Premium Essay

Nt1310 Unit 3.3

Submitted By
Words 652
Pages 3
3.3 SYSTEM OVERVIEW
3.3.1 INFRARED SENSORS IR Sensors work by using a specific light sensor to detect a select light wavelength in the Infra-Red (IR) spectrum. By using an LED which produces light at the same wavelength as what the sensor is looking for, you can look at the intensity of the received light. When an object is close to the sensor, the light from the LED bounces off the object and into the light sensor. This results in a large jump in the intensity, which we already know can be detected using a threshold.

Fig 3.3.1 Working of Infrared Sensors

3.3.2 USB DONGLE A dongle - also called an internet dongle - is a small USB device that is used to access the internet. It can be referred to as a dongle, …show more content…
This USB dongle is connected to USB port of Raspberry Pi Model B+ kit for its proper functioning.

Fig 3.3.2 USB dongle attached with Raspberry Model B+ kit

3.3.3 RASPBERRY PI MODEL B+ KIT The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard keyboard and mouse. The Raspberry Pi Model B+ kit is connected to the IR sensors so as to record its output. To achieve this purpose one of the wires soldered to LED is connected to GPIO pin in the kit and the other pin is connected to Ground pin of the kit.

LIRC which stands for Linux Infrared Remote Control in the Raspberry PI Model B+ kit helps in achieving this purpose.

Fig 3.3.3 Raspberry Pi Model B+ kit used to detect IR sensors

3.3.4 DATABASE A database is used to store the information regarding the bins that are completely filled. It can be used for future references if required.
TABLE I. DATABASE SAMPLE
ID …show more content…
Fig 3.3.5Amorphous silicon solar panels

PROPOSED MERITS
Needs no man power for operation purposes. Even if the common public neglect to report to the municipal regarding waste collection, this automated system monitors the waste and informs the waste collection department on its own.

FUTURE ENHANCEMENTS
The size of solar panels used for power optimization is the future enhancement of this paper.

CONCLUSION
This paper describes a model using an automated system which reduces manual labor. Unlike the traditional smart bins manufactured by green tech life it does not involve manual labor. Use of internet has become popular. Hence we conclude that this way of employing different technologies for collecting waste will be productive for the public and helps in maintaining a tidy environment as well. In current scenario nearly 1 lakh rupees is invested for setting up of a single garbage bin whereas the smart bins setup does not even sum to one tenth of its total cost. Though garbage bin is present a tidy environment cannot be guaranteed because there are possibilities of the bins to overwhelm out of waste. In the case of smart bins this issue is overcome due to

Similar Documents

Premium Essay

Nt1310 Unit 3.3 Testbed Set Up

...3.3 Testbed Setup The BLE system which will be used to evaluate the position approaches will be divided into two parts; these will be hardware components and software components. Within this sections a description of the components and decisions on implementing will be provided for each of the two parts. 3.3.1 Hardware The main components I will need for the evaluation of Bluetooth Low Energy are sensor tags which will be deployed as beacons in the test environment and a mobile device which will be used to gather data to be used for positioning algorithms. Both the BLE beacons and Mobile device are described below. 3.3.1.1 Bluetooth Low Energy Beacons Bluetooth Low Energy Technology has been thoroughly studied through the CC2541 SensorTag Development Kit. A study of the key characteristics of the BLE needed to be carried out prior to starting the project Testbed, because it described how the application would work....

Words: 425 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 3.3 Research Paper

...Abstract—One main advantage of open-source technologies such as Linux is the increased security. In this paper we will discuss the type of attacks on operating system Linux Kernel such as side channel vulnerability, introduced in a recent TCP specification (RFC 5961) fully implemented in Linux kernel version 3.6, how it is spreads and what are its impact. This vulnerability allows a blind off-path attacker to infer to any two hosts on the Internet that are communicating using a TCP connection. Such an off-path attacker can also infer the TCP sequence numbers in use, from both sides of the connection; allowing to cause connection termination and perform data injection attacks. The proposed elimination methodology to the cause of the problem are also discussed. Keywords: Operting system: security attacks; denial of service; TCP attack. I. INTRODUCTION Off path TCP attack is a vulnerability that resides in the design and implementation of RFC 5961, a new internet standard that's intended to prevent certain hacking attacks. The protocol is designed in such a way, it can easily open internet users to blind off-path attacks, hackers anywhere on the internet when any two parties are communicating over an active TCP connection. Attackers can shut down the connection, by injecting malicious code content into unencrypted data streams. The introduction of RFC 5961 makes this exploit much more powerful because the attacker need only an internet connection, even when there's no man in the...

Words: 1290 - Pages: 6

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nt 1210

...internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18