System Circuit Diagram.

System Circuit Diagram.

Source publication
Conference Paper
Full-text available
One of the prominent transport system in Bangladesh is rivers and seas. Vessel overloading is found in Bangladesh as the main cause of accidents on the rivers and seas. Therefore, there must be a role to play in ensuring passenger safety on the vessels. In Bangladesh, the researchers are more focusing on the data collection related to vessel overlo...

Context in source publication

Context 1
... Location Detection Module (LDM). 2. Overweight Detection Module (ODM) and 3. Notification Module (NM) Figure 3 shows the overall circuit diagram of our proposed passenger vessel safety system consists of Location Detection Module (LDM), Overweight Detection Module (ODM) and Notification Module (NM). In the location detection module (LDM) it will always track the current location of the vessel for monitoring. ...

Citations

... The papers reviewed include elaborate discussions on technological applications for improved waterway navigation. Shamrat et al. 3 target to solve the problem of overweight in passenger vessels (one of the main reasons behind accidents) by using various sensors and micro-controllers, embedded in the vessels. Several well-qualified technical systems like Inmarsat C, AIS (Automatic Identification System), and GSM (Global System for Mobile Communication) are investigated while keeping in mind their coverage area, cost, reliability, etc. based on some field analysis of its prototype subsystems. ...
Article
Full-text available
In the twenty-first century, maritime routes are crucial for geographical and financial reasons in riverine countries. Compared to the available technology abroad, Bangladesh has insufficient monitoring of water vessels to tackle any possible disaster, such as vessel collisions for inland water transportation. One of the frequent outcomes of this architecture is regular capsizing, which sometimes leads to loss of lives. These accidents bear physical and economic costs, which are detrimental for a third-world country like Bangladesh. Considering this important issue, we attempted to develop an effective system to make river travel safe. In this study, our focus was on Bangladesh’s inland waterway transportation, particularly at night. We proposed a system with the help of laser technology that tracks both the host ship and its surrounding vessels and provides real-time tracking positions. Cameras are used to monitor the vessel’s movement. The diameter of the laser sphere is the primary source of data to work on for our proposed model, which is annotated using image processing. The control room will monitor data in the real-time setup, and data will be updated automatically. This proposal was presented through modeling and simulation based on laser detection and identification.
... The RX, TX and GPIO 0 pins must be disconnected after transferring the program. Secondly, established the connection between the ESP8266 Wi-Fi module and Arduino [29]- [31]. The RX pin of ESP8266 will be connected to TX pin 8 of Arduino and The TX pin of ESP8266 will be connected to RX pin 9 of Arduino which is defined in the code. ...
Article
Full-text available
span>In Bangladesh’s rural regions, almost 30% of the population lives in poverty. Rural residents also have restricted access to nursing and diagnostic services due to obsolete healthcare infrastructure. Consequently, as cardiac failure occurs, they usually fail to call the services and adopt the facilities. The internet of things (IoT) offers a massive advantage in addressing cardiac problems. This study proposed a smart IoT-based electrocardiogram (ECG) monitoring system for heart patients. The system is divided into several parts: ECG sensing network (data acquisition), IoT cloud (data transmission), result analysis (data prediction) and monetization. P, Q, R, S, and T are ECG signal properties fetched, pre-processed, analyzed and predicted to age level for future health management. ECG data are saved in the cloud and accessible via message queuing telemetry transport (MQTT) and hypertext transfer protocol (HTTP) servers. The linear regression method is utilized to determine the impact of electrocardiogram signal characteristics and error rate. The prediction was made to see how much variation there was in PQRST regularity and its sufficiency to be utilized in an ECG monitoring device. Recognizing the quality parameter values, acceptable outcomes are achieved. The proposed system will diminish future medical costs and difficulties for heart patients.</span
... Gas leakage is unavoidable in pipeline gas transfer since joints and other transmission components are needed. Gas leakage can be overlooked up to a particular mass stage, so lifting an alert must be lifted once it exceeds specific threshold values [12]. The issue was primarily found in the home for irresponsible. ...
... Usually micro-concrete model is used to simulate normal concrete structure during earthquake simulation test [8][9][10][11][12][13]. In this research, similitude laws are used to predict the nonlinear seismic response of prototype structures. ...
Research
Full-text available
Now-a-days frequently occurred earthquake has raised cautionary signals in Bangladesh about the possible, colossal earthquake in the near future, whose impact can be devastating. In this paper the main objective is to investigate the seismic response and also the failure mode of the various models, since the column is that the most critical part of the structural elements, column type models are chosen. Another purpose is to assess the suitability of various retrofit measures to enhance structural strength. Sixteen concrete column models without and with three kinds of confinement i.e; wire mesh, tape and Fiber Reinforced Polymer (FRP) are tested to investigate their seismic behavior. Model to prototype ratio 1:3.68 is maintained, to match the ratio of the earthquake ground motion of the shake table which was calibrated from the EI Centro earthquake (1940) ground data. Experimental results from the shake table show that the confined structural models have greater capacity in terms of strength and ductility than the unconfined structural models. FRP confined models show better seismic resistance capacity among all the models. Comparisons between experimental and numerical results show outstanding agreement in terms of maximum displacement of structural models.
... For the present culture, new technology is a great blessing [31][32][33][34]. In every aspect of our lives, we see the application of new technologies [35][36]. Without science and technology, we cannot conceive about our daily life. ...
Conference Paper
Full-text available
One such complicated and exciting problem in computer vision and pattern recognition is identification using face biometrics. One such application of biometrics, used in video inspection, biometric authentica-tion, surveillance, and so on, is facial recognition. Many techniques for detecting facial biometrics have been studied in the past three years. However , considerations such as shifting lighting, landscape, nose being farther from the camera, background being farther from the camera creating blurring, and noise present render previous approaches bad. To solve these problems, numerous works with sufficient clarification on this research subject have been introduced in this paper. This paper analyzes the multiple methods researchers use in their numerous researches to solve different types of problems faced during facial recognition. A new technique is implemented to investigate the feature space to the abstract component subset. Principle Component Analysis (PCA) is used to analyze the features and use Speed up Robust Features (SURF) technique Eigenfaces, identification, and matching is done respectively. Thus, we get improved accuracy and almost similar recognition rate from the acquired research results based on the facial image dataset, which has been taken from the ORL database.
... If we should send a new picture as knowledge again, the means are played out again and we create a new histogram with database photographs. But we have to examine two histograms to find the coordination image [13][14][15][16]. ...
Conference Paper
Full-text available
Human face recognition is distinguished by a method of identifying facts or confirmation that tests personality. The technique essentially relies on two stages, one is face identification, and another is face recognition. Facial recognition applies to a PC device with a few implementations in which human faces can be identified in pictures. Usually, facial identification is achieved by using 'right' data from full-frontal facial photographs. While there are, as a general rule, sufficient situations where full frontal faces will not be available, a valid example is the blemished faces that come from CCTV cameras. Subsequently, the use of fractional facial data as tests is still, to a large extent, an unexplored field of research on the PC-based face recognition problem. In this research, through using incomplete facial evidence, we concentrate on face recognition. By implementing critical analysis to evaluate the presentation of AI using the Haar Cascade Clas-sifier, we proposed and built our framework. Three phases of the proposed face detection method involve the Face Data Gathering (FDG) process, Train the Stored Image (TSI) phase, Face Recognition using the Local (FRUL) Binary Patterns Histograms (LBPH) algorithm, and this classifier computation was tested by splitting it into four phases. In this analysis, to complete the detection phase, we apply Haar feature selection, generating an integral image, Adaboost preparing, Cascading Classifiers. To complete this venture's human protection facial recognition framework with face detection, we used Local Binary Patterns Histograms (LBPH) estimate. In LBPH, a few parameters are used and a dataset is obtained by implementing an algorithm. By adding the LBPH operation and extracting the histograms, I got the Final computational part. "Image Processing Based Human Face Recognition Using Haar Cascade Classifier" Image Processing Based Human Face Recognition Using Haar Cascade Classifier
... This is shown in a tabular format below. [21][22][23][24]. Each algorithm is designed to address the problems in the dataset and make sure they do not affect the outcome of the algorithm. ...
Chapter
Full-text available
Data is the most valuable resource in the present. Classifying the data and using the classified data to make a decision holds the highest priority. Computers are trained to manage the data automatically using machine learning algorithms and making judgments as outputs. Several data mining algorithms can be obtained for Artificial Neural Network classification, Nearest Neighbor Law & Baysen classifiers, but the decision tree mining is most commonly used. Data can be classified easily using the decision tree classification learning process. It's trained on a training dataset and then implemented on a test set from which a result is expected. There are three decision trees (ID3 C4.5 and CART) that are extensively used. The algorithms are all based on Hut's algorithm. This paper focuses on the difference between the working processes, significance, and accuracy of the three (ID3 C4.5 and CART) algorithms. Comparative analysis among the algorithms is illustrated as well.
... It is seen that the location execution and precision can be improved extraordinarily utilizing enormous scope preparing information [15][16][17][18][19][20][21][22]. This implies contrasting various calculations we need to utilize similar preparing information. ...
Conference Paper
Full-text available
This paper intends to evaluate previous works done on different cascading classifiers for human face detection of image data. The paper includes the working process, efficiency, and performance comparison of different cascading methods. These methods are Dynamic Cascade, Haar Cascade, SURF cascade, and Fea-Accu Cascade. Each Cascade classifier is described in the paper with their working procedure and mathematical induction as well. Each technique is backed with proper data and examples. The accuracy rate of the method is given with comparison to analyze the performance of the methods. In this literature, the human face detection process using cascading classifiers from image data is studied. From the study, the performance rate and comparison of different cascading techniques are highlighted. This study will also help to determine which methods are to be used for achieving an accurate accuracy depending on the data and circumstances.
... In this section,basically different papers are discussed with their method,pros and cons of detecting DOS attacks on wireless sensor [1][2][3][4][5] networks. In [6] and [7], Denial of Service Attacks are categorized . ...
Article
Full-text available
Wireless sensor networks are the new emerging technologies that are the combination of wireless devices, small, effective sensors and special embedded system design with them. Basically WSN gathers data from very sensitive and harsh environments. Then after processing,they transmit all the information to base station or user application for their further use. But in their design,there is some design constraints like less memory,power or less secured system. For this they have faced lots of attacks. Denial of service (DOS) is one of the most crucial of them which attacks the whole network system on each layer separately and makes the whole network paralysed and jeopardized. In this review paper, all the attacks of DOS are discussed and their countermeasures are also discussed here attack wise. Introduction: Wireless sensor networks are getting much attention and popularity day by day because of its vast application on different parts of human life. It is basically making life easier by getting the updated information from its combination of wireless technology, tiny sensors and embedded systems and devices. WSN can work in any environment like rain , sunlight, cold breeze and also in harsh environment. So it also has to face some attack on it. Denial of service (DOS) is one of those attacks. Because of its design constraints , it is much weaker against those attacks. So in order to get the proper feedback from the sensor nodes of WSN proper counter measures should be taken against those attacks. Wireless sensor networks are basically a sensory system which sense the different parts of environment and gather needed information. It is used in different sectors like monitoring of traffics, to diagnosis of healthcare problems, nuclear plantation, military network communication,weather update and information collection, ensuring security of a system etc. Wireless sensor networks must deliver security, integrity and correct output. But because of low power consumption, their tiny body structure and limitations of memory, DOS attack easily takes place and security vulnerability increases. Wireless sensor networks are much easier to implement in any situation and environment ,it is also very cost effective super fast than any other sensory device. tacks .
... The proposed system contains three sensors that measure the air temperature, seed water level, and soil moisture level [17]. The smart agriculture management device supplies air and water to the crop based on monitoring these sensor values. ...