Saturday, January 25, 2020

Control on Remote Sensing Network Using Cloud Computing

Control on Remote Sensing Network Using Cloud Computing CHAPTER 3 SYSTEM REQUIREMENTS The system requirements usually specify the needs of the system to accomplish the project successfully and the requirements can be classified as software and hardware requirements and hence the requirement specification of this project is as mentioned below. 3.1 Software Requirements Express PCB and express schematic Keil micro-vision 3 real view IDE Flash utility software for programming Embedded C JDK Visual studio 2010 Windows XP Hardware Requirements Microcontrollers ARM 7 ZigBee Modules Temperature, humidity, motion sensors LCD Display Power supply 12V i.e. 1A Relays 3.3 Functional requirements The functional requirements can be defined as the services that a developed system will provide to the user Administrative functions An individual sensor node will check the availability, Else the status of the devices will be 0, if availability is present, then the data is forwarded to the monitoring station Then the device status can be seen and control measures can be taken, to save the power and utilize it in an efficient way. Authorization levels The authorized user of the cloud drop box can access the data in the cloud to know the status of the house hold equipments. 3.4 Non-functional requirements Non functional requirements define the frame work within which the system should work. Scalability The controlling and monitoring of the devices can be extended to, many other devices apart from house hold equipments, like vehicles and security systems etc. Availability The availability of the devices purely works on the internet connection i.e. one can know the status of the devices in the house with the availability of the internet. 3.5 Technologies Used A. Cloud computing technology Cloud computing is a technology that is upgrading day by day and today many of the technologies have their own architecture so does the cloud also as the own architecture and the cloud also as its distinguishing features and the properties that make the cloud unique which are discussed below briefly. Figure 3.1: Cloud Architecture Cloud can majorly be classified into three levels of service models the first level is the SaaS (software as a service) and the work of this layer is to provide the user with the opportunity to make use of the applications which are running on the infrastructure of the cloud and the second layer of the cloud is the Platform as a Service (PaaS) the work of this layer is to provide the user with the opportunity to deploy the applications which are created or acquired by the user and the third layer of the cloud is infrastructure as a Service (IaaS) and the work of this layer is to provide the user with the opportunity to run and deploy arbitrary software on to cloud and these three layers are different for the users since the functions and services provided by these layers are different. But for the technical staff these three layers are not different and they are dependent on each other and hence for e.g.: consider SaaS needs the Paas layer to provide platform for the deployment of the services or the services can be directly deployed on to the IaaS layer, and the IaaS layer services and products are also built up using the services provided by the Paas layer hence cloud layers are inter dependent on each other in technical perspective view. The other important part of the cloud computing is the management of the system in cloud and the objective of this management is to run the cloud securely and maintain stability in the cloud environment, unfortunately many of the users are unaware of the management of system in cloud and this management is the base for the well functioning of the cloud and hence good services can be provided with proper system management and these management of system helps in the aspects of maintaining the services and operations involved in the cloud. Figure 3.2: Cloud Management Framework In the present scenario of the internet environment the layer is as mentioned above in the diagram 3.2 and for the maintenance of the devices with remote control in cloud environment the developer need to select the proper services in the cloud to satisfy the requirement of the customer and SaaS is one of the most suitable and earliest services provided in the cloud and using these service the user can directly connect to the cloud and with the help of browser we can directly run the application residing on the cloud and advantage of these service is that the service provider is responsible for the maintenance of the services weather it is hardware or software and is charged as per usage or free of cost. Neither the developer nor the user needs to worry about the upgrades, installations, attacks etc. And more importantly one need worry about the initial investments and license approvals. The present scenario in the cloud is that some providers are giving customized clouds to the companies, for the user the cloud is always free but the companies need to build their own cloud computing services for e.g.: FeiBit corporation as launched a cloud recently and meets almost all requirements of its customers. B. ZigBee wireless sensor network The name ZigBee was given to the device because of observing the procedure of bees flying and the dance of the bees was in the shape of Z and the bees are very small and hence the amount of energy that is needed to transfer the pollen is also less keeping this features in mind they named the device as ZigBee as it has features like less consumption of energy, low price, small size but works very efficiently and its IEEE standards is 802.15.4 and it creates the wireless personal area network for the communication purpose. When the IEEE standard was given the agreement was also made which is divided into two parts and hence according to the agreement the 804.15.4 will define the two layer one is the physical layer and the other I the MAC (media access control ) layer and the ZigBee alliance will define the specifications for the network, security and application layer and later the ZigBee stack also was defined that helps in communication and these was defined by individual layers protocol which was grouped together to which it gives the user API and this can be used to coordinate among many of the sensors for the purpose of communication and can also send data form one sensor to another and hence the energy consumed is very less in this process and communication efficiency is very high and hence due to this the remote controlled equipment can be controlled and monitored efficiently. Figure 3.3: Composition of ZigBee The ZigBee as the capability of the self organizing networks for proving this scenario take the e.g.: as follows where the group of paratroopers in which each group member as the ZigBee devices with them and then they land on ground they can connect each other in the forest if they have landed with the range in which the ZigBee devices can communicate and moreover the module can identify the device and contact the person and hence this is the special property of the ZigBee where clearly we can find the property of self organization. We can also use ZigBee in the industry but cannot always guarantee the usage of channels which are unblocked, like the lights in city streets, car accident, etc. the emergence of road traffic is interrupted due to accident, likewise with the usage of channels in industry and hence self organization of the network is very important because of the errors that may occur during the transmission of the data. The paths are not always set for sending the data and hence one as to find the path that is best and short and send the data in that path in the network, but if the desired path is blocked due to traffic then the data needs to sent in the other path so that it reaches the destination correctly and here in ZigBee the so called dynamic routing for data transmission is used for the sending of the data in the network. The ZigBee works with using the technology called the DSSS (direct-sequence spread spectrum) underlying which is the non beacon mode and the ZigBee network can be expanded that is scalable, within one second or even in less time the node joins the network and rejoins the network again and starts the transmission and hence this is very less rime when compared to Bluetooth which takes around three seconds and ZigBee has high reliability in networks and it supports multicast and broadcast applications and the ZigBee is one of the major network in today’s communication technology and also its importance is increasing day by day due to its distinctive application in many fields like health, sports etc. Figure 3.4: ZigBee wireless sensor Network The access to the cloud computing platform is free of cost and hence through this platform the developer can use ZigBee wireless sensor technology via the gateway through which it is connected to the internet and from there the information reaches the cloud through GPRS and the cloud here provides the real time accessing and monitoring of the data that is acquired through the sensors data socket communication and this real rime monitoring depends only upon the internet or network environment, without increasing delay time. And the cloud platform today supports the latest technology like html5 technology and hence this is a boon to many of the companies and customers and life is much simpler and easier with the upgrading technology. CHAPTER 4 SYSTEM DESIGN System design specifies the flow chart, block diagram, which gives the outlay for the system and also helps in the constructing the project and implementing it so that the desired output can be obtained. 4.1 Generalized Block Diagram The below figure 4.1 explains the overall block diagram of the work done, Figure 4.1: System Design of Home Automation 4.1.1 Operation involved The operations involved here consists of mainly two modules one is the transmitter and the other is the receiver and the transmitter has many sensors connected to it which include light intensity, temperature, motion detection sensors etc. here the data acquired by the sensors are uploaded to the transmitter through which the data is remotely passed to the receiver and from heir the data is uploaded to the cloud in serial form and the data in the cloud is displayed using the ASCII format and this data can be stored in the cloud drop box and the data in the cloud can be seen anywhere but the internet connection is mandatory and there is a graphical user interface that is been developed using the visual basic/dot net and through that also we can see the output when the server is turned on. 4.1.2 Cloud Data Base Center The design of the cloud data base centre is as shown below, Figure 4.2: Design of Cloud Database Center The cloud stores the data that it received from the network and the received data can be retrieved back from anywhere and the status of the devices can be known and the required actions can be taken. In the above diagram 4.2 we can see the cloud data base centre where the data base centre and the web server are connected together by the HTTP and the web server as the apache connected to the internet and the web server is also connected to the client browser where the client can access the data and hence the procedure of how the data base centre of cloud is designed. 4.1.3 Functioning of the System The control command from the server in the Cloud are first sent to the home gateway through TCP/IP protocol and then transmitted to the appliance with ZigBee wireless communication. The home gateway is a server which is used to receive the user command from the far-end place on the Internet, and to transmit the status as well as the power consumption information of appliances back to the database server. The gateway will then transmit the received commands to a ZigBee transceiver through the universal asynchronous transmitter and receiver (UART) interface With the proposed structure, authorized users or the system manager can log into the web server which will be in connection with the database, and devices in the house can be remotely monitored and also the power can be utilized without any wastage. Overall Block Diagram: The block diagram is as shown below which gives the description of the entire work carried out, Figure 4.3: Overall System Design of Home Automation with Monitoring Station The Above Figure (4.3) works in the same as described in the Functioning of the System, this is the method in which the devices in the house can be remotely accessed and controlled over the internet, in the other phase the world is facing the shortage of energy in terms of oil, water etc. and hence how to make use of the resources is one of the big challenge, hence this proposed system helps in the utilization of the resources efficiently. 4.1.4 Block Representation of the Diagram The below figure 4.4 represents the block representation of the diagram of the system design Figure 4.4: Overall Block Representation of the system where one recognizes the relays, sensors, alarms for motion detection are connected together to Microcontroller and the microcontroller is connected to the ADC (analog to digital conversion) where the data from analog form are converted to the digital form and the data obtained after conversion are sent to the ARM 7 board where the data is been transferred and also received through the ZigBee where the received data is stored in the cloud and the data can been seen the cloud with the help of PC. Hence from these design we can see the overall working blueprint of the system which also recognizes to be one of new technology with the combination of both hardware and software and hence this technology is one of the upgrading and ever growing technology in the field of internet of things (IoT). 4.1.5 Data Flow Diagram of the System Figure 4.5: Data Flow Diagram of the System The data flow diagram is as shown above in figure 4.5, that consists of two boards, and there are one ZigBees attached to each of the boards, the 8051 board has different sensors attached to it which will monitor the devices in the house and this status is fetched by the ZigBee and transferred wirelessly to the ARM 7 boards ZigBee and then the GPRS which is connected to the cloud uploads the data , by the information obtained through ZigBee and the data can be viewed by the end user and hence the status of the devices data obtained are visible on the LCD screen attached to both the boards. 4.1.6 Flow Chart Representation of the System The below figure 4.6 gives the complete description of the working of the system represented in terms of flow chart and the flow chart represents mainly the activity in the control center i.e. in cloud network, first the system is started and then initialization of the system is done then the network is built that is establishing the connection with server and then the system is in standby mode and then if the interrupt is received by the user to join the network, if no connection is present then the connection is again reestablished and if the connection is established then the status of the devices is noted and the end devices are controlled if it is not possible to control the connection is again restarted and checked. Hence the working of the system is represented in the terms of flow chart and this system is considered to be one of the advanced technology through which the devices in the house can be controlled and monitored through cloud. N Y N Figure 4.6: Flow Chart of the working of the system 4.1.7 Picture of the 8051 and ARM 7 Boards In the below two pictures we can see the pictures of the 8051 and ARM 7 circuit boards, The picture 4.7 below represents the 8051 micro controller board, Figure 4.7: Snapshot of MC 8051 That is connected to different sensors like light, temperature etc. And also to ZigBee and hence this board represents the home and the devices that can be controlled and monitored using the cloud. In the picture 4.8 below, we can see the ARM 7 board Figure 4.8: Snapshot of ARM 7 That is connected to ZigBee for the purpose of communication with the devices in the house, the GPRS module for the purpose of uploading the data to the cloud and the LCD screen for the display of the information and all these are connected to the ARM 7 board. BIBLIOGRAPHY [1] â€Å"IOT’s Gateways: Bridging Wireless Sensors Networks into Internet of Things† Qian Zhu, Ruicong Wang, Qi Chen, Yan Liuand Weijun Qin 2010 IEEE [2] â€Å"A Security Aspect in Cloud Computing† by Gurudatt Kulkarni Jayanth Gambir Teiswini Patil Amruta Dongare  ©2012 IEEE [3] † Technologies and Protocols for Data Centers and Cloud Networkings† by Nabil Bitar, Steven Gringeri, and Tiejun J. Xia, Verizon Laboratories © 2013 IEEE. [4] â€Å"Dynamic merging of ZigBee’s Homes Networks into Home Gateways Using OSGi’s Services Registry’s† by Young-Guk Ha ©2009 IEEE. [5] â€Å"ZigBee source route technology in home application â€Å"by Yao-Ting Wu in 2008 IEEE. [6] â€Å"Research of ZigBee’s data securities and protections† by Li Chunqing1, Zhang Jiancheng, 2009 International Forum on Computer Science-Technology and Applications © 2009 IEEE. [7] â€Å"ZigBee and UPnP Expansion for Home Electrical Appliance Control on Internet† by Kuk-Se Kim, Chanmo Park ,Kyung-SikSeo, Il-Yong Chung, Joon Lee2007 ICACT2007. [8] â€Å"ZigBee’s Wireless Sensors Applications for Health, Wellness and Fitness† by ZigBee’s Alliances © 2009 ZigBee Alliance. [9] â€Å"Z-Phone: Implementation Design and of Embedded Voice over ZigBee Applications† by A.Meliones and E. Touloupis. [10] † Bluetooth based homes automation systems using cell phones† by R.Piyare, M.Tazil2011 IEEE 15th International Symposium on Consumer Electronics.

Friday, January 17, 2020

Common Law Essay

a)Â  In a letter dated 14/02/2011, the manager (Dave) of Excellent Foods (EF) outlined conditions in writing to the manager (Ben) of Safe Foods (SF) in relation to the purchase of EF. These conditions were that SF must pay the valued amount of EF, which totaled $120,000, $30,000 more than the original amount that SF had been prepared to pay and stipulated during earlier negotiations. At the time of the earlier negotiations, SF also had set a purchase requirement, which was that EF’s sales must increase by 20% over the next two months and if this requirement was met, SF would be prepared to pay the $90,000. After earlier negotiations, EF had their business valued at $120,000 and notified SF of the valuation and that they now required this amount, not the $90,000 that SF had offered. SF did not reply to EF. Whilst EF met the sales increase target and forwarded the record of sales to SF along with the transfer of business contract as well as a new condition of the contract being that EF require 10% of the 120,000 within 14 days, SF responded in writing stating they no longer were interested in purchasing EF. It would appear that EF are no longer interested in purchasing SF due to the $30,000 price increase and the term that they would now need to pay 10% within 14 days. An important aspect in forming a legally binding contract is giving and receiving the acceptance of an offer. The requirement of acceptance with every binding legal contact is tied closely to the concept of unqualified mutual assent. Only when both parties have given their mutual consent does the law consider a binding legal contact to have been formed. Hence, if the offeree remains silent, their silence cannot constitute an acceptance.[1] Another important aspect when creating a legally binding contract is that the acceptance of the offer must exactly mirror the terms and conditions of the offeree and vice versa. If there is even a slight difference, this will most likely not constitute a valid acceptance. If an offer is made that does not mirror the terms of the original offer, than this is considered a counter-offer, which now negates the original offer. An example of this is demonstrated in the case of Hyde v Wrench (1840) where Wrench offers to sell his land to Hyde for the price of 1200 pounds of which Hyde declined to accept. Wrench responded with a counter-offer of 1000 pounds and Hyde responded with another counter-offer of 950 pounds. When Wrench declined the counter offer, Hyde decided he would accept the earlier offer of 1000 pounds, however Wrench decided he would no longer sell his land to Hyde for this amount. As Hyde had made another counter-offer after the earlier offer, the offer of 1000 pounds was now destroyed. Hyde sued Wrench for breach of contract claiming that the earlier offer was not withdrawn however the court found that Wrench did not need to withdraw the offer of 1000 pounds as it was destroyed when the counter-offer of 950 pounds was made.[2] In this case, SF made an offer to EF, being $90,000 if sales increase by 20% in two months. EF later responded with a counter-offer of $120,000, which then destroyed the earlier offer of $90,000. SF did not respond to this counter offer, therefore not accepting the new offer. EF also added terms to the offer that were not previously discussed with SF, which also did not mirror the terms of the earlier offer of which the court considers being a strict requirement for full and unequivocal assent.[3] Excellent Foods cannot commence an action for breach of contract against Safe Foods as the counter-offer negates the original offer of which Safe Foods did not respond to and therefore is not considered as an acceptance of the terms. b)Â  Promissory estoppel is an equitable action, which is designed to enforce promises made from one party to another where the promises are not supported by consideration. The doctrine of promissory estoppel can only be applied if a clear promise was made from the promisor to the promisee, if the promisse has suffered a significant loss from the promiser now going back on its promise, if the promiser acted unconscionably, and if the promisse undertook certain acts (or refrained from undertaking certain acts) due to the promiser’s initial promise. A leading case which illustrates the purpose of promisary estoppal is Waltons Stores v Maher where Waltons negotiated with Maher over the grant of a lease of property that Maher owned. Maher agreed to demolish a building in order to make way for a new custom designed building to be occupied by Waltons. Changes and agreements were made by both parties over the following months. Waltons later decided that they no longer required the building after Maher had already informed then that they were proceeding with the demolition and despite being aware of this, advised their solicitors to ‘go slow’ in informing Maher of their reservations. Due to Maher having initially received a clear promise, suffered considerable loss and completed many acts under the belief that Waltons would go ahead with the promise as well as Waltons acting unconscionably against Maher in ‘going slow’ in informing Maher of their true intentions, Maher was able to rely on promisary estoppel and therefore won on first instance and later at the appeal.[4] In this case, Excellent Foods did not suffer any considerable loss from Safe Foods not following through with the business transfer. Whilst there was an initial promise made by SF to EF, EF later requested 10% of the transfer price of $120,000 within 14 days– a term that had not previously been negotiated. It may be because of this term that SF does not wish to continue with the transfer in which case they have not acted unconscionably. EF informed SF in writing that they did not wish to continue with the transfer.

Thursday, January 9, 2020

The Definition of Atomic Volume and How to Calculate It

The atomic volume is the volume one mole of an element occupies at room temperature. Atomic volume is typically given in cubic centimeters per mole: cc/mol. The atomic volume is a calculated value using the atomic weight and the density using the formula: atomic volume atomic weight/density Alternatives Another way to calculate atomic volume is to use the atomic or ionic radius of an atom (depending on whether or not you are dealing with an ion). This calculation is based on the idea of an atom as a sphere, which isnt precisely accurate. However, its a decent approximation. In this case, the formula for the volume of a sphere is used, where r is the atomic radius: volume (4/3)(Ï€)(r3) Example For example, a hydrogen atom has an atomic radius of 53 picometers. The volume of a hydrogen atom would be: volume (4/3)(Ï€)(533) volume 623000 cubic picometers (approximately)

Wednesday, January 1, 2020

Universal and Diagnostic Screening in Setting SLO Goals

Teacher evaluation programs require that teachers set student learning objectives (SLOs) using data that can help target instruction for the academic school year. Teachers should use multiple sources of data in developing their SLOs in order to demonstrate student growth over an academic school year. One source of data for teachers can be found in the data that is collected from screening in Response to Intervention (RTI) programs. RTI is a multi-tier approach that allows educators to   identify and then support students with specific learning and behavior needs. The RTI process begins with the use of a universal screen   of all students.   A  universal screen  is an assessment which has already been determined to be a reliable assessment of a specific skill. Universal screens are designated as those assessments that are: Accessible to all studentsGiven to all studentsSkill and concept specific  Easy to administer and scoreQuick turn-around time (1-3 days) of aggregated and disaggregated data to classroom teachersRepeatableReliable (Note: A â€Å"teacher-made† assessment cannot be referred to as reliable if it has not been analyzed by a psychometrician) Source: State of CT, Department of Education, SERC Examples of universal screens used in education at the secondary level are:  Acuity,  AIMSweb, Classworks, FAST, IOWAs, and STAR; some states, such as NY, use the DRP as well. Once the data has been reviewed from universal screening, educators may want to use a  diagnostic screen  to measure students understanding of a subject area or skills base  after a universal screen has revealed specific areas of strength or weakness for a student.   The characteristics of diagnostic assessments are that they are: Given to selected students  Reliable   Valid  (Note: A â€Å"teacher-made† assessment cannot be referred to as reliable or valid if it has not been analyzed by a psychometrician) Source: State of CT, Department of Education, SERC Examples of diagnostic assessments include  Behavior Assessment Scale for Children (BASC-2); Childrens Depression Inventory, Connors Rating Scales. NOTE: Some results may not be shared for the purposes of developing SLOs for the classroom teachers, but may be used for education specialists such as school social worker or psychologist. The data from universal screens and diagnostic screens are critical components of the RTI programs in schools, and this data, when available, can help in refining developing teacher SLOs. Of course, teachers may create their own benchmark assessments to act as a baseline. These benchmark assessments are used frequently, but because they are often teacher created they should be cross-referenced with universal and diagnostic screens if available. Teacher created materials are imperfect or may even be invalid if students underperform or if skills are incorrectly accessed. At the secondary level, teachers may look at quantitative  data  (expressed in numbers, measurable)  from prior years: Standardized test results (State, SAT, ACT, NAEP);Report card grades (letter value or percentage);Attendance records. There may be qualitative  data  (expressed in description, observable)  also in the form of recorded observations by teacher(s) and  support staff or in prior report card comments.This form of comparison through multiple measures that are qualitative and quantitative is called triangulation: Triangulation  is the process of using multiple data sources to address a particular question or problem and using evidence from each source to illuminate or temper evidence from the other sources. In triangulating data to develop a SLO, a teacher make an informed decision on the student learning objectives that to help improve either an individual student or group of students performance.     All of these forms of assessment including those from the prior year, which may include universal or diagnostic screens, can provide teachers with the data to begin to develop well-informed SLO goals at the beginning of the school year in order to target instruction for multi-tiered student improvement for the entire academic year.