IOT Based Coal Mine Safety Monitoring and Control Automation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
In this paper we are organizing an IoT (Internet of Things) screen, a safety efforts for excavators which is most basic in underground mining domains. In this undertaking, the system is build using particular sensors sort out subject to MEMS used to screen the surroundings parameters of underground mine place and drives each and every identified parameter/characteristics to/characteristics to ARM7 based Microcontroller Unit (MCU). The MCU unit is used to create an absolutely robotized surveying system with high exactness, smooth control and constancy. Exactly when an essential conditions is recognized caution is given by the structure and comparative estimations is passed on to webserver by beginning ESP8266 module subject to WiFi correspondence. The recognized assortments in the characteristics are appeared on webserver page that makes less requesting for the underground control center to screen and to make major quick move to prevent genuine damage.
Authors and Affiliations
Bonala Ashwini, D. Ravi Kiran Babu
SpMV Profiling and Optimization Analysis
Abstract: Sparse matrix-vector multiplication is an important operation when it comes to sparse matrixcomputations. Very large and sparse matrices are used in many engineering and scientific operations. Hencethe matrix n...
Performance Analysis of NodeLock Licensing Methodology with RMPRSA Cryptography
Abstract:There are many means of unauthorized access of software products being applied. To control this access towards copying the software products on various systems, software developers generally define certain...
An Adaptive approach to retrieve image affected by impulse noisefrom documents
Abstract: Impulsive noise is sometimes called salt-and-pepper noise or spike noise is most oftenly occuringimage detoriation. An image containing salt-and-pepper noise will have dark pixels in bright regions and brightpi...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
Modern Computer Implementation on Smart Phone withAndroid Platform for Smes (UMKM) in Optimization ServicesDistrict Malang
Abstract: The use of Android in the smartphone operating system currently used by many companies. Because of its superiority as a software that uses computer code base that can be distributed openly (open source) so many...