Feeder Zone Control and Metal Impurity Detection in Blow Room Machines
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
this project has been designed to detect the metal impurities present in the raw cotton input for the blow room machines and to monitor the level of cotton in the feeder zone of the machine. This is done with the help of metal detectors and IR sensor respectively. Microcontroller is used to control the conveyor belt which supplies raw cotton to the feeder zone depending upon the data from metal detector and IR sensor. The microcontroller used here is ATmega32A.
Authors and Affiliations
Shekinah Pauline D, Sangavi M, Saraswathy M, Saranya M
slugICN: Towards The Future Of The Internet
A rapid increase in the content over the internet and a growing need of efficient and quick dissemination of the content securely has lead to a new area of research i.e. a new network paradigm where our main emphasis...
Literature Survey on Monopole Fractal Antennas
Antenna plays a vital role in Wireless Communication System. The demand for WCS has been increasing while its size is decreasing. The basic requirements of antenna used in wireless communication system are size reductio...
SQL Injection Attack and Method for Detection and Prevention in ASP.NET Web Applications
In This paper, we propose a technique, which uses runtime validation to detect the occurrence of such attacks, which evaluation methodology is general and adaptable to any existing system. There is a need to protect dat...
Smart Interactive Advertising Board
There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully usin...
Hiding Image in Audio Steganography Using Discrete Cosine Transform and Skin Detection
Now days, security is an important problem in hacking technologies such as internet, digital devices and so on. To solving the security problem using steganography. The paper presents the hiding security image into audi...