my routine and preferences. You would be
amazed at how many such smart devices already exist or are going to be
available in the near future to make up a powerful Internet of Things.

3.5ARCHITECTURE OF INTERNET OF THINGS

Architecture of internet Of Things contains basically 4 layers:

Application Layer

1. Gateway and the network layer


2. Management Service layer
3. Sensor layer

3.5.1 APPLICATION LAYER:


 Lowest Abstraction Layer

 With sensors we are creating digital nervous system.

 Incorporated to measure physical quantities

 Interconnects the physical and digital world

 Collects and process the real time information

3.5.2 GATEWAY AND THE NETWORK LAYER:


 Robust and High-performance network infrastructure

 Supports the communication requirements for latency, bandwidth


or security

 Allows multiple organizations to share and use the same network


independently

3.5.3 MANAGEMENT LAYER:


 Capturing of periodic sensory data

 Data Analytics (Extracts relevant information from massive


amount of raw data)

 Streaming Analytics (Process real time data)

 Ensures security and privacy of data.


3.5.4 SENSOR LAYER:
 Provides a user interface for using IoT.
 Different applications for various sectors like Transportation,
Healthcare, Agriculture, Supply chains, Government, Retail etc.

3.6 INTERNET OF THINGS ELEMENTS

There are three IoT components which enables seamless:

a) Hardware—made up of sensors, actuators and embedded


communication hardware
b) Middleware—on demand storage and computing tools for data
analytics and
c) Presentation—novel easy to understand visualization and
interpretation tools which can be widely accessed on different
platforms and which can be designed for different applications

3.7 RADIO FREQUENCY IDENTIFICATION (RFID)


RFID technology is a major breakthrough in the embedded
communication paradigm which enables design of microchips for
wireless data communication. They help in the automatic identification
of anything they are attached to acting as an electronic barcode. The
passive RFID tags are not battery powered and they use the power of the
reader’s interrogation signal to communicate the ID to the RFID reader.
This has resulted in many applications particularly in retail and supply
chain management. The applications can be found in transportation
(replacement of tickets, registration stickers) and access control
applications as well. The passive tags are currently being used in many
bank cards and road toll tags which are among the first global
deployments. Active RFID readers have their own battery supply and
can instantiate the communication. Of the several applications, the main
application of active RFID tags is in port containers for monitoring
cargo.

3.8WIRELESS SENSOR NETWORKS (WSN)


Recent technological advances in low power integrated circuits and
wireless communications have made available efficient, low cost, low
power miniature devices for use in remote sensing applications. The
combination of these factors has improved the viability of utilizing a
sensor network consisting of a large number of intelligent sensors,
enabling the collection, processing, analysis and dissemination of
valuable information, gathered in a variety of environments. Active
RFID is nearly the same as the lower end WSN nodes with limited
processing capability and storage. The scientific challenges that must be
overcome in order to realize the enormous potential of WSNs are
substantial and multidisciplinary in nature. Sensor data are shared
among sensor nodes and sent to a distributed or centralized system for
analytics. The components that make up the WSN monitoring network
include:

a) WSN hardware—Typically a node (WSN core hardware)


contains sensor interfaces, processing units, transceiver units and
power supply. Almost always, they comprise of multiple A/D
converters for sensor interfacing and more modern sensor nodes
have the ability to communicate using one frequency band
making them more versatile.

b) WSN communication stack—The nodes are expected to be


deployed in an ad-hoc manner for most applications. Designing
an appropriate topology, routing and MAC layer is critical for the
scalability and longevity of the deployed network. Nodes in a
WSN need to communicate among themselves to transmit data in
single or multi-hop to a base station. Node drop outs, and
consequent degraded network lifetimes, are frequent.

c) WSN Middleware—A mechanism to combine cyber


infrastructure with a Service Oriented Architecture (SOA) and
sensor networks to provide access to heterogeneous sensor
resources in a deployment independent manner. This is based on
the idea of isolating resources that can be used by several
applications. A platform-independent middleware for developing
sensor applications is required, such as an Open Sensor Web
Architecture.

d) Secure Data aggregation—An efficient and secure data


aggregation method is required for extending the lifetime of the
network as well as ensuring reliable data collected from sensors.
Node failures are a common characteristic of WSNs, the network
topology should have the capability to heal itself. Ensuring
security is critical as the system is automatically linked to
actuators and protecting the systems from intruders becomes very
important.

3.9APPLICATIONS:

There are several application domains which will be impacted by


the emerging Internet of Things. The applications can be classified based
on the type of network availability, coverage, scale, heterogeneity,
repeatability, user involvement and impact.

We categorize the applications into four application domains:

1) Personal and Home


2) Enter prize
3) Utilities
4) Mobile.

There is a huge crossover in applications and the use of data between


domains. For instance, the Personal and Home IoT produces electricity
usage data in the house and makes it available to the electricity (utility)
company which can in turn optimize the supply and demand in the
Utility IoT. The internet enables sharing of data between different
service providers in a seamless manner creating multiple business
opportunities.
3.9.1 PERSONAL AND HOME
The sensor information collected is used only by the individuals
who directly own the network. Usually, Wi-Fi is used as the backbone
enabling higher bandwidth data (video) transfer as well as higher
sampling rates (Sound).

Ubiquitous healthcare has been envisioned for the past two


decades. IoT gives a perfect platform to realize this vision using body
area sensors and IoT back end to upload the data to servers. For instance,
a Smartphone can be used for communication along with several
interfaces like Bluetooth for interfacing sensors measuring physiological
parameters. So far, there are several applications available for Apple
iOS, Google Android and Windows Phone operating systems that
measure various parameters. However, it is yet to be centralized in the
cloud for general physicians to access the same.

An extension of the personal body area network is creating a


home monitoring system for elderly care, which allows the doctor to
monitor patients and the elderly in their homes thereby reducing
hospitalization costs through early intervention and treatment.

Control of home equipment such as air conditioners,


refrigerators, washing machines etc., will allow better home and energy
management. This will see consumers become involved in the IoT
revolution in the same manner as the Internet revolution itself.

Social networking is set to undergo another transformation with


billions of interconnected objects. An interesting development will be
using a Twitter like concept where individual ‘Things’ in the house can
periodically tweet the readings which can be easily followed from
anywhere creating a Tweetot. Although this provides a common
framework using cloud for information access, a new security paradigm
will be required for this to be fully realized.

3.9.2 ENTER PRIZE


We refer to the ‘Network of Things’ within a work environment
as an enter prize- based application. Information collected from such
networks are used only by the owners and the data may be released
selectively. Environmental monitoring is the first common application
which is implemented to keep track of the number of occupants and
manage the utilities within the building (e.g., HVAC, lighting).

Sensors have always been an integral part of the factory setup for
security, automation, climate control, etc. This will eventually be
replaced by a wireless system giving the flexibility to make changes to
the setup whenever required. This is nothing but an IoT subnet dedicated
to factory maintenance.

One of the major IoT application areas that is already drawing


attention is Smart Environment IoT. There are several test beds being
implemented and many more planned in the coming years. Smart
environment includes subsystems and the characteristics from a
technological perspective.

These applications are grouped according to their impact areas.


This includes the effect on citizens considering health and well-being
issues; transport in light of its impact on mobility, productivity,
pollution; and services in terms of critical community services managed
and provided by local government to city inhabitants.
3.9.3 Utilities

The information from the networks in this application domain is


usually for service optimization rather than consumer consumption. It is
already being used by utility companies (smart meter by electricity
supply companies) for resource management in order to optimize cost
vs. profit. These are made up of very extensive networks (usually laid
out by large organization on a regional and national scale) for
monitoring critical utilities and efficient resource management. The
backbone network used can vary between cellular, Wi-Fi and satellite
communication.

Smart grid and smart metering are another potential IOT


application which is being implemented around the world. Efficient
energy consumption can be achieved by continuously monitoring every
electricity point within a house and using this information to modify the
way electricity is consumed. This information at the city scale is used for
maintaining the load balance within the grid ensuring high quality of
service.

Video based IOT, which integrates image processing, computer


vision and networking frameworks, will help develop a new challenging
scientific research area at the intersection of video, infrared, microphone
and network technologies. Surveillance, the most widely used camera
network applications, helps track targets, identify suspicious activities,
detect left luggage and monitor unauthorized access.

Water network monitoring and quality assurance of drinking water is


another critical application that is being addressed using IOT. Sensors
measuring critical water parameters are installed at important locations
in order to ensure high supply quality. This avoids accidental
contamination among storm water drains, drinking water and sewage
disposal. The same network can be extended to monitor irrigation in
agricultural land. The network is also extended for monitoring soil
parameters which allows informed decision-making concerning
agriculture.

3.9.4 MOBILE:
Smart transportation and smart logistics are placed in a separate
domain due to the nature of data sharing and backbone implementation
required. Urban traffic is the main contributor to traffic noise pollution
and a major contributor to urban air quality degradation and greenhouse
gas emissions. Traffic congestion directly imposes significant costs on
economic and social activities in most cities. Supply chain efficiencies
and productivity, including just-in-time operations, are severely
impacted by this congestion causing freight delays and delivery schedule
failures. Dynamic traffic information will affect freight movement, allow
better planning and improved scheduling. The transport IoT will enable
the use of large scale WSNs for online monitoring of travel times,
origin– destination (O–D) route choice behavior, queue lengths and air
pollutant and noise emissions. The IoT is likely to replace the traffic
information provided by the existing sensor networks of inductive loop
vehicle detectors employed at the intersections of existing traffic control
systems. They will also underpin the development of scenario-based
models for the planning and design of mitigation and alleviation plans,
as well as improved algorithms for urban traffic control, including multi-
objective control systems. Combined with information gathered from the
urban traffic control system, valid and relevant information on traffic
conditions can be presented to travelers. The prevalence of Bluetooth
technology (BT) devices reflects the current IoT penetration in a number
of digital products such as mobile phones, car hands-free sets, navigation
systems, etc. BT devices emit signals with a unique Media Access
Identification (MAC-ID) number that can be read by BT sensors within
the coverage area.

Readers placed at different locations can be used to identify the


movement of the devices. Complemented by other data sources such as
traffic signals, or bus GPS, research problems that can be addressed
include vehicle travel time on motorways and arterial streets, dynamic
(time dependent) O–D matrices on the network, identification of critical
intersections, and accurate and reliable real time transport network state
information. There are many privacy concerns by such usages and digital
forgetting is an emerging domain of research in IoT where privacy is a
concern. Another important application in mobile IoT domain is efficient
logistics management. This includes monitoring the items being
transported as well as efficient transportation planning. The monitoring
of items is carried out more locally, say, within a truck replicating
enterprize domain but transport planning is carried out using a large
scale IoT network.

3.9.5 CLOUD CENTRIC INTERNET OF THINGS


The vision of IoT can be seen from two perspectives— ‘Internet’
centric and ‘Thing’ centric. The Internet centric architecture will involve
internet services being the main focus while data is contributed by the
objects. In the object centric architecture, the smart objects take the
center stage.
In order to realize the full potential of cloud computing as well as
ubiquitous sensing, a combined framework with a cloud at the center
seems to be most viable. This not only gives the flexibility of dividing
associated costs in the most logical manner but is also highly scalable.
Sensing service providers can join the network and offer their data using
a storage cloud; analytic tool developers can provide their software tools;
artificial intelligence experts can provide their data mining and machine
learning tools useful in converting information to knowledge and finally
computer graphics designers can offer a variety of visualization tools.
Cloud computing can offer these services as Infrastructures, Platforms or
Software where the full potential of human creativity can be tapped
using them as services.

The new IoT application specific framework should be able to provide


support for:

a) Reading data streams either from sensors directly or fetch the


data from databases.
b) Easy expression of data analysis logic as functions/operators that
process data streams in a transparent and scalable manner on
Cloud infrastructures
c) If any events of interest are detected, outcomes should be passed
to output streams, which are connected to a visualization
program. Using such a framework, the developer of IoT
applications will able to harness the power of Cloud computing
without knowing low-level details of creating reliable and scale
applications.

3.9.6 BENEFITS OF INTERNET OF THINGS

 Improved citizen's quality of life

Healthcare from anywhere

Better safety, security and productivity

 New business opportunities

IoT can be used in every vertical for improving the efficiency


Creates new businesses, and new and better jobs

 Economic growth

Billions of dollars in savings and new services

 Better environment

Saves natural resources and trees

Helps in creating a smart, greener and sustainable planet

 Improved competitiveness

Competitive in providing cutting edge products/services

3.10 INTERNET OF THINGS IN 2016

3.10.1 SMARTWATCHES

Smartwatches broke new ground last year, with the popularity of


the devices like the pebble and the Galaxy Gear. More mart watches
making their way in the market with better and at the feasible prices.
With apple’s long-anticipated but expected announcement of the iWatch,
as the company has been ramping up its sapphire glass production and
flexible, wearable watch like patents.

Industry Innovators: Pebble, Meta watch, Samsung Galaxy Gear

3.10.2THE AUTOMATED HOME


Popular devices like Google’s Nest Smart Thermostat and
WeMo’s electrical outlet controller gained in popularity last year. Since
then, numerous home automation IoT technologies have flourished-
everything from smart locks to Wi-Fi enabled light bulbs.

Industry Innovators: Nest, Lockitron, Lifx

3.10.3FITNESS AND HEALTH TRACKING


Last year, health and fitness devices like Nike Fuel band and
Jawbone Up were among the most popular IoT gadgets, making large
appearance at CES.
Industry Innovators: Fitbit, Nike, Jawbone

3.10.4CONNECTED RETAIL
Traditional retailer store is struggling to keep up with the
growing e-commerce. Thanks to the Internet Of Things, innovators have
started to breathe new life into the retail experience- offering connected
point of sale systems, NFC payments solutions and supply chain
software’s.

Industry Innovators: Shop keep, Cisco, Place meter

3.10.5VIRTUAL AUGMENTED REALITY


Last year Oculus Rift and Google glass made headline in both the
virtual and augmented Reality worlds. Oculus was acquired by Facebook
for $2.3 Billion earlier this year and Google glass recently rolled out a
one-day sale of its “Explorer Edition”.

Industry Innovators: Oculus, Google Glass, Sony

3.11 OPEN CHALLENGES AND FUTURE


DIRECTIONS

The proposed Cloud centric vision comprises a flexible and open


architecture that is user centric and enables different players to interact
in the IoT framework. It allows interaction in a manner suitable for their
own requirements, rather than the IoT being thrust upon them. In this
way, the framework includes provisions to meet different requirements
for data ownership, security, privacy, and sharing of information.

Some open challenges are discussed based on the IoT elements presented
earlier. The challenges include IoT specific challenges such as privacy,
participatory sensing, data analytics, GIS based visualization and
Cloud computing apart from the standard WSN challenges including
architecture, energy efficiency, security, protocols, and Quality of
Service.

3.11.1ARCHITECTURE
Overall architecture followed at the initial stages of IoT research
will have a severe bearing on the field itself and needs to be investigated.
Most of the works relating to IoT architecture have been from the
wireless sensor networks perspective.

European Union projects of SENSEI and Internet of Things-


Architecture (IoT-A) have been addressing the challenges particularly
from the WSN perspective and have been very successful in defining the
architecture for different applications.

3.11.2ENERGY EFFICIENT SENSING


Efficient heterogeneous sensing of the urban environment needs
to simultaneously meet competing demands of multiple sensing
modalities. This has implications on network traffic, data storage, and
energy utilization. Importantly, this encompasses both fixed and mobile
sensing infrastructure as well as continuous and random sampling. A
generalized framework is required for data collection and modeling that
effectively exploits spatial and temporal characteristics of the data, both
in the sensing domain as well as the associated transform domains.

3.11.3 SECURE REPROGRAMMABLE NETWORKS


AND PRIVACY
Security will be a major concern wherever networks are deployed
at large scale. There can be many ways the system could be attacked—
disabling the network availability; pushing erroneous data into the
network; accessing personal information; etc.

The three physical components of IoT—RFID, WSN and cloud


are vulnerable to such attacks. Security is critical to any network and the
first line of defense against data corruption is cryptography.

Of the three, RFID (particularly passive) seems to be the most


vulnerable as it allows person tracking as well as the objects and no
high-level intelligence can be enabled on these devices. These complex
problems however have solutions that can be provided using
cryptographic methods and deserve more research before they are widely
accepted.
Against outsider attackers, encryption ensures data confidentiality,
whereas message authentication codes ensure data integrity and
authenticity. Encryption, however, does not protect against insider
malicious attacks, to address which non cryptographic means are
needed, particularly in WSNs. Also, periodically, new sensor
applications need to be installed, or existing ones need to be updated.
This is done by remote wireless reprogramming of all nodes in the
network. Traditional network reprogramming consists solely of a data
dissemination protocol that distributes code to all the nodes in the
network without authentication, which is a security threat. A secure
reprogramming protocol allows the nodes to authenticate every code
update and prevent malicious installation. Most such protocols are based
on the benchmark protocol Deluge. We need cryptographic add-ons to
Deluge, which lays the foundation for more sophisticated algorithms to
be developed. Security in the cloud is another important area of research
which will need more attention. Along with the presence of the data and
tools, cloud also handles economics of IoT which will make it a bigger
threat from attackers. Security and identity protection becomes critical
in hybrid clouds where private as well as public clouds will be used by
businesses. Remembering forever in the context of IoT raises many
privacy issues as the data collected can be used in positive (for
advertisement services) and negative ways (for defamation). Digital
forgetting could emerge as one of the key areas of research to address
the concerns and the development of an appropriate framework to
protect personal data.

3.11.4 QUALITY OF SERVICE


Heterogeneous networks are (by default) multi-service; providing
more than one distinct application or service. This implies not only
multiple traffic types within the network, but also the ability of a single
network to support all applications without QoS compromise. There are
two application classes: throughput and delay tolerant elastic traffic of
(e.g., monitoring weather parameters at low sampling rates), and the
bandwidth and delay sensitive inelastic (real-time) traffic (e.g., noise or
traffic monitoring), which can be further discriminated by data-related
applications (e.g., high-vs.-low resolution videos) with different QoS
requirements. Therefore, a controlled, optimal approach to serve
different network traffics, each with its own application QoS needs is
required. It is not easy to provide QoS guarantees in wireless networks,
as segments often constitute ‘gaps’ in resource guarantee due to resource
allocation and management ability constraints in shared wireless media.
Quality of Service in Cloud computing is another major research area
which will require more and more attention as the data and tools become
available on clouds. Dynamic scheduling and resource allocation
algorithms based on particle swarm optimization are being developed.
For high-capacity applications and as IoT grows, this could become a
bottleneck.

3.11.5NEW PROTOCOLS
The protocols at the sensing end of IoT will play a key role in
complete realization. They form the backbone for the data tunnel
between sensors and the outer world. For the system to work efficiently,
an energy efficient MAC protocol and appropriate routing protocol are
critical. Several MAC protocols have been proposed for various domains
with TDMA (collision free), CSMA (low traffic efficiency) and FDMA
(collision free but requires additional circuitry in nodes) schemes
available to the user. None of them are accepted as a standard and with
more ‘things’ available this scenario is going to get more cluttered,
which requires further research. An individual sensor can drop out for a
number of reasons, so the network must be self-adapting and allow for
multi-path routing. Multi-hop routing protocols are used in mobile ad
hoc networks and terrestrial WSNs. They are mainly divided into three
categories—data centric, location based and hierarchical, again based on
different application domains. Energy is the main consideration for the
existing routing protocols. In the case of IoT, it should be noted that a
backbone will be available and the number of hops in the multi- hop
scenario will be limited. In such a scenario, the existing routing
protocols should suffice in practical implementation with minor
modifications.

3.11.6 CLOUD COMPUTING


Integrated IoT and Cloud computing applications enabling the
creation of smart environments such as Smart Cities need to be able to:

a) Combine services offered by multiple stakeholders


b) Scale to support a large number of users in a reliable and
decentralized manner.

They need to be able operate in both wired and wireless network


environments and deal with constraints such as access devices or data
sources with limited power and unreliable connectivity.

The Cloud application platforms need to be enhanced to support:

a) The rapid creation of applications by providing domain specific


programming tools and environments.
b) Seamless execution of applications harnessing capabilities of
multiple dynamic and heterogeneous resources to meet quality
of service requirements of diverse users.
CHAPTER 4
HARDWARE COMPONENTS

HARDWARE COMPONENTS ARE


 Power Supply
 ESP32
 LM35
 Gas Sensor
 Humidity Sensor
 Fire Sensor
 DC Motor
 LCD

4.1 POWER SUPPLY

In this project we have power supplies with +5V & -5V option
normally +5V is enough for total circuit. Another (-5V) supply is used in
case of OP amp circuit.

Transformer primary side has 230/50HZ AC voltage where as at


the secondary winding the voltage is step downed to 12/50 Hz and this
voltage is rectified using two full wave rectifiers the rectified output is
given to a filter circuit to fitter the unwanted ac in the signal. After that
the output is again applied to a regulator LM7805 (toprovide+5v)
regulator. WhereasLM7905 is for providing –5Vregulation. Z (+12V
circuit is used for stepper motors, Fanand Relay by using LM7812
regulator same process like above supplies).

Fig 4.1 RPS

TRANSFORMER

Transformers are used to convert electricity from one voltage to


another with minimal loss of power. They only work with AC
(alternating current) because they require a changing magnetic field to be
created in their core. Transformers can increase voltage (step-up) as well
as reduce voltage (step-down).
Alternating current flowing in the primary (input) coil creates a
continually changing magnetic field in their on core. This field also
passes through the secondary (output) coil and the changing strength of
the magnetic field induces an alternating voltage in the secondary coil. If
the secondary coils connected to a load the induced voltage will make an
induced current flow. The correct term for the induced voltage is
‘induced electromotive force’ which is usually abbreviated to induced
e.m.f.

RECTIFIERS
The purpose of a rectifier is to convert an AC wave form into a
DC wave form (OR) Rectifier converts AC current or voltages into DC
current or voltage. There are two different rectification circuits, known as
'half-wave' and 'full-wave' rectifiers. Both use components called diodes
to convert AC into DC.

FILTERS
A filter circuit is a device which removes the ac component of
rectifier output but allows the dc component to the load. The most
commonly used filter circuits are capacitor filter, choke input filter and
capacitor input filter or pi-filter. We used capacitor filter here.

The capacitor filter circuit is extremely popular because of its low


cost, small size, little weight and good characteristics. For small load
currents this type of filter is preferred. It is commonly used in transistor
radio battery eliminators.
Rectifier O/P C RL

Fig 4.2 Capacitor

4.2 ESP32
ESP32 is powerful SoC (System on Chip) microcontroller with integrated
Wi-Fi 802.11 b/g/n, dual mode Bluetooth version 4.2 and variety of
peripherals. Itis an advanced successor of the 8266 chip primarily in the
implementation of two cores clocked in different version up to 240 MHz
Compared to its predecessor, except these features, it also extends the
number of GPIO pins from 17 to 36, the number of PWM channels per 16
and is equipped with 4MB of flash memory.

Fig 4.4 ESP 32 Microcontroller


The ESP32 chip has been developed by the Espressif Systems company,
which currently offers several ESP32 versions of the SoC in the form of
ESP32 Developer Kit, the ESP32 Wrover Kit, which also includes an SD
card and 3.2 '' LCD display and last but not least the ESP32 Azure IoT kit
with USB Bridge and other built-in sensors. In addition to Espressif
Systems, other producers are devoted to these chips - SparkFun with ESP32
Thing DB, WeMoS with its TTGO, D1, Lolin32 and Lolin D32, Adafruid
(with Huzzah32), DF Robot (ESP32 FireBeeatle) and many other
manufacturers sometimes offer good and sometimes bad clones.
ESP32 includes two core (Xtensa LX6 processor made with 40 nm
technology). CPU cores can be individually controlled. There is 520 KB of
on-chip SRAM for data and instructions available. Some SoC modules such
as ESP32-Wrover features 4 MB of external SPI flash and an additional 8
MB of SPI PSRAM (Pseudo static RAM). We have the possibility to use
SPI, I2S, I2C, CAN, UART, Ethernet MAC, and IR in various quantities,
depending on the type of the board. Standard equipment also includes Hall
Effect sensor, temperature sensor and touch sensor, other built-in sensors
are implemented in Azure IoT and Developer kit. SoC also provides
Cryptographic hardware acceleration: AES, SHA-2, RSA, and Elliptic
Curve Cryptography (ECC) and random number generator (RNG). Figure 1
shows the ESP32 microcontroller variants with which we are working at the
Department of Control System and Instrumentation.
ESP32 boards are produced in prototype designs that can be used in
smart home applications, automation, wearables, audio applications, cloud-
based IoT applications, and more. It is possible to choose a specific
development kit or to design a custom embedded system built on the ESP32
microcontroller.
4.2.1 ESP 32 PIN DESCRIPTION
4.2.3 FEATURES
1. Address Space
 Symmetric address mapping
 4 GB (32-bit) address space for both data bus and instruction bus
 1296 KB embedded memory address space
 19704 KB external memory address space
 512 KB peripheral address space
 Some embedded and external memory regions can be accessed by
either data bus or instruction bus
 328 KB DMA address space
2. Embedded Memory
 448 KB Internal ROM
 520 KB Internal SRAM
 8 KB RTC FAST Memory
 8 KB RTC SLOW Memory
3. External Memory

Off-chip SPI memory can be mapped into the available address space as
external memory. Parts of the embedded memory can be used as
transparent cache for this external memory.
 Supports up to 16 MB off-Chip SPI Flash.
 Supports up to 8 MB off-Chip SPI SRAM.
4. Peripherals
 41 peripherals
5. DMA – 13 modules are capable of DMA operation.

4.2.4 POWERING YOUR ESP32

There is total three ways by which you can power your ESP32 board-

Micro USB Jack: Connect the mini-USB jack to a phone charger or


computer through a cable and it will draw power required for the board to
function

5V Pin: The 5V pin can be supplied with a Regulated 5V, this voltage will
again be regulated to 3.3V through the on-board voltage regulator.
Remember ESP32 operated with 3.3V only.

3.3V Pin: If you have a regulated 3.3V supply, then you can directly
provide this to the 3.3V pin of the ESP32.

4.2.5 INPUT/OUTPUT

There are totally 39 digital Pins on the ESP32 out of which 34 can be used
as GPIO and the remaining are input only pins. The device supports 18-
channels for 12-bit ADC and 2-channel for 8-bit DAC. It also has 16
channels for PWM signal generation and 10 GPIO pins supports capacitive
touch features. The ESP32 has multiplexing feature, this enables the
programmer to configure any GPIO pin for PWM or other serial
communication through program. The ESP32 supports 3 SPI Interface, 3
UART interface, 2 I2C interface, 2 I2S interface and also supports CAN
protocol.

 3 UART interface: The ESP32 supports 3 UART interface for TTL


communication. This would require 3 sets of Rx and Tx pins. All the
6 pins are software configurable and hence any GPIO pin can be
programmed to be used for UART.
 External Interrupt: Again since the ESP32 supports multiplexing
any GPIO pin can be programmed to be used as an interrupt pin.
 GPIO23 (MOSI), GPIO19(MISO), GPIO18(CLK) and GPIO5
(CS): These pins are used for SPI communication. ESP32 supports
two SPI, this is the first set.
 GPIO13 (MOSI), GPIO12(MISO), GPIO14(CLK) and GPIO15
(CS): These pins are used for SPI communication. ESP32 supports
two SPI, this is the second set.
 GPIO21(SDA), GPIO22(SCL): Used for IIC communication using
Wire library.
 Reset Pin: The reset pin for ESP32 is the Enable (EN) pin. Making
this pin LOW, resets the microcontroller.

4.2.6 APPLICATIONS

 Prototyping of IoT devices


 Low power battery operated applications
 Network projects
 Easy to use for beginner level DIYers and makers.
 Projects requiring Multiple I/O interfaces with Wi-Fi and Bluetooth
functionalities.

4.3 LM35
The LM35 sensor series are precision integrated-circuit temperature
sensors, whose output voltage is linearly proportional to the Celsius
(Centigrade) temperature.
Fig 4.5 LM35
LM35 Sensor Specification

The LM35 series are precision integrated-circuit LM35 temperature


sensors, whose output voltage is linearly proportional to the Celsius
(Centigrade) temperature. The LM35 sensor thus has an advantage over
linear temperature sensors calibrated in ° Kelvin, as the user is not required
to subtract a large constant voltage from its output to obtain convenient
Centigrade scaling. The LM35 sensor does not require any external
calibration or trimming to provide typical accuracies of ±¼°C at room
temperature and ±¾°C over a full -55 to +150°C temperature range. Low
cost is assured by trimming and calibration at the wafer level. The LM35's
low output impedance, linear output, and precise inherent calibration make
interfacing to readout or control circuitry especially easy. It can be used
with single power supplies, or with plus and minus supplies. As it draws
only 60 µA from its supply, it has very low self-heating, less than 0.1°C in
still air. The LM35 is rated to operate over a -55° to +150°C temperature
range, while the LM35C sensor is rated for a -40° to +110°C range (-10°
with improved accuracy). The LM35 series is available packaged in
hermetic TO-46 transistor packages, while the LM35C, LM35CA, and
LM35D are also available in the plastic TO-92 transistor package. The
LM35D sensor is also available in an 8-lead surface mount small outline
package and a plastic TO-220 package
4.4 GAS SENSOR
Gas sensors are chemical sensors that are of paramount importance.
A chemical sensor comprises of a transducer and an active layer for
converting the chemical information into another form of electronic
signal like frequency change, current change or voltage change.

As the air surrounding us contains different number of gases which


could be hazardous to human health, atmospheric pollutants or of
significance to an industrial or medical process, it becomes therefore
very imperative to detect the presence of these gases since the
environment we dwell in consists of humans, plants and animals as its
main inhabitants, so the safety of their lives is of topmost priority.

Basically, traditional detection methods which produce systems that


sounds an audio alarm to notify people when there is a gas leakage that
is harmful or poisonous is not very reliable because it is required to
obtain accurate real-time measurements of the concentration of a target
gas. However, for many centuries, different gas sensor technologies have
been used for different gases detection including semiconductor gas
sensors, catalytic gas sensors, electrochemical gas sensors, optical gas
sensors and acoustic gas sensors. The performance characteristic of
every sensor is based on some properties including sensitivity,
selectivity, detection limit, response time and recovery time.
Fig 4.6 Gas Sensor

SECURITY

This constitutes a broadly ranging set of applications, some of which


could equally well be placed in other categories. The pre-emptive
detection of explosives (through minute traces of volatile components) in
airline passenger luggage is currently very much in the public mind.
Sensors for toxic gases are important in some military theatres despite
the prohibition enjoined by the Geneva Convention. Civil defense
organizations and private bomb shelters need to be equipped with similar
sensors.

There may also be forensic applications, although the fugacity of the


analyte generally means that forensic work has to focus on nonvolatile,
usually solid materials. More mundanely but much more extensively
applied are gas sensors assuring domestic safety, especially where
combustion is taking place and ventilation might be restricted (carbon
monoxide sensors) and, with a wider range of gaseous analytes, assuring
industrial safety. Many countries now have health and safety legislation
in place specifying minimum monitoring requirements that must be met.
The breathalyzer widely used by police forces to give a reasonably
quantitative indication of recent alcohol consumption by drivers
involved in incidents ranks as a security application but strictly speaking
is not a sensor but a dosimeter since it gives an irreversible response to
exposure to a particular quantity of ethanol.

APPLICATIONS

Gas sensors are used in a wide variety of applications in numerous


niche market sectors. Note that the categorization of the sectors is not
always clear-cut. The monitoring of indoor air quality, although included
below under Environment, could equally well rank as a long-term health
application. The automotive sector unites several sectors, and is really
large enough to be considered on its own. Our designation is based on
the sector in which those purchasing and using detectors are working.
4.5HUMIDITY SENSOR
A humidity sensor (or hygrometer) senses, measures and reports
both moisture and air temperature. The ratio of moisture in the air to the
highest amount of moisture at a particular air temperature is called
relative humidity. Relative humidity becomes an important factor when
looking for comfort.

Fig 4.7 Humidity Sensor

A humidity sensor, also called a hygrometer, measures and regularly reports


the relative humidity in the air. They may be used in homes for people with
illnesses affected by humidity; as part of home heating, ventilating, and air
conditioning (HVAC) systems; and in humidors or wine cellars. Humidity
sensors can also be used in cars, office and industrial HVAC systems, and
in meteorology stations to report and predict weather

FEATURES
RATED VOLTAGE DC 5.0V
CURRENT CONSUMPTION <3.0mA
OPERATING TEMPERATURE RANGE 0-60°C
OPERATING HUMIDITY RANGE 30-90%RH
STORABLE TEMPERATURE RANG -30°C~85°C
STORABLE HUMIDITY RANGE within 95%RH
STANDARD OUTPUT RANGE DC1.980mV (at25°C,
60%RH)
ACCURACY ±5%RH (at 25°C,
60%RH)
REMARKS PCB unit containing
driving circuit

4.6FIRE SENSOR
A flame-sensor is one kind of detector which is mainly designed for
detecting as well as responding to the occurrence of a fire or flame. The
flame detection response can depend on its fitting. It includes an alarm
system, a natural gas line, propane & a fire suppression system. This sensor
is used in industrial boilers. The main function of this is to give
authentication whether the boiler is properly working or not. The response
of these sensors is faster as well as more accurate compare with a
heat/smoke detector because of its mechanism while detecting the flame.

Fig 4.8 Fire Sensor


This sensor/detector can be built with an electronic circuit using a receiver
like electromagnetic radiation. This sensor uses the infrared flame flash
method, which allows the sensor to work through a coating of oil, dust,
water vapor, otherwise ice.

Features & Specifications

The features of this sensor include the following.

 Photosensitivity is high
 Response time is fast
 Simple to use
 Sensitivity is adjustable
 Detection angle is 600,
 It is responsive to the flame range.
 Accuracy can be adjustable
 Operating voltage of this sensor is 3.3V to 5V
 Analog voltage o/ps and digital switch o/ps
 The PCB size is 3cm X 1.6cm
 Power indicator & digital switch o/p indicator
 If the flame intensity is lighter within 0.8m then the flame test can
be activated, if the flame intensity is high, then the detection of
distance will be improved.
Applications

These sensors are used in several dangerous situations which include the
following.

 Hydrogen stations
 Industrial heating
 Fire detection
 Fire alarm
 Fire fighting robot
 Drying systems
 Industrial gas turbines
 Domestic heating systems
 Gas-powered cooking devices

4.7 DC MOTOR
A DC motor is an electric motor that runs on direct current power.
In any electric motor, operation is dependent upon simple
electromagnetism. A current carrying conductor generates a magnetic field,
when this is then placed in an external magnetic field, it will encounter a
force proportional to the current in the conductor and to the strength of the
external magnetic field. It is a device which converts electrical energy to
mechanical energy. It works on the fact that a current carrying conductor
placed in a magnetic field experiences a force which causes it to rotate with
respect to its original position.

Fig 4.9 DC Motor


A DC motor is any of a class of rotary electrical motors that
converts direct current electrical energy into mechanical energy. The most
common types rely on the forces produced by magnetic fields. Nearly all
types of DC motors have some internal mechanism, either
electromechanical or electronic, to periodically change the direction of
current in part of the motor.
DC motors were the first form of motor widely used, as they could
be powered from existing direct-current lighting power distribution
systems. A DC motor's speed can be controlled over a wide range, using
either a variable supply voltage or by changing the strength of current in its
field windings. Small DC motors are used in tools, toys, and appliances.
The universal motor can operate on direct current but is a
lightweight brushed motor used for portable power tools and appliances.
Larger DC motors are currently used in propulsion of electric vehicles,
elevator and hoists, and in drives for steel rolling mills. The advent of
power electronics has made replacement of DC motors with AC motors
possible in many applications.

4.8 LCD (LIQUID CRYSTAL DISPLAY):


LCD (liquid crystal display) is the technology used for displays in
notebook and other smaller computers. Like light-emitting diode ( LED) and
gas-plasma technologies, LCDs allow displays to be much thinner than
cathode ray tube (CRT) technology. LCDs consume much less power than
LED and gas-display displays because they work on the principle of
blocking light rather than emitting it.

Fig 4.10 Liquid Crystal Display


FEATURES

 E-blocks compatible
 Low cost
 Compatible with most I/O ports in the E-Block range (requires 5 I/O
lines via 9-way D-type connector)
 Ease to develop programming code using Flow code icons
Fundamentals of Liquid Crystal Displays
The term liquid crystal is used to describe a substance in a state
between liquid and solid but which exhibits the properties of both.
Molecules in liquid crystals tend to arrange themselves until they all
point in the same specific direction. This arrangement of molecules
enables the medium to flow as a liquid. Depending on the temperature
and particular nature of a substance, liquid crystals can exist in one of
several distinct phases. Liquid crystals in a nematic phase, in which there
is no spatial ordering of the molecules, for example, are used in LCD
technology.

One important feature of liquid crystals is the fact that an electrical


current affects them. A particular sort of nematic liquid crystal, called
twisted nematics (TN), is naturally twisted. Applying an electric current
to these liquid crystals will untwist them to varying degrees, depending
on the current's voltage. LCDs use these liquid crystals because they
react predictably to electric current in such a way as to control the
passage of light.

The working of a simple LCD is shown in Figure 1. It has a mirror


(A) in back, which makes it reflective. There is a piece of glass (B) with
a polarizing film on the bottom side, and a common electrode plane (C)
made of indium-tin oxide on top. A common electrode plane covers the
entire area of the LCD. Above that is the layer of liquid crystal substance
(D). Next comes another piece of glass (E) with an electrode in the shape
of the rectangle on the bottom and, on top, another polarizing film (F), at
a right angle to the first one

CHAPTER 5
SOFTWARE COMPONENTS
5.1 ARDUINO SOFTWARE
5.1.1 PROGRAMMING

Step 1: Installing the Firmware

In Node MCU Boards the first thing you need is to install the Firmware
to the board the following method works for all Node MCU Boards

1. Open the Node MCU flasher master folder than open the
win32/win64 folder as your computer. Now open the folder Release than
double click ESP8266Flasher.

2. Select the COM Port.

3. Go to configure tab.

4. Click on the small gear and open up the firmware which you have
downloaded.

5. Go to the advanced tab and select the desired Baud rate.

6. Go to the Operation tab and click on Flash Button. Add Tip Ask

Question Comment Download


Step 2: Preparing the Arduino IDE

After installing the firmware you are ready to do the programming with
the ESP8266

1. Install the Arduino IDE

2. Open the Arduino IDE from the desktop icon

3. Click on File tab and than open preferences

4. In the additional Boards Manager URLs add the following link

(http://arduino.esp8266.com/stable/package_esp8266com_index.json)
OK

5. Go to Tools>Borads>Boards Manager

6. In the search field type esp8266 click the esp8266 by ESP8266


Community option and click Install

Step 3: Code...

Now we can do whatever you want with your Node MCU board
Following is an example for led blinking with Node MCU board via web
server
 In arduino IDE go to tools>Boards>select NODEMCU 1.0
(ESP - 12E Module)
 Again go to tools and select port.
 Change the Wi-Fi name and password from the following code.
 Now click on Upload button to upload the following code.
 Connect the led's positive leg on D9 pin of board and negative to
the ground of the code.
 Power up the board and open the serial monitor from arduino IDE
 After connecting to the Wi-Fi it will show you the IP address.
 Type that IP address on the web browser (Edge, Chrome,
Firefox etc.,)
 A webpage will open you can change the status of LED by
turning it ON or OFF.

5.1.2 COPY, PASTE AND UPLOAD THE TUTORIAL


SKETCH
The sketch is one that comes as an example from ESP8266.COM.
Serial Communication between Node MCU and Arduino

5.1.3 PROJECTS AND APPLICATIONS


Node MCU V3 is mainly used in the Wi-Fi Applications which
most of the other embedded modules fail to process unless incorporated
with some external Wi-Fi protocol. Following are some major applications
used for Node MCU V3.
 Internet Smoked Alarm
 VR Tracker
 Octopod
 Serial Port Monitor
 ESP Lamp
 Incubator Controller
 IoT home automation
 Security Alarms

Application Example:

Node MCU ESP-12E Arduino IDE Digital Input Tutorial

5.1.4 CONNECT THE CIRCUIT


You may wish to power your Node MCU another way. You can
read about it HERE.
5.1.5 COPY, PASTE AND UPLOAD THE CODE
The code is real simple works as follows:

The input is read from switch pin. If switch is closed, it will read a low.

The LED output pin is set to the opposite of the switch pin. If the switch
is closed, the output pin will be set to a high. A high will turn on the LED.
5.2 PROTEUS

5.2.1 INTRODUCTION:

Generally, we are listening the words PCB’s, PCB layout, PCB


designing, etc. But what is PCB? Why we are using this PCB? We want to
know about all these things as an electronic engineer. PCB means Printed
Circuit Board. This is a circuit board with printed copper layout
connections. These PCBs are two types. One is dotted PCB and another
one is layout PCB. The two examples are shown in below.

Fig 4.1 Dotted PCB and Layout PCB

What is the main difference between the dotted PCB and layout PCB?

In dotted PCB board only, dots are available. According to our


requirement we can place or insert the components in those holes and
attach the components with wires and soldering lid. In this dotted PCB we
can make the circuit as out wish but it is very hard to design. There are so
many difficulties are there. Those are connecting the proper pins, avoiding
shot connections and etc. Coming to the layout PCB this is simple to
design. First, we select the our circuit and by using different PCB
designing software’s, design the layout of the circuit and by itching process
preparing the copper layout of our circuit and solder the components in the
correct places. It is simple to design, take less time to design, no shortages,
looking nice and perfect.

Up to now we have discussed about types of PCB’s and difference


between the types. Now we can discuss about PCB designing software.
There are so many PCB designing software’s available. Some are
Express PCB, eagle PCB, PCB Elegance, free PCB, open circuit
design, zenith PCB and Proteus etc. Apart from remaining Proteus is
different. Proteus is design suit and PCB layout designing software. In
Proteus we can design any circuit and simulate the circuit and make PCB
layout for that circuit.

5.2.2 Introduction to Proteus:

Proteus professional is a software combination of ISIS schematic


capture program and ARES PCB layout program. This is a powerful and
integrated development environment. Tools in this suit are very easy to use
and these tools are very useful in education and professional PCB
designing.

As professional PCB designing software with integrated space


based auto router, it the curser at the component pin end then draw the
connections with that pen symbol. Connect all the components according to
circuit then that designed circuit is show in below image.

If any modifications want to do to the component place the mouse


point and click on right button then option window will open. That is
shown in below figure.

After completion of designing save with some mane and debug it.
This is virtual simulation means without making circuit we can see the
result in virtually through this software and we can design the PCB layout
to our required circuit with this software.
5.3 MIT APP INVENTER

This step-by-step picture tutorial will guide you through making a


talking app.

To get started, go to App Inventor on the web.

Go directly to ai2.appinventor.mit.edu, or click the orange "Create"


button from the App Inventor website.

Log in to App Inventor with a Gmail (or google) user name and
password.
Use an existing gmail account or school-based google account to log in
to ai2.appinventor.mit.edu

To set up a brand new Gmail account, go to accounts.google.com/Sign up


Click "Continue" to dismiss the splash screen.
Start a new project.

Name the project “TALKTOME” (no spaces!)

Type in the project name (underscores are allowed, spaces are not) and
click OK.

You are now in the Designer, where you lay out the "user interface" of your
app.
The Design Window or simply "Designer" is where you lay out
the look and feel of your app, and specify what functionalities it should
have. You choose things for the user interface things like Buttons, Images,
and Text boxes, and functionalities like Text-to-Speech, Sensors, and GPS.
Add a Button

Our project needs a button. Click and hold on the word "Button" in
the palette. Drag your mouse over to the Viewer. Drop the button and a
new button will appear on the Viewer.

Connect App Inventor to your phone for live testing


One of the neatest things about App Inventor is that you can see and
test your app while you're building it, on a connected device. If you have an
Android phone or tablet, follow the steps below. If you do not have a
device, then follow the instructions for setting up the on-screen emulator
(opens a new page) and then come back to this tutorial once you've gotten
the emulator connected to App Inventor.
Get the MIT AI2 Companion from the Play Store and install it on your
phone or tablet.

The preferred method for getting the AI2 Companion App is to


download the app from the Play Store by searching for "MIT AI2
Companion".
To download the AI2 Companion App to your device directly (SKIP THIS
STEP IF YOU already got the app from Play Store)

If for some reason you cannot connect to the Google Play store, you can
download the AI2 Companion as described here.

First, you will need to go into your phone's settings (#1), choose "Security",
then scroll down to allow "Unknown Sources", which allows apps that are
not from the Play Store to be installed on the phone.

Second, do one of the following:

A) Scan the QR code above(#2)or


B) Click the "Need help finding..." link and you'll be taken to the download
page. From there you can download the MITAI2Companion.apk file to
your computer and then move it over to your device to install it.
Start the AI Companion on your device

On your phone or tablet, click the icon for the MIT AI Companion to start
the app. NOTE: Your phone and computer must both be on the same
wireless network. Make sure your phones Wi-Fi is on and that you are
connected to the local wireless network. If you cannot connect over Wi-Fi,
go to the Setup Instructions on the App Inventor Website to find out how to
connect with a USB cable.

Get the Connection Code from App Inventor and scan or type it into
Companion app

On the Connect menu, choose "AI Companion". You can connect by:

1. Scanning the QR code by clicking "Scan QR code" (#1). Or


2. Typing the code into the text window and click "Connect with code" (#2).
See your app on the connected device

You will know that your connection is successful when you see your app on
the connected device. So far, our app only has a button, so that is what you
will see. As you add more to the project, you will see your app change on
your phone.
CHAPTER 6
RESULT AND DISCUSSION

PLACE THE KIT IMAGE AND OUTPUT


CHAPTER 7
ADVANTAGES AND APPLICATIONS

7.1 ADVANTAGES

 We can assure more safety for the employee.


 Easy to analysis the data.
 IOT can handle the greater number of devices.
 More number of information can be store on cloud
 Easy to get back the previous data.
 Detecting the bad air.
 Temperature coefficient.
 Safety monitoring of the environment.
 Improved services in coal mining.
 Providing Wireless connection security.
 Faster checked out/in.
 Prevent from the High Temperature, Humidity and Harmful Gases.

7.2 APPLICATIONS

 Can be applied to the persons who are working in the underground.


 Can be applied at any whether Conditions.
 Cost avoidance.
CHAPTER 8
CONCLUSION AND FUTURE SCOPE

1.1 CONCLUSION

A prototype of intelligent mine safety helmet is developed that is competent


to recognize various kinds of unsafe situations in the mining industries such
as carbon monoxide gas accumulation, miner removing the helmet, and
crash detection (situation where mines is collided by something on his
head). An IR sensor is used to check whether the miner has removed his
helmet or not. Another hazardous event is determined as an accident where
mine worker is collided by an item against his head with a pressure
surpassing a value of 34 psi (Head and Neck Injury Criteria value of 1000).
A pressure sensor was used to determine the force experienced on the
miner’s head. If the sensor value exceeds that of 34 psi (234.6 KPa), then it
indicates a miner has experienced a severe collision on his head. And hence
with the help of pressure sensor we can determine the severity of the impact
or collision on head.
In order to conform that the system works according to the requirements
specified, it was broadly tested. A couple of attributes of the system can be
enhanced. To increase more human interference and to enhance the signal
range and signal strength an additional antenna can be added. To allow
faster sensor data processing, the system processing speed can be enhanced.
The infrared sensor can be tweaked to work just inside the safety helmet by
not provoking due to internal reflections. The system can be enhanced by
adding extra measuring equipment to check the worker’s heart rate and
blood pressure.
CHAPTER 9
REFERENCES

1) http://www.makeinindia.com/sector/mining
2) D. Kock and J. W. Oberholzer, DzThe development and application
of electronic technology to increase health, safety, and productivity
in the South African coal mining industry,dz IEEE Trans. on
Industry Applications, vol. ͵͵, no. 1, pp. 100-105, Jan/Feb. 1997.
3) CHENG Qiang, SUN Ji-ping, ZHANG Zhe, ZHANG Fan
DzZigBee Based Intelligent Helmet for Coal Minersdz World
Congress on Computer Science and Information Engineering 2009
4) Shirish Gaidhane, Mahendra Dhame and Prof. Rizwana Qureshi
DzSmart Helmet for Coal Miners using ZigBee Technologydz
Imperial Journal of Interdisciplinary Research (IJIR) Vol-2, Issue-6,
2016 ISSN: 2454-1362
5) Kumar and G. P. Hancke, DzEnergy efficient environment
monitoring system based on the IEEE 8Ͳʹ.ͳͷ.Ͷ standard for low
cost requirementsdz, IEEE Sensors Journal, vol. 14, no. 8, pp. 2557-
2566, Aug. 2014.
6) DzHead and neck injury criteria a consensus workshopdz Research
information and publications center. University of Michigan
transportation research institute.
7) H. Hongjiang and W. Shuangyou, DzThe application of ARM and
ZigBee technology wireless networks in monitoring mine safety
system,dz IEEE International Colloquium on Computing,
Communication, Control, and Management (ISECS 2008), 3-4 Aug.
2008, Guangzhou, pp. 430–433, 2008
8) Gyu and Myoung Lee, 2014. INTERNET OF THINGS.
International Journal of Innovations & Advancement in Computer
Science, 3(5).
9) Nagaraja and Jagadeesh, 2017. IoT based Smart Helmet for unsafe
event detection for mining industry. International Research Journal
of Engineering and Technology (IRJET), Volume: 04 Issue: 01.
10) Abdulla R, Abdillahi A, Abbas MK, “Electronic Toll Collection
System based on Radio Frequency Identification System,”.
International Journal of Electrical & Computer Engineering (2088-
8708), 1;8(3), 2018.
11) Huang, H. C., & Lee, Y. D. (2017). A Study of Indigenous
Measuring Factors for Employer Brand Attractiveness in Taiwan:
Comparative Analysis of Academy and Industry Experts. IMPACT:
International Journal of Research in Business Management
(IMPACT: IJRBM), 5(11), 11-20.
12) Hazarika Pranjal, 2016. Implementation of Smart Safety Helmet for
Coal Mine Workers. In IEEE International Conference on Power
Electronics. Intelligent Control and Energy Systems. Jorhat, India,
ICPEICES.
13) Vargas Hernández, J. G., & Plascencia, M. D. L. R. (2017).
Application of the IndustryBased Theory the Case of Mexican
Company Cemex. Management & Administration (IMPACT:
JMDGMA), 1(2), 31-44.
14) Sanchit Gupta and Rashmi Vashisth, 2017. IMPLEMENTATION
AND ANALYSIS OF SMART HELMET. In IEEE International
Conference on Signal Processing, Computing and Control (ISPCC
2k17). Solan, India, Sep21-23, 2017, IEEE.
15) Chang, W. Y., & Chang, P. C. (2018). Application of Radial Basis
Function Neural Network, to Estimate the State of Health for LFP
Battery. International Journal of Electrical and Electronics
Engineering (IJEEE), 7(1), 1-6.
16) Praveen Kulkrani and Sangam, “Smart System for Hazardous Event
Detection and Evaluation in Mining Industries,”. International
Journal of Innovative Research in Electrical, Electronics,
Instrumentation and Control Engineering, 5th Vol 3rd Issue, 2017.
17) SHARMA, S., & KUMAR, G. (2016). A dual Wideband Stair
Shape Microstrip Patch Antenna for C & X Band. International
Journal of Electronics and Communication Engineering (IJECE),
5(4), 1-8.
18) Dhanalakshmi and Lathapriya, “A SMART HELMET FOR
IMPROVING SAFETY IN MINING INDUSTRY,”. International
Journal of Innovative Science and Research Technology, 2nd Vol
3rd Issue, 2017.
19) Rayan Mohamed, 2015. International Journal of Science and
Research (IJSR)- Microcontroller Based Master Slave
Communication for Electrical Stepper Motor, 2319- 7064.
20) Patil, S., & Satpute, R. (2016). Performance Evaluation of Antennas
for Enhancing Ergodic Capacity of Channel in Wireless
Communication. International Journal of Electrical and Electronics
Engineering Research (IJEEER) ISSN (P).
21) P. Kulkrani and Sangam, “Smart System for Hazardous Event
Detection and Evaluation in Mining Industries,”. International
Journal of Innovative Research in Electrical, Electronics,
Instrumentation and Control Engineering, 5(3), 2017.
22) Hussein, O. A., & Rao, P. R. (2016). Fault Location and Isolation
Using Multi Agent Systems in 16 Buses Distribution System.
International Journal of Electrical and Electronics Engineering
Research, 6, 21-38.
23) A. Dementyev and S. Hodges, “Power Consumption Analysis of
Bluetooth Low Energy, ZigBee and ANT Sensor Nodes in a Cyclic
Sleep Scenario,”. Department of Electrical Engineering, University
of Washington, Seattle, WA, USA, (9)(13), 2013.

You might also like