1 Inspecto Department of Instrumentation and Control Engineering, NSSCE
ABOUT ABOUT NSS COLLEGE OF ENGINEERING NSS College of Engineering, Palakkad (Commonly known as NSSCE) is the fourth engineering edu- cational institution established in Kerala, India. It was founded in 1960 by Nair Service Society. NSS College of Engineering is one of the premier institutions in the state. The college is one among the only three Govt-Aided Engineering colleges in Kerala and the first Govt-Aided Engineering College accredited by NBA of AICTE. The college is affiliated to the APJ Abdul Kalam Technological University. The campus is situated in NSS Nagar at Akathethara, 9 km from Palakkad town, and 3 km from the Palakkad Railway Junction. The nearest airports are at Coimbatore (55 km) and Cochin Internation- al Airport(110 km). Spread over 100 acres, it includes an administrative block and other blocks, a library block and five hostels including two for women and with good infrastructure ABOUT DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING, NSS COLLEGE OF ENGINEERING The Department Of Instrumentation and Control Engineering the only one of the University of Calicut was established in 1980. The Department offers a full time B Tech Degree course in In- strmentation & Control Engineering. The total annual student intake is 60. Department has been backed up by efficient, dedicated and specialized faculty and they work with dedication to keep in pace with the ever changing control and Instrumentation scenario. The department has an excel- lent placment record, with its alumni working all around the globe in reputed companies in coveted positions. The alumni and the experts from industry visit the department periodically and give lec- tures, demonstrations and career guidance to the students. The students are also given exposure to the industrial environment through industrial visits and industrial training. It’s indeed a matter of pride for the Department that numerous eligible final year students are placed in prestigious MNCs every year. 2 Inspecto Department of Instrumentation and Control Engineering, NSSCE
DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING, NSS COLLEGE OF ENGINEERING PALAKKAD MISSION OF THE DEPARTMENT “To be a centre of excellence of international acclaim in the realm of Instrumentation and Control Engineering producing self motivated, knowledgeable and technically competent engineers to nurture the needs of the society” VISION OF THE DEPARTMENT 1. To impart engineering education at par with global standards to create self moti- vated Instrumentation and Control Engineering graduates. 2. To inculcate a passion for learning and an ability to utilize the knowledge for solv- ing real world problems and industrial challenges. 3. To be a premier centre for Instrumentation and Control Engineering studies and research 4. To groom the graduates who uphold engineering ethics with a high degree of social commitment. 3 Inspecto Department of Instrumentation and Control Engineering, NSSCE
MESSAGE FROM PRINCIPAL’S DESK “ DR. PR SURESH Principal, NSS College of Engineering It gives me a great deal of honour and pride to announce that the department of Instrumentation and Control Engineering has published their 4th edition techni- cal magazine “INSPECTA”. This magazine will be a platform for sharing technical knowledge as well as new ideas and I am sure that it will bring out the hidden tal- ents of all the students of the department. As the principal, I feel immense pride to be a part of this great venture. 4 Inspecto Department of Instrumentation and Control Engineering, NSSCE
MESSAGE FROM HOD’S DESK “ DR. VENUGOPAL G HOD, Dept. of ICE, NSSCE It is a matter of great pride and satisfaction for the Department of Instrumentation and Control Engineering, NSS College of Engineering Palakkad, to release the depart- ment magazine 2021. The much-awaited magazine is a culmination of the efforts of our students and teachers. It is no mean feat to put together a magazine year after year. More so, in a year riddled with uncertainties and upheavals. The past year has been a challenging time for all of us, alike. Despite the hardships, students have shown great enthusiasm and passion towards online learning, which is highly commendable. Your overwhelming response to has given us the confidence to continue with the remote learning initiatives. A special thanks to the staff members who went out of their way to ensure that academics do not suffer. I look forward to continued co-operation and dedication from the students and staff to take our department to greater heights. As for students, dream big, work hard and continue to stay focussed on studies. Do not ever lose track of your academic goals. Learn new skills. Do prioritise health. And above all, contribute to the society in whatever way possible. All the very best! 5 Inspecto Department of Instrumentation and Control Engineering, NSSCE
MESSAGE FROM ADVISOR’S DESK “ LEKSHMIPRIYA J Asst. Prof. Dept. of ICE, NSSCE It is indeed a great pleasure to introduce another edition of our Department Magazine, INSPECTA. Congratulations to all members who are part of this endeavour. Publication of this magazine is a classic example of excellent teamwork and coor- dination among the members .This magazine will enhance technical knowledge as well as creative thinking of students. Efforts put in by them to publish this magazine during this pandemic time is highly commendable and contributions by each member is noteworthy. 6 Inspecto Department of Instrumentation and Control Engineering, NSSCE
EDITORIAL Nowadays, we all are passing through an era, which is difficult to survive. We have faced so many dangerous situations and we endured through such situations but this covid is chal- lenging us day by day. The necessities of people are bringing changes in the world. Humans had faced many situations but it gave many outcomes regarding technology, cul- ture, art, etc. According to chaos theory, better results can rise from simple matters. For the past decades, man was behind the world wars. At the same time, the same man is behind the discoveries and achievements that we had now. The race to subjugate any force for the sake of mutual enmity amid a crisis of war has brought man to the pinnacle of technology, including space technology, which was once only a dream for some time, and if competition between the needy then has the value of human survival today. This magazine arises from such a period. So the writings included in this magazine indicate that they all are just an initiative for various discoveries and successes. Technology is grow- ing and at the same time, another section “Instrumentation” had also taken roots. The changes which are taking place in technology and the necessities of people are opening various opportunities in front of us. The intuitions and various needs are the reasons be- hind the root of every invention and discovery [Every brilliant experiment, like every great work of art, starts with an act of imagination-Jonah Lehrer]. These are all possible from humans only as we are just an advanced breed of monkeys on a minor planet of a very av- erage star. But we can understand the universe that makes us something special. Like others, we cannot achieve things, suddenly. Like Nikola Tesla said: Our virtues and our failures are inseparable like force and matter .When they separate man is no more. Also, this is not an ending and we will survive if we had gone through the history of the past 10 decades. I hope and wish that each page and words of this magazine can bring discoveries and inventions Ajil K Babu Swathy Chandra R 2018 - 22 Batch 2018 - 22 Batch 8 Inspecto Department of Instrumentation and Control Engineering, NSSCE
22 DNA - THE DIGITAL DATA STORAGE SNEHA RAJ MP 52 53 24 THE NEURAL NETWORKS IN CONTROL SYSTEM DEEPIKA R 55 56 25 INTERNET OF THINGS INDEXSONU 26 MOLECULAR COMMUNICATION SUDEEP M Page 10 Sl No Topic Author 11 1 HAYA HASHMA 12 INSTALLATION STRATEGY OF THE FLOATING 13 BRIDGE K SIDHARTH 15 17 2 OPTOELECTRONICS 18 19 3 BIONIC PERSON VIA ARTIFICIAL INTELLIGENCE ATHEENA VIJAY 21 22 4 BIOMEDICAL INSTRUMENTATION ADITHYA V NAIR 24 26 5 NEURALINK LITCY SIVAKRISHNAN 28 29 6 ROBOTIC SURGERY VARSHA VARGEESE 30 32 7 STELLATOR ATHEENA VIJAY 34 8 CAN TESLA POWERWALL BE A SUCCESS IN INDIA? SUSEEL KRISHNA 35 9 DATA ACQUISTION AND INSTRUMENTATION SOORAJ P J 36 37 10 VIRTUAL INSTRUMENTATION ARCHANA K NAIR 39 41 11 INDUSTRIAL CONTROL SYSTEMS SURYA KRISHNA R 12 INTERNSHIP AT FERTILIZERS AND CHEMICALS OF GREESHMA JAYACHANDRAN TRAVANCORE, ERNAKULAM 13 SEMICONDUCTOR SIZE R ROHAN 14 THE VIRTUAL ONE - SEMICONDUCTORS ADERSH BABU 15 DIGITAL JEWELLERY SRUTHI RAJAN 16 ADVANCED DRIVER ASSISTANCE SYSTEMS (ADAS) NAJAHUL ISLAM O P 17 THE PRINCIPLES OF FACE AND VOICE ABHISHEK KRISHNA RECOGNITION IN SMARTPHONES 18 WIRELESS CHARGING OF MOBILE PHONES USING MEENA C MICROWAVES 19 5G TECHNOLOGY AKASH RAJESH ANUVIND P E 20 DATA MINING IN SOCIAL MEDIA - THREAT OR AADITHYA V NAIR BENEFIT ARATHY KA 21 TECHNOLOGY: A BOON OR A CURSE?? 22 ENTANGLEMENT OF DATA 9 Inspecto Department of Instrumentation and Control Engineering, NSSCE
INSTALLATION STRATEGY OF Control system framework THE FLOATING BRIDGE Introducing an installation strategy for the HAYA HASHMA , S4 ICE floating bridge system. The dense worldwide network of bodies of wa- 1. The assembled floating bridge in the river ter, such as rivers, lakes, and channels, demands (or lake) side is carried to the desired posi- the corresponding water crossings, with a vari- tion by rotating it. ety of efficient solutions currently available, in- cluding bridges, tunnels, and ferries. Among 2. When the bridge reaches the opposite side bridges, which are the most used structures, (i.e. its target), the bridge is maintained at floating bridges, also known as ribbon bridges. the desired position under external distur- Compared to conventional bridges, the floating bances such as strong waves. bridges can transport heavy vehicles, enable fast installation, and reduce environmental impacts. 3. While maintaining the bridge position, vehi- The most notable and exclusive characteristic of cles can pass through the floating bridge. this type of bridging is the relocation ability due to the bridge portability. Regarding the installation and operation of An automated strategy for safe and fast installa- floating bridges, safety and speed are among tion of a floating bridge system constructed by the most important factors that should be con- connecting multiple floating units. The designed sidered. However, the major tasks of installation control system with a state estimator success- and operation are mainly performed manually fully performs yaw motion control and main- with the support of erection boats and cables. tains the straightness among the floating units In addition, installation is relatively time-con- composing the bridge. The control system is suming given the difficulties faced by operators based on observer-based optimal control imple- working across rivers and lakes. Furthermore, in mented on active electrical propulsion systems combat, war, and other dangerous situations, mounted on some floating units. The observer manual operation is highly risky. Therefore, it design based on robust control is applied, ob- is essential to develop an advanced installation taining robust control performance. The math- strategy in which autonomous systems handle ematical model describing the dynamics of the the previously mentioned limitations and situa- bridge system is also derived through experi- tions. ments and simulations. In this study, we focused on the control system The obtained simulation and experiment results design for floating bridge installation and auto- demonstrate the effectiveness and stability of mated position keeping to maintain the struc- the proposed control approach and confirm the ture straight. Optimal control based on a state feasibility for automated position control, instal- estimator was developed to handle a floating lation, and operation of the floating bridge sys- bridge system comprising five floating units. To tem. The proposed strategy and designed con- verify the effectiveness of the proposed control- trol system may be applied in practice for the ler, numerical simulations were conducted un- installation and operation of floating bridges. der different conditions. For further validation, experiments were conducted considering sever- al environmental conditions in a realistic scenar- io. The simulation and experiment results show that the proposed approach and control system is suitable for the installation and operation of floating bridges. 10 Inspecto Department of Instrumentation and Control Engineering, NSSCE
OPTOELECTRONICS that are similar to normal diodes except that they emit light that can be visible, infrared, K Sidharth, S2 ICE or ultraviolet. It comes with a different color variant. TRACEBACK TO THE ORIGIN • Photodiodes : They are used in many types of circuits and different applications such as The idea about electronics was seen about 40 cameras, medical instruments, safety equip- years ago. The term optoelectronics seems to ment, industries, communication devices, be the most preferable for the denouement of and industrial equipment. new and significant achievements in history. • Optical Fibers : They are used in telecom- The development of the first applications began munications, sensors, fiber lasers, bio-med- decades ago with the inventions of high-end, in- icals, etc. frared light-emitting diodes. The current push in • Solar Cells : They are applicable in rural the semiconductor industry is the development electrification, telecommunication systems, of optoelectronic devices for high-speed com- ocean navigation aids, and electric power munication. generation in space and remote monitoring and control systems. WHAT IS OPTOELECTRONICS? • Laser Diodes : They are used in fiber optic communication, optical memories, military Optoelectronics deals with the study of light applications, CDplayers, surgical procedures, which interacts with electronic devices. The Local Area Networks, long-distance commu- main purpose of this device is to convert the nications, optical memories, fiber optic com- electric signals into photon signals and vice ver- munications, and in electrical projects such sa. Optoelectronic devices can be divided into as RF Controlled Robotic vehicles with Laser two – light-sensitive devices and light-generat- Beam Arrangement and so on. ing devices. Light-emitting devices use voltage and current to produce electromagnetic radia- Furthermore, they can be employed for gener- tion. Such light-emitting devices are commonly ating a wide variety of stationary or moving vi- used for purposes of illumination or as indicator sual displays, provide an automatic switching lights. In contrast, light-detecting devices, such or alarm action in the presence or absence of as phototransistors, are designed to convert a visible or invisible light source, or provide re- received electromagnetic energy into electric mote-control action via an infra-red light gener- current or voltage. Light-detecting devices can ator and a remotely placed detector. be used for light sensing and communication. Examples of these include darkness-activated OPTOELECTRONICS: FUTURE REVOLUTION switches and remote controls. In general terms, light-detecting devices work by using photons to The field of optoelectronics is even used today liberate bound electrons within semiconductor and is still being getting upgraded for vast out- materials. comes. In the coming future, wired communica- tions like telephony systems will be completely FIELD OF APPLICATIONS: replaced by wireless with the help of optoelec- tronics. The main area of research of optoelec- • Light Emitting Diode : Light-emitting di- tronics is that it would provide infinite oppor- odes are two-lead semiconductor devices tunities in the field of photonics. Materials like Gallium Nitride show great potential in the ad- vancement of these devices. One of the main advancements would be in space technology it would provide a way for scientific instruments, communication instruments, power systems, or- bit control systems, and more. 11 Inspecto Department of Instrumentation and Control Engineering, NSSCE
BIONIC PERSON VIA ARTIFICIAL INTELLIGENCE Atheena Vijay, S2 ICE “Artificial Intelligence is likely to be either the best we are not yet sure whether in the long-term or worst thing to happen to humanity” positive effects will always keep outweighing the ~ Stephen Hawking. negative effects and if that is not the case then we are in serious trouble. Artificial Intelligence-it’s here and about to sur- In recent years, AI has attracted attention as a pass our own, crow techno-visionaries, proclaim- key for growth in developed countries such as ing dominion. It’s so simple and obvious, each Europe and the United States and developing side maintains, only a fanatic could disagree. countries such as China and India. The attention The recent observance of the silver anniversa- has been focused mainly on developing new ar- ry of artificial intelligence has been heralded by a surge of interest in machine learning-both in building models of human learning and in un- derstanding how machines might be endowed with the ability to learn. This renewed interest has spawned many new research projects and resulted in an increase in related scientific activ- ities. Nowadays, many current real financial applica- tions have nonlinear and uncertain behaviours which change across the time. Therefore, the need to solve highly nonlinear, time variant problems has been growing rapidly. AI has many applications in different fields. These include In Intensive Care Units: The intensive care tificial intelligence information communication environment is particularly suited to the imple- technology (ICT) and robot technology (RT). Al- mentation of AI tools because of the wealth of though recently developed AI technology cer- available data and the inherent opportunities tainly excels in extracting certain patterns, there for increased efficiency in inpatient care. are many limitations. Most ICT models are overly In Robotics: Robots combine mechanical effec- dependent on big data, lack a self-idea function, tors, sensors, and computers. AI has made sig- and are complicated. Rather than merely de- nificant contributions to each component. We veloping next-generation artificial intelligence review AI contributions to perception and ob- technology, we aim to develop a new concept of ject-oriented reasoning. general-purpose intelligence cognition technol- ogy called Beyond AI. Specifically, we plan to de- In Special Education: AI techniques have also velop an intelligent learning model called Brain been identified as one of the most valuable appli- Intelligence (BI) that generates new ideas about cations in the field of special educational needs events without having experienced them by us- (SEN). The goal of these tools is to enhance the ing artificial life with an imaginary function. way children interact with their environment to promote learning and to enrich their daily life. This is not the end of AI, there is more to come Every technology has its advantages and disad- from it, who knows what AI can do for us in the vantages but advantages always outweigh dis- future, maybe it will be a whole society of robots. advantages for the technology to survive in the market. Nonetheless, for Artificial Intelligence 12 Inspecto Department of Instrumentation and Control Engineering, NSSCE
BIOMEDICAL INSTRUMENTATION ADITHYA V NAIR , S2 ICE We know that the world around us is not con- astronauts during NASA’s Mercury,Gemini,Apol- stant. It changes every second. Technology also lo missions. develops in each second. Along with the tech- nology drastic changes occur in the field of ar- Bioinstrumentation is a new upcoming field , tificial intelligence [ai] and instrumentation and concentrating on treating diseases and bridg- automation. New researches regarding automa- ing together the engineering and medical fields. tion develop even in the biomedical field too. The majority of innovations within the field have The growth of the human brain brings the bio- occured in the past 15-20 years. Bioinstrumen- medical field to it’s next level. Many researches tation has revolutionized the medical field, and are occured nowadays in this field to increase has made treating patients much easier. The benefits of machinery and artificial intelligence instruments or sensors convert signals found to provide better health to humans. Automatic within the body electrical signals. surgery using artificial intelligence is one of the things that research progresses rapidly nowa- Subfields of biomedical instrumentation: days. • Biomedical options What is biomedical instrumentation? • Creation of sensor • Genetic testing Bioinstrumentation or biomedical instrumenta- • Drug delivery etc. tion is an application of biomedical engineering, • Other fields of engineering , such as electri- which focuses on the device and machines used to measure, evaluate, and treat biological sys- cal engineering and computer science , are tems. It focuses on the use of multiple sensors related to biomedical instrumentation. to monitor physiological characteristics of a hu- man or animal. Such instrumentation originated Circuits/creation of sensors as a necessity to constantly monitor vital signs of Sensors are the most well known aspect of bio- 13 Inspecto Department of Instrumentation and Control Engineering, NSSCE
instrumentation. They include thermometers robots and cellular scanning devices. ,brain scans, and electrocardiograms. Sensors take in signals from the body ,and amplify using Some of the biomedical instruments are : circuits. Circuits take in a voltage source, and modify them using resistors, capacitors , induc- • Anesthesia machine tors and other components. They then let out • Aspiration/suction pump a certain amount of voltage , which is used for • Autoclave/sterilizer analysis. The data collected using sensors is of- • Blood chemistry analyzer ten displayed on computer programs. This field • C-arm system – unit ,monitor,table of bioinstrumentation is closely related to elec- • Cast saw trical engineering. • Centrifuge • Coagulation analyzer It is used in the field of : Nowadays the biomedical instrumentation field • Fitness trackers is going through drastic changes and in the • Biomedical optics coming days we can hope for the good magics • Genetic testing through this field to include modern surgery • Drug delivery/ aiding machines techniques like automatic surgery using robots. Caring for people using robots and scanning With the fields of biomedical engineering and bodies easily with the help of artificial intel- medicine growing rapidly , bioinstrumentation ligence and to know about the actual disease will continue to progress. The main focus of the and its details and to cure it easily, of course the field is to make the medical world faster and distance to that time is not so far. Let’s hope for more efficient. With the major improvement in better days technology and how scientists understand the human body , the field will continue to grow. The main focuses for the future of the field include 14 Inspecto Department of Instrumentation and Control Engineering, NSSCE
NEURALINK This is based on technology developed at UCSF and UC Berkeley. The probes, composed most- LITCY SIVAKRISHNAN, S2 ICE ly of polyimide, a biocompatible material, with a thin gold or platinum conductor, are inserted Neuralink is a device that will be surgically im- into the brain through an automated process planted into your brain and with it, you’ll be able performed by a surgical robot. Each probe con- to communicate with machines and even control sists of an area of wires that contains electrodes them. It will also help study the electrical signals capable of locating electrical signals in the brain, in the brain and arrive at solutions that can help and a sensory area where the wire interacts with cure various medical problems. Neuralink was an electronic system that allows amplification founded in 2016 by Elon Musk. He was aiming to and acquisition of the brain signal. Each probe make devices to treat serious brain diseases in contains 48 or 96 wires, each of which contains 32 the short term, with the eventual goal of human independent electrodes, making a system of up enhancement, sometimes called Transhuman- to 3072 electrodes per formation. Neuralink says ism. they have developed a robot capable of Neura- link that has developed an Application-Specific The neurons in your brain connect with each Integrated Circuit (ASIC) to create a 1,536-chan- other to form a large network and communicate nel recording system. This system consists of using chemical signals called neurotransmitters. 256 amplifiers capable of being individually pro- This reaction generates an electric field and you grammed (analog pixels), analog-to-digital con- can record these reactions by placing electrodes verters within the chip (“ADCs”), and peripheral nearby. These electrodes can then understand circuit control to serialize the digitized informa- the electrical signal in your brain and translate tion obtained them into an algorithm that a machine can read. This way Neuralink will be able to read what you The size of a Neuralink link chip compared to the are thinking and find a way for you to talk to ma- little finger of the hand. These wires will be sur- chines without even opening your mouth. Neu- gically placed inside your brain using a robot. In- ralink will be using its specially developed robots stallation of Neuralink is like drilling a hole into to carry out the quick and precise insertion of your skull and inserting wires into your brain. the device into the cortex. Each electrode will be inserted specifically by- passing any kind of blood vessel. The procedure 15 Inspecto Department of Instrumentation and Control Engineering, NSSCE
is complex and beyond the capabilities of even also be able to help regain someone’s eyesight skilled human hands. The wire is as thick as the even if they have lost their optic nerve. This tech- neurons in your brain and thinner than a strand nology, in principle, will be able to fix anything of hair at 100 micrometers. To compare, imagine wrong with the brain and can also be used to the diameter of your hair, and then divide that restore the memory, speech, and movement of diameter by ten. You can place more than one a paralyzed person. It’ll also be able to help hu- device inside your skull. mans interact with each other without the need The Nueralink robot which has been specially de- to actually talk and even have the ability to read signed to ensure that the device is inserted into someone’s mind using signals. the brain without touching any veins or arteries will insert the module into your brain using a The most recent revelation is about how users microscope and needles the size of 24 microns. will be able to stream music directly into their These needles are so small that you can’t easily brains. It doesn’t need a physical communica- spot them with the naked eye. The installation tion device like a phone or a smartphone to con- procedure could take up to two hours according nect with people. It is also able to control basic to Musk and the person could also be under par- devices like your smartphone, computer, and tial anesthesia during the process. The operation maybe even type using thoughts. The idea of will require a 2mm incision which will be dilated telepathy is not far fetched with tech like this. up to 8mm. After the procedure is complete the The speed of communication will also increase exposed part of the skull will be covered with by folds as we won’t be wasting time typing the chipset module. With Neuralink a chipset, sentences. Although, the process of capturing called N1 chipset, will be installed in your skull thoughts and transcribing them into sentences which is 8mm in diameter and has multiple wires will take time. housing electrodes and insulation for the wires. The goal of the N1 chip is to record and stim- Neuralink aims to convert information obtained ulate electrical spikes inside your brain and will from neurons into an understandable bina- be able to learn different skills using a dedicated ry code to achieve a greater understanding of app. The main sign is that there won’t be any brain function and the ability to stimulate these wires or antennas coming out of your head after neurons back by inserting many flexible probes the device has been installed. into the brain, which may avoid the problems of tissue damage and longevity associated with the This project is mainly focusing on helping the larger and more rigid probe. healthcare industry. The machine will be able to help paraplegics with simple tasks like operating a phone or interacting with a computer. It may also be used to treat epilepsy. The device will 16 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Robotic Surgery the proper equipment, the human hand cannot reliably guide a surgical instrument within <100 VARSHA VARGEESE, S2 ICE μm of its target. Moreover, when the surgeon is exhausted, an intentional tremor develops and It’s been almost 20 years since robotics first it reduces the accuracy. Finally, the eye itself has appeared in the operating room. During that a natural motion of 200 Hz and acts as a mov- time, there has been a great deal of progress ing target. The combination of these elements in integrating robotic technologies with surgi- creates an operative environment that is within cal instruments, as evidenced by the thousands the capabilities of current robotic technology, al- of successful robotic assist cases. However, to though not with the required accuracy. Robotic nurture past successes and fully strengthen systems have been developed for such applica- the potential of surgical robotics in the future, tions to overcome human limitations. With com- there is a need to increase shared understand- puter-integration, eye movement can be tracked ing, knowledge, and communication among sur- and the eye can see at rest; Also, the surgeon geons, engineers, entrepreneurs, and health- can filter the tremor. The result is a system that care providers. can place a laser within 10 μm of the target, so it is 10 times more accurate and perfect than an Robotic surgery has been described as the new unaided human hand. revolution and is one of the most talked-about topics in surgery today. There is no doubt that There must be communication and mutual un- they will become an important tool in the field derstanding between surgeons, engineers, en- of surgery as research is being done in this area. trepreneurs and health care providers to take full advantage of this promising technology for Retina repair is a picture that demonstrates how surgical intervention and to continue relevant humans and robots can work together to im- innovation. On the clinical side, it starts with an prove surgery. For retinal surgery, the laser must open mind to solving an unresolved clinical need be placed exactly within 25 μm of the target to or unresolved clinical problem and a willingness prevent damage to the retinal blood vessels. If to evaluate promising technologies as a way to a retinal vessel is damaged, retinal hematoma achieve a solution. and subsequent blindness can occur. Without 17 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Stellator • Making stellarator coils is a challenge be- cause it requires manufacturers to construct ATHEENA VIJAY, S2 ICE large-bore wire coils with millimeter preci- sion. The stellarator is one of the technologies scien- tists believe could lead to real-world fusion pow- • Schematic image of permanent magnet stel- er. A stellarator is a machine that uses magnetic larator with plasma in yellow. Red and blue fields to confine plasma in the shape of a donut, indicate permanent magnets with simplified called a torus. These magnetic fields allow scien- coils surrounding the vessel. tists to control the plasma particles and create the right conditions for fusion reactions. Stellar- Benefits of Stellarator: ators use extremely strong electromagnets to generate twisting magnetic fields that wrap the Stellarators have several advantages over toka- long way around the donut shape. mak, the other main technology that scientists are exploring for fusion power. Stellarators re- Stellarator Facts: quire less injected power to sustain the plasma, have greater design flexibility, and allow for sim- • The stellarator concept was invented by Ly- plification of some aspects of plasma control. man Spitzer at Princeton University in 1951. However, these benefits come at the cost of in- creased complexity, especially for the magnetic • Much of the early development of stellar- field coils. ators in the 1950s occurred at a laboratory that is now DOE’s Princeton Plasma Physics Stellarator Design: Laboratory. The work was so difficult that the scientist in charge nicknamed it “Project To advance stellarator design, scientists have Matterhorn.” turned to high-performance computing and state-of-the-art plasma theory. These tools have • Stellarators use external coils to generate a helped researchers optimize the Helically Sym- twisting magnetic field to control the plasma metric Experiment (HSX) stellarator in Wisconsin instead of inducing electric currents inside and the Wendelstein 7-X stellarator in Germany. the plasma like a tokamak. 18 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Can Tesla Powerwall be a success in India? Suseel Krishna, S4 ICE The Powerwall and Powerpack are recharge- in October 2016 at Universal Studios’ Colonial able lithium-ion battery stationary energy stor- Street, Los Angeles, backlot street set and is de- age products manufactured by Tesla, Inc. The signed to work with the solar panel roof tiles to use of powerwall is home energy storage and be produced by SolarCity. In April 2020, Tesla an- stores electricity for solar self-consumption, nounced that it had installed its 100,000th Pow- time of use load shifting, backup power, and off- erwall.During Q1 2020, it said it had deployed the-grid use. Larger powerwalls are also there 260 MWh of energy storage (Powerwall, Power- which are for commercial or electric utility grid pack, and Megapack). use and can be used for peak shaving, load shift- 6.4KWh capacity was given by the first gener- ing, backup power, demand response, microg- ation powerwall for daily cycle use. We can ex- rids, renewable power integration, frequency pand capacity by connecting multiple power regulation, and voltage control. walls. In March 2016 they stopped to contin- ue the previously announced 10 KWh capacity They started the development of Tesla walls in model designed to produce backup power they 2012,they tested the prototypes in selected in- convert 6.4 KWh to use as backup power. dustrial customers. Also they found the power- packs reduced the bill by 20%. They revealed the The Powerwall is optimized for daily cycling, powerwall on April 30,2015 when they realised such as for load shifting. Tesla uses proprietary that the product had the power output of 2 KW technology for packaging and cooling the cells steady and 3.3 KW peak and also announced in packs with liquid coolant.Elon Musk, the chair- that they will double the output to 5KW steady man, CEO and product architect of the Tesla com- with 7KW peak without any price hike. pany, promised not to start patent infringement lawsuits against anyone who, in good faith, used In October 2016, Tesla announced that nearly Tesla’s technology for Powerwalls as he had 300 MWh of Tesla batteries had been deployed promised with Tesla cars. They use nickel-man- in 18 countries.The Powerwall 2 was unveiled ganese-cobalt chemistry battery which provides 19 Inspecto Department of Instrumentation and Control Engineering, NSSCE
7KWhPWI and can be cycled 5,000 times before longed to the middle-income bracket earning a warranty expiration. The Tesla Powerwall has a gross annual income between 7,700 and 15,400 92.5% round-trip efficiency when charged or dis- U.S. dollars. As per this we can understand that charged by a 400–450 V system at 2 kW with a this product is not affordable or very difficult to temperature of 77 °F (25 °C) when the product afford for a middle class family. This product can is brand new. Age of the product, temperatures only be affordable to high class families in india. above or below 77 °F (25 °C), and charge rates But the government can make a lot of things us- or discharge rates above 2 kW would lower this ing power walls and power packs. We all know in efficiency number, decreasing the system per- India many places are not properly electrified to formance. overcome that powerpack can be used. In such places select houses and make a grid which is A DC-to-DC converter to sit between a home’s electrified using powerpacks. This powerpack existing solar panels and the home’s existing DC can act as an electric source which is recharged to AC inverter is used in first generation power- using solar power. And also the government can wall. If the existing inverter is not storage-ready, provide subsidies to buy powerwalls like they one must be purchased. The second generation provide subsidies to buy electric vehicles and so- Powerwall incorporates a DC-to-AC inverter of lar cells. But till date of this article written Tesla Tesla’s own design. Production of the 21700 cell has not launched a single product in India but type (Tesla names them 21-70) for the PW2 and on January 8,2021 they registered a company in PP2 began at Gigafactory 1 in January 2017. India named Tesla India Motors and Energy in Bengaluru. They will launch their products soon Can Tesla make a change in India? in Indian market. The 7kWh variant is priced at $ 3,000 (Rs 1,94,000); We have to move forward,we have a long way the 10 kWh one at $ 3,500 (Rs 2,26,000). As of to go. For this many changes have to happen so 2016, about 121 million households in India be- this may bring a drastic change in our society. 20 Inspecto Department of Instrumentation and Control Engineering, NSSCE
DATA ACQUISITION AND switched output used to trigger an alarm or acti- INSTRUMENTATION vate a switch when a pre-set condition is met or exceeded. It may be used for data analysis. Data SOORAJ P J , S2 ICE points or real-time data can be fed into a system that reduces or compiles data in order to gen- “Data is a precious thing and will last longer than erate useful information. Fourier transforms are the systems themselves.” - Tim Berners-Lee used to reduce a signal with respect to time into a series of sinusoidal terms. Application soft- Growth in the field of technology, specifically in ware is commonly used for signal processing smartphones has led to text, video, and audio is and measurement functions. The central pro- included under data plus the web and log activ- cessing unit receives a feedback signal and pro- ity records as well. Most of this data is unstruc- duces a switched output or analog control signal tured. Data acquisition, or DAQ as it is often re- that is used to control devices in a system or pro- ferred to, is the process of digitizing data from cess. Common applications include motion con- the world around us so it can be displayed, ana- trol, industrial automation, web processing, and lyzed, and stored in a computer. A simple exam- other industrial operations. Supervisory control ple is the process of measuring the temperature and data acquisition (SCADA) systems are large- in a room as a digital value using a sensor such scale, industrial control and measurement sys- as a thermocouple. Modern data acquisition sys- tems that consist of a central host, one or more tems can include the addition of data analysis remote units, a communications network, and and reporting software, network connectivity, specialized software. and remote control and monitoring options. When used in the world of machinery, data ac- Data acquisition systems and instruments used quisition devices can confirm that a system is to monitor processes and systems have the abil- meeting design specs and that what is being ity to record data points over a timed interval. produced meets the need of the end-user. It They are customized for a particular application allows products to be tested to make sure that and may require specific modules in order to ac- they meet the quality needed for marketing. commodate the type or number of inputs used. Products that are defective can be easily identi- They may be equipped with on-board memo- fied and faults can be corrected. The entire pro- ry, removable storage, or may interface with cess can be tracked, monitored, and supervised a computer, used to process, store, and visual- without human interaction. ize the data. They may also be equipped with a 21 Inspecto Department of Instrumentation and Control Engineering, NSSCE
VIRTUAL with various application-specific input/output INSTRUMENTATION devices. Virtual instrumentation brings many advantages over “conventional” instrumenta- ARCHANAK NAIR , S2 ICE tion. Employing general-purpose computing platforms significantly decreases the price of Virtual instrumentation is the use of custom- instruments. Standard system interfaces allow izable software and modular measurement seamless integration of virtual instruments in a hardware to create user-defined measurement distributed system, whereas software reconfig- systems, called virtual instruments. A virtual uration facilitates flexibility and scalability. Most instrument consists of an industry-standard general virtual instrumentation concepts are computer or workstation equipped with pow- directly applicable in biomedical applications; erful application software, cost-effective hard- however, specific features of the biomedical in- ware such as plug-in boards, and the driver strumentation must be taken into account. In software, which together perform the functions this article, we present a brief history and the of traditional instruments. Virtual instruments current state of virtual instrumentation for bio- represent a fundamental shift from traditional medical applications. hardware-centered instrumentation systems to software-centered systems that exploit the com- Virtual Instrumentation can be used both for puting power, productivity, display, and connec- designing applications that simulate real-world tivity capabilities of popular desktop computers devices and instruments, as well as for model- and workstations. ing and simulation of the real mechanical pro- cesses. This last facility represents an important Virtual instrumentation merges sensing technol- and significant characteristic of LabVIEW, which ogies with hardware and software technologies can be used to create powerful tools in the edu- to create flexible and sophisticated instruments cation process. LabVIEW software, a registered for various control and monitoring applications. trademark of National Instrument Inc. (NI), rep- Biomedical applications require sophisticated resents a programming environment that in- and flexible instrumentation, accomplished by cludes specific tools necessary for instrument using general-purpose computing platforms control, data acquiring, storage, analysis, pre- Block Diagram representation of a typical Virtual Instrumentation Model 22 Inspecto Department of Instrumentation and Control Engineering, NSSCE
sentation, and integrating of those features in strument combining software and hardware. a single system. It uses graphical programming This article is from the perspective of explora- and a special graphical language. The main goal tion and research, and as a reference when en- of LabVIEW represents the creation of virtual in- countering hardware problems in the research struments. and development of virtual instruments. Virtual Instrument Development board, based on Lab These characteristics make VI proper for self-in- VIEW development platform, can achieve virtu- struction and distance learning. Distance learn- al oscilloscope, virtual signal generator, virtual ing is not widely used yet in engineering edu- spectrum analyzer, and so on. And the use of cation in Romania, because of the numerous virtual reality on the oscilloscope signal testing applications and labor works requested for this and analysis, while the virtual signal generator’s specialization. However, accepting that all forms output signal also had a measured and analysis, of flexible education supported by information the results are satisfactory, the virtual spectrum and communication technology can be classified analyzer at the request of the software is rela- as distance learning, in parallel with the devel- tively high. opment of specific software, this type of educa- tion will find more and more place in engineer- Virtual instruments are fuelled by ever-advanc- ing education.This field involves some aspects ing computer technology and offer you the pow- like measuring signal acquisition, as well as the er to create and define your system based on an processing, analysis, storage, distribution, and open framework. This concept does not only en- deployment of data and information related to sure that your work will be usable in the future the physical phenomenon measurement, it also but also provides the flexibility to adapt and ex- involves the human-machine interface, as well tend as needs change. Thus, virtual instrumen- as the communication with other devices. The tation is more effective, flexible, and efficient as virtual instruments of monitoring and process it is user-friendly, it simplifies the measurement control are used for their low cost, they combine procedures with visual or graphical-based pro- non-exclusive operation hardware with powerful gramming. All operations of the test and mea- software and configuration flexibility; obtaining, surement procedure like control of information, as a result, a scalable architecture instrument, display and analysis of acquired data, data man- that is to say, with the possibility to be adapted agement such as archiving, printing, internet to the process whenever is required. publishing in the software. Thus a virtual instru- ment defines its specific function through soft- At present, the technology of virtual instruments ware programming and more development in has been developed very quickly in the field of this will simplify the analysis of instruments. electronic measurement and automatic control. The virtual instrument is a kind of functional in- 23 Inspecto Department of Instrumentation and Control Engineering, NSSCE
INDUSTRIAL CONTROL compromise are sizable financially, operational- SYSTEMS ly, and protection-wise. SURYA KRISHNA R , S2 ICE First, the gadgets themselves create demand- ing situations for conventional IT protection As cyber-attacks progressively concentrate on approaches and technology. A pattern of gad- physical processes to blackmail or disrupt vi- gets consists of antique variations of Microsoft tal production systems, the safety of industrial Windows including Windows XP or Windows 7, control systems (ICS) becomes more and more a huge variety of embedded gadgets includ- important. The broader threats to Ukrainian ing programmable common sense controllers, and yank oil refineries and also the grid within controllers, relays, sensors, etc., business net- the geographic region are additional issues for working equipment, and extra. These gadgets boards of directors, governments,the and in- require a distinctive method to protect from the dustrial companies. modern, updated, OS-primarily based totally, or cloud-primarily based totally gadgets in today’s What is an Industrial Control System? IT stack. This is often an oversized category of pc sys- Second, the capability influences are distinctive. tems, generally known as OT or supervisory In maximum IT cybersecurity efforts, the prior- control and data acquisition (SCADA) systems or ities are confidentiality-integrity-availability, in cyber-physical systems. that order. In the ICS world, the finest dangers are to the protection of humans and property, ICS focuses on industrial processes or auto- accompanied by availability and integrity. Infor- mation, not other operating systems, such as mation confidentiality, whilst possibly of a few building control, medical equipment, etc. The important, pales relative to those others. As a re- components provided by the process control sult, the point of interest of chance control has system can ensure the correct and continuous to additionally adjust. operation of various industrial systems from electricity to water to manufacturing. They can Third, incident detection and reaction require control the input and output of key elements of particular information of the structures affected. work or physical processes. The process is usu- In many senses, IT structures are commodities ally adjusted in real-time to ensure correct and with particular features, however, are generally safe operation. They usually include their own grouped and analyzed with a huge variety of to security system to ensure that they stop when be had detection rules. Similarly, while respond- the process terminates. ing to a threat, there are several secure and pow- erful moves to take uniformly and automatical- In the past, these systems have broken away ly. However, business management structures from traditional IT networks and used various conduct is unique – frequently to that specific specialized components. These OT systems are technique. In addition, the reaction has to be increasingly integrated with IT to improve oper- measured and treated in a manner that doesn’t ational efficiency and reduce total cost of owner- motive extra damage than exact through pre- ship. Therefore, network security threats contin- venting the anticipated operational technique ue to increase. Air gap systems are increasingly inappropriately. integrated into the Internet connectivity compo- nents of corporate IT environments. Finally, to stable ICS appropriately and with op- erational resilience, particular information of Why do we need ICS security? management structures and protection is re- quired, that’s a unique mixture in an excellent ICS protection is essential due to the fact those shorter delivery than the stretched IT protection structures are below assault and the effects of resources. Industrial management structures 24 Inspecto Department of Instrumentation and Control Engineering, NSSCE
have been designed years or many years in the 2. Bring IT and OT collectively to broaden an past and there may be a scarcity of professional ICS security solution that works for both employees that knows them. To stable ICS, the enterprise wishes to enroll in IT protection com- We regularly see this as “IT goes to lead.” Or petencies to those humans with information of “ICS/OT will decide what’s going to work at this the structures. plant.” ICS is different, and the proper solution isn’t always simple to hire the equal equipment Three ways to achieve ICS security. This is a very and tactics as in IT. By the same token, IT safety esoteric topic, but first, to make significant prog- has lots to deliver to the table in information and ress in a more secure ICS infrastructure, three capabilities – in addition to the need to have a key elements are required: constant dimension for the board and different stakeholders. It is crucial to bring the 2 agencies 1. Set goals and develop an ICS security plan. together to make this happen. The first step to safeguard an ICS security is to 3. Use a secure platform rather than several set the goals you want to achieve. The good tools. news is that there are many standards: CIS Top 20, NIST CSF, IEC 62443, etc. The biggest obsta- Of course, we tend to have an interest in this cle is to determine the target. Many companies game ; however, we firmly believe that solely are in trouble because they have a specific plan in this means will we effectively make sure the (network segmentation, network attack detec- real security of ICS. Gartner analysts agree that tion, asset visibility) to generate short-term prof- “the most well-liked solutions are those who it in the field of industrial engineering requires have many valuable options that are easy to im- a real plan that integrates a series of complex plement and simple to clarify to operations as a measures. Success in the field of industrial safe- result of they do not cause extra risks and are ty requires a real plan that integrates a series compatible with different security tools.” In ICS, of complex measures. Choosing a standard and find a platform that meets the foremost neces- focusing on complying with it is the best way to sary ICS security needs safely and effectively, make significant and measurable progress. whereas providing constant quality and indica- tors of IT security. 25 Inspecto Department of Instrumentation and Control Engineering, NSSCE
INTERNSHIP AT FERTILISERS AND CHEMICALS OF TRAVANCORE, ERNAKULAM Greeshma Jayachandran, S6 ICE THE FERTILISERS AND CHEMICALS TRAVANCORE LIMITED- popularly known as FACT- was indeed a revolution when it was established as the first large scale fertiliser factory in the country. Since then, it has played a major role in creating fertiliser consciousness among our farmers, and giving positive direction to the modernization of agriculture in India. I,with my 10 batchmates from S5IC underwent an in-plant training to acquaint ourselves for a pe- riod of 2 weeks from March 22 to April 4, 2021 to get industrial exposure in the practical aspect of technical implementation. During the course of study we were able to interact freely with the officials and other technicians in the plant and fetch maximum relevant information from them. We also got an opportunity to visit the work area and get experience in working and maintenance of various industrial instruments. The training helped us to get an idea about the various manu- facturing processes and the instruments which are used in the plant. We also got familiarized with various large-scale compressors, and distribution systems which play the most crucial role in the manufacturing process, controlling various processes and distribution and transportation of chem- icals in the chemical industry. There are 3 major plants in FACT ,they are RAP, Petrochemical and Fertilizers plants. We visited these 3 plants by splitting them into 3 groups. First day spent in the Ammonia plant and got a brief introduction on the process and theories. The Replacement Ammonia Project, Udyogamandal was commissioned in 1998 at a cost of 720 crore. It has a per day production capacity of 900 metric tonnes and an overall storage capacity of 10000 tonnes in the petrochemical division. FACT requires around 800 tonnes of ammonia per day for the Udyogamandal and Ambalamugal units of the company. In solid or liquid states, ammonia salts and solutions are the active components of most synthetic fertilizers used in agriculture, which consume 83% of the world’s ammonia and warrant higher demands for ammonia production. The primary industrial method for ammonia synthesis is the Haber-Bosch process.Here we could the stages.and process like desulphurisation,Reform- ing sections including primary and secondary reformers,Co conversion section,process gas cooling ,CO2 removal,methanation and synthesis sections.We are now able to understand and identify in- struments like • Different types of solenoid valves - like 1. Direct operated solenoid valve 2. Indirect operated solenoid valves 3. Semi direct operated solenoid valve 4. Direct operated 3/2 way solenoid valve • Level trol -an instrument used for measuring the liquid level between two known points • Proximity transducers use Eddy Current principle to measure the distance between the probe 26 Inspecto Department of Instrumentation and Control Engineering, NSSCE
tip and the surface to be observed. • Differential pressure transmitters (also called DP transmitters)-the most versatile measuring instruments. In addition to pressure, they are used to measure level and flow, on a wide variety of fluids even at high temperature • I/P Converter. After spending 4 days in the plant and labs,the next 4 days we spent in the Petrochemical division. The FACT petrochemical division comprises of 3 main sections: 1. Main plants - Hyam (Hydroxylamine sulphate), Anone (Cyclohexanone),Caprolactam, 2. Effluent treatment plant, Flaking and bagging 3. Offsite plants - Nitrogen plants and compressor house, Intermediate tank farms, Main tank farm, Ammonia handling plant 4. Captive Power Plant (CPP)- Captive power plants also called auto producer or embedded gen- eration, is an electricity generation facility used and managed by an industrial or commercial energy user for their own energy consumption. Here, we could see a lot of Control valves, pressure switches, and different types of pH analysers. Last 4 days were spent in Fertilizer plant.Main product of this plant is Ammonium sulphate. Am- monium phosphate is an inorganic compound with formula (NH4)3PO4. It is the ammonium salt of ortho phosphoric acid and is a valuable material that finds major use in fertilizer industries. Am- monium sulphate is produced by combining anhydrous ammonia and sulphuric acid in a reactor. Here the byproduct (NH4)2SO4 produced in the petrochemical division of FACT is used in this plant. Here the main instruments Pressure Gauge, U-Tube Manometer, Pressure Transmitter,Tempera- ture measuring instruments ikeRTD and Thermocouple. Also flow measuring instruments like Rotameter ,Venturi meter ,Orifice meter,Magnetic flow meter,Mass flow meter etc. We could also understand a few details about DCS and its working. FACT implant training was very helpful for en- gineering students like us.The staff were so cooperative with us and made our learning more easy. 27 Inspecto Department of Instrumentation and Control Engineering, NSSCE
SEMICONDUCTOR SIZE mance of up to 10%-15% and reduced power consumption of the rate 25%-30% at the same R ROHAN , S6 ICE complexity and performance. This new node will also see an increase in transistor density by Does size really matter?... At least when it comes up to 1.1 to 1.7 times depending on their struc- to semiconductor chips, it sure seems to make the tures. N3 will have increased EUV layers but will difference. keep using DUV lithography. Considering these still operate in FinFET, they will not be needing a IBM has revealed what it says are the world’s newer generation of Electronic Design Automa- first 2nm process chips, giving a brief preview tion tools to be redesigned from the scratch or of the technology that might eventually power need new IPs. This may prove to be a competi- smartphones, laptops and gadgets of the fu- tive edge over their rivals Samsung’s GAAFET/ ture. MBCFET based 3GAE. The big increment is in the number of transis- tors. When compared to the 7nm chipsets of to- day, IBM’s new technology features a significant number of transistors more, all owing to their very compact design. What this means for us is that the new chips can provide much more bat- tery life and big performance gains. Crunching numbers, IBM says that it’s new chips are “pro- jected to achieve 45 percent higher performance or 75 percent lower energy use than today’s most advanced 7nm node chips.” IBM’s new chips would feature about 333million TSMC also announced its breakthrough in the transistors per square millimetre and compared 1nm semiconductor manufacturing process to their competition TSMC’s (Taiwan Semicon- besting IBM’s 2nm process. According to various ductor Manufacturing Company, Limited) most sources such as Hexus, researchers from TSMC, advanced 5nm chipset has around 173 million MIT and NTU (National Taiwan University), they transistors per square millimetre while Sam- have announced the use of ‘beyond silicon’ and sung has 127 million transistors per square mil- 2D materials in electronics. Researchers have re- limetre. placed the key material of semiconductors, i.e., silicon, with a particular 2D material which com- TSMC’s 4nm chipsets belonging to the N4 fam- bines both silicon and bismuth, a semi-metal ily of chipsets are said to enter into production element, with lower contact resistance and high in 2022. This new technology is to provide for current delivering capacities. greater PPA (Power, Performance, Area) over its N5 (5nm) chipsets all the while keeping the same While all of this may sound great on paper, we design rules and design infrastructure, SPICE, have to realize all this is merely a proof of con- simulation programs and IPs. N4 further ex- cept with TSMC planning on their 4nm chipset tends the usage of EUV lithography tools, while to go into mainstream production in 2022. They reducing the mask count, risks, cost and process have also planned their 3nm chipset for the sec- steps. Even though N4 is cutting edge, it is not ond half of 2022 but all of this relies on a no going to be the most advanced fabrication tech- delay projection. Even though it may take some nology that TSMC will offer in the coming years. time to realize these chipsets, it does give a They also plan to roll out their 3nm chipsets and glimpse at what the future of semiconductors when compared to their current 5nm N5 pro- looks like. cess, their N3 family promises increased perfor- 28 Inspecto Department of Instrumentation and Control Engineering, NSSCE
THE VITAL ONE - SEMICONDUCTORS ADERSH BABU , S4 ICE The semiconductors are the material in which conductor products like chipsets and mining they have conductivity between that of con- of semiconductors are facing more problems ductors and insulators. Conductivity changes including the covid pandemic. Due to Covid- based on environmental conditions. This prop- 19 all chipset manufacturing companies are erty makes it perfect for brains in technologies. closed for over a year, so the production of the Typically it is made off Germanium or Silicon. necessary chipset products are not available in For electronic use, it is doped (adding impuri- markets. TIn electronic gadgets, companies are ties). Semiconductors are the key factor in mod- facing this same problem due to a lack of suf- ern technology. In all fields, we can see the ficient semiconductor chipset. Making/produc- importance of semiconductors like electronic ing chipset is not as much easy to do quickly. gadgets, communication, military, power gen- It needs specific time duration and accuracy in erating systems, healthcare, etc. There are two the process. Moreover, mining companies are types of semiconductors, P-type (Extra holes) facing a shortage of workers. Apple and Tesla and N-type(Extra electrons). This classification were punished by court due to enhancing child is based on electrons and holes. The electrons labouring in mining. For economic profit com- are negatively charged and holes are positively panies are using children for mining . charged. Combinations of semiconductors pro- duce different kinds of electronic functions. Economic growth of all companies are going down. In the current situation, HP and DELL The impact of semiconductors is high in current are facing a chipset shortage and they say that life. Semiconductors are used for mathematical it will affect PC supply. Shares of Dell fell 1 per- calculations and storing, programming, signal cent, while those of HP dropped as much as 6 computations, etc. From electronic companies percent after both companies warned the ongo- to aerospace vehicles including car companies ing computer chip shortage could impact their are consuming semiconductors for chipsets and ability to meet the demand for laptops this year other gadgets. Semiconductors are employed in and the component supply situation remains the manufacturing of diodes, transistors, inte- constrained. The price of these products is in- grated circuits,etc. creasing in markets. Semiconductor products have importance in au- From the analysis, we can conclude that semi- tomobile fields as well. Data storing is a neces- conductors can change the world. There is only sary one and so is its manipulation. All things are one way to overcome semiconductor shortage done using semiconductor forms. But today’s i.e., by increasing production and manufactur- world is facing a major issue related to semi- ing of products. But in the current scenario, it is conductors. Scarcity in the production of semi- difficult to overcome this. 29 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Digital Jewelery the decade, we could be wearing our computers instead of sitting in front of them. SRUTHI RAJAN , S4 ICE Digital jewellery Components The latest computer craze has been to be able to wear wireless computers. The Computer Fash- Each piece of jewelry contains a part of cell phone ion Wave, “Digital Jewelry” looks to be the next embedded in them,together works as a normal sizzling fashion trend of the technological wave. cellular phone.The various components that are The combination of shrinking computer devic- inside cell phone such as Microphone,Receiv- es and increasing computer power has allowed er,display,touch pad,circuit board,antenna are several companies to begin producing fashion embedded into different jewelry parts accord- jewelry with embedded intelligence. Today’s, ing to their working.IBM has developed a proto- manufacturers place millions of transistors on a types of cell phone that that consists of several microchip, which can be used to make small de- pieces of digital jewelry that will work together vices that store tons of digital data. wireless. Here are the pieces of computerized-jewellery phone and their functions: The whole concept behind this is to be able to • Earrings - Speakers embedded into these communicate to others by means of wireless earrings will be the phone’s receiver. appliances. The other key factor of this concept market is to stay fashionable at the same time. • Necklace - Users will talk into the necklace’s Digital jewellry is the fashion jewelry with em- embedded microphone. bedded intelligence. “Digital jewellery” can help you solve problems like forgotten passwords • Ring - Perhaps the most interesting piece and security badges. “Digital jewelry” is a na- of the phone, this “magic decoder ring” is scent catchphrase for wearable ID devices that equipped with light-emitting diodes (LEDs) contain personal information like passwords, that flash to indicate an incoming call. It can identification, and account information. They also be programmed to flash different colors have the potential to be all-in-one replacements to identify a particular caller or indicate the for your driver’s license, key chain, business importance of a call. cards, credit cards, health insurance card, cor- porate security badge, and loose cash. They can • Bracelet -Equipped with a video graphics also solve a common dilemma of today’s wired array (VGA) display, this wrist display could world – the forgotten password.By the end of also be used as a caller identifier that flashes the name and phone number of the caller. With a jewellery phone, the keypad and dialing function could be integrated into the brace- let, or else dumped altogether -- it’s likely that voice-recognition software will be used to make calls, a capability that is already commonplace in many of today’s cell phones. Simply say the name of the person you want to call and the phone will dial that person. IBM is also working on a miniature rechargeable battery to power these components. The same ring that flashes for phone calls could also inform you that email is piling up in your inbox. This flashing alert could also indicate the urgency of the email.The mouse-ring that IBM 30 Inspecto Department of Instrumentation and Control Engineering, NSSCE
is developing will use the company’s Track Point ing trying to keep with all of the passwords and technology to wirelessly move the cursor on a keys needed to access any door or computer computer-monitor display. (Track Point is the lit- program. Dallas Semiconductor is developing tle button embedded in the keyboard of some a new Java-based, computerized ring that will laptops). automatically unlock doors and log on to com- puters.The Java Ring can be programmed to give In the coming age no longer you will find the you access to every door and device. displays on wall or desktops.You can simply view The Java Ring is snapped into a reader,called a the images or content through your sunglasses Blue Dot receptor, to allow communication be- or Bracelet.this the main and important advan- tween a host system and the Java Ring. tage of Digital jewelry.Researchers are overcom- ing several obstacles facing these new wearable displays, the most important of which is the readability of information displayed on these tiny devices. Technical specifications of Digital Jewelry Blue Dot receptor Digital jewellery devices consist of a screen or display for information, most likely consisting The Java Ring is a stainless-steel ring, 16-milli- of 7-16-segment, or dot matrix LEDs, LCDs, or meters (0.6 inches) in diameter, which houses a other technologies such as electroluminescent 1-million-transistor processor, called an iButton. material (EL) or others, which could become an The ring has 134 KB of RAM, 32 KB of ROM, a re- optional display. So too, an audiovisual or oth- al-time clock and a Java virtual machine, which is er ‘display’ could consist of a speaker, a single a piece of software that recognizes the Java lan- flashing light, a sensor of some kind (such as a guage and translates it for the user’s computer temperature driven EL display), or other informa- system. Digital jewelry, (designed to supplement tional aesthetic. The display layer sits on a face the personal computer,) will be the evolution in of the device, which is enclosed in some material digital technology that makes computer ele- such as plastic, metal, crystal, or other material. ments entirely compatible with the human form. It has external switches and buttons on its side and a data-port for accessing the programmable electronic circuit inside. A micro controller that is a surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capaci- tors (C) are the internal ‘guts’ of the jewelry. Digital Jewellery can be made in many differ- ent sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass. They utilize electromagnetic properties and electronics to display information through a screen or display of some kind. This could range from LED 7-segment, 16-segment, dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other display devices. Java Ring It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrat- 31 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Advanced Driver Assistance el 0, ADAS cannot control the car and can only Systems (ADAS) provide information for the driver to interpret on their own. Some ADAS that are considered lev- NAJAHUL ISLAM O P , S2 ICE el 0 are: parking sensors, surround-view, traffic sign recognition, lane departure warning, night Advanced driver-assistance systems (ADAS) are vision, blind spot information system, rear-cross electronic systems that assist drivers in driv- traffic alert, and forward-collision warning. Lev- ing and parking functions. Through a safe hu- els 1 and 2 are very similar in that they both have man-machine interface, ADAS increase car and the driver do most of the decision-making. The road safety. ADAS systems use automated tech- difference is level 1 can take control over one nology, such as sensors and cameras, to detect functionality and level 2 can take control over nearby obstacles or driver errors, and respond multiple to aid the driver. ADAS that are consid- accordingly. ered level 1 are: adaptive cruise control, emer- gency brake assist, automatic emergency brake HISTORY DEVELOPMENT assist, lane-keeping, and lane centering. Advanced driver assistance systems were first ADAS that are considered level 2 are: highway being used around 50 years ago with the adop- assist, autonomous obstacle avoidance, and au- tion of the anti-lock braking system. Early ADAS tonomous parking. From level 3 to 5, the amount include electronic stability control, anti-lock of control the vehicle has increases; level 5 being brakes, blind spot information systems, lane where the vehicle is fully autonomous. Some of departure warning, adaptive cruise control, and these systems have not yet been fully embed- traction control. These systems can be affected ded in commercial vehicles. For instance, high- by mechanical alignment adjustments or dam- way chauffeur is a Level 3 system, and automatic age from a collision. This has led many manu- valet parking is a level 4 system, both of which facturers to require automatic resets for these are not in full commercial use yet. systems after a mechanical alignment is per- formed. Need for standardization & Ethical issues be- lieves that the car behaves like another car while ADAS LEVELS it does not. According to PACTS, lack of full stan- dardization might make the system have diffi- ADAS are categorized into different levels based culty being understandable by the driver who on the amount of automation, and the scale pro- might vided by The Society of Automotive Engineers (SAE).ADAS can be divided into five levels. In lev- Names for ADAS features are not standardized. 32 Inspecto Department of Instrumentation and Control Engineering, NSSCE
For instance, Adaptive Cruise Control is called instincts, which is realistic but not ethical; feed- Adaptive Cruise Control by Fiat, Ford, GM, VW, ing such data to the computer cannot guarantee Volvo, and Peugeot, but Intelligent Cruise Con- that the computer captures the ideal behavior. trol by Nissan, Active Cruise Control by Citroen Furthermore, the data fed to an artificial intel- and BMW, and DISTRONIC by Mercedes. To help ligence must be carefully selected to avoid pro- with standardization, SAE International has en- ducing undesired outcomes. dorsed a series of recommendations for generic ADAS terminology for car manufacturers, that it Intelligent Transport Systems (ITS) highly re- created with Consumer Reports, the American semble advanced driver-assistance systems, but Automobile Association, J.D. Power, and the Na- experts believe that ITS goes beyond automat- tional Safety Council ic traffic to include any enterprise that safely transports humans. ITS is where the transporta- ADAS systems make vehicles generally safer than tion technology is integrated with a city’s infra- only human-driven cars, accidents are unavoid- structure. This would then lead to a “smart city”. able. This raises questions such as “whose lives These systems promote active safety by increas- should be prioritized in the event of an inevita- ing the efficiency of roads, possibly by adding ble accident?” Or “What should be the universal 22.5% capacity on average, not the actual count. principle for these ‘accident-algorithms’?” Advanced driver-assistance systems have aided in this increase in active safety, according to a Many researchers have been working on ways study in 2008. ITS systems use a wide system of to address the ethical concerns associated with communication technology, including wireless ADAS systems. For instance, the artificial intelli- technology and traditional technology, to en- gence approach allows computers to learn hu- hance productivity. man ethics by feeding them data regarding hu- man actions. Such a method is useful when the rules cannot be articulated because the comput- er can learn and identify the ethical elements on its own without precisely programming whether an action is ethical. However, there are limita- tions to this approach. For example, many hu- man actions are done out of self-preservation 33 Inspecto Department of Instrumentation and Control Engineering, NSSCE
THE PRINCIPLES OF FACE lery or reference database. After the face image AND VOICE RECOGNITION IN has been normalized, the feature extraction and SMARTPHONES recognition of the face can take place. In feature extraction, a mathematical representation called ABHISHEK KRISHNA , S2 ICE a biometric template or biometric reference is generated, which is stored in the database and In today’s networked world, m plays a very im- will form the basis of any recognition task. Fa- portant role, it affects all aspects of human daily cial recognition algorithms differ in the way they life. The need to maintain the security of infor- translate or transform a face image (represent- mation in mobile devices is becoming both in- ed at this point as grayscale pixels) into simpli- creasingly important and increasingly difficult. fied mathematical representation (the features) Some human features like fingerprints, face, to perform the recognition task. hand geometry, voice, and iris are used to pro- vide authentication for security systems to reach a high-security level instead of traditional pass- word-based systems. This paper presents a de- ployment of face recognition algorithms on mo- bile devices. The proposed approach uses a PCA algorithm with FPIE and DCV on mobile devices. WHAT IS FACIAL RECOGNITION? Facial recognition is away of identifying or con- WHAT IS VOICE RECOGNITION? firming an individual’sidentityusingtheirface.Fa- cial recognition systems can be used to identify Voice recognition refers to the ability of a specif- people in photos, videos, or in real-time.It is a ic device to receive and interpret spoken direc- category of biometric security. tives simply said, voice recognition technology can interact and respond to human commands. HOW DOES FACIAL RECOGNITION WORK? Voice recognition The facial recognition process normally has four Originated on PCS but within integration in interrelated phases or steps, which are smartphones and its rising popularity, it became more accessible within the use of home devic- • Face-detection es. This way, the technology became available in • Normalization our kitchens, living rooms, etc. • Feature extraction • Face recognition HOW DOES VOICE RECOGNITION WORK? These steps depend on each other and often use Speech recognition and voice recognition are similar techniques. They may also be described not the same things. Speech recognition recog- as separate components of a typical FRS. Detect- nizes only the words and focuses on the trans- ing the face in a probe image may be a relative- lation of verbal form to a text tone. Voice rec- ly simple task for humans, but it is not so for a ognition shares for the voice to be recognized computer. The computer has to decide which and to identify an individual user’s voice. Voice pixels in the image are part of the face and recognition can authenticate the speaker by which are not. Once the face has been detected analyzing the patterns and sequences of a per- (separated from its background), the face needs son’s voice hence capable to identify the specific to be normalized. This means that the image person. Such an approach ensures safety as all must be standardized in terms of size, pose, illu- the inputs will be authorized solely by your voice mination, etc., relative to the images in the gal- and no others. 34 Inspecto Department of Instrumentation and Control Engineering, NSSCE
WIRELESS CHARGING OF Why wireless charging using microwaves is good MOBILE PHONES USING for transmitting information from one place to MICROWAVES another because it penetrates haze, light, rain, snow, clouds etc. and has shorter wavelength MEENA C , S2 ICE than remote sensing. Mobile phones are part of our life. It is the fast- In transmission section, it consists of two parts: est and easiest medium for communication. The Magnetron and Slotted waveguide antenna. recharging of mobile phone batteries has al- ways been a problem. People are complaining Magnetron is a vacuum tube oscillator that gen- about their mobile’s battery life and they have erates high-power electromagnetic signals in to charge their phone several times. the microwave frequency range. Magnetron is used to produce high power output required in This is a remedy for this problem. This is done radar and communication equipment. Slotted by using microwaves. The recharging of mobile waveguide antenna is an Omni-directional an- phones is done automatically as you talk on your tenna. Slotted antenna arrays used with wave mobile phone. Microwaves are the radio waves guides are popular antennas in navigation, ra- which provide communication between two mo- dar and other high-frequency systems. It has bile phones. The microphone is sent with the high efficiency and gain of 13dB. message by the transmitter using an antenna at the frequency of 2.45GHz. Here we are using In the receivers section, a simple yet powerful F microwaves as a source of energy to charge the to V converter LM2907 is used as a sensor. On phone. the reception of microwave signal, the sensor circuitry directs rectenna circuits to ON. Recten- Nikolas Tesla first transmitted electricity with- na circuits convert microwave energy to DC out- out wire and is known as the father of wireless put. Mobile phones begin to charge using the electricity transmission. William. C. Brown gives microwave power as long as the user talks over the principle of how power can be transferred the cell phone. through space using microwaves. This has advantages too. Charging mobile wire- The prefix “micro” in “microwave” is not meant lessly, saving time for charging, wastage of pow- to suggest a wavelength in the micrometer er is less, The phone can be charged at any place range. It indicates that microwaves are small and any time, one can carry their mobile phones compared to waves used in typical radio broad- anywhere, even to a remote village, and get casting, in that way they have shorter wave- charged as we make calls during long journeys. lengths. Microwave technology is extensively Recently NOKIA has launched this wireless used for point-to-point telecommunications charging Technology in its new mobile model (i.e., non-broad cast uses). “NOKIA LUMIA 1020”. Microwave signal is transmitted from the trans- It has future scopes also. In the future rectenna mitter along with a message signal using a slot- is used to produce large-scale power from micro- ted waveguide antenna at 2.45GHz. In this way wave beams. This technology is also applicable charging became universal. Selection of fre- for electronic gadgets which work on batteries quency is important. We are using the license and thus saves electricity. Currently researches free 2.45GHz Industrial, Scientific and Medical are going on to implement this technology for (ISM) radio bands.ISM bands are reversed in- laptops. ternationally for non-commercial use of RF elec- tromagnetic fields for Industrial, Scientific and Medical purpose. 35 Inspecto Department of Instrumentation and Control Engineering, NSSCE
5G Technology & antivirus & uses high-resolution for crazy cell phones. AKASH RAJESH , S2 ICE ADVANTAGES 5G is the next generation of mobile broadband that will eventually replace or at least argue 4G 5G is expected to offer enhanced mobile broad- LTE (Long Term Evolution) connection. LTE is a band that can meet high coverage requirements. standard for wireless broadband communica- The high data speed of 5G network might help tion for mobile devices and data terminals. It of- cloud systems to stream software updates, mu- fers exponentially faster download and upload sic, and navigation data. 5G will help to incor- speed. 5G provides a speed of 5 Gbps, which is porate AI into our daily lives. It will help in the at least 100 times the existing data speed. The digital growth of a country that will result in the standards for the usage of 5G are defined and rise of GDP and employment generation in the driven by the 3rd generation partnership proj- country. ect. It can be called a real wireless world. APPLICATIONS EVOLUTION FROM THE FIRST GENERATION TO FIFTH-GENERATION • 1G was launched in the 1980s and worked on Wearable devices with AI capabilities, global along radio signal and supported only voice network, media-independent handover, Radio call resource management, it has 6th sense technol- ogy, high-speed mobile network, Smart cities, • 2G was launched in the 1990 s which uses Entertainment & multimedia, Telemedicine de- digital radio signals and supported both vices, etc. voice and data transmission with a band- width of 64 Kbps. CHALLENGES • 3G was launched in the 2000 s with a speed The number of users in India also poses a huge of 1 Mbps to 2 Mbps and it has the ability challenge in terms of a swift upsurge in data to transmit telephone signals including digi- consumption and the subsequent network con- tized voice, video calling and conference gestion. The switches from 4G to 5G will be in- frastructure intensive and the development of • 4G was launched in 2009 with a speed of 100 infrastructure for 5G is very expensive. 5G can- Mbps to 1Gbps and I also enable 3D virtual not take off without basic infrastructure founda- reality tion such as a standard server, open APIs, etc. HARDWARE OF 5G Uses UWB (ultra-wideband ) network with high- er bandwidth (BW) at low energy levels. BW is of 4000 Mbps, which is 400 times faster than to- day’s wireless network & it uses a small anten- na. It also uses CDMA ( code division multiple access). SOFTWARE OF 5G 5G will be the single unified standard of different wireless networks, including LAN technologies, LAN/WAN, WWWW (world wide wireless web ), unified IP & seamless combination of broad- band. It has a software-defined ratio, encryption 36 Inspecto Department of Instrumentation and Control Engineering, NSSCE
DATA MINING IN SOCIAL MEDIA-THREAT OR BENEFIT? ANUVIND P E , S4 ICE In this digital era, social platforms have become inevitable. Social media is a great source of infor- mation and a perfect platform for communication. With the universal use of Social media platforms via the internet, a huge amount of data is accessible. Hence in today’s fiercely competitive business environment, companies started to mine or use these data for their growth. This includes data that is publicly available, which may include age, sex, race, geographic location, job profession, schools you’ve attended, languages you speak, friends and connections, networks you belong to, and much more. Then there’s the unstructured content of what you post on social media – like tweets, com- ments, status updates – which is mainly what businesses, firms, and agencies are looking to mine. So, if your profiles are completely public, just understand this is generally fair game for social media data mining. A variety of data mining techniques are applied to this data. Some techniques may uti- lize machine learning, some may not. This is all dependent on how deep the “miners” are looking to explore. Many of the users are unaware about data mining and the best example is we have seen many accepting all the policies of certain apps and websites without even reading it. Mostly they don’t have any idea what happens after they allow third parties to access their data. In social media data mining, information from social media platforms is aggregated and analysed to identify patterns and trends. Trend analysis can be a very important metric for businesses who utilize social listening. For example, businesses may analyse topics, mentions, and keywords on social media which are currently trending, and apply mining techniques to understand why. Let me provide you with one of the most prominent examples of what I mean. An analysis by some online agency concluded that mining sentiment on social media platforms like Twitter and Facebook lead- ing up to the 2016 U.S. Presidential Election was actually more accurate at predicting the election’s results. Social media platforms use algorithms to track and organize page views, likes, clicks and other user interactions, and then apply the collective data to inform research and marketing pro- cesses, such as targeted advertising. Targeted advertising on social media platforms is skyrocketing as companies figure out better ways to identify and address specific audiences. Advertising execu- tives can also use data-mining techniques to determine which messages are most effective among certain demographic groups or the best time of day to run a specific ad on a specific digital plat- form. Companies use social media data mining to find out more about customer tastes, preferences and biases. This is how you get ads related to a post you liked, commented, or viewed. Third-party data-mining companies also purchase or scrape data from numerous social media sites (Facebook, Twitter, Instagram, etc.) along with forums, blogs, news sites and other public pages where users leave comments or interact with specific social groups. The combined unstructured data (profiles, 37 Inspecto Department of Instrumentation and Control Engineering, NSSCE
posts, images, connections) will then be used to identify behavioural patterns. Data miners sell datasets to companies, including airlines, hotels, retailers, manufacturers and po- litical groups, that are looking to personalize customer experiences and improve service satisfac- tion. Sometime we may have also noticed about some videos on YouTube or some other platforms where after gaining popularity the host started to introduce some products or something related to marketing in between or at the beginning of the show. This is another example of data mining where careful analysis of social data helps companies to find the right influencer to promote their offerings. Social media data mining is used in identifying influencers or users who have strong follower bases and engagement rates on certain social platforms. Businesses will use influencer marketing to help bring attention to products and service. Another major use of data mining is pre- dictive analysis. Sophisticated algorithms and machine learning techniques can help with predictive modelling strategies, enabling companies to anticipate future customer trends. As mentioned be- fore, according to TechCrunch, social media analysis was a better predictor of the 2016 presidential election than traditional polls. Social media data is also helpful to the medical community when tracking and predicting the course of disease outbreaks. Businesses collect information about their customers in many ways for understanding their pur- chasing behaviours trends. However, businesses don’t last forever, some days they may be ac- quired by others or gone. At this time, the personal information they own probably is sold to others or leaked. The concerns about personal privacy have been increasing recently especially when the internet is booming with social networks, e-commerce, forums, blogs, etc. Because of privacy is- sues, people are afraid that their personal information is collected and used in an unethical way that potentially causes them a lot of trouble. Security is a big issue. Businesses own information about their employees and customers including social security number, birthdate, payroll, etc. However, how properly this information is taken care of is still a question. There have been a lot of cases where hackers accessed and stole big data of customers from big corporations such as Ford Motor Credit Company, Sony, etc. with so much personal and financial information available. Information collected through data mining intended for ethical purposes can be misused. This information may be exploited by unethical people or businesses to take benefits of vulnerable people or discriminate against a group of people. In addition, data mining technique is not perfectly accurate. Therefore, if inaccurate information is used for decision-making, it will cause serious consequences. 38 Inspecto Department of Instrumentation and Control Engineering, NSSCE
TECHNOLOGY: the generations before us didn’t have this lux- A BOON OR A CURSE?? ury. AADITHYA V NAIR , S2 ICE Everything with advantages also has at least some disadvantages or worst sides. So, let’s see Here it’s all technology that matters. We saw some aspects of the applications of technology how it played a crucial role in this pandemic pe- which are least said by those who celebrate this riod when people couldn’t connect physically, by technology driven era. connecting them virtually. Applications of tech- nology have laid strong buffer platforms, where Smart phones have created a new revolution in almost all-important elements of our social sys- the life of a common man. Through smartphones tem, like classes, public meetings could be held and phones , the internet became close to each virtually. and every one. Google became the trustworthy friend with whom we ask everything under the Let’s see the definition of technology – “the sky, we became so close with him that it knows scientific knowledge and/or equipment that is everything about you than your best friend. needed for a particular industry”. Let’s break it into a simple definition – “Technology is the Much more revolution was created in technolo- skills, methods, and processes used to achieve gy industries by the quick popularity gained by goals”. From this, we can clearly understand YouTube, WhatsApp, Facebook and Instagram, that, the applications of technology are mainly to name a few. Quickly the scenario changed to serve as a tool for the success of mankind, by like, if Google is your best friend, then Insta- solving real life problems in a faster and efficient gram, WhatsApp and Facebook are your girl- manner. But the question that arises is that is friends. One depends on Google for immediate technology serving our better part only? There queries which might last for some minutes in a is a wide aura created around us that we are in single go. But the time a person spends on oth- an era where everything is technology driven, er social media platforms range in hours every single day. 39 Inspecto Department of Instrumentation and Control Engineering, NSSCE
One of the problems created by social media is requirements. that it brings in a different kind of loneliness. In a study conducted by The Cigna - life insurance It has got different effects on different age company on loneliness due to social media, 46 groups: percent responded that they are feeling lonely quite often. This is due to excessive dependence • Old age -There is no better option than so- on social media. It takes you to a different so- cial media for time pass for old age people. It ciety, where you don’t see each other. Some keeps them engaged all day and helps over- might back social media platforms by saying come old age miseries. that it makes you social. Here we must realize that these people have their livelihood from • Working class – Social media is a great relief these platforms. So, it’s just a common business from the stress filled work environment. statistic. • Youth – Social media having its worst effects Young adults with heavy use of social media plat- on the youth. It plays a major role in mak- forms – two hours a day have twice the chance of ing them least productive. It kills their time experiencing social anxiety, according to a study and thereby their academics. It also attracts in 2017. The study’s researchers also found that youth to dangerous aspects of technology participants who are online most frequently – like porn; this can eventually lead to mental defined as 50 or more visits a week – have three and physical health issues. times the odds of perceived social isolation as those who went online less than nine times a • Kids – Earlier kids use to hear moral stories week. And it isn’t just young adults affected by from their grandma which lays a strong in- the social media - loneliness problem. [from a tegrity within themselves which serves as the case study] fuel for future toils. But now the new gener- ation moms rely on smartphones to make Socrates said – “the written world will make hu- them eat food, to make them fall asleep. This manity lazy and forgetful“. He said it even before takes them away from the real world and a computer was discovered. With the interven- their perceptions of the world are full of fan- tion of social media, we became more forgetful. tasy. This in a way makes them inefficient for Now we hardly remember any dates, hardly re- survival. member any phone numbers. Technology is a boon when it is a guide in our Major problem with the fleet of technology is car, guiding us through the right route clearly, that it is so good at exploiting our basic human to wherever we decide to go. But what happens physiology. Earlier when technology had the in reality is that these social platforms take us least association with human day to day chores, away as a driver of our mind, away from the real we had a proper system or routine of going to world where sufferings prevail and daily survival bed early, and rising. But now, day time is like is a challenge to a fantasy world which doesn’t night and nights are proper days for us. We of- even exist. ten go to sleep in the mornings. This has a very bad impact on our physiology and mind clock. So, we should reconnect with people “without fully This slows down our thinking ability. We become disconnecting from technology”. It’s we who should lazier. We can easily say that these applications, decide “is technology a boon or a curse” for us. social media to be precise, are good when it is up to a limit, but when it is ruling you, and then there is no better drug than this. It is actually a slow killer. It controls you instead of you con- trolling it. We are technically driven by technolo- gy rather than just depending on it for our basic 40 Inspecto Department of Instrumentation and Control Engineering, NSSCE
ENTANGLEMENT OF DATA Arathy KA, S6 ICE Have you ever wondered about who can pro- duce data and who might’ve used the data? We humans are born with an exceedingly inquis- was the combined revenue of Tencent’s, Google itive mind which makes us push towards new and Facebook in 2018. And it is indeed true that frontier and we have to master the same curi- the words “whoever owns the data owns the fu- osity, because data represents new frontier. But ture”. who is producing the data?? For example,In this covid pandemic scenario,we can assume most- Now , how many of you have received remittance ly everyone has a smartphone and also a social for the data we have created, none right? Data media account. Every single word we search and has enormous value but is centrally directed and see is data. So we all are producing data. And owned. We are all just walking raw material for we already know how data is shifting affects our large data based companies but none of us are personal,economic and political lives. getting paid. Now let’s look at the basic reality of our digi- So what can we do? I can’t offer a set of rules tal life, online ads. We probably kind of dismiss and regulations which will reconstruct the whole them and we all have the experience of being way our digital technologies offer. We have to followed on the web by ads based on something mobilize your technology, our creativity and we searched or read. All the data that FB has on of course our politics too. So that we can build us: every status update,chats, and the places things which will be a backbone to our human where you have logged in from and also if you goals. And the legal concept of ownership is start typing something and change your mind when you can possess, make use of,vendor sell and delete it. And this keeps all these records your asset at a price that you can accept rather and also analyses them too.And in several coun- than giving it for free and not to mention privacy tries these stored data are collected and sold. is very essential too. You might have noticed while youtubing, mean- Start ups are already generating tools to allow ing to watch a single video and after half an hour us to gain control and power over data and you have watched almost 30 videos and it goes there are browsers called brave which shield us on auto playing something and shows other vid- by blocking data grabbing ads and trackers and eos which seems to be similar to the topic. It’s avoid data leakage. an algorithm. To build an algorithm we need 2 things: the data from the past and the things And eventually we need a digital economy you would be looking for. It’s function is to pick where our data and creativity is not for sale or something that you might be curious about and auction without our authorization. And we can infer what you are fascinated in and like to show truly hope a smart data abundant future will be you more. It sounds like a useful feature, right! here soon. Except when it isn’t and it’s main program is to find out human behaviour. This autocracy will wrap us like a spider’s web and we may not even know we are in it. From the top ten companies in the world, 7 are tech companies that either di- rectly create profit from data or are empowered by the data from the core. 236 billion in U.S dol- lars(appro. 1,70,84,91,32,00,000 Indian rupee) 41 Inspecto Department of Instrumentation and Control Engineering, NSSCE
ACHIEVEMENTS AND MILESTONES - 2020 42 Inspecto Department of Instrumentation and Control Engineering, NSSCE
PLACEMENT STATSTICS 43 Inspecto Department of Instrumentation and Control Engineering, NSSCE
STUDENT ACHIEVEMETS PAPERS PUBLISHED EVENTS 44 Inspecto Department of Instrumentation and Control Engineering, NSSCE
45 Inspecto Department of Instrumentation and Control Engineering, NSSCE
SONU KRISHNAN KAVYAMOL K 2017 - 22 Batch 2017 - 22 Batch After the successful journey of one year, ICONS give best learning experience. ICONS in collab- entered to its 2nd year with keeping all the val- oration with ELCASTA the student’s association ues to empower the students in best possible of Electronics and communication department ways. Knowledge is a powerful tool that can conducted a webinar on “An Insight into AI with change the world, the pandemic situation of MATLAB” offered by Mathwork products. covid 19 is badly affecting the world, but we have to move on by seeking new opportunities and Seeking industrial knowledge is most valuable knowledge, ICONS is always dedicated to make thing for an engineering student, and nuclear this opportunity for our students. instrumentation is one of the most researched topics and is of great importance in modern era. Learning new things gives new insight to life, AI ICONS created a platform for our students to is one of the trending technologies that is driv- learn about nuclear instrumentation and inter- ing the world, understanding AI through the act with Mr. M G Rajesh the scientific officer-F for powerful industrial calculation tool MATLAB will E&I group, BARC. Its was a very informative ses- 46 Inspecto Department of Instrumentation and Control Engineering, NSSCE
INCEPTIO sion which helped our students to build a strong in collaboration with CIVILS360 conducted base in nuclear instrumentation. “INCEPTIO”, an orientation session for civil ser- vice aspirants. This helped the students have a Along with academics, extracurricular activities better understanding of what the job demands also play a crucial role in a student’s life. Thus, and offers and also which path they should take ICONS have taken care to organise challenging to achieve their goal. and interactive game events even amidst the pandemic. ICONS conducted “MIND SCRIBBLE” The entire team of ICONS have always done their a game event that made the students improve best to actively coordinate and conduct both ac- their logical thinking by challenging them with ademic and extracurricular activities keeping in mind twisting questions. mind the best interests of the students. A chal- lenging and exciting year has come to an end Gone are the days where few career options but an even better one awaits. were available after graduation like MBA or MTECH, but this causes a confusion among stu- dents as to what will be right for them. ICONS 47 Inspecto Department of Instrumentation and Control Engineering, NSSCE
The Instrumentation and Measurements batch) as the Chairperson , Greeshma Jayachan- Society Student Branch Chapter of NSS Col- dran as the Vice- Chairperson (2018-2022 batch) lege of Engineering is one of the most ener- Abitha Aravindan as the secretary (2019-2023 getic societies that aimed at bridging high level batch) and Arjun R as Treasurer ( 2018-2022 technical excellence with scientific literary and batch). educational concerns by encouraging close co- operation and exchange of information among In the mid of April, IMS SBC NSSCE put forward its members. By it’s active membership activ- the first virtual event, a 4-hour virtual hands-on ities we were able to emerge among students workshop on Cyber Security on 06/04/2020- and help to grow their inner skills. As the world 09/04/2020 by VISHNU VIJAYAN , CoFounder and is suffocating in this pandemic situation, IMS is CTO of Zilicon Technologies and Co-Founder and not ready to shut down. We are charting many CEO of CYPHOSIS labs. Later the year, on 21st- online programmes to make 2021 an active one 23rd August 2020, there was a 4-hour training that aims to nurture students’ intellectual skills programme on Virtual Instrumentation using and to pave the way for their career. LabVIEW by Er. Altaf Ahamed. It was an excep- tional workshop that had the best outputs from The Instrumentation and Measurement Society the delegates as well. Student Branch Chapter NSS College of Engi- neering (IEEE IMS SBC NSSCE) was officially ap- On 27th September 2020, the Chapter had its proved by IEEE Member of Geographic Activities flagship Distinguished Lecture Programme on on 12th February 2020.since then, SBC Is making the topic Advanced Reliability, Availability and a great outbreak with Asst. Prof. KS Sivakumar Safety Design tools for Industrial Applications. as SBC Chapter Advisor and Ajil Babu (2018-2022 The Distinguished Lecturer was Prof.Marco 48 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Mugnaini Assistant Professor at the University of Siena (Manager of the electronics training lab.), University of Siena, Italy, and the award recipient for the best National PhD thesis in the mainte- nance context from CNIM (National Italian Center for Maintenance). For enhancing technical perceptive of core instrumentation we are planning to organize Distin- guished lecture programmes and planning to do online offline events that includes workshops, virtual educational visits, webinar etc.for students who like to intensify their academics and techni- cal side on core instrumentation.IMS have an energetic active members to encourage the student members to shape theirs ideas and also helping them to execute it.By making use of opportunities and time IMS members were able to become one of the vibrant society of the Student Branch. 49 Inspecto Department of Instrumentation and Control Engineering, NSSCE
50 Inspecto Department of Instrumentation and Control Engineering, NSSCE
Search