Thursday, August 15, 2019

Remote Operated Spy Robot Vehicle

Remote operated spy robot vehicle can be controlled by using a wireless remote controller. It can capture audio and video information from the surroundings and can be sent to a remote station through RF signals. The maximum range is 125meters. It overcomes the limited range of infrared remote controllers. HT12e encoder, HT12d decoder, RF433MHz transmitter and receiver modules are used for the spy robot and the remote control. H Bridge circuits are used to drive two 12V motors. By pressing any key in remote controller, the HT12e encoder generates 8 address bit and 4 data bit. The RF module transmitter sent them and RF module receiver receives. And then HT12d decoder decodes the data and generates the output signals to control the L293D motor driver which then rotates the motors and wheels of spy robot vehicle. In this research, DC power supply is taken from the battery placed on the robot. The camera is placed on spy robot. Its audio and video output signals are directly sends from a SIM router. These information are received and caught to a phone, PC or TV in the remote station through internet. 

by Khine Myint Mon | Lei Lei Hnin | Aye Sandar Aung | Ye Mann Aung "Remote Operated Spy Robot Vehicle"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5, August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd26801.pdf 

Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26801/remote-operated-spy-robot-vehicle/khine-myint-mon

call for paper Automotive Engineering, international journal Electrical Engineering, ugc approved journals for engineering

Handwritten Signature Verification System using Sobel Operator and KNN Classifier

Signature is one of the most widely accepted personal attributes for identity verification. Signature verification is a scheme to verify cheque for bank security. So, this system is proposed as the off line handwritten signature verification system for the bank cheque image processing. In any offline signature verification system, feature extraction stage is the most vital and difficult stage. In this system, sobel gradient operator is used to extract signature features. After extracting features, this system performs the verification process by using k nearest neighbor KNN classifier. This system supports the security about the bank processing by verifying user signature from the bank cheque. 

by Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "Handwritten Signature Verification System using Sobel Operator and KNN Classifier"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5, August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd27825.pdf 

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/27825/handwritten-signature-verification-system-using-sobel-operator-and-knn-classifier/soe-moe-myint

call for paper Gas Engineering, international journal Geological Engineering, ugc approved journals for engineering

Coin Acceptor Based Vending Machine using Microcontroller

This paper investigates based on coin acceptor vending machine using microcontroller system. Technology has become a part of the different aspects of peoples' lives as it makes most of their work faster and easier. One of the fast paced technologies is the vending machine. It is a machine that dispenses automatically, products such as beverages, tickets, snacks, etc., by inserting currency or credit to the machine. Vending machines appear in different forms and functions. These are generally used in public and private areas such as malls, markets, business and government offices, schools and along the streets. This paper proposes the design of Arduino based automatic vending machine. The main objective of this paper is to launch new technology application in society. In this proposed system, Arduino Mega board, Liquid Crystal Display LCD, coil acceptor, servo motor, stepper motor and push button are used. The rectifier circuit is used for power supply and step down DC to DC module is used to reduce the rectifier output voltage 12V to 5V. Mega is mainly used to run the program for the vending machine. LCD is used for showing the information, for inserting coil and making a selection. The user can choose the product by touching the related button. Four push button are used to choose four different types of product. For the servo motor, it is used for the dropping of the product. 

by Hay Man Oo | Khin Thandar Tun | Su Mon Aung "Coin Acceptor Based Vending Machine using Microcontroller"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5, August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd28003.pdf 

Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/28003/coin-acceptor-based-vending-machine-using-microcontroller/hay-man-oo

call for paper Biomedical Engineering, international journal Nanotechnology, ugc approved journals for engineering

Andriod Controlled Pick and Place Arm with Line Follower Automaton

Manufacturing automaton is widely used in small and medium plants, however, automaton cooperating with other devices is an important aspect for achieving the fully autonomous system. This paper presents the Pick and Place Robot with Line Follower Function for manufacturing application. Model of pick and place robot which will be functioned following a specific line may benefit production to reduce the labor cost or maybe alternatives of the labors. This system has a line follower and pick and place function that is controlled by Andriod with Arduino. 

by Lwin Lwin Htay | Nyan Phyo Aung | Mo Mo Myint Wai "Andriod Controlled Pick and Place Arm with Line Follower Automaton"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd26407.pdf 

Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26407/andriod-controlled-pick-and-place-arm-with-line-follower-automaton/lwin-lwin-htay

call for paper Chemical Engineering, international journal Food Engineering, ugc approved journals for engineering

Wednesday, August 14, 2019

Design Calculation of 1200W Horizontal Axis Wind Turbine Blade for Rural Applications

This paper provides to design 1200W horizontal axis wind turbine blade for rural application. The rotor blade is design to produce 1200W power output in order to install at Mandalay Hill of Mandalay City in Myanmar at rated wind velocity 7 m s. The rotor diameter is 2.303m and tip speed ratio is 5. The design process includes the determination of the blade airfoil, pitch angle and chord length distribution along the blade span. By using blade element theory, blade is divided into 10 elements with equal length forming 11 sections throughout the blade. This paper is intended for commercial wind turbine in rural applications. The wind generator can produce 1200W at wind velocity 7 m s. The use of wind energy for electricity is more economical than the conventional electricity generation. It is strongly recommended that the design prototype is economic and competitive for commercialization at any windy places in Myanmar. 

by Zin Mar Chan "Design Calculation of 1200W Horizontal Axis Wind Turbine Blade for Rural Applications"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd25328.pdf 

Paper URL: https://www.ijtsrd.com/engineering/mechanical-engineering/25328/design-calculation-of-1200w-horizontal-axis-wind-turbine-blade-for-rural-applications/zin-mar-chan

call for paper Mechanical Engineering, international journal Structural Engineering, ugc approved journals for engineering

Technical Data Management from the Perspective of Identification and Traceability in the Manufacturing Industry

In a Manufacturing Industry, be it of any scale, the entity of utmost importance is the technical data. As the quantum of the generation of such necessary data is large, it paves the way to the need of establishing a data management tool such that would aid ease of access and clarity of thought. Such a tool may be in the form of software or in the form of a set personal routine or procedure that is sincerely adhered to. Technical data literally forms the backbone of the Industrys progress. Just like the nervous system is highly dependent on the well being of the backbone, almost all the departments in an Industry are highly reliant on the Technical Data Pool available. This paper highlights the importance of Technical data management from the key perspective of identification wherein a document can be easily identified and traceability wherein the document can be quickly traced for the origin as well as the locations where it is currently used. Certain recommendations shall be appended for a reference towards improved functioning of various departments in the Manufacturing Industry. A conclusion shall thereafter be drawn highlighting the utility and importance of Technical Data Management. 

by Gourav Vivek Kulkarni "Technical Data Management from the Perspective of Identification and Traceability in the Manufacturing Industry"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd26389.pdf 

Paper URL: https://www.ijtsrd.com/engineering/mechanical-engineering/26389/technical-data-management-from-the-perspective-of-identification-and-traceability-in-the-manufacturing-industry/gourav-vivek-kulkarni

call for paper Environment Engineering, international journal Industrial Engineering, ugc approved journals for engineering

Performance Comparison of File Security System using TEA and Blowfish Algorithms

With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blow fish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. 

by Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdf 

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu

call for paper Chassis Engineering, international journal Electrical Engineering, ugc approved journals for engineering