1 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
ABOUT    ABOUT NSS COLLEGE OF ENGINEERING    NSS College of Engineering, Palakkad (Commonly known as NSSCE) is the fourth engineering edu-  cational institution established in Kerala, India. It was founded in 1960 by Nair Service Society. NSS  College of Engineering is one of the premier institutions in the state. The college is one among the  only three Govt-Aided Engineering colleges in Kerala and the first Govt-Aided Engineering College  accredited by NBA of AICTE. The college is affiliated to the APJ Abdul Kalam Technological University.  The campus is situated in NSS Nagar at Akathethara, 9 km from Palakkad town, and 3 km from the  Palakkad Railway Junction. The nearest airports are at Coimbatore (55 km) and Cochin Internation-  al Airport(110 km). Spread over 100 acres, it includes an administrative block and other blocks, a  library block and five hostels including two for women and with good infrastructure    ABOUT DEPARTMENT OF INSTRUMENTATION AND  CONTROL ENGINEERING, NSS COLLEGE OF ENGINEERING    The Department Of Instrumentation and Control Engineering the only one of the University of  Calicut was established in 1980. The Department offers a full time B Tech Degree course in In-  strmentation & Control Engineering. The total annual student intake is 60. Department has been  backed up by efficient, dedicated and specialized faculty and they work with dedication to keep in  pace with the ever changing control and Instrumentation scenario. The department has an excel-  lent placment record, with its alumni working all around the globe in reputed companies in coveted  positions. The alumni and the experts from industry visit the department periodically and give lec-  tures, demonstrations and career guidance to the students. The students are also given exposure  to the industrial environment through industrial visits and industrial training. It’s indeed a matter  of pride for the Department that numerous eligible final year students are placed in prestigious  MNCs every year.    2 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING,                     NSS COLLEGE OF ENGINEERING PALAKKAD                                  MISSION OF THE DEPARTMENT       “To be a centre of excellence of international acclaim in the realm of Instrumentation     and Control Engineering producing self motivated, knowledgeable and technically                          competent engineers to nurture the needs of the society”                                   VISION OF THE DEPARTMENT       1.	 To impart engineering education at par with global standards to create self moti-          vated Instrumentation and Control Engineering graduates.       2.	 To inculcate a passion for learning and an ability to utilize the knowledge for solv-          ing real world problems and industrial challenges.       3.	 To be a premier centre for Instrumentation and Control Engineering studies and          research       4.	 To groom the graduates who uphold engineering ethics with a high degree of          social commitment.    3 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
MESSAGE FROM  PRINCIPAL’S DESK    “ DR.SUDHAT                                                                                Principal, NSS College of Engineering            It gives me a great deal of honour and pride to announce that the department          of Instrumentation and Control Engineering has published their 4th edition          technical magazine “INSPECTA”. This magazine will be a platform for sharing          technical knowledge as well as new ideas and I am sure that it will bring out          the hidden talents of all the students of the department. As the principal, I feel          immense pride to be a part of this great venture.    4 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
MESSAGE FROM  HOD’S DESK    “ DR. VENUGOPAL G                                                                                         HOD, Dept. of ICE, NSSCE      I am pleased to know that our students are successful in bringing their 2ndissue of    magazine INSPECTA for the academic year 2019-20. INSPECTA , the departmental    magazine, has the prime objective of providing aspiring engineers a wide platform to    showcase their technical knowledge and to pen down innovative ideas.    This magazine is intended to bring out the hidden technical and literal skills among    the students and teachers. I congratulate and thank all the students and faculty coor-    dinators who have made untiring efforts to bring out this magazine. I wish them all    the very best for releasing more such magazines in future.    5 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
MESSAGE FROM  ADVISOR’S DESK    “ LEKSHMIPRIYA J                                                                                     Asst. Prof. Dept. of ICE, NSSCE         It is indeed a great pleasure to introduce another edition of our Department       Magazine, INSPECTA. Congratulations to all members who are part of this endeavour.       Publication of this magazine is a classic example of excellent teamwork and coor-       dination among the members .This magazine will enhance technical knowledge as       well as creative thinking of students. Efforts put in by them to publish this magazine       during this pandemic time is highly commendable and contributions by each member       is noteworthy.    6 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
7 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
EDITORIAL    “Strive for perfection in everything you do. Take the best that exists and make it better. When it  does not exist, design it.” - Sir Henry Royce.    These may be the best lines of words to be narrated to an Instrumentation Engineer. An In-  strumentation Engineer holds the obligation for improving system productivity, reliability,  safety, optimization and stability of a single unit to a whole plant. Being a multidisciplinary  branch, the scope is purely domain-dependent. This magazine is a cumulative discipline of  all the engineering enthusiasts with the enriched knowledge showered upon us from all  the educators.    Science can make us astonished with facts, but it is engineering that changes the world and  it has always been a vast sea of possibilities anywhere in the present moment. VR dangles  just in front of us a vision of the world’s future, changes in expressing and experiencing  communication. The vision is further enlarged, with advanced aerial technology. The Inter-  net of Things is removing tedious repetitive tasks or creating things that just weren’t pos-  sible before, enabling more people to do more rewarding tasks and leaving the machinery  to complete the repetitive jobs. When it costs the same efforts to manufacture advanced  robotic parts equivalent to manufacturing a paperweight, that profoundly alters every-  thing. Being a mathematical framework that is free of politics and human error, Blockchain  technology makes up revolutionary reforms in the economic realm. In the transformation  to a complete digital, information has already become the fuel. It trickles through the bars  and barriers protected by barbed wire work, it floats across the borders. Cyber Security is  indeed much more than a matter of immediate consideration.    Believe in yourself, and if you have a positive perspective and continually strive to put out  your best effort, ultimately we will be calibrated to solve our immediate obstacles, including  the pandemic and will be moulded for higher challenges!                Solomon Staby    Swathy Chandra R              2017 - 21 Batch     2018 - 22 Batch    8 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
INDEX    Sl No  Topic                                        Author                          Page  1      FUTURISTIC VISION EXPLORING HOLOGRAPHY       DEVANAND N S                    10                                                                                      11  2 VIRTUAL REALITY IN EDUCATION                      SARATH KUMAR G                  14                                                                                      18  3      THE RISING TREND OF VISION BASED INSTRUMENT  VINAY PRASAD, SREELEKSHMI AV,   20                                                      SHILSA SHIVADASAN, AKSHAY ANIL                                                                                      22  4 THE IMPORTANCE OF ICS SECURITY                    VINAY PRASAD                                                                                      23  5 AMIDST THE PANDEMIC OUR EARTH HEALED!!            SANIKA S                        24                                                                                      27               WHAT HAS LED TO A SPATE OF HOSPITAL FIRES                              28  6 DURING THE PANDEMIC? DOESN'T THIS SITUATION ISWARYA DEVI R                        29                                                                                      31               DEMAND EFFIECIENT FIRE SAFETY TECHNOLOGIES?                            33                                                                                      34  7      HOW NASA INVENTED A VENTILATOR JUST IN 37    ARATHY KA                       35         DAYS FOR COVID 19?                                                           38                                                                                      43  8 DRONES                                            MALAVIKA S                      45                                                                                      46  9 COMBAT DRONES TO FIGHT COVID 19                   JESWIN GEORGE                   48                                                                                      50  10 MGN BLOCKCHAIN                                   GREESHMA KV                     52                                                                                      53  11 LIDAR TECHNOLOGY                                 ARPITHA CS                      55                                                                                      56  12     IS THE INTERNET BRINGS PEOPLE CLOSER OR      SANDRA S NATH         SEPARATING THEM??    13     IS THERE A NEED TO RESTORE NET NEUTRALITY??  PRAVEENA AR    14 INTERNET OF THINGS                               KAVYA K    15 WIFI VERSUS BLUETOOTH IN THE LIMELIGHT OF IOT SWATHI KRISHNANUNNI    16 LIFI IS A LIFE-CHANGER IN 5G                     ABHISHEK CK                                                      ABHISHEK V  17     CAUSES OF CYBERCRIME AND PREVENTIVE          SABNA         MEASURES    18 AUGMENTED REALITY    19 FLEXIBLE ELECTRONIC SKIN                         ANISH MURALI    20 PICK AND PLACE COLOR SENSING ROBOTIC ARM ANAGHA BALAKRISHNAN    21 IMPACT OF E-WASTE ON OUR ENVIRONMENT             DEEPAK TP    22 DNA - THE DIGITAL DATA STORAGE                   SNEHA RAJ MP    24 THE NEURAL NETWORKS IN CONTROL SYSTEM            DEEPIKA R    25 INTERNET OF THINGS                               SONU    26 MOLECULAR COMMUNICATION                          SUDEEP M    9 Inspecta                         Department of Instrumentation and Control Engineering, NSSCE                                                      Author                          Page      Sl No Topic
FUTURISTIC VISION                                      Google maps in the near future.  EXPLORING HOLOGRAPHY                                                         The way in which they use light to create an im-                                  DEVANAND N S , S4 ICE  age is stunning and could also be used to store                                                         a huge amount of data. The potential is not yet  All of you must have heard of JARVIS who is the        fully realized as the studies are progressing for  AI enabled assistant of Tony Stark in marvel           the complete usability of holographic storage.  movies.                                                But researchers are suggesting the chances of                                                         holographic data storage for over many years.    The most noticed technology in the series is the       A very real benefit to holograms and one that has  design of some interesting virtual images. Can         huge potential is in the medical field. Training  anyone understand those images? These virtual          can be very dangerous when you potentially give  images are called holograms. These are partial-        a junior doctor responsibility that could lead to  ly real and partially virtual designs. The concept     death. Training with holograms avoids this and  uses artificial intelligence to process. AI technol-   let’s trainees visualize the human body without  ogies like speech recognition, natural language        ever having to go near one in the coming future.  processing etc are used to develop the concept.        A Scottish based company has already produced                                                         3-D visualizations of various organs that doctors  Holograms were once the stuff of science fiction       can study and many images within the same ho-  but are very much the present with technology in       logram which allow the detailed exploration of  general improving at a crazy rate. We have prob-       the systems within the body. All this can be done  ably seen many kinds of hologram, but could            with no special glasses or displays which is a key  you actually define one without referring to an        highlight of the technology.  example. A hologram is made from photogenic  techniques that record the light scattered from        What is likely to happen is this technology is just  an object and then presented in a way which ap-        going to become more widespread. Augmented  pears three-dimensional.                               reality is booming at the moment and this uses                                                         lenses to project 3-D visuals of holograms onto  So who invented this revolutionary pioneering          real-life objects. The hologram in Microsoft’s  technology? Amazingly a man in the 1950s, Den-         holo lens is a reference to holograms. There’s  nis Cabor was a Hungarian worker in the U.K            also Apple’s A.R kits and Google’s A.R core that  and the father of holography. He had been re-          are able to run holographic programs on smart  searching optical physics in the 1940s when he         phones expect to see these becoming more part  started his work looking at holograms. What’s          of daily life for a variety of reasons. We will be  striking in mind about this timeline is that the       seeing a new AI world with holography. More-  natural step observed lasers first and then ho-        over, let’s see whether each of us gets assisted  lograms second as holograms are activated by           by a new JARVIS in the coming future.  lasers.                                                         “ So many assume the truth is either black or white...  There are a lot of benefits for the military as ho-    It’s all evolution or it’s totally creation, for example.  lograms can be used to map out 3-D terrains.           Reality creates consciousness; consciousness cre-  Geographic intelligence is an important a part         ates reality. Actually truth is inclusive, neither black  of military strategy and fully dimensional holo-       nor white, nor a shade of grey. Indeed, truth is a  graphic images are getting used to enhance and         multicolored spectrum, a beautiful hologram! “  map battle grounds. An American company has  designed over 13,000 holographic maps of war  spaces for the U.S army. So what this does is  gives the army a massive advantage over their  adversaries. So don’t be abrupt if we see 3-D    10 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
VIRTUAL REALITY IN EDUCATION                                                                                     SARATH KUMAR G , S4 ICE    Abstract:  The market for virtual reality applications has gone up at a rapid pace around the last few years.  One of the main applications being the field of education itself. An increasing number of schools  have virtually adopted the technology. The article gives a brief insight on how VR is being used in  education nowadays, its advantages as well as its shortcomings in the field.    Use of VR in education:  Much research has been conducted on the use of virtual reality in education and training. Such re-  search allows us to understand what VR is and explore its complete potential. Its use in education  can be considered as one of the natural evolutions of computer-based training (CBT). Most people  have heard of it but still, a majority of them do not know how it can be adopted in education.    When students read about something, they often want to experience it. With VR, they aren’t limited  to word descriptions or book illustrations; they can explore the topic and see how things are put  together. A type of VR known as 360VR is most commonly used in education. With this type of VR,  real-world locations are captured with specialist cameras and equipment. The footage is then taken  back to the studio where it is produced into VR content. This VR content can be viewed using special  headsets or can be projected into the walls of the room. Thus this method allows pupils to visualize  the world around them. Students can experience locations that would not be possible or too expen-  sive to visit in person. In this way, VR can open a whole new world of possibilities to teachers and  schools. Moreover, the sessions become more attractive and engaging while there is no chance of  boredom.    Virtual reality can improve education by providing students with memorable and immersive expe-  riences that would otherwise not be possible. Moreover, it can all take place within the classroom  without investing much effort. Through the use of VR, every student can be easily monitored by  teachers. VR headsets are a common and practical way of implementing the method in classrooms.  With average cost and high availability of equipment, an increasing number of schools are turning  to VR headsets. These are usually standalone headsets, which means that they do not require any  external connection to the computer or any other device. Also, teachers are taught how to use  the headsets before implementing them in the classes. Even though in theory VR technology is an  amazing tool for learning and teaching, the reality is that it’s been slow to take off in educational  settings especially in developing countries, in large part because it’s still so costly to implement.  Others see the value of VR as entertainment, but not as effective teaching tools in the classroom.  But some of the schools and institutions around the world have already accomplished the use of  VR in facilitating effective learning for students. Some of such usage includes virtual field trips.  Virtual field trips have become one of the most popular applications of VR technology for learning,  and many schools have begun using Google Expeditions to virtually transport students to faraway  and even inaccessible parts of the world. The Google Expedition app is free to download on IOS or  Android and can be used with very low-cost headsets that can be attached to a smartphone. With  these simple headsets, students can actively explore almost anything. The same can be applied in  the field of architecture using specific hardware called The Oculus Rift hardware which makes it pos-  sible for architects to take computer-generated 3D models and place viewers into those 3D-models  to bring their plans to life. Architecture students in Ireland have even been using VR to construct 3D  models of historical Irish sites and then visit them virtually. In a similar way geometry students use  VR to check out 3D geometric forms from multiple perspectives; they can rotate a shape to    11 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Abstract:                                           content can be viewed using special headsets  The market for virtual reality applications has     or can be projected into the walls of the room.  gone up at a rapid pace around the last few         Thus this method allows pupils to visualize the  years. One of the main applications being the       world around them. Students can experience lo-  field of education itself. An increasing number of  cations that would not be possible or too expen-  schools have virtually adopted the technology.      sive to visit in person. In this way, VR can open a  The article gives a brief insight on how VR is be-  whole new world of possibilities to teachers and  ing used in education nowadays, its advantages      schools. Moreover, the sessions become more  as well as its shortcomings in the field.           attractive and engaging while there is no chance                                                      of boredom.  Use of VR in education:  Much research has been conducted on the use         Virtual reality can improve education by provid-  of virtual reality in education and training. Such  ing students with memorable and immersive ex-  research allows us to understand what VR is and     periences that would otherwise not be possible.  explore its complete potential. Its use in edu-     Moreover, it can all take place within the class-  cation can be considered as one of the natural      room without investing much effort. Through  evolutions of computer-based training (CBT).        the use of VR, every student can be easily mon-  Most people have heard of it but still, a majority  itored by teachers. VR headsets are a common  of them do not know how it can be adopted in        and practical way of implementing the method  education.                                          in classrooms. With average cost and high avail-                                                      ability of equipment, an increasing number of  When students read about something, they of-        schools are turning to VR headsets. These are  ten want to experience it. With VR, they aren’t     usually standalone headsets, which means that  limited to word descriptions or book illustra-      they do not require any external connection to  tions; they can explore the topic and see how       the computer or any other device. Also, teach-  things are put together. A type of VR known         ers are taught how to use the headsets before  as 360VR is most commonly used in education.        implementing them in the classes. Even though  With this type of VR, real-world locations are      in theory VR technology is an amazing tool for  captured with specialist cameras and equip-         learning and teaching, the reality is that it’s been  ment. The footage is then taken back to the stu-    slow to take off in educational settings especial-  dio where it is produced into VR content. This VR   ly in developing countries, in large part because    12 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
it’s still so costly to implement. Others see the     in Victoria, Australia has been using the Ocu-  value of VR as entertainment, but not as effec-       lus Rift headset with students in the classroom  tive teaching tools in the classroom. But some        which allows them to spark the imagination in-  of the schools and institutions around the world      side them which otherwise won’t be utilized. It  have already accomplished the use of VR in fa-        provides them with visual insight. Thus Students  cilitating effective learning for students. Some      can learn about the world around them in a safe  of such usage includes virtual field trips. Virtual   and controlled environment.  field trips have become one of the most popular  applications of VR technology for learning, and       For students having some form of autism, struc-  many schools have begun using Google Expedi-          tured lessons with meditative virtual reality apps  tions to virtually transport students to faraway      like those that explore planets and stars have  and even inaccessible parts of the world. The         provided a calming and pleasant effect on such  Google Expedition app is free to download on          students. Virtual reality technology also has  IOS or Android and can be used with very low-         huge potential in the distance learning indus-  cost headsets that can be attached to a smart-        try. One of the best utilization of VR technology  phone. With these simple headsets, students can       would be in online classes during a pandemic  actively explore almost anything. The same can        that we are facing now. Students can easily inter-  be applied in the field of architecture using spe-    act with classmates and teachers while having  cific hardware called The Oculus Rift hardware        the experience of being inside a classroom. This  which makes it possible for architects to take        improves their learning outcomes to a greater  computer-generated 3D models and place view-          extend. Lessons learned from such a method  ers into those 3D-models to bring their plans to      won’t be easy to forget.  life. Architecture students in Ireland have even  been using VR to construct 3D models of histor-       Advantages of using virtual reality:  ical Irish sites and then visit them virtually. In a  similar way geometry students use VR to check         Virtual field trips are immersive and engaging.  out 3D geometric forms from multiple perspec-         It offers a welcome change from the tradition-  tives; they can rotate a shape to see it from dif-    al method of reading and writing. They can be  ferent angles and even view it from the inside.       used as a way of breaking a topic up or intro-  The Jackson School for special needs students         ducing a new one, and they help to retain the                                                        students’ attention. Moreover, many teachers    13 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
THE RISING TREND OF VISION BASED INSTRUMENT                               Vinay Prasad . Sreelekshmi AV . Shilsa Sivadasan . Akshay Anil S4 ICE    Due to continuing and rapid advances of both hardware and software technologies in camera and  computing systems, we continue to have access to cheaper, faster, higher quality, and smaller cam-  eras and computing units. As a result, vision-based methods consisting of image processing and  computational intelligence can be implemented more easily and affordably than ever using a cam-  era and its associated operations units.    Instrumentation and Measurement (IM) as a field is primarily interested in measuring, detecting,  monitoring, and recording a phenomenon referred to as the measurand and its associated calibra-  tion, uncertainty, tools, and applications. While many of these measurements are invisible to the  human eye, for example, the amount of electrical current in a wire, many others can be seen visu-  ally, such as the number of people in a room. As such, it is intuitive to develop tools and methods  that would see the measure and similar to the human eye and measure it.    Current Trends and Applications    In the context of Instrumentation and Measurement, VBM is being proposed and used today  in a wide variety of automated applications and scenarios: detecting fire from video feeds of  closed-circuit cameras, it is necessary to establish a system that can detect early fires, which greatly  reduces labor costs, and the rapid spread of urban monitoring systems provides the groundwork  for camera-based fire detection. Camera-based vehicle instrumentation used to analyze the in-  tentions and state of a driver (sleepy, yawning, not looking at the road ahead, etc.) and to detect  potential driver errors before they happen to significantly reduce car accidents and even counting  the number of calories and the amount of nutrition in a meal simply by analyzing the image of the  food. An interesting observation about these applications is that, although they seem to be in very    14 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
different and unrelated fields, they all use the same I&M principle: analyzing a picture taken by a  camera or visual sensor to measure or detect a phenomenon. Another really interesting possibil-  ity with VBM is when the camera captures the scene beyond what is visible to the human eye, for  example, with an infrared camera, VBM can be used to measure the temperature of objects, such  as temperature measurement of steel production components that are otherwise very difficult to  measure with other techniques. While most of the applications described above are relatively re-  cent, VBM has been used for many years in factories and production facilities for inspection of  equipment or products and detection of their properties. This includes acoustic emission testing,  electromagnetic radar, ground-penetrating radar, laser testing methods, etc. it is also a safe testing  method for operators, with most techniques being harmless to humans. This reduces production  and operation costs by not only decreasing the manual labor that would otherwise be needed for  inspection but also reducing the number of defects that could be missed due to human errors.    VBM BASICS    At the higher level, there will be two components mainly: a visual sensor to capture the images and  an operation unit to process the image and help to see our subject of interest. Together we can call  it a vision. Both computer vision and Machine vision are used in VBM. Computer vision is mostly  used in personal or daily life applications and relies on computational methods running on com-  puters or generic processor-based systems. Machine vision is mostly used in industrial inspection  or robotics applications and is typically implemented in dedicated hardware sometimes without  computers and processor-based systems.    Visual sensor    A visual sensor can be a visible-light camera, an infrared camera, laser camera, or any other sensor  that can obtain an image of the physical scene containing the sensor. The most commonly used vi-  sual sensor is the visible-light camera which captures the image in a way similar to what the human  eye sees. To get the accurate measurement, calibration of the camera and knowledge of its position  orientation, focal length, aspect ratio, etc are needed.    15 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Operation unit    The operation unit receives the image acquired by the visual sensor and performs the necessary  operations to obtain the desired measurements. This unit can be implemented in either software  or hardware. The unit consists of the following four major stages.    1.	 Preprocessing : This stage prepares the raw image for the next stage of operation. The image      acquired by the visual sensor could have glares, noise, blurs, etc. also it may not be in the form      required by ensuing operations. So pre-processing takes care of this and performs operations      such as normalization, thresholding, denoising, resizing, cropping, etc.    2.	 Image analysis : This stage analyses the image and extracts the necessary information for find-      ing the measurement and doing measurements later. This stage also uses the image processing      operations such as segmentation, edge detection, etc. this stage is typically performed using      computational intelligence operations.    3.	 Measurand identification : This stage is to identify the specific measure in the image if it’s not      already been identified in the previous stage of image analysis. Techniques that are used here      are mostly based on computational intelligence, especially machine learning, and specifically      pattern recognition, pattern matching. In this stage, we can find, match, and identify specific      patterns, shapes, and classes of objects to find our measure. Optical character recognition and      neural networks are also done in this stage. In some applications where the physical phenome-      non only needs to be detected as opposed to gauged, such as gesture detection, our task is fin-      ished in this stage with the detection and identification of the measurand. In other applications,      the measurement has to go through further measurement operations.    4.	 Measurement : This stage, as we have the measurand, will perform the required measurement      operation such as gauging which gives the dimensions of the measurand and its circumference,      volume, area, etc. calibration is the other requirement in this stage.    UNCERTAINTY    The ability to determine the position and orientation of an object with respect to some reference co-  ordinate system is perhaps one of the core competencies of many engineering applications. Recent  deep learning techniques promise high hopes for self-driving cars while there are still many issues  to be addressed such as uncertainties.Specifically, as far as the VBM visual sensors are concerned,  we can list the following main sources of uncertainties:    1.	 Lighting : the lighting of the scene directly affects the values of the pixels of the resulting im-      age, which affect the Image Processing parts. Since the output of the image processing parts is      input to the remaining parts, we can see that lighting conditions affect the entire measurement      system. Hence, applications in which the lighting conditions may vary are affected by this pa-      rameter. Lighting conditions can be seen either as systematic effects and random effects.    2.	 Camera angle : the angle with which the image is taken is also important in applications where      the camera has a free angle and is not fixed, since the angle directly affects the shape and po-      sition of the sensor in the image. In this case, a systematic effect shall be considered and com-      pensated for and the random effects shall be also considered.    3.	 Camera equipment : different cameras have different lenses, hardware, and software compo-      nents, all affecting the resulting image taken with that camera. Hence, an application that is not      using a specific and predefined camera can be affected by this parameter.    When identifying and evaluating all individual contributions to uncertainty, it is also essential to  compare different possible architectures and understand which one provides the best performance,    16 Inspecta     Department of Instrumentation and Control Engineering, NSSCE
from the metrological perspective, under the different possible measurement conditions. This can  be efficiently done only if well-established standards and techniques are used.    VISION-BASED MEASUREMENT AND TODAY’S WORLD    We know we are in the middle of a pandemic.VBM contributes in so many ways related to the same.  Machine vision systems can inspect, identify, gauge, or guide products like ventilators, respirators,  and protective gear. Such products assist in treating patients and protecting health care the pro-  fessionals and in then, further spreading of way    Computer vision is an interdisciplinary field that deals with how computers can develop a high-lev-  el understanding by interpreting information present in digital images. It has made substantial  progress in the last few years, mainly due to the success of deep learning, a sub-field of machine  learning. Computer vision techniques have shown enormous scope in various application areas,  especially in healthcare and medical research. This success has enabled computer vision scientists  to take the challenge as soldiers in the fight against COVID-19 by contributing to disease diagnosis,  prognosis, prevention, control, treatment, and management.    Vision guided robots : In hospitals, for eg: It is vitally important to keep sick people away from  others, including the doctors and nurses. One way to do this involves using vision-guided robots. In  more than 50 hospitals across provinces in China, a food delivery robot minimizes contact between  patients and medical staff. This reduces production and operation costs by not only decreasing  the manual labor that would otherwise be needed for inspection but also reducing the number of  defects that could be missed due to human errors. Here are some distinct advantages, the most  obvious of which is that the pieces being tested are left undamaged by the process, allowing for an  item to be repaired rather than replaced should any problems be found.    17 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
The importance of                                             including a whole new class of OT assets  ICS security                                                  known as embedded equipment, and are                                                                typically much older than IT systems.                                      VINAY PRASAD, S4 ICE  •	 Risks are not only to information confidenti-                                                                ality but especially to the availability and in-  Industrial control system (ICS) security is grow-             tegrity of the process or safety to personnel  ing in importance as cyber-attacks increasingly               and property.  focus on physical processes for either ransom             •	 The remediation of risks requires different  or to cause harm to critical production systems.              techniques because of the differences in  Attacks such as the Oldsmar water treatment                   types of devices.  plant, the various ransomware attacks on the  vaccine supply chain, and the more extensive              ICSs specifically focus on industrial process-  threats to the Ukrainian and US power grids and           es or automation rather than other operating  oil refineries in the Middle East generate greater        systems such as building controls, medical de-  worry for boards, governments, and operators              vices, etc. ICSs provide the components that en-  of industrial organizations.                              sure proper and continuous operation of a wide                                                            range of industrial systems – from power to                                                            water to manufacturing and beyond. They pro-                                                            vide control over the inputs and outputs of key                                                            elements in an operational or physical process.                                                            The processes are often adjustable in real-time                                                            to ensure proper and safe operation. They often                                                            include the safety systems themselves to ensure                                                            shutdown in case of processes getting out of                                                            certain boundaries of performance    What is ICS security?                                     Historically, these systems were separated from                                                            traditional IT networks and used a wide range  ICS security is defined as the protection of ICSs         of specialized components. More and more,  from threats from cyber attackers. It is often re-        these OT systems integrate with IT to increase  ferred to as operational technology (OT) securi-          operational efficiency and reduce the total cost  ty. It includes a wide range of practices includ-         of ownership. As a result, cybersecurity threats  ing:                                                      increase as formerly “air-gapped” systems be-                                                            come more integrated into the internet-con-  •	 Asset inventory and detection                          nected components of the enterprise IT envi-  •	 Vulnerability management                               ronment.  •	 Network intrusion protection and detection  •	 Endpoint detection and response                        Why do we need ICS security?  •	 Patch management  •	 User and access management                             ICS security is critical because these systems are                                                            under attack and the consequences of compro-  ICS security differs from traditional information         mise are significant financially, operationally,  technology (IT) security in several ways:                 and safety-wise. Why do we need a separate cat-                                                            egory of security to address these types of sys-  •	 The types of devices protected are often sen-          tems? Why not replicate what’s being done in IT      sitive to unintended changes or interaction,          security?                                                              First, the devices themselves create challenges                                                            for traditional IT security processes and technol-                                                            ogy. A sample of devices includes old versions    18 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
of Microsoft Windows such as Windows XP or           tive marketplace, whether they’re between com-  Windows 7, a wide range of embedded devices          panies or economic superpowers. But in 2014,  such as programmable logic controllers (PLCs),       the U.S. Department of Justice (DOJ) charged five  controllers, relays, sensors, etc., industrial (and  Chinese military hackers with taking their trade  traditional IT) networking equipment, and more.      war a little too far by spying on several major  These devices require a different approach to        corporations, including U.S. Steel, to gain a com-  security from the modern, updated, OS-based,         mercial advantage.  or cloud-based devices in today’s IT stack.                                                       According to a release by the DOJ, a grand jury  Second, the potential impacts are different. In      in the Western District of Pennsylvania indicted  most IT cybersecurity efforts, the priorities are    the hackers on 31 counts of conspiring to com-  confidentiality-integrity-availability, in that or-  mit computer fraud and abuse; accessing a pro-  der. In the ICS world, the greatest risks are to     tected computer without authorization to obtain  the safety of people and property, followed by       information for the purpose of commercial ad-  availability and integrity. Information confiden-    vantage and private financial gain; transmitting  tiality, while perhaps of some importance, pales     a program, information, code or command with  relative to these others. As a result, the focus of  the intent to cause damage to protected com-  risk management must also adjust.                    puters; aggravated identity theft; economic espi-                                                       onage; and trade secret theft. The hacking took  Third, incident detection and response require       place from 2006-14 and hit a number of major  specific knowledge of the systems affected. In       U.S. corporations, including Westinghouse, So-  many senses, IT systems are commodities with         larWorld, U.S. Steel, Alcoa and the Service Work-  specific functions but are commonly grouped          ers International Union.  and analyzed with a wide range of available  detection rules. Similarly, when responding to        “This is a case alleging economic espionage by  a threat, there are a variety of safe and effec-     members of the Chinese military and represents  tive actions to take uniformly and automatical-      the first ever charges against a state actor for this  ly. However, industrial control systems behavior     type of hacking,” said then-U.S. Attorney General  is unique – often to that particular process. In     Eric Holder in the DOJ release.  addition, the response must be measured and  handled in a way that does not cause more harm       “The range of trade secrets and other sensitive busi-  than good by stopping the expected operational       ness information stolen in this case is significant  process inappropriately.                             and demands an aggressive response. Success in                                                       the global marketplace should be based solely on  Finally, to secure ICS safely and with operational   a company’s ability to innovate and compete, not  resilience, specific knowledge of control systems    on a sponsor government’s ability to spy and steal  and security is required, which is a unique combi-   business secrets.”  nation in even shorter supply than the stretched  IT security resources. Industrial control systems    Cyberattacks like this have continued since, as  were designed years or decades ago and there         trade wars have escalated between the U.S. and  is a shortage of skilled personnel that under-       China during the last several years. It’s not lim-  stands them. To secure ICS, the industry needs       ited to China, either. In April, the Biden admin-  to join IT security capabilities to these people     istration formally blamed the recent SolarWinds  with knowledge of the systems.                       attack on Russia’s intelligence service and im-                                                       posed economic sanctions on the foreign power.  Chinese military hackers hit multiple companies,     While ransomware attacks may be getting most  including U.S. Steel. This is considered as Major    of the recent headlines, stealing trade secrets is  cyber attacks on industries                          always on the menu.  Trade disputes are not uncommon in a competi-    19 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
AMIDST THE PANDEMIC OUR EARTH HEALED !!                                                                                                    SANIKA S, S4 ICE    “Although this Covid 19 pandemic has brought us  sorrows and miseries, the one who benefited the  most is our planet Earth.”    With the outbreak of the corona virus all over       2020, 22 cities of India show effective reduction  the world the lives of individuals were adversely    of PM10 (Particulate material), PM2.5, CO, NO2,  affected. Also with the rapid increase of infec-     by 43, 31, 10 and 18%.  tious people, countries were forced to go with  the lockdowns where people are compelled to  remain inside their houses. As all the categories  of social, economic, industrial and urbanization  activity suddenly shut off, nature took the bene-  fits and showed improvement within the quality  of air, cleaner rivers, less pollution, undisturbed  and calm wildlife. This has meant a little window  for the environment to breathe.    Global Environment during COVID 19  lockdown    Before COVID-19, the world was suffering by          The impact of Covid 19 lockdown on Wildlife  a high level of urban air pollution especially in  the form of CO2, SO2, NO2 and particulate mat-       With humans self-isolating and quarantining  ter. The sources which cause air pollution such      themselves into their homes due to the Covid  as transport, industries, power stations are re-     19 related lockdown, wild animals and rare spe-  sponsible for the increased output of all these      cies have taken over the deserted places. Such  pollutants. The respiratory diseases caused by       instances were reported all over the world. As  air pollution include hypertension, heart attack,    people were forced to stay home, wild animals  cognitive and mental illness. The positive effect    took back what was once theirs.  of lockdown is to decrease the CO2 emission by  −17% (−11 to −25%) by 7th April 2020 with respect    A herd of spotted deer wandered the streets of  to the mean level of emission in 2019. This study    Haridwar without fearing of being killed by mov-  also shows that from March 16th to April 14th,       ing vehicles in the road.    20 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
According to news reports, there was a huge increase in the number of flamingoes congregating in  Mumbai. The wild animals seemed to take out their pride in allowing city residents to glorify their  appearances. With decreased pollution levels within the cities and increased instances of untamed  animals in urban landscapes, the lockdown seemed to be a respite for Mother Earth to tend to her-  self.    Surrounded by deer, a tourist shows her empty        A pack of jackals eats pet food that was left for  hands after feeding them crackers, treats made       them by an Israeli woman, at Hayarkon Park in Tel  mostly with wheat flour and rice bran, near Todaiji  Aviv, Israel.  temple in Nara, Japan. (Image: AP)    Noise pollution during Covid 19 lockdown    Noise is an unwanted sound which causes a hindrance in communication. Long term exposure of  high background level may cause irritation, stress, mental disorders, hypertension, loss of concen-  tration, sleeplessness, etc. The level of noise pollution has decreased radically in different parts of  the world including India. It has been approximated that the Noise level was shrinked up to 35% to  68% from 8 am to 4.00 pm. The noise pollution at Govindpuri metro station was earlier recorded at  the noise level at the rate of 100 db, seemed to reduce up to 50% and constituted 50 db noise level  after the lockdown. The background level was found to have reduced at the rate 30 to 40% during  the lockdown period and in most of the places of over stone quarrying and crushing areas, entire  study units fall under the noise level < 65dBA .COVID 19 also affected noise pollution and coral reef.  The COVID 19 lockdown has also affected the marine ecosystem, all transport processes in the ma-  rine ecosystem were stopped and the pollution level caused by human activities were also reduced  to a great extent.    21 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
What has led to a spate of                             In light of such tragic events, improved advanced  hospital fires during the                              technologies need to be implemented when it                                                         comes to fire safety in hospitals.    pandemic? Doesn’t this                                 •	 Heat Detectors : A lot of machines in the  situation demand efficient                                 hospitals generate a lot of heat when they    fire Safety Technologies?                              are in use. Sometimes they become exceed-                                                         ingly hot which could cause a short circuit.                 ISWARYA DEVI R, S2 ICE                    A heat detector will raise an alarm before                                                         the temperature rises to a dangerous level.    Fires occur in many public buildings in India ev-      This prevents fires from starting as a result    ery year, killing a large number of people and         of overheating machinery.    injuring many. Over the past year, there have •	 Door Release System : It is best to have sys-    been deadly fires in hospital buildings, including     tems in place that will automatically open in    those treating COVID-19 patients. Recent infer-        cases of emergencies.    nos in hospitals at Bharuch in Gujarat, Virar, a •	 Fire Alarm Systems : It warns people when    suburb of Mumbai and Mumbra, near Thane,               smoke, fire, etc., are detected. These alarms    killed at least 37 people. Electrical faults are cit-  are activated from smoke detectors and heat    ed as the leading cause of fires but State gov-        detectors.    ernments are widely criticized for being lax with •	 Water-hydrant system : There is a separate    building safety laws and for failing to equip pub-     water tank to be exclusively used for fire hy-    lic buildings with modern technology. Intensive        drants. Each building has a fire hydrant con-    care units are at great fire risk because they are     nected to the tank by steel water pipes. The    oxygen-suffused and need to meet high stan-            hydrants have hose pipes and various noz-    dards.                                                 zles to be fitted into the hose on one side and                                                           the other to the hydrant.    At the center of all standard-setting is the Na- •	 Voice Alarm : The voice alarm central is    tional Building Code of India. Part 4 of the Code      placed in the technical department, ensuring    deals with Fire and Life Safety. The document          safe evacuation in case of an emergency.    provides specifications and guidelines for de- •	 Suppression-Clean Agent : A control panel    sign and materials that reduce the threat of de-       releases a clean agent into the room when    structive fires. Under the Code, all existing and      a designated number of detectors activate.    new buildings are classified by the nature of use,     The clean agent is waterless and does not    such as residential, educational, institutional, as-   harm electronic components.    sembly (like cinemas and auditoria), business,    mercantile, industrial, storage, and hazardous. Conclusion    Hospitals come under the institutional catego-         Fire alarm technology is exciting because it finds  ry. Fire safety rules exist in every state, but the    better ways to save lives. However, with every  provisions of the Code are ignored in practice,        new devastation, like the one mentioned here,  and even mandatory certifications do not reflect       you wonder how it could have been avoided.  compliance.                                            But engineers, over time, are coming up with                                                         sophisticated technologies that aim towards a  The National Disaster Management Authority             safer environment.  (NDMA) has also stipulated requirements for fire  safety in public buildings, including hospitals.  Besides design guidelines on maintaining min-  imum open safety space, protected exit mecha-  nisms, dedicated staircases, and crucial drills to  carry out evacuations.    22 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
.. in 37 Days                                                house submitted to FDA for emergency use au-                                                               thorization and issued as no fee licensing call for  How NASA invented a                                          proposal to manufacture ventilator. This ventila-  ventilator just in 37 days for                               tor will meet the demands for those who are in  COVID-19?                                                    need and support in a variety of clinical states,                                                               which may include low compliance high resis-                                           ARATHY K A, S4 ICE  tance hypoxia etc. the intended patient is unable                                                               to maintain adequate or safe oxygen level with                                                               nasal or mask oxygen.    Even the large and small inventions and inno-  vation can give birth to a new era of inspired  concepts,acts and changes. Lets get around the  story of about how a single question made NA-  SA’S jet propulsion lab into movement at the be-  ginning of covid-19 pandemic propelling prodi-  gious pivot from the robotics which explore the  space to life saving ventilators and it will inspire  you to wonder the question as following up: “ Is  what i’m doing right now is the most important  thing that i can be doing?”    Director Michael Watkin at NASA at jet propul-  sion laboratory who is passionate about creat-  ing significant moments in people’s lives and is  reminded about the gift and privilege of being  alive.    It’s something sort of a roller coaster to the               Now there are 27 organisations all around the  world that the team of space engineers in NASA               world creating the ventilator. They believed they  invented covid 19 ventilator in 37 days. It begins           had the potential to save human life. These peo-  with dave van buren and rob manning bumped                   ple might be someone they know,their neigh-  into each other at some cafeteria and discussed              bours,one of their families and that intensity  how jpl can help in the current covid crisis in              makes them feel astonishing even though there  shortage of ventilators and can they even open               is a lot of pressure in it as hell.Director said ”we  a low cost ventilator. On the 1st day they had               specialize in spacecraft, not in medical devices  a conversation with doctor michael gurevitch                 manufacturing. But excellent engineers, rigor-  about specific needs of covid-19 patients and                ous testing and rapid prototype are some of our  healthcare works. In the 37 th day around about              specializations. When people at jpl realised and  70 engineer designed and developed 2 new pro-                they rejoiced that “ They might have wanted it to  totype with a sub criteria includes                          support the medical community, they felt it was                                                               their duty to share their ingenuity, expertise and  •	 Do not cause harm                                         drive”.  •	 Use as few part as necessary  •	 Use easily obtainable part                                It’s been invigorating for them to arise with a  •	 Make it easy to use                                       crucial design and now they have FDA approval  •	                                                           and ready to share the technology for the rest of  On 38 day jpl sent a ventilator to mr. sinai hospi-          the world.  tal in new york city to test the design and on the  40 th day it was showcased to potus in white-    23 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
DRONES                         MALAVIKA S , S2 ICE    Drones also called Unmanned Aerial Vehicles (UAVs), have no human pilot onboard, and instead  are either controlled by a person on the ground or autonomously via a computer program. These  stealth crafts are becoming increasingly popular, not just for war and military purposes, but also  for everything from wildlife and atmospheric research to disaster relief and sports photography.  Drones are becoming the eyes and ears of scientists by surveying the ground for archaeological  sites, signs of illegal hunting and crop damage, and even zipping inside hurricanes to study the wild  storms. You can even rent a personal drone to soar above the horizon and snap a photo or video.  Our news and features will cover developments in drone technologies, innovative uses for drones,  and how drone use will impact society.    Different drones are capable of traveling varying heights and distances. Very close-range drones  usually have the ability to travel up to three miles and are mostly used by hobbyists. Close-range  UAVs have a range of around 30 miles. Short-range drones travel up to 90 miles and are used pri-  marily for espionage and intelligence gathering. Mid-range UAVs have a 400-mile distance range  and could be used for intelligence gathering, scientific studies, and meteorological research. The  longest-range drones are called “endurance” UAVs and have the ability to go beyond the 400-mile  range and up to 3,000 feet in the air.    Because drones can be controlled remotely and can be flown at varying distances and heights,  they make perfect candidates to take on some of the toughest jobs in the world. They can be found  assisting in a search for survivors after a hurricane, giving law enforcement and the military an  eye-in-the-sky during terrorist situations, and advancing scientific research in some of the most  extreme climates on the planet. Drones have even made their way into our homes and serve as  entertainment for hobbyists and a vital tool for photographers.    24 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
APPLICATIONS OF DRONES    Military    Probably the oldest, most well-known, and controversial use of drones is in the military. The British  and U.S. militaries started using very basic forms of drones in the early 1940s to spy on the Axis  powers. Today’s drones are much more advanced than the UAVs of yesteryear, equipped with ther-  mal imaging, laser range finders, and even tools to perform airstrikes. The most prominent military  drone in use today is the MQ-9 Reaper. The aircraft measures 36 feet long, can fly 50,000 feet in the  air undetected, and is equipped with a combination of missiles and intelligence gathering tools.    Delivery    Delivery drones are usually autonomous UAVs that are used to transport food, packages or goods  to your front doorstep. These flying vehicles are known as “last mile” delivery drones because they  are used to make deliveries from stores or warehouses close by. Retailers and grocery chains all  over the country are turning to drones as a more efficient delivery alternative, instead of relying on  delivery drivers with inefficient trucks. These drones can carry an impressive 55 pounds of goods  to your front door without you ever having to leave the house. Amazon, Walmart, Google, FedEx,  UPS, and many other big brands are all currently testing out different versions of delivery drones.  JD.com and Rakuten Join Forces to Enable Drone Delivery in Japan    Emergency Rescue    Sometimes it’s just not safe enough to send humans into a rescue situation due to the scope or  severity of the disaster. That’s where drones come in. In the case of a capsized boat or drowning  individual, officials can throw an Autonomous Underwater Vehicle (AUV) into the water to assist in  the rescue. If there’s an avalanche, drones are deployed to look for those caught in the snow. Air-  craft maker, Kaman, has even developed a pilotless helicopter, called the K-MAX, designed to carry  more than 6,000 pounds of cargo. The K-MAX has already been used in China and Australia to assist  in fighting fires.    Outer Space    NASA and the U.S. Air Force have been secretly testing out unmanned aircraft geared towards  space travel. The X-37B UAV is the Air Force’s ultra-secretive drone that looks like a miniature space  shuttle. It has been quietly circling the Earth for the last two years, setting a record for longest flight  from an unmanned aircraft (more than 719 days). Although vague, the Air Force has said “the pri-  mary objectives to the X-37B are twofold: reusable spacecraft technologies for America’s future in  space and operating experiments which can be returned to, and examined, on Earth.” It seems that  drones have been made a priority when it comes to the future of space exploration and innovation.    25 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Wildlife and Historical Conservation    Drones are a cheaper and more efficient alternative to wildlife conservation. Tracking wildlife pop-  ulations is nearly impossible with humans on the ground. Having an eye-in-the-sky allows wildlife  conservationists to track roaming groups of animals, ranging from Orangutans in Borneo to Bison  on the Great Plains, to get a better idea of the health of their species and ecosystems. Drones are  being used all over the world to track animal species and prevent poaching. Conservation drones  also make perfect tools in the fight against poaching efforts in Asia and Africa.    Drones are also being used for reforestation efforts all over the world. These drones scour the  forest floors of forests decimated by fires and drop seed vessels filled with seeds, fertilizers, and  nutrients that will help a tree rise from the ashes. There have been around 300 million acres of de-  forested land since the early 1990s. What would take humans around 300 years to reforest can be  more efficiently completed via seed-planting drone technology.    Finally, UAVs are becoming instrumental in historical conservation efforts. Drones are being used to  map out 3D renderings of historical sites like Chernobyl, the ancient Greek sites of Ephesus, Turkey,  and Jewish cemeteries all over Europe. The vantage point gives historical preservationists the ability  to find clues about culture and architecture while using 3D imagery to recreate lost sites.    •	 Drones Help Researchers Manage Koala Populations  •	 Animals Appear to Become Acclimated to Drones  •	 DroneSeed Replants Trees to Keep Forests Healthy  •	 Small Isles of Scotland get a Close-Up Courtesy of Drones  •	 Bee-lieve it or Not, Drones are Pollinating Orchards    Pharmacy    How do you get medical supplies to people in hard-to-reach areas? What tool could you use to deliv-  er organs for transplant patients? Drones are the answer to both of those questions. Right now, un-  manned aerial vehicles are being used to deliver emergency medical supplies and cargo to off-the-  grid communities in rural Alaska. Instead of relying on dog sleds, snowmobiles, or ambulances that  can’t handle snow, Alaskans are relying on drones to quickly receive life-saving medical supplies.  Drones are also being tapped to deliver donated organs to transplant patients. Just recently, history  was made when a kidney was transported by a specially-made drone from one hospital in Maryland  to the next in just under five minutes. This could cut down on the alarmingly slow rate at which do-  nations usually arrive (if they arrive at all). Usually, organs are delivered via chartered or commer-  cial flights. Delays and lapses in judgement cause dangerous delays of two hours or more for 4% of  all organ deliveries. Drones can cut the time down tremendously, while offering a safer and secure  method of organ transportation.    •	 Life-saving Drones to Delivery Organ Transplants  •	 Vanuatu Becomes Site of World’s-First Drone Delivered Vaccine    Photography    Drones have been a boon for photographers, who use UAVs to take expansive aerial photos. Ever  wonder what it’s like to get a bird’s eye view of your favorite city, beach or building? There are  drones made specifically for photography that provide a new way to photograph some of your fa-  vorite destinations from above.    26 Inspecta                           Department of Instrumentation and Control Engineering, NSSCE
COMBAT DRONES TO FIGHT                               contactless delivery options to minimize the risk  COVID-19                                             of exposing customers and delivery drivers to                                                       infection. Drones are an ideal solution for con-                                JESWIN GEORGE, S2 ICE  tactless food delivery.    In the face of the global COVID-19 pandemic,         4. Surveillance Drones  there have been reported attempts to utilize         As more and more countries enter lockdown to  drone technology in different scenarios. The         combat the spread of corona virus, drone tech-  novel corona virus is transmitted via respiratory    nology has become an important tool in ensur-  droplets and can spread by touching contami-         ing that members of the public are adhering to  nated surfaces like metal, floors, objects, and      the strict measures put in place. Surveillance  other surfaces indoors and outdoors. Remote-         drones have been used in China since the early  ly piloted drones are becoming vital tools in the    weeks of the outbreak to remind citizens of the  fight against Covid-19 as they help to minimize      quarantine measures and to enforce social-dis-  human interaction and keep human operators           tancing rules. The trend has since gone glob-  safe from getting infected.                          al as more countries deploy drones fitted with                                                       loudspeakers to urge members of the public to  1. Virus Detection by Drones                         remain in their homes and to enforce bans on  In an effort to curb the spread of corona virus,     public gatherings.  the University of South Australia has teamed up  with Dragonfly Inc to develop Pandemic Drones        5. Emergency Medical Delivery by Drones  which will use temperature sensors and com-          The corona virus outbreak has put increased  puter vision to identify symptoms of infectious      pressure on health services across the world.  respiratory diseases. The new drones will be         The virus has caused greater demand for lab-  capable of remotely monitoring temperature,          oratory testing a well as an urgent need for  heart and respiratory rate as well as detect-        personal protective equipment and devices to  ing coughing and sneezing at a distance of up        enable the remote monitoring of patients with  to 10m. This will allow public spaces as well as     milder symptoms. Drone delivery has proved to  crowded areas such as airports and healthcare        be a useful solution here as drones can be used  facilities to be monitored and give researchers      to quickly transport samples from hospitals to  an accurate idea of how widespread is virus.         laboratories, deliver essential protective equip-                                                       ment such as gloves and masks and bring medi-  2. Aerial spraying                                   cal devices to patients’ homes to enable remote  There have been several media reports on the         monitoring.  use of drones for aerial spraying of disinfectants  in public outdoor spaces to contain the spread       The biggest challenge during this opportunity is  of the virus. Attempts took place in China, UAE,     to assemble the right kind of drone in this lock-  Spain, South Korea, and other countries. Some        down when spares and parts are not immedi-  companies claim that they managed to cover 3         ately available. Also, payload customization for  km2 of an area with spraying. However, scientific    non-regular use cases is another challenge. A  evidence suggests that this application has little   drone’s small size and flight capability allow it  to no evidence for efficiency and effectiveness.     to access areas that otherwise may not be easy                                                       or possible. Typically, they are equipped with  3. Food Delivery by Drones                           computer vision, camera, face and object recog-  With most restaurants and cafes closed and the       nition, and a combination of networking, robot-  public urged to stay in their homes to halt the      ics, and artificial intelligence (AI) to perform as  spread of corona virus, the demand for food de-      demanded by the situation.  livery services has never been higher. However,  due to the highly contagious nature of COVID-19  more and more delivery services are opting for    27 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
MGN BLOCKCHAIN                                                            GREESHMA KV, S2 ICE    Technology is changing at an incredible pace and the advent of nascent technologies will radically  shape the future technological innovation that emerges every year have the potential to have a  great impact in our daily lives Is blockchain as most of the country are working on the blockchain.    The technology behind the The bitcoin is attracting number of industries to explore methods for  sharing values on internet .We have become used to sharing information through decentralized  online platform where anybody can publish information from anywhere with access of internet.  The blockchain technology is primarily developed for eliminating the problem of double spending  occurred during transaction.    In the double spending, the user can use the same money for more than one transaction . block-  chain technology can addressed several issues such as decentralization of data, privacy and main-  tain record as digital ledger ,secure transaction ,authentication and validation of user and resistant  to alter data.    The blockchain technologies basically Is growing list of records which are linked using asymmetric  cryptography. The block is the set of digital information ,consists of cryptographic hash of previous  block timestamp and the required transaction data or digital value. Each block has the hash which  is obtained from the previous block hence by design , blockchain is resistant to modification. If the  data is changed in any block will reset to change all the subsequent blocks attatched to it. This en-  sures the security of value distributed on network by the block chain technology.    28 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
LiDAR TECHNOLOGY                                                                                           ARPITHA CS , S4 ICE    Lidar, which stands for Light Detection and Ranging, is a remote sensing method that uses light in  the form of a pulsed laser to measure ranges to the Earth. These light pulses combined with other  data recorded by the airborne system generate precise, three-dimensional information about the  shape of the Earth and its surface characteristics. A lidar instrument principally consists of a laser,  a scanner, and a specialized GPS receiver. Airplanes and helicopters are the most commonly used  platforms for acquiring lidar data over broad areas. Two types of lidar are topographic and bathy-  metric.    Using LiDAR technology in forestry activities    Managing natural resources in wide-scale areas can be a highly time and resource-consuming task  which requires a significant amount of data collection in the field and reduction of the data in the of-  fice to provide the necessary information. High-performance LiDAR remote sensing technology has  recently become an effective tool for use in applications of natural resources. In the field of forestry,  the LiDAR measurements of the forested areas can provide high-quality data on three-dimensional  characterizations of forest structures. Besides, LiDAR data can be used to provide a very high quali-  ty and accurate Digital Elevation Model (DEM) for the forested areas. This study presents the prog-  ress and opportunities of using LiDAR remote sensing technology in various forestry applications.  The results indicate that LiDAR-based forest structure data and high-resolution DEMs can be used  in wide-scale forestry activities such as stand characterizations, forest inventory and management,  fire behavior modeling, and forest operations.    Synthesis of Transportation Applications of Mobile LIDAR    Mobile LIDAR technology, techniques are used widely in the transportation field. It is a powerful  mapping method that uses laser scanning to identify roadway assets and related infrastructure  quickly, accurately, and cost-efficiently. Mobile LiDAR has become an effective solution for rapid  data collection in recent years given advances in scanning speed and accuracy, Global Position-  ing System technology (GPS), and positioning hardware such as global navigation satellite sys-  tem (GNSS) receivers and inertial measurement units (IMUs). Most of the mobile LiDAR consists    29 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
of the mobile platform, positioning hardware, 3D laser scanner(s), photographic/video recording,  computer, and data storage. Several difficulties exist when performing mobile scans. For example,  measurements are performed from a moving platform, requiring precise GPS/IMU readings for  accurate data georeferencing. Also, it usually isn’t feasible to close down a section of highway for  scanning, so neighboring vehicles can block data collection efforts. Additionally, a vehicle must be  moving at a safe speed (with the flow of traffic) while simultaneously collecting data. In some cases,  a rolling slow down can be used to avoid these problems.    Agriculture    Agriculture robots have been used for a variety of purposes ranging from seed and fertilizer disper-  sions, sensing techniques as well as crop scouting for the task of weed control.  Lidar can help determine where to apply costly fertilizer. It can create a topographical map of the  fields and reveal slopes and sun exposure of the farmland. Researchers at the Agricultural research  service used this topographical data with the farmland yield results from previous years, to cat-  egorize land into zones of high, medium, or low yield. This indicates where to apply fertilizer to  maximize yield. Lidar is now used to monitor insects in the field. The use of Lidar can detect the  movement and behavior of individual flying insects. Another application is crop mapping in or-  chards and vineyards, to detect foliage growth and the need for pruning or other maintenance,  detect variations in fruit production, or count plants Lidar is useful in GNSS-denied situations, such  as nut and fruit orchards, where foliage blocks satellite signals to precision agriculture equipment  or a driverless tractor. Lidar sensors can detect the edges of rows so that farming equipment can  continue moving until the GNSS signal is reestablished.    LiDAR as a tool for archaeological research    Airborne light detection and ranging (LiDAR) is a technology that offers the ability to create highly  detailed digital terrain models (DTMs) that expose low relief topographic features. The availability  of these models holds the potential to augment archaeological field research by producing visual  imagery that can be used to identify traces of ancient anthropogenic activity. This capability is par-  ticularly useful in hard-to-access areas and in areas of dense vegetation, where manual surveys are  difficult to plan and execute. Additionally, LiDAR technology is nonintrusive so that initial surveys  can be performed without altering or destroying the integrity of the landscape and any features  that it may contain. Vegetation cover, particularly during leaf-on periods, can interfere with the  ability of LiDAR to penetrate to the surface and can therefore impact its accuracy. The effect of veg-  etation cover on the ability of LiDAR to produce accurate DTMs is evaluated concerning its impact  on the identification of archaeological features.    30 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
IS THE INTERNET BRINGS PEOPLE                      CLOSER OR SEPERATING THEM??                                                                                                   SANDRA S NATH, S2 ICE    No matter what you say about your ideas online, there is no doubt that its influence is growing and  that more and more people are using it over time - currently there are over 1.6 billion users of the  World Wide Web. As the use of the internet increases, there is a growing debate about whether it  helps or not to bring people together. Exactly when web designers create websites, it is often the  companies that want to reach their customers and always know where their business operates,  suggesting that the purpose of bringing people together is in perspective. Does this really work, or  does the internet only work to get us out?    The Internet brings us closer together    Perhaps the best argument ever that allows the internet to bring people together is the fact that it  is a global phenomenon. People from all over the world are connected to the Internet, sharing con-  tent and using the same websites. This gives individuals and businesses more opportunities than  ever to expand their networks and reach out to people they may never meet.    This is clearly reflected in the growth of social networks, which are very popular. Facebook is prob-  ably a good example of this, with over 500 million users and growing. People often use this website  to connect with friends and contacts, such as people they know from school but who have lost  contact. Viewed in this way, the Internet brings us closer together as it provides a platform where  people can interact not only with people they know but also with people from other countries.    Businesses and web developers have obviously seen this trend. Facebook itself suggests that more  than 10,000 new websites interact with the Facebook site every day. This suggests that there is  greater potential for communication in the online platform and smaller websites to benefit from  the success of hundreds, thus connecting different groups from different industries through the  central hub.    31 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
This can also be seen in advance of organizing sub-campaigns online. It is widely thought, for exam-  ple, that without planning through social media and the Internet, Barack Obama would have found  it very difficult to bring together low-income US voters who eventually helped him get to the White  House. We can also see it in the UK, where major campaigns are organized online by various groups.  For example, UK Uncut has organized tax evasion protests, 38 Degrees and others are campaigning  for forest conservation and UKpling is working to organize an online campaign to preserve librar-  ies. We can easily say that without the Internet, all the people who participated in these campaigns  would not have been bought together.    The Internet does not keep us close??    After all, every argument has an opposing argument and this argument is no different. Many peo-  ple have argued that even with the rapid growth of communication technology - especially those  platforms that run the World Wide Web - it has actually had an impact on human development. This  may well be illustrated by the fact that although people are now able to communicate with others  more than ever before, the quality of communication you experience with someone through social  networking will never be the same as that of face-to-face conversations.    There’s a fit in this - if you consider that many people who work in the same office now tend to send  each other email instead of direct communication, you can see how the internet can end up dividing  people.    There are also issues that need to be addressed regarding internet management; as a global or-  ganization in addition to effective international legal regulation, there are very few laws governing  the internet and its operation. Of course, there is an argument to be made that this is a good thing,  because it means that people have space to communicate away from their daily lives. However, if  you consider that some websites are banned in countries like China, North Korea severely restricts  the use of the Internet and the Egyptian government recently shut down the Internet in an effort to  control protesters, it can be argued that there is potential for online control. the internet is separat-  ed from those that are forbidden to communicate. So, even though the Internet is working to bring  its users together, it is forcing those offline to move to the edge.    The Conclusion    Both sides of the debate are right and, of course, very complex when it comes to them. Perhaps,  however this point - in its face, the online world is a great opportunity for global connectivity and  gives users the opportunity to experience different lives and cultures through a representative.  Facebook, Twitter, LinkedIn, Skype, Google and many more offer social networking sites that are  unique to human history.    32 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Is there a need to restore                                 charge extra for their services, they cannot in-  net neutrality??                                           vest in their infrastructure. With complete neu-                                                             trality, a large amount of data is consumed free                                       PRAVEENA A R, S2 ICE  of charge - this money can be used to expand                                                             the fastest network in rural areas. Under strict  Net neutrality or network neutrality means in-             neutrality, the FCC must monitor the compliance  ternet users should be able to access all content          of ISPs with these rules. This includes submitting  on the internet without being discriminated                reports twice a year, which can be expensive for  against by ISPs. Internet Service Providers (ISPs)         ISPs of any size.  are one of the stakeholders. It is important to  note the four different kinds of stakeholders in           Neutrality means that no one with a lot of mon-  the internet space that may be affected by the is-         ey gets specialized treatment. In addition to to-  sue. They are the consumers of any internet ser-           tal neutrality, ISPs can limit websites or services  vice, Telecom Service Providers (TSPs) or Inter-           of small businesses that cannot afford so-called  net Service Providers (ISPs), over-the-top (OTT)           fast routes. The same thing happens to young  service providers, and the government, who                 creators, who have their biggest source of rev-  may regulate and define relationships between              enue for their YouTube channel. None of them  these players. In other words, net neutrality              will be able to compete with the big company.  stipulates that service providers should not slow          ISPs should not be able to block content or nar-  down nor block content from users and also all             row down web pages just because they do not  applications should be allowed to be accessed at           like them. Apart from network neutrality, noth-  the same internet speed and same cost.                     ing prevents them from blocking online content.                                                             This, however, does not include illegal content.  No one pays for the data. With network neutral-            Without full or partial neutrality, the ban on such  ity, users only pay for the service, not the data          content falls on the shoulders of law enforce-  they use. Video streaming services account for             ment agencies. Neutrality ensures that every-  57% of the bandwidth used worldwide by 2018.               thing online is accessible to everyone. If access-  Customers using low bandwidth may not want                 ing high-quality online content becomes a luxury  to pay for the infrastructure needed to support            only for the rich to enjoy, this will increase public  high-bandwidth operations. Illegal content is              outreach. No additional content costs. In addi-  widely available. Offensive, harmful, and ille-            tion to total neutrality, ISPs can charge compa-  gal content is accessible to everyone and diffi-           nies for improving services such as instant video  cult to remove. Removing net neutrality makes              streaming, online gambling, etc. If this happens,  it easier for ISPs to filter out harmful content,          these companies will pass on their new financial  even though this is far from a ban. If ISPs do not         responsibility to users.    33 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Internet of Things                                     even bigger scale, smart city projects are filling                                                         entire regions with sensors to help us under-                      KAVYA K, S2 ICE stand and control the environment.    The Internet of Things, or IoT, refers to the bil-     The term IoT is mainly used for devices that  lions of physical devices around the world that        wouldn’t usually be generally expected to have  are now connected to the internet, all collect-        an internet connection, and that can communi-  ing and sharing data. Thanks to the arrival of         cate with the network independently of human  super-cheap computer chips and the ubiquity            action. For this reason, a PC isn’t generally con-  of wireless networks, it’s possible to turn any-       sidered an IoT device and neither is a smart-  thing, from something as small as a pill to some-      phone -- even though the latter is crammed with  thing as big as an airplane, into a part of the IoT.   sensors. However, a smart watch or a fitness  Connecting up all these different objects and          band, or other wearable devices might be count-  adding sensors to them adds a level of digital         ed as an IoT device.  intelligence to devices that would be otherwise  dumb, enabling them to communicate real-time           How big is the Internet of Things?  data without involving a human being. The In-  ternet of Things is making the fabric of the world     Big and getting bigger -- there are already more  around us smarter and more responsive, merg-           connected things than people in the world. Tech  ing the digital and physical universes                 analyst company IDC predicts that in total there                                                         will be 41.6 billion connected IoT devices by                                                         2025, or “things.” It also suggests industrial and                                                         automotive equipment represent the largest op-                                                         portunity of connected “things,”, but it also sees                                                         strong adoption of smart home and wearable                                                         devices in the near term.    .                                                      Another tech analyst, Gartner, predicts that  Examples of IOT                                        the enterprise and automotive sectors will ac-                                                         count for 5.8 billion devices this year, up almost  Pretty much any physical object can be trans-          a quarter in 2019. Utilities will be the highest  formed into an IoT device if it can be connected       user of IoT, thanks to the continuing rollout of  to the internet to be controlled or communicate        smart meters. In the form of intruder detection  information.                                           and web cameras, security devices will be the                                                         second biggest use of IoT devices. Building au-                                                         tomation – like connected lighting – will be the                                                         fastest-growing sector, followed by automotive                                                         (connected cars) and healthcare (monitoring of                                                         chronic conditions).    A light bulb that can be switched on using a           Conclusion  smartphone app is an IoT device, as is a motion  sensor or a smart thermostat in your office or a       IoT-enabled devices and sensors are helping  connected streetlight. An IoT device could be as       us reduce air pollution in some of our world’s  fluffy as a child’s toy or as serious as a driverless  biggest cities, improve agriculture and our food  truck. Some larger objects may themselves be           supply, and even detect and contain deadly vi-  filled with many smaller IoT components, such          ruses.  as a jet engine that’s now filled with thousands  of sensors collecting and transmitting data back  to make sure it is operating efficiently. On an    34 Inspecta         Department of Instrumentation and Control Engineering, NSSCE
WIFI VERSUS BLUETOOTH IN THE LIMELIGHT OF IOT                                                                                  SWATHI KRISHNANUNNI, S2 ICE    IoT devices are already becoming the next inevitable turn towards tomorrow, the big question that  comes up in every CTO or decision maker’s mind is which technology to invest into so that one can  expect to get the best. Before we understand the difference between Wifi and Bluetooth technol-  ogy, let’s first understand what is IoT. Though there is a full writeup on what is IoT, in a nutshell  enabling a thing to talk to the internet is called the Internet of Things. Say for instance the thing  is the chair that you are currently sitting on and you love your chair. So, you would like to know if  anyone else uses your chair while in your absence. I’ll put a pressure sensor on the chair and this  sensor would connect to the internet in a way that when someone sits on the chair, the pressure  sensor would immediately notify you. Eventually, the things in the internet of things will start to  communicate with each other, so say in our current example the pressure sensor senses that there  is someone on the chair and that is not you, it will tell the handle of the chair to send a mild current  so as to give the intruder a shock.    For this to become a reality, devices need to have the capability of talking to each other, and for  this, they have to communicate wirelessly. This need has given birth to many wireless technologies  for devices that can wirelessly connect. Some better than the other and I have often been asked a  question that there are a number of wireless communication technologies available in the market  today viz. Z wave, Zigbee, Wifi and Bluetooth, which ones of these technologies have a future and  why. So, I decided to write up a blog on the difference between bluetooth and Wi-Fi, to begin with,  as these wireless technologies were born even before the IoT was a thing. In this blog ahead, I have  tried to compare the two fierce wireless communication technologies on the internet of things  (IoT)based on certain criteria.    RANGE    It is defined as the physical distance of wireless (over the air) communication between two devices  In a line of sight, the Bluetooth radio signals can be received by a receiver of up to 500 meters, but  with bluetooth mesh, this range can be easily extended to much more using relay nodes. Using a  simple TTL (Time to Live) variable, the system architect can decide how many hops a message could  take to reach the destination. This means that if one node fails, the mesh network will find another  functioning node to send the data packets to its intended destination. With the 802.11n and other  flavours of Wi-Fi, the range is pretty decent, and the range can be extended by using signal extend-    35 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
ers and additional access points. But as discussed on the topic of Topology, extending the range by  adding additional hubs does not work for the Internet of Things, as when one of the hubs malfunc-  tions, the entire network becomes inoperable and nothing will work unless the hub is replaced and  network configurations reconfigured.    DATA RANGE    This is a term to denote the transmission speed, or the number of bits per second transferred over a  radio signal At 1 Mbps Bluetooth, today has by far the best Data transfer rate among its competition  viz. ZigBee, Zwave, Thread etc. At a higher data rate, the packets can reach the destination faster  and help with freeing up radio waves and as a result, there are minimal packet collisions and lower  network saturation. A 33 bytes packet size in LE and 15 bytes in Mesh, when transferred at 1 Mbps  means there is a lower duty cycle, which also translates to longer battery life. Bluetooth support for  Low Energy devices implies that devices that spend most of their time in sleep mode and wake up  to quickly perform the tasks and go back to sleep again, give the capacity of the devices to run for  years A Wi-Fi device has the capability of transferring hundreds of megabits per second. The new-  er version of 802.11ac and 802.11n is even faster. Though these numbers look impressive, it is an  overkill for an IoT application like Asset Tracking or Warehouse Pallet Tracking for instance, where  instead of data-heavy content, the asset tags or beacons broadcast simple commands and tiny bits  of information like sensor data or state change signals.    COMPATIBILITY WITH SMARTPHONES    It is the ability of the wireless protocol to communicate natively with a smartphone or any handheld  device. Bluetooth has improved customer experience and we all know that. Right from listening  to music or getting data wirelessly from the fitness tracker or any other smart device, bluetooth  has become the defacto standard for smartphone communication. The fact that bluetooth natively  communicates with the smartphone app, the number of possibilities for improving user experience  has increased multifold. Only a smartphone app is required to talk to bluetooth devices directly and  that is all that is required to build, configure and control a network of connected bluetooth devices.  Though Wi-Fi can also be found in every smartphone, tablet or laptop, the fact that it requires the  networks, central access point to communicate and does not communicate directly, makes Wi-Fi  inefficient for IoT devices. Unlike Bluetooth where the setup of IoT devices can be done directly us-  ing an app, the same cannot be done using Wi-Fi as the smart devices do not talk to smartphones  natively and they first need to get on the same network.    ONBOARDING    This refers to the speed and convenience with which a new device can be added to the wireless net-  work Thanks to this direct connectivity, Bluetooth provides the end-user with what could be called  a Remote Display and a Remote Keyboard for each smart device, no matter how small or simple it  is. One of the major benefits resulting from this is the simplicity of the commissioning and provi-  sioning (in the case of Bluetooth mesh) process. With other protocols, manufacturers often have  to come up with the wildest ideas to facilitate adding a new device to the existing network. With  Bluetooth, the entire procedure can be made simpler, more intuitive, and safer. Just like Bluetooth,  every smartphone, tablet, and laptop is also provided with a Wi-Fi capability, and theoretically, on-  boarding a smart device should have been as straightforward as the Bluetooth device; but that is  not the case. A Wi-Fi smart device would need to know the network password to get on the network  and you need the smartphone to provide it with the details, but then you need the smartphone to  also be a part of the network. This makes things a bit tricky.    36 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
FUTURE DEVELOPMENTS    It is the trajectory of the technology life cycle. How strong is the community supporting the tech-  nology will define how much the adoption will be trusted? With real-life use cases for Smart Homes,  Building management system, Industry 4.0, Remote Asset Monitoring, etc, built over BLE and Blue-  tooth mesh networking specifications, it seems that Bluetooth is all set to become the go-to tech-  nology for low-bandwidth communications in the IoT sector. The BlueTooth SIG is perfectly placed  to ensure a strong future for Bluetooth as through this comparison we have seen that no other  wireless technology has ever been so deep and comprehensive. Energy Efficiency, cost, resource  heaviness, speed of onboarding, and other form factor constraints have been the major challenges  to use Wi-Fi for IoT deployments. The Wi-FiAlliance is aware of these shortcomings and has made  efforts by introducing standards like the 802.11c and 802.11an with a promise to reduce the chal-  lenges that legacy 802.11 technologies struggle within in the resource-scarce IoT space. But, it’s  far behind in the race and only time will tell when the Alliance will come back with answers on the  current challenges.    37 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
LiFi is a life-changer in 5G                                of the RF spectrum, and a 667-fold deficit com-                                                              pared to the current WiGig limit. By comparison,                                        ABHISHEK C K, S2 ICE  6 THz of bandwidth is only 0.8% of all IR and                                                              visible light intensity. One could argue that the  ABSTRACT                                                    dynamic re-use of space resources would be ac-                                                              ceptable to overcome this emerging scope. This  In this paper, we will start by explaining what             method has been used with great success in the  Light-Fidelity (LiFi) is and then argue about 5th           past and has led to a ‘small cell concept’. It has  Generation (5G) technology. High speeds of 8                been a major factor in improving data rates. Cell  Gbps transmission from a single light source are            sizes in cellular connections are greatly reduced.  displayed, and complete mobile networks based               The cell in the original 2 G systems was present  on LiFi have been created. We will discuss many             with 35 km, 5 km 3G systems, 100 m 4G systems,  misconceptions and highlight the potential im-              and 5G about 25 m to reuse the available RF  pact of these technologies on many existing and             spectrum and achieve higher data density. How-  emerging industries. We also discuss new appli-             ever, further reduction in cell size is very difficult  cations that LiFi may open in the future.                   to achieve due to the high cost of backhaul and                                                              fronthaul data link infrastructure that connects  Introduction                                                these access points distributed across the core                                                              network. Moreover, with a smaller cell size the  LiFi is a wireless communication technology that            chances of seeing the line between the interfer-  uses infrared and light spectrum for high-speed             ing channel and the user channel increase  communication. LiFi, the first built-in extension,          .  expands the concept of virtual optical commu-  nication (VLC) to achieve faster wireless, secure,          Potential disruptions can reduce data rates and  bi-directional, and full wireless communication.            can cause serious problems for mobile networks.  It is important to note that LiFi supports user             Therefore, WiFi access points are installed under  mobility and multi-user access. The frequency of            the stairs that use the human body as a signal  the infrared and light spectrum together is al-             for RF signals and avoid line interference links.  most 2600 times the size of a total radio frequen-          This is not a viable solution for the delivery of of-  cy of 300 GHz. It has been shown that the com-              fices and homes. For these reasons, future mo-  bined annual growth rate (CAGR) of the wireless             bile data growth contributions will likely range  road has been 60% over the past decade. If this             from a wider range to local reuse. In particular,  growth is maintained over the next 20 years,                optical equipment is very attractive as it is large  which is logical because of the advent of the In-           and unlicensed.  ternet-of-Things (IoT) and machine-to-machine  communication (MTC), this could mean a de-                  These devices can be used for data communica-  mand 12 times the current bandwidth assuming                tions that have been successfully demonstrated  the same spectrum power. For example, the in-               for decades in fiber-optic communication using  dustrial group, the scientist’s sci c and medical           low power radiation (lasers). With the wide-  (ISM) RF in the 5.4 GHz region is approximate-  ly 500 MHz, and this is mostly used by wireless  fi fidelity (WiFi). This bandwidth is already full,  which is one reason for the introduction of the  Wireless Gigabit Alliance (WiGig). WiGig uses an  unlicensed spectrum between 57 GHz - 66 GHz,  that is, the maximum  9 GHz bandwidth. 20 years from now, the band-  width demand for future wireless systems will be  12,000 × 500 MHz leading to a 6 THz bandwidth  demand. The total RF signal is only 0.3 THz. This  means a 20-fold deficit compared to the rest    38 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
spread adoption of high-intensity light-emitting    or-changing chemical. Record transfer speeds  diodes (LEDs), there has been an opportunity to     with one 8 Gbps single micro LED are shown,  use the optical signal of light for wireless com-   and it has been shown that 100 Gbps is possible  munication networks.                                with laser-based lighting.    Traditionally, the VLC system is designed as a      The main advantages of a LiFi wireless network  single wireless communication link between an       layer are: (i) three orders for data intensity; (ii)  LED light source and a receiver with an image       different structures to strengthen the safety of  detection device such as a picture detector (PD).   the layers; (iii) use in internally safe areas such  The level of data that can be accessed depends      as petrochemical plants and oil platforms where  on the digital voice processing technology used     RF is usually prohibited; iv) with the advent of  and the lighting technology. Available light tech-  power-over-ethernet (PoE) and its use in light-  nology is summarized in.                            ing, there is an opportunity to go back to the                                                      existing data network infrastructure needed  Many commercial LEDs are made up of high blue       behind the light sources and its integrated LiFi  light with sticky phosphorus that converts blue     modem.  light to yellow. When blue light and yellow light  are combined, this turns into white light. This is  LiFi networking  the most expensive method of producing white  light today, but the color that changes the color    The room is lit by several light fixtures, which  of phosphor reduces the reaction response, i.e.,    provide illumination. Each light is driven by a LiFi  the higher waves are greatly reduced. As a re-      modem or a LiFi chip and, therefore, also serves  sult, the bandwidth of this type of LED is only in  as an optical base station or access point (AP).  the 2 MHz regions. With a later blue receiver to    The optical base stations are connected to the  remove yellow particles, however, it is possible    core network by high-speed backhaul connec-  to achieve data rates in the region of 1 Gbps with  tions. The light fixtures also have an integrated  these devices. The existing red, blue and blue      infrared detector to receive signals from the ter-  (RGB) LEDs are highly advanced allowing data        minals. The illuminating lights are modulated at  rates up to 5 Gbps as white light is produced       high rates. The resulting high-frequency flickers  by mixing basic colors instead of using a col-      which are much higher than the refresh rate of    39 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
optimum selection of respective CCI mitigation                                                         and resource scheduling techniques depend on                                                         actual use cases and system constraints. Oth-                                                         er functions of the central controller include    a computer monitor are not visible to the occu-        The move from point to point links to full wire-  pants of the room. Power and data can be pro-          less networks based on light poses several chal-  vided to each light fixture using some different        lenges. Within each cell, there can be several  techniques, including PoE and power-line com-          users and therefore multiple access schemes  munication (PLC). An optical uplink is implement-      are required. The provision of an uplink can also  ed by using a transmitter on the user equipment        require a different approach from the down-  (UE), often using an IR source (so it is invisible to  link. This is because low energy consumption is  the user). Each of these light fixtures, which at       required in the portable device, and an uplink  the same time act as wireless LiFi APs, create an      visible light source on the device is likely to be  extremely small cell, an optical att cell. Because     distracting to the user. Therefore, the use of the  light is spatially confined, it is possible in LiFi to  infrared spectrum seems most appropriate for  take the ‘small cell concept’ to a new level by        the uplink. In addition, modulation techniques  creating ultra-small cells with radii less than 5 m    for a high-speed uplink have to be spectrum  while exploiting the huge additional unlicensed        efficient and power efficient at the same time.  spectrum in the optical domain. The balance of         Two recently developed modulation techniques  light fixtures that contain APs and those that          that achieve this are enhanced unipolar OFDM  provide the only illumination is determined by         (EU OFDM), or spectral and energy  the requirement of the network, but potentially        efficient (SEE OFDM). Advanced CCI mitigation  all light fixtures can contain APs. Compared to         techniques often require that these multiple LiFi  a single AP wireless hot-spot system, such cel-        APs are operated utilizing a centralized control  lular system can cover a much larger area and          mechanism such as ‘resource schedulers’ with-  allow multiple UEs to be connected simultane-          in the controller of a software defined network  ously. In cellular networks, dense spatial reuse       (SDN).  of the wireless transmission resources is used to  achieve very high data density - bits per second       The main tasks of the ‘resource scheduler’ are  per square meter (bps/m2). Consequently, the           to adaptively allocate signal power, frequency,  links using the same channel in adjacent cells         time, and wavelength resources. Typically, there  interfere with each other, which is known as           are trade-offs between signaling overhead,  co-channel interference (CCI) illustrates CCI in       computational complexity, user data rates, ag-  an optical att cell network.                           gregate data rates, and user fairness, and the    40 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
achieving multi-user access and the process of       over incumbent technologies. Firstly, unlike om-  handover from cell to cell when terminals move.      nidirectional RF antennas radiating signals in all  Handover plays an important role in LiFi net-        directions, a LED light source typically radiates  works. For example, the handover controller has      optical power directionally because of its con-  to ensure that connectivity is maintained when       struction. Therefore, the radiation of the visible  users leave a room or the premises. Therefore,       light signals is naturally confined within a lim-  there might be situations when there is no live      ited region. In contrast, RF mm-wave systems  coverage. In these scenarios to avoid loss of        require complicated and expensive antenna  connectivity, we utilize the fact that LiFi is com-  beamforming techniques to achieve the same  plementary to RF networks. To this end, there        objective. Secondly, LiFi att cell networks can be  have been studies on hybrid LiFi/RF networks,        implemented by modifying existing lighting sys-  and the three key findings are:                       tems. Any LiFi att cell network can provide ex-                                                       tra wireless capacity without interference to RF  •	 LiFi networks will significantly improve ser-      networks that may already exist. LiFi att cell net-      vices quality to mobile users                    works, therefore, have the potential to augment                                                       5G cellular systems in a cost-effective manner.  •	 Service delivery can be uninterrupted             A unique feature of LiFi is that it combines illu-  •	 WiFi networks significantly benefit from LiFi       mination and data communication by using the                                                       same device to transmit data and to provide      networks.                                        lighting.    The latter is because well-designed load balanc-     LiFi misconceptions  ing will ensure that WiFi networks suffer less  from inefficient traffic overheads caused att cell-      There are many misconceptions about LiFi:  tant re-transmissions which happen when two          LiFi Los technology: This is probably the biggest  or multiple terminals are in contention.             misconception. Using the orthogonal frequen-    LiFi attocell networks have many advantages    41 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
cy division multiplexing (OFDM) -type intensity      Fl icker lamps: The low frequency at which the  modulation (IM) / Direct Detection (DD) modu-        lights are made is in the 1 MHz region. The  lation scheme, data measurements in the effec-       computer screen refresh rate is about 100 Hz.  tive signal-to-noise-ratio (SNR) scale. In a typi-   This means that the fl icker LiFi light bulb ratio  cal hotel area where the minimum lighting level      is more than 10,000 than the computer screen.  for reading purposes is 500 lx, the SNR at table     Therefore, no icker is visible.  height is between 40 dB and 60 dB. This means  that high-level flexibility strategies can be used   This is for downlink only: The main advantage  in conjunction with OFDM to utilize available        is that LiFi can be integrated with LED lighting.  channel capacity. By using voice fluctuations and    This, however, does not mean that both activi-  coding (AMC) it is possible to transfer data to low  ties should be used together. Both of these func-  SNRs such as −6 dB. Imagine a video transmis-        tions can be easily separated (see comments  sion on a portable computer in front of you at a     blurring). Because of this, LiFi can also be used  distance of 3 meters when the LED light points       extensively for uplink communication where  to a white wall on one side to the receiver’s loca-  no lighting is required. The infrared spectrum,  tion. Therefore, no direct part of the Los reaches   therefore, completely borrows uplink. We did a  the recipient before, but the video was success-     study where we sent data at a speed of 1.1 Gbps  fully received. If the wall had been darker, more    over a distance of 10 m with an output power  light would have been placed, compromising           LED of only 4.5 mW.  the SNR receiver. If the SNR fell below the 6-dB  threshold, an error link would not be possible.      Conclusion  However, in low light conditions, one photon av-  alanche diode can be used on the receiver which      In this paper, we have shown that there has been  improves the sensitivity of the receiver at least    a clear trend in wireless communications to use  in order of magnitude.LiFi does not work in sun-     ever higher frequencies. This is a consequence  light conditions: Sunlight is an interfering signal  of the limited availability of RF spectrum in the  outside the bandwidth used for data conversion.      lower frequency bands of exponential growth in  LiFi works at frequencies greater than 1 MHz.        wireless data traffic that we have been witness-  Therefore, regular sunlight can be removed us-       ing at the same time during the last decade. This  ing electrical filters. What’s more about sunlight   growth will continue. It is, therefore, inevitable  is the improved gun sound, which can’t be easily     that other spectrum than the RF spectrum must  eliminated by optical lights. In a study the im-     be used for future wireless communication sys-  pact of shooting noise was properly investigat-      tems. We, therefore, forecast a paradigm shift  ed, it was found that the data rate was corrupted    in wireless communications when moving from  by 1.5% and 4.5% when considered.                    mm-wave communication to nm-wave commu-                                                       nication which consequently involves light – i.e.,  0.19 mm2 detector, and 2 mm2 detectors re-           LiFi. There has been significant research in phys-  spectively. Overcrowding can be avoided by           ical layer technologies for LiFi during the past 15  using automatic gain control algorithms in con-      years and data rates have increased from a few  junction with optical fi lters. We say that sunlight  Mbps in around 2002 to 8 Gbps from a single LED  is of great benefit as it empowers LiFi receivers    in 2016. In the last five years there has been in-  based on the sun where the cell acts as a data       creasing research in LiFi networking techniques  receiver, and at the same time harvests sunlight     such as multiuser access, interference mitiga-  as energy.                                           tion, and mobility support, and in parallel LiFi                                                       products have entered the market which has en-  Lights cannot be dimmed: There are advanced          abled wireless networking with light. Therefore,  voice switches such as EU-OFDM that allow LiFi       LiFi has become a reality and this technology is  to operate near the LED power supply (ToV)           here to stay for a long time.  which means the lights can be used at very low  output levels while maintaining high data rates.    42 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Causes of Cybercrime and                                      inscrutable security that uses a unified system  Preventive Measures                                           of software and hardware to authenticate any                                                                information that is accessed over the Internet.                                            Abhishek V, S2 ICE  Let’s find out more about cybercrimes.    Rapid technological growth and developments                   Causes of Cybercrime:  have provided vast areas of new opportuni-  ty and efficient sources for organizations of all             Cybercriminals always opt for an easy way to  sizes. Technological growth is majorly backed                 make big money. They target rich people or rich  by the internet. The internet has brought dis-                organizations like banks, casinos, and financial  tant objects closer, in other words, it makes                 firms where a huge amount of money flows dai-  the world small. The internet has now become                  ly and hack sensitive information. Catching such  a national asset, the whole national security is              criminals is difficult. Hence, that increases the  also depending on it. But these new technolo-                 number of cyber-crimes across the globe. Com-  gies have also brought unprecedented threats                  puters are vulnerable, so laws are required to  with them cybercrime. Cybercrime is a crime in                protect and safeguard them against cybercrimi-  which a computer is used for a crime like hack-               nals. We could list the following reasons for the  ing, spamming, phishing, etc.                                 vulnerability of computers:    Introduction to Cybercrime:                                   Easy to access : The problem behind safeguard-                                                                ing a computer system from unauthorized  Cybercriminals use the internet and computer                  access is that there are many possibilities of  technology to hack user’s personal computers,                 breach due to the complex technology. Hackers  smartphone data, and personal details from so-                can steal access codes, retina images, advanced  cial media, business secrets, national secrets,               voice recorders, etc. that can fool biometric sys-  etc. Criminals who perform these illegal activ-               tems easily and bypass firewalls can be utilized  ities through the internet are called – Hackers.              to get past many security systems.  Though law enforcement agencies are trying to  tackle this problem, it is growing regularly and              Capacity to store data in comparatively small  many people have become victims of identity                   space : The computer has the unique character-  theft, hacking and malicious software. One of                 istic of storing data in a very small space. This  the best ways to stop these criminals and pro-                makes it a lot easier for people to steal data  tect sensitive information is by making use of                from any other storage and use it for their profit.    43 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
Complex : The computers run on operating           Piracy or Theft : This crime occurs when a per-  systems and these operating systems are pro-       son violates copyrights and downloads music,  grammed with millions of codes. The human          movies, games, and software. There are even  mind is imperfect, so it can do mistakes at any    peer-sharing websites that encourage software  stage. Cybercriminals take advantage of these      piracy and many of these websites are now be-  gaps.                                              ing targeted by the FBI. Today, the judicial sys-                                                     tem is addressing this cybercrime and some  Negligence : Negligence is one of the charac-      laws prevent people from illegal downloading.  teristics of human conduct. So, there may be a     Film producers and directors often become vic-  possibility that protecting the computer system    tims of this crime.  we may make any negligence which provides  cyber-criminal access and control over the com-    How to tackle Cybercrime?  puter system.                                                     To tackle cybercrime effectively, establish mul-  Loss of evidence : The data related to the crime   tidimensional public-private collaborations be-  can be easily destroyed. So, Loss of evidence      tween law enforcement agencies, the informa-  has become a very common & obvious problem         tion technology industry, information security  which paralyzes the system behind the investi-     organizations, internet companies, and financial  gation of cyber-crime.                             institutions. Unlike the real world, Cybercrimi-                                                     nals do not fight one another for supremacy or  Types of Cybercrimes                               control. Instead, they work together to improve                                                     their skills and even help out each other with  There are many types of cyber-crimes and the       new opportunities. Hence, the usual methods  most common ones are explained below:              of fighting crime cannot be used against cyber-                                                     criminals.  Hacking : It is a simple term that defines send-  ing illegal instruction to any other computer or   The best way to go about this is by using the  network. In this case, a person’s computer is      solutions provided by Cross-Domain Solutions.  hacked so that his personal or sensitive informa-  This allows organizations to use a unified system  tion can be accessed. The criminal uses a variety  comprising of software and hardware that au-  of software to crack a person’s computer and       thenticates both manual and automatic transfer  the person may not be aware that his comput-       and access to information when it takes place  er has been accessed from a remote location.       between different security classification levels.  Often, government websites are a hot target        This allows seamless sharing and access of in-  for hackers because it helps them gain notori-     formation within a specific security classifica-  ety which is further fuelled by aggressive media   tion, but cannot be intercepted by or advertently  coverage. This is different from ethical hacking   revealed to the user who is not part of the secu-  which is used by many organizations to check       rity classification. This helps to keep the network  their Internet security protection.                and the systems using the network safe.    Child pornography and Abuse : The internet  is being highly used to abuse children sexual-  ly worldwide. This is also a type of cyber-crime  wherein criminals solicit minors via chat rooms  for child pornography. The Cyber security de-  partment of every nation is spending a lot of  time monitoring chat rooms frequented by chil-  dren with the hopes of reducing and preventing  child abuse and soliciting.    44 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
AUGMENTED REALITY                                              Augmented reality (AR) is a field of computer re-                                                                 search which deals with the combination of real                                                  Sabna, S2 ICE  world and computer-generated data. Augment-                                                                 ed reality (AR) refers to a computer displays that  Augmented Reality (AR) is a growing area in                    add virtual information to a user’s sensory per-  virtual reality research. The world environment                ception. It is a method for visual improvement  around us provides a wealth of information that                or enrichment of surrounding environment by  is difficult to duplicate in a computer. This is ev-           overlying spatially aligned computer informa-  idenced by the worlds used in virtual environ-                 tion on to a human’s view(eyes).  ments. Either these worlds are very simplistic  such as the environments created for immersive                 Augmented reality (AR) was introduced as the  entertainment and games, or the system that                    opposite of virtual reality: Instead of immersing  can create a more realistic environment has a                  the user in to a synthesized, purely information-  million-dollar price tag such as flight simulators.            al environment, the goal of AR is to augment the  An augmented reality system generates a com-                   real world is the information handling capabili-  posite view for the user.                                      ties.    It is a combination of the real scene viewed by                AR research focuses on see through devices,  the user and a virtual scene generated by the                  usually worn on the head that overlay graphing  computer that augments the scene with addi-                    and text on the users view of his or her surround-  tional information. In all those applications the              ings. In general, it superimposes graphing over  augmented reality presented to the user en-                    a real world’s environment in real time. An AR  hances that person’s performance in and per-                   system adds virtual comparator objects, audio  ception of the world. The ultimate goal is to cre-             and other sense enhancements to a real-world  ate a system such that the user cannot tell the                environment in real time. These enhancements  difference between the real world and the virtu-               are added in a way that the viewer cannot tell  al augmentation of it. It depicts the merging and              the difference between the real and augmented  correct registration of data from a pre-opera-                 world. The process of superimposing digitally  tive imaging study onto the patient’s head. Pro-               rendered images onto our real-world surround-  viding this view to a surgeon in the operating                 ings, giving a sense of an illusion or virtual real-  theatre would enhance their performance and                    ity. Recent developments have made this tech-  possibly eliminate the need for any other cali-                nology accessible using a Smartphone.  bration fixtures during the procedure.    45 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
FLEXIBLE ELECTRONIC SKIN                                                                          Aneesh Murali, S2 ICE    Electronics play a very important role in devel-        dance of new applications that can wirelessly  oping simple devices used for any purpose. In           monitor the vitals and body movements of a pa-  every field electronic equipment is required. The       tient sending information directly to a comput-  best achievement as well as future example of           er that can log and store data to better assist in  integrated electronics in the medical field is Arti-    future decisions. This paper offers an insightful  ficial Skin. It is an ultrathin electronics device at-  view of the internal structure, fabrication pro-  tached to the skin like a sick on tattoo which can      cess and different manufacturing processes.  measure electrical activity of heart, brain waves  & other vital signals.                                  Goal is to develop sensors on flexible substrates                                                          that are compliant to curved surfaces. Research-  Artificial skin is skin grown in a laboratory. It       er’s objective for making artificial skin is to make  can be used as skin replacement for people who          a revolutionary change in robotics, in the medi-  have suffered skin trauma, such as severe burns         cal field, in flexible electronics. Skin is a large or-  or skin diseases, or robotic applications. This pa-     gan in the human body so artificial skin replaces  per focuses on the Artificial skin(E-Skin) to build     it according to our needs. Main objective of ar-  a skin work similar to that of the human skin and       tificial skin is to sense heat, pressure, touch, air-  also it is embedded with several sensations or          flow and whatever which human skin senses. It  the sense of touch acting on the skin. This skin        is a replacement for prosthetic limbs and robotic  is already being stitched together. It consists of      arms. Artificial skin is skin grown in a laboratory.  millions of embedded electronic measuring de-  vices: thermostats, pressure gauges, pollution          There are various names for artificial skin. In the  detectors, cameras, microphones, glucose sen-           biomedical field it is called artificial skin, in our  sors, EKGs, electronic holographs. This device          electronics field it is called electronic skin, some  would enhance the new technology which is               scientists call it sensitive skin, in other ways it is  emerging and would greatly increase the use-            also called synthetic skin, some people say that  fulness of robotic probes in areas where the hu-        it is fake skin. Such different names are available  man cannot venture.                                     but the application is the same . It is a skin re-                                                          placement for people who have suffered skin  The sensor could pave the way for an overabun-          trauma, such as severe burns or skin diseases,    46 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
or robotic applications & so on. An artificial skin  electronic properties, such as the speed at which  has also been recently demonstrated at the Uni-      signals can be read from the sensors. For that,  versity of Cincinnati for in-vitro sweat simulation  electron mobility is a fundamental limiting fac-  and testing, capable of skin-like texture, wetting,  tor, so some researchers are seeking to create  sweat pore-density, and sweat rates                  flexible materials that allow electrons to move                                                       very quickly.  Architecture of Flexible Electronic Skin                                                       Conclusion  With the interactive e-skin, demonstration takes  place of an elegant system on plastic that can  be wrapped around different objects to enable  a new form of HMI. Other companies, including  Massachusetts-based engineering firm MC10,  have created flexible electronic circuits that  are attached to a wearer’s skin using a rubber  stamp. MC10 originally designed the tattoos,  called Biostamps, to help medical teams mea-  sure the health of their patients either remotely,  or without the need for large expensive machin-  ery. Fig 2 shows the various parts that make up  the MC10 electronic tattoo called the Bio stamp.  It can be stuck to the body using a rubber stamp,  and protected using spray-on bandages. The  circuit can be worn for two weeks and Motorola  believes this makes it perfect for authentication  purposes.    Bio stamps use high-performance silicon, can         The electronics devices gain more demand when  stretch up to 200 per cent and can monitor tem-      they are compact in size and best at functioning.  perature, hydration and strain, among other          The Artificial Skin is one such device which de-  medical statistics. Javey’s study claims that while  picts the beauty of electronics and its use in daily  building sensors into networks isn’t new, interac-   life. Scientists create artificial skin that emulates  tive displays; being able to recognize touch and     human touch. According to experts, the artifi-  pressure and have the flexible circuit respond to    cial skin is “smarter and similar to human skin.”  it is ‘breakthrough’. His team is now working on     It also offers greater sensitivity and resolution  a sample that could also register and respond to     than current commercially available techniques.  changes in temperature and light to make the         Bendable sensors and displays have made the  skin even more lifelike.                             tech rounds before. We can predict a patient of  Large-area ultrasonic sensor arrays that could       an oncoming heart attack hours in advance. In  keep both robots and humans out of trouble.          future even virtual screens may be placed on  An ultrasonic skin covering an entire robot body     devices for knowing our body functions. Used  could work as a 360-degree proximity sensor,         in car dashboard, interactive wallpapers, smart  measuring the distance between the robot and         watches.  external obstacles. This could prevent robot  4 from crashing into walls or allow it to han-  dle our soft, fragile human bodies with more  care. For humans, it could provide prosthetics  or garments that are hyper aware of their sur-  roundings. Besides adding multiple functions  to e-skins, it’s also important to improve their    47 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
PICK AND PLACE COLOR SENSING ROBOTIC ARM                                                                                  ANAGHA BALAKRISHNAN, S2 ICE    HISTORY  	  The word “Robot” was coined from “Rabata”, which is a Czech translation for “Slave”. The definition  of a robot is dynamic, depending on technological advancement. However, the Robotic Institute of  America (1979) provided a definition that received general acceptance. Robotic Institute of America  (RIA) defines a robot as a reprogrammable, multifunctional manipulator designed to move materi-  als, parts, tools, or specialized devices through various programmed motions for the performance  of a variety of tasks.” A robot is a virtual or mechanical artificial agent. In practice, it is usually an  electro-mechanical machine that is guided by computer or electronic programming and is thus able  to do tasks on its own. Another common characteristic is that by its appearance or movements, a  robot often conveys a sense, and the capabilities of a robot vary vastly, all robots share the feature  of a mechanical movable structure under some form of control. This control of the robot involves  three distinct phases: perception, processing, and action. In common the preceptors are sensors  mounted on the robot. Processing is done by an onboard microcontroller or processor and action  (task) is performed using a motor or with some other actuators. A robot is a multi-disciplinary ma-  chine as its applications are not just limited to one field. In the space industry, robots (in form of  space probes) are used in space exploration; in the defense department, robots are used as bomb  discarding, and surveillance drones; in the medical field, assistive robots are used during a surgical  operation.    Robotics is an integral part of automating the flexible manufacturing system that one greatly in  demand these days. Robots are now more than a machine, as robots have become the solution  of the future as cost labor wages and customers demand. Even though the cost of acquiring a ro-  botic system is quite expensive, with today’s rapid development and very high demand in quality    48 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
with International Standard Organization (ISO) standards, humans are no longer capable of such  demands. Research and development of future robots are moving at a very rapid pace due to the  constantly improving and upgrading of the quality standards of products. Robots and automation  are employed to replace humans to perform those tasks that are routine, dangerous, complex, and  hazardous area. In a world of advanced technology today, automation greatly increases production  capability, improve product quality and lower production cost. Project aims at a fully automated  material handling system. This can be done by using a color sensor interfaced with the Atmega328P  Micro Controller Unit. It synchronizes the movement of the robotic arm to pick the objects moving  on a conveyor belt. It aims in classifying the colored objects which are coming on the conveyor by  picking and placing the objects in its respective pre-programmed place. Thereby eliminating the  monotonous work done by a human, achieving accuracy and speed in the work. This robot involves  color sensors that sense the object’s color and sends the signal to the microcontroller. The micro-  controller sends the signal to various motors of the robotic arm to grip the object and place it in the  specified location. Based upon the color detected, the robotic arm moves to the specified location  releases the object, and comes back to the original position.    PICK AND PLACE COLOR SENSING ROBOTIC ARM aims in classifying the colored object which is  coming on the conveyer belt by picking and placing the object in its respective pre-programmed  place. The Arduino UNO is the heart, it is an open-source prototyping platform. Its clone is a micro-  controller board based on the ATmega328p. 5-12 volt power supply is used here to provide power to  Arduino UNO, Robotic arm, and Conveyer belt. A power supply is an electrical device that supplies  electric power to an electrical load. The primary function of the DC power supply is to convert AC  power to required DC power. The conveyer belt is used here to move the object towards the sens-  ing unit. A robotic arm and sensing unit are connected to the microcontroller. The robotic arm is a  type of mechanical arm, usually programmable, with similar functions to a human arm. It picks the  object and sorts it in the basket with the help of the signals in a microcontroller. The color sensor  is used here as a sensing unit. It senses the frequencies of RGB color and sends the signal to the  microcontroller. The microcontroller receives all the signals and provides an output with the help  of the Arduino program.    CONCLUSION    Sorting objects through color sensors, the future advancements can be done by increasing the effi-  ciency of the color sensor. This method is verified To be highly beneficial for automated industries.  The sensors key component of the project which aids in distinguishing the objects. It synchronizes  the movement of the robotic arm to pick the objects moving on a conveyor belt. It aims in clas-  sifying the colored objects which are coming on the conveyor by picking and placing the objects  in its respective pre-programmed place. This project has been effectively designed to handle the  required task. It can identify the specific color of the and grab it and place it in a required area as  the user with the help of RGB color sensor by sensing the color of the object. The two main tasks  performed by the sensing section - Detection of objects and Color recognition.    This system is fully controlled by the control unit and capable of picking objects and places them in  the respective area. This cost-effective device was designed by the error from humans. This sorting  device is very much useful in production areas and different types of household activities. Thus the  robot with pick and place automation with color detection and distinction property is achieved suc-  cessfully. The system could be used in industries for picking and placing objects efficiently and also  for surveillance. With the interfacing of all the components on a single board, the system could be  made compact reducing the size and making it more compact.    49 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
IMPACT OF E-WASTE ON OUR                                      “hazardous household waste”.  ENVIRONMENT                                                                As the technology improved, low initial cost, and                                             Deepak TP, S2 ICE  even planned obsolescence have to lead to a                                                                fast-growing surplus of electronic waste around  The technical scenario of the world is changing               the globe. Technical solutions are available, but  rapidly. The consumption of electronic items has              in most cases, a legal framework, a collection  been immensely increased and is still increasing              system, logistics, and other services need to be  at a very high rate in every field of life. E-Waste is        implemented before a technical solution can be  the term used to describe old, end-of-life, or dis-           applied.  carded appliances using electricity. It includes  computers, consumer electronics, fridges, etc.                Surplus electronics have extremely high-cost  which have been disposed of by their original                 differentials. A single repairable laptop can be  users this includes computers, LCD/CRT screens,               worth hundreds of dollars, while an imploded  cooling appliances, mobile phones, etc.                       Cathode Ray Tube (CRT) is extremely difficult and                                                                expensive to recycle. This has created a difficult  e-Waste is a loose category of surplus, broken,               free-market economy. Large quantities of used  or discarded electrical or electronic devices. The            electronics are typically sold to countries with  processing of electronic waste in developing                  very high repair capability and high raw material  countries causes serious health and pollution                 demand, which can result in high accumulations  problems due to lack of containment, as do un-                of residue in poor areas without strong envi-  protected landfilling                                         ronmental laws. Electronic waste is of concern                                                                largely due to the toxicity and carcinogenicity of  This definition of e-wastes includes used elec-               some of its substances, if processed improperly  tronics that are destined for reuse, resale, sal-             Toxic substances in electronic waste may include  vage, recycling, or disposal. Because loads of                lead, mercury etc.,  surplus electronics are frequently increased  (good, recyclable, and non-recyclable), several               Carcinogenic substances in electronic waste  public policy advocates apply the term “e-waste”              may include Polychlorinated Biphenyls (PCBs).  broadly to all surplus electronics. The United                Capacitors, transformers, and wires insulated  States Environmental Protection Agency (EPA)                  with or components coated with Polyvinyl Chlo-  refers to obsolete computers under the term                   ride (PVC), manufactured before 1977, often    50 Inspecta  Department of Instrumentation and Control Engineering, NSSCE
                                
                                
                                Search