Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore ICONS Magazine 2019-20

ICONS Magazine 2019-20

Published by icons.nssce, 2022-06-03 05:59:01

Description: M1

Search

Read the Text Version

1 Inspecta Department of Instrumentation and Control Engineering, NSSCE

ABOUT ABOUT NSS COLLEGE OF ENGINEERING NSS College of Engineering, Palakkad (Commonly known as NSSCE) is the fourth engineering edu- cational institution established in Kerala, India. It was founded in 1960 by Nair Service Society. NSS College of Engineering is one of the premier institutions in the state. The college is one among the only three Govt-Aided Engineering colleges in Kerala and the first Govt-Aided Engineering College accredited by NBA of AICTE. The college is affiliated to the APJ Abdul Kalam Technological University. The campus is situated in NSS Nagar at Akathethara, 9 km from Palakkad town, and 3 km from the Palakkad Railway Junction. The nearest airports are at Coimbatore (55 km) and Cochin Internation- al Airport(110 km). Spread over 100 acres, it includes an administrative block and other blocks, a library block and five hostels including two for women and with good infrastructure ABOUT DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING, NSS COLLEGE OF ENGINEERING The Department Of Instrumentation and Control Engineering the only one of the University of Calicut was established in 1980. The Department offers a full time B Tech Degree course in In- strmentation & Control Engineering. The total annual student intake is 60. Department has been backed up by efficient, dedicated and specialized faculty and they work with dedication to keep in pace with the ever changing control and Instrumentation scenario. The department has an excel- lent placment record, with its alumni working all around the globe in reputed companies in coveted positions. The alumni and the experts from industry visit the department periodically and give lec- tures, demonstrations and career guidance to the students. The students are also given exposure to the industrial environment through industrial visits and industrial training. It’s indeed a matter of pride for the Department that numerous eligible final year students are placed in prestigious MNCs every year. 2 Inspecta Department of Instrumentation and Control Engineering, NSSCE

DEPARTMENT OF INSTRUMENTATION AND CONTROL ENGINEERING, NSS COLLEGE OF ENGINEERING PALAKKAD MISSION OF THE DEPARTMENT “To be a centre of excellence of international acclaim in the realm of Instrumentation and Control Engineering producing self motivated, knowledgeable and technically competent engineers to nurture the needs of the society” VISION OF THE DEPARTMENT 1. To impart engineering education at par with global standards to create self moti- vated Instrumentation and Control Engineering graduates. 2. To inculcate a passion for learning and an ability to utilize the knowledge for solv- ing real world problems and industrial challenges. 3. To be a premier centre for Instrumentation and Control Engineering studies and research 4. To groom the graduates who uphold engineering ethics with a high degree of social commitment. 3 Inspecta Department of Instrumentation and Control Engineering, NSSCE

MESSAGE FROM PRINCIPAL’S DESK “ DR.SUDHAT Principal, NSS College of Engineering It gives me a great deal of honour and pride to announce that the department of Instrumentation and Control Engineering has published their 4th edition technical magazine “INSPECTA”. This magazine will be a platform for sharing technical knowledge as well as new ideas and I am sure that it will bring out the hidden talents of all the students of the department. As the principal, I feel immense pride to be a part of this great venture. 4 Inspecta Department of Instrumentation and Control Engineering, NSSCE

MESSAGE FROM HOD’S DESK “ DR. VENUGOPAL G HOD, Dept. of ICE, NSSCE I am pleased to know that our students are successful in bringing their 2ndissue of magazine INSPECTA for the academic year 2019-20. INSPECTA , the departmental magazine, has the prime objective of providing aspiring engineers a wide platform to showcase their technical knowledge and to pen down innovative ideas. This magazine is intended to bring out the hidden technical and literal skills among the students and teachers. I congratulate and thank all the students and faculty coor- dinators who have made untiring efforts to bring out this magazine. I wish them all the very best for releasing more such magazines in future. 5 Inspecta Department of Instrumentation and Control Engineering, NSSCE

MESSAGE FROM ADVISOR’S DESK “ LEKSHMIPRIYA J Asst. Prof. Dept. of ICE, NSSCE It is indeed a great pleasure to introduce another edition of our Department Magazine, INSPECTA. Congratulations to all members who are part of this endeavour. Publication of this magazine is a classic example of excellent teamwork and coor- dination among the members .This magazine will enhance technical knowledge as well as creative thinking of students. Efforts put in by them to publish this magazine during this pandemic time is highly commendable and contributions by each member is noteworthy. 6 Inspecta Department of Instrumentation and Control Engineering, NSSCE

7 Inspecta Department of Instrumentation and Control Engineering, NSSCE

EDITORIAL “Strive for perfection in everything you do. Take the best that exists and make it better. When it does not exist, design it.” - Sir Henry Royce. These may be the best lines of words to be narrated to an Instrumentation Engineer. An In- strumentation Engineer holds the obligation for improving system productivity, reliability, safety, optimization and stability of a single unit to a whole plant. Being a multidisciplinary branch, the scope is purely domain-dependent. This magazine is a cumulative discipline of all the engineering enthusiasts with the enriched knowledge showered upon us from all the educators. Science can make us astonished with facts, but it is engineering that changes the world and it has always been a vast sea of possibilities anywhere in the present moment. VR dangles just in front of us a vision of the world’s future, changes in expressing and experiencing communication. The vision is further enlarged, with advanced aerial technology. The Inter- net of Things is removing tedious repetitive tasks or creating things that just weren’t pos- sible before, enabling more people to do more rewarding tasks and leaving the machinery to complete the repetitive jobs. When it costs the same efforts to manufacture advanced robotic parts equivalent to manufacturing a paperweight, that profoundly alters every- thing. Being a mathematical framework that is free of politics and human error, Blockchain technology makes up revolutionary reforms in the economic realm. In the transformation to a complete digital, information has already become the fuel. It trickles through the bars and barriers protected by barbed wire work, it floats across the borders. Cyber Security is indeed much more than a matter of immediate consideration. Believe in yourself, and if you have a positive perspective and continually strive to put out your best effort, ultimately we will be calibrated to solve our immediate obstacles, including the pandemic and will be moulded for higher challenges! Solomon Staby Swathy Chandra R 2017 - 21 Batch 2018 - 22 Batch 8 Inspecta Department of Instrumentation and Control Engineering, NSSCE

INDEX Sl No Topic Author Page 1 FUTURISTIC VISION EXPLORING HOLOGRAPHY DEVANAND N S 10 11 2 VIRTUAL REALITY IN EDUCATION SARATH KUMAR G 14 18 3 THE RISING TREND OF VISION BASED INSTRUMENT VINAY PRASAD, SREELEKSHMI AV, 20 SHILSA SHIVADASAN, AKSHAY ANIL 22 4 THE IMPORTANCE OF ICS SECURITY VINAY PRASAD 23 5 AMIDST THE PANDEMIC OUR EARTH HEALED!! SANIKA S 24 27 WHAT HAS LED TO A SPATE OF HOSPITAL FIRES 28 6 DURING THE PANDEMIC? DOESN'T THIS SITUATION ISWARYA DEVI R 29 31 DEMAND EFFIECIENT FIRE SAFETY TECHNOLOGIES? 33 34 7 HOW NASA INVENTED A VENTILATOR JUST IN 37 ARATHY KA 35 DAYS FOR COVID 19? 38 43 8 DRONES MALAVIKA S 45 46 9 COMBAT DRONES TO FIGHT COVID 19 JESWIN GEORGE 48 50 10 MGN BLOCKCHAIN GREESHMA KV 52 53 11 LIDAR TECHNOLOGY ARPITHA CS 55 56 12 IS THE INTERNET BRINGS PEOPLE CLOSER OR SANDRA S NATH SEPARATING THEM?? 13 IS THERE A NEED TO RESTORE NET NEUTRALITY?? PRAVEENA AR 14 INTERNET OF THINGS KAVYA K 15 WIFI VERSUS BLUETOOTH IN THE LIMELIGHT OF IOT SWATHI KRISHNANUNNI 16 LIFI IS A LIFE-CHANGER IN 5G ABHISHEK CK ABHISHEK V 17 CAUSES OF CYBERCRIME AND PREVENTIVE SABNA MEASURES 18 AUGMENTED REALITY 19 FLEXIBLE ELECTRONIC SKIN ANISH MURALI 20 PICK AND PLACE COLOR SENSING ROBOTIC ARM ANAGHA BALAKRISHNAN 21 IMPACT OF E-WASTE ON OUR ENVIRONMENT DEEPAK TP 22 DNA - THE DIGITAL DATA STORAGE SNEHA RAJ MP 24 THE NEURAL NETWORKS IN CONTROL SYSTEM DEEPIKA R 25 INTERNET OF THINGS SONU 26 MOLECULAR COMMUNICATION SUDEEP M 9 Inspecta Department of Instrumentation and Control Engineering, NSSCE Author Page Sl No Topic

FUTURISTIC VISION Google maps in the near future. EXPLORING HOLOGRAPHY The way in which they use light to create an im- DEVANAND N S , S4 ICE age is stunning and could also be used to store a huge amount of data. The potential is not yet All of you must have heard of JARVIS who is the fully realized as the studies are progressing for AI enabled assistant of Tony Stark in marvel the complete usability of holographic storage. movies. But researchers are suggesting the chances of holographic data storage for over many years. The most noticed technology in the series is the A very real benefit to holograms and one that has design of some interesting virtual images. Can huge potential is in the medical field. Training anyone understand those images? These virtual can be very dangerous when you potentially give images are called holograms. These are partial- a junior doctor responsibility that could lead to ly real and partially virtual designs. The concept death. Training with holograms avoids this and uses artificial intelligence to process. AI technol- let’s trainees visualize the human body without ogies like speech recognition, natural language ever having to go near one in the coming future. processing etc are used to develop the concept. A Scottish based company has already produced 3-D visualizations of various organs that doctors Holograms were once the stuff of science fiction can study and many images within the same ho- but are very much the present with technology in logram which allow the detailed exploration of general improving at a crazy rate. We have prob- the systems within the body. All this can be done ably seen many kinds of hologram, but could with no special glasses or displays which is a key you actually define one without referring to an highlight of the technology. example. A hologram is made from photogenic techniques that record the light scattered from What is likely to happen is this technology is just an object and then presented in a way which ap- going to become more widespread. Augmented pears three-dimensional. reality is booming at the moment and this uses lenses to project 3-D visuals of holograms onto So who invented this revolutionary pioneering real-life objects. The hologram in Microsoft’s technology? Amazingly a man in the 1950s, Den- holo lens is a reference to holograms. There’s nis Cabor was a Hungarian worker in the U.K also Apple’s A.R kits and Google’s A.R core that and the father of holography. He had been re- are able to run holographic programs on smart searching optical physics in the 1940s when he phones expect to see these becoming more part started his work looking at holograms. What’s of daily life for a variety of reasons. We will be striking in mind about this timeline is that the seeing a new AI world with holography. More- natural step observed lasers first and then ho- over, let’s see whether each of us gets assisted lograms second as holograms are activated by by a new JARVIS in the coming future. lasers. “ So many assume the truth is either black or white... There are a lot of benefits for the military as ho- It’s all evolution or it’s totally creation, for example. lograms can be used to map out 3-D terrains. Reality creates consciousness; consciousness cre- Geographic intelligence is an important a part ates reality. Actually truth is inclusive, neither black of military strategy and fully dimensional holo- nor white, nor a shade of grey. Indeed, truth is a graphic images are getting used to enhance and multicolored spectrum, a beautiful hologram! “ map battle grounds. An American company has designed over 13,000 holographic maps of war spaces for the U.S army. So what this does is gives the army a massive advantage over their adversaries. So don’t be abrupt if we see 3-D 10 Inspecta Department of Instrumentation and Control Engineering, NSSCE

VIRTUAL REALITY IN EDUCATION SARATH KUMAR G , S4 ICE Abstract: The market for virtual reality applications has gone up at a rapid pace around the last few years. One of the main applications being the field of education itself. An increasing number of schools have virtually adopted the technology. The article gives a brief insight on how VR is being used in education nowadays, its advantages as well as its shortcomings in the field. Use of VR in education: Much research has been conducted on the use of virtual reality in education and training. Such re- search allows us to understand what VR is and explore its complete potential. Its use in education can be considered as one of the natural evolutions of computer-based training (CBT). Most people have heard of it but still, a majority of them do not know how it can be adopted in education. When students read about something, they often want to experience it. With VR, they aren’t limited to word descriptions or book illustrations; they can explore the topic and see how things are put together. A type of VR known as 360VR is most commonly used in education. With this type of VR, real-world locations are captured with specialist cameras and equipment. The footage is then taken back to the studio where it is produced into VR content. This VR content can be viewed using special headsets or can be projected into the walls of the room. Thus this method allows pupils to visualize the world around them. Students can experience locations that would not be possible or too expen- sive to visit in person. In this way, VR can open a whole new world of possibilities to teachers and schools. Moreover, the sessions become more attractive and engaging while there is no chance of boredom. Virtual reality can improve education by providing students with memorable and immersive expe- riences that would otherwise not be possible. Moreover, it can all take place within the classroom without investing much effort. Through the use of VR, every student can be easily monitored by teachers. VR headsets are a common and practical way of implementing the method in classrooms. With average cost and high availability of equipment, an increasing number of schools are turning to VR headsets. These are usually standalone headsets, which means that they do not require any external connection to the computer or any other device. Also, teachers are taught how to use the headsets before implementing them in the classes. Even though in theory VR technology is an amazing tool for learning and teaching, the reality is that it’s been slow to take off in educational settings especially in developing countries, in large part because it’s still so costly to implement. Others see the value of VR as entertainment, but not as effective teaching tools in the classroom. But some of the schools and institutions around the world have already accomplished the use of VR in facilitating effective learning for students. Some of such usage includes virtual field trips. Virtual field trips have become one of the most popular applications of VR technology for learning, and many schools have begun using Google Expeditions to virtually transport students to faraway and even inaccessible parts of the world. The Google Expedition app is free to download on IOS or Android and can be used with very low-cost headsets that can be attached to a smartphone. With these simple headsets, students can actively explore almost anything. The same can be applied in the field of architecture using specific hardware called The Oculus Rift hardware which makes it pos- sible for architects to take computer-generated 3D models and place viewers into those 3D-models to bring their plans to life. Architecture students in Ireland have even been using VR to construct 3D models of historical Irish sites and then visit them virtually. In a similar way geometry students use VR to check out 3D geometric forms from multiple perspectives; they can rotate a shape to 11 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Abstract: content can be viewed using special headsets The market for virtual reality applications has or can be projected into the walls of the room. gone up at a rapid pace around the last few Thus this method allows pupils to visualize the years. One of the main applications being the world around them. Students can experience lo- field of education itself. An increasing number of cations that would not be possible or too expen- schools have virtually adopted the technology. sive to visit in person. In this way, VR can open a The article gives a brief insight on how VR is be- whole new world of possibilities to teachers and ing used in education nowadays, its advantages schools. Moreover, the sessions become more as well as its shortcomings in the field. attractive and engaging while there is no chance of boredom. Use of VR in education: Much research has been conducted on the use Virtual reality can improve education by provid- of virtual reality in education and training. Such ing students with memorable and immersive ex- research allows us to understand what VR is and periences that would otherwise not be possible. explore its complete potential. Its use in edu- Moreover, it can all take place within the class- cation can be considered as one of the natural room without investing much effort. Through evolutions of computer-based training (CBT). the use of VR, every student can be easily mon- Most people have heard of it but still, a majority itored by teachers. VR headsets are a common of them do not know how it can be adopted in and practical way of implementing the method education. in classrooms. With average cost and high avail- ability of equipment, an increasing number of When students read about something, they of- schools are turning to VR headsets. These are ten want to experience it. With VR, they aren’t usually standalone headsets, which means that limited to word descriptions or book illustra- they do not require any external connection to tions; they can explore the topic and see how the computer or any other device. Also, teach- things are put together. A type of VR known ers are taught how to use the headsets before as 360VR is most commonly used in education. implementing them in the classes. Even though With this type of VR, real-world locations are in theory VR technology is an amazing tool for captured with specialist cameras and equip- learning and teaching, the reality is that it’s been ment. The footage is then taken back to the stu- slow to take off in educational settings especial- dio where it is produced into VR content. This VR ly in developing countries, in large part because 12 Inspecta Department of Instrumentation and Control Engineering, NSSCE

it’s still so costly to implement. Others see the in Victoria, Australia has been using the Ocu- value of VR as entertainment, but not as effec- lus Rift headset with students in the classroom tive teaching tools in the classroom. But some which allows them to spark the imagination in- of the schools and institutions around the world side them which otherwise won’t be utilized. It have already accomplished the use of VR in fa- provides them with visual insight. Thus Students cilitating effective learning for students. Some can learn about the world around them in a safe of such usage includes virtual field trips. Virtual and controlled environment. field trips have become one of the most popular applications of VR technology for learning, and For students having some form of autism, struc- many schools have begun using Google Expedi- tured lessons with meditative virtual reality apps tions to virtually transport students to faraway like those that explore planets and stars have and even inaccessible parts of the world. The provided a calming and pleasant effect on such Google Expedition app is free to download on students. Virtual reality technology also has IOS or Android and can be used with very low- huge potential in the distance learning indus- cost headsets that can be attached to a smart- try. One of the best utilization of VR technology phone. With these simple headsets, students can would be in online classes during a pandemic actively explore almost anything. The same can that we are facing now. Students can easily inter- be applied in the field of architecture using spe- act with classmates and teachers while having cific hardware called The Oculus Rift hardware the experience of being inside a classroom. This which makes it possible for architects to take improves their learning outcomes to a greater computer-generated 3D models and place view- extend. Lessons learned from such a method ers into those 3D-models to bring their plans to won’t be easy to forget. life. Architecture students in Ireland have even been using VR to construct 3D models of histor- Advantages of using virtual reality: ical Irish sites and then visit them virtually. In a similar way geometry students use VR to check Virtual field trips are immersive and engaging. out 3D geometric forms from multiple perspec- It offers a welcome change from the tradition- tives; they can rotate a shape to see it from dif- al method of reading and writing. They can be ferent angles and even view it from the inside. used as a way of breaking a topic up or intro- The Jackson School for special needs students ducing a new one, and they help to retain the students’ attention. Moreover, many teachers 13 Inspecta Department of Instrumentation and Control Engineering, NSSCE

THE RISING TREND OF VISION BASED INSTRUMENT Vinay Prasad . Sreelekshmi AV . Shilsa Sivadasan . Akshay Anil S4 ICE Due to continuing and rapid advances of both hardware and software technologies in camera and computing systems, we continue to have access to cheaper, faster, higher quality, and smaller cam- eras and computing units. As a result, vision-based methods consisting of image processing and computational intelligence can be implemented more easily and affordably than ever using a cam- era and its associated operations units. Instrumentation and Measurement (IM) as a field is primarily interested in measuring, detecting, monitoring, and recording a phenomenon referred to as the measurand and its associated calibra- tion, uncertainty, tools, and applications. While many of these measurements are invisible to the human eye, for example, the amount of electrical current in a wire, many others can be seen visu- ally, such as the number of people in a room. As such, it is intuitive to develop tools and methods that would see the measure and similar to the human eye and measure it. Current Trends and Applications In the context of Instrumentation and Measurement, VBM is being proposed and used today in a wide variety of automated applications and scenarios: detecting fire from video feeds of closed-circuit cameras, it is necessary to establish a system that can detect early fires, which greatly reduces labor costs, and the rapid spread of urban monitoring systems provides the groundwork for camera-based fire detection. Camera-based vehicle instrumentation used to analyze the in- tentions and state of a driver (sleepy, yawning, not looking at the road ahead, etc.) and to detect potential driver errors before they happen to significantly reduce car accidents and even counting the number of calories and the amount of nutrition in a meal simply by analyzing the image of the food. An interesting observation about these applications is that, although they seem to be in very 14 Inspecta Department of Instrumentation and Control Engineering, NSSCE

different and unrelated fields, they all use the same I&M principle: analyzing a picture taken by a camera or visual sensor to measure or detect a phenomenon. Another really interesting possibil- ity with VBM is when the camera captures the scene beyond what is visible to the human eye, for example, with an infrared camera, VBM can be used to measure the temperature of objects, such as temperature measurement of steel production components that are otherwise very difficult to measure with other techniques. While most of the applications described above are relatively re- cent, VBM has been used for many years in factories and production facilities for inspection of equipment or products and detection of their properties. This includes acoustic emission testing, electromagnetic radar, ground-penetrating radar, laser testing methods, etc. it is also a safe testing method for operators, with most techniques being harmless to humans. This reduces production and operation costs by not only decreasing the manual labor that would otherwise be needed for inspection but also reducing the number of defects that could be missed due to human errors. VBM BASICS At the higher level, there will be two components mainly: a visual sensor to capture the images and an operation unit to process the image and help to see our subject of interest. Together we can call it a vision. Both computer vision and Machine vision are used in VBM. Computer vision is mostly used in personal or daily life applications and relies on computational methods running on com- puters or generic processor-based systems. Machine vision is mostly used in industrial inspection or robotics applications and is typically implemented in dedicated hardware sometimes without computers and processor-based systems. Visual sensor A visual sensor can be a visible-light camera, an infrared camera, laser camera, or any other sensor that can obtain an image of the physical scene containing the sensor. The most commonly used vi- sual sensor is the visible-light camera which captures the image in a way similar to what the human eye sees. To get the accurate measurement, calibration of the camera and knowledge of its position orientation, focal length, aspect ratio, etc are needed. 15 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Operation unit The operation unit receives the image acquired by the visual sensor and performs the necessary operations to obtain the desired measurements. This unit can be implemented in either software or hardware. The unit consists of the following four major stages. 1. Preprocessing : This stage prepares the raw image for the next stage of operation. The image acquired by the visual sensor could have glares, noise, blurs, etc. also it may not be in the form required by ensuing operations. So pre-processing takes care of this and performs operations such as normalization, thresholding, denoising, resizing, cropping, etc. 2. Image analysis : This stage analyses the image and extracts the necessary information for find- ing the measurement and doing measurements later. This stage also uses the image processing operations such as segmentation, edge detection, etc. this stage is typically performed using computational intelligence operations. 3. Measurand identification : This stage is to identify the specific measure in the image if it’s not already been identified in the previous stage of image analysis. Techniques that are used here are mostly based on computational intelligence, especially machine learning, and specifically pattern recognition, pattern matching. In this stage, we can find, match, and identify specific patterns, shapes, and classes of objects to find our measure. Optical character recognition and neural networks are also done in this stage. In some applications where the physical phenome- non only needs to be detected as opposed to gauged, such as gesture detection, our task is fin- ished in this stage with the detection and identification of the measurand. In other applications, the measurement has to go through further measurement operations. 4. Measurement : This stage, as we have the measurand, will perform the required measurement operation such as gauging which gives the dimensions of the measurand and its circumference, volume, area, etc. calibration is the other requirement in this stage. UNCERTAINTY The ability to determine the position and orientation of an object with respect to some reference co- ordinate system is perhaps one of the core competencies of many engineering applications. Recent deep learning techniques promise high hopes for self-driving cars while there are still many issues to be addressed such as uncertainties.Specifically, as far as the VBM visual sensors are concerned, we can list the following main sources of uncertainties: 1. Lighting : the lighting of the scene directly affects the values of the pixels of the resulting im- age, which affect the Image Processing parts. Since the output of the image processing parts is input to the remaining parts, we can see that lighting conditions affect the entire measurement system. Hence, applications in which the lighting conditions may vary are affected by this pa- rameter. Lighting conditions can be seen either as systematic effects and random effects. 2. Camera angle : the angle with which the image is taken is also important in applications where the camera has a free angle and is not fixed, since the angle directly affects the shape and po- sition of the sensor in the image. In this case, a systematic effect shall be considered and com- pensated for and the random effects shall be also considered. 3. Camera equipment : different cameras have different lenses, hardware, and software compo- nents, all affecting the resulting image taken with that camera. Hence, an application that is not using a specific and predefined camera can be affected by this parameter. When identifying and evaluating all individual contributions to uncertainty, it is also essential to compare different possible architectures and understand which one provides the best performance, 16 Inspecta Department of Instrumentation and Control Engineering, NSSCE

from the metrological perspective, under the different possible measurement conditions. This can be efficiently done only if well-established standards and techniques are used. VISION-BASED MEASUREMENT AND TODAY’S WORLD We know we are in the middle of a pandemic.VBM contributes in so many ways related to the same. Machine vision systems can inspect, identify, gauge, or guide products like ventilators, respirators, and protective gear. Such products assist in treating patients and protecting health care the pro- fessionals and in then, further spreading of way Computer vision is an interdisciplinary field that deals with how computers can develop a high-lev- el understanding by interpreting information present in digital images. It has made substantial progress in the last few years, mainly due to the success of deep learning, a sub-field of machine learning. Computer vision techniques have shown enormous scope in various application areas, especially in healthcare and medical research. This success has enabled computer vision scientists to take the challenge as soldiers in the fight against COVID-19 by contributing to disease diagnosis, prognosis, prevention, control, treatment, and management. Vision guided robots : In hospitals, for eg: It is vitally important to keep sick people away from others, including the doctors and nurses. One way to do this involves using vision-guided robots. In more than 50 hospitals across provinces in China, a food delivery robot minimizes contact between patients and medical staff. This reduces production and operation costs by not only decreasing the manual labor that would otherwise be needed for inspection but also reducing the number of defects that could be missed due to human errors. Here are some distinct advantages, the most obvious of which is that the pieces being tested are left undamaged by the process, allowing for an item to be repaired rather than replaced should any problems be found. 17 Inspecta Department of Instrumentation and Control Engineering, NSSCE

The importance of including a whole new class of OT assets ICS security known as embedded equipment, and are typically much older than IT systems. VINAY PRASAD, S4 ICE • Risks are not only to information confidenti- ality but especially to the availability and in- Industrial control system (ICS) security is grow- tegrity of the process or safety to personnel ing in importance as cyber-attacks increasingly and property. focus on physical processes for either ransom • The remediation of risks requires different or to cause harm to critical production systems. techniques because of the differences in Attacks such as the Oldsmar water treatment types of devices. plant, the various ransomware attacks on the vaccine supply chain, and the more extensive ICSs specifically focus on industrial process- threats to the Ukrainian and US power grids and es or automation rather than other operating oil refineries in the Middle East generate greater systems such as building controls, medical de- worry for boards, governments, and operators vices, etc. ICSs provide the components that en- of industrial organizations. sure proper and continuous operation of a wide range of industrial systems – from power to water to manufacturing and beyond. They pro- vide control over the inputs and outputs of key elements in an operational or physical process. The processes are often adjustable in real-time to ensure proper and safe operation. They often include the safety systems themselves to ensure shutdown in case of processes getting out of certain boundaries of performance What is ICS security? Historically, these systems were separated from traditional IT networks and used a wide range ICS security is defined as the protection of ICSs of specialized components. More and more, from threats from cyber attackers. It is often re- these OT systems integrate with IT to increase ferred to as operational technology (OT) securi- operational efficiency and reduce the total cost ty. It includes a wide range of practices includ- of ownership. As a result, cybersecurity threats ing: increase as formerly “air-gapped” systems be- come more integrated into the internet-con- • Asset inventory and detection nected components of the enterprise IT envi- • Vulnerability management ronment. • Network intrusion protection and detection • Endpoint detection and response Why do we need ICS security? • Patch management • User and access management ICS security is critical because these systems are under attack and the consequences of compro- ICS security differs from traditional information mise are significant financially, operationally, technology (IT) security in several ways: and safety-wise. Why do we need a separate cat- egory of security to address these types of sys- • The types of devices protected are often sen- tems? Why not replicate what’s being done in IT sitive to unintended changes or interaction, security? First, the devices themselves create challenges for traditional IT security processes and technol- ogy. A sample of devices includes old versions 18 Inspecta Department of Instrumentation and Control Engineering, NSSCE

of Microsoft Windows such as Windows XP or tive marketplace, whether they’re between com- Windows 7, a wide range of embedded devices panies or economic superpowers. But in 2014, such as programmable logic controllers (PLCs), the U.S. Department of Justice (DOJ) charged five controllers, relays, sensors, etc., industrial (and Chinese military hackers with taking their trade traditional IT) networking equipment, and more. war a little too far by spying on several major These devices require a different approach to corporations, including U.S. Steel, to gain a com- security from the modern, updated, OS-based, mercial advantage. or cloud-based devices in today’s IT stack. According to a release by the DOJ, a grand jury Second, the potential impacts are different. In in the Western District of Pennsylvania indicted most IT cybersecurity efforts, the priorities are the hackers on 31 counts of conspiring to com- confidentiality-integrity-availability, in that or- mit computer fraud and abuse; accessing a pro- der. In the ICS world, the greatest risks are to tected computer without authorization to obtain the safety of people and property, followed by information for the purpose of commercial ad- availability and integrity. Information confiden- vantage and private financial gain; transmitting tiality, while perhaps of some importance, pales a program, information, code or command with relative to these others. As a result, the focus of the intent to cause damage to protected com- risk management must also adjust. puters; aggravated identity theft; economic espi- onage; and trade secret theft. The hacking took Third, incident detection and response require place from 2006-14 and hit a number of major specific knowledge of the systems affected. In U.S. corporations, including Westinghouse, So- many senses, IT systems are commodities with larWorld, U.S. Steel, Alcoa and the Service Work- specific functions but are commonly grouped ers International Union. and analyzed with a wide range of available detection rules. Similarly, when responding to “This is a case alleging economic espionage by a threat, there are a variety of safe and effec- members of the Chinese military and represents tive actions to take uniformly and automatical- the first ever charges against a state actor for this ly. However, industrial control systems behavior type of hacking,” said then-U.S. Attorney General is unique – often to that particular process. In Eric Holder in the DOJ release. addition, the response must be measured and handled in a way that does not cause more harm “The range of trade secrets and other sensitive busi- than good by stopping the expected operational ness information stolen in this case is significant process inappropriately. and demands an aggressive response. Success in the global marketplace should be based solely on Finally, to secure ICS safely and with operational a company’s ability to innovate and compete, not resilience, specific knowledge of control systems on a sponsor government’s ability to spy and steal and security is required, which is a unique combi- business secrets.” nation in even shorter supply than the stretched IT security resources. Industrial control systems Cyberattacks like this have continued since, as were designed years or decades ago and there trade wars have escalated between the U.S. and is a shortage of skilled personnel that under- China during the last several years. It’s not lim- stands them. To secure ICS, the industry needs ited to China, either. In April, the Biden admin- to join IT security capabilities to these people istration formally blamed the recent SolarWinds with knowledge of the systems. attack on Russia’s intelligence service and im- posed economic sanctions on the foreign power. Chinese military hackers hit multiple companies, While ransomware attacks may be getting most including U.S. Steel. This is considered as Major of the recent headlines, stealing trade secrets is cyber attacks on industries always on the menu. Trade disputes are not uncommon in a competi- 19 Inspecta Department of Instrumentation and Control Engineering, NSSCE

AMIDST THE PANDEMIC OUR EARTH HEALED !! SANIKA S, S4 ICE “Although this Covid 19 pandemic has brought us sorrows and miseries, the one who benefited the most is our planet Earth.” With the outbreak of the corona virus all over 2020, 22 cities of India show effective reduction the world the lives of individuals were adversely of PM10 (Particulate material), PM2.5, CO, NO2, affected. Also with the rapid increase of infec- by 43, 31, 10 and 18%. tious people, countries were forced to go with the lockdowns where people are compelled to remain inside their houses. As all the categories of social, economic, industrial and urbanization activity suddenly shut off, nature took the bene- fits and showed improvement within the quality of air, cleaner rivers, less pollution, undisturbed and calm wildlife. This has meant a little window for the environment to breathe. Global Environment during COVID 19 lockdown Before COVID-19, the world was suffering by The impact of Covid 19 lockdown on Wildlife a high level of urban air pollution especially in the form of CO2, SO2, NO2 and particulate mat- With humans self-isolating and quarantining ter. The sources which cause air pollution such themselves into their homes due to the Covid as transport, industries, power stations are re- 19 related lockdown, wild animals and rare spe- sponsible for the increased output of all these cies have taken over the deserted places. Such pollutants. The respiratory diseases caused by instances were reported all over the world. As air pollution include hypertension, heart attack, people were forced to stay home, wild animals cognitive and mental illness. The positive effect took back what was once theirs. of lockdown is to decrease the CO2 emission by −17% (−11 to −25%) by 7th April 2020 with respect A herd of spotted deer wandered the streets of to the mean level of emission in 2019. This study Haridwar without fearing of being killed by mov- also shows that from March 16th to April 14th, ing vehicles in the road. 20 Inspecta Department of Instrumentation and Control Engineering, NSSCE

According to news reports, there was a huge increase in the number of flamingoes congregating in Mumbai. The wild animals seemed to take out their pride in allowing city residents to glorify their appearances. With decreased pollution levels within the cities and increased instances of untamed animals in urban landscapes, the lockdown seemed to be a respite for Mother Earth to tend to her- self. Surrounded by deer, a tourist shows her empty A pack of jackals eats pet food that was left for hands after feeding them crackers, treats made them by an Israeli woman, at Hayarkon Park in Tel mostly with wheat flour and rice bran, near Todaiji Aviv, Israel. temple in Nara, Japan. (Image: AP) Noise pollution during Covid 19 lockdown Noise is an unwanted sound which causes a hindrance in communication. Long term exposure of high background level may cause irritation, stress, mental disorders, hypertension, loss of concen- tration, sleeplessness, etc. The level of noise pollution has decreased radically in different parts of the world including India. It has been approximated that the Noise level was shrinked up to 35% to 68% from 8 am to 4.00 pm. The noise pollution at Govindpuri metro station was earlier recorded at the noise level at the rate of 100 db, seemed to reduce up to 50% and constituted 50 db noise level after the lockdown. The background level was found to have reduced at the rate 30 to 40% during the lockdown period and in most of the places of over stone quarrying and crushing areas, entire study units fall under the noise level < 65dBA .COVID 19 also affected noise pollution and coral reef. The COVID 19 lockdown has also affected the marine ecosystem, all transport processes in the ma- rine ecosystem were stopped and the pollution level caused by human activities were also reduced to a great extent. 21 Inspecta Department of Instrumentation and Control Engineering, NSSCE

What has led to a spate of In light of such tragic events, improved advanced hospital fires during the technologies need to be implemented when it comes to fire safety in hospitals. pandemic? Doesn’t this • Heat Detectors : A lot of machines in the situation demand efficient hospitals generate a lot of heat when they fire Safety Technologies? are in use. Sometimes they become exceed- ingly hot which could cause a short circuit. ISWARYA DEVI R, S2 ICE A heat detector will raise an alarm before the temperature rises to a dangerous level. Fires occur in many public buildings in India ev- This prevents fires from starting as a result ery year, killing a large number of people and of overheating machinery. injuring many. Over the past year, there have • Door Release System : It is best to have sys- been deadly fires in hospital buildings, including tems in place that will automatically open in those treating COVID-19 patients. Recent infer- cases of emergencies. nos in hospitals at Bharuch in Gujarat, Virar, a • Fire Alarm Systems : It warns people when suburb of Mumbai and Mumbra, near Thane, smoke, fire, etc., are detected. These alarms killed at least 37 people. Electrical faults are cit- are activated from smoke detectors and heat ed as the leading cause of fires but State gov- detectors. ernments are widely criticized for being lax with • Water-hydrant system : There is a separate building safety laws and for failing to equip pub- water tank to be exclusively used for fire hy- lic buildings with modern technology. Intensive drants. Each building has a fire hydrant con- care units are at great fire risk because they are nected to the tank by steel water pipes. The oxygen-suffused and need to meet high stan- hydrants have hose pipes and various noz- dards. zles to be fitted into the hose on one side and the other to the hydrant. At the center of all standard-setting is the Na- • Voice Alarm : The voice alarm central is tional Building Code of India. Part 4 of the Code placed in the technical department, ensuring deals with Fire and Life Safety. The document safe evacuation in case of an emergency. provides specifications and guidelines for de- • Suppression-Clean Agent : A control panel sign and materials that reduce the threat of de- releases a clean agent into the room when structive fires. Under the Code, all existing and a designated number of detectors activate. new buildings are classified by the nature of use, The clean agent is waterless and does not such as residential, educational, institutional, as- harm electronic components. sembly (like cinemas and auditoria), business, mercantile, industrial, storage, and hazardous. Conclusion Hospitals come under the institutional catego- Fire alarm technology is exciting because it finds ry. Fire safety rules exist in every state, but the better ways to save lives. However, with every provisions of the Code are ignored in practice, new devastation, like the one mentioned here, and even mandatory certifications do not reflect you wonder how it could have been avoided. compliance. But engineers, over time, are coming up with sophisticated technologies that aim towards a The National Disaster Management Authority safer environment. (NDMA) has also stipulated requirements for fire safety in public buildings, including hospitals. Besides design guidelines on maintaining min- imum open safety space, protected exit mecha- nisms, dedicated staircases, and crucial drills to carry out evacuations. 22 Inspecta Department of Instrumentation and Control Engineering, NSSCE

.. in 37 Days house submitted to FDA for emergency use au- thorization and issued as no fee licensing call for How NASA invented a proposal to manufacture ventilator. This ventila- ventilator just in 37 days for tor will meet the demands for those who are in COVID-19? need and support in a variety of clinical states, which may include low compliance high resis- ARATHY K A, S4 ICE tance hypoxia etc. the intended patient is unable to maintain adequate or safe oxygen level with nasal or mask oxygen. Even the large and small inventions and inno- vation can give birth to a new era of inspired concepts,acts and changes. Lets get around the story of about how a single question made NA- SA’S jet propulsion lab into movement at the be- ginning of covid-19 pandemic propelling prodi- gious pivot from the robotics which explore the space to life saving ventilators and it will inspire you to wonder the question as following up: “ Is what i’m doing right now is the most important thing that i can be doing?” Director Michael Watkin at NASA at jet propul- sion laboratory who is passionate about creat- ing significant moments in people’s lives and is reminded about the gift and privilege of being alive. It’s something sort of a roller coaster to the Now there are 27 organisations all around the world that the team of space engineers in NASA world creating the ventilator. They believed they invented covid 19 ventilator in 37 days. It begins had the potential to save human life. These peo- with dave van buren and rob manning bumped ple might be someone they know,their neigh- into each other at some cafeteria and discussed bours,one of their families and that intensity how jpl can help in the current covid crisis in makes them feel astonishing even though there shortage of ventilators and can they even open is a lot of pressure in it as hell.Director said ”we a low cost ventilator. On the 1st day they had specialize in spacecraft, not in medical devices a conversation with doctor michael gurevitch manufacturing. But excellent engineers, rigor- about specific needs of covid-19 patients and ous testing and rapid prototype are some of our healthcare works. In the 37 th day around about specializations. When people at jpl realised and 70 engineer designed and developed 2 new pro- they rejoiced that “ They might have wanted it to totype with a sub criteria includes support the medical community, they felt it was their duty to share their ingenuity, expertise and • Do not cause harm drive”. • Use as few part as necessary • Use easily obtainable part It’s been invigorating for them to arise with a • Make it easy to use crucial design and now they have FDA approval • and ready to share the technology for the rest of On 38 day jpl sent a ventilator to mr. sinai hospi- the world. tal in new york city to test the design and on the 40 th day it was showcased to potus in white- 23 Inspecta Department of Instrumentation and Control Engineering, NSSCE

DRONES MALAVIKA S , S2 ICE Drones also called Unmanned Aerial Vehicles (UAVs), have no human pilot onboard, and instead are either controlled by a person on the ground or autonomously via a computer program. These stealth crafts are becoming increasingly popular, not just for war and military purposes, but also for everything from wildlife and atmospheric research to disaster relief and sports photography. Drones are becoming the eyes and ears of scientists by surveying the ground for archaeological sites, signs of illegal hunting and crop damage, and even zipping inside hurricanes to study the wild storms. You can even rent a personal drone to soar above the horizon and snap a photo or video. Our news and features will cover developments in drone technologies, innovative uses for drones, and how drone use will impact society. Different drones are capable of traveling varying heights and distances. Very close-range drones usually have the ability to travel up to three miles and are mostly used by hobbyists. Close-range UAVs have a range of around 30 miles. Short-range drones travel up to 90 miles and are used pri- marily for espionage and intelligence gathering. Mid-range UAVs have a 400-mile distance range and could be used for intelligence gathering, scientific studies, and meteorological research. The longest-range drones are called “endurance” UAVs and have the ability to go beyond the 400-mile range and up to 3,000 feet in the air. Because drones can be controlled remotely and can be flown at varying distances and heights, they make perfect candidates to take on some of the toughest jobs in the world. They can be found assisting in a search for survivors after a hurricane, giving law enforcement and the military an eye-in-the-sky during terrorist situations, and advancing scientific research in some of the most extreme climates on the planet. Drones have even made their way into our homes and serve as entertainment for hobbyists and a vital tool for photographers. 24 Inspecta Department of Instrumentation and Control Engineering, NSSCE

APPLICATIONS OF DRONES Military Probably the oldest, most well-known, and controversial use of drones is in the military. The British and U.S. militaries started using very basic forms of drones in the early 1940s to spy on the Axis powers. Today’s drones are much more advanced than the UAVs of yesteryear, equipped with ther- mal imaging, laser range finders, and even tools to perform airstrikes. The most prominent military drone in use today is the MQ-9 Reaper. The aircraft measures 36 feet long, can fly 50,000 feet in the air undetected, and is equipped with a combination of missiles and intelligence gathering tools. Delivery Delivery drones are usually autonomous UAVs that are used to transport food, packages or goods to your front doorstep. These flying vehicles are known as “last mile” delivery drones because they are used to make deliveries from stores or warehouses close by. Retailers and grocery chains all over the country are turning to drones as a more efficient delivery alternative, instead of relying on delivery drivers with inefficient trucks. These drones can carry an impressive 55 pounds of goods to your front door without you ever having to leave the house. Amazon, Walmart, Google, FedEx, UPS, and many other big brands are all currently testing out different versions of delivery drones. JD.com and Rakuten Join Forces to Enable Drone Delivery in Japan Emergency Rescue Sometimes it’s just not safe enough to send humans into a rescue situation due to the scope or severity of the disaster. That’s where drones come in. In the case of a capsized boat or drowning individual, officials can throw an Autonomous Underwater Vehicle (AUV) into the water to assist in the rescue. If there’s an avalanche, drones are deployed to look for those caught in the snow. Air- craft maker, Kaman, has even developed a pilotless helicopter, called the K-MAX, designed to carry more than 6,000 pounds of cargo. The K-MAX has already been used in China and Australia to assist in fighting fires. Outer Space NASA and the U.S. Air Force have been secretly testing out unmanned aircraft geared towards space travel. The X-37B UAV is the Air Force’s ultra-secretive drone that looks like a miniature space shuttle. It has been quietly circling the Earth for the last two years, setting a record for longest flight from an unmanned aircraft (more than 719 days). Although vague, the Air Force has said “the pri- mary objectives to the X-37B are twofold: reusable spacecraft technologies for America’s future in space and operating experiments which can be returned to, and examined, on Earth.” It seems that drones have been made a priority when it comes to the future of space exploration and innovation. 25 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Wildlife and Historical Conservation Drones are a cheaper and more efficient alternative to wildlife conservation. Tracking wildlife pop- ulations is nearly impossible with humans on the ground. Having an eye-in-the-sky allows wildlife conservationists to track roaming groups of animals, ranging from Orangutans in Borneo to Bison on the Great Plains, to get a better idea of the health of their species and ecosystems. Drones are being used all over the world to track animal species and prevent poaching. Conservation drones also make perfect tools in the fight against poaching efforts in Asia and Africa. Drones are also being used for reforestation efforts all over the world. These drones scour the forest floors of forests decimated by fires and drop seed vessels filled with seeds, fertilizers, and nutrients that will help a tree rise from the ashes. There have been around 300 million acres of de- forested land since the early 1990s. What would take humans around 300 years to reforest can be more efficiently completed via seed-planting drone technology. Finally, UAVs are becoming instrumental in historical conservation efforts. Drones are being used to map out 3D renderings of historical sites like Chernobyl, the ancient Greek sites of Ephesus, Turkey, and Jewish cemeteries all over Europe. The vantage point gives historical preservationists the ability to find clues about culture and architecture while using 3D imagery to recreate lost sites. • Drones Help Researchers Manage Koala Populations • Animals Appear to Become Acclimated to Drones • DroneSeed Replants Trees to Keep Forests Healthy • Small Isles of Scotland get a Close-Up Courtesy of Drones • Bee-lieve it or Not, Drones are Pollinating Orchards Pharmacy How do you get medical supplies to people in hard-to-reach areas? What tool could you use to deliv- er organs for transplant patients? Drones are the answer to both of those questions. Right now, un- manned aerial vehicles are being used to deliver emergency medical supplies and cargo to off-the- grid communities in rural Alaska. Instead of relying on dog sleds, snowmobiles, or ambulances that can’t handle snow, Alaskans are relying on drones to quickly receive life-saving medical supplies. Drones are also being tapped to deliver donated organs to transplant patients. Just recently, history was made when a kidney was transported by a specially-made drone from one hospital in Maryland to the next in just under five minutes. This could cut down on the alarmingly slow rate at which do- nations usually arrive (if they arrive at all). Usually, organs are delivered via chartered or commer- cial flights. Delays and lapses in judgement cause dangerous delays of two hours or more for 4% of all organ deliveries. Drones can cut the time down tremendously, while offering a safer and secure method of organ transportation. • Life-saving Drones to Delivery Organ Transplants • Vanuatu Becomes Site of World’s-First Drone Delivered Vaccine Photography Drones have been a boon for photographers, who use UAVs to take expansive aerial photos. Ever wonder what it’s like to get a bird’s eye view of your favorite city, beach or building? There are drones made specifically for photography that provide a new way to photograph some of your fa- vorite destinations from above. 26 Inspecta Department of Instrumentation and Control Engineering, NSSCE

COMBAT DRONES TO FIGHT contactless delivery options to minimize the risk COVID-19 of exposing customers and delivery drivers to infection. Drones are an ideal solution for con- JESWIN GEORGE, S2 ICE tactless food delivery. In the face of the global COVID-19 pandemic, 4. Surveillance Drones there have been reported attempts to utilize As more and more countries enter lockdown to drone technology in different scenarios. The combat the spread of corona virus, drone tech- novel corona virus is transmitted via respiratory nology has become an important tool in ensur- droplets and can spread by touching contami- ing that members of the public are adhering to nated surfaces like metal, floors, objects, and the strict measures put in place. Surveillance other surfaces indoors and outdoors. Remote- drones have been used in China since the early ly piloted drones are becoming vital tools in the weeks of the outbreak to remind citizens of the fight against Covid-19 as they help to minimize quarantine measures and to enforce social-dis- human interaction and keep human operators tancing rules. The trend has since gone glob- safe from getting infected. al as more countries deploy drones fitted with loudspeakers to urge members of the public to 1. Virus Detection by Drones remain in their homes and to enforce bans on In an effort to curb the spread of corona virus, public gatherings. the University of South Australia has teamed up with Dragonfly Inc to develop Pandemic Drones 5. Emergency Medical Delivery by Drones which will use temperature sensors and com- The corona virus outbreak has put increased puter vision to identify symptoms of infectious pressure on health services across the world. respiratory diseases. The new drones will be The virus has caused greater demand for lab- capable of remotely monitoring temperature, oratory testing a well as an urgent need for heart and respiratory rate as well as detect- personal protective equipment and devices to ing coughing and sneezing at a distance of up enable the remote monitoring of patients with to 10m. This will allow public spaces as well as milder symptoms. Drone delivery has proved to crowded areas such as airports and healthcare be a useful solution here as drones can be used facilities to be monitored and give researchers to quickly transport samples from hospitals to an accurate idea of how widespread is virus. laboratories, deliver essential protective equip- ment such as gloves and masks and bring medi- 2. Aerial spraying cal devices to patients’ homes to enable remote There have been several media reports on the monitoring. use of drones for aerial spraying of disinfectants in public outdoor spaces to contain the spread The biggest challenge during this opportunity is of the virus. Attempts took place in China, UAE, to assemble the right kind of drone in this lock- Spain, South Korea, and other countries. Some down when spares and parts are not immedi- companies claim that they managed to cover 3 ately available. Also, payload customization for km2 of an area with spraying. However, scientific non-regular use cases is another challenge. A evidence suggests that this application has little drone’s small size and flight capability allow it to no evidence for efficiency and effectiveness. to access areas that otherwise may not be easy or possible. Typically, they are equipped with 3. Food Delivery by Drones computer vision, camera, face and object recog- With most restaurants and cafes closed and the nition, and a combination of networking, robot- public urged to stay in their homes to halt the ics, and artificial intelligence (AI) to perform as spread of corona virus, the demand for food de- demanded by the situation. livery services has never been higher. However, due to the highly contagious nature of COVID-19 more and more delivery services are opting for 27 Inspecta Department of Instrumentation and Control Engineering, NSSCE

MGN BLOCKCHAIN GREESHMA KV, S2 ICE Technology is changing at an incredible pace and the advent of nascent technologies will radically shape the future technological innovation that emerges every year have the potential to have a great impact in our daily lives Is blockchain as most of the country are working on the blockchain. The technology behind the The bitcoin is attracting number of industries to explore methods for sharing values on internet .We have become used to sharing information through decentralized online platform where anybody can publish information from anywhere with access of internet. The blockchain technology is primarily developed for eliminating the problem of double spending occurred during transaction. In the double spending, the user can use the same money for more than one transaction . block- chain technology can addressed several issues such as decentralization of data, privacy and main- tain record as digital ledger ,secure transaction ,authentication and validation of user and resistant to alter data. The blockchain technologies basically Is growing list of records which are linked using asymmetric cryptography. The block is the set of digital information ,consists of cryptographic hash of previous block timestamp and the required transaction data or digital value. Each block has the hash which is obtained from the previous block hence by design , blockchain is resistant to modification. If the data is changed in any block will reset to change all the subsequent blocks attatched to it. This en- sures the security of value distributed on network by the block chain technology. 28 Inspecta Department of Instrumentation and Control Engineering, NSSCE

LiDAR TECHNOLOGY ARPITHA CS , S4 ICE Lidar, which stands for Light Detection and Ranging, is a remote sensing method that uses light in the form of a pulsed laser to measure ranges to the Earth. These light pulses combined with other data recorded by the airborne system generate precise, three-dimensional information about the shape of the Earth and its surface characteristics. A lidar instrument principally consists of a laser, a scanner, and a specialized GPS receiver. Airplanes and helicopters are the most commonly used platforms for acquiring lidar data over broad areas. Two types of lidar are topographic and bathy- metric. Using LiDAR technology in forestry activities Managing natural resources in wide-scale areas can be a highly time and resource-consuming task which requires a significant amount of data collection in the field and reduction of the data in the of- fice to provide the necessary information. High-performance LiDAR remote sensing technology has recently become an effective tool for use in applications of natural resources. In the field of forestry, the LiDAR measurements of the forested areas can provide high-quality data on three-dimensional characterizations of forest structures. Besides, LiDAR data can be used to provide a very high quali- ty and accurate Digital Elevation Model (DEM) for the forested areas. This study presents the prog- ress and opportunities of using LiDAR remote sensing technology in various forestry applications. The results indicate that LiDAR-based forest structure data and high-resolution DEMs can be used in wide-scale forestry activities such as stand characterizations, forest inventory and management, fire behavior modeling, and forest operations. Synthesis of Transportation Applications of Mobile LIDAR Mobile LIDAR technology, techniques are used widely in the transportation field. It is a powerful mapping method that uses laser scanning to identify roadway assets and related infrastructure quickly, accurately, and cost-efficiently. Mobile LiDAR has become an effective solution for rapid data collection in recent years given advances in scanning speed and accuracy, Global Position- ing System technology (GPS), and positioning hardware such as global navigation satellite sys- tem (GNSS) receivers and inertial measurement units (IMUs). Most of the mobile LiDAR consists 29 Inspecta Department of Instrumentation and Control Engineering, NSSCE

of the mobile platform, positioning hardware, 3D laser scanner(s), photographic/video recording, computer, and data storage. Several difficulties exist when performing mobile scans. For example, measurements are performed from a moving platform, requiring precise GPS/IMU readings for accurate data georeferencing. Also, it usually isn’t feasible to close down a section of highway for scanning, so neighboring vehicles can block data collection efforts. Additionally, a vehicle must be moving at a safe speed (with the flow of traffic) while simultaneously collecting data. In some cases, a rolling slow down can be used to avoid these problems. Agriculture Agriculture robots have been used for a variety of purposes ranging from seed and fertilizer disper- sions, sensing techniques as well as crop scouting for the task of weed control. Lidar can help determine where to apply costly fertilizer. It can create a topographical map of the fields and reveal slopes and sun exposure of the farmland. Researchers at the Agricultural research service used this topographical data with the farmland yield results from previous years, to cat- egorize land into zones of high, medium, or low yield. This indicates where to apply fertilizer to maximize yield. Lidar is now used to monitor insects in the field. The use of Lidar can detect the movement and behavior of individual flying insects. Another application is crop mapping in or- chards and vineyards, to detect foliage growth and the need for pruning or other maintenance, detect variations in fruit production, or count plants Lidar is useful in GNSS-denied situations, such as nut and fruit orchards, where foliage blocks satellite signals to precision agriculture equipment or a driverless tractor. Lidar sensors can detect the edges of rows so that farming equipment can continue moving until the GNSS signal is reestablished. LiDAR as a tool for archaeological research Airborne light detection and ranging (LiDAR) is a technology that offers the ability to create highly detailed digital terrain models (DTMs) that expose low relief topographic features. The availability of these models holds the potential to augment archaeological field research by producing visual imagery that can be used to identify traces of ancient anthropogenic activity. This capability is par- ticularly useful in hard-to-access areas and in areas of dense vegetation, where manual surveys are difficult to plan and execute. Additionally, LiDAR technology is nonintrusive so that initial surveys can be performed without altering or destroying the integrity of the landscape and any features that it may contain. Vegetation cover, particularly during leaf-on periods, can interfere with the ability of LiDAR to penetrate to the surface and can therefore impact its accuracy. The effect of veg- etation cover on the ability of LiDAR to produce accurate DTMs is evaluated concerning its impact on the identification of archaeological features. 30 Inspecta Department of Instrumentation and Control Engineering, NSSCE

IS THE INTERNET BRINGS PEOPLE CLOSER OR SEPERATING THEM?? SANDRA S NATH, S2 ICE No matter what you say about your ideas online, there is no doubt that its influence is growing and that more and more people are using it over time - currently there are over 1.6 billion users of the World Wide Web. As the use of the internet increases, there is a growing debate about whether it helps or not to bring people together. Exactly when web designers create websites, it is often the companies that want to reach their customers and always know where their business operates, suggesting that the purpose of bringing people together is in perspective. Does this really work, or does the internet only work to get us out? The Internet brings us closer together Perhaps the best argument ever that allows the internet to bring people together is the fact that it is a global phenomenon. People from all over the world are connected to the Internet, sharing con- tent and using the same websites. This gives individuals and businesses more opportunities than ever to expand their networks and reach out to people they may never meet. This is clearly reflected in the growth of social networks, which are very popular. Facebook is prob- ably a good example of this, with over 500 million users and growing. People often use this website to connect with friends and contacts, such as people they know from school but who have lost contact. Viewed in this way, the Internet brings us closer together as it provides a platform where people can interact not only with people they know but also with people from other countries. Businesses and web developers have obviously seen this trend. Facebook itself suggests that more than 10,000 new websites interact with the Facebook site every day. This suggests that there is greater potential for communication in the online platform and smaller websites to benefit from the success of hundreds, thus connecting different groups from different industries through the central hub. 31 Inspecta Department of Instrumentation and Control Engineering, NSSCE

This can also be seen in advance of organizing sub-campaigns online. It is widely thought, for exam- ple, that without planning through social media and the Internet, Barack Obama would have found it very difficult to bring together low-income US voters who eventually helped him get to the White House. We can also see it in the UK, where major campaigns are organized online by various groups. For example, UK Uncut has organized tax evasion protests, 38 Degrees and others are campaigning for forest conservation and UKpling is working to organize an online campaign to preserve librar- ies. We can easily say that without the Internet, all the people who participated in these campaigns would not have been bought together. The Internet does not keep us close?? After all, every argument has an opposing argument and this argument is no different. Many peo- ple have argued that even with the rapid growth of communication technology - especially those platforms that run the World Wide Web - it has actually had an impact on human development. This may well be illustrated by the fact that although people are now able to communicate with others more than ever before, the quality of communication you experience with someone through social networking will never be the same as that of face-to-face conversations. There’s a fit in this - if you consider that many people who work in the same office now tend to send each other email instead of direct communication, you can see how the internet can end up dividing people. There are also issues that need to be addressed regarding internet management; as a global or- ganization in addition to effective international legal regulation, there are very few laws governing the internet and its operation. Of course, there is an argument to be made that this is a good thing, because it means that people have space to communicate away from their daily lives. However, if you consider that some websites are banned in countries like China, North Korea severely restricts the use of the Internet and the Egyptian government recently shut down the Internet in an effort to control protesters, it can be argued that there is potential for online control. the internet is separat- ed from those that are forbidden to communicate. So, even though the Internet is working to bring its users together, it is forcing those offline to move to the edge. The Conclusion Both sides of the debate are right and, of course, very complex when it comes to them. Perhaps, however this point - in its face, the online world is a great opportunity for global connectivity and gives users the opportunity to experience different lives and cultures through a representative. Facebook, Twitter, LinkedIn, Skype, Google and many more offer social networking sites that are unique to human history. 32 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Is there a need to restore charge extra for their services, they cannot in- net neutrality?? vest in their infrastructure. With complete neu- trality, a large amount of data is consumed free PRAVEENA A R, S2 ICE of charge - this money can be used to expand the fastest network in rural areas. Under strict Net neutrality or network neutrality means in- neutrality, the FCC must monitor the compliance ternet users should be able to access all content of ISPs with these rules. This includes submitting on the internet without being discriminated reports twice a year, which can be expensive for against by ISPs. Internet Service Providers (ISPs) ISPs of any size. are one of the stakeholders. It is important to note the four different kinds of stakeholders in Neutrality means that no one with a lot of mon- the internet space that may be affected by the is- ey gets specialized treatment. In addition to to- sue. They are the consumers of any internet ser- tal neutrality, ISPs can limit websites or services vice, Telecom Service Providers (TSPs) or Inter- of small businesses that cannot afford so-called net Service Providers (ISPs), over-the-top (OTT) fast routes. The same thing happens to young service providers, and the government, who creators, who have their biggest source of rev- may regulate and define relationships between enue for their YouTube channel. None of them these players. In other words, net neutrality will be able to compete with the big company. stipulates that service providers should not slow ISPs should not be able to block content or nar- down nor block content from users and also all row down web pages just because they do not applications should be allowed to be accessed at like them. Apart from network neutrality, noth- the same internet speed and same cost. ing prevents them from blocking online content. This, however, does not include illegal content. No one pays for the data. With network neutral- Without full or partial neutrality, the ban on such ity, users only pay for the service, not the data content falls on the shoulders of law enforce- they use. Video streaming services account for ment agencies. Neutrality ensures that every- 57% of the bandwidth used worldwide by 2018. thing online is accessible to everyone. If access- Customers using low bandwidth may not want ing high-quality online content becomes a luxury to pay for the infrastructure needed to support only for the rich to enjoy, this will increase public high-bandwidth operations. Illegal content is outreach. No additional content costs. In addi- widely available. Offensive, harmful, and ille- tion to total neutrality, ISPs can charge compa- gal content is accessible to everyone and diffi- nies for improving services such as instant video cult to remove. Removing net neutrality makes streaming, online gambling, etc. If this happens, it easier for ISPs to filter out harmful content, these companies will pass on their new financial even though this is far from a ban. If ISPs do not responsibility to users. 33 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Internet of Things even bigger scale, smart city projects are filling entire regions with sensors to help us under- KAVYA K, S2 ICE stand and control the environment. The Internet of Things, or IoT, refers to the bil- The term IoT is mainly used for devices that lions of physical devices around the world that wouldn’t usually be generally expected to have are now connected to the internet, all collect- an internet connection, and that can communi- ing and sharing data. Thanks to the arrival of cate with the network independently of human super-cheap computer chips and the ubiquity action. For this reason, a PC isn’t generally con- of wireless networks, it’s possible to turn any- sidered an IoT device and neither is a smart- thing, from something as small as a pill to some- phone -- even though the latter is crammed with thing as big as an airplane, into a part of the IoT. sensors. However, a smart watch or a fitness Connecting up all these different objects and band, or other wearable devices might be count- adding sensors to them adds a level of digital ed as an IoT device. intelligence to devices that would be otherwise dumb, enabling them to communicate real-time How big is the Internet of Things? data without involving a human being. The In- ternet of Things is making the fabric of the world Big and getting bigger -- there are already more around us smarter and more responsive, merg- connected things than people in the world. Tech ing the digital and physical universes analyst company IDC predicts that in total there will be 41.6 billion connected IoT devices by 2025, or “things.” It also suggests industrial and automotive equipment represent the largest op- portunity of connected “things,”, but it also sees strong adoption of smart home and wearable devices in the near term. . Another tech analyst, Gartner, predicts that Examples of IOT the enterprise and automotive sectors will ac- count for 5.8 billion devices this year, up almost Pretty much any physical object can be trans- a quarter in 2019. Utilities will be the highest formed into an IoT device if it can be connected user of IoT, thanks to the continuing rollout of to the internet to be controlled or communicate smart meters. In the form of intruder detection information. and web cameras, security devices will be the second biggest use of IoT devices. Building au- tomation – like connected lighting – will be the fastest-growing sector, followed by automotive (connected cars) and healthcare (monitoring of chronic conditions). A light bulb that can be switched on using a Conclusion smartphone app is an IoT device, as is a motion sensor or a smart thermostat in your office or a IoT-enabled devices and sensors are helping connected streetlight. An IoT device could be as us reduce air pollution in some of our world’s fluffy as a child’s toy or as serious as a driverless biggest cities, improve agriculture and our food truck. Some larger objects may themselves be supply, and even detect and contain deadly vi- filled with many smaller IoT components, such ruses. as a jet engine that’s now filled with thousands of sensors collecting and transmitting data back to make sure it is operating efficiently. On an 34 Inspecta Department of Instrumentation and Control Engineering, NSSCE

WIFI VERSUS BLUETOOTH IN THE LIMELIGHT OF IOT SWATHI KRISHNANUNNI, S2 ICE IoT devices are already becoming the next inevitable turn towards tomorrow, the big question that comes up in every CTO or decision maker’s mind is which technology to invest into so that one can expect to get the best. Before we understand the difference between Wifi and Bluetooth technol- ogy, let’s first understand what is IoT. Though there is a full writeup on what is IoT, in a nutshell enabling a thing to talk to the internet is called the Internet of Things. Say for instance the thing is the chair that you are currently sitting on and you love your chair. So, you would like to know if anyone else uses your chair while in your absence. I’ll put a pressure sensor on the chair and this sensor would connect to the internet in a way that when someone sits on the chair, the pressure sensor would immediately notify you. Eventually, the things in the internet of things will start to communicate with each other, so say in our current example the pressure sensor senses that there is someone on the chair and that is not you, it will tell the handle of the chair to send a mild current so as to give the intruder a shock. For this to become a reality, devices need to have the capability of talking to each other, and for this, they have to communicate wirelessly. This need has given birth to many wireless technologies for devices that can wirelessly connect. Some better than the other and I have often been asked a question that there are a number of wireless communication technologies available in the market today viz. Z wave, Zigbee, Wifi and Bluetooth, which ones of these technologies have a future and why. So, I decided to write up a blog on the difference between bluetooth and Wi-Fi, to begin with, as these wireless technologies were born even before the IoT was a thing. In this blog ahead, I have tried to compare the two fierce wireless communication technologies on the internet of things (IoT)based on certain criteria. RANGE It is defined as the physical distance of wireless (over the air) communication between two devices In a line of sight, the Bluetooth radio signals can be received by a receiver of up to 500 meters, but with bluetooth mesh, this range can be easily extended to much more using relay nodes. Using a simple TTL (Time to Live) variable, the system architect can decide how many hops a message could take to reach the destination. This means that if one node fails, the mesh network will find another functioning node to send the data packets to its intended destination. With the 802.11n and other flavours of Wi-Fi, the range is pretty decent, and the range can be extended by using signal extend- 35 Inspecta Department of Instrumentation and Control Engineering, NSSCE

ers and additional access points. But as discussed on the topic of Topology, extending the range by adding additional hubs does not work for the Internet of Things, as when one of the hubs malfunc- tions, the entire network becomes inoperable and nothing will work unless the hub is replaced and network configurations reconfigured. DATA RANGE This is a term to denote the transmission speed, or the number of bits per second transferred over a radio signal At 1 Mbps Bluetooth, today has by far the best Data transfer rate among its competition viz. ZigBee, Zwave, Thread etc. At a higher data rate, the packets can reach the destination faster and help with freeing up radio waves and as a result, there are minimal packet collisions and lower network saturation. A 33 bytes packet size in LE and 15 bytes in Mesh, when transferred at 1 Mbps means there is a lower duty cycle, which also translates to longer battery life. Bluetooth support for Low Energy devices implies that devices that spend most of their time in sleep mode and wake up to quickly perform the tasks and go back to sleep again, give the capacity of the devices to run for years A Wi-Fi device has the capability of transferring hundreds of megabits per second. The new- er version of 802.11ac and 802.11n is even faster. Though these numbers look impressive, it is an overkill for an IoT application like Asset Tracking or Warehouse Pallet Tracking for instance, where instead of data-heavy content, the asset tags or beacons broadcast simple commands and tiny bits of information like sensor data or state change signals. COMPATIBILITY WITH SMARTPHONES It is the ability of the wireless protocol to communicate natively with a smartphone or any handheld device. Bluetooth has improved customer experience and we all know that. Right from listening to music or getting data wirelessly from the fitness tracker or any other smart device, bluetooth has become the defacto standard for smartphone communication. The fact that bluetooth natively communicates with the smartphone app, the number of possibilities for improving user experience has increased multifold. Only a smartphone app is required to talk to bluetooth devices directly and that is all that is required to build, configure and control a network of connected bluetooth devices. Though Wi-Fi can also be found in every smartphone, tablet or laptop, the fact that it requires the networks, central access point to communicate and does not communicate directly, makes Wi-Fi inefficient for IoT devices. Unlike Bluetooth where the setup of IoT devices can be done directly us- ing an app, the same cannot be done using Wi-Fi as the smart devices do not talk to smartphones natively and they first need to get on the same network. ONBOARDING This refers to the speed and convenience with which a new device can be added to the wireless net- work Thanks to this direct connectivity, Bluetooth provides the end-user with what could be called a Remote Display and a Remote Keyboard for each smart device, no matter how small or simple it is. One of the major benefits resulting from this is the simplicity of the commissioning and provi- sioning (in the case of Bluetooth mesh) process. With other protocols, manufacturers often have to come up with the wildest ideas to facilitate adding a new device to the existing network. With Bluetooth, the entire procedure can be made simpler, more intuitive, and safer. Just like Bluetooth, every smartphone, tablet, and laptop is also provided with a Wi-Fi capability, and theoretically, on- boarding a smart device should have been as straightforward as the Bluetooth device; but that is not the case. A Wi-Fi smart device would need to know the network password to get on the network and you need the smartphone to provide it with the details, but then you need the smartphone to also be a part of the network. This makes things a bit tricky. 36 Inspecta Department of Instrumentation and Control Engineering, NSSCE

FUTURE DEVELOPMENTS It is the trajectory of the technology life cycle. How strong is the community supporting the tech- nology will define how much the adoption will be trusted? With real-life use cases for Smart Homes, Building management system, Industry 4.0, Remote Asset Monitoring, etc, built over BLE and Blue- tooth mesh networking specifications, it seems that Bluetooth is all set to become the go-to tech- nology for low-bandwidth communications in the IoT sector. The BlueTooth SIG is perfectly placed to ensure a strong future for Bluetooth as through this comparison we have seen that no other wireless technology has ever been so deep and comprehensive. Energy Efficiency, cost, resource heaviness, speed of onboarding, and other form factor constraints have been the major challenges to use Wi-Fi for IoT deployments. The Wi-FiAlliance is aware of these shortcomings and has made efforts by introducing standards like the 802.11c and 802.11an with a promise to reduce the chal- lenges that legacy 802.11 technologies struggle within in the resource-scarce IoT space. But, it’s far behind in the race and only time will tell when the Alliance will come back with answers on the current challenges. 37 Inspecta Department of Instrumentation and Control Engineering, NSSCE

LiFi is a life-changer in 5G of the RF spectrum, and a 667-fold deficit com- pared to the current WiGig limit. By comparison, ABHISHEK C K, S2 ICE 6 THz of bandwidth is only 0.8% of all IR and visible light intensity. One could argue that the ABSTRACT dynamic re-use of space resources would be ac- ceptable to overcome this emerging scope. This In this paper, we will start by explaining what method has been used with great success in the Light-Fidelity (LiFi) is and then argue about 5th past and has led to a ‘small cell concept’. It has Generation (5G) technology. High speeds of 8 been a major factor in improving data rates. Cell Gbps transmission from a single light source are sizes in cellular connections are greatly reduced. displayed, and complete mobile networks based The cell in the original 2 G systems was present on LiFi have been created. We will discuss many with 35 km, 5 km 3G systems, 100 m 4G systems, misconceptions and highlight the potential im- and 5G about 25 m to reuse the available RF pact of these technologies on many existing and spectrum and achieve higher data density. How- emerging industries. We also discuss new appli- ever, further reduction in cell size is very difficult cations that LiFi may open in the future. to achieve due to the high cost of backhaul and fronthaul data link infrastructure that connects Introduction these access points distributed across the core network. Moreover, with a smaller cell size the LiFi is a wireless communication technology that chances of seeing the line between the interfer- uses infrared and light spectrum for high-speed ing channel and the user channel increase communication. LiFi, the first built-in extension, . expands the concept of virtual optical commu- nication (VLC) to achieve faster wireless, secure, Potential disruptions can reduce data rates and bi-directional, and full wireless communication. can cause serious problems for mobile networks. It is important to note that LiFi supports user Therefore, WiFi access points are installed under mobility and multi-user access. The frequency of the stairs that use the human body as a signal the infrared and light spectrum together is al- for RF signals and avoid line interference links. most 2600 times the size of a total radio frequen- This is not a viable solution for the delivery of of- cy of 300 GHz. It has been shown that the com- fices and homes. For these reasons, future mo- bined annual growth rate (CAGR) of the wireless bile data growth contributions will likely range road has been 60% over the past decade. If this from a wider range to local reuse. In particular, growth is maintained over the next 20 years, optical equipment is very attractive as it is large which is logical because of the advent of the In- and unlicensed. ternet-of-Things (IoT) and machine-to-machine communication (MTC), this could mean a de- These devices can be used for data communica- mand 12 times the current bandwidth assuming tions that have been successfully demonstrated the same spectrum power. For example, the in- for decades in fiber-optic communication using dustrial group, the scientist’s sci c and medical low power radiation (lasers). With the wide- (ISM) RF in the 5.4 GHz region is approximate- ly 500 MHz, and this is mostly used by wireless fi fidelity (WiFi). This bandwidth is already full, which is one reason for the introduction of the Wireless Gigabit Alliance (WiGig). WiGig uses an unlicensed spectrum between 57 GHz - 66 GHz, that is, the maximum 9 GHz bandwidth. 20 years from now, the band- width demand for future wireless systems will be 12,000 × 500 MHz leading to a 6 THz bandwidth demand. The total RF signal is only 0.3 THz. This means a 20-fold deficit compared to the rest 38 Inspecta Department of Instrumentation and Control Engineering, NSSCE

spread adoption of high-intensity light-emitting or-changing chemical. Record transfer speeds diodes (LEDs), there has been an opportunity to with one 8 Gbps single micro LED are shown, use the optical signal of light for wireless com- and it has been shown that 100 Gbps is possible munication networks. with laser-based lighting. Traditionally, the VLC system is designed as a The main advantages of a LiFi wireless network single wireless communication link between an layer are: (i) three orders for data intensity; (ii) LED light source and a receiver with an image different structures to strengthen the safety of detection device such as a picture detector (PD). the layers; (iii) use in internally safe areas such The level of data that can be accessed depends as petrochemical plants and oil platforms where on the digital voice processing technology used RF is usually prohibited; iv) with the advent of and the lighting technology. Available light tech- power-over-ethernet (PoE) and its use in light- nology is summarized in. ing, there is an opportunity to go back to the existing data network infrastructure needed Many commercial LEDs are made up of high blue behind the light sources and its integrated LiFi light with sticky phosphorus that converts blue modem. light to yellow. When blue light and yellow light are combined, this turns into white light. This is LiFi networking the most expensive method of producing white light today, but the color that changes the color The room is lit by several light fixtures, which of phosphor reduces the reaction response, i.e., provide illumination. Each light is driven by a LiFi the higher waves are greatly reduced. As a re- modem or a LiFi chip and, therefore, also serves sult, the bandwidth of this type of LED is only in as an optical base station or access point (AP). the 2 MHz regions. With a later blue receiver to The optical base stations are connected to the remove yellow particles, however, it is possible core network by high-speed backhaul connec- to achieve data rates in the region of 1 Gbps with tions. The light fixtures also have an integrated these devices. The existing red, blue and blue infrared detector to receive signals from the ter- (RGB) LEDs are highly advanced allowing data minals. The illuminating lights are modulated at rates up to 5 Gbps as white light is produced high rates. The resulting high-frequency flickers by mixing basic colors instead of using a col- which are much higher than the refresh rate of 39 Inspecta Department of Instrumentation and Control Engineering, NSSCE

optimum selection of respective CCI mitigation and resource scheduling techniques depend on actual use cases and system constraints. Oth- er functions of the central controller include a computer monitor are not visible to the occu- The move from point to point links to full wire- pants of the room. Power and data can be pro- less networks based on light poses several chal- vided to each light fixture using some different lenges. Within each cell, there can be several techniques, including PoE and power-line com- users and therefore multiple access schemes munication (PLC). An optical uplink is implement- are required. The provision of an uplink can also ed by using a transmitter on the user equipment require a different approach from the down- (UE), often using an IR source (so it is invisible to link. This is because low energy consumption is the user). Each of these light fixtures, which at required in the portable device, and an uplink the same time act as wireless LiFi APs, create an visible light source on the device is likely to be extremely small cell, an optical att cell. Because distracting to the user. Therefore, the use of the light is spatially confined, it is possible in LiFi to infrared spectrum seems most appropriate for take the ‘small cell concept’ to a new level by the uplink. In addition, modulation techniques creating ultra-small cells with radii less than 5 m for a high-speed uplink have to be spectrum while exploiting the huge additional unlicensed efficient and power efficient at the same time. spectrum in the optical domain. The balance of Two recently developed modulation techniques light fixtures that contain APs and those that that achieve this are enhanced unipolar OFDM provide the only illumination is determined by (EU OFDM), or spectral and energy the requirement of the network, but potentially efficient (SEE OFDM). Advanced CCI mitigation all light fixtures can contain APs. Compared to techniques often require that these multiple LiFi a single AP wireless hot-spot system, such cel- APs are operated utilizing a centralized control lular system can cover a much larger area and mechanism such as ‘resource schedulers’ with- allow multiple UEs to be connected simultane- in the controller of a software defined network ously. In cellular networks, dense spatial reuse (SDN). of the wireless transmission resources is used to achieve very high data density - bits per second The main tasks of the ‘resource scheduler’ are per square meter (bps/m2). Consequently, the to adaptively allocate signal power, frequency, links using the same channel in adjacent cells time, and wavelength resources. Typically, there interfere with each other, which is known as are trade-offs between signaling overhead, co-channel interference (CCI) illustrates CCI in computational complexity, user data rates, ag- an optical att cell network. gregate data rates, and user fairness, and the 40 Inspecta Department of Instrumentation and Control Engineering, NSSCE

achieving multi-user access and the process of over incumbent technologies. Firstly, unlike om- handover from cell to cell when terminals move. nidirectional RF antennas radiating signals in all Handover plays an important role in LiFi net- directions, a LED light source typically radiates works. For example, the handover controller has optical power directionally because of its con- to ensure that connectivity is maintained when struction. Therefore, the radiation of the visible users leave a room or the premises. Therefore, light signals is naturally confined within a lim- there might be situations when there is no live ited region. In contrast, RF mm-wave systems coverage. In these scenarios to avoid loss of require complicated and expensive antenna connectivity, we utilize the fact that LiFi is com- beamforming techniques to achieve the same plementary to RF networks. To this end, there objective. Secondly, LiFi att cell networks can be have been studies on hybrid LiFi/RF networks, implemented by modifying existing lighting sys- and the three key findings are: tems. Any LiFi att cell network can provide ex- tra wireless capacity without interference to RF • LiFi networks will significantly improve ser- networks that may already exist. LiFi att cell net- vices quality to mobile users works, therefore, have the potential to augment 5G cellular systems in a cost-effective manner. • Service delivery can be uninterrupted A unique feature of LiFi is that it combines illu- • WiFi networks significantly benefit from LiFi mination and data communication by using the same device to transmit data and to provide networks. lighting. The latter is because well-designed load balanc- LiFi misconceptions ing will ensure that WiFi networks suffer less from inefficient traffic overheads caused att cell- There are many misconceptions about LiFi: tant re-transmissions which happen when two LiFi Los technology: This is probably the biggest or multiple terminals are in contention. misconception. Using the orthogonal frequen- LiFi attocell networks have many advantages 41 Inspecta Department of Instrumentation and Control Engineering, NSSCE

cy division multiplexing (OFDM) -type intensity Fl icker lamps: The low frequency at which the modulation (IM) / Direct Detection (DD) modu- lights are made is in the 1 MHz region. The lation scheme, data measurements in the effec- computer screen refresh rate is about 100 Hz. tive signal-to-noise-ratio (SNR) scale. In a typi- This means that the fl icker LiFi light bulb ratio cal hotel area where the minimum lighting level is more than 10,000 than the computer screen. for reading purposes is 500 lx, the SNR at table Therefore, no icker is visible. height is between 40 dB and 60 dB. This means that high-level flexibility strategies can be used This is for downlink only: The main advantage in conjunction with OFDM to utilize available is that LiFi can be integrated with LED lighting. channel capacity. By using voice fluctuations and This, however, does not mean that both activi- coding (AMC) it is possible to transfer data to low ties should be used together. Both of these func- SNRs such as −6 dB. Imagine a video transmis- tions can be easily separated (see comments sion on a portable computer in front of you at a blurring). Because of this, LiFi can also be used distance of 3 meters when the LED light points extensively for uplink communication where to a white wall on one side to the receiver’s loca- no lighting is required. The infrared spectrum, tion. Therefore, no direct part of the Los reaches therefore, completely borrows uplink. We did a the recipient before, but the video was success- study where we sent data at a speed of 1.1 Gbps fully received. If the wall had been darker, more over a distance of 10 m with an output power light would have been placed, compromising LED of only 4.5 mW. the SNR receiver. If the SNR fell below the 6-dB threshold, an error link would not be possible. Conclusion However, in low light conditions, one photon av- alanche diode can be used on the receiver which In this paper, we have shown that there has been improves the sensitivity of the receiver at least a clear trend in wireless communications to use in order of magnitude.LiFi does not work in sun- ever higher frequencies. This is a consequence light conditions: Sunlight is an interfering signal of the limited availability of RF spectrum in the outside the bandwidth used for data conversion. lower frequency bands of exponential growth in LiFi works at frequencies greater than 1 MHz. wireless data traffic that we have been witness- Therefore, regular sunlight can be removed us- ing at the same time during the last decade. This ing electrical filters. What’s more about sunlight growth will continue. It is, therefore, inevitable is the improved gun sound, which can’t be easily that other spectrum than the RF spectrum must eliminated by optical lights. In a study the im- be used for future wireless communication sys- pact of shooting noise was properly investigat- tems. We, therefore, forecast a paradigm shift ed, it was found that the data rate was corrupted in wireless communications when moving from by 1.5% and 4.5% when considered. mm-wave communication to nm-wave commu- nication which consequently involves light – i.e., 0.19 mm2 detector, and 2 mm2 detectors re- LiFi. There has been significant research in phys- spectively. Overcrowding can be avoided by ical layer technologies for LiFi during the past 15 using automatic gain control algorithms in con- years and data rates have increased from a few junction with optical fi lters. We say that sunlight Mbps in around 2002 to 8 Gbps from a single LED is of great benefit as it empowers LiFi receivers in 2016. In the last five years there has been in- based on the sun where the cell acts as a data creasing research in LiFi networking techniques receiver, and at the same time harvests sunlight such as multiuser access, interference mitiga- as energy. tion, and mobility support, and in parallel LiFi products have entered the market which has en- Lights cannot be dimmed: There are advanced abled wireless networking with light. Therefore, voice switches such as EU-OFDM that allow LiFi LiFi has become a reality and this technology is to operate near the LED power supply (ToV) here to stay for a long time. which means the lights can be used at very low output levels while maintaining high data rates. 42 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Causes of Cybercrime and inscrutable security that uses a unified system Preventive Measures of software and hardware to authenticate any information that is accessed over the Internet. Abhishek V, S2 ICE Let’s find out more about cybercrimes. Rapid technological growth and developments Causes of Cybercrime: have provided vast areas of new opportuni- ty and efficient sources for organizations of all Cybercriminals always opt for an easy way to sizes. Technological growth is majorly backed make big money. They target rich people or rich by the internet. The internet has brought dis- organizations like banks, casinos, and financial tant objects closer, in other words, it makes firms where a huge amount of money flows dai- the world small. The internet has now become ly and hack sensitive information. Catching such a national asset, the whole national security is criminals is difficult. Hence, that increases the also depending on it. But these new technolo- number of cyber-crimes across the globe. Com- gies have also brought unprecedented threats puters are vulnerable, so laws are required to with them cybercrime. Cybercrime is a crime in protect and safeguard them against cybercrimi- which a computer is used for a crime like hack- nals. We could list the following reasons for the ing, spamming, phishing, etc. vulnerability of computers: Introduction to Cybercrime: Easy to access : The problem behind safeguard- ing a computer system from unauthorized Cybercriminals use the internet and computer access is that there are many possibilities of technology to hack user’s personal computers, breach due to the complex technology. Hackers smartphone data, and personal details from so- can steal access codes, retina images, advanced cial media, business secrets, national secrets, voice recorders, etc. that can fool biometric sys- etc. Criminals who perform these illegal activ- tems easily and bypass firewalls can be utilized ities through the internet are called – Hackers. to get past many security systems. Though law enforcement agencies are trying to tackle this problem, it is growing regularly and Capacity to store data in comparatively small many people have become victims of identity space : The computer has the unique character- theft, hacking and malicious software. One of istic of storing data in a very small space. This the best ways to stop these criminals and pro- makes it a lot easier for people to steal data tect sensitive information is by making use of from any other storage and use it for their profit. 43 Inspecta Department of Instrumentation and Control Engineering, NSSCE

Complex : The computers run on operating Piracy or Theft : This crime occurs when a per- systems and these operating systems are pro- son violates copyrights and downloads music, grammed with millions of codes. The human movies, games, and software. There are even mind is imperfect, so it can do mistakes at any peer-sharing websites that encourage software stage. Cybercriminals take advantage of these piracy and many of these websites are now be- gaps. ing targeted by the FBI. Today, the judicial sys- tem is addressing this cybercrime and some Negligence : Negligence is one of the charac- laws prevent people from illegal downloading. teristics of human conduct. So, there may be a Film producers and directors often become vic- possibility that protecting the computer system tims of this crime. we may make any negligence which provides cyber-criminal access and control over the com- How to tackle Cybercrime? puter system. To tackle cybercrime effectively, establish mul- Loss of evidence : The data related to the crime tidimensional public-private collaborations be- can be easily destroyed. So, Loss of evidence tween law enforcement agencies, the informa- has become a very common & obvious problem tion technology industry, information security which paralyzes the system behind the investi- organizations, internet companies, and financial gation of cyber-crime. institutions. Unlike the real world, Cybercrimi- nals do not fight one another for supremacy or Types of Cybercrimes control. Instead, they work together to improve their skills and even help out each other with There are many types of cyber-crimes and the new opportunities. Hence, the usual methods most common ones are explained below: of fighting crime cannot be used against cyber- criminals. Hacking : It is a simple term that defines send- ing illegal instruction to any other computer or The best way to go about this is by using the network. In this case, a person’s computer is solutions provided by Cross-Domain Solutions. hacked so that his personal or sensitive informa- This allows organizations to use a unified system tion can be accessed. The criminal uses a variety comprising of software and hardware that au- of software to crack a person’s computer and thenticates both manual and automatic transfer the person may not be aware that his comput- and access to information when it takes place er has been accessed from a remote location. between different security classification levels. Often, government websites are a hot target This allows seamless sharing and access of in- for hackers because it helps them gain notori- formation within a specific security classifica- ety which is further fuelled by aggressive media tion, but cannot be intercepted by or advertently coverage. This is different from ethical hacking revealed to the user who is not part of the secu- which is used by many organizations to check rity classification. This helps to keep the network their Internet security protection. and the systems using the network safe. Child pornography and Abuse : The internet is being highly used to abuse children sexual- ly worldwide. This is also a type of cyber-crime wherein criminals solicit minors via chat rooms for child pornography. The Cyber security de- partment of every nation is spending a lot of time monitoring chat rooms frequented by chil- dren with the hopes of reducing and preventing child abuse and soliciting. 44 Inspecta Department of Instrumentation and Control Engineering, NSSCE

AUGMENTED REALITY Augmented reality (AR) is a field of computer re- search which deals with the combination of real Sabna, S2 ICE world and computer-generated data. Augment- ed reality (AR) refers to a computer displays that Augmented Reality (AR) is a growing area in add virtual information to a user’s sensory per- virtual reality research. The world environment ception. It is a method for visual improvement around us provides a wealth of information that or enrichment of surrounding environment by is difficult to duplicate in a computer. This is ev- overlying spatially aligned computer informa- idenced by the worlds used in virtual environ- tion on to a human’s view(eyes). ments. Either these worlds are very simplistic such as the environments created for immersive Augmented reality (AR) was introduced as the entertainment and games, or the system that opposite of virtual reality: Instead of immersing can create a more realistic environment has a the user in to a synthesized, purely information- million-dollar price tag such as flight simulators. al environment, the goal of AR is to augment the An augmented reality system generates a com- real world is the information handling capabili- posite view for the user. ties. It is a combination of the real scene viewed by AR research focuses on see through devices, the user and a virtual scene generated by the usually worn on the head that overlay graphing computer that augments the scene with addi- and text on the users view of his or her surround- tional information. In all those applications the ings. In general, it superimposes graphing over augmented reality presented to the user en- a real world’s environment in real time. An AR hances that person’s performance in and per- system adds virtual comparator objects, audio ception of the world. The ultimate goal is to cre- and other sense enhancements to a real-world ate a system such that the user cannot tell the environment in real time. These enhancements difference between the real world and the virtu- are added in a way that the viewer cannot tell al augmentation of it. It depicts the merging and the difference between the real and augmented correct registration of data from a pre-opera- world. The process of superimposing digitally tive imaging study onto the patient’s head. Pro- rendered images onto our real-world surround- viding this view to a surgeon in the operating ings, giving a sense of an illusion or virtual real- theatre would enhance their performance and ity. Recent developments have made this tech- possibly eliminate the need for any other cali- nology accessible using a Smartphone. bration fixtures during the procedure. 45 Inspecta Department of Instrumentation and Control Engineering, NSSCE

FLEXIBLE ELECTRONIC SKIN Aneesh Murali, S2 ICE Electronics play a very important role in devel- dance of new applications that can wirelessly oping simple devices used for any purpose. In monitor the vitals and body movements of a pa- every field electronic equipment is required. The tient sending information directly to a comput- best achievement as well as future example of er that can log and store data to better assist in integrated electronics in the medical field is Arti- future decisions. This paper offers an insightful ficial Skin. It is an ultrathin electronics device at- view of the internal structure, fabrication pro- tached to the skin like a sick on tattoo which can cess and different manufacturing processes. measure electrical activity of heart, brain waves & other vital signals. Goal is to develop sensors on flexible substrates that are compliant to curved surfaces. Research- Artificial skin is skin grown in a laboratory. It er’s objective for making artificial skin is to make can be used as skin replacement for people who a revolutionary change in robotics, in the medi- have suffered skin trauma, such as severe burns cal field, in flexible electronics. Skin is a large or- or skin diseases, or robotic applications. This pa- gan in the human body so artificial skin replaces per focuses on the Artificial skin(E-Skin) to build it according to our needs. Main objective of ar- a skin work similar to that of the human skin and tificial skin is to sense heat, pressure, touch, air- also it is embedded with several sensations or flow and whatever which human skin senses. It the sense of touch acting on the skin. This skin is a replacement for prosthetic limbs and robotic is already being stitched together. It consists of arms. Artificial skin is skin grown in a laboratory. millions of embedded electronic measuring de- vices: thermostats, pressure gauges, pollution There are various names for artificial skin. In the detectors, cameras, microphones, glucose sen- biomedical field it is called artificial skin, in our sors, EKGs, electronic holographs. This device electronics field it is called electronic skin, some would enhance the new technology which is scientists call it sensitive skin, in other ways it is emerging and would greatly increase the use- also called synthetic skin, some people say that fulness of robotic probes in areas where the hu- it is fake skin. Such different names are available man cannot venture. but the application is the same . It is a skin re- placement for people who have suffered skin The sensor could pave the way for an overabun- trauma, such as severe burns or skin diseases, 46 Inspecta Department of Instrumentation and Control Engineering, NSSCE

or robotic applications & so on. An artificial skin electronic properties, such as the speed at which has also been recently demonstrated at the Uni- signals can be read from the sensors. For that, versity of Cincinnati for in-vitro sweat simulation electron mobility is a fundamental limiting fac- and testing, capable of skin-like texture, wetting, tor, so some researchers are seeking to create sweat pore-density, and sweat rates flexible materials that allow electrons to move very quickly. Architecture of Flexible Electronic Skin Conclusion With the interactive e-skin, demonstration takes place of an elegant system on plastic that can be wrapped around different objects to enable a new form of HMI. Other companies, including Massachusetts-based engineering firm MC10, have created flexible electronic circuits that are attached to a wearer’s skin using a rubber stamp. MC10 originally designed the tattoos, called Biostamps, to help medical teams mea- sure the health of their patients either remotely, or without the need for large expensive machin- ery. Fig 2 shows the various parts that make up the MC10 electronic tattoo called the Bio stamp. It can be stuck to the body using a rubber stamp, and protected using spray-on bandages. The circuit can be worn for two weeks and Motorola believes this makes it perfect for authentication purposes. Bio stamps use high-performance silicon, can The electronics devices gain more demand when stretch up to 200 per cent and can monitor tem- they are compact in size and best at functioning. perature, hydration and strain, among other The Artificial Skin is one such device which de- medical statistics. Javey’s study claims that while picts the beauty of electronics and its use in daily building sensors into networks isn’t new, interac- life. Scientists create artificial skin that emulates tive displays; being able to recognize touch and human touch. According to experts, the artifi- pressure and have the flexible circuit respond to cial skin is “smarter and similar to human skin.” it is ‘breakthrough’. His team is now working on It also offers greater sensitivity and resolution a sample that could also register and respond to than current commercially available techniques. changes in temperature and light to make the Bendable sensors and displays have made the skin even more lifelike. tech rounds before. We can predict a patient of Large-area ultrasonic sensor arrays that could an oncoming heart attack hours in advance. In keep both robots and humans out of trouble. future even virtual screens may be placed on An ultrasonic skin covering an entire robot body devices for knowing our body functions. Used could work as a 360-degree proximity sensor, in car dashboard, interactive wallpapers, smart measuring the distance between the robot and watches. external obstacles. This could prevent robot 4 from crashing into walls or allow it to han- dle our soft, fragile human bodies with more care. For humans, it could provide prosthetics or garments that are hyper aware of their sur- roundings. Besides adding multiple functions to e-skins, it’s also important to improve their 47 Inspecta Department of Instrumentation and Control Engineering, NSSCE

PICK AND PLACE COLOR SENSING ROBOTIC ARM ANAGHA BALAKRISHNAN, S2 ICE HISTORY The word “Robot” was coined from “Rabata”, which is a Czech translation for “Slave”. The definition of a robot is dynamic, depending on technological advancement. However, the Robotic Institute of America (1979) provided a definition that received general acceptance. Robotic Institute of America (RIA) defines a robot as a reprogrammable, multifunctional manipulator designed to move materi- als, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks.” A robot is a virtual or mechanical artificial agent. In practice, it is usually an electro-mechanical machine that is guided by computer or electronic programming and is thus able to do tasks on its own. Another common characteristic is that by its appearance or movements, a robot often conveys a sense, and the capabilities of a robot vary vastly, all robots share the feature of a mechanical movable structure under some form of control. This control of the robot involves three distinct phases: perception, processing, and action. In common the preceptors are sensors mounted on the robot. Processing is done by an onboard microcontroller or processor and action (task) is performed using a motor or with some other actuators. A robot is a multi-disciplinary ma- chine as its applications are not just limited to one field. In the space industry, robots (in form of space probes) are used in space exploration; in the defense department, robots are used as bomb discarding, and surveillance drones; in the medical field, assistive robots are used during a surgical operation. Robotics is an integral part of automating the flexible manufacturing system that one greatly in demand these days. Robots are now more than a machine, as robots have become the solution of the future as cost labor wages and customers demand. Even though the cost of acquiring a ro- botic system is quite expensive, with today’s rapid development and very high demand in quality 48 Inspecta Department of Instrumentation and Control Engineering, NSSCE

with International Standard Organization (ISO) standards, humans are no longer capable of such demands. Research and development of future robots are moving at a very rapid pace due to the constantly improving and upgrading of the quality standards of products. Robots and automation are employed to replace humans to perform those tasks that are routine, dangerous, complex, and hazardous area. In a world of advanced technology today, automation greatly increases production capability, improve product quality and lower production cost. Project aims at a fully automated material handling system. This can be done by using a color sensor interfaced with the Atmega328P Micro Controller Unit. It synchronizes the movement of the robotic arm to pick the objects moving on a conveyor belt. It aims in classifying the colored objects which are coming on the conveyor by picking and placing the objects in its respective pre-programmed place. Thereby eliminating the monotonous work done by a human, achieving accuracy and speed in the work. This robot involves color sensors that sense the object’s color and sends the signal to the microcontroller. The micro- controller sends the signal to various motors of the robotic arm to grip the object and place it in the specified location. Based upon the color detected, the robotic arm moves to the specified location releases the object, and comes back to the original position. PICK AND PLACE COLOR SENSING ROBOTIC ARM aims in classifying the colored object which is coming on the conveyer belt by picking and placing the object in its respective pre-programmed place. The Arduino UNO is the heart, it is an open-source prototyping platform. Its clone is a micro- controller board based on the ATmega328p. 5-12 volt power supply is used here to provide power to Arduino UNO, Robotic arm, and Conveyer belt. A power supply is an electrical device that supplies electric power to an electrical load. The primary function of the DC power supply is to convert AC power to required DC power. The conveyer belt is used here to move the object towards the sens- ing unit. A robotic arm and sensing unit are connected to the microcontroller. The robotic arm is a type of mechanical arm, usually programmable, with similar functions to a human arm. It picks the object and sorts it in the basket with the help of the signals in a microcontroller. The color sensor is used here as a sensing unit. It senses the frequencies of RGB color and sends the signal to the microcontroller. The microcontroller receives all the signals and provides an output with the help of the Arduino program. CONCLUSION Sorting objects through color sensors, the future advancements can be done by increasing the effi- ciency of the color sensor. This method is verified To be highly beneficial for automated industries. The sensors key component of the project which aids in distinguishing the objects. It synchronizes the movement of the robotic arm to pick the objects moving on a conveyor belt. It aims in clas- sifying the colored objects which are coming on the conveyor by picking and placing the objects in its respective pre-programmed place. This project has been effectively designed to handle the required task. It can identify the specific color of the and grab it and place it in a required area as the user with the help of RGB color sensor by sensing the color of the object. The two main tasks performed by the sensing section - Detection of objects and Color recognition. This system is fully controlled by the control unit and capable of picking objects and places them in the respective area. This cost-effective device was designed by the error from humans. This sorting device is very much useful in production areas and different types of household activities. Thus the robot with pick and place automation with color detection and distinction property is achieved suc- cessfully. The system could be used in industries for picking and placing objects efficiently and also for surveillance. With the interfacing of all the components on a single board, the system could be made compact reducing the size and making it more compact. 49 Inspecta Department of Instrumentation and Control Engineering, NSSCE

IMPACT OF E-WASTE ON OUR “hazardous household waste”. ENVIRONMENT As the technology improved, low initial cost, and Deepak TP, S2 ICE even planned obsolescence have to lead to a fast-growing surplus of electronic waste around The technical scenario of the world is changing the globe. Technical solutions are available, but rapidly. The consumption of electronic items has in most cases, a legal framework, a collection been immensely increased and is still increasing system, logistics, and other services need to be at a very high rate in every field of life. E-Waste is implemented before a technical solution can be the term used to describe old, end-of-life, or dis- applied. carded appliances using electricity. It includes computers, consumer electronics, fridges, etc. Surplus electronics have extremely high-cost which have been disposed of by their original differentials. A single repairable laptop can be users this includes computers, LCD/CRT screens, worth hundreds of dollars, while an imploded cooling appliances, mobile phones, etc. Cathode Ray Tube (CRT) is extremely difficult and expensive to recycle. This has created a difficult e-Waste is a loose category of surplus, broken, free-market economy. Large quantities of used or discarded electrical or electronic devices. The electronics are typically sold to countries with processing of electronic waste in developing very high repair capability and high raw material countries causes serious health and pollution demand, which can result in high accumulations problems due to lack of containment, as do un- of residue in poor areas without strong envi- protected landfilling ronmental laws. Electronic waste is of concern largely due to the toxicity and carcinogenicity of This definition of e-wastes includes used elec- some of its substances, if processed improperly tronics that are destined for reuse, resale, sal- Toxic substances in electronic waste may include vage, recycling, or disposal. Because loads of lead, mercury etc., surplus electronics are frequently increased (good, recyclable, and non-recyclable), several Carcinogenic substances in electronic waste public policy advocates apply the term “e-waste” may include Polychlorinated Biphenyls (PCBs). broadly to all surplus electronics. The United Capacitors, transformers, and wires insulated States Environmental Protection Agency (EPA) with or components coated with Polyvinyl Chlo- refers to obsolete computers under the term ride (PVC), manufactured before 1977, often 50 Inspecta Department of Instrumentation and Control Engineering, NSSCE


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook