CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

Slides:



Advertisements
Similar presentations
Shepherd school of Engg &
Advertisements

Chapter 2 Fundamentals of Data and Signals
WIRELESS POWER TRANSMISSION FOR MOBILE AND WHEELCHAIR CHARGING OF PHYSICALLY CHALLENGED PEOPLE PROJECT BY : REBECCA ROY.
CMP206 – Introduction to Data Communication & Networks Lecture 2 – Signals.
Chapter Two Fundamentals of Data and Signals
Finding objects. Prepared by: Laial Al Jeans Mais Dabous Supervised by: A.Jammal Kharoshah.
TOUCH SCREEN AND ZIGBEE BASED WIRELESS COMMUNICATION ASSISTANT
2 Way FM Car Starter Dan Owens April 12, 2005 Instructor: Dr. Pao-Lo Liu Department of Electrical Engineering University at Buffalo Course Requirement.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Local Asynchronous Communication
HOME AUTOMATION THROUGH ANDROID MOBILE. What is Home Automation?  Home automation involves introducing a degree of computerized or automatic control.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
Wendy Beatty Dianne Brotherson Rachel Corron RedTacton Personal Area Network.
 Introduction  Background-Human Area Network  Features Of Red Tacton  How Does Red Tacton Works  Mechanism Of Communication With Red Tacton  How.
By Bh.Phanindra Kumar. TECHNOLOGY is Making Things EASIER Day-By-Day. Our Concept is a Standing Example of the Same. RED TACTON Implies a Form of “GREENER.
Agenda  Introduction  Overview of Technology  HAN as a New Computing Realm  HAN & Technology  RedTacton  How It works  Features  Application 
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
REDACTION BASED ATM MONITORING SYSTEM USING MSP 430
Smart ATM Machine With Tamper Detection Using MSP430
XBee based Garbage pits monitoring system with information updating to the department Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Name Of The College & Dept
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
ARM Based Gas Leakage Detection System Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
A UTOMATIC DRUNKEN DRIVER AND DROWSINESS DETECTION SYSTEM Student’s Name with USN No. Guide Name HOD Name College Name, Dept.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
GPS And XBee Based Robot For War Field Surveillance
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
CSCI-235 Micro-Computer Applications The Network.
Student’s Name with USN No.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Name Of The College & Dept
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Smart Card And GSM Based Advanced Security System
Student’s Name with USN No.
GPS & GSM BASED CAR SECURITY SYSTEM. Student’s Name with USN No.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Speaking ARM for Blinds Student’s Name with USN No. Guide Name HOD Name College Name, Dept.
Data Communication & Networking. Data communication Not to be confused with telecommunication –Any process that permits the passage from a sender to one.
Name Of The College & Dept
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
By.  The main aim of this project is to get information about the condition of the baby, which is in ICU through blue tooth medium.  In earlier days,
CONTENTS : 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Fire Fighting Robotic Vehicle. Introduction:  It is designed to develop a fire fighting robot using RF technology for remote.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
D.L.PRASSANA KUMAR T.MAHENDAR SOFI SHAIK. ABSTRACT  This circuit turns on the horn of the bike to alert you of the impending theft if anybody tries to.
ARM Based Active Kiosk with Speech Student’s Name with USN No. Guide Name HOD Name College Name, Dept.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Electronic Eye Controlled Security System
XBee Based Industrial And Home Security System
OBJECTIVE AND FEATURES:
Overview Communication is the transfer of information from one place to another. This should be done - as efficiently as possible - with as much fidelity/reliability.
RAILWAY TRACK SNAP NOTIFICATION
Electronic Voting Machine Using MSP430 With Voice Feedback System
AUTOMATIC SPEED CONTROL BASED ON ZONES
Name Of The College & Dept
Design Of Low-Power Wireless Communication System Based On MSP430
Smart Zone Sensing With Auto Breaking System Using ARM
Presentation transcript:

CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

1.ABSTRACT: This work describes a ARM processor-based data logging system using RedTaction to record the details of a particular person. The system is simple to use the data of a particular system is stored in a transmitter which will be in touch with a body of a person and a same data is prestored in a data base when a person comes in a contact with receiver the entire data of a person is fed to base system to be login and updated.

2.OBJECTIVE: The objective of this project is to give a better security system to transmit a data via body. Since there is no problem of hackers as our body itself acts as transmission medium and can be used more in the fields where there is a need to upgrade the security in times of high theft rate

WORKING PROCEDURE: 1.Transmitter sends data 2.Transmitting transceiver 3. creates a change in the field 4. Field from human body 5. dissipates into earth 6.Electric field is received 7.using sensing technology 8.Receiving transceiver 9. recognizes the change in the electric field 10.Sensing technology measures the weak electric fields induced. 11.Electro-optical crystal uses laser to convert and read the signal

3.BLOCK DIAGRAM:

4.METHODOLOGY: This module consists of RedTacton transmitter, RedTacton receiver, Driver, ARM controller unit and the Voice bank. RedTacton is a HAN; body of human being is used for transmission of signals. RedTacton transmitter consists of a DTMF encoder which generates both valid and invalid signals and can be transmitted through human body through the RedTacton receiver (DTMF decoder) for further processing. In RedTacton receiver by the use of DTMF decoder the transmitted signal is identified. The Redtaction transmitter consist a data of a person whose data is to be logged in when he touch to a redtaction receiver the data is transmitted and compares the corresponding data which is previously feded into controller.

As the transmitted signal is of very low voltage, buffers and drivers are used to send the received signal to the electromagnetic switch. Electromagnetic switch checks the received signal with the predefined valid code. If an invalid code is received and detected in the switch then the buzzer starts ringing indicating that an unknown person is trying to enter into a particular location. If a valid code is received, then only the switch sends the signal to the main control unit which is the microcontroller and data of log in is updated.

5.ADVANTAGES AND DISADVANTAGES: ADVANTAGES: 1.RedTacton does not require the electrode to be in direct contact with the skin. 2.Can transmit data at a rate higher than that of peer technologies. (max. of 10Mbps) and Security is more. 3.RedTacton transceivers are programmable and we can decide what to share with whom and what devices you communicate with. 4.Each communication occurs in separate channels. 5.Transmission speed does not deteriorate even though the number of users increases. And More secure than Bluetooth. 6. Data loss during transfer is less 7. Use of minimum amount of power (of some milli -volt range) 8. Superior than infrared technology & Wi-Fi

9. No problem of hackers. It is very hard to pick up stray electronic signals radiating from the body. DISADVANTAGES: 1.The obvious barrier to entry is that the cost and time to develop HAN TECH. is very expensive. 2. As a new technology HAN need to gain popularity among users to help pull the technology into the marketplace instead of having it pushed upon them. 3. Widespread marketing campaigns will need to be developed to highlight the benefits of HAN technology to facilitate its adoption. 4.It can be useful within few centimeters only

6.APPLICATIONS: 1.It can be used in corporate fields. 2.In bank security 3.In defense

7.CONCLUSION: The proposed RedTacton based data logging has been implemented successfully and is tested on hardware. Experimental results verify the effective developed operation. When we compare RedTacton with other technologies, it can give a better security since there is no problem of hackers as our body itself acts as transmission medium and can be used more in the fields where there is a need to upgrade the security in times of high theft rate. And no need to carry id’s where the system transmitter can fix to watch, chains or jewels.