Download presentation
Presentation is loading. Please wait.
Published byConstance Powell Modified over 9 years ago
2
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
3
1.ABSTRACT: This work describes a ARM processor-based data logging system using RedTaction to record the details of a particular person. The system is simple to use the data of a particular system is stored in a transmitter which will be in touch with a body of a person and a same data is prestored in a data base when a person comes in a contact with receiver the entire data of a person is fed to base system to be login and updated.
4
2.OBJECTIVE: The objective of this project is to give a better security system to transmit a data via body. Since there is no problem of hackers as our body itself acts as transmission medium and can be used more in the fields where there is a need to upgrade the security in times of high theft rate
5
WORKING PROCEDURE: 1.Transmitter sends data 2.Transmitting transceiver 3. creates a change in the field 4. Field from human body 5. dissipates into earth 6.Electric field is received 7.using sensing technology 8.Receiving transceiver 9. recognizes the change in the electric field 10.Sensing technology measures the weak electric fields induced. 11.Electro-optical crystal uses laser to convert and read the signal
6
3.BLOCK DIAGRAM:
7
4.METHODOLOGY: This module consists of RedTacton transmitter, RedTacton receiver, Driver, ARM controller unit and the Voice bank. RedTacton is a HAN; body of human being is used for transmission of signals. RedTacton transmitter consists of a DTMF encoder which generates both valid and invalid signals and can be transmitted through human body through the RedTacton receiver (DTMF decoder) for further processing. In RedTacton receiver by the use of DTMF decoder the transmitted signal is identified. The Redtaction transmitter consist a data of a person whose data is to be logged in when he touch to a redtaction receiver the data is transmitted and compares the corresponding data which is previously feded into controller.
8
As the transmitted signal is of very low voltage, buffers and drivers are used to send the received signal to the electromagnetic switch. Electromagnetic switch checks the received signal with the predefined valid code. If an invalid code is received and detected in the switch then the buzzer starts ringing indicating that an unknown person is trying to enter into a particular location. If a valid code is received, then only the switch sends the signal to the main control unit which is the microcontroller and data of log in is updated.
9
5.ADVANTAGES AND DISADVANTAGES: ADVANTAGES: 1.RedTacton does not require the electrode to be in direct contact with the skin. 2.Can transmit data at a rate higher than that of peer technologies. (max. of 10Mbps) and Security is more. 3.RedTacton transceivers are programmable and we can decide what to share with whom and what devices you communicate with. 4.Each communication occurs in separate channels. 5.Transmission speed does not deteriorate even though the number of users increases. And More secure than Bluetooth. 6. Data loss during transfer is less 7. Use of minimum amount of power (of some milli -volt range) 8. Superior than infrared technology & Wi-Fi
10
9. No problem of hackers. It is very hard to pick up stray electronic signals radiating from the body. DISADVANTAGES: 1.The obvious barrier to entry is that the cost and time to develop HAN TECH. is very expensive. 2. As a new technology HAN need to gain popularity among users to help pull the technology into the marketplace instead of having it pushed upon them. 3. Widespread marketing campaigns will need to be developed to highlight the benefits of HAN technology to facilitate its adoption. 4.It can be useful within few centimeters only
11
6.APPLICATIONS: 1.It can be used in corporate fields. 2.In bank security 3.In defense
12
7.CONCLUSION: The proposed RedTacton based data logging has been implemented successfully and is tested on hardware. Experimental results verify the effective developed operation. When we compare RedTacton with other technologies, it can give a better security since there is no problem of hackers as our body itself acts as transmission medium and can be used more in the fields where there is a need to upgrade the security in times of high theft rate. And no need to carry id’s where the system transmitter can fix to watch, chains or jewels.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.