ETD Technology

ETD:  Explosives trace detector
Explosives trace detectors (ETD) are security equipment able to detect explosives of small magnitude. The detection can be done by sniffing vapors as in an explosive vapor detector or by sampling traces of particulates or by utilizing both methods depending on the scenario. Most explosive detectors in the market today can detect both vapors and particles of explosives. Devices similar to ETDs are also used to detect narcotics. The equipment is used mainly in airports and other vulnerable areas considered susceptible to acts of unlawful interference.




Current State of Passenger Explosives Trace Detection - Explosives detection for aviation security has been an area of federal concern for many years. Much effort has been focused on direct detection of explosive materials in carry-on and checked luggage, but techniques have also been developed to detect and identify residual traces that may indicate a passenger’s recent contact with explosive materials. These techniques use separation and detection technologies, such as mass spectrometry, gas chromatography, chemical luminescence, or ion mobility spectrometry, to measure the chemical properties of vapor or particulate matter collected from passengers or their carry-on luggage. Several technologies have been developed and deployed on a test or pilot basis. Parallel efforts in explosives vapor detection have employed specially trained animals, usually dogs.  The effectiveness of chemical trace analysis is highly dependent on three distinct steps:
(1)  sample collection
(2)  sample analysis, and
(3)  Comparison of results with known standards.
(4)   If any of these steps is suboptimal, the test may fail to detect explosives that are present.
When trace analysis is used for passenger screening, additional goals may include nonintrusive or minimally intrusive sample collection, fast sample analysis and identification, and low cost. While no universal solution has yet been achieved, ion mobility spectrometry is most often used in currently deployed equipment. In 2004, TSA began pilot projects to deploy portal trace detection equipment for operational testing and evaluation. In the portal approach, passengers pass through a device like a large doorframe that can collect, analyze, and identify explosive residues on the person’s body or clothing. The portal may rely on the passenger’s own body heat to volatilize traces of explosive material for detection as a vapor, or it may use puffs of air   that can dislodge small particles as an aerosol. Portal deployment is ongoing.3 one alternative to portals is to collect the chemical sample using a handheld vacuum “wand”. Another is to test an object handled by the passenger, such as a boarding pass, for residues transferred from the passenger’s hands. In this case, the secondary object is used as the carrier between the passenger and the analyzing equipment.4 the olfactory ability of dogs is sensitive enough to detect trace amounts of many compounds, but several factors have inhibited the regular use of canines for passenger screening. Dogs trained in explosives detection can generally only work for brief periods, have significant upkeep costs, are unable to communicate the identity of the detected explosives residue, and require a human handler when performing their detection role.
5. In addition, direct contact between dogs and airline passengers raises liability concerns.

Detection of Bulk Explosives. - Direct detection of explosives concealed on passengers in bulk quantities has been another area of federal interest. Technology development efforts in this area include portal systems based on techniques such as x-ray backscatter imaging, millimeter wave energy analysis, and terahertz imaging.6 As such systems detect only bulk quantities of explosives, they would not raise “nuisance alarms” on passengers who have recently handled explosives for innocuous reasons. Some versions could simultaneously detect other threats, such as nonmetallic weapons. On the other hand, trace detection techniques are also likely to detect bulk quantities of explosives and may alert screening personnel to security concerns about a passenger who has had contact with explosives but is not actually carrying an explosive device when screened. Current deployments for passenger screening are focused on trace detection, and the remainder of this report does not discuss bulk detection. However, many of the policy issues discussed below would apply similarly to bulk detection equipment.
Policy Issues-Any strategy for deploying and operating passenger explosives detection portals must consider a number of challenges. Organizational challenges include deciding where and how detectors are used, projecting costs, and developing technical and regulatory standards. Operational challenges include maximizing passenger throughput, responding to erroneous and innocuous detections, ensuring passenger acceptance of new procedures.
Equipment Location and Use. -An important component of a deployment strategy is identifying where and how passenger explosives detection equipment will be used. Portals could be deployed widely, so that all locations benefit from them, or they could be used only at selected locations, where they can most effectively address and mitigate risk. In any given location, portals could be used as a primary screening technology for all passengers, or as a secondary screening technology for selected passengers only. Widespread deployment and use for primary screening might provide more uniform risk reduction, but would require many more portals and thus increase costs.

 Cost of Operation.- The total cost of deploying explosives detection equipment for passenger screening is unknown. According to TSA, the portal systems currently being deployed in U.S. airports cost more than $160,000 each.7 Document scanning systems are somewhat less expensive; according to a 2002 GAO study, similar tabletop systems used for screening carry-on baggage can cost from $20,000 to $65,000.8 It is possible that technology improvements or bulk purchasing could lower costs. The number of devices required would depend on throughput rates, device reliability and lifetime, and deployment strategy. The United States has more than 400 commercial passenger airports; if equally distributed, several thousand devices might be required, corresponding to a total capital cost for equipment of up to hundreds of millions of dollars. Installation and maintenance costs would be additional. Operating the equipment would require additional screening procedures and might lead to costs for additional screening personnel, or else create indirect costs by increasing passenger wait times. It is unknown whether the personnel limit for TSA screeners, currently set at 45,000 full time equivalent screeners nationwide (P.L. 108-90), could accommodate the potential additional staffing requirements.

Impact on Screening Time. -When multiplied by the large number of airline passengers each day, even small increases in screening times may be logistically prohibitive. The TSA goal for passenger wait time at airports is less than 10 minutes, and screening systems reportedly operate at a rate between 7 to 10 passengers per minute;10 additional screening that slows passenger throughput and increases passenger wait time may add to airport congestion and have a detrimental economic impact. A 1996 GAO study stated that throughput goals for portal technologies at that time were equivalent to 6 passengers per minute.11 According to the same study, non-portal technologies, such as secondary object analysis, had slightly higher throughput goals. The TSA’s pilot deployment of passenger explosives trace detection equipment will likely provide useful information on passenger throughput. If no appreciable increase in screening times occurs, then passenger explosives screening may involve few additional direct economic costs beyond those of procuring, deploying, operating, and maintaining the equipment. If passenger throughput is drastically decreased, then alternatives for passenger screening may need to be considered. In between these extremes, it may be possible to moderate the economic impact by adding screening lanes or by using explosives detection equipment only on those passengers who are selected for secondary screening, as recommended by the 9/11 Commission as a possible initial step.


Erroneous and Innocuous Detection.
A potential complication of explosives trace detection is the accuracy of detector performance. False positives, false negatives, and innocuous true positives are all challenges. If the detection system often detects the presence of an explosive when there actually is none (a false positive) then there will be a high burden in verifying results through additional procedures. Because of the large volume of air passengers, even small false positive rates may be unacceptable.
Conversely, if the system fails to detect the presence of an explosive (a false negative) then the potential consequences may be serious. Assuming the system has adequate sensitivity to detect explosives traces in an operational environment, the detection threshold or criteria required for an alarm can generally be adjusted, enabling a tradeoff between false positives and false negatives, but neither can be eliminated entirely; the appropriate balance may be a matter of debate. Innocuous true positives occur when a passenger has been in contact with explosives, but for legitimate reasons. Examples include individuals who take nitroglycerin for medical purposes or individuals in the mining or construction industry who use explosives in their work. Such passengers would be regularly subject to additional security scrutiny. Similar issues arise from the current use of trace detection equipment on some airline passenger carry-on baggage, and innocuous true positives in such cases are generally handled without incident. The impact of innocuous true positives will likely depend on their frequency and on the proportion of passengers subject to explosives trace detection.

Passenger Acceptance.
 Some passengers may have personal concerns about the addition of passenger explosives trace detection to the screening process. Issues of privacy may be raised by the connection between innocuous true positives and passenger medical status or field of employment. Also, equipment that uses a vacuum “wand” or puffs of air for sample collection may offend some passengers’ sense of propriety or modesty. Passenger reluctance could then increase screening times. Allowing alternative forms of screening, such as within privacy enclosures or through different imaging technology, might mitigate passenger concerns in some cases.

Potential for Intentional Disruption.
 Another concern is the possibility that a passenger screening regimen that includes explosives trace detection could be exploited to intentionally disrupt the operation of an airport. The dissemination of trace quantities of an explosive material on commonly touched objects within the airport might lead to many positive detections on passengers. This would make trace detection less effective or ineffective for security screening, and might disrupt airport operations generally until alternative screening procedures, such as enhanced baggage screening by TSA personnel, could be put in place or the contamination source could be identified and eliminated.

Research and Development.
The DHS and its predecessor agencies have historically been the main funders of research on explosives detection for airport use. (Most of this research has focused on detecting explosives in baggage rather than on passengers.) Several other federal agencies, however, also fund research related to trace explosives detection. These include the Departments of Energy and Justice, the National Institute for Standards and Technology, and the interagency Technical Support Working Group. Much of this research has been dedicated to overcoming technical challenges, such as increasing sensitivity and reducing the time required for sample analysis. A different research challenge is the detection of novel explosives. Detectors are generally designed to look for specific explosives, both to limit the number of false or innocuous positives and to allow a determination of which explosive has been detected. As a result, novel explosives are unlikely to be detected until identifying characteristics and reference standards have been developed and incorporated into equipment designs. Unlike imaging techniques for detecting bulk quantities of explosives, trace analysis provides no opportunity for a human operator to identify a suspicious material based on
Experience or intuition. Liquid explosives are a novel threat that has been of particular interest since August 2006, when British police disrupted a plot to bomb aircraft using liquids. The DHS is evaluating technologies to detect liquid explosives.12 Its efforts are mainly focused on bulk detection, such as scanners to test the contents of bottles. Like solid explosives, however, liquids might be found through trace detection, if the trace detection system is designed to look for them.

Characteristics: 1. Sensitivity- it is defined as the lowest amount of explosive matter a detector can detect reliably. It is expressed in terms of nano grams (ng), pico-grams (pg) or femto-grams (fg) with fg being better than pg better than ng. It can also be expressed in terms of parts per billion (ppb), parts per trillion (ppt) or parts per quadrillion (ppq). Sensitivity is important because most explosives have a very low vapor pressure and give out very little vapor. The detector with the highest sensitivity will be the best in detecting vapors of explosives reliably.
2. Light weight- Portable explosive detectors need to be as light weight as possible to allow users to not fatigue when holding them. Also, light weight detectors can easily be placed on top of robots.
3. Size-Portable explosive detectors need to be as small as possible to allow for sensing of explosives in hard to reach places like under a car or an inside a trash bin.
4. Cold start up time and analysis time - The startup time should not be a parameter for evaluation of an explosive detector. Startup time only indicates the time required by the detector to reach the optimized temperature for detection of contraband substances.
Technologies used in various explosive detectors
Ion mobility spectrometry: Explosive detection using Ion mobility spectrometry (IMS) is based on velocities of ions in a uniform electric field. There are some variant to IMS such as Ion trap mobility spectrometry (ITMS) or Non-linear dependence on Ion Mobility (NLDM) which are based on IMS principle. The sensitivity of devices using this technology is limited to pg levels. The technology also requires the ionization of sample explosives which is accomplished by a radioactive source such as Nickel-63 or Americium-241. This technology is found in most commercially available explosive detectors like the GE Vapor Tracer, Smith Sabre 4000 and Russian built MO-2M and MO-8. The presence of radioactive materials in these equipment’s cause regulatory hassles and requires special permissions at customs ports. These detectors cannot be field serviced and may pose radiation hazard to the operator if the casing of the detector cracks due to mishandling. Bi-yearly checks are mandatory on such equipment in most countries by regulating agencies to ensure that there are no radiation leaks. Disposal of these equipments is also controlled owing to the high half-life of the radioactive material used. Currently there are companies entering the market with non-radioactive ionization methods for IMS for the ETD application –to overcome the limitations mentioned above. The Bruker "DE-tector" and the Implant Sciences "QS-B220" are examples of these next generation instruments. Electrospray Ionization, Mobility Analysis (DMA) and Tandem Mass Spectrometry (MS/MS) is used by SEDET (Societal Europe de Detection) for the “Air Cargo Explosive Screener (ACES)”, targeted to aviation cargo containers currently under development in Spain. "SEDET"  is a Joint Venture created by SEADM, Morpho and CARTIF in order to develop a new generation of explosive trace detection systems.
Thermo redox-This technology is based on decomposition of explosive substance followed by the reduction of the NO2 groups. Most military grade explosives have an abundance of NO2 groups on them. Explosive vapors are pulled into an adsorber at a high rate and then pyrolized. The presence of NO2 groups in the pyrolized products is then detected. This technology has significantly more false alarms because many other harmless compounds also have an abundance of NO2 groups. For example most fertilizers have NO2 groups which are falsely identified as explosives, and the sensitivity of this technology is also fairly low. A popular detector using this technology is Scientrex EVD 3000.
Chemiluminescence- This technology is based on the luminescence of certain compounds when they attach to explosive particles. This is mostly used in non-electronic equipment such as sprays and test papers. The sensitivity is pretty low in the order of ng.
Amplifying fluorescent polymer - Amplifying fluorescent polymer (AFP) is a promising new technology and is based on synthesized polymers which bind to explosive molecules and give an amplified signal upon detection. The sensitivity is in the order of fg. Explosive trace detectors based on AFP technology are produced by FLIR Systems. The current generation, Fido X3 provides broad-band trace explosive detection and weighs less than 3 lbs.
Mass Spectrometry Recently- Mass Spectrometry (MS) has emerged as another ETD technology, in products such as the Griffin 824 by FLIR Systems. Adoption of Mass Spectrometry should lower false alarms rates often associated with ETD due to the higher resolution of the core technology. Primarily used in desktop ETD systems, Mass Spectrometry can be miniaturized for handheld ETD but at the cost of compromising much of the performance that defines the technology.

Thanks.


HMI

Touch screens ? It is a human machine interface (HMI). HMI, as its name indicates, is an interface or device that allows communication between machine and its user.
/////examples of HMI?
There are various types of HMI around us. Push button is one of the simplest types of HMI. You see them on a TV remote control, on telephone set, in an elevator, and many other locations. Mouse and keyboard are more advanced types of HMI than push buttons. These types of HMI are used to interact with electronic devices with images. When a user operates a personal computer, he moves image of the cursor in the screen with mouse, and input images of characters with keyboard. A touch screen is also this type of HMI that uses images for communications between a user and electronic device. Unlike mouse and keyboard, touch screen allows a user to interact with electronic device by directly touching images displayed on the screen.

OK, I think I grasped the idea of HMI and touch screen. I have a smartphone that I operate with my fingers. As I touch its display, the images on the display change. It is a touch screen, isn't it?
Yes, exactly. But, touch screen itself is just a transparent switch that detects touched locations. How the device reacts to your touches is controlled by software. Various input devices can be made with combination use of touch screen, display and software.
What kind of input devices can be made with touch screen? Can you give me an example?
OK. For instance, a touch screen can work as a simple push button. Image of a button switch can be displayed on screen, and the device will be programmed to be on and off upon a touch on the image. If number of the button images increase, a touch screen can be used like a keyboard. Since a touch screen can detect coordinate points, it can also function as a mouse (although it does not distinguish between right and left clicks like a mouse).
I see, a touch screen can perform the same functions as other types of HMI like push button, mouse and keyboard. But, then do we need a touch screen if it performs just the same functions as other HMI? Is there any advantage to choose a touch screen over other HMI?

Doping In Semiconductors.....


Doping is the process of adding impurities in semiconductor with the intent of modulating (changing or controlling ) its electrical properties. The impurities are dependent upon the type of semiconductor. Lightly and moderately doped semiconductors are referred to as extrinsic. A semiconductor doped to such high levels that it acts more like a conductor than a semiconductor is referred to as degenerate.

Two of the most important materials silicon can be doped with, are boron (3 valence electrons = 3-valent) and phosphorus (5 valence electrons = 5-valent). Other materials are aluminum, indium (3-valent) and arsenic, antimony (5-valent).

The dopant is integrated into the lattice structure of the semiconductor crystal, the number of outer electrons define the type of doping. Elements with 3 valence electrons are used for p-type doping, 5-valued elements for n-doping. The conductivity of a deliberately contaminated silicon crystal can be increased by a factor of 10^6.

Through the introduction of a dopant with five outer electrons, in n-doped semiconductors there is an electron in the crystal which is not bound and therefore can be moved with relatively little energy into the conduction band. Thus in n-doped semiconductors one finds a donator energy level near the conduction band edge, the band gap to overcome is very small.

Analog, through introduction of a 3-valent dopant in a semiconductor, a hole is available, which may be already occupied at low-energy by an electron from the valence band of the silicon. For p-doped semiconductors one finds an acceptor energy level near the valence band.


RF Module Pin Outs..
An RF module (radio frequency module) is a (usually) small electronic device used to transmit and/or receive radio signals between two devices. In an embedded system it is often desirable to communicate with another device wirelessly. This wireless communication may be accomplished through optical communication or through Radio Frequency (RF) communication. For many applications the medium of choice is RF since it does not require line of sight. RF communications incorporate a transmitter and/or receiver.


RF modules are most often used in medium and low volume products for consumer applications such as garage door openers, wireless alarm systems, industrial remote controls, smart sensor applications, and wireless home automation systems. They are sometimes used to replace older infrared communication designs as they have the advantage of not requiring line-of-sight operation.

Several carrier frequencies are commonly used in commercially-available RF modules, including those in the industrial, scientific and medical (ISM) radio bands such as 433.92 MHz, 315 MHz, 868 MHz, 915 MHz, and 2400 MHz These frequencies are used because of national and international regulations governing the use of radio for communication.


Power Factor...
In electrical engineering, the power factor of an AC electrical power system is defined as the ratio of the real power flowing to the load, to the apparent power in the circuit, and is a dimensionless number between -1 and 1. Real power is the capacity of the circuit for performing work in a particular time. Apparent power is the product of the current and voltage of the circuit. Due to energy stored in the load and returned to the source, or due to a non-linear load that distorts the wave shape of the current drawn from the source, the apparent power will be greater than the real power. A negative power factor occurs when the device which is normally the load generates power which then flows back towards the device which is normally considered the generator.


In an electric power system, a load with a low power factor draws more current than a load with a high power factor for the same amount of useful power transferred. The higher currents increase the energy lost in the distribution system, and require larger wires and other equipment. Because of the costs of larger equipment and wasted energy, electrical utilities will usually charge a higher cost to industrial or commercial customers where there is a low power factor.

Linear loads with low power factor (such as induction motors) can be corrected with a passive network of capacitors or inductors. Non-linear loads, such as rectifiers, distort the current drawn from the system. In such cases, active or passive power factor correction may be used to counteract the distortion and raise the power factor. The devices for correction of the power factor may be at a central substation, spread out over a distribution system, or built into power-consuming equipment.


Save A Wet Phone.....

       How To Save A Wet Phone.....
Did your smartphone got soaked in the rain ? Or did you dropped it in the toilet or sink or some other type of liquid ?

Here is how to bring it back to life :

Switch It Off Quick :
Switch off the handset immediately. Then, quickly place it on some paper towels or soft cloth. Remove the battery, the sim, memory card and gently dry those. Essentially, remove all add-on accessories, including headphones that cover ports and slots to expose them to air.

Check Your Battery Sticker :
Handset warranties do not cover water damage. To find out if the phone is water damaged, check your battery and the battery receptacle. Manufacturers place tiny stickers that are usually white, but change to pink or red on contact with moisture inside the phones.


Wipe Your Phone Thoroughly :Wipe your device thoroughly with a soft cloth. If possible , use a small vacuum cleaner to draw the water out of the phone. Be careful not to hold the vacuum too close to the device. Do not use a hair dryer.

Keep The Phone Rice :
Place your handset in a dry plastic bag or an air-tight container with a desiccant such as silica gel (often found with new shoes and electronics). You can also purchase 5 grams sachets online and from electronic stores. Keep a stash handy this monsoon. Alternatively, bury the phone in a jar or bag of uncooked rice overnight. Rice draws out the moisture.

Blow Dry :
Air is obviously helpful, but don’t leave the gadget under the fan in an open room. Also, do not use a hair dryer on it. Hot or unpurified air isn't good for your phone. Instead, hold the wet device in front of the vent of your air conditioner for a few minutes.

Wait For 24 Hours :
Wait for at least 24 hours or longer. Check that your device ports, compartments and crevices are clean and look dry. Power up the device. If your phone does not boot, remove the battery and head to your nearest service center.

Li-Fi technology

       What is Li-Fi and How It Works....
Li-Fi, or Light Fidelity, is a technology, that can be a complement of RF communication (Wi-Fi or Cellular network), or a replacement in contexts of data broadcasting. Li-Fi, like Wi-Fi, is the high speed, bidirectional and fully networked subset of visible light communications (VLC). It is wireless and uses visible light communication (instead of radio frequency waves), that is part of the Optical Wireless Communications technologies, which carries much more information, and has been proposed as a solution to the RF-bandwidth limitations.

It is a 5G visible light communication system that uses light from light-emitting diodes (LEDs) as a medium to deliver networked, mobile, high-speed communication in a similar manner as Wi-Fi. Li-Fi could lead to the Internet of Things, which is everything electronic being connected to the internet, with the LED lights on the electronics being used as Li-Fi internet access points.[4] The Li-Fi market is projected to have a compound annual growth rate of 82% from 2013 to 2018 and to be worth over $6 billion per year by 2018.
Visible light communications (VLC) works by switching bulbs on and off within nanoseconds, which is too quickly to be noticed by the human eye. Although Li-Fi bulbs would have to be kept on to transmit data, the bulbs could be dimmed to the point that they were not visible to humans and yet still functional. The light waves cannot penetrate walls which makes a much shorter range, though more secure from hacking, relative to Wi-Fi.[8][9] Direct line of sight isn't necessary for Li-Fi to transmit signal and light reflected off of the walls can achieve 70 Mbit/s.
Li-Fi has the advantage of being able to be used in electromagnetic sensitive areas such as in aircraft cabins, hospitals and nuclear power plants [citation needed] without causing electromagnetic interference. Both Wi-Fi and Li-Fi transmit data over the electromagnetic spectrum, but whereas Wi-Fi utilises radio waves, Li-Fi uses visible light. While the US Federal Communications Commission has warned of a potential spectrum crisis because Wi-Fi is close to full capacity, Li-Fi has almost no limitations on capacity.
The visible light spectrum is 10,000 times larger than the entire radio frequency spectrum. Researchers have reached data rates of over 10 Gbit/s, which is more than 250 times faster than superfast broadband. Li-Fi is expected to be ten times cheaper than Wi-Fi. Short range, low reliability and high installation costs are the potential downsides.


5G Mobile Technology

                                       5G Mobile Technology
5G technologies will change the way most high bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. The ultimate goal of 5G is to design a real wireless world that is free from obstacles of the earlier generations. This requires an integration of networks. 5G Technology stands for 5th Generation Mobile technology. 5G technology has changed the means to use cell phones within very high bandwidth. 5G is a packet switched wireless system with wide area coverage and high throughput. 5G wireless uses OFDM and millimeter wireless that enables data rate of 20 mbps and frequency band of 2-8 GHz. 5G is going to be a packed based network . The 5G communication system is envisioned as the real wireless network, capable of supporting wireless World Wide Web (wwww) applications in 2010 to 2015 time frame. There are two views of 5G systems: evolutionary and revolutionary. In the evolutionary view the 5G (or beyond 4G) systems will be capable of supporting wwww allowing a highly flexible network such as a Dynamic Adhoc Wireless Network (DAWN). In this view advanced technologies including intelligent antenna and flexible modulation are keys to optimize the adhoc wireless networks. In revolutionary view 5G systems should be an intelligent technology capable of interconnecting the entire world without limits. An example application could be a robot with built-in wireless communication with artificial intelligence. User never experienced ever before such a high value technology. The 5G technologies include all type of advanced features which makes 5G technology most powerful and in huge demand in near future. Amazing isn’t it such a huge collection of technology being integrated into a small device. The 5G technology provides the mobile phone users more features and efficiency than the 1000 lunar module. A user of mobile phone can easily hook their 5G technology gadget with laptops or tablets to acquire broadband internet connectivity. Up till now following features of the 5G technology have come to surface- High resolution is offered by 5G for extreme mobile users, it also offers bidirectional huge bandwidth.- 5G technology’s excellent quality service is based on Policy in order to evade errors.- It provides transporter class type gateway that has unequalled steadiness.- The 5G technology’s billing interface is highly advanced making it efficient and appealing.- It offers huge quantity of broadcasting data, which is in Giga Bytes, sustaining more than 60,000 connections.- This technology also provides remote diagnostic feature.- Provides up to 25 megabytes per second connectivity. Also it supports the private virtual networks.


KEY CONCEPTS OF 5G
The key concepts discussing 5G and beyond 4G wireless communications are:
1) Real wireless world with no more limitation with access and zone issues.
2) Wearable devices with AI capabilities.
3) Internet protocol version 6(IPv6), where a visiting care-of mobile IP address is assigned according to Location and connected network.
4) One unified global standard.
5) Pervasive networks providing ubiquitous computing: The user can simultaneously be connected to several wireless access technologies and seamlessly move between them These access technologies can be a 2.5G, 3G, 4G or 5G mobile networks, Wi-Fi, WPAN or any other future access technology. In 5G, the concept may be further developed into multiple concurrent data transfer paths.
6) Cognitive radio technology, also known as smart radio: allowing different radio technologies to share the same spectrum efficiently by adaptively finding unused spectrum and adapting the transmission scheme to the requirements of the technologies currently sharing the spectrum. This dynamic radio resource management is achieved in a distributed fashion, and relies on software defined radio.
7) High altitude stratospheric platform station (HAPS) systems. The radio interface of 5G communication systems is suggested in a Korean research and development program to be based on beam division multiple access (BDMA) and group cooperative relay techniques.
FEATURES OF 5G NETWORKS TECHNOLOGY

1) 5G technology offer high resolution for crazy cell phone user and bi- directional large bandwidth shaping.
2) The advanced billing interfaces of 5G technology makes it more attractive and effective.
3) 5G technology also providing subscriber supervision tools for fast action.
4) The high quality services of 5G technology based on Policy to avoid error.
5) 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000 connections.
6) 5G technology offer transporter class gateway with unparalleled consistency.
7) The traffic statistics by 5G technology makes it more accurate.
8) Through remote management offered by 5G technology a user can get better and fast solution.
9) The remote diagnostics also a great feature of 5G technology.
10) The 5G technology is providing up to 25 Mbps connectivity speed.
11) The 5G technology also support virtual private network.
12) The new 5G technology will take all delivery service out of business prospect
13) The uploading and downloading speed of 5G technology touching the peak.
14) The 5G technology network offering enhanced and available connectivity just about the world
APPLICATIONS
How could be it?
1) If you can able to feel yours kid stroke when she/he is in her mother’s wombs.
2) If you can able to charge your mobile using your own heartbeat.
3) If you can able to perceive your grandmother sugar level with your mobile.
4) If you can able to know the exact time of your child birth that too In Nano seconds.
5) If your mobile rings according to your mood.
6) If you can Vote from your mobile.
7) If you can get an alert from your mobile when some once opens your intelligent car.
8) If you can able to view your residence in your mobile when someone enters.
9) If you can able to locate your child when she/he is unfortunately missed.
10) If you can able to pay all your bills in a single payment with your mobile.
11) If you can able to sense Tsunami/earthquake before it occurs.
12) If you can able to visualize lively all planets and Universe.
13) If you can able to navigate a Train for which you are waiting.
14) If you can get the share value lively.
15) If you can lock your Laptop, car, Bike using your mobile when you forgot to do so.
16) If you’re mobile can share your work load.
17) If you’re mobile can identify the best server.
18) If you’re mobile can perform Radio resource management.
19) If your mobile can intimate you before the call drops.
20) If your mobile phone get cleaned by its own.
21) If you can able to fold your mobile as per your desire.
22) If you can able to expand your coverage using your mobile phones.
23) If you can able identify your stolen mobile with nanoseconds.
24) If you can able to access your office desktop by being at your bedroom.
.
HARDWARE AND SOFTWARE
5G HARDWARE
1) UWB Networks: higher bandwidth at low energy levels. This short-range radio technology is ideal for
Wireless personal area networks (WPANs). UWB complements existing longer range radio technologies – such as Wi-Fi,* WiMAX, and cellular wide area communications – that bring in data and communications from the outside world. UWB provides the needed cost-effective, power-efficient, high bandwidth solution for relaying data from host devices to devices in the immediate area (up to 10 meters or 30 feet).
2) Bandwidth: 4000 megabits per second, which is 400 times faster than today’s wireless networks.
3) Smart antennasa. Switched Beam Antennas: Switched Beam Antennas support radio positioning via Angle of Arrival (AOA) information collected from nearby devices. b. Adaptive Array Antennas: The use of adaptive antenna arrays is one area that shows promise for improving capacity of wireless systems and providing improved safety through position location capabilities. These arrays can be used for interference rejection through spatial _altering, position location through direction _ending measurements, and developing improved channel models through angle of arrival channel sounding measurements.
4) Multiplexing: CDMA (Code Division Multiple Access) CDMA employs analog-to-digital conversion (ADC) in combination with spread spectrum technology. Audio input is first digitized into binary elements. The frequency of the transmitted signal is then made to vary according to a defined pattern (code), so it can be intercepted only by a receiver whose frequency response is programmed with the same code, so it follows exactly along with the transmitter frequency. There are trillions of possible frequency-sequencing codes, which enhance privacy and makes cloning difficult.
 5G SOFTWARE
1) 5G will be single unified standard of different wireless networks, including wireless technologies (e.g. IEEE 802.11), LAN/WAN/ PAN and WWWW, unified IP and seamless combination of broad band.
2) Software Defined Radio, Packet layer, implementation of packets, encryption, flexibility etc. ref: www.ijsret.org 

CONCEPTS FOR 5G MOBILE NETWORKS
The 5G terminals will have software defined radios and modulation schemes as well as new error-control schemes that can be downloaded from the Internet. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. The vertical handovers should be avoided, because they are not feasible in a case when there are many technologies and many operators and service providers. In 5G, each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. Such choice will be based on open intelligent middleware in the mobile phone.
5G MOBILE NETWORK ARCHITECTURE

Below figure shows the system model that proposes design of network architecture for 5G mobile systems, which is all-IP based model for wireless and mobile networks interoperability. The system consists of a user terminal (which has a crucial role in the new architecture) and a number of independent, autonomous radio access technologies. Within each of the terminals, each of the radio access technologies is seen as the IP link to the outside Internet world. However, there should be different radio interface for each Radio Access Technology (RAT) in the mobile terminal. For an example, if we want to have access to four different RATs, we need to have four different accesses – specific interfaces in the mobile terminal, and to have all of them active at the same time, with aim to have this architecture to be functional. Applications and servers somewhere on the Internet. Routing of packets should be carried out in accordance with established policies of the user.

Power line communication implementation for DC applications

     Power line communication implementation for DC applications

Power line communication (PLC) is a communication technology that sends data over existing power cables. This technology can send both power and data between PLC nodes in a half-duplex manner. Combining power and data over the same lines allows PLC technology to eliminate the need for additional wires to interconnect devices. PLC offers a cost-effective communication media for a wide range of applications in environments that otherwise might be too expensive to network. As a communications technology, PLC can be divided into two categories: Broadband PLC is appropriate for high-speed broadband network connections such as to the Internet. It generally operates at higher frequencies (1.8–250 MHz), high data rates (up to 100s of Mbps) and is used in shorter-range applications. Narrowband PLC is useful for applications requiring narrowband control or low-bandwidth data collection where low cost and high reliability are essential. It generally operates at lower frequencies (3–500 kHz), lower data rates (up to 100s of kbps), and has longer range (up to several kilometres), which can be extended using repeaters. Depending upon the underlying power line characteristic, PLC can be further classified as PLC over AC power lines and PLC over DC power lines. Many utilities around the world have chosen narrowband PLC over AC lines for their smart grid projects. By monitoring electricity usage based on time of day and even by device or application, utility companies can provide pricing structures that give consumers incentives to adjust their energy consumption, thus reducing peak-load and avoiding the need to construct new power plants. The popularity of PLC adoption in smart grid applications has led to significant focus on PLC over AC power lines. However, narrowband PLC over DC lines is also gaining ground in home networking, lighting and solar applications as well as in transportation vehicles (electronic controls in air planes, auto mobiles and trains). The use of PLC in these applications reduces wiring complexity, weight, and ultimately cost of communications. In this article we focus on the use of PLC over DC power lines and present a reference design that can help customers adopt PLC over DC power lines quickly and effectively. One common question asked by system integrators is how to compare PLC over DC versus low-power wireless technology. While both PLC over DC and low-power wireless do not require new wire installation, with PLC, the connection is maintained even underground, through walls, and around corners. The communication channel is owned by the operator or utility, so the risks of sharing bandwidth are eliminated. PLC has no line-of-sight limitation and is not affected by weather.


How to Make a Call using Keyboard, GSM Module and Arduino

The mobile phones have built –in GSM module which enables them to connect with any cellular network around the globe. The GSM stands for Global System for Mobile communications. In certain applications the microcontroller based systems has to be connected with the GSM network which will enable a user to control the system by sending messages or making a call. The systems can also send messages to the user to alert or inform about the status of the system running. In all such cases a separate GSM module is used rather than using the mobile phones.
There are GSM modules available which can do serial communication with microcontroller based systems. The communication is done by sending or receiving AT commands with the GSM module. This particular project demonstrates how to interface a GSM module and dial a call using the standard PS2 keyboard with the help of an Arduino board.
The PS2 keyboard can send the equivalent ASCII value of the key which has been pressed to a host device into which it is connected to. The PS2 Keyboard also uses a simple synchronous serial protocol called PS2 using only two wires for communication. Due to their simplicity in interfacing the PS2 keyboards and GSM modules are widely used with simple microcontroller based boards. 


How to Interface GPS with Arduino


Every single location in the entire globe can be specified in terms of geographical coordinates. The geographical coordinate is a system which specifies any given location on the earth surface as latitude and longitude. There are devices which can read the geographical coordinates of a place with the help of the signals received from a number of satellites orbiting the earth. The system of satellites which helps in the positioning of a place is called Global Positioning System (GPS). The devices which can read the geographical coordinates of a place with the help of at least four GPS satellites are called GPS Receiver or simply GPS module.

The GPS module continuously produces a set of data regarding the position of the earth surface where it is situated which includes the current position with respect to the equator of the earth in terms of Latitude and Longitude. This data can be decoded and printed into the readable format with the help of a microcontroller only. In this project the data regarding the geographical coordinate is extracted from the GPS output with the help of the Arduino. The Arduino can be used as a stand-alone board of which the output or inputs can be taken from the boards or given to the board. They can communicate using standard communication ports like USART, TWI, SPI etc. which enables them to be connected with various kinds of devices. The Arduino board is designed for easy prototyping and the IDE used for coding is very simple and provides so many libraries for interfacing with common external devices.

Railway tracking System

      Research on Rail Safety Security System
This paper analysis of  the integrated use of safety monitoring with the domestic and international latest research on rail safety protection system, and focus on the implementation of an organic whole system, with the monitoring and early warning, risk assessment, predictive control and emergency rescue system. The system framework, contents and system structure of Security system is proposed completely. It’s pointed out that the Security system is a negative feedback system composed of by safety monitoring and warning system, risk assessment and emergency rescue system. Safety monitoring and warning system focus on the monitoring target monitoring, early warning, tracking, integration of decision-making, for objective and subjective risks factors. Risk assessment system analysis the occurrence of a major Security risk mechanism, determines the standard of the future short, medium and long term safety conditions, and give prop for development of safety indicators, accident analysis and safety standards. Emergency rescue system is with the goal of rapid and effective rescue work for accident, to minimize casualties and property losses.
Along with the transportation develops towards high-speed, high-density, over loading, technique concentrated, complex of the technique systemic constitute, and the high linkage between business system, the safety Security work will face exceptional severe challenge. The objects related to safety Security consist of natural disasters, foundation devices and emergencies. Any local damage and un-control may evolve to a global damage and un-control during the subway is in motion and do business. However, now the question of safety Security system is that the apply and analysis on information of safety monitoring is on start-up period, the whole benefit of prediction control and emergency rescue by monitor data has not yet been fully developed, the primary cause of the problem is lack of systemic rail transportation Security and technology criterion which is adaptive to the system and possess the industry characteristic. Following the development of the system on safety monitoring and early warming, it will accumulate a mass of Security monitoring data. If the data is effectively fusion, storage, and synthetically applied, the Co-relational research on rail transportation safety Security system is becoming highly valued step by step in recent years. Research on the theory and technology of rail transportation safety Security has bear fruit according to the literatures. Literature [1] described the depart control of rail transportation operating system and presented the optimal strategy and realize of depart intelligent decision support system based on Petri net. Literature [2] formally modeled definition, design and realization of the self-check function in automatic driving control software. Literature [3] had researched the analysis and design of the train strategic decision supporting system by using the method facing objects. Literature [4] optimized the train’s initiative driving by using linear quadratic Gaussian (LQG) method and hereditary algorithm. Literature [5] presented and brought out the distributed strategy decision supporting system of the train station and train control along the line. Literature [6] researched the optimized operation of the train based on the neural networks. All of these achievements paved the path to build and improve the rail intelligent train control system and rail transportation scourges prevention facing the safety Security. It also invested abundant of labour power and financial resources to keep away and control the scourges, thereby the whole scourge early warning and monitor political system is formed. The system of scourge early warming used scientific early warming methods, gathered every kind of external data leading to scourge, advanced early warming to scourges such as flooded line and collapsed line, carried out responding scourge warming, formulated travelling regulation under scourges, which prevented the accidents of scourge and Security transportation safety. Scourge monitoring system directly monitored the scourges which are difficultly predicted, such as rolling stones, collapse, broken bridges, which ensured the running train can stop in time and transferred the information to any departments. The system frame of American rail traffic intelligent transportation system, which named IRS, contained system frame of proactive train controlling system, which can be used to control train safety, reliable, punctual, effective operating, and by avoiding train colliding, decreasing the negligence of rail road workers, reducing facilities broken and over speed accidents. The standard current situation of international standardization institution and each country safety Security system concerning is:
UTC (Union International des Chemise defers, International Union of railways), UTC is the biggest international standardization institution of the world rail transportation. This organization is a non-government international rail transportation institute, which is subject of European rail transportation, and China is one member country in it. A set of standardizations related to safety Security system quickly developed for it. (2) ISO, ISO related to the rail transportation standard is the 45 item-rail transportation projects. Although now the part of ISO rail transportation is emphasized on project material, but these standards are closely interrelated to transportation safety. (3) IEEE (Institute of Electrical and Electronics Engineers), IEEE standardization committee is responsible for the survey, impel, management of IEEE standard, pondering and proposing IEEE standard. For the past few years, IEEE standardization committee is very active in standardization research part of rail transportation information and control, closely follow after releasing many standards in this region, and some parts is related to transportation safety [7]. (4) ERRI (ERRI European Rail Research Institute)ERRI is under the lead of UIC and it is a rail technical research institute which gathers rail traffic engineers in every country. Meanwhile, along with the typical RITS system-ERTMS continually deepens, ERRI plays a decisive role in the forming of the world rail traffic standard. (5) JIS, section E in JIS standard object is directly related to rail transportation, including line general standard, locomotive signal, signal servicing installation, rail traffic vehicle general standard , high-speed train , passenger and freight vehicle, tight wire railway standard. JIS present standardization strategy of the same.
 Rail traffic safety system is composed of three parts: the safety monitoring and early warning system, risk assessment system and emergency rescue system. Emergency rescue system is centre, safety monitoring and early warning and risk assessment system is the means. In this system, safety monitoring warning system is controller and transportation safety factors is the object; the input is a closed-loop system of emergency rescue level. Among them, safety factors are generalized concepts, including not only individual subjective and objective factors which lead to the danger, but also the relationship between factors and combination Safety monitoring and early warning system Rail traffic safety monitoring and early warning system is aiming at subjective and hidden danger factors. Monitoring network is composed by monitoring stations, and observing monitoring target, tracking, early warning, recognizing, monitoring and reporting the development state. The monitoring content is composed of operation action of person in key position, the running condition of vehicle, the vehicle loading condition and infrastructure condition; transportation safety synthetically monitoring information base is formed by information fusion, providing timely information to prevention, predicting of hidden danger and emergency rescue. Safety monitoring and early warning system uses distributed network monitoring stations to monitor, track the safety station of targets. The key technology of rail traffic safety monitoring and early warning system is system interface. System interface contains not only integration technology of site safety monitoring system, but also information exchange technology of safety subsystems interconnection or integration. The contents include the classification of the interface, form of structure and realization. According to the technical content and layer of structure, system interface is divided into: system interface and monitoring level interface. System interface: system interface refers to the safety monitoring system and the interface of each safety subsystem. System interface integrates and plans subsystem information base on the aspects of system interconnection, part function, characteristic and structure, builds uniform standard information storage structure, organization structure, circulation mechanism, Monitoring level interface: monitoring level is that safety subsystem interface processes the data collection and forms standardized interface. Monitoring level interface is related to their own function features of safety device. ii. Early warning decision-making of monitoring network the same major safety monitoring system in monitoring network which deployed at the site is independence. Because of the monitoring results are influenced by many random factors, the single point estimation judgement may not be necessarily accurate in monitoring and warning, which means false alarm and leakage alarm(false alarm is that target under monitoring system is out of action, but it actual trouble-free. False alarm rate is in a period, the number of fault alarm displaying contrast to the total alarm displaying). Therefore, the result of judgement will objective, when the monitoring network stations increase a participant of fusion judgement node, judge monitoring system become integrated, the participants with the determination results objectively.
The monitoring network system containing several stations and a decision fusion monitoring network system can be divided into two kinds of structure ,a kind of monitoring and early warning decision-making model which composes by many stations and a fusion centre, called MDOF model.

CONCLUSION:

The paper based on analysing and summarizing co-relational research results of rail traffic safety Security, and it presents systematically the traffic safety Security system which should be served as a unity including safety monitoring and early warning system, risk evaluation system and emergency rescuing system. It realizes information fusion, information sharing and technical standardization. In the paper, rail traffic safety management system and Security management system is proposed and founded to adapt to the new features nowadays. After minutely stating the detailed technical frame design of safety monitoring and early warning system, risk evaluation system and emergency rescuing system, the paper integrally presents the system frame, research contents and system constitute of safety Security system. Synthetic safety Security system can develop synthetically monitoring, forecasting, early warning, disaster prevention and rescuing strategy service function, make that it can cohere with the work of some department, such as safety operating, infrastructure maintenance, quick emergency, and give full play to the function of Security safety devices and safety monitoring system.

CURRENT SENSOR

High-wattage appliances like electric irons, ovens and heaters result in unnecessary power loss if left ‘on’ for hours unnoticed. Here is a circuit that senses the flow of current through the appliances and gives audible beeps every fifteen minutes to remind you of power-’on’ status. This is a non-contact version of current monitor and can sense the flow of current in high-current appliances from a distance of up to 30 cm .It uses transistors in the input to provide very a standard step-down transformer (0- 9V, 500mA) as the current sensor. Its secondary winding is left open, while the primary winding ends are used to detect the current. The primary ends of the transformer are connected to a full-wave bridge rectifier comprising diodes D1 through D4. The rectified output is connected to the non-inverting input of IC CA3140 (IC1). IC CA3140 is a 4.5MHz BIMOS operational amplifier with MOSFET input and bipolar transistor output. It has gate-protected MOSFET (PMOS) transistors in the input to provide very high input impedance (1.5 T-ohms), very low input current (10 pA) and high-speed switching performance. The inverting input of IC1 is preset with VR1. In the standby mode, the primary of the transformer accepts e.m.f. from the instrument or surrounding atmosphere, which results in low-voltage input to IC1. This low voltage at the non-inverting input keeps the output of IC1 low. Thus transistor T1 doesn’t conduct and pin 12 of IC2 goes high to disable IC2. As a result, the remaining part of the cir gets inactivated. When a high-current appliance is switched on, there will be a current drain in the primary of the transformer to the negative rail due to an increase in the e.m.f. caused by the flow of current through the appliance. This results in voltage rise at the non-inverting input and the output of IC1 becomes high. This high output drives transistor T1 into conduction and the reset pin of IC2 becomes low, which enables IC2. IC CD4060 (IC2) is a 14-stage ripple counter. It is used as a 15-minute timer by feeding Q9 output to the piezo buzzer for aural alarm through the intermediate circuitry. Resistors R5 and R6 along with capacitor C1 maintain the oscillations in IC2 as indicated by blinking LED1. The high output from IC2 is used to activate a simple oscillator comprising transistors T2 and T3, resistors R8 and R10, and capacitor C2. When the Q9 output of IC2 becomes high, zener diode ZD1 provides 3.1 volts to the base of transitor T2. Since transistor T2 is biased by a high value resistor (R8), it will not conduct immediately. Capacitor C2 slowly charges and when the voltage at the base of T2 increases above 0.6 volt, it conducts. When T2 conducts, the base of T3 turns low and it also conducts. The piezo buzzer connected to the collector of T3 gives a short beep as capacitor C2 discharges. This sequence of IC2 output at Q9 becoming high and conduction of transistors T2 and T3 resulting in beep sound repeats at short intervals.

REMOTE OPERATED DOMESTIC APPLIANCES CONTROL BY ANDROID APPLICATION

The project is designed to operate electrical loads using an Android application device.  The system operates electrical loads depending on the data transmitted from the Android application device. Operating conventional wall switches is difficult for elderly or physically handicapped people. This proposed system solves the problem by integrating house hold appliances to a control unit that can be operated by an Android smart-phone/Tablet etc.
Remote operation is achieved by any smart-phone/Tablet etc., with Android OS, upon a GUI (Graphical User Interface) based touch screen operation, interfaced to the microcontroller of 8051 family. The program on the microcontroller serially communicates with Bluetooth device to generate respective output based on the input data (sent from Android application device) to operate a set of relays through a relay driver IC. The loads are interfaced to the control unit through the relays. The system can be used in existing domestic area for either operating the loads through conventional switches.
The power supply consists of a step down transformer 230/12V, which steps down the voltage to 12V AC. This is converted to DC using a Bridge rectifier. The ripples are removed using a capacitive filter and it is then regulated to +5V using a voltage regulator 7805 which is required for the operation of the microcontroller and other components.

RF BASED HOME AUTOMATION SYSTEM

The main objective of this project is to develop a home automation system with a RF controlled remote. As technology is advancing so houses are also getting smarter. Modern houses are gradually shifting from conventional switches to centralized control system, involving RF controlled switches. Presently, conventional wall switches located in different parts of the house makes it difficult for the user to go near them to operate. Even more it becomes more difficult for the elderly or physically handicapped people to do so. Remote controlled home automation system provides a simpler solution with RF technology.

In order to achieve this, a RF remote is interfaced to the microcontroller on transmitter side which sends ON/OFF commands to the receiver where loads are connected. By operating the specified remote switch on the transmitter, the loads can be turned ON/OFF remotely through wireless technology. The microcontroller used here is of 8051 family. The loads are interfaced to the microcontroller using opto-isolators and triacs.