You are on page 1of 113

Automatic Vehicle Authorization & Detection with Remote

Engine locking
Students: Rizwan khan, Asad khan, sarfarz,shah Murad, Syed Mudassir
Department of Electronics Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
rizwan.04@outlook.com

Abstract - Today specially in developing countries like Our system consists of four components
Pakistan, the car theft on parking or any other public places has The RFID detection system.
increased. The vehicle safety is extremely essential because these The theft detection system.
vehicles are then used for suicide bombing or any other harmful
Real time tracing system.
activity. Security system must be installed in the vehicle to trace
the place and status and locking engine motor system can End user application .
contribute a lot to minimize the vehicle theft. Location of the III. METHODOLOGY
vehicle is identified by Global Positioning System (GPS) and
Global system for mobile communication (GSM). The system The block diagram of vehicle Authorization, tracing and
gives information about the moving vehicle constantly. The locking system based on GSM and GPS technology. It
security of any organization is priority of the authorities. For consists of power supply section LCD display, motor Driver,
this purpose, only the vehicle with a valid RFID tag is only IR transmitter, IR receiver, max -232 GSM, GPS, buzzer
allowed to the organization. The RFID contains the information relay android mobile. The power supply gives 5v dc to the
about the corresponding vehicle. Each RFID has its own
circuit. IR transmitter transmit IR signal and IR receiver
information. If a valid tag is swiped, then the system displays a
message AUTHORIZED else it states UNAUTHORIZED receives that Signal and IR .the relay acts as a switch for
and doesnt allow access the vehicle in to the organization. In engine ignition. Buzzer is used for making Alarm when
theft mode when UNAUTHORIZED person access the vehicle, unauthorized person starts the vehicle. Bluetooth module is
the microcontroller needs user authentication through SMS, if connected with microcontroller of Arduino. Arduino sends
the person is not authorized then the engine motor locks the and receives messages to android module. the Android
engine. module contain GSM and GPS which allow us to trace the
I. INTRODUCTION location and also communication with cloud services.
Our project deals with vehicle authorization, tracking and
engine locking. The main objective of the project is to provide
security for the organization to allow only those vehicles
which are authorized. This system provides better security for
an organization because through RFID only those vehicles
can enter the organization which is authorized and has
information of the RFID stored in the data base can be
allowed by automatic opening and closing gate. The vehicle
which has no information stored in the database will require
authentication and verification to enter. Due to the fact that
vehicle theft increases day by day vehicle should have
efficient security system that warns the owner by the theft
detection by sending SMS to the owner.
II. PROBLEM STATEMENT
Fig1 :Block diagram 1
Our country is facing high security crisis in recent time. We
need promising security solutions where security is a priority 1) Vehicle Authorization System:
for the authorities like In military zones, In Schools, The vehicle authorization system includes IR transmitter. IR
Universities, Hospitals etc. Most Important for terrorism. module transmits the information of the corresponding
Incident of car theft are on rise in our country. Every year 15 vehicle. Vehicle model number, number plate, color etc. The
to 20 thousand vehicles are stolen. An RFID tag vehicle can information is received by the IR receiver which will be fixed
also be stolen which can be very dangerous. at entrance and send and compare the Information with the
entities stored in the database if the received information is
1) System Design: present in the database. Then the information of the
corresponding car will be shown LCD then the

1 | FICT URC1-2016
microcontroller send signal to the motor and the gate will be In this paper, we have proposed a novel method of vehicle
open. Allowing the vehicle to enter. If in case the tracking and locking systems used to track the theft vehicle by
informations received by the receiver not present is the data using GPS and GSM technology. This system is in active
base the microcontroller will send signal to motor and the mode whenever the user leaves the vehicle and in any case of
gate will remain close and red LED will glow up warning that intrusion the system will detect it and inform the owner.
the vehicle is not authorized and cannot enter. Owner can control his vehicle remotely using is android
device. When the theft identified, the owner can send SMS to
the micro controller, then issue the control signals to stop the
engine motor. After that all the doors locked. To open the
doors or to restart the engine authorized person needs to enter
the passwords. In this method, easily track the vehicle place
and doors locked.
REFERENCES:

[1] R. Ramani1, S.Valarmathy, Dr.N.SuthanthiraV anitha1 S.Selvaraju,


M.Thiruppathi, R.Thangam Vehicle Tracking and Locking System BaseId
on GSM and GPS
[2] Automatic gate opening system for vehicles with RFID or PASSWORD.
Electronics & Communication Engineering, Gujarat Technical University
Bharuch, Gujarat, INDIA.
[3] Government College of Engineering/Department Electronics and
Telecommunication, Amravati (Maharashtra), India.
[4] Vehicle Tracking and locking system based on GPS and GSM. Department
of Electrical and Electronics Engineering, Knowledge institute of
technology, Tamilnadu, India.
Fig2: block diagram2

2) The theft detection system:


The theft detection system includes detection system with user
authentication. The android module in the car has predefined
message, the owner has the ability to change the message. If a
person tries to start the engine, the microcontroller sends a
message to the owner to allow the engine to start or not. If the
person is unauthorized the owner in reply sendsNO,on
receiving NO,message the microcontroller send the signal
to engine motor and the engine will lock. Unfortunately if due
to network problem the owner receives SMS a little bit later,
in this case a time frame is setup in which within the given
time if owner does not reply to microcontroller then the
engine will be lock automatically after that predefined time. If
someone successes in runaway the vehicle within the
predefined time then with the GPS technology the place and
status of the vehicle can be traced and the vehicle can be
recovered.
3) Real time tracking system:

Real time tracking system consists of a satellitte based GPS


receiver, which is present in android module in the car. The
owner can trace his vehicle`s location using the end user
application on his android device. The cars accurate location
can be find out by calculating accurate measurements from
both network and GPS receiver.

IV. CONCLUSION

2 | FICT URC1-2016
Characterization of Textile Based Strain
Surjeet Kumar,Sundus Afzaal,Muhammad Junaid Sultan,Muhammad Junaid
Department of Electronics Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
surjeetkhurana9@gmail.com, kjunaid78@yahoo.com, afzaalsundus@gmail.com, m.junaid@buitems.edu.pk

Abstract - Human Body signals are source of useful data


measurement through these two sensors was explained. To
that can be used for gesture/posture recognition, electronic
obtain human body data, gesture/posture recognition sensors
sensors are embedded in clothing for measuring these signals but
must be embedded into the clothing or worn as saperate units.
they cause discomfort to the wearer. Textile based strain, bend
The main drawbacks of wearable sensing systems available on
and tactile sensors are better alternatives to electronic sensors in
the market are their weight, the rigidity of the fabric which
context of comfort and wear-ability. In this work knitted strain
they are made of, the dimension of the sensors used, and all
sensors of three types are compared with each other. . Aim of
the other properties which make them obtrusive. In particular,
the research is to analyze the effects of base yarn/substrate
conventional sensors often require the application of complex
(cotton, polyester), elastic (Lycra), and conductive yarn
and uncomfortable mechanical plugs in order to position the
(polyester yarn blended with stainless steel) ratios on sensors
sensors on garments [3].Textile based sensors best fit into such
sensitivity, linearity, hysteresis and stability. 16 different samples
environment, and many works have shown their applicability
are designed using different ratios of the three materials on an
in bending, stretching and tactile sensing[4]. Highly sensitive
electronic flat knitting machine. Sensitivity and linearity factors
carbon microcoils were used for tactile sensing in [4].
were analyzed using gauge factor and coefficient of linear
regression values respectively. Hysteresis and repeatability
analysis were also performed for each sensor.
II. METHODOLOGY

KeywordsInterlocked; Hystersis; Stability; Linearity; Gauge 1) Textile Structure


Factor The knitting structure for each sensor was designed on the
CAD/CAM software, 9 different samples (3 of each type) with
I. INTRODUCTION different ratios of conductive material, elastic material and
Our bodies continuously radiate data, this data contains base substrate were made on electronic flat knitting machine in
valuable information. This data can be used to monitor health, NTU Faisalabad. Each sample was 15cm in length and 3cm in
improve sports performance, HMI and HRI technology. For width. Tables 1 shows the specifications of each sample.
acquisition of this data electronic sensors like accelerometers
and gyroscopes are embedded in clothing. But these sensors TABLE I
are not suitable for the wearable environment and cause
discomfort to the wearer. Textile based sensors provide Sensor
Number of conductive layers Lycra
solution to this problem, these sensors are durable, flexible, type
unobtrusive and comfortable. 1 1 1
2 1 2
Electronic textiles is a major growing research area,
especially textile based bend and stretch sensors are being 3 1 0
studied and employed in gesture and posture recognition 2) Sensor Evaluation
systems. In this paper we have compared strain sensors of two Sensors were elongated up to 33% using Universal tensile
different knitting structures. We also analyzed effects of machine, resistance values corresponding to each millimeter
different combinations of conductive yarn (80% polyester, of length for 5 complete stretch and recovery cycles were
20% steel), base yarn (polyester/cotton yarn) and elastic recorded with accuracy of 1mm using ATmega2560
material (Lycra) on the performance of the sensors. Lycra was
microcontroller. Hysteresis, gauge factor, repeatability and
chosen because of its lightness, elasticity, and adherence. In
past few years several aproaches have been used to gather linear regression analysis of the sensors were performed using
useful data from human motion, kinect sensors based MS excel.
motion/gesture/posture recognition became a sensation, human IV. RESULT & DISSCUSION
motion recognition through a kinect sensor was studied in [1]. The results in figures 1, 2, 3 and tables 2 shows that these
Kinect sensors have few drawbacks i.e. they are costly, it may sensors have high values of R2 and Gauge Factor, this shows
not work properly in dyanamic surrounding environment. that these sensors have high sensitivity and linearity. These
Accelerometers, electro goniometers and gyroscposes are sensors have high resistance which is a benefit because it
widely used electronic sensors for motion/gesture/posture reduces power consumption as compared to low resistance
detection, in [2] joint angles sensors.

3 | FICT URC1-2016
TABLE II are low cost and highly flexible in wearable environment. Our
Sensor
Gauge Factor Standard error R2
knitted sensors were developed with plain knitting technique,
type we used conductive polyester blended with stainless steel yarn
1 -2.022695 0.021109 0.9922 and Lycra yarn. The sensors shown high values of linear
regression coefficient (R2), this means the sensors have linear
2 -1.727667 0.038333 0.9115
relationship between resistance and strain. Also higher values
3 -1.795837 0.081089 0.9949 of Gauge Factor (GF) show that the sensors are highly
sensitive. All these results show that these sensors can be
applied in breathing monitoring systems, elbow and knee
bend measurement systems, gesture controlled automation
systems etc.

REFERENCES

[1] O. Atalay, A. Tuncay, M. D. Husain, and W. R. Kennon, "Comparative


study of the weft-knitted strain sensors," Journal of Industrial Textiles,
December 10, 2015 2015.
[2] G. Ye, D. Ha, O. Yongsheng, and S. Weihua, "Human gesture recognition
through a Kinect sensor," in Robotics and Biomimetics (ROBIO), 2012
IEEE International Conference on, 2012, pp. 1379-1384.
[3] C. Peng and B. Oelmann, "Joint-Angle Measurement Using Accelerometers
Fig. 1 Resistance Strain curve for sensor 1. and Gyroscopes—A Survey," Instrumentation and Measurement,
IEEE Transactions on, vol. 59, pp. 404-414, 2010.
[4] E. T. M. C. D. P.J. McCullagh, "Personalised Health Management Systems
The Integration of Innovative Sensing, Textile, Information and
Communication," vol. Technologies Volume 117 2005.

Fig. 2 Resistance Strain curve for sensor 2.

Fig. 3 Resistance Strain curve for sensor 3.

IV. CONCLUSION

Strain sensing through textile sensors has been studied widely


and it has shown applicability in many fields including sports
and healthcare however these sensors are developed through
cumbersome and costly industrial processes. Hand knitted
strain sensors on the other hand can easily be developed, they

4 | FICT URC1-2016
Dynamic Model And Controller Design;For Two-Wheeled
Self-Balancing Robot Using Arduino
Danish Ali, Ayesha Ahmed, Mansoora Ali, Rizwan Ashfaq,Muhammad Junaid
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Danishaligondal@yahoo.com

Abstract -A two-wheeled self-balancing Robot is, inherently fused together to get and estimated tilt angle free from noise
an unstable and non-linear system, developed using an Arduino and drift. The robots controller block contains the respective
Microcontroller board. Dynamical model of robot is constructed controller Algorithm, PID or LQR. Balancing robot contains
in MATLAB, also the simulation results are obtained in it and all the circuitry, sensor, and controller board hardware to
the characteristics of robot model are studied and two different
steer the robot to maintain its vertically upward position.
controllers are developed and tested in MATLAB and
controllability, observability is checked. PID controller is
implemented on the robot. Further to improve stability the
complementary filter is applied to the sensor data and
reasonable settling time is achieved.
Index Terms - Two-wheeled robot, Microcontroller board,
controllability, stability and observability.

I. INTRODUCTION Fig 1 Control system of robot.

These researches on two-wheeled self-balancing robot A. Mathematical Model [8].


have gained momentum over the past decades since it is
inherently an unstable and highly non-linear system.
Furthermore it has certain advantage over the traditional four
wheeled robots. It can turn sharp corners, it can provide spin
on a single point, it allows easy navigation on various uneven
terrain. This technology has potential to solve many other (1)
problems. For example a two-wheeled chair will provide 2 Iw

2Mw
Iw
MP Ip 2Mpl 2 Mw
(2)
higher maneuverability and access to short and uneven r2 r 2

terrain. One such product is commercially available that is
Segway, invented by Dean Kamen, is capable to balance a Where, x Displacement, - Displacement velocity,
human on. This technology uses five gyroscopes and tilt Angle, - Angular velocity, - Parameters position, -
sensor. [1]. Another research project named JOE also Linear Motion acting on center of wheel, - Angular motion
demonstrated the control of unstable inverted pendulum acting on wheel..
system. This robot is made up of two states space controllers B. Design Specification
as it is a 3-degree of freedom control design which is able to
control linear straight line position, straight line speed, pitch Table 1. Hardware parameters specification
angle, pitch rate, yaw angle and yaw rate. [2]. Another two- Gravitational acceleration (m/s2) g 9.81
wheeled self-balancing robot named LEGWAY using LEGO Mass of body (kg) Mp 2
Mindstroms kit, two electro-optical proximity detectors Radius of wheel (m) r 0.04
(EOPD) that provides titl angle information of robot and
programmed in C/C++ language. [3][4], [5]. The tilt angle Mass of wheel (kg) Mw 0.015
can be sensed either by accelerometer or Gyro. Since the Inertia of wheel (kg m2) Iw 0.000036
accelerometer is more sensitive to high frequency noise and
Gyro is prone to drift. Alone neither accelerometer nor Gyro Inertia of body (kg m2) Ip 0.00845
can provide accurate angle estimation so the Kalman filter or Length of COG (m) l 0.07
the complementary filter needs to be applied [6][7].
Motor torque constant (Nm/A) Km 0.098
II. CONTROL SYSTEM
Motor back EMF constant Ke 0.024
As shown in figure 1. The tilt angle and angular rate is (V/rad/s)
measure from the sensors and to the complementary filter and C. Controller Design

5 | FICT URC1-2016
In this paper the two controller are studied and designed in 0.7
PID tunned Tilt angle

MATLAB and response curves are presented. Only the PID 0.6
Tilt Angle

controller is implemented on the hardware.


0.5
1) LQR design
0.4
Linear quadratic controller method is used for optimal control
0.3
systems. Unlike conventional controllers, it takes input power

Angle(rad)
into. u(t)=-Kx(t) is the control signal and K is the required 0.2

gain matrix. Q and R are weighted matrix for x and u. from 0.1

the (3) K is calculated. 0

K R 1 B T P (3) -0.1

The R and Q diagonals are R=1 and Q=[1000 1 6000 1]. The -0.2

response curves are presented in figure 6. 0 2 4 6 8 10 12


2) PID Controller Time(s)

PID as name suggests, is constructed by proportional, integral Fig 2. PID tuned tilt angle response
and derivative element. The suitable values of KP, KI and KD
must be chosen to guarantee the system stability. The discrete
PID controller is implemented on two-wheel self-balancing
robot in equation (4).
e(n) e(n1) (4)
u(t) Kpe(n) Ki[e(n) (e(n) e(n1))Ts] Kd[ ]
Ts
3) Complementary Filter
It removes noise from the accelerometer data and eliminate
drift from the gyro data and ultimately the performance of
robot is improved.
Angle A * ( Angle gyro * dt ) ((1 A) * x _ acc) (5)
Where A is filter constant and calculated as.
Fig 3. Physical Model
A
dt (6)
III. CONCLUSION
Where is the filter time constant and taken as 0.8 sec. dt
step size and calculated value is 1 s in this paper. gyro is the From the results it balancing is claimed and satisfactory
angular rate from the gyro sensor and x-acc is the results are obtained alone with PID controller. The PID &
accelerometer x-axis value that is the tilt angle value. LQR combined can yield better results and it is proposed as a
future work. Other than this, the uncertainty or the non-
linearity in the model should be included. The roll and yaw
II. RESULTS AND DISCUSSION
control be included in model as well. The motors with
Table 2. MATLAB Gain Values encoders can be used instead of simple geared motors and the
Controllers 2% Percentage Gain values information regarding positions of robot can be considered in
settling Overshoot model which further improves the stability of robot.
time
LQR 1.88s 6% -31,19,242,18 REFERENCES
PID 1.53s 23.3% 1051,1382,34
[1] H. Transporter and V. Loucks, A more detailed discussion of the Segway
development is contained in the book, no. January 2001, 2004.
[2] F. Grasser, A. D. Arrigo, S. Colombi, and A. Rufer, JOE: A Mobile ,
Table 2 shows MATLAB designed controller results. Its Inverted Pendulum.
shows that PID is fast with larger overshoot and higher gain [3] B. Bonafilia, N. Gustafsson, P. Nyman, and S. Nilsson, Self-balancing
two-wheeled robot, 1998.
values and LQR is slower but with smaller overshoot and [4] L. Sun and J. Gan, Researching of two-wheeled self-balancing robot base
lower gain value and at lower energy expense. on LQR combined with PID, Proc. - 2010 2nd Int. Work. Intell. Syst. Appl.
Fig 2 shows the robots output tilt angle response subject to ISA 2010, pp. 15, 2010.
disturbances at different time intervals. It can be seen that [5] Z. Hu, S. Wei, and Q. Liao, Design of LQR and PID Controllers for the
Self Balancing Unicycle Robot, no. July, pp. 972977, 2014.
robot balances itself upward within 1.66 s which is close to [6] D. Simon, Kalman Filtering, Embed. Syst. Program., no. June, pp. 72
simulated PID value. Hence robot is stabilized by applying 79, 2001.
PID controller and satisfactory results are obtained. [7] B. Mccarron and B. Mccarron, Low-Cost IMU Implementation via
Sensor Fusion Algorithms in the Arduino Environment, no. June, 2013.
[8] R. C. Ooi, Balancing a Two-Wheeled Autonomous Robot, pp. 172,
2003.

6 | FICT URC1-2016
Fabrication of Sowing, Spraying & Harvesting Controlled
Robotic Vehicle
Muhammad Arif, Muhammad Usman, Shahzaib Chauhdary, Muhammad Rizwan
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
engr.arifhussain5@gmail.com , usmaneng9@gmail.com , shahzaibch93@gmail.com, rizwansalar@gmail.com
Arduino Mega board having At Mega 2560 microcontroller.
Abstract - Agriculture is an important and oldest economic The task
activity for humankind. At present, the world is adopting modern
technologies, by converting all the old and time consuming performed by this robot were similarly to the previous ones i.e.
methods to modern techniques and automation. In the same way seeder, weeding and fertilizer but the new idea that was try to
the revolution is taking place in the field of agriculture. Robots
achieve was that to make the multiple arrangements of these
are being used as a substitute of human labour or to do efficient
work with precision in industry and in agriculture field. The types of robots which can communicate with each other. The
demands of robots in the field of agriculture to assist farmers first robot told about its action. Although that can be achieved
have become important. In our project the wirelessly controlled in this project but the new approach of robots sharing of
robotic vehicle is a prototype and designed for performing information was given [5]. A vision system based crop rows for
different tasks in the field of agriculture such as harvesting of agriculture mobile robot was developed for the detection of the
specific crops, spraying for pesticides and the seeding in the rows in the field. The robots has a camera interface that sends
ploughed field. PIC-18F452 Microcontroller is used. Bluetooth the images taken from the farms. The data is send to the
module is used for transmitting and receiving unit. receiver end by using the global positioning system (GPS). The
Index Terms - Robot, microcontroller, Bluetooth wireless robot takes the images and process that images by using the
technology. quasi line method. Through this method most efficient rows
tracking is possible [6].
I. INTRODUCTION II. PROBLEM STATEMENT
The idea of applying robots in agriculture is not new but The so far robots related to an agriculture filed can only do the
there is huge possibility that the robots will increase the single task that is either sowing or spraying. A multipurpose
productivity and they become the essential part of forms. The robotic vehicle in which snowing, spraying and harvesting are
importance of agriculture robot can be understand through the not available in a single unit is not present in the literature. We
article in The Guardian which state that Robot farmers are the are trying to implement it in a single unit, with light in weight,
future of agriculture. Robot are able to sow the seeds without flexible, easy to use for uneducated person and easy to maintain
monitoring the soil, the robot sow the seeds and harvest the and upgrade.
plant. The system cannot monitor the parameters therefore the A) Simulation and Software:
efficient growth was not possible [1]. Robot for the paddy The programing part is consists of two part, one is the android
weeding was used for the sowing of rice. These robots have phone app as a transmitter, other is for the receiving unit, as
made specified length and width between the plants. The robot shown in the flow chart diagram of designed prototype given
has powered motors that they can run on the rough and muddy below. The transmission of the commands is performed by the
land. It maintains the vertically and horizontal distances android app in which multiple commands are predefined. The
among the plants. It can only place the plants in a rows, it command is transmitted wirelessly and at the receiver end the
hasnt the ability about the diseases, unwanted plants etc. [2]. command is read and the desire task is performed.
For the control of robot wirelessly the ZigBee-assisted Mobile
Robot Gardener was developed this robot have three wheels the III. METHODOLOGY:
central can move the robot. This robot can only do the specific
This project is wirelessly controlled. Calculations were made
tasks which was only to spray on the plants. The robot have
like the size, shape and actuators (used for seeding, and
multiple sensors that is for the range finder and for the
harvesting for vehicle. Based on calculations the program was
obstacle. Robot have a receiver module the transmitted module
coded using mikroC PRO for PIC. The project is divided into
can give the command to the robotic vehicle through which it
two unit. First unit consist of a Android app which transmits
can move and spray. [3] The robot using the renewable energy
specific commands as per desire of the user, the simulation was
i.e. solar energy was developed with the theme of Green
done in Proteus 8Professional, the transmitter units controller
Energy-Green Revolution. The robot uses the arrangement of
(Android app) observes the specific inputs and based on the
solar panel with the charge carrier that recharge the battery to
program debugged in app the data is transmitted using
run the robotic vehicle and performs the task. The tasks that
Bluetooth (wireless medium). Second the receiving unit is a
this robot can perform was spray and the removing of the weed.
robotic vehicle designed for performing different tasks in field,
The robot can only removes the weeds which comes between
receives the data which is transmitted by the Android phone
the two plants. The distance should be 30cm between the plants
(transmitting unit). The vehicles main controller works on that
if some plant appear with in this distance the weed remover
data and as per checks made in the programing debugged in
remove it. [4] The Wi-Fi robot was developed that has six legs
the controller for the movement and other tasks are performed.
arrangements controlled by a servo motor. This robot uses the

7 | FICT URC1-2016
database through which we can check the condition and the
performance remotely.

REFERENCE
[9] Kumar, Gurrala Ajay, M. Ramya, and C. Ram Kumar. "Wedding of robots
with agriculture." Computing Communication & Networking Technologies
(ICCCNT), 2012 Third International Conference on. IEEE, 2012.
[10] Yoon, B., & Kim, S. (2013, October). Design of paddy weeding robot.
InRobotics (ISR), 2013 44th International Symposium on (pp. 1-2). IEEE.
[11] Chang, C.L. & Jhu, J. H. (2013, December). Zigbee-assisted mobile robot
gardener. In Automatic Control Conference (CACS), 2013 CACS
International(pp. 41-46). IEEE.
[12] Jothimurugan, P.Saravanan, J. M., Sushanth, R., Suresh, V., Subramaniam,
H. S., Vasantharaj, S., & Yogeswaran, S. (2013,April).Solar E-Bot for
Agriculture. In India Educators' Conference (TIIEC), 2013 Texas
Instruments(pp. 125-130). IEEE.
[13] Amer, G., Mudassir, S. M. M., & Malik, M. A. (2015, May). Design and
operation of Wi-Fi agribot integrated system. In Industrial Instrumentation and
Control (ICIC), 2015 International Conference on (pp. 207-212). IEEE.
[14] Jiang, Guoquan, and Cuijun Zhao. "A vision system based crop rows for
agricultural mobile robot." Computer Application and System Modeling
(ICCASM), 2010 International Conference on. Vol. 11. IEEE, 2010.

Figure 1 flow chart of designed prototype

IV. RESULTS AND CALCULATION


From the proposed content the entire prototype of robot was
successful. The mechanical test is made for the speed, weight,
spraying, seeding and for the harvesting. Through the
mechanical test we have found that the speed of vehicle
depends on the battery charge and moisture in the field, and the
speed will increase when we do spraying because the weight of
spraying unit decrease continuously. The cutting unit cut the
crops at about three inches from the roots and the residue effect
the movement of robot. We can compare the performance of
robot with the most common agriculture robot.
Through comparison from table 1, we conclude that robot is
better than tractor and can take part in the field more
effectively.

Table 1 : Comparison between agriculture Robot and Tractor

S# Parameter Tractor Robot


1 Weight More Less
2 Price More Less
3 Seed wastage More Less
4 Required energy More Less
5 Maintenance More Less
cost
6 Accuracy Moderate More
7 Man power Moderate less

V. CONCLUSION AND FUTURE WORK


The agriculture robots are mainly designed in order to decrease
the working time and assist the farmers. We implement a
multipurpose project and try to satisfy the needs. We have
successfully simulated three parameter sowing, spraying and
harvesting in a single unit.
In the future, we can introduce the artificial intelligence and
built a network of multiple robots which are then connected to

8 | FICT URC1-2016
Gesture Based Robotic Vehicle Using Accelerometer
ADXL335
Muhammad Salar Mughal, Umair Ahmed, Muhammad Bilal Afzal, Syed Mudassir
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Sprumair@gmail.com

Abstract -In our work, gesture of the user controls the movement of mobile robots. Both unit gesture unit and mobile
movement of the robot vehicle. The developed system is unit are powered up by separate battery source.
classified into gesture unit and mobile robot unit. The gesture
unit consists of PIC 18f452 microcontroller which monitors the
direction of a hand and transmits the corresponding control
signal to the mobile robot unit. The mobile robot unit also
consists of PIC 18f452 microcontroller for controlling the
movement of mobile robots. In the gesture unit PIC
microcontroller is assisted by accelerometer and RF MODULE
for reading gestures. Similarly, in mobile robot unit PIC
microcontroller is assisted by peripherals like RF MODULE
and L293DNE. Both the units are powered up by separate
battery source. This proposed system is developed at low cost
with better efficiency in many fields such as industries, medical,
traffic system etc. It can be implemented in many other
applications such as TV, Video games, toys, wheel chair to assist Figure 1: Movements of Hand
handicapped people etc.

I. INTRODUCTION
In our work we have developed gesture based robotic
vehicle which is most reliable in vehicle movement. Through
this system you can control far objects wirelessly i-e vehicle
just by tilting of your hand. It consists of two basic module
gesture unit (transmitter module) and a mobile unit (receiver
module). In the gesture unit is assisted by PIC
microcontroller accelerometer ADXL (335) and Xbee (RF
MODULE) is used for reading gestures. An XBee-S1 device
based on Xbee protocol is used for communication purpose,
this device is most suitable for point to point communication
in a wireless environment. In this PIC 18f452 microcontroller Figure 2: shows the movement of a mobile vehicle in direction corresponding to
which monitors the direction of a hand in x, y and z direction the tilting direction of hand in x, y and z axis
as shown in figure 1, as input from Accelerometer, in three
axis accelerometer the mechanical part works on principle of In figure 2, if a hand tilts right (positive x-axis) the vehicle
the Newton law of gravitation which undergo to change in will move towards right direction, if a hand tilts left (negative
gravity. In accelerometer, change in the direction of mass x-axis) the vehicle will move toward left direction, if a hand
attached to spring produce the change in capacitance. tilts forward (positive y-axis) the vehicle will move towards
The electrical part transforms the change in the electrical forward direction,
signal i-e voltage. These values are then process by PIC if a hand tilts backward (negative y-axis) the vehicle will
microcontroller which transmits the corresponding control move towards backward direction, if a hand tilts along z-axis
signal wirelessly to the mobile robot unit via Xbee. Similarly, the vehicle will produce a horn or will lit a light.
in mobile robot unit PIC microcontroller is assisted by The most amazing feature of this project is that the vehicle
peripherals like Xbee (RF MODULE) and stepper motor and could move in precise angle which is not considered in
dc motor along derivers i-e ULN2003 and L293DNE previous gestures based vehicle systems. For example, if the
respectively. Xbee receive transmitter value then drive tilting angle of a hand is 90 degrees then vehicle will move
the motor PIC 18f452 microcontroller for controlling the towards rightest or most left and if the tilting angle is less
than 90 degrees then vehicle will move with less angel toward

9 | FICT URC1-2016
right or left based upon the tilt direction of hand. This project through UART module that is built in microcontroller. The
requires no computer for storing gesture sign and software i-e transmitter
visual or Matlab etc. will transmit the data to base station (vehicle on receiver
side). If a hand tilts right (positive x-axis) the vehicle will
II. PROBLEM STATEMENT: move towards right direction
If a hand tilts left (negative x-axis) the vehicle will move
1. Precise angle of stepper moto on front wheel at
toward left direction, if a hand tilts forward (positive y-axis)
receiver module.
the vehicle will move towards forward direction, if a hand
2. Precise values of Accelerometer ADXL335 at
tilts backward (negative y-axis) the vehicle will move towards
Transmitter module
backward direction If a hand tilts along z-axis the vehicle will
produce a horn or will lit a light. The XBEE receiver takes
III. PROPOSED ALGORITHM
the transmitted data and through UART module the data
sends to microcontroller mounted on a vehicle. The vehicle
moves with the help of two Motors, i.e Stepper Motor and DC
Motor. Stepper Motor moves front wheels of a vehicle and
DC Motor moves the rare wheels. For running Stepper Motor
we used a driver (ULN2003) and for DC Motor we used a
driver (L293D). On particular conditions the vehicle will
move and change its direction corresponding to the tilting
position of our hand, e.g. as hand tilt left then vehicle
will move in left direction, if hand tilt right then vehicle
will move in right direction, as hand tilt up then vehicle will
move in forward direction. And if hand tilt down then vehicle
will move in reverse direction.

V. RESULTS AND DISCUSSION


It is always a challenge to make the things simpler and
cheaper the way they were before. We tried to emphasize on
Figure 3: Transmitter module
those concepts and thats why we built a wireless hand
gesture control robot. People used PC or remote to control the
robot car but controlling it via hand gesture makes it easier
than
ever before to control a robot. Also our main target was to
make it less expensive so we were more conscious about
choosing the components. We tried to make it less
expensive but we did not compromise on the quality. We tried
to make it more reliable and simple. The biggest advantage of
our project is that its very easy to control. We have achieved
our objective i.e. the control of a robotic vehicle using
gestures. Our robotic vehicle is showing proper response
whenever we move our hand in specific direction like right,
Figure 4: Receiver module left, forward and backward.

IV. METHODOLOGY REFERENCES


[1] Singh, S.; Keller, P., "Obstacle detection for high speed autonomous
On transmitter side the circuit board is mounted on hand navigation," RoboticsAnd Automation, 1991. Proceedings.1991 IEEE
which contain the accelerometer, microcontroller and XBEE International Conference on, vol., no. pp.2798, 2805 vol.3, 9-11 Apr 1991
transmitter. The accelerometer senses the tilting position of [2] L. Barthes, P. Menezes, F. Lease, and J. Hayet. Face tracking and hand
gesture recognition for human robot interaction. In International Conference
hand in left, right, up, down and these gestures gives the on Robotics and Automation, Pages 1901-1906, 2004. New Orleans,
corresponding analog signal to microcontroller. The Louisiana.
microcontroller converts the analog value taken from [3] Geng Yang, Yingli Lu, motor and motion control system, Tsinghua
University Press, 2006.3, pp.85-110.
accelerometer into digital value via ADC module. On mean [4] D. Press, Sci Sports: Killer Robots, 11March 2013. [Online].
time the values which is taken from accelerometer display on Available:
LCD display. These values/data send to XBEE transmitter [5] http://press.discovery.com/us/sci/programs/sci-sports-killer-robots.
[Accessed 21 May 2014].

10 | FICT URC1-2016
Wireless Hand Gesture Based Wheelchair For Physically
Challenged People
Bahaudin, Usama qazi, Nadeem ahmad, Nizar ahmad ,Atif ullah
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Atifullah@buitms.edu.pk

Abstract -This paper is to develop a wheel chair control


which is useful to the physically disabled person with android II. PROPOSED ALGORITHM
application touchpad or acceleration technology.Tremendous In the paper on hand gesture wheelchair command input is
leaps have been made in the field of wheelchair technology. taken from android mobile and converted into text and this
However, even these significant advances have not been able to
text is given to the arduino via Bluetooth module to control
help quadriplegics navigate wheelchair unassisted.It is
wheelchair which can be controlled by smart phone. It uses an the operation of D.C. motors. Input method is switched
android application having touchpad and accelerometer through switches and input is given by any two methods to
characteristics and interprets the motion intended by user and Arduino that is either touchpad or accelerometer. Two D.C.
moves accordingly. In Acceleration the smartphone is used as motors are used to provide motion.
Acceleration sensor. When we change the direction, the sensor The following figure illustrates the important wheelchair
registers values are changed and that values are given to terminologies that need to be considered while designing a
arduino. Depending on the direction of the Acceleration, wheelchair
arduino controls the wheel chair directions like LEFT, RIGHT,
FRONT, and BACK. The aim of this paper is to implement
wheel chair direction control with hand gesture reorganization.

Index Terms - Arduino Control, android, smartphone

I. INTRODUCTION
Patients having injuries and physical disabilities and with
Fig1: wheelchair terminology
good mental health, faces a lot of difficulty when using the
The location of the drive wheels (the wheels powered by the
conventional hand powered wheelchair. This project enables
motor) in the rear, middle or front of the chair has a definite
an economic assembly in any existing wheelchair that enables
effect on the chairs performance in different environments.
a smart system for automated motion which can be controlled
A Smartphone is a mobile phone built on a mobile OS, it has
by any Smartphone. The concept particularly mentions
more advanced computingcapability and connectivity than an
Smartphone which covers devices like any Android powered
ordinary phone. Most Smartphones are equipped with
mobile phone which have inbuilt 3 axis accelerometer and
accelerometers for user interface control. Also most smart
Bluetooth Wireless technology. The functionality can be phones have Bluetooth Wireless Technology inbuilt in the
extended to other mobile devices using a suitable application. device for various small range wireless applications like
The other end of the system has an arduino and DC motor for headset, file transfer, wireless input devices etc. the following
linear motion of the wheelchair. The DC motor connected to project uses above features of the Smartphone to use it as a
the rear wheels enables linear motion. Following are some transmitter and control device and completely eliminating the
detail about the project need for a separate transmitter block.
This is an android based automated wheelchair that can be
Bluetooth present in the Smartphone can be tapped using
used by differently able.
protocol stacks in the app design environment of the mobile
It uses android based Smartphones which have inbuilt axis
operating system.
accelerometer sensors and Bluetooth wireless technology.
The proposed concept exploits these features of the smart
phones to use at as a transmitter and control device.
This is an android based automated wheelchair that can be
used by differently able.

11 | FICT URC1-2016
REFERENCES

[1] Santhanam, V., & Viswanathan, V. (2013, January). Smartphone


accelerometer controlled automated wheelchair. In Proceedings of the 3rd
International Conference on Electronics, Biomedical Engineering and its
Applications (pp. 57-61).
[2] Gupta, S. Android Based Mobile Drive System.

[3] Chicago Khadilkar, S. U., & Wagdarikar, N. (2015, January). Android


phone controlled voice, gesture and touch screen operated smart
wheelchair. In Pervasive Computing (ICPC), 2015 International
Conference on (pp. 1-4). IEEE.
Fig2: Flowchart of the proposed system

III. NEED OF PROJECT:

This paper develops a wheel chair control which is useful


to the physically disabled person with his hand movement or
his hand gesture reorganization. With the help of the wheel
chair physically disabled person would able to move himself
to the desired location with the help of smartphone which
controls the movement of the chair. This paper aims to
provide a feasible solution to those handicapped people who
do not have the ability to maneuver the wheelchair by
themselves. These include people with serious paralytic
condition. Wheelchair automated control systems proved to
be versatile tools for many problems in human-computer
interface systems.

IV. FUTURE PROSPECTS

Proposed System can also alarm the user about the obstacle.
Improvements can be made by using various hand gestures of
the user. Battery can be recharged by alternator. Automatic
balancing of sitting area can be provided using secondary
accelerometer in case of bumps and curbs.

V. CONCLUSION

In our project we designed and fabricated Android Based


Automated Smart Wheelchair, which can be used on inclined
and flat terrains and obstacles. The results are as follows-
1. Users can use their existing android phones to
download and install the android app to use it as a
controller for their wheelchair.
2. The use of the existing android phone considerably
reduces the cost of the wheelchair.
3. The operation of the wheelchair is done by tilting the
smartphone in different directions.
4. Front wheel drive provides high maneuverability,
have less turning radius as compared to rear wheel
drives and are optimal for handling obstacles and
inclines.

12 | FICT URC1-2016
Intelligent Priority based Load Distribution Systems
Sheran Imtiaz, Tauseef Rasheed, Mohammad Awais, Syed Mudassir
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
m.sheranimtiaz@gmail.com
Abstract - In past, breakers interlocks schemes were used B. Hardware Requirements
for load shedding. This paper introduces the need for a modern Arduino, Current Transformer (CT), Potential Transformer
load shedding scheme and provide the new technology of (PT), LCDs, LEDs Voltage Regulator, Vero Boards, Resistor,
intelligent load distribution system. We focus on micro grids Capacitors, Power Supply, Printed Circuit Board (PCB),
and propose priority-based operational micro grid. Proposed
Bridge Rectifier, ZigBee (Xbee), Wire
load distribution system has potential to utilize the accessible
energy in an efficient manner and system is smart enough to Intelligent Priority Based Load Distribution System, the aim
provide desired output. of the project is to effectively distribute electricity. Various
sensors, display and controlling devices are used in this
Index Terms - load management, load shedding, power system, project. For measuring various parameters (voltage, current)
micro grids, IPLDS values, various sensors are used and the output of these
sensors are converted to control the parameters. The control
I. INTRODUCTION & BACKGROUND unit is Arduino. The output of the sensors are fed to control
In the year 1878, Thomas A. Edison began his incredible
unit. The output of the Arduino is used to display the
work on the research of electric light and formulated the parameter value on LCD. In addition to the LCD display
concept of the lighting in the surrounding area, which was Ardunio output are also used to drive a relay independently.
driven by a centrally located power station. Realization of the The relay energizes and de-energizes automatically according
research came in the year of 1879 and by 1882, September 4, to the condition of the parameter defined. Condition is if the
he set up a historic pearl street station in New York City, available power is less than demand then switch of the lowest
making him the pioneer batch of scientist in the World of priority load. In addition we have two system connected with
Electric Utility Industry. each other. When the sensor of one of this system senses no
In general, load shedding can be defined as the amount of value i.e. there is no power or electricity both system
load which is removed from a power system due to shortage communicate to each other vie a ZigBee and provide power or
of power or due to fault occurs in transmission or in electricity to other system to provide the electricity to high
production. If load shedding is due to shortage of power then priority load.
one solution is to add additional bulk power in the system
which requires time and huge capital investment, hence load C. Block diagram
shedding is compulsory. Domestic users and industries are
suffering from extreme load shedding in Pakistan. Hence
intelligent energy management system or IPLDS are being
developed under the smart grid.
Intelligent priority based load distribution system (IPLDS)
would present more realistic approach towards energy issues
including shortage of power. The essence of IPLDS is to
deliver power using most reliable method. IPLDS would
provide control on the distribution end to keep demand well
under available sources.
II. MATERIALS AND METHODS
IPLDS Design and implementation is both hardware and
software project. Hence the requirements of the project are of
two types.
A. Software Requirements
Arduino IDE, Proteus ISIS

13 | FICT URC1-2016
Figure 2: Flow Chart

III. CONCLUSION:
Intelligent Priority Based Load Distribution System is not
limited for any particular application, it can be used anywhere
where power is to be distribute with little modification in
software coding according to the requirements. This concept
not only ensures that our work will be usable in the future. In
this project we have studied and implemented a complete
working model using a microcontroller.

REFERENCES
[1] http://www.hersheyenergy.com/voltage_irregularities.html.[last seen
12/16/2015]
[2] http://www.thenational.ae/business/industry-insights/energy/worsening-
electricity-shortages-fuel-growingcrisis#ixzz2dHy9b4Tb [last seen
01/03/2015]
[3] https://www.arduino.cc/en/Main/arduinoBoardMega2560 [last seen
01/03/2015]
[4] Said Fathy El-Zoghdy, A Capacity Based Load Balancing and Job
Migration Algorithm for Heterogeneous Computational Grids,
International Journal of Computer Networks & Communication (IJCNC)
Vol. 4, No. 1, January 2012. [last seen 12/02/2016]
[5] T. Amudha, T. T. Dhivyaprabha; QoS Priority Based Scheduling
Figure 1: IPLDS Block Diagram Algorithm and Proposed Framework for Task Scheduling in a Grid
Environment, IEEE International Conference on Recent Trends in
Information Technology, MIT, Anna University, Chennai, June 2011. [last
seen 12/12/2015]

D. Flow Chart

14 | FICT URC1-2016
15 | FICT URC1-2016
Maximum Power Point Tracking Solar System
Aslam khan, Aimal khan, Ata-ur-rehman, Irfan khan, Muhammad junaid
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
aslam.quetta@gmail.com
The maximum power point tracking (MPPT) plays a vital role
Abstract - Maximum power point tracking (MPPT) plays a in maximizing the efficiency of a Photovoltaic PV system.
vital role for maximizing the efficiency of a photovoltaic (PV) Perturb and Observe P&O algorithm is implemented widely
system. P&O algorithm is widely implemented in PV system to in PV system to improve the environmental adoptability. In
improve the steady state accuracy and environmental the past years numerous MPPT techniques have been
adaptability, However the steady state performance and
introduced, they differ in their algorithms, complexity,
dynamic performance are restricted by step size and the step
size problem can be solved by the P&O algorithm which efficiency, sensors required, cost etc. It is useless to impose an
automatically adjusts the step size to track the PV array. expensive or complicated technique if with a simpler and less
expensive technique similar goals can be achieved. This is the
Index Terms - DC to DC Converter, PV, MPPT reason why P&O method is chosen
III. PROPOSED ALGORITHM
I. INTRODUCTION
In this method the sign of the last perturbation and the sign of
The aim of this project is to propose a technique able
the last incremented are used to calculate what the next
to track maximum power operating point .As global warming
perturbation should be. As shown in the fig (2.2) on the left of
energy policies and sources of energy have become the topics
the MPP incrementing the voltage increases the power, while
of great attention on International forum. Developed countries
on the right of the MPP decrementing the voltage results in
have tried their best to minimize their greenhouse emission.
the increase of power. If the power increases then the
Under the circumstances photovoltaic (PV) power generation
perturbation should be kept in the same direction and if the
has an important role to play because of the fact that it is a
power decreases then the perturbation should be kept in the
green house. The only emissions from the PV power
reversed direction. Keeping in mind these facts an algorithm
generation are those from the production of its components.
is designed. The process is repeated until MPP is reached.
After installation they start generating electrical energy from
Then the operating point oscillates around the MPP. This
the solar irradiations without the emission of any greenhouse
method states that the derivative of the power in terms of the
gases. Their life time is about 25 years in which PV panels
voltage is zero.
produce energy more than their production. Also they have
the advantage to be installed in places with no other use such
as roofs, deserts or they can produce electricity in remote
locations where there is no electricity network or they can
produce electricity from remote locations which is called off-
grid station and they may prove to be the most economical
alternative to provide electricity in isolated areas. However
most of the PV power is provided by the grid connected
power stations where the energy from the PV is fed into the
grid power station. No doubt it is an advanced and less
expensive method of power generation and is adopted by most
of the developed counties such as Germany which in 2014 is
by far the most PV powered generation country followed by
Spain, Japan, USA and Italy [1] .

II. PROBLEM STATEMENT:

MPPT technology is used as a benefit in varying Figure 1: Algorithm


environmental conditions because of the different angles and The algorithm of the P&O method is given in fig (2.2). At the
exposure to the sun. These limitations make it important to operating point if the derivative of power dP>0 then the
transfer all power using MPPT technology. It is used to obtain perturbation increases move the operating point on the PV
the most power possible from PV solar module. PV solar panel towards the MPP and done through Vref (t2) = Vref
modules do not have a linear voltage and current relationship. (t2) +C and if the derivative of the power dP<0 then the
perturbation (decreases) and move the operating point on the
panel away from the MPP and done through Vref (t2) = Vref

16 | FICT URC1-2016
(t2)-C. If dP=0 then this operation point is the maximum V. RESULTS
power point in the PV curve. The observation and the
Results we obtain are shown in the form of following graphs:
perturbation taken from the output is in the form of duty
cycles. The duty cycle is given to the switch of the DC/DC
converter and then check the output power with scope. The
range of the duty cycle in between 0 and 1. One of the critical
weakness of the P&O method is that once it reaches the MPP
then it oscillates around the MPP which greatly reduces the
efficiency of this method [6]. We can minimize this drawback
through variation in the duty cycle and some control
mechanism as: When the value of dP is negative then
increasing the duty cycle until dP reaches Zero which is the Figure 4: Probe A is direct input 21v, Probe is output of SBC, Probe C is load
required MPP. At this point there will be no oscillations output and Probe D is PWM.

IV. METHODOLOGY

Figure 2: Block Diagram of MPPT solar System


VI. FUTURE SCOPE:
To design and implement the MPPT solar system
First design the block diagram and then design each Presently, the solar energy has gained a lot of importance
component individual. Design the current and voltage sensors because it is less expensive and most beneficial source of
to measures the current and voltage of the PV panel. energy, however the steady state and dynamic performance
Then design the synchronous buck converter Select the are restricted by step size and changing environmental
microcontroller for programming and using c code for this conditions. This problem can be overcome by using perturb
project. and observe P&O algorithm. Solar panels have nonlinear
current voltage characteristics, with a distinct max power
point MPPT and is dependent on environmental factors, such
as temperature and irradiation. In order to perform the task
smoothly the PV panels have to operate on their MPPT
despite of inevitable changes in the environment. This is the
reason behind the use of controllers of all solar power
Figure 3: circuit electronic converters that imply the use of some method for
After getting all components and combining them all maximum power point tracking
simulate it on PROTEUS for simulation and after this design
another schematic circuit for the hardware use and make REFERENCES
schematic for PCB (printed circuit board) for hardware.
[1] European Union Climate and energy package, (the 20-20-20package)
Design circuit diagram, make schematic using any software [Accessed 13-nov-2015].
(Eagle or PROTEUS), design PCB, then Etch PCB and [2] A Comparative Study on Maximum Power Point Tracking Techniques for
mount components on it. After PCB check its continuity. Photovoltaic Power
[3] Systems Bidyadhar Subudhi, Senior Member, IEEE, and Raseswari
After programming compile it and generate Hex file which is Pradhan.
then burned into micro controller using PIC KIT Software. [4] Dorofte C, Borup, U. and Blaabjerg, F. (2005) A Combined Two-Method
Check the functioning if the code works properly then ok MPPT Control Scheme for Grid-Connected Photovoltaic Systems. 2005
European Conference on Power Electronics and Applications, Dresden, 11-
otherwise correct the errors and then again compile and dump 14 September 2005, 10
program in PIC Microcontroller if ok then Connect all
components and check the hardware performance.

17 | FICT URC1-2016
PLC Based Juice Preparation Using SCADA Software
Mohammad Fayyaz, Qurban Ali, Ahmer Atique, Ghulam Moinuddin, Atifullah
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
atifullah@buitms.edu.pk

Abstract - This project is about to use Arduino, PLC, readings and measurements. This will help reduce the
SCADA to drive four different motors to fill three tanks one synchronization problem.
with water and other with pure juice whereas third tank would
be used to mix up juice and water. We intended to design it
with its future prospect to be implemented in the industry. The
purpose of this project is
Controlling of liquid level with in tank. III. BLOCK DIAGRAM
Extraction of liquid sweeteners and water after
reaching certain level by the designed system.
Stirring of Water and liquid sweetener in a separate
tank automatically.

I. INTRODUCTION

Juice preparation industry works on the following


principles described below:
Easily operate the plant processes include flow and
mixing control by motors.
Checking of water and liquid level by level sensors to
avoid over or under filling of vessel.
All these motors and level sensors are controlled by Figure1: Block diagram
PLC.
SCADA monitors the system. II. RESULTS

II. METHODOLOGY:
Juice after being crushed will be accumulated and stored in
the storage tank of the plant. The Level Transmitter is
installed on the juice storage tank. The tank should be filled
and depleted according to the fixed point defined by the
programming which will be done by sensor and controlled by
the PLC. Then the juice will be transferred to the boiler by
motor and signal will be fed to the PLC for the sake of
control. According to the fixed or desired point the value
would be compared with the filled point and the extra amount
of juice will be removed for later processing. Problems are
faced in synchronization of flow signal and level signal in
real time. .PLC helps achieve this of synchronization .The
main valves, receivers and transmitters are joined with
SCADA and PLC. The visual will be provided by SCADA of A. Advantages
the actual working of the plant. The PLC would control the Reduces the complexity.
valves actually. PLC would get readings from the Efficiently fulfills the plant requirement.
transmitters. Finally, PLC would create a database of all Remotely accessible.
Production increased.

18 | FICT URC1-2016
Improved Capacity.
Reduced Time.
Reduced Cost.

The proposed system can be used to mix different liquids


with different proportion.
The application of mentioned system can be further improved
by increasing the number of tanks.
III. CONCLUSION AND FUTURE WORK
This project which was about juice machine based on SCADA
and PLC provided us the opportunity to work with PLC,
practically. To conclude the Project Report we deem it
necessary to thank our Respectful Teachers, Senior Mentors,
Project Supervisor and Classmates for rendering their help as
much it was possible for them. SCADA and PLC based
Project has very broad future prospect and scope with
innovative ideas and hard work and interest of the students is
no exception.
The project was specifically designed to be submitted as a
final year project that is why with smaller components but it
could be implemented on the industrial scale to groom the
juice-squeezing plants efficiency.

REFERENCES
[1] Wilson, T., 1999, March. PLC based substation automation and SCADA
systems and selecting a control system integrator. In Western Electric Power
Institute Distribution/Substation Automation Workshop, Las Vegas,
Nevada (pp. 1-14).
[2] Kulkami, N.R., Murthy, H.V. and Raju, A.P., 2015, August. PLC based
intelligent power factor correctors for industrial power systems-A case study.
In Power and Advanced Control Engineering (ICPACE), 2015 International
Conference on (pp. 75-79). IEEE.

19 | FICT URC1-2016
Satellite Dish Antenna Tuning Using Android Application
Muhammad Arif , Mir Ahmed , Babar Ali, Muhammad Haleem
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
engr.arifhussain5@gmail.com

Abstract - In this paper, microcontroller was designed to advanced technology. For the study and adjust the position of
develop a satellite dish positioning system which can be operated the dish in any solid angle in horizontal plane or in the
by using a android phone. The main point of using a dish is to vertical plane through a smart phone or handy remote. Once
receive signal from satellites and other broadcasting sources. In the movement of dish antenna is controlled then one can tune
order to get the exact angle of position of the dish, it needs to be
the channels of different frequency bands.
adjusted manually. The dish was controlled by IR remote, there
was line of sight problem. These two methods are time The project consists of three phases Communication between
consuming. In order to overcome the difficulties of adjusting android to Bluetooth module. Transmission of data from
manually and IR remote, this paper helps in adjusting the Bluetooth module to microcontroller(Arduino) Then motors
position of the dish through an android phone. Android phone are driven by Microcontroller(according to the instructions
acts as a transmitter whose data is received by receiver which is in).
interfaced to a microcontroller of Arduino. The android phone First of all communication between android phone and
sends coded data to the receiver whose output is then sent to the Bluetooth module is conducted that bridges between mobile
microcontroller. The microcontroller sends the control signals to set and microcontroller which receives the commands and has
the motor through an interface known as relay driver
predefined instruction for each specific input which in turn
operates the motor
I. INTRODUCTION
III. SIMULATION AND SOFTWARE:
In the project Arduino microcontroller is designed to
The project was simulated in Proteus. The arduino library was
develop a satellite dish positioning system which could be
added. Connecting servo and stepper motor with arduino
controlled by using Android Phone. The vital purpose to use
board. For dish directions the push buttons up, down, left and
the dish is receiving and sending from and to satellites and
right were used. The simulation is as shown in figure:
other communication sources. It requires manual adjustment
of the dish position that is why it was important to create
manually. In order to overcome the difficulty of adjusting
manually, A remote control (android mobile handset) usage
for the purpose reduces the difficult to achieve the desired
control.

Figure1: Proposed system

The aim of this project to reduce the man power. There is no


Figure 2: simulation
need to call the cable operator to fix the antenna alignment.
The dish antenna can be fixed and alignment at home using IV. METHODOLOGY:
an android application. The android phone used for
alignment because it is easy to use for everyone. Dish Initially Dish positioning was controlled by the IR remote
Antenna position and tuning is very important for getting sensor which was trouble-causing in a sense that it bore the
standard broadcasting singles from a satellite. If the dish problem of Line of Sight. The Project was intended to
antenna is adjusted manually it is difficult to align it at the implement in the dealing with the two vertical and horizontal
best position therefor it is required to design with an angles through the usage of servo and stepper motors

20 | FICT URC1-2016
respectively. Android Phone replace the IR sensor with REFERENCE:
Bluetooth module as a communication mode between [1] Kumar, Gurrala Ajay, M. Ramya, and C. Ram Kumar. "Wedding of robots
microcontroller and the command issuing hand set. A desired with agriculture." Computing Communication & Networking
command is generated from the mobile set which is then Technologies (ICCCNT), 2012 Third International Conference on. IEEE,
2012.
transmitted to Arduino board that resultantly operates the [2] Yoon, B., & Kim, S. (2013, October). Design of paddy weeding robot.
motors and adjusts the dish position by changing elevation InRobotics (ISR), 2013 44th International Symposium on (pp. 1-2). IEEE.
and azimuth angle. Purpose-oriented android app has been [3] Chang, C. L., & Jhu, J. H. (2013, December). Zigbee-assisted mobile
robot gardener. In Automatic Control Conference (CACS), 2013 CACS
developed for the purpose of using this circuit. International(pp. 41-46). IEEE.
[4] Jothimurugan, P., Saravanan, J. M., Sushanth, R., Suresh, V.,
Subramaniam, H. S., Vasantharaj, S., & Yogeswaran, S. (2013, April).
Solar E-Bot for Agriculture. In India Educators' Conference (TIIEC), 2013
Texas Instruments(pp. 125-130). IEEE.
[5] Amer, G., Mudassir, S. M. M., & Malik, M. A. (2015, May). Design and
operation of Wi-Fi agribot integrated system. In Industrial Instrumentation
and Control (ICIC), 2015 International Conference on (pp. 207-212).
IEEE.
[6] Jiang, Guoquan, and Cuijun Zhao. "A vision system based crop rows for
agricultural mobile robot." Computer Application and System Modeling
(ICCASM), 2010 International Confe.rence on Vol. 11. IEEE, 2010.

A. Hardware:
Microcontroller board (Arduino)
Android Phone
Stepper Motor
Servo Motor
Bluetooth Device
B. Programming Languages:
IDE Arduino for the program of the microcontroller.
Proteus for circuit simulation.
Android studio was used for app development.
V. CONCLUSION AND FUTURE WORK:
The project was described the advance wireless technology
implementation. The project was successfully positioned and
tune the dish antenna using android application. Arduino
board for controlling the servo motor and stepper motor was
used and Bluetooth for communication between android
phone and microcontroller, which is better than IR remote,
because in IR there is a problem of line-of-sight. The motors
are more precise.
Bluetooth module is used for communication between android
phone with microcontroller but in future, technology is so
advanced so can communicate with a long range and high
penetration wireless technology such as Wi-Fi.
The motors will more accurate and precise, now a days also
working on stepper motor with feedback.

21 | FICT URC1-2016
Time Awareness Clock using POV (Persistence of
Provision)
Zubair Ashraf, Israr Khan, M. Nauman Durrani, Zain Younas, Hamid Kareem
Department of Electronics Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
hamidkarim@buitms.eu.pk

Abstract - This project is composed of both the hardware In present world rapidly growing technology of display there
and software. The software is to program the hardware in is a need of low cost and energy efficient displaying
addition with the application of Arduino IDE, includes technology in market , persistence of version is one of the
microcontroller and LEDs to display the clock. The idea behind display technique which consumes less power with a display
using the clock is Persistence of version (POV). With the
of efficient characters. It is a low cost circuit with less usage
rotation of the LEDs (connected with a rotor) the clock
brightens and provides a clear display of the time table or of LEDs for this type of display
schedule for the convenience of Class Instructors there by
showing teachers notifications (i.e when to start and at what
time to finish) and an alarm will be generated by the buzzer at II. METHODOLOGY:
the end of class timing. The basic method used is the Persistence of vision. As the
LEDs rotate at a high speed they
I. INTRODUCTION
On large scale, it can be used to replace public LED
screens with Multi-color LEDs to make it as a Video
Screen/wall. It can be used not only as a stop watch but also
can be used in stadiums as a score board and in railway
stations to display timings for coming and departure of the
trains.

Figure3: time keeper registers


can be controlled with the help pf a microcontroller so as to
glow them in such a combination that a floating display is
formed. AC motor spins the propeller and a small
microprocessor keeps track of time and changes the pattern
Figure1: Timming Diagram
on
The rotational speed of the LEDs directly affects the frames
per second. If there is a more frame rate, it causes to the less
flickering of the picture. It is not easy to achieve high frame
rates in this project because of the propeller display displayed
the picture mechanically. The propeller has to be very well
balanced to reduce vibrations and keep proper speed of the
rotating LEDs. An alphabet would appear like

Figure2: Block diagram of the proposed system

22 | FICT URC1-2016
seven LEDs with exact timing to simulate an array of LEDs.

Figure4: Spectral Power distribution of several types of LEDs

REFERENCES:
[1] Sheikh Rafiq Manihar, Komal Prasad Dewangan and Ajay Kumar
Densana The design and construction of low cost Propeller Led display.
[2] George John P, Togis Thomas, Vishnu N. Nair Design and
implementation of MCU based Propeller clock.
[3] Joy Bhattacharjee, Pranay Sharma, Propeller Clock, Persistence of
Figure5: Alphabet Vision.
The data transferred is by serial communication. Serial [4] Bhanu Pratap, 2Khushboo Kumari, 3Ankita Raturi & 4Abhishek Joshi
PROPELLER CLOCK Mechanically Scanned LED Clock.
communication is the process of sending data one bit at a time,
sequentially, over a communication channel This is in contrast
to parallel communication, where several bits are sent as a
whole, on a link with several parallel channels.

Figure 6: Parallel Channels

23 | FICT URC1-2016
Task Managing Application for Alzheimers disease
patients
Students: Bilal Ahmed, Zafar Ali Supervisor: Dr. Mumraiz Kasi
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Bilalsarpara@gmail.com, zafaralihassani@gmail.com

Abstract -The patients of Alzheimers disease face many may record a message reminding them to take their
problems in performing their daily tasks. Most of the problem medication or telling them that they have an appointment.
arise due to the memory loss. In this project, we have made an They could also set their phone calendar to remind them.
application for such patients that will help them perform their 2) Locator Devices: An alternative (and less intrusive)
daily task without being dependent on others. The application
approach is to attach a small tile to each item and link these
makes use of the patients context (i.e. location and time) and
notifies the patients of the tasks to be performed. This to a smartphone using a simple app. One system like this
application can also benefit other people with such disabilities stores the last place your phone saw the tile. This location
or memory problems. can then be displayed on the phones map function.
I. INTRODUCTION III. PROPOSED APPROACH
The Alzheimer Disease is such a disease which causes Our Objective is to generate automated responses for the
due to the different incidents or accident and it starts effect on patients, make them independent of caretakers, and to remove
the human mind and slowly and gradually the person losses the panic factor from the family members of the patients.
his memories at last due to the losing of memories man can
cause death as well. Now a day the Alzheimer disease is also
found in the early young ages as well because of the traffic
incidents / falling from the hill/ fight attack and different
reason. Alzheimer patients have this problem for the short
periods, they ever forget the thing the passage of time like 15
minutes etc. and then they dont remember that what have
they done in this duration.
To support the memory of patients and make them
independent in their lives we are developing an application
for such people. The application would be android based.
The purpose of the Application is to help the Alzheimer
patients and to help them managing their tasks being not so
dependent on others. This sort of people cannot manage their
tasks easily due to forgetting or memory issues. Our purpose
is to make an easy and independent sort of application.
Fig. 1 View of Task Managing Application for Alzheimers disease patients
Primarily the main thing in the app is that it makes aware the
user about his location and tells him what he has to do in
As shown in the Fig 1 there is a marker on a location. When
context to the location. As mainly the app purpose is that
the user enters the premises of this location he/she will be
which makes aware the patient about his daily task on the
tracked by GPS using Latitude and Longitude. By entering
time and alerts him from unwanted way/ area/ effort.
the radius of the markers (Geofences) they will be notified
II. RELATED WORK with a message on their cell phone which will remind them of
their work in that particular area.
There are many different technologies that can be adapted to
A. Methodology: A map has been used in the application
the needs of someone with Alzheimer.
which is integrated into the application by maps API provided
1) Automated prompts and reminders: One type of reminder,
by the Google. The prominent locations on the map are drawn
based on a motion sensor, plays a pre-recorded voice prompt
through the add Circle function and a marker has been put
when there is movement nearby. For example, a sensor placed
inside the circle as being used for displaying information
near the front door could remind someone to lock the door, or
window to the user. For information window a xml file is
one in the kitchen could remind someone to turn the oven off.
used through which we get the title and the details being fed
Another kind of reminder does not detect movement but is set
to the marker.
to play a message at a certain time. For example, someone

24 | FICT URC1-2016
A background Intent Service is being used for sending the application will create a list of those tasks. When the patient
notification to the user when they enter or leave area which is gets in the radius of those locations the applications will give
being specified with latitude and longitude by the user. a prompt message to the patient extracting it from the task
Geofencing is the main theme of the application. It creates a list. When the task is done it would be removed from the task
virtual boundary over the latitude and longitude provided by list automatically
the user. When user enters in that radius from any angle the
application triggers the message that is being related to his 6) Prompt Messages and Notifications:
work/task. The application gives guide to the patient based on For notifications, a background service in used which
his/her location. monitors geofences and when an event occurs it triggers that
B. Implementation: To implement the idea of the App we event. The service is known as IntentService.
implemented the following components in our design. The IntentService class provides a straightforward structure
1) Map: for running running operations without affecting your user
Map is needed in order to locate the current location of the interface's responsiveness. also, an IntentService isn't affected
user. The map is obtained from the google maps which has by most user interface lifecycle events.
integration in android studio with google map APIs and it is If the application is running in the background the user will
being modified accordingly. get a notification for the task which he has/she written for a
2) GeoFencing (Identifying Locations on the map): specific place or point. The prompts or messages will be
Geofencing combines awareness of the user's current location displayed to user on geofence entered or exited.
with awareness of the user's proximity to locations that may IV. CONCLUSION
be of interest. To mark a location of interest, you specify its
latitude and longitude. To adjust the proximity for the The patients of Alzheimers disease face many difficulties in
location, you add a radius. The latitude, longitude, and radius their daily tasks which they have to do daily. They need
define a geofence, creating a circular area, or fence, around assistance and care from their loved ones to help them
the location of interest. achieve their tasks.
The locations are identified on the map by the help of Our application helps the patients to perform their daily tasks
creategeofence function. The prominent locations (e.g., independently as their tasks are identified on the application;
Colleges, Universities, Hospitals, and Shopping Malls etc.) and the application notifies them in the premises of the
would be identified on the map by the developers. The location where they have to perform their tasks.
locations are identified by markers on the map for the android This application has several benefits in medical field. It can
studio has support and function. The radius of the marker will also be used by general public to help them in daily activities.
be set for getting messages and notifications in that radius. We aim to extend it more for the benefit of the users and add
3) Markers / Circles some more functionalities in it to make it more user friendly
Markers identify locations on the map. The default marker and make the patients more independent.
uses a standard icon, common to the Google Maps look and
feel. Markers are objects of type Marker, and are added to the REFERENCES
map with the GoogleMap.addMarker(markerOptions) [1] https://developer.android.com/training/maps
method. [2] https://developers.google.com/maps/documentation/android-api/marker
The markers and circles are drawn on the map to identify the [3] https://developer.android.com/training/location/geofencing.html
[4] https://www.alzheimers.org.uk/site/scripts/documents_info.php?documentID
location for the user. The circle is drawn by giving its =109
latitude, longitude and radius. And inside that circle a marker [5] https://developer.android.com/guide/topics/ui/notifiers/notifications.html
is drawn.
4) Marker Info Windows
An info window allows you to display information to the user
when they tap on a marker. Only one info window is
displayed at a time. If a user clicks on another marker, the
current info window will be hidden and the new info window
will be displayed.
An info window is drawn oriented against the device's screen,
centred above its associated marker. The default info window
contains the title in bold, with the (optional) snippet text
below the title.
5) List of Tasks:
Tasks are stored in an array which stores the (Latitude,
Longitude and the message for the notification). When the
locations are identified and the tasks are added. The

25 | FICT URC1-2016
Graduate Educational System [GradEdSys]: A Web Based
Application for Graduate Studies Office
Hifza Afzal, Amir Shahzad Khokhar
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Hifza700@gmail.com

Abstract This article talks about the traditional way of


handling of data of graduate students by Dean Graduates at III. PROPOSED APPROACH
Graduate Studies Office. Where records are still maintained on In todays world the technology is at its peak. The manual
traditional registers and on non-customized software. The system as said earlier is tiring and time wasting and is not
management of data to be updated, accurate, information
much effective. To address this issue a graduate educational
regarding to graduate students is critical important. Through
Graduates Educational System (GradEdSys) information system has been proposed. It is a web application with
retrieval will be easy, efficient and secure. Accurate information modular support.
will be retrieved on just a one click. It tracks all of the students This system is capable of keeping the records of registered
details from day one to last day of completion of course. It can students such as their educational and personal information,
be used by educational institutes to maintain the graduates data about their thesis, about their status and data regarding
student data. Can be implemented within an organization which to their results. It provides centralized data with secure login
fulfils its policies. Allows any organization for maintaining structure. Efficient access of data where collectively all results
graduates records. in less measure of redundancy, dependency, lack of flexibility,
lack of sharing and poor security. Where all these drawbacks
are handled efficiently to generate effective results. The
I. INTRODUCTION
systems checks the credentials and authenticate the users for
Graduates Educational System (GradEdSys) has been displaying the information related to their duties. The
proposed to avoid such traditional system and a work that is GradEdSys authenticates the user by user name and
manually done on traditional registers or on non-customized password and through these inputs also identify the user type.
software. This manner of system leads to hardship with It has two valid users with different privileges that are Admin
regards to how data was managed, updated, stored and and Data Entry Operator (DEO).
retrieved. When data needs to be updated all copies must be
IV. METHODOLOGY
updated manually with great care. There out dated data
cannot recirculate through the system or even kept. There are two users for this system defined by their roles.
The objective or goal of this system is to centralize a First is the admin (Director of graduate studies). It is this
computer data to make the retrieval, updating and person job to initiate the student. When the student arrives
maintenance efficiently. The major functions of system the director accesses the list of accepted students and creates
includes to register and store details regarding to graduate entry for new student into graduate educational system
students and retrieval when needed. database. The list of new students can be filtered yearly,
semester wise or whether the sought degree is MS or PhD.
II. PROBLEM STATEMENT
Further the director job is to record the semester wise
Previously the Dean Graduate office totally relied on paper information regarding the students position.
records that are traditional way of managing and maintaining Later the student progresses through the time then the thesis
graduate students data which contains several drawbacks. chosen by the students added through the thesis details
Physically retrieving, altering and managing a paper data are leading to supervisors detail too.
non-valued activities, as they are difficult to manage as well Finally the director job is to indicate that the student is no
to track. longer an active student upon the students graduation or
This design and implementation of graduate educational otherwise departure from university. This is done by selecting
system and a web based user interface is to replace traditional degree status.
file system and create a database to centrally handle Another user with access to this system is Data Entry
information and access the information with such an ease to Operator (DOE). It is the person with the rights of just adding
web based interface. It decreases the time to access and or enrolling a student, adding a details about thesis and
deliver graduates records. With centralized system it could be supervisor as well about their results into the system. DEO is
done efficiently by just through a single query. authorized with the duty to enter the information regarding to
the student.

26 | FICT URC1-2016
automated system. This system provides a simple interface for
the maintenance of student information. Achieving this
objective using manually is difficult as the information is
scattered, can be redundant and collecting related information
can be very time consuming. But through GradEdSys we
possibly can get updated information that should improve the
efficiency of Dean Graduate office record system.
VII. CONCLUSION
The database is a far more efficient mechanism to store and
organize data than a paper records or a spreadsheets. The
proposed system was there by to make the use of automated
and centralized way of databases rather than the traditional
database in a high technology era. Through a simple queries
can possibly get the information relevant to the graduate
students.

REFERENCES
[1] S.R.Bharamagoudar, Geeta R.B, S.G.Totad: Web Based Students
Information Management, 6 June 2013, vol. 2 [journal]
[2] Manchanayake, R. G. (2007). Web based Student Management System
Fig. 1 shows the detailed flow graph of graduate educational system (Doctoral dissertation, University of Moratuwa) [Thesis-Abstract]
[3] McCormack, Colin, and David Jones. Building a web-based education
The detailed flow diagram is shown in Fig.1. This detailed system. John Wiley & Sons, Inc., 1997. [book]
[4] Aggarwal, Anil K., ed. Web-Based Learning and Teaching Technologies:
flow diagram simply shows the association between the large Opportunities and Challenges: Opportunities and Challenges. IGI Global,
modules as well of their sub modules and of how they work. 1999. [book]
The design of the graduate educational system includes the
design of home page which provides the way to user to access
GradEdSys. Every user of GradEdSys has unique
username and password. Before getting access to the home
page the credentials are checked to authenticate the user.
Through the home page the user can further Add, update or
view the major modules that are student, result and thesis,
Moreover the reports can also be accessible too as needed.

V. IMPLEMENTATION
The system was with to work with Sql- Server database back-
end to store data. The front-end designing of an interface
through HTML, CSS, JavaScript and the server side scripting
done through Asp.net. As it is a web application with
modular support. So, divided into three major modules with
sub modules.
The first one is student module in which the student firstly
will be enrolled. The second one is about semester wise
student results and the third one module is of thesis which
includes details about the thesis and of supervisor as well.
These all then can be updated the data regarding to student,
thesis or results as well can be viewed faculty, department or
CMSID wise.
VI. RESULTS AND DISCUSSION:
The design as well the implementation of this system and
user interface will replace the current paper record by the

27 | FICT URC1-2016
A Web App for Spare Parts Shop
Abdul Wasay, Maqbool Ahmed, Safder Ali, Muhammad Junaid khan
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
maqboolalizai@yahoo.com

Abstract Problem Statement: When the customer wants to shops. Since the application is available on internet so it is
buy a spare part of his/her Automobile, first they have to find easily accessible and always available.
the shop location and then travel a long distance to visit the
shop. Even though they are not sure of the availability of the
product weather the spare part they are finding or trying to
buying is available at the shop or not. Many Spare parts of
different Models that they cannot find or are not available for
purchase in their home countries.
Contribution: The project aim is to deliver the online shopping
application for Toyota spare parts. This project is an attempt to
provide the advantages of online shopping to customers of a real
shop. It helps buying the products in the shop anywhere through
internet by using a computer or laptop. Thus the customer will
get the service of online shopping and home delivery from his
Fig. 1 Purchasing Activity [4].
favorite shop.
Significance: Variety Most physical stores have a limited
array of products. They can only hold so many items, and there The above Fig shows the relationship of purchasing product
are often many policies affecting the availability of products [1]. Online Shopping in the busy life of customers.
Fewer Traps you wont feel the pressure to buy other things When the customer wants to buy a spare part of his/her
[1]. Automobile, first they have to find the shop location and then
Discreet Shoppingshopping online gives you privacy because travel a long distance to visit the shop. Even though they are
you wont have people looking at you while you shop. Not only not sure of the availability of the product weather the spare
that, but the receipts are usually made so that no one will know part they are finding or trying to buying is available at the
what you bought [1]. shop or not. Many Spare parts of different Models that they
Convenience shopping online is convenient. You dont need to
cannot find or are not available for purchase in their home
get dressed and drive to your favorite store. You can easily visit
their website, find the product you want and buy it without countries.
getting out of your pajamas [2] [3]. A customer just needs an internet connection and
Ease of access, 24/7 hours Available, better price, related spare computer/laptop/mobile to get access to the Haji Abdullah
parts and much more [3]. Nasar Spare part website.
The project objective is to deliver the online shopping
application. This project is an attempt to provide the
I. INTRODUCTION
advantages of online shopping to customers of a real shop. It
This project is a web based shopping system for an helps buying the products in the shop anywhere through
existing shop of Spare parts. The project objective is to internet by using a computer or laptop. Thus the customer
deliver the online shopping application. This project is an will get the service of online shopping and home delivery
attempt to provide the advantages of online shopping to from his favorite shop.
customers of a real shop. It helps buying the products in the B. System Flow:
shop anywhere through internet by using a computer or The aim of this project is to advertise and promote internet
laptop. Thus the customer will get the service of online marketing which is the best way to market a business and this
shopping and home delivery from his favorite shop. This is the First online Spare parts business in Baluchistan Web-
system can be implemented to any shop in the locality or to based application which helps people to find the desired spare
multinational branded shops having retail outlet chains. parts based on the customers / users needs and other
A. Motivation for extended work. specification like price, company, model, model year and
This system can be implemented to any shop in the locality or more.
to multinational branded shops having retail outlet chains.
According to the research based on online shopping results
that, if shops are providing an online portal where their
customers can enjoy easy shopping from anywhere, the shops
wont be losing any more customers to the trending online

28 | FICT URC1-2016
You are able to look for specific Spare Part that includes
model number, style, size, and color that you want to
purchase [4].
IV. CONCLUSION
Now a day, online shopping has become popular among
people, they have become techno savvy and feel very
comfortable in using internet. So online shopping has
becoming a trend that is why we thought to develop a web
app for Haji Abdullah Nasar Toyota Spare Part Shop which
will help him in enlarging his business and also help people
in purchasing spare parts from his web application.

REFERENCES

[1] http://onlineshoppingpaper.blogspot.com
[2] http://hseangelica.blogspot.com
[3] http://www.tutorialspoint.com/asp.net/asp.net_tutorial.pdf
[4] https://www.microsoft.com/enpk/download/details.aspx?id=306

Figure 2 Context Level DFD

II. METHODOLOGY
The Incremental software process model was used to
implement the entire project.
Advantages of incremental process model
Generates working software quickly and early during
the software life cycle [3].
This model is more flexible less costly to change
scope and requirements [3].
It is easier to test and debug during a smaller iteration
[3].
In this model customer can respond to each built [3].
Lowers initial delivery cost [3].
Easier to manage risk because risky pieces are
identified and handled during itd iteration [3].
III. RESULTS AND DISCUSSION:
There are many advantages of online shopping system like
A. Better Prices
The vast majority of online stores offer prices that are much
lower than what you will find at a physical store [4].
B. Time Saving
Do you have the specific list that you want to buy? With just a
couple of clicks of the mouse, you can purchase your
shopping orders and instantly move to other important Spare
part, which can save time [4].
C. Comparison of Prices
The advanced innovation of search engine allows you to
easily check prices and compare with just a few clicks [4].
D. Easy to Search Spare Part You Want to Buy

29 | FICT URC1-2016
Periodic Table Learning Management System (PTLMS)
Mohib Ullah , Abdul Moeez , Zainab Shakoor , Miss, Sadaf Riaz
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Mohibkakar6@gmail.com

Abstract The purpose of (PTLMS) is to provide the students to learn efficiently. The quiz is an important part of
platform for the students to easily understand the chemical PTMLS which helps the students to evaluate their learning
reactions, their properties and information about the periodic competency. This desktop application can be used in schools,
table elements. This package permits the students to learn the collages, Laboratories, and chemistry Labs.
basics of Acids, Bases and their compound properties. This
desktop application have the capability to provide the answers IV. METHODOLOGY
of subject related questions. The interface of this application is
interactive and easy to use for the learners of class 9th and 10. In order to remove the difficulty to understand the periodic
In this application the elements and their reactions are table elements we proposed the desktop application PTLMS.
graphically represented which offers the convenience for the We added different modules in this desktop application which
students for easy learning. PTLMS provides the interactive, helps the students to understand the periodic table elements,
easy and learnable educational environment. their atomic structure, Acids, Bases and chemical reactions in
a graphical from. Each module contains the related
I. INTRODUCTION information about the periodic table and clearly defines the
There are around 120 types of elements discovered by the desired questions of the students. History of the periodic table
scientist in the subject of chemistry. 90 elements naturally is defined to help the students to know about the innovation
exist in nature. All known elements are arranged of the elements and periodic table. The students can easily
systematically in a table of elements called periodic table. understand chemical reactions through graphical
Periodic table is an important part of chemistry subject which representation and from user defined chemical reactions user
provides the complete information about the elements and can put the desired elements and get the chemical reactions of
their types. They are arranged according to the number of it. The quiz is an important part of PTMLS which helps the
protons, neurons and electrons in atomic nuclei and grouped students to evaluate their learning competency. Figure1 is
according to their chemical. The taste of acids are sour, representing the main page of (PTLMS).
corrosive to metals, change litmus colour into (dye extracted
from lichens) red, and become less acidic when mixed with
bases. Bases feels slippery and changes the colour of litmus
into blue, and become less basic when mixed with acid.

II. PROBLEM STATEMENT


Students of 9th and 10th class were facing challenges to
understand the periodic tables elements and their properties.
Lack of graphical representation causes to increase the level
of difficulty in understanding the periodic table elements,
their chemical reactions, Lewis structure of Acids and Bases.

III. PROPOSED ALGORITHM:


For the students of class 9th and 10th it was difficult
understand the periodic table elements and their properties
without the graphical representation. This desktop application
provides interactive learning platform for the students in
order to understand the main topics of chemistry for example
periodic table elements, basic information of acid and bases,
Figure1: Main Window PTLMS
chemical reactions, compounds and their complete
information. The graphical representation of the chemical V. CONCLUSION
reaction and their atomic structure makes it easy for the

30 | FICT URC1-2016
In order to remove the difficulty to understand the periodic
table we have developed this desktop application. The
purpose of (PTLMS) is to provide the interactive learning
platform for the students to easily understand the acid, bases,
chemical reactions, their properties and information about the
periodic table elements. This package permits the students to
learn the basics of Acids and Bases and their compound
properties. This desktop application will have the capability
to provide the answers of subject related questions. . In this
application the elements and their reactions are graphically
represented which offers the convenience for the students for
easy learning. PTLMS provides the interactive, easy and
learnable educational environment for the students of 9th and
10th classes.
REFERENCES
[1] https://www.google.com.pk/search?q=SOURCE+OF+ELEMENTS+IN+P
ERIODIC+TABLE&oq=SOURCE+OF+ELEMENTS+IN+PERIODIC+
TABLE&aqs=chrome..69i57.12922j0j7&sourceid=chrome&ie=UTF-8

31 | FICT URC1-2016
Repeating course Web Portal
Saba Khalid, Abdul Haseeb Butt, Sidra Attique, Miss Kanza Ali
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Saba_khalid27@ hotmail.com
Abstract Repeating Course Web Portal is a web based Following users will use this software after deployment:
application which helps student to submit their repeating or Administrator
improving course enrolment request online. Student dont need Students
to suffer from lengthy process of submitting form.
Focal Person
I. INTRODUCTION V. METHODOLOGY

This project is aimed at developing an online repeating Focal Person Login to the system through the first page of the
course web portal that is of importance for university application. See his/her course enrolment history for
organization. The Repeating Course web Portal is an internet requested courses from students. Web Master will create and
based application that can be accessed throughout the world. update the accounts of focal person and students. Student sign
This system can be used to automate the workflow of Students up and login to the system through the first page of the
application, fill the course enrolment request form and then
Enrollment in subject. To provide easy and help full
later check his/her status of request from Focal Person.
environment for students and provides ease for Focal Person
for accessing record.
VI. RESULTS AND DISCUSSION
II. PROBLEM STATEMENT
1. To provide web portal for students to submit their
1. Access of paper work.
requests online without errors and delay.
2. Student has to suffer from lengthy process for
submitting their form and fee challan. 2. To provide an online environment to students for RPT
courses from different board of studies applied on
3. While filling form student exactly do not know the
different admit terms. Students can check the status
course title, credit hours, course code and pre-
of their requests online and on the other hand they
requisites of course.
can apply for other courses according to undergrad
4. Writing mistakes are common. policies of university.
5. It is very difficult for focal person to manage and
check forms manually. 3. To reduce Errors.
4. Paper work will be reduced.
III. PROPOSED ALGORITHM 5. Provide online records of repeating courses of
students.
The product is supposed to be an open source, under the GNU
6. Focal person also have to just approve or reject
general Public License. It is a web based system
requests online.
implementing client-server model. The web portal provides
an easy access to student and faculty members for enrollment. VII. ACKNOWLEDGMENT
User Account: The web master will created the admin who
All praise to almighty ALLAH, the most gracious and the
will manage the information about the enrollment of students
and their fee process as well as their appearance in the most merciful. Without His blessings and guidance our
subjects. accomplishment would have never been possible.
This system will consist a web portal will provide an access We owe a debt of gratitude to our supervisor Madam Kanza
for focal person to check and enroll the students by approving Ali. We are very grateful for his help and invaluable
their request. The student does not have to worry if her/his guidance, patience and continued encouragement she
from miss place in file system and also have a feedback provided to us on countless occasions. She has given our
wither they are enrolled or rejected due to increase in credit ongoing progress a continued support which has helped us in
hours or fail in pre-requisite. The app will provide the well- completing this thesis successfully. Without his assistance
formed interface and reports and approve and rejection this project would have been a much greater task and it would
control. Student are informed the deadlines for enrollment for have been very difficult to complete it on time.
regular sessions. Students are provided with automatic list of We would also like to acknowledge the overall support of
subject according to different board of studies which are department faculty members for their technical help in the
applied on different admit terms in academia. related areas and important technical comments that we
IV. USER CLASSES AND CHARACTERISTICS found useful for writing in our project report. Specially, we
are grateful to our loving parents and elders who provide us

32 | FICT URC1-2016
with all sorts of moral and social support in our life. Our
words are insufficient to express our feelings and gratitude to
our loving family.
We pray that may Allah (the most high) give us strength and
courage so that we can to serve our Nation and country.

REFERENCES
[1] http://www.technogumbo.com/tutorials/Red5-Media-Server-
Development-Setup-Tutorial/Red5-Media-Server-Development-
Setup-Tutorial.php
[2]http://en.it-usenet.org/thread/17298/2226/

33 | FICT URC1-2016
Traffic police Challan automation
Muhammad Dawar Malik Hassan Raza Mohammad Abbas, Mohammad Junaid
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
m_dawar93@yahoo.com

Abstract Anyone who performs violation of traffic rules, Sometime wardens also takes bribe from violators
suffers from lengthy process of challan so this project is aimed which is equal to fine amount of violation
at developing an online challan automation system. The Traffic Wardens also misuse CHALLAN books.
police challan automation is a web based application which
As it seems that it is a lengthy and frustrated process for both
helps people to pay the CHALLAN on the spot The Traffic
Police Warden can provide their User name or password to
violators.
easily login the TPCA. If we can have any system by which warden can receive
CHALLAN fee from violators on the spot then this will solve
many problems like
I. INTRODUCTION When violator perform violation warden file
This project is aimed at developing an online CHALLAN CHALLAN by using TPCA
automation system that is of importance to a traffic police He ask violator to pay on the spot and after payment
Baluchistan. The traffic police CHALLAN automation warden clear violator.
System (TPCAS) is an Internet based application that can be Warden when clear CHALLAN and receive
accessed throughout the world. This system can be used to CHALLAN fee from violator then this amount will be
automate the workflow of CHALLAN in a city. There are added in his account so that he have to pay that
features like create CHALLAN, clear dues, create account, amount to admin at the end of the day in order to
create violation, and update record. The TRAFFIC POLICE clear his dues.
CHALLAN AUTOMATION is a Web Based application Admin clear dues of warden after receiving dues
which helps people to pay the CHALLAN on the spot The amount from warden
Traffic Police. The User Can Easily Check there CHALLAN
against the violation. This web app provide the convenience III. WORKING:
to user then do not go to BANK and to pay the fine then come The product is supposed to be an open source, under the GNU
back to post and receive there document now this app is general Public License. It is a web based system
provide to pay the CHALLAN on the spot to warden implementing client-server model. The traffic police challan
automation provide the challan pay on the spot.
II. PROBLEM STATEMENT: User Account: The web master will created the admin who
When CHALLAN was filed against any violator then will manage the information about the dues and violation and
Warden fill CHALLAN form manually This system will consist a web portal web portal will provide
Warden takes any documents from violator a traffic police sergeants that he can easily cut out the challan
Warden give two copies of CHALLAN form to that and the user will pay the challan on the spot. The Violator
violator and keeps other one CHALLAN copy with have not worry about their documents because when he doing
him and ask violator to pay CHALLAN after two days the violation the Warden can access our web and cut the
in national bank challan and he user will pay on the spot .For that, a database
Violator go to national bank and pay their CHALLAN will be used. Constraints:The interface will most likely not be
over there. the same for every one of them. Also, there may be a
Violator go to any police post and show CHALLAN difference between what navigation features each of them
form there then wardens search violator documents provide. The Internet connection is also a constraint for the
and return it to them application. Since the application fetches data from the
Wardens also suffer from a lengthy process they give database over the Internet, it is crucial that there is an
their CHALLAN book to admin where admin Internet connection for the application to function.
manually computerize wardens details and
CHALLAN they filed A. Specific requirements:
NBL also charge 20 RS per CHALLAN from traffic This section contains all of the functional and quality
police. requirements of the WEB APP. It gives a detailed description
of the WEB APP and all its features. For an External
There is no any computerized record of violators

34 | FICT URC1-2016
Requirement Violator which violates can easily Pay update, delete violation and clear warden dues same as for
CHALLAN by on the support traffic police employee warden can create violator challan and
B. User Classes and Characteristics: clear violator challan as well. Web master function are to
The main class is person class which is divided into four create registration and update, delete for Admin and warden
main components or entities following are the entities. accounts. Violator can only check challan against CNIC by
Violator using search bar.
Employ Object class are:
Law Dues which is storage for data and dues on warden
Account and violator.
Dues Log table which stores the time of login logout.
Admin will manage the accounts of admin class and Warden And violation which stores information or rules
Class by providing access to interact with Web App. Admin implanted on while we are driving.
use the registration Process for Admin and warden and create
accounts and Give them ids and passwords along with role to
access web app.
C. Admin
Violation is a set of rule used for better environment
while driving on the road by using his rights he can view
warden list his dues.
D. Warden:
He can have minimum right for the web app he can only
create the challan and can clear dues by viewing the violator
list
E. Violator:
Have lest role but important role in this application by
action of violator all these process will be generated. Violator Figure 1 Entity Relationship Diagram
can check the challan against CNIC by using search box and
can also pay CHALLAN against him.
F. Operating Environment:
VI. RESULTS AND DISCUSSION:
Our web application can only access through web. It will There are many advantages of this system like
require the operating environment for a client and server GUI Violators dont have to wait for 2 days this will save
that can be and operating system like windows and mac as their time and efforts
well as it can also access through android. This operating Admin dont have to enter record of wardens
environment can be server for database and entries and for CHALLAN details manually
designing and creation is we are using Asp.net framework Violators instead of giving bribe to warden pay
with SQL management studio. CHALLAN fee.
This system saves 20 RS per CHALLAN.
V. METHODOLOGY Completely discard miss use of CHALLAN books.
Functional requirement is minimize the paper work and REFERENCES
online system for challan to ease the city and database will be [1] Adam Freeman. Pro ASP.NET MVC 4
stored on server there will be no more paper entries and data [2] Jon Galloway, Phil Haack, Brad Wilson, K. Scott Allen Professional
loss in our project. Major Service is CHALLAN on the spot ASP.NET MVC 4
which will ease the violator warden and also data on hand [3] Jose Guay Paz Beginning ASP.NET MVC 4
[4] http://www.asp.net/mvc
process will be saved. [5]https://www.youtube.com/watch?v=iNSy97kqGQY
There is four user class and three object class and function are
distributed with them
User class are:
Violator
Law
Dues
Account
Employ
Basic functions are same like name CNIC etc. Burt specific
function includes for Traffic police employee admin is create,

35 | FICT URC1-2016
Kids Zone
Mohib Ullah, Arbab Taimoor khan, Miss Attiya Shoaib
Department of Computer Sciences,
Faculty of ICT, BUITEMS, Quetta, Pakistan
moheeb_daavi@yahoo.com

Abstract Android Application has gained popularity due modules are integrated to form a sing unit application. The
to the advancement of many technologies of computing so; our kid zone is an Android OS application which has been
goal is to develop an Android Application We proposed to developed in various softwares such as unity, Blender and
design something that can make basic education easier and Photoshop. The app consists of 8 modules each module has its
comfortable for children. Android app has many platforms .For
own specific function. We have also applied 2D and 3D
example, Android mobile, Tablet, etc. Our App is the emerging
solution for children to learn basic education. The aim here is to technology in this app. We developed and saved all 2D
design a KIDZ ZONE is to make basic education interesting. images in Adobe Photoshop .JPEG files and then import them
The project will help generate interests of children as well as to Unity3D software for 3D animation. We used Blender and
innovations in the fields of Education while working towards a then import the rendered save AVI. JPEG file format and
practical and obtainable solution to the learning process better. drop it to the Unity3D animation file. Our all 3D files are
Technology has finally bridged the gap between Parent and developed and rendered in Blender like shapes, colours,
children allowing for a more efficient and effective method of module and a baby which is used in body parts module. For
learning study. It will polish the great educational skills of 2D we used Photoshop including our all images like
students and help to build the base of student.
background images, shapes texturing, Truck design,
Alphabetical and Numeric designs and our sliding train. We
I. INTRODUCTION
also used voice and music in application which we simple get
KIDSZONE is an Application that is capable of through from internet music collection while voice is
performing children capability of learning. Our application is recorded in voice recorder and then apply in to application.
one of the fastest growing and improvement of education for There are different modules, which are being categorized.
children. Such type of applications is more commonly used The working and description is as follows. The alphabet
today than ever before and every one used Android mobile module is developed by using 2D technology. We have
and tablets. Children now easily learn from animated app designed 26 alphabets which appear on the screen through a
instead of learning from books and other source of learning. It slide train concept by touching finger. The Number module
is basically a 3D animated application. It is also convenient also uses the 2D. The concept scenario similar to that used in
for teachers in School and for parents at homes. Its friendly alphabets modules the only different is that instead of
user interface will help the users to interact in easy way. The alphabets number (0 to10) appear on the screen. We have
basic aim for the development of this application is to keep used 3D technology in this module to make the shapes appear
the children busy in learning some new things. This in 3D by clicking on the shape module. Different shapes,
application is more useful for pre-school kids. The age may including circle, oval, cylinder, cube, sphere shapers appear
range from 3 to 5 years. Majority of the children use mobile on the screen. Colour module is made by applying 2D
technology nowadays. So such applications are more technology there are 8 different types of colours shape items
interactive and feasible for the children which beneficial their in this module. To add a fun element in this app for the kids
mental development. Children can learn more while playing we have added a game of each and every module in this
different modules of this project. This application is application. This module is designed in order to test the kids
comprised of different modules. Each module has its on how far have they learnt and understand each module as
specifications. this module contains quizzes associated in all the other
Modules. The body parts module is very interesting because
II. PROBLEM STATEMENT
we have designed a 3D animated child body in it. Every
Kids are more interested in using mobile phones. The main single body parts get highlighted upon finger touch. By
theme is to keep the children busy in learning the basic touching the different body parts, animated movements
education of pre-school sections, rather than using the flawed occurs that boost up the kid interest in this.
data.
IV. RESULT
III. METHODOLOGY
This app makes positive change in the mind of the children
The methodology for the development of this application is and makes them able to learn easily. By enjoying the
incremental model. Based on the incremental model, the environment provided by the application, it enhances learning
modules are developed one by one. Then finally these skill. This app develops the interest of student.

36 | FICT URC1-2016
Figure 1 Kids zone user view

V. CONCLUSION
The application is made to overcome the education
difficulties of children and promote childrens mind about
education. Our aim is to provide education in interesting way.
While playing with this application, children will be able to
learn in an interactive way. This app can play important role
in the learning process, that also makes perfect image in the
children mind.
REFERENCES

37 | FICT URC1-2016
Rescue and Surveillance Quad copter supporting wireless
video feed, movement detection and obstacle detection
with Solar charging ability
Students:Ashfaq Niaz, Uzair Ali, M Sohail, Zubair Khoso
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan

uzairali21661@gmail.com
ashfaq1niaz@outlook.com

Abstract - Quad copters is an aerial vehicle operated to fly A quadcopter uses 2 sets of identical fixed pitched propellers,
independently and is one of the representations of a UAV 2 clockwise (CW) or in one direction and 2 counter-clockwise
(Unmanned Aerial Vehicles). They are controlled by pilots on (CCW) or opposite direction. This helps the machine to hover
ground or simultaneously driven. They are called rotorcrafts in a stable formation. This is unlike most helicopters. Control
because unlike a fixed wing aircraft, here lift is generated by a set of vehicle motion is achieved by altering the rotation rate of
of revolving narrow-chord aerofoils. Drones are actually very
one or more rotors, thereby changing its torque load and
fascinating and in this project we are going to study about them,
their components and about its widespread applications that
thrust/lift characteristics. These use variation of RPM unit
determine its scope for the future. Drones are of different types (revolutions per minute) to control lift and torque.
and have different configurations for example, bicopters, Quadcopters are known by different names, including
tricopters, quadcopters, hexacopters, octocopters, etc. They have quadrocopter, quadrotor, quadcopter, UAV (Unmanned
different uses and accordingly respective configurations are used. Aerial Vehicle), or drone. There are series of bicopters (two
Hexacopters and Octocopters have better stability and blades), tricopters (three blades), quadcopters (four blades),
configuration. Control of motion of vehicle is achieved by altering hexacopters (six blades), and octocopters (eight blades). The
the rotation rate of one, thereby changing its torque load and multirotors with a high number of blades are designed to
thrust/lift characteristics. The use of four rotors in a quadcopter carry a heavier payload, for efficient take off smoothness and
allow the individual rotors to have a smaller diameter than the for efficient lift capacity. According to the efficiency needed
equivalent helicopter rotor, which allows them to possess less
for a particular task, respective series may be used.
kinetic energy during flight. Quad copters have different
structures and designs according to the work needed to be done by
it. Components like motors, batteries, electronic speed controllers A helicopter has one big rotor to provide all the lifting power
(ESCs) also vary according to the power needed and work done and a little tail rotor to offset the aerodynamic torque
by the quad copter. Also enhancements like PIR (Motion generated by the big rotor. Without it the helicopter would
detector), obstacle detectors and camera are used so that they spin almost as fast as the propeller. But a quad rotors all four
could add value to missions like disaster relief, search and rescue, rotors work together to produce upward thrust and only 1/4 of
agriculture and 3D mapping of the geography of an area. These the weight is lifted by each rotor. So less powerful motors are
widespread applications outshine the disadvantages which are used, making it cost efficient. The quadrotor movements are
rectifiable and hence this makes it a very productive technology in controlled by varying the relative thrusts of each rotor. The
todays world. It is supposed to appear into full time existence in quadcopter allows a more stable platform, making it ideal for
the coming years. But every technology has merits as well as tasks such as surveillance and aerial photography, attributing
demerits. It is up to us to use technology productively to enhance
to its unique design, helpful in war condition.
the people as well as the planet instead of using them
destructively. For instance, exploitation of drones by using them
for spying and other lethal purposes that can harm people.
II. PROBLEM STATEMENT
Block diagram if the proposed system is given as
I. INTRODUCTION Block Diagram:
A quadcopter or a quadrotor helicopter is a multirotor copter
that is lifted and propelled by four rotors. All the four arms
have a motor and a propeller at their ends each. The lift is
generated by a set of rotors and vertically oriented propellers,
hence quadcopters are classified to rotorcrafts.
They are also referred to as pre-programmed missions.

38 | FICT URC1-2016
improvise on inventing quad copters with new enhancements
and new designs. Hence quad copters have an exemplarily
bright future. The onus lies upon us whether we productively
use it or destructively use it.

REFERENCE
1) The website of abc NEWS posted an article by Rheana
Murray on 8th August 2014, [8] headlined, How Drones will
Replace Humans in the Workplace to which Mary
Cummings, a drones expert who teaches at MIT and Duke
University says, Maybe if youre a cargo pilot for FedEx or
UPS, drones will augment the delivery world and one could
argue that they would be much more environmentally friendly
Its very difficult during the warfare to monitor in any non- since they could take cars off the road for last mile delivery
going areas, loss in communication or when surveillance and help reduce congestion. She further adds, Jobs like
needed thus designing a system that will not only help in delivery for which cargo planes are used currently and crop
monitoring but could also be used for detection of obstacles dusting should be turned over to drones immediately. Crop
and movement. dusting is the most dangerous job in general aviation with a
high accident rate. Drones can not only do that job better, but
III. CONCLUSION much safer. This will happen in the next 10 to 20 years.
Drones will soon take on be an imperative existence in the Ultimately, drones will create more jobs than they replace,
coming future. They will be seen taking up larger roles for a they will save lives, and they will give us capabilities we only
variety of jobs including business in the immediate future dream about like everyone owning our own flying cars.
They could become a part of our daily lives, from smallest 2) In a website known as www.farmingdrones.com, an article
details like delivering groceries to changing the way farmers headlined Farming Takes Flight Drones save IL Farmers
manage their crops to revolutionizing private security, or Time and Money was posted. It explains how drones are used
maybe even aerial advertising. Today, quad copters are in agriculture to give a crystal clear view of their fields.
capturing news video, recording vacation travel logs, filming Dennis Bowman, a crop sciences educator with the University
movies, providing disaster relief, surveying real estate and of Illinois Extension, is using two drones to take aerial
delivering packages. They are categorized according to their snapshots of crops in the research plots on the universitys
corresponding uses. Some are for military purposes provided South Farms. He says, It offers a quick and easy way to
with missiles and bombs, some for surveillance and check on the plants progress and determine if they need
reconnaissance purposes. Agriculture is predicted to be the more attention. It does allow the opportunity to get an overall
dominant market for UAV operations. In Japan drones are survey of the area and make a better use of your time, rather
flown for the past 20 years. Lot of the farmlands over there than just walking out blindly into a field of corn thats taller
are on steep hillsides, and those vehicles can treat an acre in than your head, and hoping that you stumble across any of the
five minutes which is very difficult or even impossible to do problem areas that might be out there. [7] People think about
so with a tractor. drones and a lot of times, the negative connotations come to
The innumerable advantages of drones lead to their growth in mind, privacy issues and those kinds of things. But in the
a short span of time. They have a few demerits but those can agricultural community, were out in the middle of nowhere
be rectified. Today most drones are controlled by either most of the time, flying them over fields of crops. He further
softwares or other computer programs. The components of a says that the agriculture industry is expected to be one of the
drone also vary based on what type of work needs to be done largest markets for drone usage.
and how much payload needs to be carried. Out runners,
batteries, electronic speed controllers all come in different WEBSITES REFERRED
ranges according to the type of work needed to be done by the
[1] http://blog.oscarliang.net/types-of-multicopter/-postedon oct/25/2013
quadcopter. Quad copters are a great provisional craft that
could get in between airplanes and helicopters and are hence [2] http://blog.oscarliang.net/build-a-quadcopter-beginners-tutorial-1/-Posted
easier to fly all the time. Beside real- on June 25 2013
time 3Dflight, such as inverted flight, quad copters give a
[3] http://www.philforhumanity.com/Drones.html
more acrobatic feel to its flyers. Quad copters offers to be a
great balance between cost, capability, and performance. The [4] www.farmingdrones.com
only problem is when funds are coupled with highly [5]www.abcnews.com
ambitious projects. A solution for this could be to gradually

39 | FICT URC1-2016
Automatic School Attendance Marking and Parent
Alerting System Using RFID & GSM Module
Students: Noman Khan, Khushal Khan , Rehan Ullah Khan, Supervisor: Engr Waheeda Jabbar
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Nomankhanpanezai@gmail.com, Rehan21947@gamil.com, kk06378@gamil.com

Abstract - This paper presents the design and construction biometric scanning one at a time unlike RFID reader which
of automatic attendance marking and parent alerting system, in can sense the tag from a distance of about 2 to 3 inches and
order to create an ideal environment for teaching in classes. In relatively takes less time in comparing the number with the
this model every student and lecturer shall be having a unique
database.
RFID card. As a student comes near the class door it opens only
if his RFID matches with the database and once he entered the Our proposed model which uses RFID tags for every student
class the door closes. This process continues until the professor and teacher and GSM module to send messages to the parents
enters the class, once he enters the class the door is locked and of the absent students satisfies all the aspects required to
the list of absent students is created. SMS shall be sent to the create an ideal environment for teaching in the classes
respective parents of the absentee students. This module stays II. PROBLEM STATEMENT.
the most effective one to timely convey electronic alerts to
parents by stopping the disturbing ins and outs of students in Manual attendance system has always been considered as
class room. During this process though the RFID of the student time consuming from a teacher mindset as well as the
is matched he is not allowed to enter the class as he is late or any fallibility always stays high. Teachers time keeping will be
other student inside the class is allowed to leave the class. The maintained through this method.
class door opens only when the professor brings his RFID tag
near the class door indicating the completion of class and the This project not only design the whole circuit for automatic
same procedure continues for every class. attendance system but also it addresses the issue of parents
alerting of their Child presence by using RFID and GSM.
I. INTRODUCTION
III. METHODOLOGY
A Classroom is a place where individuals gather for the
purpose of learning and studying. The classroom may be of a Atmel8051 is a microcontroller used in this system. Signals
primary school, an elementary school, a college or a from RFID reader are given to the microcontroller and
university - but the purpose remains the same. Exponentially microcontroller use these signals to drive gear motor to open
and moreover, a good classroom also does facilitate the or close the door. There are two types of RFID tags active tag
teacher in various ways. An ideal environment for teaching in and passive tags. An active tag require power source, either
classes can be created by following certain aspects like connected to power source or use integrated batteries
automatically closing the door so as to prevent the noises connected to circuits and a passive tag is one which dont
from the outside to enter the class, preventing the late comers require power source and maintenance. Passive tags are small
in entering The class as it might cause distractions to the enough to fit in to particle adhesive label. GSM module is
students already present in the class, automatic attendance used to send messages to parents of student if they are absent.
marking in order to save time, not allowing the students to Gear motor is the normal dc motor attached with the gear
leave the class without the permission. system. This produces high torque at a relative low speed.
Up until now, class attendance records have been maintained This motor shaft is attached with a door. The dc motor is
manually by having students sign next to their names on connected to the microcontroller by the driver admin. This
printed class lists during class. This method is outdated, time- system works fine with three faculty and 15 students and can
consuming and a distraction for both students and teachers. be extended to any number of students. This small system
Another way of marking the attendance is through biometric which can be easily implemented at a low cost can be used
system though it is highly secure it requires a huge data base even in the schools of the small villages wherever GSM is
to store and map the finger prints of each student and it takes installed.
time as each and every student has to go through the

40 | FICT URC1-2016
IV. RESULTS AND DISCUSSION
The proposed system satisfies all the requirements needed to
create an ideal environment inside the class. The RFID tag
hich can be used as the identity card has the student details
and this variable data is displayed and is sent through the
short message service to the parents and class
admin. This system works fine with three faculty and 15
students and can be extended to any number of students.
This small system which can be easily implemented at a low
cost can be used even in the schools of the small villages
wherever GSM is installed.

FLOW CHART

Figure2: Block Diagram

Figure3: Snap Shot

V. CONCLUSION

Figure1: Flow Chart

BLOCK DIAGRAM Our proposed model works not only for the ideal case
consisting of fixed number of students with fixed number of
classes it can also works fine with variable number of
students in variable number of classes that is a given student
need not have to be registered in all the classes likewise a
class need not have to contain all the students registered in it.
With only limited and minimum number of modules it is
easy to fix and use.

REFERENCES

41 | FICT URC1-2016
[1] RFID -Based Students Attendance Management System by Arulogun O. [3] Embedded Based Automated Student Attendance Governing System by V.
T., Olatunbosun , A. , Fakolujo O. A., and Figure 3:Snap shot Olaniyi, O. Sivasakaran, S.Muruganand, Azha. periasamy-International journal of
M. International Journal of Scientific & Engineering and Advance Technology (IJEAT),ISSN:2249-
Engineering Research Volume 4, Issue 2, February-2013 8958,Volume2,Issue-5,June 2013

[2] ADVANCED EMBEDDED SYSTEM ASSISTED GSM AND RFID


BASED SMARTSCHOOL MANAGEMENT SYSTEM International
Journal of Advanced Research in Electrical, Electronics and Instrumentation
Engineering-Vol. 2, Issue 7, July 2013

Deaf talk (sign language recognition for deaf and dumb


people using flex sensors)
Students: Noman Khan, Khushal Khan , Rehan Ullah Khan
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
hadi12426@yahoo.com

Abstract - Before the arrival of advance technology it was they need more power and also it will be an expensive project
very difficult for the abnormal people to communicate with the which use camera so I think our project is better because it is
normal people and convey their message to them. Deaf and cheap and it doesn't need much power for processing and
dumb People use sign language to communicate and it was very giving us output. Another project used MEMS accelerometer
difficult for the normal people to understand their message. By
which could detect only 8 characters.
the time people started working to reduce the communication
barrier between the normal and abnormal people. A lot of new
inventions have been developed and at some extend has been II. PROBLEM STATEMENT
successful to overcome this communication barrier. For this
case we made this project.The idea is consist of designing an Deaf and dumb people use sign language for their
intelligent system a glove, using group of flex sensors, Artificial communication but it was difficult to understand by the
intelligence concept to take inputs of sign language hand normal people. The aim of this project is to reduce the gap
gestures and generate recognizable output,which will be: a, b, c, between them. Using this product I mean Deaf Talk which is
d,....., z, then they will be sent to mobile through Bluetooth or used as a translator we reduce the miss communication
they will be sent to computer through a data cable connected to
between the normal and deaf-mute people.
Arduino and they will be converted to speech by software made
in visual studio.
III. METHODOLOGY
I. INTRODUCTION
Our project is cheap and it doesn't need much power for processing
There are a lot of people in this world who cannot talk and giving us output. Another project used MEMS accelerometer
and hear, due to this reason they cannot communicate with which could detect only eight signs or eight characters. Here we
their family friends or other people who are normal and used 5 flex sensors, which has two pins one pin is connected to 5volt
because of this disability they lack self confidence in them. voltage pin of Arduino and another pin is connected to analogue pin
of Arduino and also connected to a 22k ohm resistor then connected
Such people use sign language for communication. It has
to ground. so it becomes a voltage devider circuit. flex sensor, in a
been observed that they find it really difficult at times to normal condition, without bending, it has 22kohm resistance. by
interact with normal people with their gestures, as only a very bending flex sensor its resistance increase up to 125k ohm.to make
few of those are recognized by most people. Sign Language is it more clear, we can bend our flex sensors up to 90 degree.
the primary means of communication in the deaf and dumb
community. The idea is consist of designing an intelligent
system, a glove, using group of flex sensors, Artificial
intelligence concept to take inputs of sign language hand
gestures and generate recognizable output, which will be: a,
b, c, d,.....,z, then they will be sent to mobile through
Bluetooth or they will be sent to computer through a data
cable and they will be converted to speech by android
application. The objective of this project is to develop an
intelligent system which can be called a translator between
sign language and spoken language. In image processing,

42 | FICT URC1-2016
Keypad for numeric inputs.

Figure 4: Flex sensors, keypad and Battery, which is giving power to Arduino,
connected to Arduino Uno

V. RESULTS AND DISCUSSION

The flex sensors are flexed and some values generates as Vout
to the analogue pins of Arduino and by putting if condition
code in microcontroller, we find its meaning which is
obviously a character but we changed it to phrase, then we
can print it on your android mobile phone through Bluetooth
device.

Figure 2: Flow chart

IV. BLOCK REPRESENTATION


Figure 5: Showing Output in Andriod App.
These sensors are used to reduce the power and cost. It is
used to detect the hand motion depends on the bending the Also we can see the output in our PC, we made a program in
sensors. The hand motions are detected by the Flex sensors visual studio which receives the output through data cable.
and the values are stored on the microcontroller memory unit. When one sign is sent to PC then it will be converted to
then we have many options: we can take the output by
connecting our mobile Bluetooth device with Bluetooth device
connected to Arduino and see the result, the other option we
connect our arduino board to the PC and we open the visual
studio program which we made for taking the text and then
covert them to speech and that is the result. We selected this
because now a days everyone has an android phone, so we
take inputs from flex sensors and keypad then we search our
database that what does deaf-mute person mean, which is
stored in our Arduino's microcontroller memory unit, then we
transfer this output to android mobile phones, which has our
app installed, through Bluetooth device. Here we have the
block diagram of our deaf talk project.
speech.

Figure 6: Showing Output in App which is made in Ms Visual Studio.

VI. CONCLUSION
This project is made to reduce the communication barrier between
the normal and abnormal people. A lot of new inventions have been
developed and at some extend has been successful to overcome this
communication gap. I tried to make a cheap project which can be
bought easily and need less power, so I made this, according to my
Figure 3: Block diagram
view it is effective and efficient.

HARDWARE REFERENCES
[1] Rajam, P.Subha,and Dr G Balakrishnan Real time Indian sign language
We used five flex sensors, Arduino Uno, Bluetooth device and recognition system to aid Deaf and Dumb people.13th international
conference on communication technology(ICCT).2011,PP,737_742
[2] PG Scholar, faculty Hand gesture recognition using MEMS for specially

43 | FICT URC1-2016
challenged people. International journal of VLSI and embedded systems On 3D accelerometer presented at the fifth annu.int.conf.ubiquitious
_IJVES (2013), ISSN, 2249_6556 system.
[3] PriyankaLokhande, RiyaPrajapati, SandeepPansareData gloves for the
sign language recognition system. International conference on emerging
trends in advanced communication technologies (NCETACT_2015), PP,
0975_8887
[4] Yang Quan, Chinese sign language recognition based on Video Sequence
Appearance Modelling, IEEE, 1537
[5] Nicolas Born, Senior Project Sign Language Glove, ELECTICAL
ENGINEERING DEPARTMENT. California polytechnic State University
1_49, 2010
[6] Glove talk: a neural network interface between a data glove and a speech
synthesizer IEEE trans.neural network.
[7] Hand written character recognition using orientation quantization based

KINECTOR MS Kinect based communication app for


hearing and speech impaired
Students: Mohammad Junaid Khan, Zeeshan Khan, Haroon Hassan, Haroon Khan Supervisor: Amir Ali Abro
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
lei.dasti@gmail.com, Zeeshan-khan@outlook.com

Abstract - Kinector allows a dumb person to convert his/her Our application is specifically designed to overcome some of
gestures into a more generic form i.e. (Voice and text) so that the toughest challenges dumb people faces in their daily life
others can understand their feelings in a more natural and easy by providing them effective way to communicate with other
way as it aims to fill the gap between physically fit and hearing peoples (no matter which region) in a more natural way
and speech impaired people in our society. Kinector contains
without the barriers of learning new languages etc.
prebuilt collection of signs (gestures) and their meanings that
are very common among all sign languages and their
community, plus it also allows the user to define their custom II. PROBLEM STATEMENT
signs (gestures) with a specific meaning attached and save it into
our web service so that they can take it wherever they want, to The dumb people were facing a lot of problem to
make sure, they have their own custom sign language with them communicate with other people due to the non-generalization
anytime, anywhere in the world under any environment of sign languages. Different sign languages are available but
i.e.(Home, Office) and it will automatically recognize those signs these are specific to particular regions. There is a need to
and convert them into the voice or text so that user can convey design an application or system that can solve out this issue.
the messages to others using voice/textual data or chat with
By using this application, they can communicate with other
someone using instant messaging (IM) over the internet.
people in a simple and efficient way. This application can
I. INTRODUCTION reduce the gap between the normal and deaf and dumb people
and in this way we can serve humanity.
The right to speak should not be denied to anyone. It will III. METHODOLOGY
be injustice if we ignore those who are deprived of this
invaluable gift. The only means of communication available A. Design phase
to vocally disabled individuals is through sign language. As the name suggests we will be using MS KINECT to
Using sign language limits them to their own world of people. capture different gestures and define our own meaning to
This limitation prevents them from interacting with the outer those gestures, as soon the gesture is captured it will be saved
world to share their feelings, creative ideas and the potentials in a specialized dictionary consisting of XML code along with
they possess but very few people understand them. This
the pictorial form of each frame captured in the processing of
increases the isolation of deaf and dumb people.
There exist many sign languages for dumb peoples to the gesture. Then using Skeletal Data to recognize gestures by
communicate with others, but all of them are restricted to a comparing them to gestures already saved in the dictionary
certain region i.e. (ASL for America, BSL for Britain etc), so consisting of all the body points saved in XML based on
that makes it difficult for a dumb person to communicate with skeletal coordinates of the person as shown in Figure 1 who
peoples from other regions, so we are allowing the user to saved them and convert them into voice via Microsoft Speech
define their own gestures and create their own sign API by converting the meaning associated to the gesture that
language. has been recognized and vice versa.

44 | FICT URC1-2016
will include different sort of gestures recognition that will
result the responsiveness of our software.
D. Evaluation phase
We will evaluate our project on the basis of testing results
after implementation of each function to measure the
efficiency of our application and making sure it works as
expected with less hustle.

IV. RESULTS AND DISCUSSION


Until now we have implemented 80% of our application and
the alpha testing of the application has showed promising
results with 70 to 75 % success rate in capturing and
recognizing the desired gestures, but it will be improved as
we refine the gesture capturing and recognizing system and
get used to of the precise movements which are required for
the MS KINECT to capture and recognize the gestures
effectively by being less prone to the errors and malfunctions.

V. CONCLUSION

So far from all the trials and testing we have concluded that
Figure 1
the application is performing the desired tasks with promising
results and the gesture interchange from one person to
another doesnt affect the functionality of the applications
output. But user needs to get used to of the already saved
gestures for desired results with highest success rate.
B. Implementation phase
The implementation phase covers the coding and interfacing
part of different components included in our application on
basis of architecture Figure 2 created in design phase.

Figure 2
C. Testing phase
We will test our application and study the efficiency and
effectiveness of our software in real-time. The testing phase

45 | FICT URC1-2016
On field alive human detection robot
Students: Syed Nouman Shah, Shahab Qadir, Rashid Ali, Sherullah Baig
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Supervisor: Mohsin Habib
Noumanshahbokhari0@gmail.com,shahabqadir1989@gmail.comRashidbaloch84@yahoo.comb.sherullah@yahoo.com

Abstract - Now a days the world has been changed into on 8 bit microcontroller Atmega328, PIR sensor is used to
global village. The developed countries are going towards detect alive human. This robot mainly used in disastrous
automation the intelligent robots are taking place of human in areas.
every field of life. The intelligent mobile robotic systems can be
very efficient tools to speed up search and research in remote
All the above system is controlled by microcontroller.
areas. Robotics are also useful in those areas which are Microcontroller is used to drive motors PIR sensors detect
dangerous for human. They can go anywhere in any situations alive human and give signals to microcontroller. The IP
and can also go into gaps and move through holes that are camera gives Live Streaming of overall Situation to mobile
impossible for human beings. Our precursory aim is to design a
robot to detect alive human in earthquake and other rescue
operations. The robot is control by smart phone through Wi-Fi
communication. Once alive human is detected, it directly give
visual alerts to rescue team over Wi-Fi technology on smart
phone and save the result of result of operation in its database.

I. INTRODUCTION
In destructed environment it is impossible to detect alive
human that need help and many of them lose their precious
life. Detection by rescue workers become time consuming due
to vast area and lake of rescue workers it becomes time
consuming and difficult as a result we lose precious life. This
project deals with live person detection robot which is based

46 | FICT URC1-2016
phone. DC motors are used to drive the robot. using which one can also view past records of rescue
Figure 1 operations for investigation purpose. The robot is controlled
II. BLOCK DIAGRAM from long distance using Wi-Fi signals.
The figure [1] represents the block diagram of the
designed project. The power supply is used to give REFERENCES
power to the circuit which activate the microcontroller
which then activates the motors and various sensors [1] Android based alive human detection robot. (BUITEMS Quetta).
used in project. The signals from sensors given to [2] Rescue robotics using artificial intelligence (Bharathiar University,
microcontroller using which microcontroller drive its Coimbatore, Tamil Nadu).
[3] Live Human Detecting Robot for Earthquake Rescue Operation (Bharath
motors according to signal given and communicate
University). Pete Miles & Tom Carroll, Build Your Own
with mobile. The Wi-Fi shield is used to communicate
Combat Robot, (2002).
the robot with mobile from long distance. The IP "Object learning and detection using evolutionary Deformable models for
camera is used for giving live streaming of operation Mobile robot navigation.
on laptop or mobile.
FLOW CHART
Figure 2

III. METHODOLOGY
ATMEGA328 is the microcontroller used in this system.
Signals from sensors are given to the microcontroller and this
microcontroller will digitize the signal and send it to the
android phone through Wi-Fi. The controller has properties
like inbuilt ADC, essential to get the signals from the
different Sensors. By this the microcontroller that is used in
this project has some extra advantages. The passive Infra-Red
(PIR) sensor will, under typical condition, detect a human
being moving around within approximately 10m from the
sensor. As live human body releases thermal radiation it is
received and used by the PIR sensor to detect persons. PIR
sensors are passive infra-red sensors. The PIR (Passive Infra-
Red) Sensor is a pyro electric device that senses motion by
determining changes in the infrared (heat) levels released by
surrounding objects. This motion can be detected by checking
for a rapid change in the surrounding IR patterns. When
motion is detected the PIR sensor will give signal to
microcontroller and then send message to android phone
through Bluetooth technology. We are also using ultrasonic
sensor, metal detector, humidity and temperature sensor,
vibration switch module to make the robot more intelligent.

IV. ANDROID APPLICATION

Designing an android app to control the forward and


backward movement of robot by phone. This will be done by
Wi-Fi module. It has the ability of giving information about
detection. Thus detection of alive human is showed as
message to the user.

V. CONCLUSION

Hence many lives can be saved by using this robotic


autonomous vehicle in disaster environment in short time
duration which becomes time consuming if done manually.
The android application also have ability to store records by

47 | FICT URC1-2016
Fire Fighting Robot with Video Surveillance using
Android Platform
Students: Najeeb Ullah khan, Behlol khan, Qudrat Ullah, Shaista khan,
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Supervisor: Sir Irfan Ahmad Magsi Irfanmagsi05@gmail.com
najeebpushtun10@gmail.com

Abstract - Robotics has gained popularity due to the beam of the robot. The LCD on the robot show the value of
advancement of many technologies of computing and Nano temperature and distance of object that are detected. While
technologies. So, our goal is to develop an intelligent multi
sensors fire fighter robot. We proposed to design something that
can make humans life easier and comfortable. There are many
possibilities a fire can start in an industry or in any remote area.
For example, in cotton mills, garments, fuel storages, etc.,
electric leakages can lead to huge damage. Robotics is the
emerging solution to protect human lives and their wealth and
surroundings. The aim here is to design a FIRE FIGHTING
ROBOT with video surveillance using embedded system and
android platform for remote operation. Robots designed to find
a fire, before it rages out of control, with fire-fighters greatly
reducing the risk of injury to victims. The project will help
generate interests as well as innovations in the fields of robotics
while working towards a practical and obtainable solution to
save lives and mitigate the risk of property damage. This
the receiver have Bluetooth device fed to the microcontroller
project is about the hardware, software, benefits and
interconnection of various parts involved in this very technology.
to drive DC motors. Ultrasonic sensor is use .Flame sensor is
Technology has finally bridged the gap between fire-fighting use for detecting the fire. LDR is use for to detect the
and machines allowing for a more efficient and effective method intensity of light. The whole operation is controlled by
of fire-fighting. Arduino microcontroller. A motor driver IC is interfaced to
the microcontroller through which the controller drives the
I. INTRODUCTION DC motors. The video is displayed on the screen. With the
invention of such a device, people and property can be saved
Robot is defined as a mechanical design that is capable of
at a much higher rate with relatively minimal damage caused
performing human tasks or behaving in a human like
by the fire.
manner. Robotics has gained popularity due to the Figure: (1.1)
advancement of many technologies of computing and Nano
technologies. Robotic is one of the fastest growing and II. PROBLEM STATEMENT
improving fields of today. Robots is use more commonly
today than ever before and it is no longer exclusively used by In incident the environment is impossible to save human
heavy production industries. Our task as a computer lives. Detection by rescue workers becomes time consuming
engineers to design and build a robot that could autonomously and control the System remotely, How to provide
detect and extinguish a fire show in figure (1.1). The Robot is communication to system and to see direction?
designed which using android application device for remote
operation. The robotic vehicle is loaded with water tanker and III. METHODOLOGY
a pump. The water pump is used to through the water on the
fire. At the receiving end three motors are interfaced to the Temperature sensor is use for sensing the temperature (if the
microcontroller where two of them are used for the movement temperature greater than 45 degree).we are using LDR sensor
of the vehicle and the remaining one is used to position the for intensity of the light. Using the Ultrasonic sensor for

48 | FICT URC1-2016
obstacle detection (within 35cm).Depth sensor is use for
detecting the hurdles. Camera will display the video feed.
We have set the two modes. Automating and manual.
1. In the automatic mode if the temperature become greater
than 45 degree and high intensity of light sense then beam
will move to that direction and water pump will automatically
throw the water on the fire.
2. In the manual mode we will move the beam and throw the
water on the fire by the water pump. The Arduino
development board collect data from sensors and to process
the data .If data the values of sensors exceed from threshold
then Arduino perform task.

IV. RESULT

The impact of this robot is to reduce the human losses in the


incident like fire etc. Reduce human involvement if used in
automatic mode less casualties is to be observed. Maintenance
cost is less and easily repairable. Improved safety and protect
property from loss. Easy to maintain.

V. BLOCK DIAGRAM

VI. CONCLUSION

This project is made to reduce the casualties and property loss


during fire accident. Continuously monitors, intimates the
respective personnel and extinguishes the fire. It aims to
promote technology innovation to achieve a reliable and
efficient outcome from the various instruments and devices.
They provide us great efficiency to detect before it become
uncontrollable and threat to life. Hence, this robot can play a
crucial role to rescue human lives.

REFERENCES

[1] MECHATRONICS ALPHA I (FIRE FIGHTING ROBOT) IJESAT


2012.
[2] http://www.robotics.com/robomenu/index.html.
[3] Hardware based Automatic Fire Extinguisher Robot.
Google.
[4] Wireless Fire Fighting Robot.
[5] Encyclopaedia of Fire fighter surveillance robot.

49 | FICT URC1-2016
Industrial surveillance robot
Students: Muhammad Afzaal Syed Samiullah Asad Akbar
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Supervisor: Saeed Magsi
mafzaal43@gmail.com watan_agha@gmail.com

Abstract - Many industrial applications require inspections algorithm is developed having the ability of avoiding barriers
and surveillance in hard-to-reach and sometimes even which is achieved by ultrasonic sensor.
hazardous areas. Industrial surveillance robot provide solution
to some of these kind of applications. Robot having the ability to II. MOTIVATION
follow the black line on a white surface. We propose a cost-
In order to reduce the human work, it is necessary of
effective four-wheeled surveillance robot using an Arduino
automation of black line following robot, this robot can be
MEGA microcontroller. Surveillance robots typically consist of
a XBee module for wireless communication and different
used in library to carry books from one place to another place,
sensors. The robot can be controlled remotely from a PC using and it can be used for home automation, in restaurant it is used
the XBee and the other XBee module residing on the robot. To as robotic waiter. [6] A restaurant in downtown Harbin, China,
sense temperature and humidity, we have used the temp and employs 20 robots instead of humans that cook, serve and
hum sensor. There is also a fire sensor for a fire alarming entertain its guests. The restaurant was opened in June 2012,
condition and the smoke sensor for the if there is smoke in the in this restaurant, line following robot is been used as a robot
industrial area or not. waiter running along tracks on the floor which carries the
These instructions give you the basic guidelines for preparing dishes to the desired table and it also serves dinner to the
papers for IEEE conference proceedings. family. They are well trained, efficient and fast and they wont
expect a tip for their efforts. This is 21st century customer
Index Terms - List key index terms here. No mare than 5.
service; they can work continuously for five hours after a two-
hour charge. But the worker will not work for free or a cheap
I. INTRODUCTION
labour. China is expected to be the worlds largest market for
Line follower robots are monotype mobile robot having the robots by 2014 [Source: arkazlive via YouTube]. As the
ability to follow a line very accurately which has an on board technology improves and the cost to build and run the robot
hardwired control circuit. [1][2] Usage of line follower robot drops. [5] So large country like India, it is necessary to use of
is also increasing day by day. Surveillance is the process of line following robot in restaurant, libraries, etc., but it is
monitoring a situation, an area or a person. Human necessary to equip restaurant, library with colored line tracks.
surveillance is achieved by deploying personnel near sensitive
areas in order to constantly monitor for changes. But humans
do have their limitations, and deployment in inaccessible
places is not always possible. There are also added risks of III. METHODOLOGY
losing personnel in the event of getting caught by the enemy.
With advances in technology over the years, however, it is The robot uses different types of sensors to gather all the
possibly to remotely monitor areas of importance by using necessary information. The sensors are line sensor ultrasonic
robots in place of humans. [3] Mostly, in all industrial areas, sensor obstacle sensor, temperature and humidity sensor,
where the automation is very much desired. As a RFID readers, fire sensor, smoke sensor.
consequence, a line follower robot is designed using artificial
intelligence for autonomous driving and to stay on the line. Block Representation
This design procedure is capable of tracking destination and
avoids collision through sensors.[4] A robot controlling

50 | FICT URC1-2016
The sensor which are used in the robot are show in the block
diagram. All the sensors are communicating with the V. CONCLUSIONS
microcontroller and the values are send to the main station like
The concept of the black color line follower robot is
like PC through the XBee module which is used for the
practically implemented in this paper based on
wireless communication between the main station and the
robot. The microcontroller which is used in robot is Arduino Microcontroller, RFID reader, XBee and sensors.
AT MEGA 2560 for its operations. The microcontroller is Simultaneously it makes the use of instructions from sensors
programmed using the Arduino IDE software. and on board Microcontroller which performs the physical
movements. The robot is succeeded to locate different
stations and at each station it will stop for few seconds and
send the values to the microcontroller. If the conditions are
properly set and calculations are accurately done, then
performance rate and accuracy will be more than ever.
Further, modification of this robot includes application of
shortest path algorithm and neural network so that it can
find its target more efficiently in shortest amount of time.
REFERENCES
[1] A.B.M Khalid hassanOptimizing the Turning Velocity in a Line
Follower Robot,", International Journal of Computer Applications
(0975 8887) Volume 117 No. 3, May 2015

[2] PriyankPatil,"AVR Line Following Robot, Department of


Information Technology K. 1. Somaiya College of Engineering
Mumbai, India. Mar 5, 2014.

[3] Dean A. Pomerleau; Jay Gowdy; Charles E. Thorpe, Combining


Figure 1: Block Diagram Artificial Neural Networks and Symbolic Processing for
Figure 1 represents the block diagram of the robot. Autonomous Robot Guidance," Engng Applic. Artif. Intell. Vol. 4,
IV. EXPERIMENT RESULTS No. 4, pp. 279-285,.

[4] L1U Shi-Cai,L1U Guang-Jun, "Formation Control of Mobile


Phototransistor is basically acting as a variable current source Robots with Active Obstacle Avoidance," Acta Automatica Sinica,
which changes with different intensity of light. With the help Vol. 33, No. 5, 2015.
of comparator circuit, it can give the output when it comes
[5] YANG Tian-Tian; L1U Zhi-Yuan; CHEN Hong; PEl Run,
under the contact of that line drawn. By using motor driver, it "Formation Control and Obstacle Avoidance for Multiple Mobile
follows the black line drawn on the floor. At the turn of the Robots," Acta Automatica Sinica, Vol. 34, No. 5, 2013-14.
line drawn, phototransistor doesnt get any output. DC motor [6] Sandhana, Lakshmi , A Theory of Evolution for Robots, Wired
must be controlled by the motor driver for movement of the Magazine ... Retrieved.
robot. For left movement the left side DC motors should be
stopped and the right side DC motors should be run in
forward direction. When the system detects any obstacle in its
path then the DC motor stops its rotation

Figure 2: snapshot of line following robot

51 | FICT URC1-2016
Digital Speedometer with Password and Speed Limit
settings
Students: Abdul Qadeer, Aftab Ahmed, AttaUllah, Monica Pervaiz
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Qadeerabdul725@gmail.com

Abstract - The main aim of this project is to design a digital Technology to assist drivers keep to speed limits or even
speedometer with password enabled with speed limit prevent the vehicle from exceeding speed limits on all roads
controlling. This simple system shows the ability to apply speed at all times.
limit controlling techniques to the vehicle. Our digital Although it is the case that a high speed crash is much more
speedometer takes input from vehicle speed sensor and executes
likely to result in a fatality, there are many more crashes
the speed limit controlling action. The system comprises of
keypad, LCD display and microcontroller unit. The user which occur at relatively low speeds. It is known that road
interface includes keypad through which the password will be accidents are increasing day by day. Most of these road
accepted by the microcontroller. Microcontroller controls the accidents are caused because the automobiles are driven at
over speed of vehicle. high speeds even in the places where sharp turnings and
junctions exist.
I. INTRODUCTION
III. METHODOLOGY
Digital speedometer with password and speed limit
The aim of our project is to design a digital speedometer with
controlling is different technology for automobiles. This
password enable speed controlling. Our speedometer can
instrument is normally used in maintaining the speed in that
calculate and display the speed of vehicle and also control the
your vehicle is operating, and is extremely useful in roadways
speed if it goes over speed. The system takes password input
and highways that have a fixed speed limit. The system
and check it is correct or not, if it is true than allows to drive
generally consists of numerical keypad, LCD and
over speed but if it is false than activate the speed limit
microcontroller unit. The speed sensor system is easy to build.
function. The speed is sensed from a speed sensor and given
LCD and keypad are interfaced with microcontroller using
to microcontroller which calculates and display the speed. It
program.
also compares the speed with stored speed limit data and if it
Keypad allows us to enter password to access the vehicle.
is over the speed limit than the obstacle lock the accelerator
This speedometer system can be used in manual vehicles.
pedal. So speed will decreases and when it comes below speed
This system is very useful for the beginner drivers and who
limit than the obstacle unlock the accelerator pedal and
drives over speedy in city and highways.
continues.
II. PROBLEM STATEMENT
IV. BLOCK REPRESENTATION
Excessive or inappropriate speed is a significant factor in
serious road accidents. Road safety authorities around the
world devote considerable resources to addressing the
speeding problem - particularly compliance with speed limits.
One countermeasure that is gaining increasing attention is the
use in-vehicle

52 | FICT URC1-2016
accident Risk. The general relationship holds for all speeds
and all roads, but the rate of increase in accident risk varies
with initial speed level and road type. Large speed differences
at a road also increase the likelihood of an accident. In
addition, drivers driving much faster than the average driver
have a higher accident risk; it is not yet evident that this is also
also the case for the slower driver. By this digital speedometer
we can control the over speed of vehicle and also protect it
from theft. By it we observe that consumption of fuel will
decreases. This is cost effective product, life is higher than
analog speedometer. This product is very useful for vehicles.

V. RESULTS AND CONCLUSION


A higher speed increases the likelihood of an accident. Very
strong relationships have been established between speed and

Helper robotic arm


Students: Mohammad Shoaib, Waseem Akram, Slaiman Khan, Zahid Hussain
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Supervisor: Amir Ali Abro Amir@amirabro.me
enrhmshoaib194@gmail.com

Abstract - In todays world there is an increasing need to create There are various ways in which a robotic arm may be
artificial arms for different inhuman Situations where human controlled. In the past there have been many researchers
interaction is difficult or impossible. They may involve taking working to control robotic arm through computer terminals,
readings from an active volcano to diffusing a bomb. Here we Joysticks, even interfacing them with the internet so they can
propose to build a hand gestured based robotic arm by natural
be controlled from anywhere in the world. Usually most of the
human arm movements This robotic arm is a robotic
manipulator, usually programmable, with similar functions to a robotic arms are controlled by a central controller which
human arm. The development of this arm is based on makes uses of values taken in from the terminal that are
ATmega328 platform called Arduino along with a personal entered by the user at the terminal to move the arm to a
computer for Signal processing, which will all be interfaced with particular coordinate in space. This makes the control very
each other using serial communication. Servo motor is used for difficult as the control values of the motors are very difficult to
joint rotation. We can restrict its rotation from 0 to 90 or 0 180 predict to achieve a particular movement. This is easily
depending upon the conditions. It has about same number of achieved by our project.
degree of freedom as in human arm. Humans pick things up
without thinking about the steps involved. In order for a robot or II. PROBLEM STATEMENT
a robotic arm to pick up or move something, someone has to tell A Hand Gesture Based Robotic Arm is a kind of robot which
it to perform several actions in a particular order from moving can be controlled by the hand gesture. It is an arm consisting
the arm, to rotating the wrist to opening and closing the
of four joint just like a human arm (like shoulder, elbow,
hand.
wrist, jaw). It contains four servo motors and Arduino
microcontrollers are used. Each servo motor is connected to
I. INTRODUCTION the joint of arm just like human arm. Robotic glove is wearied
by Human hand on which circuit is placed. The robotic glove
Robotic applications are widely used in research laboratories
circuit includes gyro sensor and flex sensor and also Bluetooth
and industries to automate processes and reduce human
module. One Bluetooth module is placed on robotic hand and
errors. In general, robotics can be divided into two areas,
the other on the robot. When the hand is turned or tilted the
industrial and service robotics. Recently, strong efforts have
gyro sensor sense the motion of the hand and also when the
been carried out to develop intelligent and natural interfaces
fingers are bent then the flex sensor sense the change in value
between users and computer based systems based on human
and sends the signals which is received by the other module
gestures. Gestures provide an intuitive interface to both
and the movement in the robotic arm is executed. Thus gyro
human and computer. Thus, such gesture-based interfaces can
sensor is used in order to move robotic arm left right & up
not only substitute the common interface devices, but can also
down and flex sensor controls the movement of robotic wrist
be exploited to extend their functionality. Therefore, a robot
and gripper the robotic arm is mounted on the chassis of a
can be replaced human to do work.

53 | FICT URC1-2016
tank which is also controlled wirelessly with Bluetooth via module in the matter of seconds the master will connect to
computer program. to the slave deceive both modules will start flashing at
every two seconds indicating the successful connection.
III. METHODOLOGY The gyro sensors, flex sensors and
In order to pair two HC-05 Bluetooth module as master Bluetooth modules are connected to Arduino Nano
and slave we need to switch to AT command mode. HC-05 developing board. The transmitting circuit processes the
module are by default slave module. But to know the signal obtained from flex and gyro sensors and transmit
these signals via Bluetooth module to the receiving part
address we have to enter AT command mode.
of the robotic arm.
Connect the slave Bluetooth module using jumper wires to The receiving circuit receives the signals from transmitter
Arduino. circuit and execute the servo motors.
Thats all we need to configure the Bluetooth module to
work as master and slave devices and now if we reconnect
reconnect them in normal data mode and repowered the
movement is precise, accurate, and is easy to control and user
friendly to use. The robotic arm and vehicle has been
developed successfully as the movement of the robot can be
controlled precisely. This robot control method is expected to
overcome the problem such as placing or picking object that
away from the user, pick and place hazardous object in a very
fast and easy manner.

IV. RESULTS AND DISCUSSION


Our software has been tested and verified working. The
connection between the robotic arm and the app is very
strong. The movement is accurate up to 1-degree angle and
can be improved by working a bit more on the software side of
the controlling application.

V. CONCLUSION
The objectives of this project has been achieved which was
developing the hardware and software for a Wireless Hand
Gesture based robotic arm with controlled chassis tank. From
observation that has been made, it clearly shows that its

54 | FICT URC1-2016
55 | FICT URC1-2016
E-PROCTOR
Students: Fatima, Carlos, Sarmad, Supervisor: Riaz ul amin
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan

Abstract - This an android based application which will run frequently so keeping in mind our project this model is the
on android based cell phones and tablets. This app is a most suitable shown in figure 1.
combination of a scheduler and a system for lawyers and
advocates and judges where they can enter their cases and even
get reference from our e-book library where they can find
different articles of Pakistan. And this system can be expanded
with time to add more features. In Pakistan person related to
law are facing quiet problems regarding keep every detail of
every case in their mind its quiet complicated and they have to
go from a lot of books to find the regarding that case. And they
have to manually write details of every case in there diaries and
make a lot of files for a single case. If they are travelling so they
have to carry number of files and books as well which is very
hectic.

Fig (1.0)
I. INTRODUCTION
This app will allow the lawyers of Pakistan to manage IV. METHODOLOGY:
and schedule their different cases over their mobile phones
they dont have to carry number of files and write every detail for the development of this application and keeping its
manually on their diaries. They just have to take out their maintenance in our mind we are going to apply incremental
mobile phones and open the app and avail different services model of SDLC in our application because its requirements
we are providing. are not changing that much but need to be maintained
[2the Scheduler is used to provide client case info in a frequently so keeping in mind our project this model is the
managed way [3] we would like to add more features to the most suitable.
system in order to provide more help to our clients so that
they can do their work in a more efficient way. For the V. TOOLS:
development of this application and keeping its maintenance
in our mind we are going to apply incremental model of The development of this application is going to be in Java
SDLC in our application because its requirements are not language as its facilitate us with multiple libraries and its
changing that much but need to be maintained frequently so one of the most strong language in market. It will be
keeping in mind our project this model is the most suitable. developed on android studio.

II. PROBLEM STATEMENT: VI. CONCLUSION:

In Pakistan person related to law are facing quiet problems E-proctor is an android application that will help lawyers
regarding keep every detail of every case in their mind its save their cases and client information digitally as well as get
quiet complicated and they have to go from a lot of books to access to Pakistans law digitally and manage everything on
find the reference regarding that case. And they have to the go.
manually write details of every case in there diaries and make
a lot of files for a single case. If they are travelling so they REFERENCES
have to carry number of files and books as well which is very [1] Lawyers dairy
hectic. [2] Pakistan panel court for articles

[3] Lawyers scheduler


III. PROPOSED MODEL:

for the development of this application and keeping its


maintenance in our mind we are going to apply incremental
model of SDLC in our application because its requirements
are not changing that much but need to be maintained

56 | FICT URC1-2016
File Management and Tracking System
Students: Nisar Ahmed , Muhammad Younis , Zirak Khan, Supervisor: Zubair Zaland
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan

Abstract - management and Tracking System is used for


creating and tracking files. In every organization file work is IV. OBJECTIVE:
mandatory therefore in this system users can easily send file
from one department to another or from one user to another.
The main objective of this document is to illustrate the
This web application is designed for Automation of Department requirements of the project File management and tracking
of organization to keep track of every file. Users can easily track system. The document gives the detailed description of the
his/her own files though file id, file subject, created date. The both functional and non-functional requirements. The
system provides restricted access over files. document is developed after a number of consultations with
the client and considering the complete requirement
I. INTRODUCTION specifications of the given Project. The final product of our
In every organization file work is mandatory. Currently group will be meeting the requirements of this document.
files move manually, carried by a person from one person to
another person in order to carryout official work. Files moves V. CONCLUSION:
in a hierarchical way. There are two types of files
Finally, the systems have achieved the proposed outcomes
(1) Note portion and
through creating and tracking files for users in office work.
(2) Applications
The proposed file management and tracking system design
Note portion files are those which has supported documents
for scaling accuracy, performance and time management
attached for evidence while applications are leave
especially for office work. The performance of the system can
applications.
be further optimized compared to scaling work.
This system is basically intended to replace the manual file
system via deploying a computerized data based application
REFERENCES
in which users can know the details and status of their files.
[1] Future Digital Library Management Systems: System Architecture
II. PROBLEM STATEMENT: and Information Access :8th DELOS thematic workshop : Schloss
Dagstuhl, Germany March 29 April 1, 2005
In present situation in any organization file work is [2] Harmonising the process of procuring library management systems:
mandatory , so every time moving files manually from one a feasibility study By 1.Shelagh Fisher Rachel Delbridge 3.Sin
department to another or from one branch to another is Lambert.
somewhat so difficult and time consuming. To avoid this [3] www.ProjectManagementDocs.com
problem and to communicate each branch and department we
[4] Software Engineering A Practitioners Approach Sixth Edition By
are going to introduce web based File management and Roger S.Pressman
tracking system.
[5] http://www.techwrl.com/techwhirl/magazine/writing/softwarerequir
ementspecs.html
III. PROPOSED SYSTEM:

The main aim of the project File management and Tracking


System is to provide flexibility to govern organization to
maintain huge amount of pending files. This system will help
all government organization to keep track of every file. This
web application is designed for Automation of Department of
organization. In this System, We need to process files in
Hierarchy and proper action should be taken and necessary
permissions are given for the requested Files.

57 | FICT URC1-2016
Image Security
Students: Agha Khushal Khan, Suman Shahid and Sehar Sajjad; Supervisor: Mr. Zubair Zaland
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
aghakhushalkhan@yahoo.com

Abstract - In this project, we will provide an overview of the the internet in the digital world today, thus the basic idea of
mechanisms used in image protection, especially encryption encryption is to hide information from prying eyes. There are
techniques available today. We will see how AES is better than traditional encryption techniques like DES, Triple DES,
previously proposed methods such as Data Encryption Standard IDEA, etc but at a certain point issues occur regarding to;
(DES), Triple Data Encryption Standard (Triple-DES) that have
requires large data size,long computational time, high
been applied in image protection domain. The Advanced
Encryption Standard (AES) is a publicly defined encryption1 computing power, not suitable for practical image encryption,
standard used by the U.S. government. It is a strong encryption etc.
method with reasonable performance and size, replacing both
the Data Encryption Standard (DES) and the Triple Data III. PROPOSED ALGORITHM:
Encryption Standard (3DES). AES is fast in both hardware and
software, is fairly easy to implement, and requires little memory. Our proposed algorithm is AES (Advanced Encryption
Standard).AES is a symmetric block cipher used by the U.S.
I. INTRODUCTION government to protect classified information and is
implemented in software and hardware throughout the world
The Security of images plays a major role in global to encrypt sensitive For the applications of AES image
proportions. Image data are extremely sensitive and easily encryption and decryption, the encrypted image should be
possible to minor decoding by hackers. Images are used in different from and give no clue to the original one.
multiple areas for instance: distance education and training,
research and laboratories, commercial fields, military services,
in all these areas maintaining the security, and confidentiality,
accuracy of original image data is a vital issue. The main
Objective was to provide an Image encryption mechanism
which provides high security level, less computational time
and power in reliable and efficient way to deal with balky,
difficult and intractable data. Hence, securing of image has IV. METHODOLOGY:
become most vital issue. Image encryption techniques tries to
renovate an image to another image that is difficult to Rijndael or AES is a block cipher developed by Joan Daemen
understand; to keep the image confidential between users, in and Vincent Rijmen. The algorithm is flexible in supporting
other word, it is fundamental that no one could get to know any combination of data and key size of 128, 192, and 256
the contents without a key for decryption. In order to achieve bits. However, AES merely allows a 128 bit data length that
such a job, so many image encryption methods have been can be divided into four basic operation blocks. These blocks
introduced, but some of them have been known to be operate on array of bytes and organized as a 44 matrix that is
unconfident, so always we want to build up more and more called the state[.For full encryption, the data is passed through
secure image encryption techniques. Nr rounds (Nr = 10, 12, 14) .These rounds are governed by
the following transformations;
II. PROBLEM STATEMENT:
A. Subbyte
The sole purpose of encryption is to maintain the integrity Transformation: Is a nonlinear byte Substitution, using a
and confidentiality of the data. substation table (s-box), which is constructed by multiplicative
Almost all networks are being installed, interconnected to the inverse and Affine Transformation.
global network. The information is not only text, but also
audio image and other multimedia images have been widely B. Shift rows transformation:
used in our daily life. With the huge growth of computer Is a simple byte transposition, the bytes in the last three rows
networks and the latest advances in digital technologies, a of the state are cyclically shifted; the offset of the left shift
huge amount of digital data is being exchanged over the varies from one to three bytes.
various type of networks The security of digital image has
become more and more important due to rapid evolution of C. Mix columns transformation:

58 | FICT URC1-2016
Is equivalent to a matrix multiplication of columns of the
states. Each column vector is multiplied by a fixed matrix. It
should be noted that the bytes are treated as polynomials The cipher text image is blank image
rather than numbers.

D. Add round key transformation: Is a simple XOR between


the working state and the round key. This transformation is its
own inverse.
E. Expansion key: With AES encryption, the secret key is
known to both the sender and the receiver. The AES
algorithm remains secure, the key cannot be determined by
any known means, even if an eavesdropper knows the
plaintext and the cipher text. The AES algorithm is designed
to use one of three key sizes. AES-128, AES-196 and AES- This image is output for encryption and input to decryption.
256 use 128 bit (16 bytes, 4 words), 196 bit (24 bytes, 6 The decrypted output looks like original image
words) and 256 bit (32 bytes, 8 words) key sizes respectively.
These keys, unlike DES, have no known weaknesses. All key
values are equally secured thus no value will render one
encryption more vulnerable than another. The keys are then
expanded via a key expansion routine for use in the AES
cipher algorithm. This key expansion routine can be
performed all at once or on the fly calculating words as they
are needed.

IV.RESULTS AND DISCUSSION:

Here AES algorithm is used for image encryption. AES is V. CONCLUSION:


fastest algorithm among all others which shows comparative The above approach offers enhanced security, it aims to
performance benefits. We are using open source software java provide user satisfaction by offering personal and sensitive
application platform SDK therefore image encryption can be image data securely. This shows the successful image
provided without investing any cost. encryption as well as decryption. AES algorithm is used for
encryption.
The proposed methodology is applied for ensuring the Lastly, this intends to give an insight in understanding the
personal privacy with some modifications regarding interface concepts of image cryptography along with the importance of
and code. secure image transmission.

The original input image taken for the project REFERENCES

[1] www.hindawi.com/journals/jece/2012/17393

[2] Esatjournals.net/ijret.

[3] Image Encryption and Decryption using AES Manoj. B, Manjula N


Harihar

[4] Review on Image Encryption Sneha Ghoradkar, (M.E. VLSI & ES)
Department of E&TC,D.Y. Patil College of Engg, Akurdi,Pune
Aparna Shinde (Assistant Professor) Department of E&TC,D.Y.
Patil College of Engg., Akurdi,Pune

Input original image before encryption

59 | FICT URC1-2016
Patient Expert System
Student name: Faiza Razaq, Iqra Tabassum, Kinza Sattar, Supervisor name Dr. Riaz-ul-amin
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
faiza.razaq@yahoo.com iqra_tabassum47@yahoo.com

Abstract - The main objective of this system is to promote programming technique and has connectivity with SQL, as
health care practicality at the first hand i.e., enabling the the back-end software.
system to host features that not only contribute to IV. RESULTS AND DISCUSSION:
diagnosing/medicating the patients but also extending its roots
to the record management details, reliable data privacy along
The study indicates that maximum user's expectations were
with an effort to discouraging paper work thereby keeping the
patients connected to the doctors on the go using gadgets i.e., supported. The Patient Management System software meets
laptops, PCs etc. A detailed framework of a hospital user requirement relating to entering patient data. It shows
incorporating online facilities all molded into this single system. the number of patients registered in the hospital database.
This project work is on design and construction of Patient The system also was able to show patients past medical
Management System (PMS). The system provides the benefits of records such as diagnosis, drug prescription and dosage. The
streamlined operations, enhanced administration & control, system also gives the number of in-patients in the hospital at
superior patient care. The system uses JAVA as the front-end that particular time and what they are being treated for.
software which is an Object Oriented Programming language
and has connectivity with the back-end software. V. CONCLUSION:
.
I. INTRODUCTION
Patient Management System not only provides an
Medical records are the keystone to the healthcare opportunity to the hospital to enhance their patient care, but
profession; however these records are not utilized to their also can increase the profitability of the organization.
fullest potential. Often records are inaccurate, misplaced, and Hospital administrators would be able to significantly
/or duplicated unnecessarily. In a world which recognizes the improve the operational control and thus streamline
improvement of data digitization and networking as an operations. This would improve the response time to the
urging force which not only increases efficiency but also demands of patient care because it automates the process of
lowers costs at the same time; it is our view that medical collecting, collating and retrieving patient information.
records networking would really benefit the quality of
healthcare offered in Pakistan. REFERENCES:
[1] Hospital Management and Information System. Quintegra
Solutions (2006).
II. PROBLEM STATEMENT:
[2] Acheng, D.O. (2008). Records Management System for Mbarara
Lack of immediate retrieval of information is very difficult to Hospital (A Case Study of the Maternal and Child Health Section
[MCH]). Retrieved from
find particular information like- E.g. - To find out about the http://www.slideshare.net/dorisacheng/hospital-records-
patients history, the user has to go through various registers. management-system, 02/01/2014.
This results in inconvenience and wastage of time. Further [3] A. Silbershatz, H. Korth., S. Sudarshan, Database System Concepts,
the information generated by various transactions takes time McGraw Hill, 5th Edition, 2005.
and efforts to be stored at right place. Lack of prompt
updating of various changes to information like patient details
or immunization details of child are difficult to make as paper
work is involved. They are error prone manual calculation.

III. METHODOLOGY:

This PMS is based on the database, object-oriented


programming language and networking techniques. SQL
(Structure Query Language) is used in areas where keeping
the records in the database is necessary, this system uses
JAVA as the front-end software which is an object-oriented

60 | FICT URC1-2016
SendSecure: Encrypted Messenger for Android
Student name: Syed Muzaffar Ali, M. Sadiq Kakar, Mohibullah Khan. Supervisor: Adnan Ali Memon
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Smuzaffar_007@yahoo.com

Abstract - This work proposes an encrypted messaging data size, long computational time, high computing power,
application for Android users. It provides a secure channel to not suitable for instant messaging.
the users to chat securely online without any threat to their
privacy. Security at this level means that your messages are
encrypted before they leave your phone. Encrypted messages
III. PROPOSED ALGORITHM:
cannot be read by anyone except the recipient even if they are
interfered on exchange. People have issues with their privacy
as there is surveillance on their private chats as well as We are using public key algorithm for encryption. Public key
business secrets. The application will provide resistance to encryption solves the problem of maintaining key security by
surveillance and provide end-to-end encryption. having separate keys for encryption and decryption, which
uniquely match each other but are not predictable from each
I. INTRODUCTION other. In public key cryptography, the key has a public
part and a private part. The public part is made known to
Instant messaging has become the most common
everybody whereas the private part is kept secret by the
platform for communication. Instant messaging allows users
receiver. Anyone who intends to send a message to the
to communicate in quick and effective manners without the
receiver encrypts the plaintext using the public key
delays associated with emails. Instant messaging requires
corresponding to the receiver. Once encrypted using the
security as they can be compromised either by hackers or
public key, the cipher-text can only be decrypted using the
security agencies.The proposed application will provide end-
private key, which is safe with the receiver. We are using
to-end encryption for the users. Encryption is the process of
RSA public key algorithm. RSA stands for Ron Rivest, Adi
encoding the data or message in such a way that only
Shamir and Leonard Adleman, who first publicly described it
authorized persons can read it. The applications uses private
in 1978. The algorithm has three steps (1) Key generation (2)
key encryption for encrypting and decrypting the text. There
Encryption
are several organisations that provides the solution to the
(3)Decryption.
security of data in communications. Encryption is generally
regarded as safest method of guarding against the security
breaches. There is always a full time opportunity for further
research on Encryption algorithms that are needed in the
future.
II. PROBLEM STATEMENT:

The sole purpose of encryption is to maintain the integrity


and confidentiality of the data. Almost all networks are being
installed, interconnected to the global network. With the huge
growth of computer networks and the latest advances in
digital technologies, a huge amount of digital data is being
exchanged over the various type of networks. So there is are
lot of chance of our data to be compromised and interfered
and our private communication being vulnerable to the cyber-
criminals. The security of data has become more and more
important due to rapid evolution of the internet in the digital
Figure1: Proposed algorithm
world today, thus the basic idea of encryption is to hide
information from prying eyes. There are traditional
IV. METHODOLOGY:
encryption techniques like DES, Triple DES, IDEA, etc. but
A. Key Generation
at a certain point issues occur regarding to; requires large
The RSA key pair is generated as follows
* Generate a pair of prime numbers $latex p$ and $latex q$

61 | FICT URC1-2016
* Compute $latex n = pq$$
* Compute the Eulers function RSA is a strong encryption algorithm that has stood against
many tests. RSA implements a public-key cryptosystem that
* Find an integer $e$ such that and is allows secure communications and digital signatures, and
coprime with i.e. $gcd(e,\phi(n)) = 1$. its security rests in part on the difficulty of factoring large
* Find another integer such that . numbers. The authors urged anyone to attempt to break their
This is determined using extended Euclidean algorithm code, whether by factorization techniques or otherwise, and
nobody to date seems to have succeeded. This has in effect
which gives where $k$ is some integer. certified RSA, and will continue to assure its security for as
The public key consists of the pair and the private key long as it stands the test of time against such break-ins.
consists of the pair .
REFERENCES:
B. Encryption and Decryption
RSA algorithm uses modulo exponentiation operation for
[1] Rivest, R.; Shamir, A.; Adleman, L. (February 1978). "A Method
both encryption and decryption. The plaintext is first for Obtaining Digital Signatures and Public-Key
converted to numeric codes before they are encrypted. For Cryptosystems" . Communications of the ACM 21 (2):120
instance, the letters in the plaintext are represented as 126. doi:10.1145/359340.359342.
integers for example a = 00, b = 01 z = 25. Once [2] Prime Number Hide-And-Seek: How the RSA CipherWorks,
the plaintext is represented by numeric codes the ciphertext is http://www.muppetlabs.com/~breadbox/txt/rsa.html.
generated as [3] http://www.di-mgt.com.au/rsa_alg.html

[4] Alasdair McAndrew. "Introduction to Cryptography with Open-


The receiver decrypts the ciphertext using modulo Source Software"
exponentiation operation with private key pair as

RESULTS AND DISCUSSION:


The results show that RSA is a little bit slower than AES but
more secure and reliable in terms of data security and key

sharing.

V. CONCLUSION:

62 | FICT URC1-2016
Stocks & Inventory Management System
Student name: Irfan Ul Haque, Muhammad Ibrahim. Supervisor: Kamran Ali Memon
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
kamranalimemon@buitms.edu.pk

Abstract - The Inventory Management System is inventory


database capable of connecting multiple stores or warehouses. Diagrammatic Data.
This can be used to track the inventory of a single store, or to
manage the distribution of stock between several branches. The
system records sales and restocking data and provides
notification of low stock at any location.

I. INTRODUCTION
The database will be capable of connecting multiple
stores. This can be used to track the inventory of a single
store, or to manage the distribution of stock between several
branches. However, the system merely records sales and
restocking data and provides notification of low stock at any
location. REFERENCES
This application will be developed for general office use and
for stores management. [1] IEEE. IEEE STD 830-1998 IEEE Recommended Practice for
Software Requirements Specifications.
IEEE Computer Society, 1998.
II. PROBLEM STATEMENT: Lekkas, P.: Network on Chip, Springer, 2004.

Keeping store well managed is not an easy job at all, many


things are needed to be taken care of while doing the
respective job i.e. Time management, quantity management
and theft management.

III. OBJECTIVE:
The goal is to reduce the strain of tracking rather than to
handle all store maintenance. Further features may include
the ability to generate reports, but again the interpretation is
left to the management. In addition, since theft does
occasionally occur, the system provides solutions for
confirming the store inventory and for correcting stock
quantities. It will be helpful in record maintenance, stock
maintenance and would replace the manpower with
computer.

63 | FICT URC1-2016
Campus Management System
Student name: Abdul Monim, M. Awais, Pervaiz Khan. Supervisor: Zubair Zaland
Department of Software Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
zubairzaland@buitms.edu.pk

Abstract - The Campus Management System is database


capable of connecting UAFA & Sports Complex
The system records Sports Complex memberships and UAFA
modules details.

I. INTRODUCTION
The database will be capable of connecting UAFA &
Sports Complex. This can be used to track memberships of
Sport complex scholarships and events.
This application will be developed for general office use and
for campus management.

II. PROBLEM STATEMENT:


Keeping Campus well managed is not an easy job at all, many
things are needed to be taken care of while doing the
respective job i.e. Time management, quantity management
REFERENCES:
and theft management.
[1] IEEE. IEEE STD 830-1998 IEEE Recommended Practice for
Software Requirements Specifications. IEEE Computer Society,
III. OBJECTIVE: 1998. Lekkas, P.: Network on Chip, Springer, 2004.

The goal is to reduce the strain of management rather than to


handle all Sports and UAFA. Further features may include
the ability to generate reports, but again the interpretation is
left to the management. In addition, since theft does
occasionally occur, the system provides solutions for
confirming the Campus Management and for correcting
memberships. It will be helpful in record maintenance, stock
maintenance and would replace the manpower with
computer.

64 | FICT URC1-2016
Self-Navigation and Position Tracking System for
Visually Impaired Persons
Bashir Ahmed, Adil Israr
Department of Telecommunication Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Bashirkakar11@gamil.com

Abstract -Sensor based navigation and position tracking either depending on sighted humans or using Canes / Sticks
system will effectively guide the visually impaired person which is an extra burden to them.
without the need of walking stick and provide location of that Going from one place to another, they may lose their Memory
person at every instant. This project will create a better, because of too much tension.
alternative way for visually impaired persons to travel around.
We came across this idea because as technology has helped
many disabilities, the guiding walking stick has been the same III. PROPOSED ALGORITHM
as time goes on.
Build a sensor array that uniformly cycles and collects data
I. INTRODUCTION accurately. Build an audio device that takes analogue input
and converts it to audio based on information stored on an SD
Wed like to create a better, alternative way for visually card. If the object is stoppable than the audio will
impaired people to travel around. The current methods for communicate it to the user. All 5 sensors will run without
blind people are by either using canes, or by using a guide interference.
dog. We think that these systems can be improved upon.
Guide dogs can sometimes be unreliable (since they are
animals with their own conscious). Walking canes only give a
limited view of objects since they are not typically very long.
In addition, walking canes cant differentiate between an
object that is moving and an object that is still without
additional sweeps of the cane. We think that we can develop a
better method that makes usage of motion detection. Our
project will effectively guide the blind user without the need
of a walking stick. We came across this idea because as
technology has helped many disabilities, the guiding walking
stick has been the same as time goes on. This belt will tell the
user where objects are located. For example: if a person is
walking and an object is detected to the left, using low
powered vibrators, a small pulse will be sent to the left part of
his/her torso indicating that the user cannot walk in that Fig. 1The flow diagram.
direction.
IV. METHODOLOGY
Proper literature study was conducted. Collection of relevant
data. Programming the Software. Assessment of the
Hardware. Hardware presentation.
V. RESULTS AND DISCUSSION
The result in Figure 3 shows that the ultrasonic sensor will
sense an obstacle and the output will show on the LEDs
connected to it representing the corresponding distance on the
Fig. 1The Block diagram. LCD screen..
Finally we will replace the output of the LED with audio file.
II. PROBLEM STATEMENT:
In our society even all around the world the blind peoples
have so many difficulties to go from one Place to another

65 | FICT URC1-2016
Fig. 3 Initial Breadboard test.

VI. CONCLUSION
Over the course of the semester, we have become fluent at
programming on the Arduino and interfacing the Arduino
with external hardware. Learning and Understanding how
these components integrate let to the success of our project.
We are able to correctly detect a curb within a step of the user
and we can set the intensity of the corresponding motors
depending on the objects distance to the user.
REFERENCES
[1] "LVMaxSonar EZ1 High Performance Sonar Range Finder." Maxbo
tix. N.p., n.d.
Web. 01 Mar. 2015. <http://maxbotix.com/documents/MB1010_Datashee
t.pdf>.
[2] "Arduino SimpleAudioPlayer." Arduino SimpleAudioPlayer. N.p., n.d.
Web. 03 Mar.2015. <http://arduino.cc/en/Tutorial/SimpleAudioPlayer#.Ux
ds0vldWh0>.
[3] "Chaining MaxSonar Sensors, (AN Output)." Maxbotix. N.p., n.d. Web. 0
5 Mar. 2015.
<http://www.maxbotix.com/documents/LV_Chaining_Constantly_Looping_
AN_ Out.pdf>.
[4] "LM150 (ACTIVE) 3Amp Adjustable Regulator." Linear Regulator (LD
O). N.p., n.d. Web. 07 Mar. 2015. <http://www.ti.com/product/lm150>.
[5] [5]"Arduino SimpleAudioPlayer." Arduino SimpleAudioPlayer. N.p., n.
d. Web. 09 Mar.2015. <http://arduino.cc/en/Tutorial/SimpleAudioPlayer#.
UxgW8fPnbcs>.

66 | FICT URC1-2016
Implementation of Analyzed Electroencephalogram (EEG)
Signals for Brain Computer Interfacing (BCI)
Faizan Ali, Israr Muhammad, Maham Ruba, Zahid Mehmood
Department of Telecommunication Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan

Abstract Movement restoration for independent mobility is to severe motor neuron disabilities like Amyotrophic Lateral
core to being able to allow an individual suffering from Neuro Sclerosis (ALS). The main goal of this research work is to
muscular disorder to perform activities of daily living by find an optimal method to implement BCI.
oneself. There are number of people who are unable to perform The main objective of this project work is to develop and
daily tasks independently, due to motor neuron disabilities. Non-
design an experimental model of EEG based mobile robot for
invasive Brain Computer Interfaces (BCIs) provides an optimal
solution for the interaction between physically impaired peoples suffer from motor disabilities. This is the motivation
individuals and real world. In this work, EEG based robot is to execute the real time wireless robotic model by utilizing
designed and implemented for the people suffering from human brain signals in conjunction with eye blink strength as
physical disabilities. In this experiment eye blink method is used an input command [1].
for the decision taking purpose. Neuro Sky Mind Wave is used
to acquire EEG signals in a non-invasive manner and signal II. METHODOLOGY
features are extracted using Microsoft Visual Studio using Mind The project is basically divided into three parts for the
Wave built-in library. After signal acquisition and processing purpose of implementation of a non-invasive BCI. The whole
the decision are made and the ARDUINO controller controls the
methodology is shown in Fig 4 with the help of block
motor circuitry to provide movement restoration to the
unblessed paralyzed people. The experimental setup used for diagram and the experimental setup is shown in Fig 5. Figure
BCI provides better accuracy and allows the robotic vehicle to 1 shows the phases of implementation methodology.
move according to the user commands based on blink strength
detection, so it can become blessing for the physically impaired
people.

I. INTRODUCTION
In recent years, Brain Computer Interfacing (BCI) based
on non-invasive scalp electroencephalography has become a Fig. 1 Block Diagram Non-invasive EEG based BCI
popular and active area of research. A large number of people
are suffering from motor neuron diseases become unable to A. EEG Signal Acquisition:
perform their daily life activities due to physical disabilities. The first step of EEG based BCI is the acquisition of the
Most of disable people struggle to interact with the physical EEG signals. Different invasive and non- invasive methods
environment and devices independently. Advancement in are used for the acquisition of EEG signals. In order to
technology has made it possible for paralyzed individuals to acquire these signals traditional EEG equipment is being
become able to restore movements using the EEG signals that used. These EEG signal measurement equipment comprise of
have more efficiency than other bio medical signals. By the an electrode made up of a good conductor, EEG signals
implementation of EEG signals for BCI an efficient and amplifiers and EEG signal filters to only acquire signals lying
effective way of assistance can be designed to provide the in the EEG frequency range. The signals in this project are
blessings to the unblessed people. acquired using two devices/ways given below;
BCI using EEG signals is an alternate method for the 1. NeuroSky MindWave Mobile EEG Sensor:
communication between brain and external environment The NeuroSky Mind Wave is a single channel prototype
without using invasions or surgery. The electrical activities of sensor that acquires EEG signals using a single electrode
a human brain can be monitored and analyzed in real time place on the forehead scalp and with reference point on the
using an array of electrodes placed on different position over ear with ear clip. As the worlds first comprehensive
the scalp as per requirement; these placements can be brainwave-reading device for iOS and Android platforms, the
achieved properly by using 10-20 standards for electrode new Mind Wave Mobile headset is evolved for todays mobile
placement. Other than using typical electrodes user as shown in figure 2. It differs from Mind Wave by
Different EEG sensors are available that can also provide the transferring data via Bluetooth, rather than radio frequency,
electrical activity of brain reliably. Our target is to assist the and is available in two packages: Brainwave Starter Kit and
people who are unable to use the conventional interfaces, due the Mind Play bundle [2].

67 | FICT URC1-2016
The device is an instant way to acquire these signals. It has
built-in amplifiers and filters that allow the user to get the
raw EEG signals (Brain Activities) directly.

Finally the complete assembly will allow the user to have an


independent movement restoration. In order to operate the
device the user wears the headset with the electrode at the
Fig. 2 NeuroSky MindWave Mobile EEG sensor [3] forehead and the ear clip for reference. The user will start the
MS visual studio program for simulation and then upon
2. Self-designed EEG Sensor: blinking his eyes with different strengths and having different
The EEG signals can also be acquired by using a self- attention levels it is possible to make decision for the
designed circuit this circuit requires multiple filters and direction selection. The figures below show the block
multistage amplifiers to achieve the desired frequency range representation of process and the experimental setup of the
with detectable and useable signal strength. In this work the non-invasive EEG based BCI.
circuit is being designed using instrumentation amplifiers
(INA118), other multistage amplifiers using two amplifiers
ICs (TL082 & TL062). To carry these signals from the
forehead scalp instant electrodes are available that are placed
over the scalp according to the 10-20 standard of electrode
placement. The designed circuit can achieve the desired task
of acquiring these signals and carrying it to processing device Fig. 4 Block Diagram Non-invasive EEG based BCI [6]
(PC) through microphone interface to the sound card. The GUI provides the eye blink strength to the user that
B. Processing of the acquired signals: allows the user to take decision according to the logical
Since the signal can be acquired using the above mentioned condition written in the MS Visual Studio code
methods. Now the second step is to process the acquired
signals. For the case of Neuro Sky Mind Wave this processing
is achieved by using Microsoft Visual Studio. MS Visual
Studio has the built-in library for the Neuro Sky Mind Wave.
This built-in library provide the capability to measure
different brain activities like attention, meditation, blink
strength & all the frequency components in EEG spectrum.
The processing includes the eye blink strength detection to Fig. 5 Experimental Setup for Non-invasive EEG based BCI [4]
obtain four combinations for movements in four directions IV. OBTAINED RESULTS
with stop as fifth combination. Figure 3 shows the five eye
blink activities with respective movements. For the purpose of signal processing in this work a Graphical
User Interface (GUI) is designed. The GUI allows the
experimenter to analyze the signals that are in the
Electroencephalogram (EEG) signal range.
Blink detection effectively. The graphical representation of
some brain signals and blink strength is shown in the figure
6.
Fig. 3 Movement Decision with respect to Eye Blink Activity [5]
REFERENCES
C. Controlling robotic vehicle [1] Ramya Stephygraph, N. Arunkumar & V. Venkatraman 2015
International Conference on Smart Technologies and Management for
Use these signal for driving the motor through Computing, Communication, Controls, Energy and Materials (ICSTM)
microcontroller. The signals received either by Neuro Sky Vel Tech Rangaragan Dr. Shagunthala R&D Institute of Sciences and
Mind Wave or self-designed sensor are processed then used to Technology, Chennai, T.N., India 6-8 May 2015.
perform control task the serial interface is used to provide the [2] Anupama H. S, N. K. Cauvery & Lingaraju G. M International Journal of
Computer Science Engineering and Information Technology Research
actuating signals from PC to ARDUINO board. The (IJCEITR) ISSN(P):2249-6831; ISSN(E):2249-7943 Vol4,Issue 2, Apr
ARDUINO controller board is connected to the compatible 2014, 157-166.
relay module. When actuating signal is received then it [3] Wojciech SAABUN West Pomeranian University of Technology, Szczecin
[4] ] Ramya Stephygraph, N. Arunkumar & V. Venkatraman 2015
switches the relay to provide a 12V DC voltage to the DC International Conference on Smart Technologies and Management for
geared motors to move the motor in desired direction Computing, Communication, Controls, Energy and Materials (ICSTM)
according to the combination. Vel Tech Rangaragan Dr. Shagunthala R&D Institute of Sciences and
Technology, Chennai, T.N., India 6-8 May 2015

68 | FICT URC1-2016
Object Tracking with Digital Video Based Surveillance
System over Wi-Fi Network
Sahifa Khan, Syed Izzatullah, Haris Khan, Zafer Zehri
Department of Telecommunication Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
syedizzatullah@gmail.com

Abstract Terrorist activities are common these days. With


the raising security threats nationwide, it is essential to have an
authentic automated security system for prevention of such
situations. Thus, the project was taken to reduce these incidents
by providing an optimal solution, where there is no human
dependency with a more reliable and secure wireless security
system which work also in unfavorable conditions effectively and
efficiently with less use of guided media .A wireless system is
deployed for the purpose of detecting and alerting any activity
in the respective area.

I. INTRODUCTION
The project would be capable of collecting, processing
and providing very precious information regarding to the
intruder in any specific area. It includes the live video
streaming over a Wi- Fi network to the monitoring room
Fig. 1 Model view
where the operator can visibly see the activities outside
without any risk. Operator can also be alert by an alarm
which would be generated after detecting any activity in that II. PROBLEM STATEMENT:
area. 1. A 24/7 active monitoring required for any camera based
The definition of a surveillance system is changing day by security system, where a personal error can allow an intruder
day with variety of techniques which make it somehow bulky to escape undetected. 2. A wired security system has
with wires as well as non-secure. Our challenge is to design limitations like security, where a break in the physical
such a system which need less circuitry and considered more connection can lead to complete failure; and it is expensive
secure. There are both wired and wireless surveillance on the other hand.3. Security system based on self-
systems available in the market and they come in all shaped observation lack quick response in terms of alarm generation
and sizes but wireless surveillance system are popular in and notifying higher competent authorities to take necessary
accordance to their flexibility easy installation and economic action. 4. A fixed system is limited to a certain area, where an
benefits. The proposed model consists of two separate internet based system is viewable remotely over different
modules that communicate wirelessly. locations.
The first module is image capturing and streaming module. A
camera is interfaced with an embedded system that is III. PROPOSED SOLUTION
interfaced with an 802.11g/n Wi-Fi router. The live video is 1.The interface between camera and router is kept wireless
streamed directly over WLAN. The camera is integrated with and efficient algorithms are applied for better security of the
180 degrees angle of freedom using a moveable motor network. 2. When any moving object is detected by the
controlled base. The second module tracks and generates an camera, an alarm is generated in the control room which
alarm against a moving object. Application software with an alerts the operator in the control room. This system does not
object tracking algorithm behind is responsible for video need a person to keep an eye on screen 24/7. 3. An access is
processing and object tracking. The GUI also provides a live made, that enables security officer to notify the higher
view of the streamed video directly from the monitoring authorities and security institutions after an intruder are
territory. The alarm generated after detection of a moving detected. The officer can notify just with a press of button. 4.
object notifies the camera person to closely observe the A best future possibility is an object tracking live video
detected and take further necessary security action.

69 | FICT URC1-2016
system that can be monitored on remote devices
(smartphones) over the internet.
IV. METHODOLOGY
The project consists of both hardware and software which
coordinates from video capturing, processing, and
transmission over Wi-Fi till the final alarm generation in the
control room. The project is started by interfacing camera [1]
[2] module through installation and configuration [3] then
Interfacing Camera with Raspberry Pi[4]. At the software end
a program is developed. The very tricky part is to interface
Raspberry Pi with Wi-Fi module by creating a static route
between Raspberry Pi and PC. Raspberry Pi is remotely
controlled via Putty and a program is developed that securely
transmits video frames to PC. An object tracking algorithm
named CamShift Algorithm[5] is implemented in MATLB
on the received frames. A pulse is generated after detecting
an object that activates the Arduino to generate Alarm (a
portion in the above program is responsible for the pulse to be
generate). An application is created in JAVA for displaying
the above scenario. It is also desired to follow the object by
using the same application. A circuitry based on Arduino is
created for the above process of each unit of a single node
separately.[6]
V. RESULTS AND DISCUSSION
In the final phase, our project displays result on a PC which
receives the live video stream from the Wi-Fi captured by the
camera module and when any object is detected it will
generate the alarm (a small beep with an indicator lamp).
VI. CONCLUSION
The mentioned methods are used to make the surveillance
system more secure with encoded wireless stream of live
video that cannot be hacked or compromised; as well as it
economically viable for real time implementation.
REFERENCES
[1] Picamera Configuration. [Online]. Available:
https://www.raspberrypi.org/learning/python-picamera-
setup/worksheet.md. [Accessed: 23- Jan-2016].
[2] RPi Easy SD Card Setup. [Online].
Available: http://elinux.org/RPi_Easy_SD_Card_Setup. [Accessed: 11-
Dec-2015].
[3] Installing OS images and Configuration. [Online]. Available:
https://www.raspberrypi.org/documentation/inst allation/installing-
images/windows.md. [Accessed: 19-Nov-2015].
[4] B. Soediono, Python Programming for Raspberry Pi in 24 Hours, vol. 53.
1989.
[5] L. S. Silva, J. Scharcanski, and E. El, A Fast Algorithm for Tracking
Moving Objects Based on Spatio-Temporal Video Segmentation and
Cluster Ensembles, 2015.
[6] V. Menezes, Surveillance and Monitoring System Using Raspberry Pi and
SimpleCV, pp. 12761278, 2015.

70 | FICT URC1-2016
Ultrasonic object rummage with auto victim lock
saad jamil, Uzair khan, Arsalan khalid, Masood khan, Saeed Magsi
Department of Telecommunication Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
masood4488@gmail.com

Abstract Terrorist activities are common these days. With II. PROBLEM STATEMENT
the raising security threats nationwide, it is essential to have an
authentic automated security system for prevention of such The current systems installed in security of restricted areas
situations. Thus, the project was taken to reduce these incidents are costly and only based on use of camera and image
by providing an optimal solution, where there is no human processing. There is need for easily applicable and in
dependency with a more reliable and secure system which work expensive solution for security of highly restricted areas.
also in unfavorable conditions effectively and efficiently.
Ultrasonic is deployed to detect and alert any activity in III. PROPOSED SOLUTION
respective area.
Designing an ultrasonic sensor based system that would
I. INTRODUCTION detect, follow object using ultrasonic waves and then hits
it .We will spot any type of intervention in restricted areas
The project would be capable of collecting, processing and can follow them while they move and see the whole
and providing a very precious information regarding to the process in a GUI. We are aimed to provide this solution with
intruder in any specific area. It includes ultrasonic sensors in very low cost.
that detects the moving or stationary objects and follows the
object autonomously. It will show the location, direction and IV. METHODOLOGY
distance of the detected object on the screen simultaneously. As mentioned above, our project consists of both hardware
The available security systems are very costly and complex. and software which coordinates from detecting the object,
Our challenge is to design such a system which need less following the object, transferring its coordinates like distance,
circuitry and considered more secure and is cost efficient. The direction and location of the object.
proposed models consist of two ultrasonic sensors. We started off by interfacing an ultrasonic sensor with the
The first ultrasonic module is object detection and displaying software named as processing also we mounted the ultrasonic
it on screen. An ultrasonic sensor is mounted on a servo sensor on a servo motor that rotates it. At the hardware end
motor which rotates the sensor 180 degrees and keeps on we use an Arduino that processes the data received from the
displaying the real time graph on GUI. sensors by using the Arduino IDE. The very tricky task is to
The second ultrasonic module follows the detected object and interface in our system was to synchronize the both modules.
keeps on tracking the object and it also have a responsive Using Arduino we process the data received from both of the
system that hits the target. The GUI also provides a live view sensors and also to sends the location of the detected object to
of the object directly from the monitoring territory. the 2nd sensor.
The software named processing is used to generate the graph
and displays any intervention. A pulse is generated from
ultrasonic and if the echo pin gets active then the Arduino
processes the data received from. A circuitry based on
Arduino is created for the above process of each unit of a
single node separately a node.

Figure 1: proposed model

71 | FICT URC1-2016
Figure 2: Flow chart

V. RESULTS AND DISCUSSIONS


In the final phase, our project detects an object displays result
on a GUI and when any object is detected the other sensors
will start following the object and then hits the object
autonomously.
VI. CONCLUSION
The methods above mentioned are used to make the
ultrasonic object detector and follower much more secure than
ever with encoding techniques which cannot be easily hacked
or compromised, as well as economically viable for real time
implementation.
REFERENCES
[1] https://www.raspberrypi.org/documentation/installation/installing-
images/windows.md
[2] http://elinux.org/RPi_Easy_SD_Card_Setup
[3] http://www.makeuseof.com/tag/install-operating-system-raspberry-pi
[4] https://www.raspberrypi.org/learning/python-picamera-setup/worksheet.md
[5] Yumi M, Luciano S & Jacob S, A Fast Algorithm for Tracking
Moving Objects Based on Spatio-Temporal Video Segmentation and
Cluster Ensembles , [paper]
[6] Yong-ik Yoon and Jee-ae Chun, "Tracking System for mobile user Based
on CCTV", Information Networking (ICOIN), 2014 International
Conference on, pp. 374-378. [Journal]

72 | FICT URC1-2016
Potential for inter and intra-vehicular Communication
using Wireless Sensor Network
Abdul Qadir, Ifra Anum, Tahira Zakir and Ehsan Shah, Babar Ali
Department of Telecommunication Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
awsn@gmail.com

Abstract Wireless sensor networks are widely used structure with specific parts performing specific tasks [3]. A
throughout the technological mainstream. From medical science memory unit, processing unit, communication and power
equipment to auto motives. We aim to enable communication units are the essential parts. For the communication part, we
between and within vehicles [1]. After the project is completed, are using a ZigBee antenna. This has its particular range and
a whole ad-hoc based network with different motes will be
data rate.
created in a limited range.it is in hope to reduce the traffic
risks.WSN has its several parameter handicaps. Including
range, strength and mobility [4].Inter vehicle communication is
possible under any mobile condition because it does not include
creation of ad-hoc based connections. Theses temporary ad-hoc
based vehicular communication networks are hard to create and
sustain in high speed vehicles [2]. Making our contribution ever
so intriguing.

I. INTRODUCTION
The project would be capable of collecting, processing
and providing several types of technical information to the
user during an automobile journey. It includes, the
acceleration of the particular vehicle, acknowledgement of
illumination failures like brake and turn lights, emergency
condition distress signal generation. The vehicle would be
able to communicate with the immediate vehicles in its
proximity. And will share its information with them. All the
information that is shared and transmitted would be displayed
on an LCD embedded to every mote of the network.
The ad-hoc network is ever shifting and changing in mobile
Figure 1: Architecture
entities (vehicles) [2]. To create a stable and sustainable
network between nodes of the network is the real challenge.
In real time, traffic is unpredictable and very random in II. PROBLEM STATEMENT
nature. This creates an issue of end to end or point to point The ad-hoc nature of our communication model creates issues
data transfer between immediate vehicles. Our transmitted regarding interferences and data loss. A ZigBee antenna is
signal is since a broadcast signal, data redundancy and omnidirectional in nature. Which means that in a real time
mixing is a great factor too using this ad-hoc network for traffic scenario it would receive data coming from all
communication. We dont know which data is coming from directions in an unbiased way? This presented an issue which
which vehicle in motion in the vicinity or range of our is resolved by varying the directivity of the antenna.
antenna. Data might be lost or interfered with by other
incoming data of the same type. A wireless mote (node) is a III. PROPOSED SOLUTION
combination of hardware and software. It has its own

73 | FICT URC1-2016
The antenna parameter of directivity plays a major role in our
attempt to overcome this interference issue. The data from the
ZigBee is directed to an infrared sensor which then transmits
it in the direction specified. This restricts communication to
the immediate vehicles in the front and back. The range and
direction restriction improves directivity and error reduction.
One parameter has to be compromised to improve a more
important one. This is the case with our prototype. In real
case scenarios or the real model, a directive antenna in the
ZigBee module is a proposed solution for the given issue. Our
financial and availability issues were the limiting factors.
IV. METHODOLOGY
Our work involves experimental procedure involving a
combination of hardware and software. The wireless sensor
network is as described

V. RESULTS AND DISCUSSION

A result of our work on the directivity of communication unit


is displayed on the graphical LCD. The display shows the
parameters we wish to communicate. The range and
interference issue is resolved.

VI. CONCLUSION
the above methods used to enhance directivity resulted in
reduced errors and interferences in WSN automotive
communication. The proposed idea can now be implemented
on real scales.
REFERENCES
[1] Gawanmeh.A, Optimizing Lifetime of Homogeneous Wireless Sensor
Networks for Vehicular Monitoring, International conference on connected
vehicles and Expo, 2014, vol. 19, no. 3, pp. 980-985 [journal]
[2] ElBatt. T., Saraydar, C., Ames. M, Talry. T.: Potential for Intra-Vehicle
Wireless Automotive Sensor Networks, pp. 01- 04 [conference]
[3] Carmo, J P. Mendes, P M, Couto. C, Correia. J H. A 2.4-GHz CMOS
Short-Range Wireless-Sensor-Network Interface for Automotive
Applications, IEEE Transactions on industrial electronics, 2010, vol. 57,
pp. 1764-1771. [Journal]
[4] Franchi. N, Fischer, G, Weigel. R, Radio Hardware In-the-Loop Emulation
for Testing Vehicular Communication Systems, [paper]

74 | FICT URC1-2016
Monitoring a multilevel car parking system
Muhammad Suleman
Department of Telecommunication Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan

Abstract Parking for vehicles is facilitated, monitored and


controlled by using sensors to determine the availability of
vacant parking spaces and by indications to alert vehicle
operators at parking gate of the availability a vacant space. A
computer controlled system monitors the sensors and controls
the delivery indicator signals. Data regarding parking
occupancy is used to inform drivers entering the facility. When
sensor since the empty slate this information is transmitted
wirelessly to display which is phase-out side the parking. The
driver will see which parking slot is available and he will go and
park his car.

I. INTRODUCTION
The present invention is to facilitate and monitor
vehicular parking more effect- timely, to make parking more Figure 1: Architecture
convenient for vehicle operators by providing information to
efficiently guide them to available parking spaces, to provide
better information to parking facility management concerning
the usage and occupancy of the parking facility, One aspect of
the present invention is to detect the location of available
parking spaces and communicate this information to vehicle
operators. In accordance with this aspect of the invention,
sensing devices are provided to locate vacant parking spaces
and RF is provided to generate signals designating the
presence of vacant spaces. RF communicates signals
regarding the availability of each of the spaces in an area that
immediately end-to-end to the available space. Accordingly,
parking spaces are made easier to find because vehicle
operators can see on display placed outside of parking to the
position of available spaces from about side. Figure 2: shows the RF transmitter and receiver RF transmit data and receive
data by receiver placed near to LCD.

II. PROBLEM STATEMENT:


Self-service parking facilities, parking availability
information provided to display typically consists of a sign
indicating whether the facility is full. If the facility is not full,
typically no information is provided to display concerning the
quantity or location of available parking.

75 | FICT URC1-2016
III. METHODOLOGY The RF received data and the controller come to know the
empty slot and data is appear on LCD
The laser is hitting the LDR when LDR is hitting by light
parking slot is empty and data sis given to RF when leaser is REFERENCES
not hitting LDR means parking is full are going to use RF [1]https://www.google.com/patents/US20060212344
transmitters and Receivers for each parking slot. The RF [2] https://www.google.com/patents/US4075632
Receivers are connected to controller. RF rays are obstructed
when a car is parked in any parking slot. Thus controller will
come to know that which slot is empty and which slot is full.

IV. RESULTS AND DISCUSSION

Number Plate Verification using Image Processing


Zain Karim Qaisrani, Hassan Ali, ZeeshanAbid Ali, Shoaib Ali
Department of Telecommunication Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
zainkarim93@gmail.com

Abstract This work proposes a Number Plate Verification like military zones or area around top government offices.
(Extracting and identification) System, in which we are using The presented system is aimed to be light weighted so that it
image processing techniques which uses number plate of a car to can be run real time and recognizes Pakistani standard
identify the vehicle. The objective is to design an efficient number plate under normal conditions.
automatic authorized vehicle identification system by using the
The Number Plate Verification system works in three steps,
vehicle number plate. The system would be implemented on the
entrance for security control of a highly restricted area like the first step is the detection and capturing a vehicle image,
military zones or area around top government offices e.g. the second steps is the detection and extraction of number
Parliament, Supreme Court etc. The developed system first plate in an image. The third section use image segmentation
detects the vehicle and then captures the vehicle image. Vehicle technique to get individual character and recognizing the
number plate region is extracted using the Morphological individual character, then comparing Number Plate with the
operations from that image. Genetic Algorithm is used for the data base
character recognition. The resulting data is then used to
compare with the records on a database so as to come up with II. PROPOSED ALGORITHM
the specific information like the vehicles owner, place of
Four different algorithms are proposed, for extracting number
registration, address, etc. The system would be implemented
and simulated in MATLAB. plate region from the image Morphological Technique [1],[2]
and then connected component analysis[3] are used and for
I. INTRODUCTION number identification from the extracted number plate image
Genetic Algorithm[4],[5] and OCR are used.
The Number Plate Verification system was invented
in 1976 at the Police Scientific Development Branch in the
UK. However, it gained much interest during the last decade
along with the improvement of digital camera and the
increase in computational capacity. It is simply the ability to
automatically extract and recognition a vehicle number
plates characters from an image. In essence it consists of a
camera that was used to grab an image, find the location of
the number in the image and then extract the characters for
character recognition tool to translate the pixels into
numerically readable character. Number plate verification
system can be used in many areas from speed enforcement
and tool collection to management of parking lots. It can also
be used to detect and prevent a wide range of criminal
activities and for security control of a highly restricted areas

76 | FICT URC1-2016
[5] J. Xiong, S. Du, D. Gao, and Q. Shen, Locating car license plate under
various illumination conditions using genetic algorithm, in Proc. ICSP,
2004, vol. 3, pp. 25022505.

Figure 1 flow chart

III. RESULTS AND DISCUSSION


The proposed system has been implemented using MATLAB.
Many experiments were carried out. Different car images
acquired at various camera-to-object relative positions in
different lighting conditions. The image is extracted exactly
same with different angles and at different distances.
IV. PROBLEM STILL FACING
The filters which are used in our proposed system are based
on distance and picture quality (Camera). Where changing
distance or picture quality, the filter would also be changed
manually through coding.
V. CONCLUSION
A new genetic-based prototype system for localizing 2-D
compound objects inside plane images was introduced and
tested in the Number plate verification system. The results
were encouraging and a new approach for solving the number
plate verification problem relying only on the geometrical
layout of the Number plate symbols was experimentally
proved.
REFERENCES
[1] J. W. Hsieh, S. H. Yu, and Y. S. Chen. Morphology based license plate
detection from complex scenes. 16th International Conference on Pattern
Recognition (ICPR02), pp. 79179, 2002
[2] M. Deriche, GCC license plates detection and recognition using
morphological ltering and neural networks, Int J. Comp. Sci. Info
Security, vol. 8, no. 8, pp. 263269.
[3] MATLAB Product Help
[4] S. K. Kim, D. W. Kim, and H. J. Kim, A recognition of vehicle license
plate using a genetic algorithm based segmentation, in Proc. Int. Conf.
Image Process., 1996, vol. 1, pp. 661664.

77 | FICT URC1-2016
DROID STICK
Students Names: Waseeq Nawaz ,Tayyaba humayun,Ushna babar, supervisor:Kamran Ali Memon
Department of Software Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
zainkarim93@gmail.com

Abstract - The gamers are well aware of all the difficulty of 1. It is an android application so it will be downloadable on
carrying their remote as an extra weight or may be at a friends any android cell phone.
place where you and your friend decides to play game but you 2. The application will have self-mode in which you can
dont have your controller with you the Droid stick is the thing arrange your buttons by your own choice according to your
that you need.
own ease.
All you need is your Android based smartphone you can easily
install Droid stick on it within minutes and start playing your 3. The application will be updated with new features with
game .it is simple and easy to install and understand. time if needed.
This application is developed to provide an ease for people 4. It will provide an ease for people who do Excessive gaming
who have craze for gamming by providing their console in a they can play games where ever they want
single application which they can carry in their own pocket 5. It will be free of cost PS4 has its official app that provide
where ever they go. different functions but does not include a proper gaming
remote on the phone .
I. INTRODUCTION Other apps have their own gamepad along with game on the
Nowadays everything available on phone for the ease of screen but no app is specifically designed for this purpose
people so why not a Remote for people who have craze for
gaming Game controllers have been designed and improved The design of the remote will look like the figure 1. The app
over the years to be as user friendly as possible. The Droid will provide attraction for users and game players .
Stick is designed for gamers who dont want to carry extra
weight by taking their Console everywhere .This application
is developed to provide an ease for people who have craze for
gamming by providing their console in a single application
which they can carry in their own pocket where ever they go.
The Scope of the Droid Stick includes:

78 | FICT URC1-2016
extra for you to carry anywhere jus your smartphone and ou
are good to go..

REFERENCES:
[1] http://developer.android.com/training/game-controllers/controller-
input.html
[2] http://developer.android.com/index.html
[3] https://www.google.com.pk/search?q=gaming+remote+on+phone+screen
&espv=2&biw=1366&bih=667&source=lnms&tbm=isch&sa=X&ved=0ah
Fig 1 UKEwjzhsqNtuPJAhVBT44KHbDvAmoQ_AUIBigB#imgrc=xoSljzrSTzs
X4M%3A
[4] https://www.playstation.com/en-gb/explore/ps4/features/playstation-app/
II. PROBLEM STATEMENT: [5] http://developer.android.com/training/game-controllers/controller-
input.html
The gamers are well aware of all the difficulty of carrying [6] Tools http://developer.android.com/index.html
[7] https://www.google.com.pk/search?q=gaming+remote+on+phone+screen
their remote as an extra weight or may be at a friends place &espv=2&biw=1366&bih=667&source=lnms&tbm=isch&sa=X&ved=0ah
where you and your friend decides to play game but you UKEwjzhsqNtuPJAhVBT44KHbDvAmoQ_AUIBigB#imgrc=xoSljzrSTzs
dont have your controller with you the Droid stick is the X4M%3A
thing that you need .Nowadays everything is becoming
portable to create ease for people The system is designed for
people who are gaming addicts who carry their remote in
their backpacks in their everyday life so the solution to this
problem is somehow solved by Droid stick Suppose you are at
a friends place where you and your friend decides to play
game but you dont have your controller with you the Droid
stick is the thing that you need .All you need is your
Android based smartphone you can easily install Droid stick
on it within minutes and start playing your game .it is simple
and easy to install and understand
Some constraints that might arise in the form of
As android pad has many buttons because of this devices
those screen sizes is less than 3.5 inches cannot support this
application
Wi-Fi might not be available so Bluetooth will be used
Response time: it can show a little delay in pressing the
button and event to occur in the game
Android based smart phone is mandatory

III. PROPOSED ALGORITHM:

the project is made in android studio. In java language JDK


(java development kit) : It is used to provide runtime
environment. It is the implementation of JVM.It physically
exists. It contains set of libraries + other files that JVM uses
at runtime.

IV. CONCLUSION:

The app is very useful for people who are fond of gaming and
wants a portable gaming remote that does not need anything

79 | FICT URC1-2016
80 | FICT URC1-2016
Children Monitoring Android Application
Students Names: Sahzain Shaukat, Ambreen Javed, supervisor: Zubair Zaland Kasi
Department of Software Engineering,
Faculty of ICT, BUITEMS, Quetta, Pakistan
sahzainbaloch@yahoo.com, ambreen.javed48@yahoo.com

Abstract - This project proposes the development of an well as facilitate the children with the option to contact their
Android Application that will help parents to monitor their parents in case of emergency.
childrens activities on their devices (smartphones / tablets). It
will protect children from harassment caused by unknown calls
and messages and will also decrease the access of improper
contents from internet as their parents will be keeping an eye on
their childrens activities through this application. It will also
provide an emergency call service for children who can contact
their parents when in need.

I. INTRODUCTION
In todays technology driven world, electronic devices
have become a staple of everyday life. While aimed primarily
at the adult population, an increasing number of tech-savvy Figure1: proposed system
children are using these devices, whether it be to supplement
their education or to play games, therefore, this much IV. METHODOLOGY:
increased usage of smartphone devices leads to the necessity
of parental supervision. This app is being developed using Android Studio and
This application will be developed for children under the age requires an internet connection. It will work on two devices
of 12, with mutual agreement parents can view all of their i.e. parents phone and childs phone. All the data will be
childrens text message logs, call logs, web browsing history accessed from childs phone and will be stored on a remote
and their current location. This app will also facilitate server which will help parents to access all the content
anytime from anywhere they want.
children to make an emergency call to their parents when in
Privacy of the information has been taken under special
need.
consideration where Id synchronization method is used to
ensure the privacy and security of the system.
II. PROBLEM STATEMENT: A unique connection Id will be assigned to both the parties
which will assure that the parent will only be able to see his
Children these days can be easily harassed by unknown own childs phone activities. It will also assist parents by
people via calls and messages as well as improper content indicating the current location of their children.
from the internet can be harmful for their mental and physical
growth. V. CONCLUSION:
Due to their hectic routines parents are unable to spend time
with their children as much as they should so in order to The proposed system will result in the safe usage of
tackle this problem this application will help parents smartphones by children with appropriate supervision of their
supervise their childrens activities from anywhere they want parents which will contribute to the safety of children in the
without being physically present with them all the time. society.
The performance of this system can be further optimized with
III. PROPOSED OBJECTIVE: the advent of new technology.

This work is motivated by todays technology driven world REFERENCES


where children use smartphone devices without any
supervision. The main objective of this app is to facilitate [1] Belen Cruz Zapata, Android Studio Essentials.
parents to monitor their childs mobile phone activities as Santi Phithakkitnukoon, Inferring Social Groups [2]
Using Call Logs.

81 | FICT URC1-2016
Online Menu Ordering System for Restaurants
Students Names: Ghazanfar ,Kashif, Saddam,Supervisor: Ayesha Abdul Majeed
Department of Information Technology,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Ghazanfarjaffar1,sasolisaddam93 @gmail.com

Abstract - The growth of wireless technology and Mobile devices with automated food ordering system will be equipped with a
in this era is creating a great impact on our lives. Some early user-friendly screen, software for completing the process at
efforts have been made to combine and utilize both of these the backend. For this system there will be a system
technologies in advancement of hospitality industry. This administrator who will have the rights to enter the menu with
research work aims to automate the food ordering process in
their current prevailing prices. The system administrator can
restaurant and also improve the dining experience of customers.
In this paper we discuss about the design & implementation of enter anytime in the system by a secured system password to
automated food ordering system. The web-based application on change the menu contents by adding or deleting an item or
users mobile will have all the menu details. The order details changing its price. Now when the customer enters the
from customers updated in central database and subsequently restaurant, customer will place his order with the help of the
sent to kitchen. The restaurant owner can manage the menu touch screen using the intuitive graphical user interface, right
modifications easily. The web base application on mobile devices from the selection of menu items, confirming the order and
provide a means of convenience, improving efficiency and viewing offers. The customer will select from the food options
accuracy for restaurants by saving time, reducing human errors. according to his choice and the system will display the
Index Terms - notification system, android, Model View payment amount customer has to make once finished with the
Controller order.
II. SYSTEM ARCHITECTURE
I. INTRODUCTION
Online Menu Order System is a web-based, which run online
The basic problem in the food service industry is that on server, so a comprehensive architectural overview of the
restaurants are not realizing efficiencies that would result system is depicted in Fig.1.
from better applications of technology in their daily
operations. The earlier food ordering system was entirely a
manual process which involved waiters, pen and paper. The
waiter had to note down orders from customers, take these ADMIN
orders to kitchen, update them in records and again make bill.
View

Even though this system is simple it may involve human


CRUD

errors in noting down the orders. There are many reasons


leading to the feeling of dissatisfaction including being
entertained late in terms of order taking by the waiter and
Receive Records
meals serving. To overcome these limitations in manual Database
system, order restaurant management system is proposed in
this paper to automate food ordering process.
IIS
E-menu is a new technology for restaurant ordering solutions.
The system includes touch-screen devices installed with a
piece of software to show a restaurant menu with actual
photos of the dishes [1]. The touch-screen devices are not only
Customer Customer Customer Customer
used to display the list of food and beverages, but also to
process the restaurant services, from ordering to payment [2].
However, Chen, Lin and Yen [3] indicate that interactive Fig. 1 System Architecture of Online Menu Order System
restaurant table-top e-menus can also be implemented by
using interactive surface technology to enlarge the size of Figure 1 shows the overall architecture of the Online Menu
menus and increase customer attraction. The food restaurant Order System .It consists of three users customer, admin and

82 | FICT URC1-2016
chef. Admin views order, add menu category, view update and
delete menu category. Customer views and places order
whereas chef views the order and prepares the food.

Online Menu Order system is web application for customer to


place their respective order developed in asp.net [4].

Through Online Menu Order system web application


administrator will add or update menu which will be stored in
the database as shown in figure 2. Administrator will also
view customer order .Chef will view order as shown in figure
3.

Fig.3 Web user interface for Chef

III. CONCLUSION
The purpose of this project was: To make communication
easier and quicker between the restaurant internal staff and its
customers. Our future idea is to expand the existing system by
incorporating mobile application for placing and real time
feedback system.
REFERENCES
[1] Restaurant Menu Software eMenuReady to Wave Goodbye to Traditional
Paper Menus. Available:
http://www.forpressrelease.com/forpressrelease-28032-restaurant-menu-
Fig. 2 Web user interface for Admin software-emenu-ready-to-wave-goodbye-to-traditional-paper-
menus.html
[2] M. Y. Ricky, "Mobile Food Ordering Application using Android OS
Platform," presented at the ICASCE 2013 International Conference on
Advances Science and Contemporary Engineering, 2014.
[3] T.-H. Chen, H.-H. Lin, and Y.-D. Yen, "Mojo iCuisine: The Design and
Implementation of an Interactive Restaurant Tabletop Menu," in Human-
Computer Interaction. Towards Mobile and Intelligent Interaction
Environments: 14th International Conference, HCI International 2011,
Orlando, FL, USA, July 9-14, 2011, Proceedings, Part III, J. A. Jacko, Ed.,
ed Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 185-194.
[4] Microsoft Visual Studio Available: https://www.visualstudio.com/.(7-20-
2016). gneto-optical media and plastic substrate interface, IEEE Translated
J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digest 9th Annual Conf.
Magnetics Japan, p. 301, 1982].
[5] M. Young, The Technical Writers Handbook, Mill Valley, CA:
University Science, 1989

83 | FICT URC1-2016
Wireless Hand Gesture Based Robotic Arm with
Controlled Chassis Tank
Students: Shahbaz Faisal(GL), Shoaib Ahmad(AGL), Hamad Ahmed, Qahir khan, Bilal Baloch
Department of Electrical Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Supervisor: Engr. Zia Javed
shahbazdurrani92@gmail.com, Shoaibz789@gmail.com, charismatic_spark@yahoo.com

Abstract - In todays world there is an increasing need to chassis of a tank which is also controlled wirelessly with
create artificial arms for different inhuman Situations where Bluetooth via computer program.
human interaction is difficult or impossible. They may involve
taking readings from an active volcano to diffusing a bomb. II. PROBLEM STATEMENT
Here we propose to build a hand gestured based robotic arm
with controlled chassis tank by natural human arm movements Several problems on this project have been defined to simplify
This robotic arm is a robotic manipulator, usually the development process. The problems are:
programmable, with similar functions to a human arm. The A. Material Selection and Considerations
development of this arm is based on ATmega328 platform called The most suitable material to fabricate the structure of the
Arduino along with a personal computer for Signal processing, arm has to be light and strong. Otherwise, the servo motor
which will all be interfaced with each other using serial
will not be able to pull up the arm and to perform the desired
communication. Servo motor is used for joint rotation. We can
restrict its rotation from 0 to 90 or 0 180 depending upon the turning degree. Among the materials that can be considered
conditions. It has about same number of degree of freedom as in to fabricate the structure are fiber glass, aluminum, Perspex,
human arm. Humans pick things up without thinking about the plastic polymer, and carbon fiber. In choosing the fabrication
steps involved. In order for a robot or a robotic arm to pick up materials, the aspect of availability of the materials, the
or move something, someone has to tell it to perform several overall cost, should also be taken into consideration. Thus
actions in a particular order from moving the arm, to among the five materials considered, The fiber glass is chosen
rotating the wrist to opening and closing the hand or as fabrication material.
fingers. B. Design The Mechanism and Fabrication of the Robot Arm
The data is acquired through the use of gyro sensors and flex
The mechanical structure of shoulder, elbow and wrist form
sensors. A Bluetooth module is used for transmitting the signal
from human hand and is received by the Bluetooth module of the main part of the robot arm. The main problem in this part
robotic arm. The chassis tank is controlled by GUI image is on how to attach the servo motor onto the section or joint to
processing which moves the tank in all the directions. Finally, achieve the desired turning degree level. The accuracy of the
this prototype of the arm may be expected to overcome the mechanical design dimensions is consider as part of the main
problem such as placing or Picking hazardous objects or non- problem since minor error in the dimension will cause major
hazardous objects that are far away from the user. problem in the fabrication of the arm structure.
C. Electronic Circuit Design and Software Programming
The electronic part is used to control the movement of the
I. INTRODUCTION arm component. For
A Hand Gesture Based robotic Arm with Controlled Chassis this purpose, the Arduino microcontroller is used. Problem
Tank is a kind of robot which can be controlled by the hand occurs in order to program the transmitting and receiving
gesture. It is an arm consisting of four joint just like a human part to interface or communicate between them.
arm (like shoulder, elbow, wrist, jaw). It contains four servo
motors and Arduino microcontrollers are used. Each servo III. PROPOSED ALGORITHM
motor is connected to the joint of arm just like human arm.
Robotic glove is weared by Human hand on which circuit is The main objective in completing the project is to achieve the
placed. The robotic glove circuit includes gyro sensor and flex standards that have been set. The objectives are as follows:
sensor and also Bluetooth module. One Bluetooth module is A. Design and Fabrication the 4 DOF Robot Arm
placed on robotic hand and the other on the robot. When the The main objective of this project is to design the 4 DOF
hand is turned or tilted the gyro sensor sense the motion of revolute robotic arms that able to carry out certain task. The
the hand and also when the fingers are bent then the flex revolute robotic arm is able to move similar to human arm
sensor sense the change in value and sends the signals which with the help of hand gestures. The arm is designed so it is
is received by the other module and the movement in the able to rotate clockwise and counter clockwise (180 degrees)
robotic arm is executed. The robotic arm is mounted on the

84 | FICT URC1-2016
and able to pick and place objects. The arm needs to be as overcome the problem such as placing or picking object that
light as possible in order to maximize payload. away from the user, pick and place hazardous object in a very
fast and easy manner.

Its very difficult during the warfare to monitor in any non-


B. Design of Servo Controller Circuit going areas, loss in communication or when surveillance
The second main objective is to design and fabricate the servo needed thus designing a system that will not only help in
controller circuit that will be used to control the robot arm monitoring but could also be used for detection of obstacles
servo via a connection to an Arduino Uno. and movement.
C. Design and Fabrication of the vehicle
The third main objective is to design and fabricate the chassis REFERENCES
on which the robotic arm is mounted so that the robot can be
moved from one place to another. [1] http://www.robosapiens-
D. Robot Software and Interfacing with the Robot Arm india.com/cookbook/robotics%20virtual%20book/index.h
The next main objective is to design robot interface tml
application using Arduino software to control the servo [2] http://www.engineersgarage.com/articles/servo-motor
controller circuit board to run the robot arm. The transmitter [3] http:// ethesis.nitrkl.ac.in/5283/1/109EI0297.pdf
program sent servo position to the receiver program on the
controller circuit. Processing software is used to communicate
between the vehicle and the controlling PC.

IV. METHODOLOGY

Robotic Arm

Robotic Vehicle

V. CONCLUSION

The objectives of this project has been achieved which was


developing the hardware and software for a Wireless Hand
Gesture based robotic arm with controlled chassis tank. From
observation that has been made, it clearly shows that its
movement is precise, accurate, and is easy to control and user
friendly to use. The robotic arm and vehicle has been
developed successfully as the movement of the robot can be
controlled precisely. This robot control method is expected to

85 | FICT URC1-2016
Solar Thermal Power Plant using Parabolic trough
Students: Wahajuddin, Supervisor: Mr. Ishtiaq Marwat
Department of Electrical Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Wahaj666@.com

Abstract - [Three main elements in abstract problem for every power consuming sector. The problem in
1) problem statement, 2)Contribution, CSP is it require more Land space than other power plants i.e
3) Significance.] This work proposes generation of electrical Hydral, fossil fuel etc. but advantage is for CSP is Free Source
energy through renewable source. It increases the potential to of energy which can overcome the cost of generation
overcome energy crisis. The annual mean solar irradiance is
compared to other plants of same capacity which will put land
1367 W/m^2 and sun temperature is 16,000,000 Kelvin. Sun has
enough hydrogen in its core that will last about 4.5 billion years. space issue to its shadow.
Since Earths X-sectional area is 127,400,000 km^2, total sun [Statement of your proposed work, i.e., objective. May include
power intercepted by earth is 1.740 * 10^17.Taking into account figure that illustrate the framework of the proposed work
the seasonal and climatic conditions the actual power reaching (algorithm or architecture or system or model etc.]
the ground generally averaging less than 200 Watts per square
meter. Thus average power intercepted by earth is 25400 III. PROPOSED MODEL:
Terawatts. Integrating this power over the year, total energy
received by earth is 222,50,000 Tera watthours. Thus it makes This work is motivated by work and development in
sun a free and reliable source of energy. which can be used in
renewable source in generation of electricity. The proposed
remote areas where power transmission is not applicable.
[Must be concise and provide the following. 1) Introduction to
methodology has been tested.
the problem, 2) Critical review of state-of-the art related works,
3) Motivation for extended work.]

I. INTRODUCTION
Concentrated solar power (CSP) is trendy in power
generating circles. It uses free source of energy and can be
utilized by different methods. Such as Lense, mirrors,
parabolic trough. Here parabolic trough is used to condense
solar irradiance, to be utilized as essential part of Power
generation
The main hurdle is to generate enough amount of steam [Procedure describing how the result/proof is obtained. The proposed work can
be as one of these types: experimental, simulation, mathematical. Clearly specify
pressure which will able to derive both turbine and generator.
development/ design/ analysis setup. What verification method/procedure (data,
Concentrated solar energy depends upon climatic conditions, tool, observed criteria) are used.]
any interception can cause break in steam generation which
can lead to slowing down the process.
This problem can be overcome by alternative methods of III. METHODOLOGY
generating steam such as thermal oil and molten salts. Which
stores heat energy and may often provide same amount of heat This is the simplest form of CSP system, where the solar
energy as per requirement of steam generation during collector field is composed of rows of trough- shaped solar
undesirable weather conditions. collector elements, usually mirrors, with an integral receiver
[Must state the limitation of existing works and how tube. They are parabolic in one dimension only and form a
improvement is made. Basically answering why you have to long parabolic shaped trough of up to 150m in length. The
do this?] collectors are usually installed in rows and the total solar
field is composed of several parallel rows. The collectors are
II. PROBLEM STATEMENT. connected to a single motor, controlled by a solar tracking
control system, which ensures that the maximum amount of
Considering power crisis in Pakistan it is more feasible to put sunlight enters the concentrating system throughout the day.
CSP plants under development than PV systems. PV can The solar receiver is a black-coated, vacuum glass tube
resolve problem for both home end users and industries as per contain- ing the heat transfer fluid, either oil or water. The
their requirment whereas CSP plants can overcome the concentrated sunlight heats the heat transfer fluid to

86 | FICT URC1-2016
temperatures of up to 400C, which can then be used to [2] EUR 20898 European Research on Concentrated Solar Thermal
Energy
generate electricity using a turbine and an electrical Luxembourg: Office for Official Publications of the European
generator. Communities
The Direct Solar Steam project (DISS), a test facility at the 2004 39 pp. 21.0 x 29.7 cm
Plataforma Solar de Almera (PSA) in Spain3, has a solar [3] Beurskens, L., Hekkenberg, M., Vethman, P., Renewable Energy Projections
as Published in the National Renewable Energy Action Plans of the
field composed of 11 parabolic trough collectors with a European Member States. ECN, 2011
north-south-oriented rotating axis and a total reflective
surface of 2 750 m2. The 11 collectors are each made up of
12m long by 5.7m wide reflective parabolic trough modules
connected in series in one 550m long row.

[Results may be presented in a graph/ table form. Clearly


analyze the results.]

IV. RESULTS AND DISCUSSION


The result in Table 2 shows that by applying the second stage
tuning, the original gain can be maintained and settling time
can be improved up to 2.5 times faster compared to the single
stage rescaling work. Power dissipation is reduced about 33%
according to KV coefficient and area is reduced 25-28% from
the original design. Table 2: The Miller amplifier circuit
performances on 0.18 0.13 m processes for long and short-
channel.
Table 1

[Stress on the contribution and significance of work]

V. CONCLUSION
It is Green Source of Energy.
This project can help transmit electricity through grid station
to consumer end.
The main costumer of this project is WAPDA and other
Power generation stations owners.
It also can be implemented on small level like houses. It can
fulfill the requirement of electricity to all loads. (Air
Conditioner, Water Pumps etc.).

REFERENCES

[1]http://www.bine.info/fileadmin/content/Publikationen/Englische_Infos/t
hemen_0213_engl_Internetx.pd

87 | FICT URC1-2016
Implementation method of solar updraft tower power plant
Students: Zia Mehmood, Supervisor: Muzamil Hussain
Department of Electrical Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Ziamehmood007@gmail.com

Abstract - renewable source to produce power.

I. INTRODUCTION III. WORKING PRINCIPLE


The conventional sources used for the production of
electrical power i.e coal, steam, diesel and nuclear are The working principle of solar updraft tower is simple. Air is
expensive and uneconomical. Increasing prices due to limited heated by using solar radiations under a transparent roof
resources and rising demand pose serious problems even for which is open at periphery. In the middle of this transparent
rich countries. Poverty, the population explosion and roof is a vertical tower with a large inlet at its base. The point
migration are, amongst other reasons, also a consequence of of joint between the roof and the tower is air tight. After the
insufficient energy supply and high energy costs. According air gets heat its density decreases and it becomes lighter than
to the International Energy Agency, about 1.6 billion people the cold air. So, it rises up through the tower. Suction from
have no access to electrical energy, and about 2.4 billion have the tower then draws in more hot air from the collector, and
to rely on biomass for cooking and heating. These numbers cold air comes in from the outer perimeter. At the base of this
are increasing. Today there is a great need of power to be tower generator is installed which rotates with the force of the
produced by some renewable source and solar updraft tower is air passing through the tower and as a result electricity is
one of the clean, safe and the most efficient way of producing produced
electrical power in sunny areas without using fuel other than
natural fuel i.e solar radiation and wind which are available
everywhere without any expense. Solar energy can be used in
various indirect (biomass, hydro power, wind) and direct
forms (solar thermal power, photovoltaic systems). It should
not need cooling water, and it should be based on
environmentally sound production from renewable or
recyclable materials. Solar updraft towers meet these
conditions. Large solar updraft towers (> 100 MW)are
capable of generating electricity at a cost comparable to that
of conventional power plants.

II. PROBLEM STATEMENT

As in our country there is very shortage of electricity and the


conventional sources (coal, nuclear and steam) used to
produce energy are very costly and are not environmental IV. PARTS OF SOLAR UPDRAFT TOWER
friendly. They produce heating and other problems. The solar
updraft tower is a renewable energy source and it can be used There are three basic parts of solar updraft tower
to produce large amount of electrical energy without using collector/catchment area
fuel.
Tower
A. Significance Turbine/generator
In this paper implementation of solar updraft tower Collector:
technology will be discussed and its working principle will
be presented. It is a large area with a transparent roof used to heat air using
solar radiations. Thus the ground under the roof heats up and
B. Contribution transfers its heat to the air flowing radially above it from the
We will emphasize the role of the electrical engineer in this outside to the tower.

88 | FICT URC1-2016
A. Tower
It is similar to a large pipe installed at the middle of the
collector. The hot air from the collector rises up and passes
through this tower.

B. Turbine/generator
At the base of this tower generator is installed which produce
electrical energy.

V. EXPERIMENTAL PROTOTYPE
After a lot of research a experimental prototype of solar
updraft tower is established in Manzanares, which is about
150 km south of Madrid, in 1981/82, with funds provided by
the German Ministry of Research and Technology. It has a
output of 50kw. The aim of this experimental project was to
analyze the performance and the feasibility of producing
power by solar updraft tower. The results obtained were quite
satisfactory and showed that the system is capable of
providing highly reliable operation.

Prototype established at Manzanares is the key advantage.

REFERENCES

[1] Jorg Schlaich Address: Schlaich Bergermann und Partner, Structural


Consulting Engineers, Hohenzollernstrasse 1, 70178 Stuttgart, Germany
Research field: solar energy, towers
[2] Islamuddin, A., Al-Kayiem, H.H., Gilani, S.I., 2013. Simulation of solar.
chimney power plant with an external heat source. In: Proceedings of the 4th
International Conference on Energy and Environment. Putrajaya, Malaysia.
[3] von Backstrom, TW (2003). Calculation of Pressure and Density in Solar
Power Plant Chimneys. Journal of Solar Energy Engineering 125: 127-129
[4] Dai YJ, Huang HB, Wang RZ (2003). Case study of solar chimney power
plants in Northwestern regions of China. Renewable Energy 28: 1295-
1304

89 | FICT URC1-2016
Smart energy meter
Students: Aimal Khan, Supervisor: Engr. Muhammad Waleed Raza
Department of Electrical Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
engr.aymalkakar@hotmail.com

Abstract - Power sector is the most viable and core secondary source just as like other secondary sources. Smart
structure of Pakistan. Pakistan is under developed country meter has the feature and a solution for Smart Grid as it has
striving to strengthen its structure by technology and the capability of measuring two way flow of Energy. Primary
innovation. As the world is flourishing towards technology and measurement would be the energy consumed by the consumer
smartness, Electrical Energy Generation, Transmission and
and Secondary would be the energy generated by the
Distribution is converting towards Smart Grid to overcome
energy losses and synchronize every renewable source to a consumer. Due to the Smart Meter a consumer is the buyer
Smart Grid. With the ordinary Grid system there is problem and the seller of the energy at the same time. This will allow
with Energy measurement though it is quite simple and mostly the Smart Grid to process the energy generated by the
reliable system all over Pakistan but it has some disadvantages. consumer end and it will enhance the system and decrease the
Ordinary meters which are implanted all over in Electrical energy crises. This method can reduce the energy crises. As
system for the measurement of energy consumption has the least everything is turning into smart, Smart Meter is the perfect
significance and it can cause and create errors in net measuring. and comprehensive set of system with the Smart Home. This
The very profound disadvantage having ordinary meters are no Project can be merged with Smart Hometo make a complete
communication between consumer and local grid or with
Smart Home system. From Smart Energy measurement
national grid, it is also not suitable for measurement of two way
flow of energy. And it has no familiar interface for its toSmart Energy consumption.
consumers. Smart Energy Meter has way more advantages over
ordinary meters. Smart Energy Meter is the building block for II. PROBLEM STATEMENT
the Implementation of Smart Grids. It has all the possible viable
solutions for better Energy measurement. As it provides user Ordinary Meters has some real time unidentified errors which
friendly Interface for its consumers can measure two way flow produces a considerable loss of energy. Ordinary Meters have
of Energy consumption and it communicates with the consumer mechanical parts which has some frictions and can be
or with the Grid. Smart Meter shares all the consumption reversed or they have a big disadvantage of to be slow which
portfolio with the Gird on daily basis as Grid will have the
creates error in net measurement. It does not have user
updated record of its consumers.
friendly display and cannot communicate with Grid. These
I. INTRODUCTION problems arent notifiable unless they have a checkup of
errors. The primary approach of Smart Meter is to overcome
Nowadays, the transformation of conventional grid to a these errors and to provide a thorough solution of these
digitalize electricity grid is moving forward due to problems.
severalfactors. Conventional Grid can only sync or process
only primary sources. It does not have the compatibility of
merging renewable sources other than primary. For the better III. METHODOLOGY
use of all the energy sources whether primary or renewable
(Solar, Wind, Tidal etc.) A Grid must be Smart enough to The Smart Meter technology has become a trend in the future
control and process all the energy sources which can be of power distribution systems and some applications should
possibly utilized. Smart Meter plays an important role with or be provided with its installation in residential consumers.
without Smart Grid. Even without a system of Smart Grid a Methodology provides a complete flawless method residential
Smart Meter provides the solution of better Energy load identification and measurement using data provided by
measurement, communication with Grid or with Consumer Smart Meter. Smart Meter is and Embedded System which is
and a User friendly interface for the consumer to look up the completely controlled by software. The Smart Meter has a
Energy consumption and manage it accordingly. As with the Controller which runs on a software to controls all the
Smart Grid it has a special feature of combining the energy operations of the Smart Meter. The controller takes the Inputs
generated from consumer end. Renewable energy like solar is from the current measurement sensor to measure the exact
the most commonly used secondary source of energy by a amount of energy being consumed by the consumer, software
consumer. When the peoples as a consumers also participate then calculates the amount and converts it into values
in a power generation as they can generate their power and familiar to the consumer. Which then displays on the LCD
contribute to the industries. As most of the Energy got wasted screen of Smart Meter. For the two way measurement of
or not even used by consumer, this wasted energy can coop energy two sensors are used in counter directions one for the
with the Smart Grid and it can sync or being processed as a measurement of the energy consumed and other for the

90 | FICT URC1-2016
measurement of the energy generated by the user. Software [3]
https://scholar.google.com.pk/scholar?q=pv+grid+connected+system&hl=en
collects the data ad calculate it and shows the differenced &as_sdt=0&as_vis=1&oi=scholart&sa=X&ved=0ahUKEwiYg6XyttzJAh
value of energy delivered and energy consumed. For the WUUY4KHVC4DuUQgQMIFzAA
communication with consumer there are two approaches, a [4]
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1507024&url=http
Bluetooth module could communicate to a Smart phone or %3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3
Tablet device. A consumer-side software could be installed in D1507024
a consumer device, such as: tablet, Smartphone, [5] https://en.wikipedia.org/wiki/Smart_meter
[6]
microcomputer, etc. This software receive some http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6520030&newsea
measurements in order to show the loads identified. An rch=true&quer]Text=smart%20meter
application must be installed for receiving data from Smart [7]
Meter and to show it on mobile device of the consumer. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6243549&newsea
rch=true&queryText=smart%20meter
Communication with Grid requires an end to end network.
For such network Wi-Fi link can be an approach for receiving
and sending data to the Grid, its an efficient approach but
its too costly. For cheap and reliable data exchange the
ZigBee communication technology is proposed to exchange
data between smart meter and consumer.

IV. BLOCK DIAGRAM

V. RESULT AND CONCLUSION

All the related research and methodology describes the


benefits and stability of Smart Meter in a power system. For
better generation and utilization of Electrical energy it is
mandatory to have a clean and smart system of measurement
as all the financial economy depends on the energy
consumption and better measurement. As far as I reached it is
the most viable solution for of Power sector to look over the
Energy consumption with a better sight.

VI. REFERENCES

[1] http://newenergynews.blogspot.com/2013_ 12_01_archive.html


[2]
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6542215&url=http
%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3
D6542215

91 | FICT URC1-2016
Priority based load management
Students: Muhammad Noor, Muhammad Imran Safi, Asmatullah, Hidayatullah, Shahzada Aimal khan
Department of Computer Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
Supervisor: Engineer Muhammad Waleed Raza
achakzai22815@gmail.com

Abstract - Electrical power lack age is due two main The dumb people were facing a lot of problem to
reasons, lack of power generation and mismanagement of the communicate with other people due to the non-generalization
use of electrical power. Management of electrical power is an of sign languages. Different sign languages are available but
easy and inexpensive way in order to reduce consumption of these are specific to particular regions. There is a need to
electricity, utilize available power in an effective way i.e. utilize
design an application or system that can solve out this issue.
it for more time. The mentioned title is work for management of
electrical power on priority bases in such a way to increase time By using this application, they can communicate with other
period of utilization of the available source. Waste of power is people in a simple and efficient way. This application can
being saved to large extent due to application of the mentioned reduce the gap between the normal and deaf and dumb people
system. and in this way we can serve humanity.

I. INTRODUCTION
The priority based load management increases life of the
utilization of the an electrical power source by providing
power only to the priority loads, while if there is no need of
power to priority loads then it will be automatically transfer to
less priority loads. This word reduces the extensive waste of
electrical power in daily life i.e. in house hold, industries,
institution etc. The analysis shows that large amount of
electrical power is saved. The project is easy to operate and
inexpensive to implement. Figure 3 FLOW CHART

II. PROBLEM STATEMENT


III. IMPLEMENTATION
Many countries are suffering from lack of electrical power
which has effected directly on their economy and production. It is the modern method of energy management. In this we
Because electrical energy is the basic need of life today in design a hardware device that will do priority based load
every field that is the industries, agriculture, hospitals and distribution. We connect this device to the main.
educational institutions etc. To avoid these problems This work is verified on a prototype which consists of
electrical energy has to be managed in a great way. The different component for results and experiments.
priority based load management one of the technique to It consists of two supply i.e. an infinite supply source, limited
improve management of electrical power. First power is given power source, four sample loads, switches four input signals
to loads which are of imported use and then transferred to the these components are all interfaced with Arduino
less important ones. microcontroller through raleys. Microcontroller is
programmed in the software aurduino ide in order to do the
III. PROPOSED ALGORITHM following process.

This work is basically for the continuous electrical power in 1. Circuit is supplied with two types of supplies; one is
WAPDA and the other one is domestic i.e. Generator.
any area. The powers through different loads are detected by
the microcontroller then message is transferred to relays 2. Switch is connected which connect either WAPDA or
generator supply.
which connect high voltage loads to the low voltage
microcontroller. On the bases of the input signals given to 3. Our load consists of four loads(lamps).
microro controller it takes decision and processes as describe 4. The circuit is so designed that when supply is
WAPDA all the relays will be ON. That mean we
above

92 | FICT URC1-2016
will supply power to all the load or we can say that The switches of room2, room3 and room4 are on.
the entire load will be ON. Result 2
5. When the generator is supplying power, the circuit The bulbs of room 2 and bulbs of room3 are on. Other will not
will do the priority bases load distribution. glow.
6. When generator is the supply then we have the Action 3
capacity to turn on only 2 lamp priority wise. Switches of room1 is on.
All other switches of other rooms are on.
7. (Priority of load1 >priority of load2 >priority of load3 Result 3
>priority of load4). Room one bulb will glow.
Room two will glow.
IV. BLOCK DIAGRAM Room three and four will be not glow.
Action 4
Room two, three and four switches are on.
Room one switch is off.
Result 4
Room two and three bulbs will glow.
Room one and two will not glow.

REFERENCES

[1] b_e_n (9.11.2011) what is Arduino, [online]


https://learn.sparkfun.com/tutorials/what-is-an-arduino
Figure 4 Block diagram
[2] Electrical Technology (11.06.2014) types of switches [online]
The block diagram can be better explained by the table given below.

V. RESULTS AND DISCUSSION


Result of project is shown in the following case study below.

Situation 1
When the priority is set such that the priority of room 1 is
highest and then come room 2 then 3 and then 4 (room1 >
room2 > room3 > room4).
And the supply is provided by WAPDA.
Action
If we turn on the switch of any bulb
Result
It will glow.
You can turn on the entire load at a time.

Situation 2
When the priority is set such that the priority of room 1 is
highest and then come room 2 then 3 and then 4 (room1 >
room2 > room3 > room4).
And the supply is provided by BATTERY.
Action 1
If the switch of all the bulbs is on.
Result 1
All the bulb of room1 and bulbs of room2 will be on other will
not glow.
Action 2
All the switches of room1 are off.

93 | FICT URC1-2016
Generate power using sky fuel through
Convex lens & natural gas
Students: Abdin, Alam Amin, Supervisor: Mohsin Habib
Department of Electrical Engineering
Faculty of ICT, BUITEMS, Quetta, Pakistan
abdinpasund@gmail.com , alambaloch1193@hotmail.com

Abstract - This paper deals with the problems associated with divided into two stages, which are solar fuel and conventional
the generation of power using sky fuel through convex lens and fuel (natural gas). Solar fuel conversion consists of movable
natural gas. After an introduction, in chapter I. The structure of Optic lens, solar boiler, steam turbine and generator. The
this hybrid power generation system is described in chapter II. proposed System is implemented on hardware. The working
Furthermore, all of its components are described one by one in prototype is developed. The experimental results show that
chapter III and summary of this paper is described in chapter the power generated by Using Sky Fuel through Convex Lens
IV along with a conclusion in chapter V and references of this and Natural Gas increases as much as 20% in comparison
research are described in chapter VI. with thermal power unit.

I. INTRODUCTION III. COMPONENTS OF POWER PLANT


Energy is the most valuable resource and foundation of
The Components used in this projects are as follows:
civilization. It is also our heritage for future generations.
A.MOVABLE OPTIC LENS
Preserving this resource for future requires a thorough
A lens is a Trans missive optical device that affects the focus
understanding of energy resources, optimal operation and of a light beam through refraction. A simple lens consists of a
sustainable usage. Solutions that previously seemed single piece of material, while a compound lens consists of
impossible or too expensive, today, are technically and several simple lenses (elements), usually along a common
economically achievable. Application of new capacity axis. Lenses are made from transparent material such as glass,
generated by renewable energy sources, new management ground and polished to a desired shape. A lens can focus light
systems, advanced technologies and improving productivity to form an image, unlike a prism, which refracts light without
can contribute to economic growth. focusing. Devices that similarly refract radiation other than
Solar energy is one of the most important sources of energy as visible light are also called lenses, such as microwave lenses
it is free and no other country can charge for the use of the or acoustic lenses.
sun. Solar energy, on the other hand can be important because B. BOILER TANK
this energy is infinite. Boilers are pressure vessels designed to heat water or produce
Addressing the issues related to solar energy and renewable steam, which can then be used to provide space heating and/or
energy is important for everyone. This report investigates the service water heating to a building. In most commercial
nature of solar energy; various ways of exploiting it; and building heating applications, the heating source in the boiler
examining the state of the art technologies used to provide is a natural gas fired burner. Oil fired burners and electric
power from this profitable energy. resistance heaters can be used as well. Steam is preferred over
hot water in some applications, including absorption cooling,
II. STRUCTURE OF HYBRID POWER PLANT kitchens, laundries, sterilizers, and steam driven equipment.
There are two sources of thermal energy. One from conveyed C. STEAM TURBINE
sun light and second is from burning of fuel (Natural Gas). A steam turbine is a device that extracts thermal energy from
Due to these two thermal sources, water is heated, turned into pressurized steam and uses it to do mechanical work on a
steam which spins a steam turbine which then drives the rotating output shaft.
electrical generator. The flow of steam is controlled by a Because the turbine generates rotary motion, it is particularly
steam controller valve. For suited to be used to drive an electrical generator about 90%
constant speed, there is a flywheel attached to the shaft of of all electricity generation in the United States (1996) is by
generator and turbine. Generator induce an AC voltage which use of steam turbines. The steam turbine is a form of heat
is stepped up by a step-up transformer. Its development is engine that derives much of its improvement in

94 | FICT URC1-2016
thermodynamic efficiency from the use of multiple stages in not get condensed, it will not give required space to other
the expansion of the steam, which results in a closer approach steam behind it, to expand to its required volume.
to the ideal reversible expansion process.

D. ALTERNATOR
An alternator is an electrical generator that converts
mechanical energy to electrical energy in the form of
alternating current. For reasons of cost and simplicity, most
alternators use a rotating magnetic field with a
Stationary armature. Occasionally, a V. CONCLUSION
linear alternator or a
rotating armature with a stationary magnetic field is used. In By implementing this method for the generation of power we
principle, any AC electrical generator can be called an can produce electricity by lowering the economic costs. It is
alternator, but usually the term refers to small rotating environmental friendly. It can be used in rural areas. It can be
machines driven by automotive and other internal combustion concluded that it has more benefits than other power sources.
are called turbo-alternators. Large 50 or 60 Hz three phase If compared with solar cell unit, it can be used in hot areas too
alternators in power plants generate most of the world's while the efficiency of solar cell decreases with increase in
electric power, which is distributed by electric power grids. temperature

ATMEGA328 is the microcontroller used in this system. REFERENCES


Signals from sensors are given to the microcontroller and this
microcontroller will digitize the signal and send it to the [1] R. Athey, E. Spencer, 1992, Deaerating Condenser boosts Combined- Cycle
android phone through Wi-Fi. The controller has properties [2]. Plant Efficiency, Graham Manufacturing Corp., Houston
[3]. E. Augsten, 2009, Make the Desert Bloom, Sun & Wind Energy,
like inbuilt ADC, essential to get the signals from the different [4]. September Issue, pp. 52 55
Sensors. By this the microcontroller that is used in this project [5].F. Avellan, 2007, Turbomachines Hydrauliques, Pertes Energtiques, Ecole
has some extra advantages. The passive Infra-Red (PIR) Polytechnique Fdrale, Lausanne A. Avila-Marin, 2011, Volumetric Receivers
in Solar Thermal Power Plants with Central Receiver System Technology: A
sensor will, under typical condition, detect a human being Review, Solar Energy, Volume 85, pp. 891 910
moving around within approximately 10m from the sensor. As
live human body releases thermal radiation it is received and
used by the PIR sensor to detect persons. PIR sensors are
passive infra-red sensors. The PIR (Passive Infra-Red) Sensor
is a pyro electric device that senses motion by determining
changes in the infrared (heat) levels released by surrounding
objects. This motion can be detected by checking for a rapid
change in the surrounding IR patterns. When motion is
detected the PIR sensor will give signal to microcontroller and
then send message to android phone through Bluetooth
technology. We are also using ultrasonic sensor, metal
detector, humidity and temperature sensor, vibration switch
module to make the robot more intelligent.

IV. CONDENSER

In systems involving heat transfer, a condenser is a device or


unit used to condense a substance from its gaseous to its liquid
state, by cooling it. In so doing, the latent heat is given up by
the substance, and will transfer to the condenser coolant.
Steam condenser is a device in which the exhaust steam from
steam turbine is condensed by means of cooling water. The
main purpose of a steam condenser in turbine is to maintain a
low back pressure on the exhaust side of the steam turbine.
After releasing from nozzles, the steam has to expand to a
great extent for converting available energy into it to usable
mechanical work. So, if the steam after doing its work, does

95 | FICT URC1-2016
IOT: Control of Electronic Appliances through Smart
Phone
Students: Bilal Dost, Abdul Rauf, And Agha Ali Oan Raza,, Supervisor: Abdul Rehman
Department of Information Technology
Faculty of ICT, BUITEMS, Quetta, Pakistan
m.bilal1782@gmail.com

Abstract - The internet of things (IOT) is a novel paradigm that


is becoming popular with research and industries. The basic idea Problem Statement: This work is already being done in the
is that IOT will connect objects around us (electronic and other part of the world. But the connectivity is by Bluetooth,
electrical) to provide seamless communication and contextual in some cases its also connected through Wi-Fi but its
services provided by them. We are also building a project which
expensive enough.
is based on IOT. This work processes a mobile connectivity
system with your home electrical appliances. The home II. METHODOLOGY
appliances would be connected with an Arduino board which is a
microcontroller. This Project would be of great significance Firstly the appliance is connected with the Relay board which
because it also provide ease for the user. It is not necessary for adjust its voltage with Arduino board which is a
user to be at the same geographical position to use or to control microcontroller. This microcontroller is then connected with
that specific electrical device. an Arduino Wi-Fi Shield which would provide its connectivity
This project will be important to the Business use as well as for with net wirelessly. This Wi-Fi shield is connected with a
general home Purposes. router which is placed at home. Its IP is configured and this IP
I. INTRODUCTION will be stored in the mobile app through which it will control
that particular home appliance.
The project is based on Internet of things. The Internet of There would be a message sent to the Arduino by the android
Things (IOT) is a system of interrelated computing devices, application. The message will then control the appliance
mechanical and digital machines, objects, animals or people through Arduino, e.g. if the application sends a message i.e. 0,
that are provided with unique identifiers and the ability to then the electrical appliance which is connected with the
transfer data over a network without requiring human-to- Arduino board, will turn off. These messages would be
human or human-to-computer interaction. predefined in that mobile application.
This system is designed to produce to connectivity with the
home electrical appliances. The user is connected with the
appliances where ever he is. The connectivity is because of REFERENCES
internet, so this whole connectivity works on the principle of [1] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of
Internet of things. The user interface would be a Mobile Things (IoT): A vision, architectural elements, and future directions. Future
Generation Computer Systems, 29(7), 1645-1660.
Android application through which the user will be connected [2] Kelly, S. D. T., Suryadevara, N. K., & Mukhopadhyay, S. C. (2013).
with the device remotely. Towards the implementation of IoT for environmental condition monitoring
The main motivation to do this work was that this Internet of in homes. Sensors Journal, IEEE, 13(10), 3846-3853.
[3] Lazarescu, M. T. (2013). Design of a WSN platform for long-term
thing is not very new technology but is rarely implemented environmental monitoring for IoT applications. Emerging and Selected
overall in the world. So we started to develop an internet of Topics in Circuits and Systems, IEEE Journal on, 3(1), 45-54.
things project which can be easily implemented for home and [4] Google
business use. The whole connection is not wired i.e. wireless [5] Wikipedia
[6] Youtube

Figure 5 System Design

96 | FICT URC1-2016
WAN Security and Load Balancing Over ISP for Multiple
Sites
Students: Hafeez ur Rehman, Faka ul islam, Rehan wali, Izhar, Supervisor: Abdul Rehman
Department of Information Technology
Faculty of ICT, BUITEMS, Quetta, Pakistan
Hafeez_2014@yahoo.com

Abstract - WAN of any organization of different branches as


secure network with load and balancing if one gateway failed so
automatically thorough protocol it will adopted the backup way.
And data will flow through IPsec and GRE tunnel, in this IPsec
tunnel data and routing protocol of any organization branches
will be flow in encrypted form over ISP, instead of leased line we
have managed IPsec tunnel over ISP which will save handsome
amount of any organization, and this is hub and spoken topology.
All the branches will be communicate over ISP, there will be
IPsec over ISP for security.

I. PROBLEM STATEMENT Figure 1: Network design diagram

Wide area network security and load balancing our ISP for Following is the system interfaces:
multiple network sites or different sites
Data terminal equipment to local area network (DTE to
II. INTRODUCTION LAN systems)
This document seeks to provide the wan of any local area network to local area network (LAN to LAN
organization, which will communicate different site/branches systems)
over ISP as secure and there will be load and balancing of local area network to wide area network (LAN to WAN
users and computers to access wan in each internal network of systems)
different branches of any organization. Our work on wan of wide area network to wide area network (WAN to WAN
any organization will serve as a guideline for future systems)
networking. Furthermore, this document presents an initial LAN and WAN systems to physical environment
description of the various protocols and services. LAN and WAN systems to network management systems. For
Functions, including simplicity and readability, this document considers a
metropolitan area network to be a local area network (LAN).
Layer 2 switching This document specifies IPsec tunnel over ISP to
High availability communicate different sites of any organization.
Port security
QOS classification and marking and trust boundaries The three functional layers of the hierarchical network model:
Address Resolution Protocol (ARP) inspection the access, distribution, and core layers.
Virtual access control lists (VACLs) Access layer: Provides workgroup/user access to the
Spanning tree network.
Power over Ethernet (PoE) and auxiliary VLANs for VoIP Distribution layer: Provides policy-based connectivity and
controls the boundary between the access and core layers.
Core layer: Provides fast transport between distribution
switches within the enterprise campus.

Second Stage
Tuning: MOSFET Furthermore you can deploy FTP and
TFTP servers for all any organization branches in one branch.
TFTP (Trivial File Transfer Protocol) for own web site and
FTP (File transfer protocol) for data sharing. And more you
and deploy online quiz and online software for all branches

97 | FICT URC1-2016
Your hardware devices like Routers and switches must be in [8] http://techterms.com/definition/operating_system
Rack and it should be secure form unknown persons. [9] http://www.computerhope.com/

III. CONCLUSION
In this IPsec tunnel data and routing protocol of any
organization branches will be flow in encrypted form over
ISP, instead of leased line we have managed IPsec tunnel over
ISP which will save handsome amount of any organization,
and this is hub and spoken topology.
REFERENCES
[1] Taylor, J. W., & Buizza, R. (2002). Neural network load forecasting with
weather ensemble predictions. Power Systems, IEEE Transactions on,17(3),
626-632.
[2] Baran, M. E., & Wu, F. F. (1989). Network reconfiguration in distribution
systems for loss reduction and load balancing. Power Delivery, IEEE
Transactions on, 4(2), 1401-1407.
[3] Haykin, S., & Network, N. (2004). A comprehensive foundation. Neural
Networks, 2(2004).
[4] Odom, W. (2007). Ccent/ccna icnd1 official exam certification guide (ccent
exam 640-822 and ccna exam 640-802). Cisco Press.

[5] https://networklessons.com/
[6] https://cisco.com
[7] https://www.techopedia.com/definition/25690/vmware-workstation

98 | FICT URC1-2016
Internet Controlled Surveillance Tank
Students: Muhammad Arsalan, Mubeen Usama, Adeel Ali, Asad Ali, Ayesha Iftekhar
Department of Information Technology
Faculty of ICT, BUITEMS, Quetta, Pakistan

Abstract - Intelligent mobile robots and cooperative multi- agent room lost their lives by no immediate rescue that is because of
robotic systems can be very efficient tools to speed up search and slow rescue operation.
research operations in remote areas. Robots are also useful to do Our project proposes a robotic vehicle that moves in the
jobs in areas and in situations that are hazardous for human. destructed area and helps in identifying the live people. Hence
They can go anywhere that is not reachable by humans and can go precious life can be saved by timely detection in natural
into gaps and move through small holes that are impossible for
calamities even without the help of large number of rescue
humans and even trained dogs.
operator.
I. INTRODUCTION
The advent of new high-speed technology and the growing
computer capacity provided realistic opportunity for new robot
controls and realization of new methods of control theory.
This technical improvement together with the need for high IV. PROPOSED ALGORITHM
performance robots created faster, more accurate and more
intelligent robots using new robots controlled devices, new
drives and advanced control algorithms.
This Project deals with live personal detection robot which is
based on 8 bit Motor Driver PIR sensor and is used to detect
alive humans. The project is mainly used in the DEBRIS for
rescue.
All the above systems are controlled by the Raspberry pi 2.
The Motor-controller is used to control the motors. It catches
the signals from the PIR sensors and it drives the motors
giving to the sensor inputs. IP moveable camera will transmit
live streaming of overall situation to PC. Rover 5 robot
platform is used to drive the robot.

II. PROBLEM STATEMENT


In destructed environments it is impossible to detect live
humans who need help and many of them loose their lives as a
Fig1. Flow Chart
result. Detection by rescue workers becomes time consuming
and due to vast area that gets affected it becomes more
difficult. In our country rescue operations are performed by Algorithm:
humans and trained dogs which are both risky and time Step 1: Start
consuming and as a result we lose precious lives. In past, we Step 2: Initialize micro controller
have seen such incidents in our country for example Karachi Step 3: Initialize motors
Air Base attack in which seven men who were trapped in store Step 4: Initialize sensors
Step 5: Monitor sensors

99 | FICT URC1-2016
Step 6: If person detected This paper contains two sections. One is Robot section and the
Show Status other is Control section. In robot section, the sensors about the
Step 7: If obstacle detected corresponding parameters are made to available. In the
Show status control section, the parameters are shown on android phone.
Step 8: If bomb detected In Robot and control sections, Motor driver forms the control
Show Status unit. In this system, a robot is fixed with motors. A motor
Step 9: If fire detected driver is used to control all tasks. According to the motor jobs
Show status the ROBOT will operate in specified directions. The detection
Step 10: If earthquake detected of parameters is finished in a continuous way and the detected
Show status value is conveyed using the Bluetooth module to the android
Step 11: Monitor sensors phone. Movable camera is capable of transmitting live video
Step 12: Stop streaming to PC, it will transmit live signals through wireless
radio frequency to analyze condition of alive humans.
IV. METHODOLOGY
A. PIR sensor IV. CONCLUSION
The passive Infra-Red (PIR) sensor will, under typical
conditions, detect a human being moving around within Hence many lives can be saved by using this autonomous
approximately 10m from the sensor. As live human body vehicle in disaster environment in a short duration which
releases thermal radiation it is received and used by the PIR becomes time consuming and unaffected if done manually.
sensor to detect persons. PIR sensors are passive infra-red This vehicle can be improved by using high range sensors and
sensors. The PIR (Passive Infra-Red) Sensor is a pyro electric high capacity motors.
device that senses motion by determining changes in the
infrared (heat) levels released by surrounding objects. This
REFERENCES
motion can be detected by checking for a rapid change in the
surrounding IR patterns. When motion is detected the PIR
[1] Seethai, A., Azha Periasamy, and S. Muruganand. "Rescue Robotics Using
sensor will give signal to motor driver and then send message Artificial Intelligence."
to android phone through Bluetooth technology. [2] Vijayaragavan, Mr. SP, and B. Tech. "Live Human Detecting Robot for
We are also using ultrasonic sensor, metal detector, humidity Earthquake Rescue Operation." International Journal of Business Intelligent 2,
and temperature sensor, vibration switch module to make the no. 01.]
[3] Sharad, Rupnar Pallavi, and P. R. Thorat. "Live Human Detecting Robot for
robot more intelligent. Earthquake Rescue Operation."
B. Motor driver [4]. Mr. M. Arun Kumar, Mrs. M. Sharmila Wireless Multi Axis
A motor driver is a little current amplifier; the function of ROBOT for Multi-Purpose Operations, Department of ECE, SVCET & JNT
University Anantapur, India
motor drivers is to take a low-current control signal and then [5] Robert L.Boylestad and Louis Nashelsky, Electronic Devices and
turn it into a higher-current signal that can drive a motor. Circuit Theory, 8th Edition, 2006.
This motor driver that is used in this project has some extra
advantages.
C-Application
Designing a webpage to control the forward and backward
movement of robot by phone or computer. This will be done
by Wi-Fi module. It has the ability of giving information
about detection and drive the tank. Thus detection of alive
human is showed as a pop up message to the user.

Figure 6 Block diagram

III. RESULTS AND DISCUSSION

100 | FICT URC1-2016


101 | FICT URC1-2016
The Atari Boy (T.A.B) Mobile Game
Usman Sarwar, Nurmeen Rafique, Syed Ainullah,Faisal Khan
Department of Information Technology,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Usmansarwar667@gmail.com

Abstract -Atari games were popular in the 80s and early The graphics resolution will be 640x480 at most 256 colors
90s era. These games were famous among a huge number of at a resolution. This will allow the game to be played on
people of many age groups. This project is aimed at reviving the older versions of android. The amount of graphical content
concept of Atari games by presenting an 8-bit character in an will also be limited to ensure that the total size of the game
advanced 32-bit interface. The look and feel of this retro
remains under the 80mb limit.
character recalls the Atari games of old era by combining logics
from several Atari games. 3) Constraints: Currently, the following constraints are
I. INTRODUCTION specified.
Any version of android will be able to install and run
The games developed nowadays are mostly on 32-bit the game.
graphics, we only see the modern and advanced graphics with
Minimum requirements of the game are
little focus on the actual game play. Atari games that were
1GHz processor
used in 1980s are now a thing of past. Most of the people in
todays age are not aware of the joy of the actual game play. 1GB ram
Atari games were based on 8-bits graphics. This gaming C. Assumptions and Dependencies
interface has entirely vanished from the gaming industry. We assume the following responsibilities from the client
In this project, we attempt to revive the idea of 8-bit in during the game development process:
combination with advanced interface. To the best of our Provide testing methods and help in developing
knowledge, such works are rarely available in the market. the test cases with our test engineers.
Therefore, our work can be a motivation for others to remake Upon the completion of the development process,
the games in a new dimension. Furthermore, with the help of organize meetings and workshops with the target
this idea the new generation will also get to know about the 8- user groups to test the software.
bit gaming interface (Atari). In order to finish the project on time, the documentation must
be reviewed and signed off within one week of the delivery of
our deliverables.
II. METHODOLOGY
A. Proposed Concept
III. THE ATARI BOY
To illustrate the working of 2D gaming that will revive the
8-bit Atari games in 32-bit graphics mode. In this section, we will describe the details of the developed
B. Methodology game called The Atari Boy. Our designers and programmers
1) Interfaces: The interface for the player will be entertaining have designed and built the game based on these
and engaging. The controls will be easy to understand and requirements.
simple to use. Menus will be interactive and easily accessible
throughout the game. Once the game is in playing mode, A. Performance
everything a player needs will be clearly visible on the screen As we have added a unique feature in the application that
and easily accessible Player will find the most basic functions reduces the platform dependency. This game is tested of
of the game; fun to play, from character creation to multiple platforms i.e. Dell tablet venue 7, HTC m9+ ,Q
educational exercises. mobile i9.
These devices had smoothly executed the game because the
game is compatible on several mobile platforms.

B. Hardware and Software Support


Fig. 1 The relationship between user and different modules and dependency of
modules on each other The game will run on multiple mobile devices.
2) Hardware Interfaces: The product is will operate on The game will not require regular maintenance.
dynamic mobile platforms including Android, iOS, and Once installed, the game and data system will not need to be
Blackberry. As such, the game should be able to adjust to maintained at scheduled intervals. Except score management
touch. and user management.

102 | FICT URC1-2016


C. SDK and IDEs
Mono developers
Adobe Photoshop cc
Adobe flash cc
Android SDK
Unity 5.0

D. Hardware and Software Support


1) Interfaces: There will be a start screen on lunch of the
game. An animated clip will explain the story of the game.
The main menu screen will be presented. The main menu will
have three buttons: Start, options and, Quit Game. All
buttons in the preceding and subsequent menus will have a
similar style, energetic, entertaining, but also easy to
understand and use.

2) Input Devices: The gaming software does not require any


additional Input hardware in order to operate. Existing
hardware such a touch screen will be the only hardware
required for input to the game.

IV. CONCLUSION
The proposed 8-bit on 32-bit game has been developed and is
working on different platforms. This application can be run
freely on any devise. The game is based on 2-d. In future, we
aim to add further stages and value addition to the game
which will be incorporated in installed versions via app
update.
REFERENCES
[1] How to be a Graphic Designer Without Losing Your Soul, Silja Bilz and
Adrian Shaughnessy
[2] The Little Know-It-All: Common Sense for Designers, Steven Heller and
Veronique Vienne, fifth edition
[3] Becoming a Graphic and Digital Designer: A Guide to Careers in Design

103 | FICT URC1-2016


Clarion Call, A Mobile Game
Zarak khan, Waqas Ahmed, Anik malik, Faisal Khan
Department of Information Technology,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Xarak.baloch@outlook.com

Abstract The clarion call is developed in a latest gaming to ensure that the total size of the game remains under the
engine unity 3D. The game is supported by any version of 80mb limit.
android. The theme of this game is to focus on animals who are B. Constraints
becoming extinct as a result of deforestation and increase of the The following constraints are specified.
industrial areas.
Any version of android will be able to install and run the
game.
I. INTRODUCTION
Minimum requirements of the game are
The clarion call is an android 2d game. The meaning of 1GHz processor
the title make its quite clear to decipher the objective behind 1GB ram
the game. Clarion call means to make a keen request for
C. Assumptions and Dependencies
action against any matter of serious concern. This game
We assume the following responsibilities from the client
depicts the order of animals who are inhabitants of natural
during the game development process:
area. But after the industrialization their natural abode has
Provide testing methods and help in developing the test cases
been endangered by deforestation and industrialization at
with our test engineers.
large.
Upon the completion of the development process, organize
As a matter of fact this calls for an earnest action towards
meetings and workshops with the target user groups to test the
presentation of wildlife and natural environment. In this
software.
culture of urban jungle mans has become materialistic and
In order to finish the project on time, the documentation must
greed and in this ferocious greed man has ransacked the
be reviewed and signed off within one week of the delivery of
inhabitant of all other species of on this planet. But man has
our deliverables.
forget that the life of mankind depends on the preservance of
wild life without which man cannot survive and this makes III. THE CLARION CALL
the need for a clarion callClarion call has been developed in
In this section, we will present the game and describe the
the latest gaming engine unity 3d. It is compatible for all
highlights of the game. Our designers and programmers have
versions off android and functions in every android device c#
designed built the game based on these requirements.
scripting have been used for coding in mono developers.
A. Performance
Designing has been done in adobe Photoshop.
As we have added a unique feature in the application that
reduces the platform dependency. This game is tested of
II. METHODOLOGY multiple platforms i.e. tablet Samsung tab 3, Samsung S3, Q
mobile i9, Samsung j5.
First the characters are designed in adobe Photoshop second
These devices had smoothly executed the game because the
for story video clip depiction is carried out in adobe primer
game is compatible on several mobile platforms.
heard the menu of the game has three options.
B. Hardware and Software Support
1. New game
The game will run on multiple mobile devices. The game will
2. Load game not require regular maintenance. Once installed, the game and
3. Options data system will not need to be maintained at scheduled
Graphic settings intervals. Except score management and user management.
Audio settings C. SDK and IDEs
Mono developers
A. Hardware Interface Adobe Photoshop cc
The product is will operate on dynamic mobile platforms. As
Adobe flash cc
such, the game should be able to adjust to touch. The graphics
Android SDK
resolution will be 640x480 at most 256 colours at a resolution.
Unity 5.0
This will allow the game to be played on older versions of
D. User Interfaces
android. The amount of graphical content will also be limited

104 | FICT URC1-2016


There will be a start screen on lunch of the game. An
animated clip will explain the story of the game. The main
menu screen will be presented. The main menu will have
three buttons: Start, options and, Quit Game. All buttons in
the preceding and subsequent menus will have a similar style,
energetic, entertaining, but also easy to understand and use.
E. Input Devices
The gaming software does not require any additional Input
hardware in order to operate. Existing hardware such a touch
screen will be the only hardware required for input to the
game.

IV. CONCLUSION
We have developed and presented a mobile game called The
Clarion Call that caters players of all ages and is supportable
on all versions of android operating system. The motivation
behind the game is to entertain the players and spread a
moral lesson of care for the environment and for animals who
are sharing this planet with us.

REFERENCES
[1] How to be a Graphic Designer Without Losing Your Soul,
Silja Bilz and Adrian Shaughnessy
[2] The Little Know-It-All: Common Sense for Designers, Steven Heller and
Veronique Vienne, fifth edition
[3] Becoming a Graphic and Digital Designer: A Guide to Careers in Design
[4] www.digitaltutors.com/learningpath/45-How-to-Get-Started-with-Character-
Design
[5] www.digitalartsonline.co.uk/features/illustration/11-character-art-tips/
[6] www.youtube.com/watch?v-YSDNv7IJs5

105 | FICT URC1-2016


Online Shopping Store
Norooz Ali Khan, Shoaib Ahmed, Manzoor,Abdul Rehman
Department of Information Technology,
Faculty of ICT, BUITEMS, Quetta, Pakistan
Noroozackz@gmail.com

Abstract This Work (an online shopping system) that It is important for consumers to use caution when visiting
permits a customer to submit online orders for items and/or online shopping websites regularly. The convenience of
services from a store that serves both walk-in customers and online shopping could pose a potential threat to those with
online customers. The online shopping system presents an online credit card payment. People spend far too much each month
display of an order cut off time and an associated delivery
online. Because of the easy accessibility and simple click of a
window for items selected by the customer. In addition,
available service windows are presented to the customer as a button to purchase goods, shopping addictions could be a
function of customer selected order and service types and serious danger of online shopping. This habit can lead to
further, the order picking is assigned in accordance with a financial and domestic problems in the household.
picker's preference. When ordering goods, many shopping Making purchases online means consumers will use virtual
systems provide a virtual shopping cart for holding items
selected for purchase. Successive items selected for purchase are shopping carts. Online shopping makes picking out items a
placed into the virtual shopping cart until a customer completes quick process. It makes picking out items so quick that
their shopping trip. Virtual shopping carts may be examined at consumers have the tendency place more items in their cart
any time, and their contents can be edited or deleted at the
option of the customer.
than they are capable of paying for. Consumers shopping
online exhibit an odd behavior of abandoning their shopping
I. INTRODUCTION carts instead of proceeding to checkout. This behavior would
This project is to describe the features of online shopping be very unlikely to see in a physical store. While physical
Mart (a website). It will enable vendors to setup online shops, shopping carts are used in actual stores with the intent of
customer to browse through the shop and purchase them purchasing the product in the cart immediately, retailers
online without having to visit the shop physically. The cannot assume that their website patrons use their carts to
administration module will enable a system administrator to purchase a product immediately. Many online shoppers use
approve and reject requests for new shops and maintain
their shopping cart as a type of wish list. They frequently
various lists of shop category. Once the customer decides to
submit a purchase order, the customer may print the contents utilize the Internet as a tool for 'window shopping' and
of the virtual shopping basket in order to obtain a hard copy product comparison (Kim & Ammeter, 2008). Shoppers add
record of the transaction. their items that they would like to buy and, instead of
proceeding to check out, abandoning his or her virtual
shopping cart to rethink the possible purchase.
III. METHODOLOGY
This system will work on client-server architecture. It will
require an internet server and which will be able to run PHP
application. The system should support some commonly used
browser such as IE etc.
The application is HTML and scripting language based. The
Figure 1: System I/O diagram
end-user part is fully portable and any system using any web
browser should be able to use the features of the system,
including any hardware platform that is available or will be
II. PROBLEM STATEMENT available in the future. An end-user is use this system on any
The Incremental software process model was used to OS; either it is Windows or Linux. The system shall run on
implement the entire project. PC, Laptops, and PDA etc. A commercial database is used for
maintaining the database and the application server takes care

106 | FICT URC1-2016


of the site. In case of a failure, a re-initialization of the
program will be done. Also the software design is being done
with modularity in mind so that maintainability can be done
efficiently. There is no performance requirement in this
system because the server request and response is depended
on the end user internet connection.

IV. CONCLUSION
Online shopping has become extremely popular over the last
decade. Utilized mostly by the Net- Generation, this service
is extremely convenient. Although online shopping can be
very convenient and beneficial there are also some potential
problems that can arise. Consumers have been seen to exhibit
different buying behaviors when shopping online than when
they are shopping in a physical store. This makes it
imperative that retailers study the behaviours of consumers
and make changes in order to remain profitable and
successful. Another potential problem that can arise from
online shopping is addiction. The convenience of online
shopping that can be seen as very beneficial, can also lead to
an unhealthy addictive pattern of behavior.

REFERENCES

[5] Duckett, J. (2011). HTML and CSS: design and build websites. John
Wiley & Sons.
[6] Delone, W. H., & Mclean, E. R. (2004). Measuring e-commerce success:
Applying the DeLone & McLean information systems success
model.International Journal of Electronic Commerce, 9(1), 31-47.
[7] Bell, D. R., & Lattin, J. M. (1998). Shopping behavior and consumer
preference for store price format: Why large basket shoppers prefer
EDLP.Marketing Science, 17(1), 66-88.
[8] Efron, B. (1992). Bootstrap methods: another look at the jackknife (pp.
569-593). Springer New York.
[9] Sessions on Web Developing [conference Proceedings.
[10] www.w3school.com

107 | FICT URC1-2016


RFID BASED ATTENDANCE SYSTEM
Israr Taj, Aziz Khan, and Bilal Ahmed,Mr. Irfan magsi
Department of Information Technology,
Faculty of ICT, BUITEMS, Quetta, Pakistan
bilalahmed.kak@gmail.com

Abstract In Pakistan, checking students' attendance is one


of the important issues for universities, because many
universities evaluate students attendance and while giving the
final grade, professors consider their total number of
appearances on classes during the whole semester. This brings
to the idea of having some tool to control students attendance.
Some universities prefer to use paper sheet for controlling
attendance, whereas some universities prefer to use paper sheet
for checking students' attendance and after this, fill out these Fig. 1 Magnetization as a function of applied field.
information into a system manually, like Our University does.
However, this is not an efficient way since there will be spent II. PROBLEM STATEMENT
much of time for calling students names and putting marks like
"presence" or "absence" if the class is a lecture class, and in In most universities, teachers take attendance by calling out
this class at least 5 groups are presented. Moreover, some the names and surnames of students, and then marking them,
students may call his/her friend as "presence" even though this while, in others, teachers pass around a sheet of paper, asking
student is currently absent. After thinking all these issues, students to sign in attendance sheet just next to their
authors of the following research paper decided to create a surnames. Both practices have their drawbacks. In the first
system that makes easier to check students attendance case, if numerous groups attend the lesson, checking all of
automatically, and this system is implemented in many these students by name and surname might take about 10
universities. The system is based on RFID technology, and in minutes out of each lesson; in the second case, friends of
this paper, details of this system are presented.
absent students may write down their names and surnames.
These practices place university teachers and their institutions
Keywords: RFID: Radio Frequency Identification; RFID-tag;
RFID- reader; attendance control system at considerable disadvantages when it comes to taking
attendance. [2]
I. INTRODUCTION
III. SYSTEM ARCHITECTURE
Radio-frequency identification (RFID) is a technology
that uses radio waves to transfer data from an electronic tag Our aim is to create a system with one server to which all
called an RFID tag or label, which is attached to an object PCs are connected, so all data will be saved in one data base,
through a reader for the purpose of identifying and tracking making the monitoring of the information effortless. All
the object. Some RFID tags can be read from several meters classes must have a PC with a connected RFID-reader that
away and beyond the line of sight of the reader. RFID systems can read student RFID-cards, scanning the other students
have been widely used in many different application areas, RFID-card to make it appear as if she/he had also attended.
such as: product tracking through manufacturing and
assembly , control of inventory, parking lot access and
control, container tracking, ID badges and access control,
equipment tracking in hospitals, etc. Compared to other
automatic identification technologies, such as optical barcode
systems, RFID-technology has several advantages. Tag data
can be read automatically beyond the line of sight and from a
range of several meters.

Fig. 2 Architecture of attendance-control system

IV. OPERATIONS

108 | FICT URC1-2016


RFID devices and software are supported by a sophisticated
software architecture that enables the collection and
distribution of location based information in near real time. A
complete picture of the RFID attendance system combines the
RFID Tags and readers with access to global standardized
database, ensuring real time access to up-to-date information
on the card. The card contains a unique identification
number called an electronic product code (EPC). The RFID
tag can be read from a distance and the embedded electronic
information for each card can be over written repeatedly. This
increases technologies like surveillance cameras to be
activated in conjunction with an employee being in their
vicinity. The RFID attendance system is faster, and does not
require line of sight. The RFID system has higher data
storage. In the RFID systems, the transponders are also easy
to conceal or incorporate in other items. For example in 2009,
researchers successfully glued RFID micro transponder to live
ants in order to study their behavior [1]. Furthermore,
multiple RFID cards can be read all at the same time.
Information about the employees access and attendance can
be stored on the database.
V. CONCLUSION
In conclusion, the objective to build an RFID based
attendance system with a door unit was successfully achieved.
In terms of performance and efficiency, this project has
provided a convenient method of attendance marking
compared to the traditional method of attendance system. By
using databases, the data is more organized. This system is
also a user friendly system as data manipulation and retrieval
can be done via the interface, making it a universal
attendance system. Thus, it can be implemented in either an
academic institution or in organizations. [3]

REFERENCES
[2] http://ijcsi.org/papers/IJCSI-9-3-1-227-230.pdf
[3] http://ijcsi.org/papers/IJCSI-9-3-1-227-230.pdf/Motivation
[4] http://pakjas.com.pk/papers/3.pdf /Conclusion

109 | FICT URC1-2016


110 | FICT URC1-2016
Solar Based Smart Irrigation System
Students: Shehzar Shahzad Sheikh, Abeera Javed, M.Abbas, Shakir ullah Supervisor name: Sara Ayub , Ishtiaq
Marwat
Department of Electrical Engineering Technology
Faculty of ICT, BUITEMS, Quetta, Pakistan
Shehzarshahzad@gmail.com

Abstract - A smart approach to minimize the men power in changes in the environments like rainfall, under water and
field of agriculture using proportional integral and derivative make rapid on off actions in the controller.
Controller along with SSRLS and Artificial Neural Networks. This [4] This paper present artificial neural network using Mat lab.
project includes 4 sensors; Air sensor, Wind speed, Temperature The input parameters like air, temperature, soil moisture,
sensor, Radiation sensor. It is an environmental friendly project radiations and humidity are modeled then the amount of water
which helps the farmers in growing crops in distant areas which
required for irrigation is estimated and then associated results
are not in range of the farmer and he have to time and again to
check the appropriate conditions of the field, the distance issue is
are simulated.
resolved by using ZigBee, and parameters are measured with the
help of the sensors so farmer can water his crop from a distant
place and monitor his crop by the signal display on LCD which is
in the control room. These four sensors work together on the basis
of Artificial Neural Network algorithm and PID controller
programming using ZigBee and maintain the humidity level,
water level, moisture, temperature of the agricultural field.

Key Words: PID Controllers, Arduino, ANN model, solar, panel,


wind-speed, temperature, radiation sensors.

Fig. 1: General configuration of Proposed Methodology of software and


I. INTRODUCTION hardware interference.

As we know that water is the imperative element of human


life and for plants as well. So we have need to safe the water II. PROBLEM STATEMENT
and decrease the wastage of water in agriculture fields as it is
a common trend that farmer usually waste electricity and Fig. 1 illustrates the importance of the irrigation system by
water in fields. We should design a device or adopt such advance controlling techniques which is real time need of
methods by which we can decrease the wastage of water as irrigation sector. This paper describes the controlling
well as maintain the basic parameters required for growth of a techniques which has better output over the other controller
plant. Many proposed methods control the moisture level, or i.e. Pulse Width Modulation (PWM), Neutral Artificial
water level only which only controls the supply of water in the Network (ANN) and Proportional integration and Differential
fields. But this system have four sensors which work (PID). This work shows is more efficient in respect to
simultaneously to perpetuate the basic parameters of plant and disturbance handling (AWGN & Impulsive). Here SSRLS
control the water level even if farmer is not in the field. Controlling Technique is used which is adaptively recovered a
Moreover it also give signals to the farmer either it is overflow chirped sinusoid embedded in additive white Gaussian noise,
condition or underflow condition.[1] [2] This paper is based using just a second order chirped sinusoid state space model.
on Wireless Sensing Technology (WSN) which is low cost SSRLS is a state space model based technique. Using
and low energy consuming system it works on multi sensors at sinusoidal system model it adaptively tracks the amplitude and
a time, and sense the water level, moisture in the field and phase of single frequency at which it is tuned.
inform the farmer either by a text message or by an alarming
unit. If the level of water is less or above than the predefined The system discussed in fig. 1 is consist of hardware and
value then it alarm the controller to on/off. software interface. Hardware consist of Arduino system with
[3] This paper presents a modified form of PID controller four required sensors i.e. ambient temperature, wind pressure,
along with an integral function which efficiently and give solar radiation and soil moisture which help to take required
excellent regulation of soil moisture by supplying appropriate moisture level for the irrigation purpose. The Arduino
amount of water to the agricultural field and meet all the requires +12V DC source for that purpose the complete
requirements of field moreover, it also controls the rapid system is solar powered with a battery backup. The output

111
values of all sensors are further transferred to adaptive filter It is modelled as
who filters noise disturbance (AWGN & impulsive). After this A sine wave with amplitude of 10%;
stage a performance comparative controlling techniques are Bias of 60% (constant);
used for measuring all the sensors to its required moisture A frequency of 0.2618 rad/h
level. The software interface is based on Graphic user C. Wind speed :
interface (GUI) which interact with hardware by a feedback A sine wave with amplitude of 1 Km/h;
generated by a performance comparative Controller. GUI is Bias of 3.5 Km/h (constant);
used for monitoring and display output signals and convert A frequency of 0.2618 rad/h.
them into required form for observation i.e. analog and digital D. Radiation: It is modeled as maximum possible radiation at
readings. In the system the software and hardware has two earths surface (Rmax).
way Communication by the wireless ZigBee module which
continuously observe and resets its values recording to the A sine wave with amplitude of
feedback signal. Bias of 112MJ/m;
A frequency of 0.2618 rad/h.
The Irrigation system further involves a Graphical User a) Evapotranspiration Model:
Interface (GUI). It provides the information about the Output Penman-Monteith equation is a combination equation that has
which is connected to the Microcontroller. The output unit generally been accepted as a scientifically sound formulation
contains four sensors i.e. Wind pressure, Soil Moisture, for estimation of reference evapotranspiration (Eto).This
Temperature & Radiation. GUI is two way communication equation is expressed as combined function of radiation,
b/w software & hardware the data from the field is provided to maximum and minimum temperature, vapor pressure, and
the TerraServer it then shows on the output screen. The user wind speed. After the Penman method is updated by FAO in
interface further presents a map view of a geographic area May 1990,the Penman Monteith equation is written as the
including the first irrigated area and the second irrigated area, following:
and includes a first graphical element corresponding to the
first irrigation system and a second graphical element Eto=
corresponding to the second irrigation system. The user
interface presents a first interactive control panel for III. RESULTS AND DISCUSSION:
controlling the first irrigation system concurrently with the
map view when the user selects the first graphical element, This work shows more efficient results in controlling the four
and presents a second interactive control panel for controlling parameters used for the purpose of irrigation. This work
the second irrigation system. Concurrently with the map view compares all parameters and convey signal without noise.
when the user selects the second graphical element.
IV.CONCLUSION:

IV. METHODOLOGY The proposed work is based on Controlling Techniques and


their compare for the real time application of Irrigation sector
There are four factors (Temperature, air humidity, wind speed which emphasised its importance for the modern irrigation
and radiation) by which evapotranspiration is influenced. sector and efficient way to reduce; water wastage in irrigation,
A. Temperature: labour requirement, solar based controlling, automatically
This variable should be defined as a continuous signal controlled irrigation, and remote output display for proper
(normally as a sine wave which simulated the day and night monitoring.
temperature changes), but may show sharp changes in special This work is completed under the support of BUITEMS,
places like deserts Quetta
and so on therefore:
A sine wave with amplitude of 5 C;
A frequency of 0.2618 rad/h. This frequency is measured REFERENCES
according to a time period of 24 h: [1] Daniel Rodrguez, Juan Reca, Juan Martnez, Rafael, Lopez-Luque and
Miguel Urrestarazu
0.2168 rad/h = 2pi/T=2pi/24.
A constant bias(offset) of 30 C; [2]Pravina B. Chikankar,, Soumitra S. Das
This stimulus generates a wave which at its maximum can
[3] M. S. Goodchild, K. D. Khn, M. D. Jenkins, K. J. Burek & A. J. Dutton
reach 35C (midday) and at its minimum can reach +25C
(midnight). In this way, the temperature on any given day can [4] S.Muhammad Umair, R. Usman
be simulated by changing the bias that is attached to the
variable. This diversion is obtained by uniform number
generation.
B. Air humidity:

112
113

You might also like