Professional Documents
Culture Documents
T he 2012 Elect ronics and Telecommunicat ions Research Seminar Series: 11t h Workshop Pro…
Ray Sheriff
T he 2011 Elect ronics and Telecommunicat ions Research Seminar Series: 10t h Workshop Proceeedin…
Ray Sheriff
Electronics and Telecommunications
Research Seminar Series
12th Workshop Proceedings
10 April 2013
Prof. RE Sheriff (Editor)
School of Engineering, Design and Technology
12th Research Seminar Series Workshop
10 April 2013
Edited by:
Prof. RE Sheriff
School of Engineering, Design and Technology
University of Bradford
12th Research Seminar Series Workshop Further Information
An electronic copy of the Workshop Proceedings is freely available from the Bradford Scholars’
web site: http://bradscholars.brad.ac.uk/
Further information on the School’s postgraduate courses can be obtained from the following
address:
John Purvis
School of Engineering, Design and Technology
EDT 4
University of Bradford
Richmond Road
Bradford
UK BD7 1DP
E-mail: pg-eng-enquiries@bradford.ac.uk
-i- School of Engineering, Design and Technology
University of Bradford
12th Research Seminar Series Workshop
FOREWORD
This is the twelfth workshop to be organised under the postgraduate programmes in electrical and
electronic engineering (EEE). The workshop concludes the Research Seminar Series, which, over
ten weeks, provided a platform for disseminating the latest research activities in related
technologies through its weekly seminars.
The EEE courses cover a broad range of technologies and this is reflected in the variety of topics
presented during the workshop. In total, thirty-four papers from forty-nine submissions have been
selected for the Proceedings, which have been divided into eleven themes, viz.: Core Networks;
Satellite Communications; Electrical Engineering; Business, Enterprise and Practice; Wireless
Sensors; Virtual Environments and Augmented Reality; Modulation and Cryptography;
Telecommunications Engineering; Information Technology and Systems; Robotics and Machines;
and Emerging Technologies.
The workshop aims to be as close to a ‘real’ event as possible. Hence, authors have responded to a
Call for Papers with an abstract on a subject of their choice, prior to the submission of their final
paper. This has been a novel experience for many, if not all of the contributors. As usual, authors
have taken up the challenge with much enthusiasm, resulting in a portfolio of papers that reflects
today’s research questions and tomorrow’s engineering solutions.
ACKNOWLEDGEMENT
As ever, I am grateful to the speakers that were able to contribute a seminar to the Research
Seminar Series, namely: Prof. Raed Abd-Alhameed (EDT), Dr Pauline Chan (School of
Informatics, Computing and Media (SCIM)), and Prof. Laurent Franck (Telecom Bretagne).
I would also like to thank colleagues in EDT that generously gave up their time to chair one of the
eight presentation sessions, as listed overleaf.
Prof RE Sheriff
Editor and Research Seminar Series Workshop Chair
10 April 2013
SESSION CHAIRS
Dr Y Cheng Dr HS Rajamani
Dr RA Halliwell Dr JC Readle
TABLE of CONTENTS
Theme 1: Core Networks
D. Kantiyok Internet Protocol: Version 4 and 6 1
A. Yusuf-Asaju An Overview of Fibre Optics Utilization in Long 6
Haul Transmission in Nigeria
Abstract - The internet is the most common means by which and the Internet are closely related. It is not possible to
information is shared. The internet from its inception talk about one without the other because they were
functions using Transmission Control Protocol/Internet developed together by the United States Defence
Protocol (TCP/IP) which is the basic communication Advanced Research Projects Agency (DARPA or
language it understands. TCP/IP while distributing packets
to and from different devices on the internet also assigns
ARPA). TCP/IP was initially developed in the 1970s as
addresses to the devices for easy identification. The IP has part of an attempt to define a set of technologies to
been modified and restructured over the years to suit the operate the immature Internet [5]. Though TCP and IP are
activities they perform and improve effectiveness in the way two protocols with some differences they are commonly
information is distributed over the internet. These referred to as TCP/IP. This is because TCP is an upper-
modifications and reconstructions have led to the layer protocol from the IP point of view, TCP is one of
introduction of various versions that handle different the two original components of the suite that
operations. The IP version currently in use is the IPv4. With complements the Internet Protocol (IP) and provides the
the ever growing number of computers and mobile devices mechanism for implementing the internet. Though TCP
joining the internet community, Internet Protocol version 6
(IPv6) is fast becoming a welcome solution to the
and IP function as a team they have some differences that
shortcomings of the existing internet protocols. This is enable them operate independently. While IP transmit
because the addressing system IPv6 offers is large enough to data between individual devices on the internet, TCP
accommodate more devices compared to the IPv4. transfers data between two actual applications running on
This work analyses the Internet Protocol (IP) and the these two devices. IP assigns addresses to computer's
shortcomings IPv6 has been developed to address. This will network interface, TCP uses a port number as its address.
be done by analysing the IP to grasp the need for IPv6 TCP is connection oriented while IP is connectionless,
Keywords: IPv6, IPv4, Internet, TCP/IP, Addresses meaning no connection is needed to be established
between devices before data can be sent [5]. TCP/IP are
I. INTRODUCTION used by major internet applications like the World Wide
As of 2012 a survey by Microsoft Tag revealed that there Web (WWW), file transfer, email and remote
are over 4 billion mobile phone users around and this administration [3]. For the purpose of this paper, we are
does not include the numerous laptops and desktops in more interested in IP.
use [12]. Imagine 4 billion mobile phones on the internet,
now include the numerous laptops, desktops, androids
and other internet devices also connected to the internet.
With today’s multiplicity of Internet-connected devices
per person, 4 billion IP addresses available is clearly not
enough. Although IPv4 was effective and robust at the
time of its inception it did not anticipate the need for
security at the IP level, easier configuration, the on-going
exponential growth of the internet and support for real
time delivery of data in terms of quality of service [3].
IPv6 is not a new protocol instead it is an evolution of
IPv4. It has been around since the early 2000s. It was
developed for addressing the shortage of the IPv4’s
address system that was not deemed possible at that time
[1]. IPv4 is a 32-bit addressing system that was sufficient
for internet use from its inception but due to the fast
growing population of internet users and devices, the Fig 1 TCP/IP model
need for a larger addressing system arose. This led to the
emergence of IPv6.
III. INTERNET PROTOCOL (IP)
II. INTERNET PROTOCOL AND TRANSMISSION
CONTROL PROTOCOL (TCP/IP) The acronym Internet Protocol was derived from the
name InterNet Protocol, that is, a protocol connecting
Over the years, TCP/IP has continued to evolve to meet different network interfaces. Internet Protocol is the core
the needs of the Internet and also smaller, private protocol of the internet protocol suite. IP is the main
networks that use the technology. The history of TCP/IP protocol at the network layer in the TCP/IP structure. It is
IP Versions
the means by which data is sent between devices on an
internetwork with help from other protocols. IP has
multiple functions and characteristics with the main There are two versions of the IP: version 4 and 6.
function being its ability to assign addresses and deliver
data known as datagram between devices on unconnected A. Internet Protocol version 4 (IPV4)
networks. This process is sometimes called internetwork IPv4 is the version that has been in use since the
datagram delivery [2]. Here are the major functions of IP: inception of the internet. Some characteristics of IPv4 are
I. Addressing addressing, address type, routing, classful network and
Just like in real life cases where a courier service configuration among others.
Addressing
company like DHL delivers parcels to different clients,
they need the recipient’s address for easy location and
delivery. Without the appropriate address the parcel may The total number of IPv4 addresses available is 232 or
likely not get to its destination. IP system is structured to 4,294,967,296 addresses [6]. The IPv4 addresses have
assign unique addresses for devices across large networks been able to last this long because they are reused and
and facilitate delivery of packets when necessary [2] [4]. reassigned as devices were connected and disconnected
from a network.
Classful Network
IP address consists of two parts: one which identifies the
network and the other, the host or node. There are five
address classes namely class A, B,C, D and E;
Class A
Class A binary addresses begins with 0, therefore, the
decimal number can be from 1 to 126.
The first octet of an IP address identifies the network
while the remaining three octet indicates the host within
the network. The total number of networks will be 128
Fig2.IP interfaces for common network devices [2] (27) and 16,777,216 (224) addresses per network.
For example, if 102.168.212.226 is a class A address, 102 Multicast – Communication between a sender and
addresses the network while 168.212.226 is for the hosts multiple receivers is Multicast. They are addresses that
within the network. belong to a group of host on a network. A message sent
Class B goes to all the host.
The binary addresses for B begins with 10, therefore, the Anycast – communication between a sender to the nearest
decimal number can be from 128 to 191. The first two group of receivers in a network is Anycast. It is used
octet identify the network while the remaining two when a packet must be sent to any host of a group, but
identify hosts within the network. The total number of does not need to be sent to all of them. The packet usually
IP Header
networks will be 16,384 (214) and 65,536 (216) gets to the nearest host of the group [7].
addresses.
Using the address above, 102.168 identifies the network. The IPv4 header includes checksum, which is a
While 212.226 is for hosts in the network [8]. mechanism for protecting packets against data corruption
Class C during transmission.
Here the binary addresses start with 10 which allows the
decimal number from 192 to 223. The first three octet
identify the network, while the last octet identifies the
host. The total number of networks will be 2,097,152
(221) and 256 (28) addresses.
Using the same address as classes A and B, 102.168.212
represents the network while 226 represents the host.
Class D
The binary addresses begin with 1110, therefore, the
decimal number can be from 224 to 239. The class D
networks are used mainly to support multicasting.
Class E Fig 4 IPv4 header.[6]
Address Space
sent to their destinations. In cases where the source and for creating IPv6:
destination are not on the same network, intermediate
systems are used to deliver the datagrams. This is where Compared to IPv4’s 4,294,967,296 addresses IPv6
routing comes in. The device used for routing on the provides
internet is called a Router. IP addressing ensures that 340,282,366,920,938,463,463,374,607,431,768,211,456
devices such as computers, laptops and printers get one IP addresses which would not get exhausted anytime soon.
address except routers, bridges and other network devices IPv6 addresses are 128 bits long that came along with
that get more than one address due to multiple functions improved architecture. It is represented as eight groups of
four hexadecimal digits separated by colons [11]. Binary
Configuration
performed [2][5].
and decimal representation of the IPv6 address is long
At this point it is imperative you know that addresses can and cumbersome, hence the use of hexadecimal
be set up as either configures static or dynamic. representations.
Static configuration - in the sense that each device is For example
Unicast - Communication between a single sender and a IPv4 was originally designed for remote military
receiver is known as Unicast. Datagrams sent to a unicast activities without security in mind before it was adopted
address are delivered to the node containing the interface as a public network. As technology advanced, so did the
identified by the address. activities and applications on the network which
demanded on-time delivery and increased security.
Developing and integrating security features into the mechanisms below handle interoperability of devices that
Tunnelling Mechanism
mobile invasion on the internet was not anticipated. In
mobile IP, two addresses bound to each other are
assigned to a host: a home address which identifies the In this mechanism devices that do not have full IPv6
host and a care-of address which provides information capable technologies may be able to communicate by
about the host’s current location. When the mobile moves encapsulating IPv4 packets into IPv6 and vice versa.
to a current location, it must send its new address to an Once integrated they are transferred through a DTI
agent at home so that the agent can channel all packets to interface within the IPv6 network to the Border Router
Mobile devices, laptops and PCs have IP addresses which Just like in the car industry, changes have been made on
enable them identify and communicate with each other on vehicles to suit customer taste. Changes can be made to
the internet. Imagine a community where things and the tires, interior and even shape of the cars but at the end
objects also have addresses which enable them of the day the cars still have engines, steering and fuel
communicate and interact with each other though wireless pumps to function more effectively. As much as IPv6 has
technology. That brings about the concept of the Internet emerged with better features to enhance communication
of Things. By being connected, thing’s information can on the internet, its emergence underwent and is still going
be shared on a global scale. Internet of Things is a new through series of transformation to meet up with the high
type of Internet application which uses a variety of demand for internet efficiency. According to Cisco by the
information sensing identification devices and processing end of 2013, there will be more devices on earth than
equipment such as Global Positioning Systems (GPS), humans [11], but I am certain that IPv6 is well capable of
Radio frequency identification (RFID) and Geographic handling any form of challenges the future internet holds.
Information System (GIS) to create an extensive network
(Fan and Zhou, 2011). With IPv6 there are many REFERENCES
addresses to support the internet of things technology.
[1] B. Metcalfe, (2011). “The next-generation internet,” Engineering
IV. TRANSITION FROM IPV4 TO IPV6 in Computing & Processing, vol.4, no.1, pp.58-59, IEEEXplore
[Online]. DOI: 10.1109/4236.815857 [Accessed 18 February 2013]..
[2] C. M. Kozierok, (2005). The TCP/IP guide. [Online eBook].
Transition from IPv4 to v6 is gradually taking place as Available: http://www.books24x7.com [Accessed: 18 February 2013].
plans to fully adopt IPv6 is in motion. Since the early [3] M. G. Naugle (1999), Illustrated TCP/IP. [Online eBook].
2000 devices and networking infrastructures have been Available: http://www. http://library.books24x7.com [Accessed: 19
February 2013].
built to function with IPv6 while still supporting IPv4 [4] O. Andreasson (2006). IP Characteristics. [Online]. Available:
software. The two protocols will co-exist for some time http://www.frozentux.net/iptables-tutorial/chunkyhtml/x165.html
before IPv6 fully takes over. As devices are built with [Accessed: 18 February 2013].
both IPv4 and v6 technologies one may wonder how then [5] L. Dostálek and A. Kabelová (2006) Understanding TCP/IP: a
clear and comprehensive guide. [Online eBook]. Available: http://
it is possible for them to interact on the internet. The http://www.books24x7.com [Accessed: 18 February 2013].
[6] J, Aflaki, (2008). A Complete Solution to Ipv4 Addressing. [10] Webopedia. Understanding IP Addressing [Online]. Available:
Journal of Information Science and Information Theory, vol.12, no.2, http://www.webopedia.com [Accessed 21 February 2013].
pp.1-4. Available: Proquest, [11] SANS Institute (2002), Security Features in IPv6. [Online].
http://search.proquest.com/docview/192408780?accountid=17193 Available at http://www.sans.org. [19 February 2013].
[Accessed: 21 February 2013]. [12] H. Richmond (2011), The Growth of Mobile Marketing and
[7] C. Skinner, (2011). IPv4 address shortage approaching, Journal of Tagging. [Online]. Available: http://tag.microsoft.com [Accessed: 22
Business and Economics, pp.8. Available: Proquest, February 2013].
http://search.proquest.com/docview/853362317?accountid=17193 [13] http://www.geohive.com. [Accessed 22 February 2013].
[Accessed: 19 February 2013]. [14] http://etherealmind.com/what-was-ipv5-version-5-ip/
[8] E. M. Rubi (2012), Property Rights in IPv4 Numbers: Recognizing [Accessed 25 February 2013].
a New Form of Intellectual Property. [Online]. Available: [15] http://www.scs.stanford.edu/nyu/03sp/notes/l8.pdf [Accessed 22
http://www.apps.americanbar.org. [Accessed: 21 February 2013] February 2013].
[9] F. Nilsson. (2008). The Future is IPv6, Journal of Security [16] http://www.javvin.com/protocolMIP.html [Accessed 22 February
Technology & Design, vol.18, no.3, pp.52, 54-56, Available: Proquest, 2013].
http://search.proquest.com [Accessed: 23 February 2013]. [17] http://mashable.com/2013/02/06/mobile-growth [Accessed 22
February 2013].
[18] P. Fan and G. Zhou, (2011). Analysis of the Business Model
Innovation of the Technology of Internet of
Things in Postal Logistics, 2011 IEEE 18Th International Conference
on Industrial Engineering and Engineering Management (IE&EM),
pp.532-536. Available: IEEEXplore, DOI:
10.1109/ICIEEM.2011.6035215. [21 February 2013].
Yusuf-Asaju, Abdulrahaman
School of Engineering, Design and Technology
University of Bradford
Abstract- Technology has no doubt become an essential provided the industry with all the communication paths
aspect of the world and as such witness a tremendous that could ever be needed [3].
growth over the last few years. An important aspect of II. HISTORY OF FIBRE OPTICS TECHNOLOGY
technology where such growth can be seen is in the Light has been used by people in the past to transmit
transmission of information. With telecommunications, it is
now easy for information to be transmitted over a long
information for hundreds of years. The interest in optical
distance within a short time without any distortion or system communication began in 1960s with the invention
damage to the information. The introduction of fibre optics of laser. The laser invention prompted researchers to
in the telecommunication industries is one of the reasons for study the importance of fibre optics in data transmission
a fast and easy transmission of information. and other applications, since laser systems could send a
Fibre optics can be defined as a cable technology through much larger amount of data than telephone, microwave,
which information transmission is done from place to place and other electrical systems. Allowing the laser beam to
by sending light pulses through the fibre. Information transmit freely through the air was the first experiment
transmission through fibre optics is done by using Dense conducted with the laser and then transmitting the laser
Wavelength Division Multiplexing (DWDM) to multiplex
signals at the transmitter or the receiver end. Data
beam through different types of waveguides was also
transmission through fibre optics involves a transmitter, conducted. Examples of optical waveguide include glass
Optical Line Amplifier (OLA), Optical Add-Drop fibres, gas-filled pipes, and tubes with focusing lenses
Multiplexer to mention but a few. Fibre optics is an [4].
important part of telecommunication that also found its From fibre research studies, glass fibres were found to
usage in Cable TV, Closed Circuit Television (CCTV), Local be a good media for transmission. However, high losses
Area Networks (LAN) and Optical fibre sensors. The in the foremost optical fibres hindered the replacement of
purpose of this report is to show the role of fibre optics and coaxial cables. Losses were resultant from decrease in the
equipment as used in long haul data transmission in Nigeria. amount of light reaching the end of the fibre. These losses
Keywords: Fibre Optics, DWDM, Transmitter, Receiver
peaked at 1000 dB/km, making foremost fibres unfit for
I. INTRODUCTION
use as communication media. In the year 1969, impurities
The evolution in current technology age is as a result of
in the material used for the fibre design were discovered
so many brilliant inventions and discoveries especially in
to be the causative factor of the great loss of signal. The
the ability to transmit information and the media in which
fundamental fibre material did not obstruct light signal
it is done, starting from copper wire used in last decades
from reaching the end of the fibre. It was suggested that
to fibre optic cable use at present. The growing demand
losses in optical fibres can be mitigated by removing the
for transmitting information effectively over long
impurities. This necessitated the construction of low-loss
distances has expanded the boundaries of technological
optical fibres. Technological advancement in
development in all areas. Low-loss glass fibre optic cable
semiconductor devices developed the required light
introduction in the industry offers almost unlimited
sources and detectors which improved fibre optics.
bandwidth and unique advantages over all previous
Researchers did a lot to increase the lifetime of
transmission media [1].
semiconductor devices from an initial 7000hours to
Copper cables either twisted pairs, coaxial cables or
100,000hours which helped in a further development of
copper waveguide has in the past used to transmit most of
low-loss fibres. Advancements in fibre optics made
the electronic communication like sending an electrical
increased its feasibility in many applications. These
signal through the copper cables or waveguides to
applications are, but not limited to telephone long-haul
accomplish communication. Optical fibre was used in the
systems, cable television, computer networks, video
past as a means for illumination into mostly inaccessible
systems, and data links. [4]
places in order to bring light to the unseen, but it has gone
through significant evolution of bigger importance and
use [2]. An optical fibre is a transparent rod, usually made III. FIBRE OPTICS AND IT’S BASIC COMMUNICATION
SYSTEM RELAY
of glass or clear plastic, through which light may
propagate, the light signal travels from the rod of the
transmitter to the receiver and can easily be detected at Fibre-optics communication is a method of transmitting
the receiving end of the rod, provided the losses in the information from one place to another by sending light
fibre are not excessive [2]. Fibre is now being used pulses through an optical fibre, the light in optical fibre
throughout the world to transmit data signals by passing forms an electromagnetic carrier wave that is modulated
light waves over a flexible hair-thin thread of glass or to carry information [5]. Optical fibre on the other hand is
plastics. Relatively, fibre optics has a greater advantage a flexible, transparent fibre made of glass (silica) or
over conventional coaxial cable or twisted wire pairs such plastic which is slightly thicker than a human hair and it
as a bandwidth greater than that of copper circuits. It has functions as a waveguide or light pipe to transmit light
between two ends of a fibre [6]. A typical optical fibre nm single-mode applications while LEDs are used for
include a transparent core surrounded by a transparent 850- or 1300-nm multimode applications. The range of
cladding material with a lower index of refraction while wavelengths at which fibre operates best is known as an
the light in the optical fibre is kept in the core by total operating window. Each window is centered on the
internal reflection [5]. typical operational wavelength, as shown in Table 1[14].
refractive index throughout the fibre [9]. Multimode Tapping into fibre optic cable is practically
fibres have large intermodal dispersion effects due to the impossible making it suitable for communications
many light modes of propagations it handles at one time. systems but it is easy to monitor and no electrical
Due to this, multimode fibres operate at lower radiation occurs in fibre [1].
bandwidths, however they are typically used for
enterprise systems such as offices, buildings, universities VI. LONG HAUL FIBRE TRANSMISSION IN NIGERIA
since they are more cost effective than single mode ones. Long-haul transmission refers to the transmission of
data or signals in form of visible light signals over optical
fibre cable for great distances, especially without or with
minimal use of repeaters. Repeaters is necessary at
intervals in a length of fibre optic cable to keep the signal
quality from deteriorating to the point of non-usability
and to maintain the signals strength at along the
transmission path. The goal in a long haul optical system
is to minimize the number of repeaters per unit distance
and ideally to render repeaters unnecessary. A super-
transparent device was developed to transmit energy at an
exceptionally optical wavelength with low loss. [11].
Long haul transmission is done in Nigeria using a
Fig.3. A cross-section on optical fibre modes [10]. dense wave-division multiplexing (DWDM) which
V. ADVANTAGES OF FIBER OPTICS IN SYSTEMS helped in minimizing the problem against fibre optic loss
In a fibre optic transmission system, the transmitter, the that resulted from transparent materials which transmit
receiver connected by fibre optic cable offers a wide energy at different speeds depending on the wavelength
range of benefits as compared to traditional copper wire [11].
A. Dense Wavelength Division Multiplexing
or coaxial cable. These include:
The fibre optic cable has the ability to carry Dense wavelength division multiplexing (DWDM) is a
much more information and deliver it with greater fidelity technology that multiplex different optical signals into
than either twisted pair wire or coaxial cable [1]. one fibre for transmission, with each signal carried at the
same time on its own separate light wavelength, it can
Fibre optic cable can support much higher data sometimes be referred to as wave division multiplexing
rates over a longer distance making it ideal for (WDM). DWDM can multiplex up to separate 80
transmission of digital data [1]. wavelengths or more into a single light stream to be
transmitted on a single fibre with each wavelength
The fibre has strong immunity to almost all carrying a time division multiplexed (TDM) signal.
kinds of interference, including lightning and does not Different data formats with different data rates can be
conduct electricity. It can therefore come in direct contact transmitted together since each channel is de-multiplexed
with high voltage electrical equipment and power lines at the end of the transmission back into the original
[1]. source. Different data can travel at the same time in an
optical fibre and such data include: Internet (IP) data,
Since the fibre is made of glass it does not Synchronous Optical Network data (SONET), and
corrode and is it unaffected by most chemicals. This asynchronous transfer mode (ATM) data [12]. DWDM is
makes it possible to bury it directly in any kinds of soil or the central technology of all optical networks because it
exposed to any ache conditions without significant has solved the "fibre exhaust" problem and which is the
concern [1]. major reason why it is been used in a long haul signal
transmission. A basic DWDM system contains several
Since light is the only signal in fibre there is no main components:
possibility of a spark from a broken fibre. Even in the 1) Optical Multiplexing Terminal (OMT): This is
most explosive of atmospheres, there is no fire hazard, an uni-directional DWDM equipment that allows
and no danger of electrical shock to personnel repairing wavelength to be transmitted and received and it contains
broken fibres [1]. one wavelength converting transponder known as optical
transponder unit (OTU) for each signal it is carrying and
Fibre optic cables are immune to outdoor it is offend refer to as lambda ( ). The input optical
conditions allowing it to be joined directly to telephone signals into the OMT is received by the wavelength
poles or existing electrical cables without concern of a converting transponders, it convert the signal and
possible signal pickup [1]. retransmit the signal using a 1550 nm band laser [13].
A fibre optic cable is usually smaller and lighter 2) Optical Line Amplifier (OLA): This is also
in weight than coaxial cable with same information known as intermediate line repeater which is simply
capacity. It is required little duct space making it easier to regenerating equipment that reproduces or boosts the
handle and to be installed [1]. same signal down the designated paths and it is placed
approximately at every 80 – 100 km to compensate the of road expansion or any other construction but it is still
signal power in the fibre. An erbium doped fibre perhaps the best means for media transmission both for
amplifier (EDFA) is used to amplify the signal which long haul and metro transmission.
usually consists of several amplifying stages [13].
are used to correct likely errors caused by a noisy becomes a major impairing parameter of consideration for
channel. Common coding applications are found in signal transmissions. The degrading effects of noise and
multimedia systems such as video, audio, satellite rainfall warrant some reasonable link margin.
services. The drivers of coding and modulation decisions The generic satellite link equation is written as,
are power-limited system and bandwidth-efficient
systems respectively. Coding operations are partitioned
into source coding and channel coding. As shown in fig.1, (2)
channel coding increases the bandwidth due to the where Pr is the received power in dB, Pt is the transmit
addition of redundancy bits which is traded for good power in dB, Gt is transmit antenna gain in dB, Gr is the
quality. Source coding involves the removal of unwanted receiver antenna gain in dB, R is the distance between the
information from the message, which invariably reduces
bandwidth within a satisfactory quality for the decoding.
transmitter and receiver, is the signal wavelength in
If the symbol decision is made at the
detector/demodulator, then such process is considered a
hard decision. A decision is said to be soft if such symbol
meters. The squared term is called the free space loss.
decisions are made at the decoder. The key parameters
Equation 2 can be expressed in terms of noise spectral
derivable from the received signal-to-noise ratio (SNR)
density.
are bandwidth efficiency R/B, and the bit energy to
spectral noise density ratio (Eb/N0). The choice of coding
and modulation has the capacity to deliver high quality (3)
digital information [2]. The combination of coding and where T is the receiver system temperature in K, K is the
modulation is called coded modulation. The system Boltzmann’s constant (-228.6 dBW/K/Hz), Gr/T is called
spectral efficiency ⍴ , of a coded modulation determines the figure of merit and KTs represents the noise power
the bandwidth B requirement. Ideal coded modulation spectral density N0.
should have as minimum error probability PB as possible
with low Eb/N0 but with high spectral efficiency ⍴ . From . (4)
VI. CHANNEL CAPACITY
equation 7, SNR is a product
Channel capacity C defines the maximum number of
bits per second (b/s) that can be reliably sent over a
channel [3]. Shannon-Hartley theorem expressed channel
capacity in the light of additive white Gaussian noise
(AWGN) as:
(5)
where C is the highest number of bits that can be reliably
transmitted per second, SNR is the signal-to-noise ratio,
Fig. 1. Coding and modulation system.
which is the ratio of the received power and noise power
and B is the channel bandwidth in hertz (Hz) [4].
of Eb/N0 and R/B, where R is the transmitted data rate
Equation (5) is called Shannon-Hartley law. The main
(bps).
significance of equation (5) is to take into cognizance that
Channel encoder adds redundancy bits (n-k) to the
there is a limit of data rate that can be being transmitted
information bits (k) in order to curtail transmission errors.
over a noisy channel. Equation (5) can also be written as:
In other word, k bits data is assigned to an n-bit
codeword, denoted by (k,n) code, resulting to k/n code
rate r. The symbol of m bits, with Ts sec symbol duration , (6)
is then mapped into one of the possible M waveforms by
where Pr is the average received power in watts (W) and
the M-ary modulator. The signal is then transmitted
N0 is the noise spectral density in watts per hertz (W/Hz).
within the require bandwidth, B.
In digital communications, equation (6) can be expressed
V. BASIC SATELLITE LINK BUDGET
as
Satellite link budget can simply be viewed as a balance
sheet of power gains and losses in a space channel
(propagating medium) between the satellite and an earth bit/s/Hz, (7)
station. Link budget therefore becomes a basic tool for where R is the data rate (bps), Eb is the bit energy, such
estimating system error performance (PE), which is that a modulator expended an average power of Eb/Tb
usually expressed as bit energy to noise spectral power watts on each bit, where Tb is the bit duration. At the
Eb/N0 in digital systems. The values of Eb/N0 threshold receiver, the ratio of average received power to noise-
drive the choice of modulation scheme to be adopted in a power spectral density Pr/N0 and the bit energy per noise-
Gaussian noise environment. Since satellite links operate power spectral density Eb/N0 are related as follows:
on line-of-sight principle, free space path loss (FSPL)
(8)
Data rate to bandwidth ratio R/B is referred to as the
channel spectral efficiency or bandwidth efficiency. As
bandwidth B tends to infinity or as spectral efficiency
tends to zero, Eb/N0 tends to (log2e)-1 = 0.693 ≈ -1.6dB
which is called the Shannon limit as shown in Fig. 2. This
is the limit value of Eb/N0 below which system cannot
operate at capacity. Spectral efficiency indicates the
efficient utilization of the bandwidth resource. If a
message of data rate R bps is to be transmitted over a
channel capacity C bps; if R < C, then small error
probability (PE) can be assumed by implementing
intelligent Coding scheme. At R = C, the system is said to
be operating at boundary level, which is not advisable.
When R > C, then not communication can be achieved
since the data rate is greater than the capacity, hence, it is
described as unattainable region. Fig. 2 shows clearly the
regions of power limited and bandwidth limited region
with regards to capacity and energy bit to noise spectral
density Eb/N0. A link is said to be power-limited if R < B,
which can lead to inefficient use of bandwidth.
Conversely, a link is said to be bandwidth-limited if R > Fig. 2. Bandwidth efficiency plane [7].
B, meaning that capacity can be increase by increasing From equations 11 and 12, we have
the transmit power [5]. Spectral efficiency and power
efficiency are mathematically related to SNR as
(13)
An expression relating the symbol rate Rs with the data
rate R is:
(9)
where Eb/N0 is the link power efficiency and R/B is the (14)
spectral efficiency.
VII. M-ARY SIGNALLING
The minimum required bandwidth for MPSK and
MFSK are given as
In an M-ary signaling scheme, each of the possible M
signals, known as a symbol comprising m bits, is mapped
to signal waveform during for transmission of interval Ts
[6]. The transmitted waveform thereby represents a (15)
symbol of m bits with Ts duration. M and m are related as:
(10) (16)
where m is an integer representing the number of bits per When a digital scheme transmits m bits over a period of
symbol. For data rate R bps, the bit duration Tb becomes Ts second occupying B (Hz) bandwidth, its bandwidth
efficiency ⍴ becomes
(11)
It also follows that (17)
where Tb is the bit duration in seconds. For M-PSK and
(12) M-QAM modulated signals, the bandwidth efficiency
where Ts is the symbol duration. using the Nyquist filtering at the baseband where B is
equal to Rs, ⍴ is given as
⍴ = (18)
where R is the transmission bit rate[8]. The bandwidth
efficiency increases as M increases, hence, M-PSK and
M-QAM are said to be bandwidth-efficient. Contrary to
MPSK and MQAM modulations, in MFSK modulations, Suppose the modulation scheme and possibly coding are
the bandwidth efficiency ⍴ is given as: required to meet certain performance requirements such
as bit error probability PB and data rate R are known. The
available bandwidth B and the received signal power to
(19) noise-power spectral density Pr/N0 are known. There is a
Bandwidth efficiency decreases as M increases, hence, trade-off between spectral efficiency (R/B) and energy
MFSK modulation scheme is not bandwidth efficient, but efficiency (Eb/N0) to achieve performance requirement PB
bandwidth-expansive. [9].
At the receiving end, the demodulator is expected to Step 1: Determine whether the system is bandwidth-
make a correct decision on the received S/N0 waveform limited or power-limited, i.e. compare R with B. If R > B,
base on predetermined conditions. The probability that it that is bandwidth-limited, then think of MPSK
will make a symbol error PE(M) is modulation, since MPSK modulations are bandwidth
efficient. If R < B, then think of MFSK modulation.
Step 2: Use equations 14 to 16 to determine the minimum
bandwidth W. Ensure that W is not greater than the
available bandwidth B, otherwise select the smallest
(20)
value of M that satisfy this condition.
where Q(x) is the Q-function sometimes called the
Step 3: Equations (17) and (18) can be used to verify how
complementary error function. Equation 20 is valid for
bandwidth efficient your design is.
the MPSK modulation techniques. For MPSK signaling
Step 4: The value Eb/N0 can be obtained using equation
system, symbol error probability PE is related to bit error
(8), which is valid for MPSK and MFSK.
probability PB by
Step 5: Equations (20) to (23) are used to verify if the
performance requirement is met. Q(x) can be solved using
. single Matlab code “qfunc(x)”. If the answer satisfies the
(21) specified PB, then your modulation scheme is considered
For MFSK, the symbol error probability is given as: alright without coding. This scenario is referred to as
uncoded system
Step 6: A coded system becomes necessary when
(22) applications are critical and the required performance
PE can be expressed in terms of PB. tends to gulp more bandwidth and power than what is
available. Bandwidth-limited and yet power-limited
system requires performance improvement using coding
. (23)
mechanism such that the system can operate within the
Coding gain G in dB, is the measure of power saving
available satellite bandwidth.
between when a system is coded and when un-coded
Step 7: The choice of code rate r (k/n) should enlarge the
given the same modulation and BER.
transmission bandwidth outside the available channel
bandwidth. Suppose we consider a real-time digital TV
(DTV) application over the satellite which requires
(24) modulation and coding. And we presume a modulation
A channel encoder with code rate k/n, processes a data scheme whose bandwidth is calculated as 9 MHz while
rate R to produces a channel rate Rc which is sent to the the available channel bandwidth is 12 MHz, leaving a
modulator which further yields a symbol rate Rs. space of 3 MHz, representing 25% tolerance. Since
channel coding increases bandwidth, we therefore take
(25) advantage of this liberty for coding. It therefore follows
that the code rate must not be less than 0.75, in other
word, the code must not gulp more than 25% of the
(26)
carrier bandwidth. This means 3/4, 5/6, 7/8 FEC are
Due to coding process, Pr/N0 arriving at demodulator’s
suitable code rates. The task before us is to save power at
input is given by
the expense of the bandwidth at our liberty in order to
meet the BER performance requirement.
Step 8: Calculate the coding Gain which is a measure of
(27) power saving between a coded and uncoded system.
where Ec and Es are channel and symbol energy IX. OUTCOME
respectively. The effect of effective combination of coding and
The demodulator yields channel error probability Pc given modulation scheme yields a tremendous bandwidth
as utilization and coding gain. The effect of the coding gain
is a remarkable energy saving which improves link
availability and the transponder can now operate without
(28)
distortion.
VIII. CODED MODULATION SELECTION METHODOLOGY
Abstract: Using sun light as source of energy led to propose as geosynchronous orbit (GEO). After that, few different
by scientists that solar collectors be located in geostationary aspects were proposed as a part of “Space Exploration
orbit. Those solar collectors are recognized as Solar Power Initiative”. The aspects proposed were centred on some
Satellites (SPS). crucial reductions in cost of space transportation and the
The objective of the solar power satellite (SPS) is to
transform solar energy in space for use on Earth. The solar
improvement in the technology of advanced photovoltaic
energy collected by SPS would be transformed into electrical tools, microwave beaming and laser power beaming.
energy and then into microwaves. The microwaves would be Conversion of solar to electrical energy using solar arrays
beamed to the Earth's surface, where they would be received would be the key function of the SPS. Microwave
and transformed back into electricity by enormous array of generators which constitute the part of a planar, phased-
devices known as a rectifying antenna, or Rectenna. The array transmitting antenna (Rectenna), would be feed
SPS idea has the prospective, not only for base with electricity by these solar arrays. At desired location
uninterruptedly load power generation on a global scale, but on Earth, a very low power density microwave beam
also signifies an evolutionary track for increasing human would be directed by Rectenna to one or more receiving
activities in space and the usage of extra-terrestrial
resources.
antennas. The function of the receiving antennas would
This paper will emphasise on the idea of the SPS, an be to safely and efficiently converting the microwave
approach for an evolutionary advancement of SPS to meet energy to electricity which would be transmitted to the
requirements for power supplied for use on Earth and a users.
growth path to achieve the potential of power from space for
use on Earth and results of assessments of key subjects Congressional Office of Technology Assessment and the
including financial concerns and ecological disputes as well National Research Council of the National Academy of
as physical resource necessities including materials Sciences performed few assessments on the SPS in late
availability and energy pay-back periods. 60’s and early 70’s. Procedural, financial, ecological and
Keywords: SPS, microwave, Rectenna, electrical energy,
geostationary orbit
communal concerns were reflected by these assessments.
I. INTRODUCTION SPS design delivering 5 giga Watts power was evaluated
by a viability study in 1972 which could be used on Earth
[2]. Major technological, environmental and economic
The world is facing a rapid progression in technology. To
issues were acknowledged by the viability assessments
meet requirements of high standard of living for
and delivered the basis of explanation studies for further
increasing global population, viable opportunities must be
general structure.
delivered. Upgrading of energy resources within a
The aim of the SPS Concept Development and Evaluation
convincing planning perspective and economically
Program (CDEP) was the SPS assessment. “To develop,
reasonable cost is crucial for the attainment of a new
by the end of 1980, an initial understanding of the
world order and for the development of other energy
technical feasibility, economic practicality, and societal
resources like fossils, hydro and other renewable
and environmental acceptability of the SPS concept.” [3].
resources in future substantial planning and proper cost
No sole restriction was acknowledged by that assessment
analysis must be the primary objective[1]. The key
which would prevent the development of the SPS for
importance of the SPS model is to encounter not only
either procedural, financial, ecological or social causes. It
increasing universal requirements for electricity but also
also demonstrated that at receiving antenna which would
to switch alternative energy means like fossil, nuclear,
be situated on Earth would generate 5 GW of base load
hydro etc. within the perspective of meeting global
power as presumed by NASA SPS Reference System and
energy demands. When there is an agreement regarding
that the SPS perception is not theoretically impossible
its benefits for civilization, the SPS will turn out to be a
and it would be an evolutionary development in the sector
macro-project [1]. The belief of precisely by what finest
of power transmission from space to Earth. But it’s quiet
method to encounter upcoming energy demands centred
challenging to develop the SPS which has the capability
on the progress of suitable technology using circulated,
of using lunar resources. To shift from the existing SPS
moderate, renewable energy sources is contradictory. [1]
design theories to designs that are capable of using lunar
II. The SPS system
assets or may possibly be installed on the lunar surface,
To transform solar energy to electrical energy, SPS could requires international efforts and demonstration projects
use numerous methodologies. One of the conversion over a period of decades [4].
processes was the photovoltaic conversion. It was III. Economic and Societal Assessment Issues
designated as a suitable preliminary idea in place of
Some constructive results were attained when technical
photovoltaic cells which were already in extensive
assessment of the SPS as a part of CDEP in detail was
practice in telecommunication, Earth surveillance and
performed by US Department of Energy and NASA [5].
climatological satellites, in low-Earth orbit (LEO) as well
The major societal and economic concerns about the A. Health and Ecological Effects of Microwave Power
future development of the SPS were addressed in
significant detail by CDEP. Recommended economics of 1. Transmission:
the SPS is not essential for the near-term judgements The microwaves power density at which the public would
about the planning for SPS program. The funds allotted to be exposed to is 0.1 mW cm-2, which is at the boundary of
the SPS development errands and their importance is the the receiving antennas. The minimum power density
most significant factor. Significant approximations of the would be about 10-4 mW cm-2 at any point outside the
probable SPS market penetration are not provided by cost antenna location if as supposed for the NASA SPS
projections. Though, some important cost approximation reference system having 60 receiving antennas with
such as supplied power cost to specify economical and average space of 300 km away from each other in the
technical competitive power of the SPS, classify the continental United States [7]. U.S. guidelines for work-
foremost cost origins to lessen the estimated expenses, related exposure would be met with proper counteractive
improve a reliable agenda to assess unlike technical procedures by the workers working within the receiving
prospects, requirements of the raw material and antenna area.
determining its effects, labour costs, capital markets,
evaluating cost with other alternative energy supply 2. Non-Microwave Health and Ecological Effects:
technologies, conservational effects and societal impacts
Exposure to ionizing radiation of space workers is a
are provided by such cost studies. Different vital issues
major health risk. The provision of solar storm shelters,
such as, health and safety, cost, performance, resource
cautiously designed shielding for space vehicles could
necessities, environmental effects and other influential
lessen the hazards from ionizing radiation to space
issues were made the unit for the comparison between the
workers. High-energy, heavy ions stemming from
SPS and alternate energy technologies including coal,
enormous radiations are of greatest concern in GEO
nuclear and terrestrial photovoltaic systems [6].
because they may consequence in surpassing proposed
Few important points specified by the assessments were:
exposure parameters for workers. To establish probable
o The range of cost of SPS for its whole life cycle is
ionizing radiation environment in GEO, more data would
approximately similar to the cost range of other be required to lead the strategy of procedures to bound
alternate energy supply technologies space workers exposure to the ionizing radiations. [1]
o Health and safety impacts of all the technologies are
unique. B. Effects on the Atmosphere:
o Material requirements for SPS do not appear to The waste heat released by the suburban areas would be
hinder the development of SPS but production more than the heat released at the receiving antennas.
Thus, SPS would’ve less significant weather and climatic
constrains and ecological control standards can make
effects. In troposphere, the microwave power is absorbed
it critical. which is usually risen during heavy rainstorms, but still it
o Huge adjacent terrestrial space would be essential for would’ve less significant weather effects. Sulphur dioxide
the SPS and earthly unified photovoltaic systems concentration which is increased by the advanced space
though receiving antennas of the SPS could be transportation vehicles would not have precarious effect
located on land away from population e.g. sea shore. on the quality of air. There would be negligible quantity
But complete fuel cycle for all energy technologies is of nitric oxide and carbon dioxide would be formed by
the oxidation of almost all the carbon monoxide. Like the
approximately same.
negligence of the nitric oxide, the variation in the
o To function within the current regulatory universally averaged ozone layer because of SPS
environment may be challenging for the SPS, fusion introductions would be imperceptible too. Wastes
and other advanced energy technologies however, released by the rocket in the troposphere causes
international regulations which would be imposed on accidental weather alteration because of cumulative
SPS may possibly be applicable on other energy effects, would be likely and to diminish such effects,
supply technologies. constant inspection of rocket exhausts plus numerous
climatological circumstances would be required.
Not just key factors were analysed by The Department of
Dispersed launch trajectory could prove to be helpful in
Energy and NASA SPS program which included
mitigating the influence of rocket launches on the
ecological impacts, relative financial aspects, social
ionosphere. Hydrogen-oxygen propellants could be
concerns, program possibilities and other qualms but was
helpful because it would significantly condense the water
also concerned about fundamental technology.
vapour injection into the lower atmosphere and would
optimize the primary stage of launch course. However,
Environmental Effects
IV.
resident time of water vapours in the upper atmosphere is
Health and safety, ecologies, weather, and its connection extensive which may possibly consequence in adverse
with electromagnetic systems are crucial environmental effects.
influences related with the SPS and might affect human The influences of the effects of injection of argon ions
health. into the plasmasphere and magnetosphere by ion thrusters
are ambiguous. The site of the solar energy
transformation system and the microwave transmission helpful in diminishing adverse radiations at
antenna would be monitored by ion thrusters. frequencies other than its operating frequency
These uncertain effects of argon ion injection into Careful positioning of the receiving antenna,
plasmasphere and magnetosphere needs to be determined
including trade-offs among positions of the
and mitigation of these effects would be the development
of more advance ion-thrusters propellants which would antennas nearby energy load centres.
reduce any disruption of the plasmasphere or variations in The power of the microwave required to create
the magnetosphere interface with the solar wind interference is very less therefore there is no chance
of obstruction of the SPS with other satellites in
C. Effects of Ionospheric Disturbance on GEO for example communication satellites. [9].
Telecommunications: V. Energy Utilization:
Ionospheric electron density, electromagnetic energy When the energy proportion of SPS and other energy
frequency, electron collision frequency and geometric production approaches are compared even if the fuel is
field strength are the factors on which reversion and excluded or included, the SPS appears to be better than
recurring of radio waves to Earth depends. That is why other energy production approaches [10]. One year is the
ionospheres vital to telecommunications. approximated time-frame for energy payback period for
Telecommunication system’s performance can be altered SPS. The time period of one year is approximated by the
by variations in the ionosphere. Loss of data and radio technologies which the SPS would use and likely
signal weakening can ensue by these small-scale development in those technologies. [11].
irregularities. Ionosphere heating by microwave beam and VI. Availability of Materials:
space vehicles emissions could cause deviation in The materials which the SPS would require for its
ionosphere. Suitable trajectory control can help to reduce assembly are tungsten, silver and gallium but there are
the effects of rocket exhaust effluents. However, lesser supply limitations on these materials. Other components
portion of ionosphere could be affected by ablative which would be used to assemble SPS for example ion
constituents and oxides of nitrogen during re-entry of the thrusters, dipole rectifiers, microwave generators, and
recoverable booster and orbiter stages. graphite compounds are industrially acceptable and could
It has been specified by the experiments done on the be used for development of SPS. Most of the commodity
effects of microwave beam heating of the ionosphere that materials which are very vital for SPS could be
at a highest power density of 23 mW cm-2, the substituted by lunar resources
telecommunication system’s performance would not be
badly affected by the microwave beam and that the power VII. PROGRESS IN THE FUTURE
density could be increased. [8]. There is increasing acknowledgment that the possibility
These tests laid influence only in the subordinate of SPS has been triggered by advancement in
ionosphere as compared to the microwave beam power astronomical platforms and technologies in few countries.
densities because of equipment restrictions. It is promising now to project inclinations in machineries
crucial for applications of SPS and to institute technology
D. Electromagnetic Compatibility: expansion goals foreseen for a universal SPS system. The
For using electromagnetic spectrum, national and most expected picture for SPS development is meeting
international requirements must be fulfilled by the SPS. transitional aims with definable benefits. The SPS
So, SPS must be designed and functioned in a way that it symbolizes a productive field for innovations. An
meets those requirements. Due to unique quantity of approach can be planned for the development of the SPS
microwave power transfer from space to Earth with that categorizes the fundamental standard technologies
magnitude of 7km of the microwave beam of the SPS and their application to particular intermediate tasks.
reference system at Earth’s surface, there is perspective of The growing competencies obligatory for previously
interference production. This production of interference intended space projects would help the manufacturing
can cause disruption in communal infrastructures, arrangement thus could provide the ground for
military organizations, radar, aircraft communications as development of SPS. Projects such as the SPS are
well as radio and optical space science. If the geographic doubtful to be followed until guidance for the
range is extensively affected the microwave beam will development of best applicable design for the SPS is
have low potential of interference. Interference created by provided by the data from other projects at continuous
High-power radar systems have parallel electromagnetic “terrace” levels. The postulation underlying the
intensities, but over some degree of extents. “terracing” method is the development of the advanced
Abstract: The increasing demand for ICT services all The VSAT earth station consists of two units. The
around the world has considerably increased. With research outdoor unit is the interface to the satellite. It includes the
going on at remote places, military bases in remote antenna, transmitting amplifier, low-noise receiver, up
locations, maritime services where the normal technologies and down converters and frequency synthesizer. The
cannot provide services, the use of VSAT through
Geostationary satellites has been able to provide numerous
indoor unit is installed at the user’s premises. It includes
applications in ICT. We use mobile phones, internet, fax etc. the end user equipment link the modems, PC etc. [7].
for communications and other entertainment purposes
through various operators across the world which cannot 2. COMMUNICATION SATELLITES
function in certain areas where these are extremely
essential. VSAT (a ‘Very small aperture terminal’) is a Communication satellites are the links being used for all
satellite ground station which accesses data from the kinds of telecommunications, broadcasting, enquiry
geosynchronous orbit. VSATs are composed of three main
services etc. They work under the ‘Relay function’ which
parts namely, the antenna, transceiver, and the modem.
The whole system can be placed in any location and can be means that the satellites amplify and translate the carriers
oriented to the line-of-sight of the satellite to transmit and transmitted by earth stations and relay them to other earth
receive data. VSATs are efficient in data transfers, emails, stations. The command links that monitor and control the
streaming, VOIP etc. This paper emphasizes on the satellites is TTC (Telemetry, tracking and command).
components, functions and working of VSAT, the satellites The present VSATs use geostationary satellites.
used for maritime communications and their zones, and the A communication satellite consists of a platform and a
frequency bands where these are operated. Also, payload. The platform as it means consists of the physical
understanding the advantages and disadvantages of VSATs. structure that supports the satellite, power supply using
solar panels and batteries, attitude and orbit control,
Key Words: VSAT, geostationary satellite, satellite
communication, radio frequency links. propulsion systems and the TTC equipment. The payload
is the internal part of the satellite which comprises of the
antenna and the electronic systems. In detail,
1. INTRODUCTION accommodates the receiver (RX) which includes the wide
band amplifier and frequency down converter, the input
multiplexer which splits the carriers into sub-bands which
Advancements in satellite communications have led to
need to be amplified to required level, the transponders (
the development of smaller earth stations namely VSATs.
TWT or SSPA) and the output multiplexer which
The term VSAT stands for very small aperture terminal.
combines the carriers and relays them to transmitting
Ever since VSATs have been introduced, their popularity
antenna for transmission [7].
and usage have exponentially increased due to its
The present VSATs use the geostationary satellites. These
multiple applications, low cost, integrated network
are satellites orbiting around the earth and hence their
management, easy installation etc. They have been more
path is circular. They are present at an altitude of 35,785
widely used in regions where terrestrial framework was
km directly above the equator. The time period of such a
not supportive. [7]
satellite is almost 24 hours which means they can be
The antenna of a VSAT is not more than 2.4m. Terminals
considered as stationary with respect to earth. This
can be directly plugged into a VSAT to access network.
makes it easy for the satellite to cover large distances
They are connected to each other through geostationary
without delays. Also, satellites in the geosynchronous
satellites via radio frequency links which are modulated
orbits exhibit almost no Doppler effect [5, 7].
carriers conveying information. Basically, the satellites
Frequency re-use is an interesting factor for any
receive these carries from the transmitting earth stations
satellite communications. This technique is the use of
(uplink), amplifies those carriers and transmits them to
same frequency for both transmit and receive by using
receiving earth stations by translating their frequency to
different polarization schemes such as orthogonal and
lower bands to avoid interference.
angular polarization.
The advancements in the satellite industry like solid state
For a VSATs antenna to be in a qualitative connection
power amplifier, modems, processors etc. have resulted in
with a geostationary satellite means taking into
developments of VSAT for various applications. Cost
considerations some important factors such as, latitude
plays an essential role in user’s decision to invest in
and longitude (location of the VSAT antenna), elevation
satellite network [1].
angle, coverage and obstruction. In other words, the
VSATs can be used for broadcasting, one-way services
VSAT antenna will fully function when installed in a
like enquiries, two-way interactive services, VoIP etc.
location where it can access direct line-of sight with the
and also for military purposes where communications to
the base are of utmost importance [2].
3. VSAT SYSTEMS
A. Network Structure
C. Frequency Bands
satellites cover most parts of the world where as Ku band protection. Also the approval from the landlord
satellites operate mainly over Australia, Europe, North for the antenna installation, cables etc. is a must
America and East Asia. [7].
The increased amount of networks using the already
congested frequency spectrum makes it impossible to
E. Installation
avoid interference. In some frequency bands the angular
spacing between geostationary satellites could be as low
as 1.5 degrees. Now, this becomes comparable with the The installation of the complete network includes the
antenna beam width leading to interference. Hence, some installation of the Hub, the VSAT and antenna pointing.
systems have evolved the use of spread spectrum The hub is the central monitoring equipment for a star
(CDMA) to fight the issue of interference. But not just type network and is relatively large and complicated to
CDMA, ‘smart antennas’ could be seen as an important install. This takes about two to four weeks for
part of future developments [2, 5]. installation.
D. Regulatory aspects The VSAT is installed at a place where it is directly
accessible for the user. It could be roof, wall or ground
mounted. Typically a VSAT installation calls for a site
Regulations apply on VSAT systems at different points
survey, preparation, equipment installation and testing.
such as:
The antenna must then be pointed in the line of sight of
1. Licensing of operation: This is to ensure that no
the satellite. It is oriented according to the azimuth (AZ)
interference is caused due to unregistered or and elevation angle (E). The antenna adjustment is only
unrecognized networks. Every operator needs to done during the installation as the antenna control unit
have a license to access certain frequency by (ACU) will be able to keep track on the direction from
following the procedure set by the ITU. then on [4, 7].
2. Licensing of equipment: For the earth station
4. NETWORK AND LINK ANALYSIS
equipment, the equipment standards set by the
set by the standardization organization of the
A. Network
respective countries must be followed.
A Link can be considered as a physical support between
the transmitting station and the receiving station. A
network on the other hand, is a combination of several
links and nodes.
A given network can be made up of different kinds of
links such as:
i. Simplex: It represents only one way
communications like television broadcasting.
ii. Half-duplex: This allows two-way traffic but
allowing only one way traffic at a given instant
of time.
iii. Full-duplex: This is the most complicated link
allowing two-way interactive traffic [1, 3].
B. Protocols
This could be sometimes be inefficient because when In VSAT systems it is very important to have effective
inactive, the bandwidth is idle and wasted and therefore, and efficient antennas given than they are already small in
other advanced protocols include the use of variations of size. The Equivalent isotropic radiated power (EIRP) is
random multiple access, fixed allocation TDMA (time the combination of power and antenna gain. It can be
division multiple access), demand assigned TDMA, expressed as,
contention based TDMA, or CDMA. Slotted ALOHA
and reservation TDMA are widely used for bursty traffic
and bulk data transfers respectively [2, 3].
Where P (t), L(c) and G (a) represent the transmitted
C. Network management system power, cable losses and antenna gain respectively.
AC Induction Motors: Operating Principles, and Starting Techniques
J. Gavaza
School of Engineering, Design and Technology
University of Bradford
Bradford, West Yorkshire BD DP
AbstractAC induction motors operate by
transforming electrical energy into mechanical BACKGROUND AND OPERAT)NG PR)NC)PLE
energy. Currently, these machines consume the
highest amount of electrical energy in industrial The key components of an induction motor are
and business applications. When a motor is stator, rotor, end shields, bearings and terminal block
started with full voltage from a rest state, a large shown in an exploded view in fig. . An air‐gap tends
current is drawn from voltage supply system to increase the reluctance between the stationary part
resulting in a momentary voltage dip. Hence, stator and rotor, resulting in boosting of the
starting methods that incorporate overcurrent magnetising current or reactive current. An induction
and lowvoltage protection are used to reduce motor s performance is enhanced by designing a small
current at startup. air‐gap.
This paper will describe some of the The main structure of an asynchronous motor
electromechanical and solidstate starting carries the stator windings that are electrical
techniques which are commonly employed to start degrees apart. Squirrel‐cage rotor and wound rotor
threephase induction motors. Advantages and are the two variations of the induction motor s
disadvantages of each method will be pointed out, rotating member.
with particular reference to starting torque,
voltage, speed, frequency and starting current.
Keywords: AC induction motor, starting technique,
starting current, torque, speed
)NTRODUCT)ON
AC induction motors have been the backbone of
power transmission in industrial, domestic and
commercial applications for close to a century [ ].
Estimates suggest that these rotating machines Figure : Exploded view of an AC induction motor [ ].
consume up to % of generated electricity [ ], [ ]
and consequently, the surge in energy costs has seen Supplying a three‐phase voltage to stator windings,
an accelerated employment of energy efficient motors. results in the production of a magnetic field that
Efficient motors contribute significantly to the rotates at synchronous speed. Equation illustrates
conservation of energy, reduction of greenhouse gas that synchronous speed is a function of supply
emission, and an increase in company production. frequency and number of poles.
Traditional motor starting techniques like full
voltage starters also known as DOL direct on line ,
tends to introduce current spikes on electrical
systems much to the annoyance of the energy
supplier. At start up, DOL starter consume between six
and eight times the full load current. These high The rotating magnetic field cuts across the skewed
starting currents are inevitably accommodated via use rotor bars, inducing an electromagnetic force e.m.f.
of up‐rated, bulkier and more expensive starting gear. into the rotor. )nduced current starts to flow in the
(owever, reduced voltage starting methods offer a rotor circuit and in turn produces its own rotating
better alternative despite an inherent reduction in field. A turning force or torque is then produced due
starting torque. Examples of such starters include to interaction of rotor and stator magnetic fields [ ].
star‐delta, autotransformer, primary rheostats, The stator magnetic field dictates direction of motor
primary resistors, rotor resistors, and soft starters rotation and output speed Nr is lower than
also known as solid‐state starters [ ], [ ]. Modern synchronous speed. )f the rotor was turning at same
and efficient starting methods like soft starters and speed as stator field, there will be no interaction since
variable frequency drives VFD ensure smooth motor the rotor will be at standstill relative to the stator
acceleration and low current consumption at start up magnetic field. Slip as defined by , is the difference
[ ]. between synchronous speed and rotor speed [ ].
Figure : Torque/Speed curve of an induction motor [ ].
START)NG TEC(N)QUES Figure : DOL power and control circuits [ ].
When an induction motor is started from rest, there
is a momentary inrush of very large current because B. Reduced Voltage Starters
there will be low system impedance [ ]. This high
current can result in machine overheating if As implied by its name, voltage fed to stator
sustained for a prolonged period and induces windings at starting is reduced. These starters allow a
mechanical stress. Starting techniques for an motor to accelerate to its rated speed in easy steps so
induction motor can be full voltage starting or that inrush of currents is reduced. Starters of this type
reduced voltage starting. Use of reduced voltage are electromechanical or electronic by design. Soft
starting methods reduces starting currents and starters and frequency converters belong to the
provides overcurrent protection as well. (owever, the electronic group whilst star‐delta, auto‐transformer,
downside of this alternative is reduction of rotor primary rheostats, and rotor resistance starters are
torque at start‐up [ ], [ ]. recognised as electromechanical starters.
1) Star delta Starter (wye‐mesh): This method can
A. Full Voltage Starter only be applied when all the six ends of the stator
windings are available on the terminal block as in Fig.
1) Directonline Starter (DOL): Across‐the‐line . )t is best suited in applications with light loads
circuit comprises of a three phase contactor coil can because heavy loads might inhibit the motor from
be V or V , triple‐pole miniature circuit gradually increasing its speed to full load speed.
breaker MCB and an overload protection relay. This This technique starts by connecting the motor
circuit connects the full mains voltage to the stator windings in star formation and when motor has
windings and motor consumes current as it needs it. )t achieved about % of its rated speed, configuration
draws about six to eight times the full load current is changed to delta. Thus, star connection is for
whilst torque available is only about twice the full load starting from rest and delta mode is for running.
torque [ ]. DOL starters are not suitable in processes Starting the motor in a star connection reduces the
that involve regular starts and stops.
Fig. is a schematic wiring diagram of the DOL s voltage across each phase to . % of the mains
power and control circuits. The advantages of this voltage. Since torque is proportional to square of
starting mode include simple, cheap, reliable and high
terminal voltage, rotor will only develop about of the
torque at start‐up. Disadvantages include high
torque produced by a DOL motor [ ], [ ], [ ]. Under contactors are controlled by a timer. Although this
method provides comparatively higher torque than
this condition, motor draws only a of DOL starter s the star‐delta, it is more expensive and bulkier [ ].
line current. Star‐delta starters employ a timer that
facilitates the change from star formation to delta
formation.
)ts key advantage is simple configuration, while it
has a drawback of producing a small shock to the
system at changeover from wye to mesh.
Figure : Three‐phase auto‐transformer starter [ ].
3) Primary Resistance Starter: This system connects
three or more primary resistors in series with stator
windings. The magnitude of voltage availed at motor
terminals is determined by the value of resistors. The
value of resistors employed should ensure that
adequate torque will be developed by rotor in order to
prevent motor from stalling. )n power circuit depicted
in Fig. , three‐phase contactor labelled A is
energised so that resistors are connected to the stator
circuit. This improves the power factor of the system
at starting but its efficiency is reduced because
resistors emit a lot of heat [ ].
After elapse of pre‐set time, contactor labelled B is
energised whilst that labelled A drops out so that
resistors are excluded from the circuit. As is the case
with other reduced voltage starters, reduction of
voltage at start‐up results in subsequent reduction of
both starting current and starting torque.
Figure : Power circuit wiring of a star‐delta starter [ ].
2) Autotransformer Starter: Three‐phase auto‐
transformer that is built with tapped windings is
inserted between incoming three‐phase supply and
stator windings of the motor. The transformer
tappings are designed to output %, % and % of
line supply voltage [ ]. The tap position employed at
Figure : Primary resistance starter [ ].
start‐up is determined by load requirements. Reduced
starting voltage implies that both starting current and Because of heating up of the resistors during start‐
torque will be lowered. When motor accelerates to up, there is need to allow these resistors to cool down
about % of rated speed, an electronic timer cuts the before motor is restarted. This condition inevitably
transformer out of the circuit and motor receives full limits its starting frequency. Primary resistance
mains voltage. starters have an advantage of smooth starting and on
For large induction motors, auto‐transformers are the other hand have two main disadvantages of
operated in oil so that arcing is suppressed during the inability to easily vary the resistances and power loss
switch over period. As is the case with wye‐mesh as heat during starting [ ], [ ].
starter, small shock is introduced to the motor and
coupling gear during changeover from transformer 4) Rotor resistance Starter: As opposed to the
tapping to full mains voltage. Fig. is an illustration of primary resistance starter configuration, this starter
an auto‐transformer starter, where the start and run includes a bank of resistors which are in series with
the rotor. (ence, it can only be used on a wound rotor
induction motor, thus a slip‐ring motor. Carbon or
copper brushes mounted on three slip rings
electrically links external resistors to the rotor.
Wound rotor motor is started with full voltage fed to
its stator windings whilst the starting current is
limited by star connected resistor bank.
)n Fig. , the external rotor resistance could be
liquid rheostats or resistor bank. Maximum external
resistance is initially added to the rotor circuit at
start‐up and this resistance is progressively
eliminated as motor accelerates. Three phase
contactors and timers are utilised to cut out the
resistors in pre‐timed stages. After attaining full rated
speed, resistor bank is completely excluded from the Figure : Torque/Speed curve for various rotor resistances [ ].
rotor circuit.
5) Frequency Converter Starter: These starters are
also known as adjustable frequency drives AFD ,
variable frequency drives VFD or just AC drives.
Three prominent features of this starter include a
converter three‐phase bridge rectifier , direct
current link, and an inverter. This starter varies the
frequency and voltage fed +to the stator windings,
resulting in the alteration of current and torque at
start‐up.
Since the speed of an induction motor is directly
proportional to mains supply frequency, adjusting
frequency supplied to the motor will change motor s
Figure : Slip‐ring wound rotor motor starter [ ].
speed [ ]. (owever, reduced frequency results in the
The external resistance serve to bring down starting reduction of impedance in the motor circuit. Low
current, enhance power factor, and also at the same impedance conditions will increase starting current,
time improve the torque at start‐up [ ]. This type of and hence voltage has to be reduced at the same time
starter is ideal in starting heavy loads since it can with frequency to ensure low starting current.
generate high starting torque whilst using low The commonly employed variations of this starter
current. The main drawback of this starter is the need are voltage source inverter, current source inverter
for regular maintenance. The conductive carbon dust and pulse width modulation [ ].
from slip‐ring brushes has to be cleaned off on regular
basis and depths of the brushes require monitoring. i) Voltage Source Inverter (VSI): The first section of
Fig. illustrates the variations of the starting this VFD which accepts the line voltage is a three‐
current and locked rotor torque as rotor resistance is phase full wave rectifier which can be designed from
altered. )n Fig. , dashed lines denote characteristics diodes, SCRs or insulated gate bipolar transistors
of starting current and solid lines represent torque. A )GBTs . (ere, the three‐phase voltage is transformed
rotor resistance starter, just like the other starting into a DC voltage. The second primary section referred
methods described above, incorporate mechanisms to as a DC link, employs electrolytic capacitors to store
for protecting an induction motor from overcurrent the DC voltage and also reduce a ripple from it. The
and under‐voltage. last stage aptly named inverter employs )GBTs to
convert the DC voltage into a variable frequency AC
voltage.
ii) Current Source Inverter (CSI): CS) s topology is
very similar to that of a VS). Power diodes are used in
this starter to convert AC voltage into DC value and an
inductor stores the energy. A gate turn off GTO is
used in the inverter section to transform DC voltage
into AC‐like voltage.
iii) Pulse Width Modulation (PWM): Fig. is a
schematic diagram representation of a PWM drive
that uses power diodes for three‐phase full‐wave
rectification. A large polarised capacitor is used in the
DC link whilst inverter section employs )GBTs to
determine the output frequency of the system. As is speed, so that adequate torque is available to
the case with the other two discussed VFDs, output accelerate its driven load. After attaining rated speed,
voltage is not a pure sine shape. thyristors are shorted out of circuit and full mains
voltage is supplied to stator windings.
Benefits of soft starting technique include reduction
of inrush current, controlled starting and stopping
sequences, reduction of machine stress, limitation on
the amount of torque adjustment in order to protect
motor from damage, and an increase in induction
motor s lifecycle.
CONCLUS)ON
This paper commenced by providing some theory
and operating principles of an induction motor that is
Figure : Circuit of a Pulse Width Modulation drive [ ]. based on Faraday and Lenz s laws. The commonly
employed starting methods were split into two sub‐
Benefits of starting induction motors with VFD
topics, i.e. full voltage starter and reduced voltage
include savings in energy costs, improved power
starters. The characteristics of the DOL starter and
factor, process can be easily controlled, low current at
demerits were pointed out.
start‐up, reduction of equipment stress and protection
Only six reduced voltage starting techniques were
against overcurrent conditions. (owever, their initial
considered in this paper. The configuration of each
costs are high and also produce harmonics that might
starter was explained and the trade‐offs created as a
interfere with supply lines.
result of reduction of starting current was also
highlighted. Amount of torque that would be available
6) Soft Start or SolidState Starters: These efficient
was quantified and it was stated that this torque was
starters provide smooth acceleration, deceleration
also determined by type of driven load. Finally, merits
and overcurrent protection to an induction motor [ ].
and demerits of each technique were noted towards
The magnitude of voltage fed to the motor terminals
closing stages of relevant discussion.
at start‐up is adjusted by varying the firing angles of
the silicon controlled rectifiers SCRs or thyristors.
This starter can have either three pairs of SCRs as
ACKNOWLEDGEMENT
shown in Fig. or two pairs facing opposite
directions, whereby the configuration depends on Author would like to thank Prof. Sheriff and Dr.
driven load requirements. (alliwell for providing detailed guidelines on how to
produce a decent academic paper whilst maintaining
professional ethics. Also, support from EDT subject
librarian, Kirsty Carver is much appreciated.
REFERENCES
[ ] A.O. Staub and E.L. Owen, . Solid‐state motor controllers,
)EEETransactions on )ndustry Applications. [Online].vol. A‐
,
pp. ‐ , Available: )EEEXplore,
DO): . /T)A. . . [Accessed: Mar. ].
[ ] M.A. Rahman, Modern electronic motors in electronic world.
Presented at )nternational Conference on )ndustrial Electronics,
Figure : Solid‐state starter indicating start and run positions [ ]. Control, and )nstrumentation, . [Online]. Available:
)EEEXplore, DO): . /)ECON. . .
When the starting voltage is low, so will be the [Accessed: Feb. ].
torque and locked rotor current. Besides eliminating [ ] E. (ughes, Electrical and Electronic Technology, th ed. (arlow,
Essex: Pearson Education Limited, .
unwanted shocks to the motor coupling at start‐up, [ ] T.(. Blair, phase AC motor starting methods: an analysis of
low voltage also facilitates soft transmission of torque. reduced voltage starting characteristics. Presented at
A precise adjustment of the firing angle ensures that Proceedings
rotor develops a turning force that exactly matches )EEE SoutheastCon, . [Online]. Available: )EEEXplore,
DO): . /EDM. . . [Accessed: Mar. ].
torque requirements of load from rest position. [ ] M.A. McElveen and M.K. Toney, , Feb. . Starting high‐
Consequently, start‐up current will be as low as inertia
possible. The control and firing circuits gradually Loads, )EEE Transactions on )ndustry Applications. [Online].
increase motor terminal voltage as machine picks up vol. , pp. ‐ , Available: )EEEXplore:
DO): . / . . [Accessed: Feb. ].
[ ] B.L. Theraja and A.K. Theraja, A Textbook of Electrical [ ] System Control Solutions Ltd, Enclosed Motor Starters. [Online].
Technology, th ed. New Delhi: S Chad and Company Ltd, . Available: http://www.scslow.co.uk [Accessed: Mar.
[ ] Electrical Engineering Portal, , Apr. . Construction of 3 ].
phase [ ] Natural Resources Canada, , Feb. . Energy Efficiency
AC Induction Motor. [Online]. Available: Reference Guide Electric Motors. [Online]. Available:
http://electrical‐engineering‐portal.com http://oee.nrcan.gc.ca. [Accessed: Mar. ].
[Accessed: Mar. ]. [ ] Redd, , Feb. . Wound Rotor Motor of 3Phase AC Induction
[ ] A. (ughes, Electric Motors and Drives: Fundamentals, Types and
Applications, rd ed. Burlington, MA: Elsevier, . Motor.[Online]. Available: http://www.inverter‐
[ ] J. Larabee, B. Pellegrino and B. Flick, )nduction motor starting china.com.
Methods and issues. Presented at )ndustry Applications Society [Accessed: Mar. ].
nd Annual Petroleum and Chemical )ndustry Conference, [ ] TECO‐Westinghouse, . Wound Rotor. [Online]. Available:
. http://www.tecowestinghouse.com. [Accessed:
[Online]. Available: )EEEXplore,
Mar. ].
DO): . /PC)CON. . . [Accessed: Mar. ].
[ ] (.(. (uffman, )ntroduction to solid‐state adjustable speed
[ ] All About Circuits, . Tesla Polyphase Induction Motors.
drives. Presented at )ndustry Applications Society Annual
[Online]. Available:
Meeting, . [Online]. Available: )EEEXplore,
http://www.allaboutcircuits.com DO): . /)AS. . . [Accessed: Mar. ].
[Accessed: Mar. ].
[ ] T. Albers, C. Cade, S. Ruffing and F. Robinson, Techniques in
motor starting. Presented at Pulp and Paper )ndustry
Technical
Conference, . [Online]. Available: )EEEXplore,
DO): . /PAPCON. . . [Accessed: Feb.
].
Abstract - The rising level of electrical energy be interfaced to grid system with prescribed voltage and
consumption due to population growth and industrialisation frequency operating limits. The following section will
has called for steady increase of the demand on the power discuss the hydroelectric and wind power generation, the
capacity, efficient production, transmission, distribution and associated power electronic interfaces and control
utilization of energy. The modern power electronics and
control systems technology are the keys for designing
technology applied to these sources, the role of power
electrical energy systems to generate more electrical energy electronics and control in transmission and distribution
to support the major trends in energy efficiency, renewables and finally a conclusion will be drawn.
integration, and load matching. II. HYDRO ELECTRIC POWER GENERATION
Hydropower plants, one of the methods of generating Based on the head of water, hydroelectric power station
B. Control Technology
In order to ensure good quality of power at the user
end, the frequecy must be constant at all time. In
hydroelectric power plant, this is achieved by the
governing system (penstock) of turbine generating units.
The following block diagram depicts the closed loop
control of the governing system.
.
Fig.4. Power electronic converter[8]
Fig.7. (b). Block diagram of automatic load frequecy control system [2]
III. WIND FARM GENERATION OF ELECTRICAL POWER
When the wind strikes through the blades of many
identical turbines, they rotate and spin. If these turbines
are coupled to generators , the rotation and spinning
rotate individual rotor inside the generator thereby
producing electricity. The power in the air flow is
Fig.11. Power Electronics for Synchronous Gernerator [7] Torque control for power regulation’
The variable voltage, variable frequency from the wind [12]
turbine is subjected to rectification using a diode bridge The use of PI controller can spread the operating medium
rectifier. To ensure constant DC link voltage of the for better transition between two medium. The following
inverter, a step-up chopper is used to adapt the rectifier diagram represents wind turbine control loops:
voltage [7]. The rectified voltage is made to be smooth
using a large capasitor and the inverted using
semiconductor switches. This voltage is then regulated to
a level required by the utility AC system using a
transformer. The power converter to the grid provides
fast control of active reactive power [7].
The general power electronics configuration for double
fed induction generator consists of an AC-DC-AC IGBT-
based PWM converter [7]. This is called back-to-back
because in the event of high speed, the large capacitor
stored energy from the grid and when the speed becomes
low, the energy stored is converted back to the grid
through a transformer.
sections of a capacitor bank [18]. This provides to AC. The ‘state-of-the-art’ of power electronics has
better control of fundermental frequecy and also for made the energy storage device to be bidirectional. This
dynamic power flow control. The following diagram means that energy storage device is capable of taking
shows the configuration of TCSC: power and providing power to the grid [7]. Battery energy
storage system(BESS) are not suitable for peak demand
operation, but rather provide power to a system that can
sustained by the battery [7]. The following diagram
shows the configuration.
[3] Prof. RE Sheriff (Editor), ‘’Electronics and [12] Hao Xu, Anjunxia, Shuju Hu, Nianhong Li, Honghua Xu,
Telecommunication Research Seminar Series’’, 11th ‘’Control of Variable-Speed Variable-Pitch Wind Turbine
Workshop Proceedings, School of Engineering Design and with Doubly-fed Induction Generator under Highly
Technology, University of Bradford. Turbulent Conditions’’ IEEE PES ISGT ASIA 2012
[4] Hesham E. Shaalan, ‘’Generation of Electric Power’’. 1569527141. Available: IEEEXplore. [Accessed 3rd Feb
[online].Available: 2013]
energysystems.princeton.edu/.../GenerElectPower__Shalaan. [13] Lucy Y. Pao, Kathryn E. Johuson, ‘’A Tutoria on the
pdf dynamics and Control of Wind Turbines and Wind Farms’’
[5] U.S. Department of the Internal Bureau of Reclamation [online].Available:
Power Resources Office, ‘’Reclamation Managing Water in multimechatronics.com/images/uploads…/Wind%20tutorial.
the pdf. [Accessed 3 Feb. 2012].
West’’,[online].Available:www.usbr.gov/power/edu/pamphle [14] I E C,’’ Efficient Electrical Energy Transmission and
t.pdf Distribution’’, [online]. Available:
[6] Practical Action,Technology challenging poverty, ‘’ Micro- www.iec.ch/about/brochures/pdf/technology/transmission.pd
hydro Power’’. [online].Available: www.cd3wd.com/cd3wd f.[ Accessed 5 Feb. 2013]
40/.../KnO-100157 micro-hydro energy.pdf. [Accessed: 10th [15] Pavloss, S.Georgilakis, Peter G. Vernados ‘’Flexible AC
Feb,2013] Transmission System Controllers: An Evaluation’’, Materials
[7] W.Kramer, S. Chakrabort, B.Kroposi, H. Thomas, ‘’Advance science Forum Vol. 670(2011) pp 399-406 c(2011) Trans
Power Electronic Interfaces for Distributed Energy Systems Tech Publications,
Part 1: Systems and Topologies’’, National Renewable Swtzerland.[online].Available:www.scientific.net/MSF.670.
Energy Laboratory,technical Report NREL/TP-581-42672, 399.[ Accessed 10 Feb. 2013].
March 2008. [online].Available: [16] D. Murali, Dr.M. Rajaram, N.Reka, ‘’Comparison of FACTS
www.nrel.gov/docs/fy08osti/42672.pdf. [Accessed: 15th Devices for Power System Stability Enhancement’’,
Feb.,2013] International Journal of Computer Apllications (0975-888).
[8] M. Elbuluk, N.R.N. Idris ‘’The Role Power Electrons in Volume 8-No.4, October 2010. [online].Available:
Future Energy Systems and Green Industrilization’’, 2nd www.iicaonline.org/volume8/number4/pxc3871701.pdf.
IEEE International Conference on Power and Energy [Accessed 20th Feb.2013]
(PECon 08), December 1-3, 2008 Jhor Baharu, [17] Renewable Energy, ‘’Static Var Cmpensator’’, Courseware
Malaysia.[online].pp. 2. Available: IEEEXplore. [Access sample 86370-FO. [online]. Available:
18th Feb. 2013]. www.labvolt.com/downloads /86370 FO.pdf.[ Accessed 4th
[9] Practical Action Technology Challenging Poverty,’’Wind March,2013].
Electricity Generation’’ [online].Available: [18] ABB, ‘’Power and Productivity for a better world , TCSC;
Practicalaction.org/docs/technical…/wind electricity Thyristor Controlled Series Compensation, Keeping grids
generation.pdf [Access : 23rd Feb. 2013]. together’’. [online].Available:
[10] Dr Olimp Anaya, ‘’Modelling and Control of Wind www.05.abb.com/global/scot/scot221.nsf/veritydisplay/.../A
Generation Systems’’, 2nd International Conference on 02-0158.pdf. [Accessed 7th march, 2013].
integration of Renewable and Distributed Energy Resources, [19] Mohamed Najeh Lakhoua, Mohamed Kamel Jbira, ‘’Project
December 4-8,2006. Napa, CA, USA. [online]. Pp.11. Management Phases of a SCADA System for Automation of
[online].Available: Electrical Distribution Networks’’, IJCSI International
www.4thintegrationconference.com/second/programdetail.as Journal of Computer Science Isses, Vol.9, Issue 2, No 2,
p [Access: 15 Feb.2013]. March 2012. ISSN(online): 1694-0814.[online].Available:
[11] Zhe Chen, Josep M. Guerrero, Frede Blaabjerg, ‘’A Revie of iicsi.org/papers/IJCSI-9-2-2-157-162.pdf
the State of the Art of Power Electronics for Wind
Turbines’’, IEEE Transactions on Power Electronics, Vol.24,
No. 8. August 2009. [online].Available: IEEEXplore
[Accessed: 17 Feb.2013]
I. INTRODUCTION A. Transients
Power Quality can be defined as the relative frequency Commonly called swells, surges and spikes, transients are
and severity of deviations in the incoming power supplied the most frequent types of power quality problems and
to electrical equipment from the steady 60 Hz sinusoidal are difficult to detect because they manifest only as a
waveform of voltage or current. These deviations may short-duration change in voltage. Transient disturbances
affect the operations of equipment and cause it to result from sudden injection of energy into a system i.e.
malfunction or fail [1]. heavy machinery start-up or lightning strikes. Transient
disturbance can be categorized as either unidirectional or
The present situation in which a lot of equipment and oscillatory [1].
processes are increasingly becoming sensitive to PQ
problems makes the availability of quality electric power Unidirectional transients are characterized by their peak
an important factor in our daily lives and every sector of value and rise time. They are caused by lightning, the
the economy. The key sectors greatly affected by power switching of inductive or capacitive loads, poor
quality are the continuous process industry and the grounding, electrostatic discharge and utility fault
information technology services. clearing. Its effects include the loss of data and physical
damage of equipment [3].
The occurrence of power quality disturbances can result
in huge financial losses with the consequent loss of Oscillatory transients are characterized by their frequency
productivity and competitiveness. According to a content and causes include switching operation such as
European PQ Survey carried out in 2008, overall PQ the energizing of a capacitor bank, distribution line or
costs in industry and commerce in the European Union cable or interruption of current to an inductive load [3].
(EU) economy is estimated to be about €150 billion per
annum. These losses represent a significant 5% B. Interruptions
proportion of the net profits made by the sectors under
review [2].
An interruption is defined as the complete loss of supply
voltage or load current. Interruptions can be categorized
Thus, provision of quality power must not be considered thus according to their durations:
an unimportant issue because without it many households
and industries will experience intermittent equipment
Instantaneous interruptions which occur between
failures, process stoppages, and shutdowns, safety
hazards and consequently economic losses. 0.5 to 30 cycles
Momentary interruptions which occur between equipment and thus, overheating of equipment and
30 cycles to 2 seconds tripping its circuit breakers [3] [4].
Temporary interruptions which occur between 2
seconds to 2 minutes E. Undervoltage
Sustained interruptions greater than 2 minutes
Undervoltage is a sustained condition of low voltage
Interruptions occur as a result damage to electrical supply outside normal tolerance. Causes of under voltage include
grid such as accidents, lightning strikes, animals and bad installation of voltage regulators and power conditioning
weather, equipment failure, tripping of circuit breakers devices between the utility and the loads as well as poor
and the use of power conditioners and utility protective voltage regulation. Equipment shutdowns and the
devices such as UPS [3]. overheating of motors are some of its consequences [4].
G. Electrical noise
H. Voltage Imbalance
I. Frequency Variations
Fig.4. Power Quality Solutions [7]
Frequency variations are deviations in frequency from the
nominal value due to sudden load changes. They usually
2. Distributed Resources – Distributed
occur in facilities or installations where power supply is
unavailable or poor, and standby generators (when Generation and Storage
heavily loaded) are used to provide power [3]. Frequency
variations affect time-related devices such as clocks, Distributed Generation (DG) is a concept of installing and
magnetic tapes and disks. operating small electricity generators connected directly
to the distribution network or at the customer side with a
III. SOLUTIONS TO POWER QUALITY rated power of typically less 10MW. They help isolate
power disturbances which originate in the grid and thus,
PROBLEMS ensuring quality power get to the end-user. They can also
serve as back-up power sources to critical loads when
Several approaches can be taken by utilities to militate sustained power outages occur [8].
against power quality problems and these can be done at
different stages electric power transmission, distribution When considering storage systems and even controllable
and utilization (customer equipment) as shown in Fig.4. loads, the name distributed energy resources is often
Utility companies can also offer additional used. Storage systems should be provided to supply
Utility/customer services to improve service quality. power to loads between the duration when outages occur
due to PQ problems and the start up of the DG which acts
1. Grid Adequacy as a back-up source. Popular examples of this kind of
system are the use of electrochemical batteries i.e. UPS
During the transmission and distribution of electric with a diesel-powered generator; and that of a flywheel
power, many PQ problems occur. Hence, a good with a diesel-powered generator [9].
transmission and distribution network must be well
planned and have proper maintenance routines in order to 3. Enhanced Interface Devices
be able to militate against PQ problems when they occur.
Using proper interface devices, loads from disturbances
Power system networks of nowadays usually have deriving from the grid can be isolated. These are also
sensors such as Phasor Measurement Units (PMU) along called Power Conditioners and their main function is to
them which help monitor power quality and automatically preserve power parameters within the limits required by
identify and sometimes resolve these problems when the load. Common examples of these devices are:
they occur thus, helping improve power quality.
Dynamic Voltage Restorer (DVR): operate as a series
voltage source connected between the load and the
disturbed power supply source thus, acting as a resonance. Active filters are able to eliminate different
voltage stabilizer. By using a step-up transformer or disturbances at the same time and provide a selective
stored energy to supply active and reactive power to harmonic compensation, improve power factor and
its output supply, the DVR’s output voltage is kept even provide solution for unbalanced loads [5] [8].
considerably constant [5] [8]. Uninterruptible Power Supply (UPS): is an interface
Transient Voltage Surge suppressors (TVSS): serve as between the mains power supply and critical loads
interface between the power source and sensitive designed to automatically provide power without
loads so that the transient voltage is clamped by the delay or transients during any period when normal
TVSS before it reaches the load [5]. TVSSs are used power source is incapable of performing satisfactorily
to reduce line voltage and transfer excessive voltage [5].
to ground [5].
Voltage Regulators: maintains a constant output 4. Development of Codes, Standards and
voltage despite variations in its input voltage. They
Regulation
are used to solve PQ problems such as voltage sag and
swells and transients [5].
In providing electric power to the consumers, utilities
Constant Voltage Transformers (CVT): use the ought to ensure that the power being supplied is of good
principles of resonance and core saturation to keep quality and also take into cognisance the tolerance level
voltage constant. The use of CVTs can result in more of end-users’ equipments to power disturbances. This
PQ problems than the ones being prevented if not thus brings about the need to have proper measures and
properly applied. CVTs are not usually used again due adequate regulations guiding the provision of electric
power to consumers.
to the development of better and advanced interface
devices [5].
Many standardization bodies have come up with different
Isolation Transformers: are used to reduce high- set of standards guiding the reliability and availability of
frequency interference by stopping power quality power. For example, the IEEE 519, Standard
disturbances from being transferred from the primary Practices and Requirements for Harmonic Control in
to the secondary windings of the transformer [8]. Electrical Power Systems defines total harmonic
Noise Filters: are used to cut-off unwanted frequency distortion of voltage and total demand distortion and
those definitions are an important part of all technical
super-imposed on the current or voltage waveform
decisions related to power quality [10].
(noise) from reaching sensitive loads. This consists of
a combination of capacitors and inductors that enables Another example is the ITIC (Information Technology
frequencies in the range of the normal voltage Industries Council) or CBEMA curve which specifies the
frequency and cutting off higher frequencies thus minimum withstanding capability of equipment to voltage
operating as a low-pass filter. They are used when sags, micro interruptions and over voltages [1] 10].
high frequencies contain large noise values [5].
Shunt VAR Compensators (SVR): are a combination of 5. Make End-use Equipment Less Sensitive
capacitors and reactors used to reduce and increase
the magnitude of the voltage at the considered point of Equipment manufacturers also have a role to play in the
mitigation of power quality problems by designing
a power supply system. SVRs are mainly used for
equipments which are less sensitive to power disturbances
regulation in high voltage and the elimination of thereby, saving costs and minimizing to a considerable
flicker caused by large loads [8].
extent PQ problems originating from the consumer side
Harmonic Filters: are used to reduce harmonic of the grid. These can be achieved by adding a capacitor
distortion on power networks and then protect with a larger capacity to power supplies, de-rating
sensitive loads from being affected by other loads. transformers, adjusting under-voltage relays and using
They are of two types: passive filters and active cables with larger neutral conductors [5].
filters. Passive filters are made up of combinations of
resistors, inductors and capacitors and are so designed
6. Utility Power Quality Services
to eliminate only one undesired frequency by
In response to the growing demand for high-grade power,
providing a path to earth. Many passive filters will
several utilities can offer their customers additional power
thus be required to be connected in parallel in order to quality services. Some of the services that can be offered
eliminate several harmonic disturbances but if the by utilities include:
unwanted frequency disturbance varies randomly,
passive filters may become ineffective and cause
Services to help avoid power quality problems at the helps utilities maintain a good relationship with their
planning/design stage: These are preventive steps customers and this is crucial for their survival in the
taken to help avoid the occurrence of PQ problems. competitive energy market.
These services involve investigating the unique PQ
REFERENCES
requirements of customers, creating equipment
specifications for unique customer needs and [1] R. Walawalker, V. Iyer, and M. Murthy, (2012), “Utility Interface
and Power Quality: The flip side,” Presented at the 35th Frontier of
implementing these specifications at the design and Power Conference, Oklahoma State University, 2002, pp. 1-5.
planning stage of facilities [11].
Services to help solve power quality problems: These
[2] J. Manson, R. Targosz, (2008, Nov). European Power Quality
Survey Report. [Online]. Available: http://www.leonardo-
energy.org/european-power-quality-survey-report [Accessed: 03 March
services are carried out when PQ problems occur. 2013].
They involve finding out the cause of the problem, [3] J. Seymour, T. Horsley, "The seven types of power problems,"
American Power Conversion (APC), USA, White Paper #18, 2005.
developing solutions to the problem and [4] W. E. Kazibwe, M. H. Sendaula, Electrical Power Quality
implementing these solutions to mitigate against Control Techniques, New York, Van Nostrand Reinhold, 1993, pp. 9-
20.
future occurrences [11].
Services to verify performance and provide ongoing
[5] A. de Almeida, L. Moreira, J. Delgado, “Power quality problems
and new solutions,” University of Coimbra Department of Electrical
and Computer Engineering, Coimbra.
information: These involve providing adequate
[6] A. Sannino, J. Svensson, and T. Larsson, "Power-electronic
information to the customers and which helps them solutions to power quality problems," Electric Power Systems Research,
identify PQ disturbances when they occur, know vol. 66, no. 1, pp. 71-82, 2003.
[7] EPRI, “Creating the Electricity Infrastructure for a Digital
preventive measures to take in such situations and Society,” Presented at UIE-2000 Conference, Lisbon, November 2000,
provide appropriate channel of communicating the pp.1-3.
[8] B. Baggini, Handbook of power quality, West Sussex , John Wiley
occurrence of the PQ problem back to the utilities and Sons , 2008, pp. 407-521.
supplier [11]. [9] A.J Marques Cardoso, “High Power Quality System with Fuel
Cell Distributed Generation-Simulation and Tests,” Presented at
IV. CONCLUSION IEEE International Symposium on Industrial Electronics, June 2007.
[10] M. H. J. Bollen, “What is power quality?,” Electric Power Systems
Research, vol. 66, no. 1, pp. 5-14, 2003.
The increasing sensitivity of sophisticated process control [11] M. McGranaghan, “Developing a Utility/Customer Partnership
and the growing reliance of consumers on power To Improve Power Quality and Performance, Electrotek Concepts ,
electronic devices have helped pushed to the front-burner Knoxville TN, January 2007.
the issue of power quality as many higher level of power
quality is now being required.
Abstract - Unexpected power outages on power grids caused uninterrupted (battery) power supply system [11] stores
by Storms, Lightening, Hurricanes, Heavy Rain falls or charges from the power grid while the traffic lights are
Electrical Malfunctions affects the functioning of Road working and automatically discharges power for the
Traffic Lights. Its destructive consequences prompt the continuous operation of the traffic lights when power
thought of installing adequate backup power supply to
temporarily generate power for its effective continuous
outage situations occur.
operation pending when the power outage situation would This paper shows the necessary use of a safe and eco-
be rectified and restored. friendly emergency backup power for traffic lights that
Road Traffic lights affected by Power outages could prevent chaos, accidents, loss of lives and property and
cause fatal pedestrian and car accidents as well as improve traffic flow on roads when power outages [7] that
congestion on roads. Installations of Uninterrupted (battery) affect road traffic lights occur.
Power Supply systems which can retain power for as long as
8hrs or charges accumulated from the sun by a Solar panel II. HISTORY OF ROAD TRAFFIC LIGHTS
could power the traffic lights pending when power is being
restored from their sources. This could go a long way in
providing temporary power supply needed for road traffic
The first traffic lights were proposed by a railway
lights to function therefore checkmating the possibility of engineer named J.P. Knight and later constructed by
chaos, accidents and congested roads. railway signal engineers of Saxby & Farmer on the 10th
The choice of placing either one or both types of of December, 1868. It was installed outside the British
emergency power Backup Supply Systems would depend on House of Parliament in London to control the traffic in
the facilities available to install them. There is no doubt that Bridge Street, Great George Street and Parliament Street.
this preventive measure would aid the achievement of a safe, Operated by a police constable, the design was realized
eco-friendly road and environment. by creating three arms with red and green gas lamps
Keywords: Backup power supply, traffic lights, safety, eco turned at its base at night-time.
friendly.
Though successful at controlling traffic at the time, the
police man operating it got injured due to an explosion as
a result of a leak in the gas line beneath the pavement on
I. INTRODUCTION the 2nd January, 1869.
After the coming of automobiles, the first four-way,
Road traffic lights are important signalling devices three colour traffic lights made of wires and electrical
positioned at straight or intersecting roads and pedestrian controls was created and installed in 1920 by police
crossings that provide safety and ease the flow of traffic officer William Potts on the corner of Woodward and
on roads [1]. They indicate directions by glowing Red, Michigan Avenues in Detroit. Within a year, more than
Amber and Green lights which states when it is safe to fifteen traffic lights were installed at strategic locations
drive, walk or stop. Traffic lights are powered by due to the necessity of controlling traffic flow. This
electricity connected to a power grid and or a non eco- subsequently gave birth to electrically powered traffic
friendly fuel or diesel powered generators which makes signals [1].
noise, increases global warming and pollutes the
environment by releasing CO2.
The power grids and generators that power traffic
lights do not ensure safety and ease of traffic flow for
road users. Bad weather conditions like Flood, Heavy
Rain falls, Storms, Tornadoes or Electrical malfunctions
on the power grid or power generating devices would
cause unexpected power outages [7] that would affect the
functioning of traffic lights [2].
This unpredictable situation could be avoided by the
installation of a solar energy powered backup traffic
lights or uninterruptible (battery) power supply system[11]
that could retain power and automatically function when (a). (b).
any power outage[7] situation occurs pending when
power is restored from the grid or generator. The solar Fig. 1. (a). A led traffic light installation. December 1940 in San Diego,
panel absorbs charges by the sun would have its energy USA [1].
converted to electricity by inverters that would power the (b). A typical road traffic light [1].
traffic lights when such power outages occur. The
B. Electrical Malfunctions
Fig. 4. During a storm, tree limbs create short circuits in electrical lines
that results in fire outbreak and power outage situations in the area [7].
transmitter unit [15]. Its parts includes charge controller to VIII. CONCLUSION
control the charging and discharging of the battery[16],
countdown timer which displays the amount of time left Backup power supplies for traffic lights are important
before the battery indicates a full discharge [19]. preventive measure that should be deployed on roads.
Unexpected power outage situations from power grids on
traffic lights can cause severe situations beyond
TABLE II comprehension. Therefore, necessary action of combating
TECHNICAL AND DESIGN SPECIFICATIONS OF SOLAR ENERGY BACKUP
the aftermaths with respect to the outcome and effects on
POWER SUPPLY SYSTEM [27].
the environment should be considered and implemented.
Max. power 180Wp
No. of Cells 72 ACKNOWLEDGEMENTS
Max. Voltage (V) 36.31
Max. power current (A) 4.98
Special thanks to Diesel services and supply ltd, Zed
Temperature Range -40°C to +80°C Products Fabrication ltd., New York State Department of
Cell Efficiency >15.2% Transportation for their illustrations and research
Module Efficiency >15% manuscripts.
Dimension 1581*809*50mm
Output tolerance +/-5%
REFERENCES
Piece per weight (kg) 16.3
Framework Aluminium [1] Traffic light. [Online]. Available.
Height above ground 1meter http://en.wikipedia.org/wiki/Traffic_light.
[Accessed 14 Mar. 2013]
2) Advantages Solar Energy Powered Traffic Light: [2]Diesel service and supply. [Online]. Avaliable
http://www.dieselserviceandsupply.com/Causes_of_Power_Failures.asp
x. [Accessed 14 Mar. 2013]
They are self-sufficient; they do not require
external power sources [21].
[3]Energy Sector Fossil Power Generation
Division,Enlangen.Siemens.com
They are easy to set up and operate [24].
[Online].Available:http://www.siemens.com/press/pool/de/pressemitteil
Due to their stationary nature, they require little ungen//2011/fossil_power_generation/EFP201105064e.pdf. [Accessed:
or no maintenance [21].
14 Mar. 2013].
They are eco-friendly and cheap [21]. [4]BHEL bags Rs26.65 billion Thermal plant contract. Construction
Week online. in. [Online].
3) Challenges of Solar Energy Powered Traffic Light: Available: http://www.contructionweekonline.in/article-6609-
bhel_bags_rs 2665_billion_thermal_plant_contract/. [Accessed: 15 Mar.
2013].
Availability of Sunlight [24].
Fragile Silicon celled panels [24].
[5]Charles Wilson Engineers ltd. Traffic light Trailer Generator.
High cost of solar panel repair [24] [25]. [Online]. Avaliable:http://www.cwplant.co.uk/shop/traffic-light-trailer-
generator-code-tlt-lsr. [Accessed: 15 Mar. 2013].
2) Pseudocapacitors: This new backup power technology [9]Traffic light generator stolen from Madison roadwork. [Online].
Available:http://www.s1maddiston.com/news/traffic-light-generator-
is for high energy density. They cost lower than stolen-from-maddiston-roadworks.html. [Accessed: 17 Mar. 2013].
ultracapacitors. They have a promising future and are
commercially valuable because they are competing with [10]Traffic Collision. [Online]. Available:
the cost of batteries [22]. http://en.wikipedia.org/wiki/Traffic_collision [Accessed: 18 Mar. 2013]
Abstract-This paper examines the central role of risk quantitative, semi-quantitative and qualitative attributes
assessment as a vital routine in Engineering Practice. Risk of risks. This progressive study portrayed the wholeness
assessment is the determination of the measure and value of and objectivity of risk assessment in the implementation
risk related to an existing situation and a known threat. of engineering policies, programmes and projects. [4]
Engineering Practice involves the application of the
principles of physical and social sciences to the design,
It is good to note that risk assessment is not limited to
development and implementation of projects, programmes the theory and practice of engineering. It has a foothold in
and policies, which have important implications in the medical, hospital, food, chemical and bio-medical
cultural and ethical traditions of various host communities. industries. However, it is often carried out in a more
These projects, programmes and policies can be faced with complex way in the disciplines of Risk Engineering,
the constraints of scope, cost, time and quality. There is, Safety Engineering and Reliability Engineering where
therefore, the need for a thorough iterative conduct of risk threats to life, environment and machine functioning are
assessment at the design, planning, monitoring and ascertained and dealt with. One major task risk
execution stages of engineering projects, programmes and assessment performs in engineering practice is the
policies.
measurement and assignment of values to the two
All through history and in recent times, many lives have variables that revolve round engineering risks –
been lost, properties destroyed and insolvencies have been probability of occurrence and potential consequence or
created in numerous engineering organisations owing to impact. [6]
failed projects, programmes and policies that led to This paper examines the concept of risk in engineering
avoidable disasters. If only risk assessment had been and its definition in the first two sections. An overview of
routinely utilised in the design, development and risk assessment process, tools and techniques and the
implementation of these projects, programmes and policies, organisational perspectives for the conduct of risk
likely loss or injury to people and properties would have assessment are depicted in the subsequent sections. On
been identified, analysed, qualified, quantified and mitigated
if not totally eliminated.
the whole, the benefits, opportunities and challenges
associated with an effective and efficient conduct of risk
Keywords: Engineering, Risk, Risk Assessment assessment in engineering practice are highlighted and
discussed.
I. INTRODUCTION II. THE CONCEPT OF RISK IN ENGINEERING
Owing to complexity in structure and nature, In engineering practice, risk is the tendency that a
engineering practice has been described to be fickle, chosen line of action and or the choice of inaction will
unpredictable, volatile and fraught with risks [1]. Many lead to a deviation from a desired outcome or result. In
professional bodies such as International Organisation for other words, risk in engineering practice arises as a result
Standardisation (ISO), Committee of Sponsoring of uncertainties in the environment, security, cost, quality
Organisations of the Treadway Commission (COSO) and and timeframe of engineering policies, programmes and
Project Management Institute (PMI) have identified risk projects. Therefore it can be said that an essential element
assessment to be a specialised process embedded in the of risk in engineering practice is uncertainty – the fact
framework of good management practice [2], [3], [4]. that engineers can’t tell exactly the failures that may
Risk assessment is not only considered as a managerial likely occur, when, where and how the failures will occur
procedure, but it is also viewed as a crucial independent [7]. Evidently, these uncertainties prove the probabilistic
discipline in engineering. While this proves to be true, the nature of engineering risks. The concept of risk in
Royal Academy of Engineering generated a clearer engineering practice further combines the chance for
synopsis of risk assessment being a process and a failures with the consequences caused by the failures.
discipline in the second in a series of reports on managing Therefore, the assessment of risk in engineering practice
engineering risks produced by working groups of involves both probabilities and consequences. This
professionals [5]. relationship can be represented mathematically in
Of course, recent times have experienced increased equation (1) below.
attention and focus on risk assessment. It has become R = ƒ (Pm, Cm) (1)
increasingly clear that the need for a holistic framework Where R is the risk linked with event ‘m’, Pm is the
to effectively identify, assess, and efficiently manage risk probability of event ‘m’ occurring and Cm is the
is a crux in the practice of engineering. Though risk consequence of event ‘m’ occurring. The above
assessment has always been associated with mathematical mathematical representation depicts that risk is a direct
models and analytical tools, a qualitative approach was function of the probability of an event occurring and the
underscored by PMI. PMI studied and showcased the consequence associated with the occurrence of such event
[7].
Review
Policy Perspective -
Risks
[2] Louis Kunimatsu, (2011, October) Risk Management Basics – ISO [7] J. X. Wang and M. L. Roush, What Every Engineer Should Know
31000 Standard. [Online]. Available: About Risk Engineering and Management, W. H. Middendorf, New
http://www.secureworldexpo.com/2011/detroit/Louis_Kunimatsu.p York: Marcel Dekker, Inc. 2000.
df [Accessed: 03 February, 2013]. [8] T. Wu, Y. Huang and K. Xiong, “Research on Risk Management
[3] The Committee of Sponsoring Organizations of the Treadway Gains of Construction Project Based on the Goal Orientation
Commission, (2004, September) Enterprise Risk Management — Perspective.” Presented at IEEE International Conference on
Integrated Framework [Online]. Available: Quality and Reliability (ICQR), 2011. [Online]. pp. Available:
http://www.coso.org/documents/coso_erm_executivesummary.pdf IEEEXplore, DOI: 10.1109/ICQR.2011.6031746 [Accessed:02
[Accessed: 03 February, 2013]. March, 2013]
[4] Project Management Institute, “A Guide to the Project [9] Office of Government Commerce (OGC), Management of Risk:
Management Body of Knowledge” 4th Ed. Pennsylvania, Project Guidance for Practitioners, 3rd Ed. London, TSO (The Stationery
Management Institute, Inc., 2008. Office), 2010.
[5] The Royal Academy of Engineering, (2003) Common [10] E. H. Conrow, Effective Risk Management: Some Keys to Success,
Methodologies for Risk Assessment & Management [Online]. 2nd Ed. Virginnia, American Institute of Aeronautics and
Available: Astronautics, Inc. 2003.
http://www.raeng.org.uk/news/publications/list/reports/Common_M [11] SANS Institute (2006) Risk Assessment Policy. [Online]. Available:
ethodologies_for_Risk_Assessment.pdf [Accessed: February, http://www.sans.org/security-
2013]. resources/policies/Risk_Assessment_Policy.pdf [Accessed 09
[6] Wikimedia Foundation Inc. (2013, February, 22) Risk assessment. February, 2013]
[Online]. Available: http://en.wikipedia.org/wiki/Risk_assessment [12] K. Heldman, Project Management Professional Exam Study Guide,
[Accessed 03 Feb, 2013]. 5th Ed. Canada, Wiley Publishing, Inc., 2009.
[13] N. Nayak and R. Akirraju, “Knowledge Driven Enterprise Risk
Management.” Presented at Service Research and Innovation
Institute Global Conference, 2012. [Online] pp.564-573. Available:
IEEEXplore, DOI: 10.1109/SRII.2012.69 [Accessed: 02 March,
2013]
indirect cost components of the ERP system;
The SAP ERP system prevented Hershey TABLE 2
DIRECT AND INDIRECT COST COMPONENS [6]
from delivering candies worth $100 million Cost Components
for Halloween DIRECT COST Hardware
Servers
Also their stock prices dropped below 8% Clients
Storage
TABLE 1 Networking
POSSIBLE CAUSES OF HERSHEY’S SAP R/3 4.6 FAILURE Software
a. Inadequate Testing There is a high Database Management
sessions possibility that Operating System (OS)
insufficient testing was ERP License
not done. Upgrading
b. Lack of organizational The direct cutover INDIRECT COST HR Costs
understanding of the cut- method is a strategy Training (IT and Business)
over strategy implementation where Project and Business
by the new system goes Management
live at once. The External Consulting
organization must have Change Management
lacked this Cost of migrating data and
understanding because it integrating modules
brought about empty Vendor Project
shelves during Services
Halloween. The direct Hosting
cut-over strategy is Virtual Private Network (VPN)
considered to be the Business process reengineering
most risky strategy and
needs serious COST (VENDOR)
understanding and
knowledge before it can
be taken-up to its use in
any system
c. Weak Leadership When the leader is
weak, the business is
prone to failure. This
resulted in reduced
performance and caused
Research shows that SAP’s project cost is more than quality control, strategy for data conversion, consistent
Tier II and III but Tier II cost significantly more than data, implementation of tools and techniques and more.
MS Dynamics projects due to the fact that MS SUCCESS STORIES
Dynamics projects are usually not large companies.
Below is a table illustrating the vendors and their Generally, ERP system consumers are initially
average cost; described as risk takers. There have been a number of
TABLE 3
VENDOR COST [7] recorded failures of the ERP system but also
VENDOR AVERAGE remarkable success stories. An example of a recent
COST success story is in the company, Nestlé.
Oracle $5.0
NESTLE BACKGROUND AND SAP ERP
million
SAP $6.7 APPLICATION
million
MS $1.8 Nestlé S.A. is a consumer product industry that deals
Dynamics million with varieties of products ranging from beverages,
Tier II $3.1 dairy, etc. One of the Nestlé’s Company located in
million
Tier $1.1
Vevéy Switzerland was recorded to have recently
III/Others million upgraded with services from SAP AGS and SAP
Consulting in 2011, working hand-in-hand to use the
TABLE 4 near-zero-downtime approach which kept downtime to
TIER I, TIER II, TIER III SAMPLE VENDORS [7]
SAMPLE VENDORS a minimum and avoided business disruption [8].
THE NEAR-ZERO DOWNTIME (NZDT) METHOD
Tier I Tier II Tier III
They serve large They serve mainly They serve smaller- In past years, critical systems were required to remain
global businesses mid-market than-medium available round the clock; this was difficult due to the
and are expensive; businesses; businesses; unplanned downtime which brought about system
SAP Sage ABAS
Oracle IFS Activant Solutions
outage. 30 to 60 minutes of systems outages are
Oracle Peoplesoft QAD Inc. accepted by business users but current research shows
Microsoft Dynamics Lawson Baan that customers who need high maintenance procedures
Ross Bowen and Groves are exposed to added downtime of 80 to 160 hours in a
Exact
year. SAP AG introduced the NZDT method in 2010
which would improve the standard optimization for the
RISK FACTORS downtime minimization in the case of upgrades and
reduce the overall downtime of SAP systems to less
Risk factor refers to the indicators that presage a bad than 20 hours a year [8].
ERP implementation failure. It is important to note that AIM OF THE NZDT METHOD
ERP implementation is risky and so this study goes to
illustrate some risk factors associated with its Minimize technical downtime [8].
implementation process. Below are some researched
ERP risk factors; Minimize time spent on other task executed in
CHANGE MANAGEMENT RISK: downtime [8].
solutions of software and hardware, authorizing BPR as the ERP implementation success stories recorded in
(Business process Engineering) interdepartmentally, a top organization. The key to managing the issue
budgeting process, determine the best strategy to which states that ERP implementation goes beyond
achieve the desired vision and direction, task force etc. budget and time and sometimes delivers little or no
Identifying the relevant software vendor is essential. value , simply requires a deep understanding of the
ERP Software vendors are numerous and top ERP dynamics behind change management and viewing the
developers (Oracle, SAP etc.) are one of the first-rated project as less about IT and more about business
in the market but they do not guarantee a successful transformation. Implementations which seek to deliver
implementation of their ERP system; organizations full solutions into all areas of an organization are at a
should choose a software vendor that best suits the high risk of failure.
business needs of the enterprise to ensure good
performance and an excellent service, they must be However, further research is required in the area of
independent, and neutral. The performance of the ERP ERP strategies and its approximate cost in both SMEs
software must generate value, create opportunities, and large businesses as well as the ‘value’ generated by
provide scalable data, improve productivity, increase different hierarchical levels of an organization and their
revenue, reliable, accurate, support the business contribution to the various dimensions of business
process and make profit etc. in this respect, the performance after a successful implementation has
reputation of software is of more importance than the been recorded. Also, an investigation should be made
price. in identifying the value generated by enterprise systems
STRATEGIES FOR VENDORS in their external (economy, social, technology, politics
etc.) and internal (employee attitudes, work force,
1. Addressing security and archiving: gradual strategies etc.) environment factors.
growth of a system attracts vulnerability
therefore; regular security actions for REFERENCES
upgrades should be performed as no company [1] S. Roy, (2006). Basics of ERP. [Online]. Available:
http://www.citehr.com/12428-basics-erp.html [Accessed: 18 Feb
wants a dismissed employee with confidential
2013]
information out in the open or competitors. [2] M. F. Frimpon, (2012). A Project Approach to Enterprise
Archiving improves speed to queries on large Resource Planning Implementation, International Journal of
tables which aids the end-user experience. Business & Management. [Online].vol.7(10), p.116, Available
EBSCOhost,
2. Eliminate software patches: some patches can http://web.ebscohost.com.ezproxy.brad.ac.uk/ehost/pdfviewer/pdfvie
create problems with other software wer?sid=cdee253d-2765-4877-8e5e-
94e5a7e3efb0%40sessionmgr11&vid=1&hid=16 [Accessed: 15
applications when installed newly therefore Feb.2013].
patches are required to undergo regular testing [3] R. Alvarez, (2008), Examining technology, structure and identity
so as to ensure that there are no malfunctions during an Enterprise System implementation, Information Systems
in the system and all critical functions are Journal, [Online].vol.18(2), pp. 203-224, Available: EBSCOhost.
DOI: 10.1111/j.1365-2575.2007.00286. [Accessed; 18 Feb.2013].
working properly. [4] K. Elmeziane, M. Elmeziane, (2012). Enterprise Resources
Planning Systems Implementation Success In China, Business and
Management Review. [Online]. vol.1(12), p.2, Available: EBSC host,
THE FUTURE OF ERP http://web.ebscohost.com.ezproxy.brad.ac.uk/ehost/pdfviewer/pdfvie
wer?vid=5&sid=0244c6f9-f79b-4c03-968b-
ERP systems are the definition of legacy. Research e4b9fc12ebf2%40sessionmgr4&hid=26. [Accessed: 15 Feb.2013].
shows that software vendors are adding sophistication [5] T. R. Weiss, (2002, Sep). Hershey Upgrades R/3 ERP System
and analytics on the ERP packages daily and will not Without Hitches. [Online]. Available:
discontinue investing into the system. SAP Business http://www.computerworld.com/s/article/74008/Hershey_Upgrades_
R_3_ERP_System_Without_Hitches. [Accessed: 16 Feb. 2013].
ByDesign is an example of a complete end-to-end [6] Carrington. M. Mukwasi, Lisa. F. Seymour, (2012, Dec.).
business solution for an ERP system for the SME’s. Enterprise Resource Planning Business Case Considerations: A
Also, the ERP software will evolve to handle services Review for Small and Medium-Sized Enterprises. Journal of
and will convert to be better integrated with CRM Innovation Management in Small & Medium Enterprises, p.7,
Available:
software (systems that will track customer relationship http://web.ebscohost.com.ezproxy.brad.ac.uk/ehost/pdfviewer/pdfvie
in real time). An ERP system is the epitome of a wer?vid=4&sid=15d730fa-e256-408b-9fac-
company’s supply chain as opposed to looking at its 1c26e825dc8f%40sessionmgr10&hid=26.
customers. The world is in a new architectural era [7] Panorama consulting group (2011), 2011 Guide to ERP Systems
and Vendors. An independent research report, pp.2-13, Available:
where individual application providers can integrate http://panorama-consulting.com/resource-center/erp-industry-reports/
with each other through platforms like Force.com, [8] SAP, (2011). Nestle reduced business downtime with downtime
making Force.com the “new ERP” for the cloud. minimization service from SAP AGS and SAP consulting. [Online].
Finally, for as long as businesses exist, ERP or any Available: http://www12.sap.com/search/search-results.epx.
[Accessed: 15 Feb 2013].
business management system will exist alongside. [9] James. (2012, Jul). How to Write a Cover Letter that Gets You
CONCLUSION Hired. Sell out your soul, [Online]. Available:
http://www.selloutyoursoul.com/2012/07/19/how-to-write-a-cover-
letter/
This paper describes the main causes of failures in an
ERP implementation process and their effects as well
Osman Khalid
School of Engineering, Design and Technology
University of Bradford
Abstract - The ground-breaking idea of Balanced The term Balanced Scorecard was originated in the
Scorecard was given in 1992 by two Doctors Robert Kaplan beginning of 90s, the idea was given by the two doctors
and David Norton. Their main idea was that any business or of Harvard University: Robert S. Kaplan and David P.
organization must first know their mission and strategy Norton. They mainly focussed on implementing the
behind it and then coordinate the vision with their business
processes and activities. Balanced Scorecard mainly focuses
defined strategy to the workflow of the organizations by
on four vital perspectives in defining a strategy for any introducing non-financial elements to the conventional
business or organization, which are: financial elements thus it made working of the system
Financial perspective, customer perspective, internal much easier for managers and executives by giving them
business process perspective, learning and development more balanced view. By going in its deep details, we
perspective. come to know that it is not only a strategic system but it
By keeping in mind the company’s mission statement and is a management system which empower the managers
then coordinating these four perspectives immensely and executives to first define the mission and vision of
improve the strategic planning and management system for their organization, then work in the directions of the
any business or organization. So mainly it deals with
finances and ROI, structure and operation of an
defined statement and also improve the communication
organization, expert level of the employees and at the end gap within the organization by implementing feedback
how satisfied their customers are. within the system for its continuous improvement. Which
Although, there are already several papers which already will eventually improve the business processes of the
addressed different aspects of Balanced scorecard, the aim organization; as a result it will improve the performance
of writing this paper is to show how the idea given by of the system. [1] [2]
Kaplan and Norton helped organizations in defining and
improving the strategy which helps the managers in Although the term ‘Balanced Scorecard’ was originated
managing the system more effectively and efficiently and in early 90s, but when we look back at the history, we
since then how it eased the strategy defining and its
implementation in any organization.
come to know that there are also some efforts made for
Keywords: Balanced Scorecard, Kaplan and Norton, the improvement and betterment of the performance of
Strategy planning, Management system the organizations. Like in 1950s, there was an initial
effort made by General Electric to measure the
I. INTRODUCTION: performance. Also there were some French engineers
who were working on the dashboards in the early part of
Balanced Scorecard is a great concept which defines the 20th century [3]. But the most significant work was
the strategy of any organization/system and then defines found at 1987 in a small semi-conductor firm Analog
rules to manage that system. So, basically it focuses on Devices Inc. where a consultant named Arthur M.
the mission statement or you can say with the vision of Schneiderman was working to improve the processes and
the organization/system and then works on coordinating performance measurements of the organization [4]. He
its vision by implementing it within the company, thus finally gave a report which was named as a Scorecard [7].
working according to the strategy which is defined in the So, Kaplan and Norton carried forward the work for the
beginning. So, we can say that Balanced Scorecard deals improvement of performance by giving some ‘balance’ to
with how the strategy is planned, implemented, the previous works which was already done by removing
monitored and managed within the the short-comings and reducing the uncertainty by adding
organization/company. [1] [2] a clarity to the performance metrics. [5] [6]
One of the main characteristics of Balanced Scorecard
tools is that it synchronizes the various business processes
with the strategy which is defined, which makes things in III. METHODOLOGY:
order thus helps the executives and managers in
managing the system. Balanced Scorecard is defined at different points as:
I have divided this paper into different sections: first
section will describe the history and need of the Balanced “A strategic planning and management system used to
Scorecard; second section will deal with the explanation align business activities to the vision statement of an
of working and methodology involved in the model; third organization” [1] [2]
and last section will be the conclusion which will show
the future aspects of the Balanced Scorecard tool. Balanced Scorecard looks at different departments in an
organization, and then work on the betterment of the
II. HISTORY & NEED: elements which directly affects the performance and in
the end combines the results of all departments to realize the needs of your customers as you should be fully
enhance the efficiency of the organization. aware and updated with the requirements of the
customers.
A. Analysing and Designing the Strategy for the
organization: Kaplan and Norton mentioned in their research paper
that it is very important to know what your customer is
In any organization, it is very vital that they should be expecting from you. Customers tends to have four
very clear about what is the main purpose. This part deals considerations which are; Time, Quality, Performance
with the determination of strategy of the organization. For and Service, Cost. [8]
every organization, it is really crucial to define their Time deals with delivering the product to the customer.
mission and what are the aims and objectives they expect Quality is concerned with the standards followed in
to achieve. As it plays a key part in deciding the further making of the product. Performance and service involves
strategy of the organization. Strategy then comes in action the satisfaction level of the customer. Cost deals with
as it interprets the mission and vision in implementing it giving the best price in the market yet keeping in mind
within the organization. Once you decide your aim, there the all previous concerns. So, by looking these issues in
will be certain activities which need to be followed in the light of Balanced Scorecard, the ultimate goal is to not
achieving your objective. After the definition of right to lose your customer and at the same time you have to
strategy for the organization, the next step is the fulfil its requirements. In order to get this, there will be
regulation of the strategy within the organization. To do certain measures which will lead you to achieve your
this, it is very important to assign the appropriate resource goal.
the appropriate task as this will increase the coordination
within the departments. Because if there is less or no Internal Business Perspective: [8]
coordination, it can be a source of delay in delivering the
final product on time and it will cost additional time and The second perspective which is mentioned in the
money to the organization. It is the duty of the managers Kaplan and Norton paper is how the organizations design
and executives to include objectives and aims as a part of their business processes in order to achieve the mission
regular tasks of the resources. On the completion of i.e. the customer satisfaction. It is the duty of the
assigned tasks, then they should acknowledge the managers and executives to monitor all the processes at
resources. This appreciation can be in the form of written all stages that they are working in accordance to their
acknowledgement or in form of some financial incentives plan and also there is coordination among different
as this act will encourage and motivate the resources. At departments.
the same time, if there is discordance found by any
resource it should be highlighted and corrected so that it The main purpose of improving or watching your
may not affect the remaining processes. At this point, it is internal business processes is to make sure that the final
important to mention that if the demands of the customer product should be delivered to the customer in time by
alter at some stage then strategy should be adapted maintaining its quality and standards. To keep a check on
accordingly. Also there are new trends which can be the working of the departments, information systems can
introduced to enhance the performance of the system.[9] be very helpful to the managers and executives. If there is
[10] any problem at any level, information systems can rectify
that problem thus making it easier for the decision makers
There are four perspectives given to us by Balanced to identify the problems. The primary goal is to improve
Scorecard which we should keep in mind while looking at the internal business processes at all levels, whether it is
any organization as shown in fig.1 [8]. Kaplan and technological capabilities of the organization or the
Norton described these perspectives in a manner that first production or design stage of the product, it should be
you should know your “Goals” and then there will be made sure that the final product should be delivered to the
certain “Measures” which will lead you in getting your customer on time with all standard maintained yet not to
aim; in this case it is the enhancement of the performance compromise on the quality .
of the system. Following are the perspectives:
Customer Perspective
Internal Business Perspective
Innovation and Learning Perspective
Financial Perspective
Innovation and learning is the third perspective C. Quicker you follow, faster the reaction:
mentioned by Kaplan and Norton. In today’s competitive
time, the demands and needs for the businesses are If we peep back to the history, we will come to know
changing with every passing day. So to keep pace with that there were many companies which were facing some
the fast moving trends, it is really vital equipping yourself major problems to be precise they were facing huge
with new ideas and techniques and making sure that your financial loss on daily basis back in early 90s [16]. Let us
resources are up to dated with all the latest technologies. take the example of Cigna Property & Casualty; they
For this purpose, organizations should allocate separate were in deep financial crisis as the company was losing
funds for research and development department; there large amount of bucks daily back in 1992. But then they
duty is to discover new methods and techniques which decided to restructure the strategy of the company as they
can be applied for the improvement of processes which mainly focussed on highlighting the strong point and
will finally improve the efficiency and performance of the projecting it to the customers as they are gurus in the
system. field. In 1993, they implemented Balanced Scorecard to
reckon the customers about their expertise. As a result,
It is the duty of the managers and executives to arrange they started earning revenues in a couple of years. They
training classes for their employees to keep them abreast were one of the early implementers of Balanced
of latest technological updates. Kaplan and Norton Scorecard. After 5 years, Cigna was able to price Property
preferred learning over the training as they believe in & Casualty up to $3 billion. So, it took Cigna to go from
learning new techniques for the betterment of the system. debts to start making staggering profits of $3 billion in
The primary reason for mentioning this perspective is to mere five years of time [14].
keep your organization ready for upcoming technological
trends [8]. Also you can improve the production time of Let us take another example of Mobil's U.S. Marketing
the product yielding more output by spending much less and Refining Division which was also facing some
time. This all would eventually attract more customers serious issues with their finances. But then the company
thus increasing the profits for the organization. decided to give it a try by redefining the strategy. They
split the company into about 18 sections; each section
Financial Perspective: [8] used its own Balanced Scorecard. This helped them in
relating the strategy within the different sections of the
The last perspective to keep in mind while looking at a organization. Its output was come out in two years as they
business is its financial perspective. Kaplan and Norton were number one in the market in terms of profits. They
although introduced the implementation of non-financial sustained it for the next five years [15].
IV. CONCLUSION: [8] R.S. Kaplan & D.P. Norton, "The Balanced Scorecard - Measures
that Drive Performance," Harvard Business Rev., Jan. 1992 .
It’s now more than twenty years that this model is
helping not only organizations but also to public sector in [9] R.S. Kaplan & D.P. Norton, The Strategy-Focused Organization:
How Balanced Scorecard Companies Thrive in the New Business
determining the strategy and then its implementation. Environment., Harvard Business Press Books, 2000,
Since then it assisted a lot of companies in regaining the
stature they lost is one of the biggest achievements of this [10] "Summary," Brandywine Valley Consulting, [Online].
model. The model lends a helping hand to the companies Available:
http://www.rsbvc.com/pdfs/Strategy_Focused_Organization.pdf.
at the time when they were in such a dilemma and then [Accessed Mar. 19, 2013].
guided them to recoup what they were missing by
allowing taking holistic view of the organization. There
are different tools which were created to be used in the [11] R. Maria, "The Balanced Scorecard in a Strategy-Focused
Organization," [Online]. Available:
organization, map down the strategies and overlook if the http://www.asecu.gr/files/RomaniaProceedings/10.pdf. [Accessed Mar.
strategy is working fine. With all the latest suggestion, 19, 2013].
like integration of supply chain, its application in public
sector, considering risk management and change [12] "Strategy Mapping and Balanced Scorecard Ways to Iintegrate
Quality, Planning and Assessment," Penn State University , Feb. 2001.
management as a factor and influence of Balanced [Online]. Available:
Scorecard in analytics [17] [18]; there are still bright http://www.psu.edu/president/pia/newsletter/news61.pdf. [Accessed
prospects of Balanced Scorecard that it will continue to Mar. 19, 2013].
guide the organizations to improve the strategies.
[13] R.S. Kaplan & D.P. Norton, Alignment Using the Balanced
Scorecard to Create Corporate Synergies., Boston, MA: Harvard
REFERENCE: Business Press Books, 2006, pp.1-3.
[1] "Business Balls," [Online]. Available: [14] "Cigna P&C: A Turnaround Vision, Moving from the Bottom to
http://www.businessballs.com/balanced_scorecard.htm. [Accessed Mar. the Top & Meet a BSC Pioneer," Harvard Business Publishing
19, 2013]. Newsletters , Dec. 1999.
[2] "Balanced Scorecard Institue," [Online]. Available: [15] B. Baker, "Mobil's Growth and Productivity Strategy Yields
http://www.balancedscorecard.org/bscresources/aboutthebalancedscorec Premium-Grade Profitability: What It Takes to Produce a $1B Cash
ard/tabid/55/default.aspx. [Accessed Mar. 19, 2013]. Surplus," Harvard Business Publishing Newsletters , Nov. 1999.
[3] "Wikipedia," [Online]. Available: [16] D. Miyake, "Implementing Strategy with the Balanced
http://en.wikipedia.org/wiki/Balanced_scorecard#History. [Accessed Scorecard: An Introduction to the Strategy-Focused
Mar. 19, 2013]. Organization," Inform. Management , Oct. 2002. [Online]. Available:
http://www.information-management.com/issues/20021001/5788-
1.html. [Accessed Mar. 19, 2013].
[4] A.M. Schneiderman, "The First Balanced Scorecard," [Online].
Available:
[17] G. Cokins, "Kaplan and Norton’s future vision of the Balanced
http://www.schneiderman.com/Concepts/The_First_Balanced_Scorecar
Scorecard," Sas Institute Inc. , Apr. 2012. [Online]. Available:
d/BSC_INTRO_AND_CONTENTS.htm. [Accessed Mar. 19, 2013].
http://blogs.sas.com/content/cokins/2012/04/17/kaplan-and-nortons-
future-vision-of-the-balanced-scorecard/. [Accessed Mar. 19, 2013].
[5] P. Jones, "A Short History of Balanced Scorecard Design," June
2012. [Online]. Available: http://www.excitant.co.uk/2012/06/a-short-
[18] R.S. Kaplan & D.P. Norton, "Kaplan and Norton’s future
history-of-balanced-scorecard-design.html. [Accessed Mar. 19, 2013].
vision of the Balanced Scorecard," Cgma Mag., [Online]. Available:
http://www.cgma.org/magazine/features/pages/the-future-of-the-
[6] "Balanced Scorecard Part 1: a brief history," Advanced
balanced-scorecard.aspx. [Accessed Mar. 19, 2013].
Performance Institute, [Online]. Available: http://www.ap-
institute.com/Balanced%20scorecard%20part%201%20a%20brief%20h
istory.html. [Accessed Mar. 19, 2013].
Abstract- The aim of this research is to demonstrate the tend to migrate to application and online business
impact of cloud computing in an organisation. In the solution. This leads to easy user accessibility of
computer world today, cloud computing is an integral applications on the web without necessarily requiring
aspect generally progressing. In this research I will like to the assistance of their IT department. Though there
identify the contributions of cloud computing to a modern may be benefits in using the clouds[4], it is essential
organization. Cloud computing comprises of hosted
services, application on the internet or web by a common
that management team avoid ignoring the major factor
multi-tenant. These services are divided into three at the cost of organisational performance[5]. [6]
categories IaaS, PaaS, and SaaS. Predicts in 2014, ‘IT organisation in 30% of the
In the past, organisations were concerned about server world’s 1000 companies will broker (aggregate
specification, maintenance, timing and antivirus, but the integrate and customize two or more cloud services for
advent of cloud computing has changed the role IT plays internal and external users, up from 5% today’.
in a firm; all issues existing in the past were eliminated. It Technology is already impacting the way businesses
has been proven that groups using cloud computing are conducted all over the globe. The paper introduces
techniques were able to save time, cost, security ease and cloud computing, the technologies that paved the way
replacement of hardware, flexibility patch upgrade can
be done with ease and document can be accessed from
for it, and the effect it has in an organisation.
any location, however whilst changes has been made there
II. DEFINITION
are still some limitations.
Some groups implementing this technology include
Amazon, Microsoft, Cisco, Google and EMC. Research
Cloud computing is an enabler which can be used
has shown that by year 2020 CC is forecast to exceed 241 anywhere, it allows on-demand network access to a
billion. shared pool of infrastructure resource(e.g. networks,
Finally, this research paper describes the tiers of cloud storage, servers, services and application that can be
computing and how organization can work effectively and speedily provisioned and released with minimal
efficiently at a reduced cost. supervision or service provider dealings [7]. another
Keywords: IaaS, Paas, SaaS, applications, cloud definition by [8] harnesses the key characteristics of
computing. cloud computing as a technology service system where
I. INTRODUCTION
the infrastructure(hardware and software) are delivered
Technology is continuously changing in the twenty - on request to customers over the computer
first century through sharing and effective production network(LAN or WAN), The coinage of cloud
of data. In order to uphold this information, computing originated from the Google CEO but the
organisation embraced technology as a back bone to fundamentals for delivering Information system has
drive this process. Prior to technological advancement been laid over the years[9] modified from(Willis
processing powers of computers, telecommunication 2009). In the past the commercial computing was very
infrastructure was difficult and expensive to maintain expensive to maintain as a result users had to share
but with the commencement of information technology system resource, the modern cloud computing is linked
that has been eliminated[1]. to accessibility of faster computing power, lower cost,
The World Wide Web was depicted by programmers advanced software and hardware[10]. The deployment
and network administrators in form of a cloud. Some models of clouds can be delivered in different ways
scholars have expressed various views of what cloud namely and it facilitate the described features[7] :
computing entails.
As explained by [2] the theory of cloud computing A. Service Models
evolves from all the data processing or control which 1. Infrastructure as a service (IAAS): The user is
takes place off the user’s premises. able to specify basic fundamental resource
[3] defines cloud computing as a model which permits which includes operating system and
the sharing of resources via virtualization technology, applications; however the user does not have
it also allows flexibility for on-demand process, instant control of the cloud infrastructure.
service to client on pay as you go basis. It is an aspect
in IT infrastructure that is promising, but the security 2. Platform as a service (PAAS): The consumer
issue in the domain needs to be addressed. can host service provider’s application
Cloud computing is changing service delivery in an without configuring or deploying the servers.
organisations in the past if a user want to embark on a E.g. using software on face book. in this
project they normally liaise with the IT department to platform consumers do not have control so
support them in hosting applications and writing they share lesser risks
scripts,due to reduce manpower in IT department users
noted that effective use of the cloud system decide if cloud service or hosting is an excellent
will cut down spending and prevent stress. business solution, as illustrated in this paper cloud
3. Provider: They are service providers who computing has helped to reduce cost in an organisation,
deliver service to third parties, they manage the challenges in implementing business solutions has
and maintain the data ware house used by the also been eliminated, it has allowed entry to computing
consumers. resources in a well-organized manner[18], however
4. Regulator: comprises of government or the migration of the data across different vendor is a
international bodies. They spread through bit difficult because different platform have their API’s
other stakeholder (enabler consumer and and deployment requirement[19].more research work
provider. will be carried out to find better ways of integrating
service models between the different platforms[19].
III. EVALUATION OF FINDINGS
R. R. S. Srinivas, and S. K. Sharma, "Assessment of [18] J. Gibson, R. Rondeau, D. Eveleigh, and T. Qing,
Implementation Success of Cloud Systems in Innovative "Benefits and challenges of three cloud computing service
Supply Chain firms," no. models," in Computational Aspects of Social Networks
[17] A. Khajeh-Hosseini, D. Greenwood, and I. Sommerville, (CASoN), 2012 Fourth International Conference on,
"Cloud Migration: A Case Study of Migrating an 2012, pp. 198-205.
Enterprise IT System to IaaS," in Cloud Computing [19] H. Lei, Y. Peng, and Z. Hongxiu, "Geoprocessing in
(CLOUD), 2010 IEEE 3rd International Conference on, Google Cloud Computing: Case studies," in Agro-
2010, pp. 450-457. Geoinformatics (Agro-Geoinformatics), 2012 First
International Conference on, 2012, pp. 1-6.
been sending through a tunnel by two vicious nodes the networks, like cryptography, its security mechanism
which act as a sender and receiver at different ends. When needs enhancement. Somehow it can defend against the
the neighbor node receives the message from the receiver outside mischievous nodes but it cannot defend against
node then the neighbor node thinks the message has been the inside vicious nodes which previously have
sent from the base station but the data has come from the cryptographic keys. Consequently IDS mechanism is
vicious node [4]. needed for the security enhancement in WSNs [11].
A. IDS Architectures
6) HELLO Flood Attacks: In this threat, the main Host-based and network-based are the two categories
weapon of the attacker is HELLO packet. An attacker can of IDS architectures, and it is liable on data collecting
send many HELLO packets to the several sensor nodes structure. Numerous forms of log files (kernel, firewall,
which have high transmission rates and are unreachable and more) referred to Host based IDS, and the logs have
in vast area of networks. been associated in contradiction of internal information
for recognized threats of mutual signatures [8]. New
7) Acknowledgement: In Specific WSNs routing packets of the network have been used by the networks
algorithms link layer acknowledgements are essential. based IDS as an information source in real time it
These acknowledgements may be spoofed by the observes all the discrete packets.
conceded node, so the sensor can be persuaded that this Moreover, its classification depends upon detection
feeble link have strength. techniques. In Signature based IDS all the packets have
B. Denial of Service (DOS) been compared with pre-organized and pre-resolute
The major aim of the attacker that the networks methods of the attacks and also the packets of the
resources should be depleted and it also affect its network have been monitored. Any activities that have an
performance. Several forms of DOS attacks which are instant drop outside the well-defined behavior Anomaly
used by the attacker based on layers. Jamming and based IDS always have a check on that. Moreover there is
tampering are the two forms of physical layer. If an an additional type of IDS that is Specification-based IDS
attacker is interfering with different nodes is called which monitors the WSNs from attacks and also it
jamming. An attacker by damaging all the nodes is called obeyed all the network security policies.
tampering. Collisions can be generated by the attacker B. Wireless Network’s IDS Architectures
and the protocols can be collapsed from which the data Additionally, wireless networks IDS architectures has
can be retransmitting again and again, even if the been divided into following cate-gories [8],
apprehensive collision gets activated [12].
III. COUNTERMEASURES 1) Stand-Alone: Every node operates as individual IDS
In this section there are existing countermeasures to and it only protect from those attacks which it deals with.
protect WSNs from different threats. There are several The IDS do not co-operate with other systems.
techniques given in [1] with respect to routing threats and
also some unique counter measures for every single one 2) Distributed and Cooperative: Each of the nodes runs
of them. There is a full study about DOS attacks and its their IDS system, but the IDS co-operate with other
countermeasures [12]. JAM, facility for WSNs and in several systems.
these networks it detects where the area is jammed and it
also avoids from such areas [3]. Wormhole in WSNs act 3) Hierarchical: The network has been distributed into
as a shield against jamming DOS attacks [4]. SPINS is clusters with cluster-head nodes. All of these nodes only
like a group of security protocols which improve the perform routing inside the clusters and it takes full
sensor networks [5]. SNEP and TESLA are the two responsibility of the messages which have been delivered
security pillars of SPINS. The information has been by the cluster members and accept all the additional
delivered under full security. Verification and allegation messages from cluster-associates which specify
confirmation also needed from both of the nodes in vicious nodes.
SNEP. Genuine transmission has been accomplished by V. EXISTING IDS MODELS FOR WSNs
TESLA for ruthlessly constrained environment. Sybil This section propose some of the detailed existing
attacks and its various counter techniques have been counter models for WSNs [11],
projected in [2]. REWARD, is a routing algorithms for A. Self-Organized Criticality & Stochastic Learning
sensor networks which is a novel [6]. In [7], the author Based IDS
propose LEAP+ (Localized Encryption and This model, propose a Host based data collection
Authentication Protocol), and in sensor networks it act as mechanism. Anomaly based detection technique has been
a key management protocol which support the network used in this IDS model. Also there is distributed network
performance [11]. architecture in this model. Hidden Markov model has
IV. INTRUSION DETECTION SYSTEMS been used, which generally used for wired systems in
However, the above mechanisms cannot offer security network based IDS
from intruders. Intrusion detection system can protect
from threats. IDS is becoming an essential need for B. IDS for Clustering-Based Sensor Networks
WSNs because attackers can easily hack into the sensor This model has been classified into two approaches
networks and can easily destroy all the performance of which develop a complete protection for the cluster based
sensor networks with the help of IDS [13] Validation has This protocol is based on four steps and one extra if an
been used as its first approach which only provides irregularity appears. In first step it interchanges the lists
security from the external attacker. LEAP [7] security of the neighbors in between all the neighbors and
mechanism is also been used as to substantiate the sender calculates the highest native cluster within each node. Its
for the receiver. Energy-Saving has been used as a second highest native cluster has been interchange with its own
approach for this model and it also defends against the neighbor in second step. In third step, every node
external attackers. Its main approach is to identify the interchanges the reorganized clusters in between its
mischievousness in both of the member nodes and cluster neighbors in the form of final cluster. Finally neighbors
head nodes. interchange its final clusters and if a cluster inconsistency
identified then it transfer data to the fifth step. Else, it will
C. A Non-Cooperative Game Approach be terminated in an effective manner. The final validation
It is a non-cooperative game between the attacker and checking has been performed by each node. If a vicious
the sensor networks. There are three defensive structures node has been detected then that node will be confiscate
used in this approach. Alternative technique has been from the network and then the protocol starts again from
used for every structure which is known as the optimal the first step. Or else, it terminates all the clusters.
defensive cluster-head by using IDS. There is non- Another threat that WSNs are dealing with is the
effective game between the attacker and the nodes in the arrangement of IDS in which the node is running IDS.
first structure. In order to regulate the cluster head There is a solution for this threat is by considering all the
Markov Decision Process been used in the second cluster-head sets and regulates the control of that node set
structure which is protected by IDS. Things are simpler in and that set of the node known as cut set. However cut set
third scheme. The cluster-head which have maximum is a set of different sensor nodes such as all the routes
traffic always have a defensive shield on it by IDS. from one node to the other can cross the set of that node
those two nodes are known as cluster head nodes.
D. Decentralized IDS Therefore, IDS is essential for every node that is related
The IDS model provides a network based data to the cut set. A node will be undemonstrative if a node is
collection mechanism. It uses an anomaly based detection declared anomalous [10].
techniques. It defends against different attacks like delay Cluster-nodes should be secured and there will no
in the message, black hole, wormhole, selective misbehavior in them. Also, there is an additional method
forwarding, data alternation, jamming, negligence and to perform cluster head monitoring. In this way each
repetition in the message. It has distributed network node should be energy efficient to perform monitoring.
architecture. Moreover the IDS should monitor some This model is totally network based which detect
rules and algorithms. All the information has been intrusion only for those messages that it monitors [11].
collected from the received message in the 1st phase and A. Further Recommendations and Some Common
in 2nd phase it examine all the information according to Mistakes
the rules. A failure has been raised if an examination The centralized routing major fault is that it does not
failed. If the number of the estimated infrequent failures use the finest energy route to the base station.
in the network is less than the number of the failures then Moreover, there is also a brief description about the
the threat alarm been elevated in third phase [9]. usage of the dominating sets algorithms [10]. The number
VI. A FULL APPROACH IDS MODEL IN WSNs of hops between each node and its cluster head should be
All of these IDS techniques do not provide a complete peripheral and this would easily control the difficulty
security mechanism. Some techniques define IDS with with best route. The major goal of selecting this modelof
the help of cluster head but do not define its performance IDS [11] because in unreceptive situation dominating
and production. algorithm sets cannot defend against attacks from the
This model is a combination of several of the above vicious members. These vicious nodes only rely on their
IDS techniques for WSNs [11]. metrics like an increase in the transmission power for
The use of a hierarchical model for IDS orders a low cluster head messages and which makes these cluster
energy restrains in WSNs. Each of the clusters has head select their own cluster heads.
cluster-head in which every network has been classified. As a result they control all the nodes in their clusters.
It evades all the nodes and also reduces the consumption Hence, algorithms have a defensive shield from the inside
of energy, so the cluster head will receive all the threats which they can easily handle. Therefore, in
transmitted data and after that it is received by the base between all the properties of WSNs security is one of
station. them and it is essential. Conversely, due to growing
One of a different protocol can be used to make technology in WSNs security is seems to be getting
clusters. This protocol is cluster first protocol, it selects improved with time.
all the cluster heads but first all the clusters been created. CONCLUSION
It only provides protection at the time of cluster The major goal of this paper is to present importance of
production because outside attackers do not interfere in security in WSNs because security is becoming a critical
between the cluster formation and those inside attacker issue in WSNs. If an intruder can get in the network and it
can be recognized and will detach from the network. dismantles all the network performance. Thus the security
is always needed in WSNs. This paper addresses the
threats and in respect to those threats their current [7] S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient security
countermeasures. A full approach to IDS model provides mechanisms for large-scale distributed sensor networks”, ACM
Transactions on Sensor Networks (TOSN), Volume 2 , Issue 4
a complete solution by combining the current defensive (November 2006), Pages: 500 - 528
techniques and also illustrates how to prevent from [8] P. Brutch and C. Ko, “Challenges in intrusion detection for wireless
different kind of threats and to defend them in a well ad-hoc networks” in Applications and the Internet Workshops,
manner. Therefore, this research shows that the defensive 2003. Proceedings. 2003 Symposium on, pp. 368373, 2003.
[9] A.da Silva, M. Martins, B. Rocha, A. Loureiro Ruiz, and H. Wong,
techniques are really worthy for WSNs. “Decentralized intrusion detection in wireless sensor networks”,
REFERENCES Proceed-ings of the 1st ACM international workshop on Quality of
[1] C. Karlof and D. Wagner, “Secure Routing in Sensor Networks: service & security in wireless and mobile networks- 2005.
Attacks and Countermea-sures”, In Proc. of First IEEE International [10] F.Anjum, D. Subhadrabandhu, S, Sarkar, and R. Shetty, “On
Workshop on Sensor Network Protocols and Applications, May Optimal Placement Of Intrusion Detection Modules in Sensor
2003. Networks”, 1st International Conference on Broadband Networks
[2] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in (BROADNETS04), October 2004
sensor networks: analysis & defenses”, Proc. of the third [11] A.Strikos, “A full Approach for Intrusion Detection in Wireless
international symposium on Information processing in sensor Sensor Networks,” School of Information Technology KTH
networks, ACM, 2004, pp. 259 268. Stockholm, Sweden, paper 16453 March 1, 2007
[3] A.D. Wood, J.A. Stankovic, and S.H. Son, “JAM: A Jammed-Area [12] A. Wood and J. Stankovic, “Denial of service in sensor networks”,
Mapping Service for Sensor Networks”, 24th IEEE Real-Time IEEE Computer, pages 5462, Oct. 2002.
Systems Symposium, RTSS 2003, pp. 286-297. [13] C.-C. Su, K.-M. Chang, Y.-H. Kuo and M.-F. Horng, “The new
[4] M. Cagalj, S. Capkun, and J.-P. Hubaux, “Wormhole-Based Anti- intrusion prevention and detection approaches for clustering-based
Jamming Techniques in Sensor Networks”, in IEEE Transactions sensor networks”, in 2005 IEEE Wireless Communications and
on Mobile Computing, January 2007. Networking Conference, WCNC 2005: Broadband Wireless for the
[5] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, Masses - Ready for Take-off, Mar 13-17 2005.
“SPINS: Security Protocols for Sensor Networks”, Wireless [14] W. Kehr, (May, 2006). Wireless Sensor Networks. [Online].
Networks, vol. 8, no. 5, 2002, pp. 521-534. Available: UMR University of Missouri-Rolla,
[6] Z. Karakehayov, “Using REWARD to Detect Team Black-Hole http://web.mst.edu/~mobildat/Wireless%20Sensor%20Networks/in
Attacks in Wireless Sensor Networks”, Proceedings of the de.html,[Accessed:14/Mar/2013].
Workshop on Real-World Wireless Sensor Networks
REALWSN’05, Stockholm, Sweden, June 2005
Abstract - Over the past few ten years, people are getting to point while suffering wall blocking problem. Despite
more concerned about developing sensing facilities without of increase the complexity in construction of wired sensor
wire. The reason behind this is interconnected networks network, it can raise the construction and material costs
using wires could increase certain problems such as for long distance or wide area wired network.
complexity and inconvenience. Therefore, wireless sensor
networks (WSN) are being implemented which are
Furthermore, wired sensor network can suffer from a lot
significantly used in various areas such as environmental of drawbacks such as the need of maintenance or real
monitoring (humidity, temperature, pressure etc), health time troubleshooting. However, comparing to Wireless
monitoring, battlefield surveillance, agriculture, security, SNs and Wired SNs, the overall cost of construction for
transportation and also can deal with emergency situations. each network is questionable. This is because the costs of
Comparing to wired network, wireless sensor networks sensor devices for Wireless SNs are much more
sometimes can be more efficient, precise and reliable expensive so that the network can achieve wireless based
because of their simplicity since wireless sensor networks communication.
are mainly based on nodes communicate over wireless II. WSN MARKETING
channels. (Including sensor nodes) Thus, WSN can also be a
“smart” network.
This research paper mainly focus on how wide the range of
applications where wireless sensor networks can be used
and in what way the networks operate. The difficulties and
challenges of WSN in several areas that are currently
discovered and their possible solutions will also be
mentioned in this research paper. Last but not least, the
future work on developing WSN and one practical
experiment regarding two motes (mica2) communicating to
each other will also be discussed.
Keywords: Wireless sensor, networks, applications, smart
I. INTRODUCTION
According to the improvement of technology and demand Fig. 1: Total Wireless Sensors and Transmitters Market: Revenue Forecasts (World), 2002-2012.
[2]
of society for past few years, the development of wireless Wireless sensor networks have been good practice in the
sensor networks or so called WSNs has been increasing world today due to technology advancement. In the view
surprisingly. This network is incorporated with of marketing as shown in (Fig1), the growth rate of
computing, measuring and communication components wireless sensors and transmitter market is relatively high.
that can be used in different kind of environments for The market was increased from about 90 million dollars
example in physical, biological or data framework in year 2002 to about 1800 million dollars in year 2012,
systems. To satisfy the architecture of wireless sensor which having about 45 % growth rate [2].
network technology, it requires few basic components
such as assembly of sensors, wireless-based
interconnecting networks, data or information clustering
central point. Furthermore, computing resources also
become substantial for handling data connection, data
mining, and status enquiring in WSNs. Therefore,
distributed sensing and computing nodes play important
role in wireless sensor network because the network
consists of massive amount of data. These data are used
computation and communication based on any
environmental situation or application [1].
Nowadays wireless sensor networks have somehow
replaced network that using wired system because there
are several difficulties of using wired network and
Fig. 2: Total Wireless Sensors and Transmitters Market: Revenue Forecasts by Geographic
become inconvenience to other people. The most obvious Region (World), 2002-2012. [2]
problem is wired network required wires or cables to Fig. 2 shows that the growth rate of wireless
make connection between nodes to nodes. Think of a sensors and transmitter market is mainly divided into 3
building with a number of walls, wired system cables major areas which are North America, Europe and Asia
have to be placed all over the floor connecting from point Pacific. From the past few years until year 2012, the
market forecast raised from 20 million dollars to 600 having self-organising capability. It is the latest network
million dollars in North America, 15 million dollars to used in many purposes such as analysing environmental
500 million dollars in Europe and from 8 million dollars situation or carry out communication check. Furthermore,
to 400 million dollars in Asia Pacific (approximately) [2]. this generation sensor network have high mobility
This marketing data emphasize that how widely use of (flexible) and the reason behind is the networks operates
Wireless sensor networks is. with large amount of distributed sensor nodes
III. BACKGROUND OF SENSOR communication to each other [4].
TECHNOLOGY Wireless sensor networks exist in military because the
sensor networks are suitable to develop battle
In development of WSNs, it is better to have low power, surveillance, infiltration, communication, monitoring
less costly but able to perform multiple objectives sensor network, targeting system and other applications. With
network. Basically wireless sensor is a tool used for radio the availability of 40000 lines of code and different model
of motes, VigilNet (a type of WSN) is successful military
transmitter (use to transfer signal to a receiver)
transmission for example:
applications. It is design for analysing enemy expertise
Receiver (receive wireless signal to be converted
and determines the location of unfriendly target. There
are many requirements to achieve in order to make this
into wanted output)
Controllers (To analyse received data and Stealth (military surveillances must be hard to be
system useful that are:
[1] K.Sohraby, D.Minoli, and T.Znati, Wireless Sensor Networks, [8] TWISTED SIFTER, “THE WORLD’S DEADLIEST DRONE: MQ-
Technology, Protocols, and Applications, Canada, 2007, pp.1-3 9 REAPER,” 2010 [ONLINE]
[2] Sateesh , “Wireless Sensor Networks - A Market Research Report,” AVAILABLE: HTTP://TWISTEDSIFTER.COM/2010/05/WORLDS-
2009 [online] DEADLIEST-DRONE-MQ-9-REAPER/
Available: http://blogs.dolcera.com/blog/2009/08/02/wireless-sensor- [ACCESSED: 14 MARCH 2013]
networks-a-report/
[Accessed: 14 March 2013] [9] G.BARRENETXEA, F.INGELREST, G.SCHAEFER, AND
[3] OMEGA Engineering Technical Reference, “Wireless Sensor,” n.d M.VETTERLIM, “WIRELESS SENSOR NETWORKS FOR
[online] ENVIRONMENTAL MONITORING: THE SENSORSCOPE
Available: http://www.omega.com/prodinfo/wirelesssensors.html EXPERIENCE,” (N.D)
[Accessed: 14 March 2013] AVAILABLE:
[4] M.Winkler, K.Tuchs, K.Hughes, and G.Barclay, “Theoretical and HTTP://INFOSCIENCE.EPFL.CH/RECORD/115311/FILES/IZS.PDF
practical aspects of military wireless sensor networks,” 2008 [10] Massachusetts Institute of Technology, “IMD Shield: Securing
Available: http://www.nit.eu/czasopisma/JTIT/2008/2/37.pdf Implantable Medical Devices,” 2011 [online]
Available: http://groups.csail.mit.edu/netmit/IMDShield/
[5] J.A.STANKOVIC, A.D. WOOD, AND T.HE, “REALISTIC [ACCESSED: 17 MARCH 2013]
APPLICATIONS FOR WIRELESS SENSOR NETWORKS,” (N.D)
AVAILABLE: HTTP://WWW- [11] E.Mckinney, “Disadvantages of Wireless Networks,” (n.d)
USERS.CS.UMN.EDU/~TIANHE/RESEARCH/PUBLICATIONS/PA [online]
PERS/JACK-REALISTICAPPLICATION.PDF Available: http://www.ehow.com/facts_4809373_disadvantages-
wireless-networks.html
[6] M.Ilyas and I.Mahgoub, Handbook of Sensor Network: Compact [ACCESSED: 17 MARCH 2013]
Wireless and Wired Sensing Systems, 2005 p9-2 – p9-5
Abstract: The ease and safety with which we can commute in This paper focuses on the wireless sensor technology in
our ever evolving environment is of tremendous importance ITS.
in our lives. Intelligent transportation systems (ITS) are a The deployment of Wireless Sensor Networks (WSN)
unique innovation which meets this need. ITS incorporate was motivated by battlefield surveillance and target
information and communications technology to improve
safety and relieve traffic congestion by using appropriate
tracking in military applications, which led to more
traffic management systems. typical applications such as tracking, monitoring and
Smart technology is an emerging global trend creating controlling [3]. Incorporating WSN into ITS gives
smart environments, the next big step in evolution. Smart advantages such as low cost, size and distributed
environments (such as ITS) need information about the intelligence. With the help of sensor networks traffic can
surroundings. A very efficient way of collecting such be measured with good accuracy and precision, enabling
information is with the use of Wireless Sensor Networks commuters to minimize travel time and optimize route
(WSN), which are primarily cost effective. and travel speed [1]. WSN provide a platform for data
This paper looks into WSN and its application in ITS (with sensing, processing, aggregation and transmission and
road traffic systems in particular), considering the
important characteristics of WSN that make it a more
have been identified as a significant means of delivering
suitable choice for use in today’s ITS and that of the future. the integral concepts of ITS [4].
Such key areas include the architecture of WSN and ITS, WSN consist of small, low-cost devices communicating
with a critical assessment of existing architectures. WSNs wirelessly and have processing capabilities as well as
are known to be energy efficient, self-maintaining, and sensing and storing capabilities. The nodes often self-
reliable in data delivery. All these coupled with its flexibility organize after being deployed in an ad-hoc fashion. WSN
make it a good choice to use in systems as large as ITSs. is comprised of sensing, computing and communication
WSN seeks to enhance the sensing and communication elements that give the user the ability to instrument,
within all major aspects of ITS. Improved communications observe and react to events and phenomena in a specified
and information sharing simply provides increased system
intelligence.
environment [3] as seen in Fig.1.
Keywords: Communication, Wireless sensors, intelligent WSN are suitable for ITS, integrating the core subsystems
transportation, network architecture. of ITS. In a WSN-based traffic information system,
sensor nodes collect traffic data from the road network,
I. INTRODUCTION and gateway nodes are essentially connected to the sensor
nodes to aggregate or process their data and transmit to a
Intelligent Transport Systems (ITS) over the past 20 plus traffic management centre or a back-bone [4].
years have grown significantly to have a huge impact on WSN possess nodes which are embedded with sensors,
vehicles and road transport systems as we have them processors and radios, collecting information in a
today[1]. They are a state of the art combination uniquely particular environment [5]. WSN are designed to meet the
designed for transportation, using the concept of principal requirements of accurate sensing, security,
information and communications systems. They thus reliability and long network lifetimes.
provide advance information and telecommunications In ITS the most important features are the vehicle states
networks for drivers, passengers and vehicles, as well as (position, speed and direction) and object classification.
being able to resolve traffic congestion and emergency One major challenge in vehicle control and traffic
situations [2 , 3]. management is in knowing the position and speed of the
vehicles on the road network in real-time [3].
Global Positioning Systems (GPS)
Some of the underlying technologies used in ITS are:
Several wireless standards are available for
Dedicated-Short Range Communication (DSRC) communication in WSNs, such as Bluetooth, Zigbee,
Wireless Networks
Wireless LAN, Wi-Max and 3G. The range of
It gets information from all transmitting stations, analyses An efficient ITS is expected to cover a large area, so
and processes the data, and display the operating status of WSNs must be large enough to meet this requirement.
vehicles and then issues control instructions [7]. With the With appropriate traffic estimations, only a small fraction
help of database servers, the control centre can gain and of road will be monitored by WSN. Traffic estimations
can be used to estimate traffic data at locations where lower density will be used in extra-urban areas and
sensors are not deployed and can lead to a significant motorways [8].
drop in the deployment cost of WSN [3]. H. Synchronisation
D. Fault Tolerance
The clocks of all sensors must be synchronised for data
ITS are considered safe from unstable environmental acquisition and communication. This ensures the
conditions and thus failure of sensor nodes are minimal. protocols are synchronised for low-duty cycles [8].
This directly impacts the WSN by increasing its life span I. Security
and designing of protocols [3].
E. Self-configuration and Self-maintenance WSNs in ITS are a common target for intruders and
attackers, seeking to corrupt or fake images about traffic
WSNs must be capable of adapting to changing conditions and manipulate data exchanged among sensor
conditions and reconfiguring in case of sensor failure. nodes, thereby causing a serious problem. Sophisticated
Basically, onsite maintenance shouldn’t be required, encryption algorithms can be implemented with WSNs to
rather remote diagnostics will be run as maintenance achieve higher levels of security [3].
routine [8].
F. Reliability of data delivery III. WIRELESS SENSING DEVICES
Reliable communication guarantees the connectivity Selection of the sensor to be embedded in a sensing node
among the sensing devices, but it is a significant should be based on system constraints which include the
challenge in WSNs due to lower-power ratios and harsh design requirements specified in the section above, as
environments. Limited transmission range can lead to well as mechanical stress resistance to severe
multi-hop communication. Specialised multi-hop environment conditions. Various types of sensors can be
protocols have to be designed to enable reliable used to monitor traffic conditions. For example, the
connectivity [8]. Inductive loop detector which detects the presence of a
G. High density of sensors vehicle. Video sensors are popular with ITS due to their
ability to capture visual information for monitoring
In order to provide accurate and continuous monitoring, traffic. Other sensors in use are infrared sensors, ultra
traffic could be sampled every 20-200 m, depending on sonic sensors and satellites [1].
the specific mobility content [8]. For instance, a higher
density of sensors will be used at urban crosses and a
Table 1 COMPARISON ON SENSOR MODALITIES
Sensor type Physical Advantages Shortcomings Possible areas of
information application
Acoustic Sound Low power consumption, not Sensitive to Controllable
sensitive to precipitation, environmental conditions environments such as
algorithms are capable of such as wind, radio indoor car parks and
vehicle classification, re- chatter and Doppler weighing stations or as
identification effects secondary sensors on road
networks
Infrared Light/radiation Algorithms are capable of Sensitive to effects of sun As secondary sensors on
vehicle classification and glint, changing light road networks that have
pedestrian detection intensities and absorption signalised intersections
owing to water with pedestrian phase or
concentration in fog, rain in controllable
and snow, can also be environments
obscured by smoke and
dust
Magnetic magnetic flux Small size, low cost, fast Not capable of detecting primary sensors on road
response, good sensitivity, low bicycles, pedestrians and networks, car parks, bus
power consumption, capable of animals. Requires close stops
directional measurement, proximity for accurate
vehicle classification detection
Optoelectronic Light Fast response, small size, ease Sensitive to shadowing Controllable
of vehicle detection and changing light environments such as
intensities indoor car parks, as
secondary sensors on road
networks
Pyro-electric Temperature Capable of detecting Difficult to achieve secondary sensors on road
pedestrians, bicycles and vehicle classification or networks, or as signalised
animals re-identification, cannot intersections with
detect stationary vehicles pedestrian phase
Ultrasonic Radio/sound waves Low cost, small size, ease of Sensitive to air As secondary sensors on
detection, can differentiate conditions, turbulence, road networks
vehicles from pedestrians scattering and temperature
intelligent transport systems, 6 (4), p.^pp. 421-432. [7] T. Huanqui, L. Wencong, and M. Shuangboa, "Intelligent
Available: [Accessed: Transportation Systems for Wireless Sensor Networks
[5] W. Chen, L. Chen, Z. Chen, and S. Tu, "WITS: A based on Zigbee," Presented at 2010 International
Wireless sensor network for intelligent transportation Conference on Computer and Communication
systems," in First International Multi-symposiums on Technologies in Agriculture Engineering. Available:
Computer and computational Sciences, 2006. [Accessed:
[6] X. Jia and c. Wang, "The Security routing research for [8] A. Pascale, M. Nicoli, F. Deflorio, B. Dalla Chiara, and
WSN in the Application of Intelligent transport System," U. Spagnolini. (Date). Wireless sensor networks for
in International Conference on mechatronics traffic management and road safety, IET Journals. p.^pp.,
andAutomation, 2006, pp. 2318-2323. Available: 10.1049/iet-its.2010.0129. [Accessed:
[9] J. Jeong, "Wireless sensor networking for intelligent
transportation systems," university of minnesota, the
faculty of the graduate school, 2009.
Abstract- Database at the end nodes of the client server availability features provided which is the main concern
architecture is a critical component in most of the IT of all DBAs all the times. He also added 80% of new
applications. High database performance is mandatory adopters of a technology are driven by cost savings which
requirement which mostly installed in the expensive high is the first biggest driver almost organization looking for
specifications hardwares. However, the hardware’s
resources such as CPU and RAM are not utilized 100% all
[4]. By 2013 the Virtualization market will grow to
the times. In which, IT organizations spend a massive time, nearly $11 billion which show the significant importance
efforts and operating expenses to maintain those of this technology [5]. Figure 1 [5] demonstrates the
components which partially ideal and not fully utilized. To vitalization adoption over time. By the first mid of 2013
overcome this costly issue, Virtualization is one of the server Virtualization will reach 79%. However, some
efficient solution and economic necessity for many IT disadvantages raise of the database Virtualization.
organizations. Virtualization is consolidating multiple This paper will focus on the implementation of
physical IT components such as physical servers into one Virtualization technology in the database environment
component or server to utilize its’ resources and run and present some real statistics of database server
multiple virtual machines on the same box. Dramatically
expenses reduction will be achieved, Increase effective
resources that are not utilizing this technology. Also, it
resources management, Reduce the data centre footprint, will explain the two types of server virtualizations. In
Increase uptime, Improve disaster recovery and Extend the addition, some advantages and disadvantages of a
life of older applications are some Virtualization’s benefits. database configuration in each type of server
This paper provides an overview of a virtual environment Virtualization will be presented. At the end key factors
and types of Virtualization, implementing a database in such will be highlighted
environment, advantages and disadvantages (benefits and
drawbacks) of database Virtualization, key factors need to
be considered.
Keywords: Virtualization technology, Virtual
Environment, database Virtualization.
I. I NTRODUCTION
Directly communicate
Hypervisor
Leverage OS
The goal of server Virtualization is to run multiple
with the hardware capability to handle
concurrent VMs on the same physical host. However, IT
resources. Better hardware resources.
professionals need to consider the SLA of users’
performance Support a large applications requirements in the VMs. McDougall R. and
More secure, virtual
characteristics. range of hardware Anderson J. illustrate the following points which explain
because it’s important Virtualization drawbacks[13]:
machine can damage inherited resources CPU efficiency. Number of VMs consumption of the
Less processing
only itself. from the OS. physical processor should be as low as possible in order
Easy to install and to overcome overload.
overhead, more virtual deploy since all Scalability to handle the increase workload. For
machines can be run hardware example, I/O scalability to handle VMs workload may
the need to take downtime because the ease of moving crucial. Fixing the performance issues and engage the
VMs from one physical server to another [4]. users will achieve tremendous success.
Furthermore, flexibly deploying and managing database Fifth, building a full team of Virtualization[21]. Plan
servers are another advantage of database Virtualization each stage carefully and engage the appropriate technical
as Soror et al. States as well as controls the allocation of team members will run the implementation smoothly. All
physical resources to virtual machines which can change team members need to communicate in all project stages
it as needed, he added[18]. in order to avoid unplanned circumstances. Also, working
However, Virtualization makes the DBA face difficulty all together help find a quick and fastest way to identify
in term of tuning and troubleshooting [4], [18]. This is the root causes and hence eliminate unwanted stops.
sometime due to difficulty to increase memory Making sure all involved teams are well trained on
requirements at the peak time for instance. Beside that, database Virtualization and server Virtualization. Sixth,
the cost of training and consulting raise another challenge avoid the early shutdown of the new database that is
of database Virtualization. That is because, many training Virtualized[21]. Service degrade affects service level
courses required in order to accomplish database agreement with the customer or other users.
Virtualization which included system administrators and Redundant systems should run simultaneously in order
DBAs. This is a really obstacle for smaller organizations to avoid business process delayed or stopped. As long the
want to go Virtualization[19]. Organizations and virtualized database becomes stable, the redundancy
companies have to evaluate the advantage and system can be moved. Finally, consolidation ratio is a
disadvantage database Virtualization will give comparing critical ratio affects the user workload in the peak time.
to their resources and requirements. As VMware, Inc personals - McDougall R. and Anderson
VI. K EY F ACTORS O F D ATABASE V ISUALIZATION J.- marked that the consolidation ratio of 10:1 can be
achieved using all available resources if a physical server
Despite the features that Virtualization or server is only 10% utilized[13].
Virtualization brings as well as many limitation ad VII. CONCLUSION
challenges arise with it, certain key factors need to be
pointed out. First of all, Virtualization is considered as a This paper has explained the central importance of
strategic decision an organization need to take it database Virtualization driven by server Virtualization. In
correctly. This is due many reasons include users' this research, the aim was to value a significant database
requirements and expectations. In other words, at least at Virtualization impact to IT organization Data Center,
the time of Virtualization ear starts growing users, organization’s resources and examine the two coin
exponentially, tremendous information is required in sides of running databases in a virtual environment. The
order to adopt or not Virtualization. Hence, the Top tremendous growth of data centres physical servers
management involvement is the first key factor. As should be reduced by using server Virtualization.
Shing-Han’s et al. statement “The success of a new This research has found that generally, database
technology requires the careful coordination from various Virtualization is a key to reduce resource waste, increase
aspects”[20]. For example, technical information from utilization, save money and cope up with the IT
professional DBAs and system administrators, Network sophistications growth nowadays. It was also shown that
administrators etc., training and consulting people, skills there is a nonstop innovation and implantation of
and experience, financial budgeting related to the total Virtualization technology since it started in early in the
cost and the economic feasibility analysis are critical to 1960s.
take a successful technology decision. In general, consequently it seems that many IT
Secondly, Treat Virtualization as an architectural organizations had experienced some or all the best results
decision throughout the organization as VMware white of database Virtualization based on the increase number
paper documented[21]. The long term plan is required of products and services available in the market. The
which explain the project practically implementation. current findings add substantially to our understanding of
This will prioritize the Virtualization priorities in which the new era direction toward the cloud and Virtualization.
organization plans to move applications to the virtual An issue that was not addressed in this study was
structure. Considering all milestones in the plan toward whether the database Virtualization will be the best
Virtualization. practice for small, medium and large organization. Also,
Thirdly, design the over big plan and start incremental whether the disadvantages mentioned will be eliminated.
targeting reture on investment[21]. In other words, More practical and technical research experiments are
deploying projects in small steps and start with less needed to better understand the real databases
critical system in order to get the benefits of the lesson Virtualization will be suitable considering the
learned in the initial stages. Getting the benefits of performance, security, high availability and disaster
Virtualization consaltants’ lesson learned. Forth, culture recovery architecture. A reasonable approach to tackle
change is required so the potential benefits users will these issues could be a real database Virtualization
realize the potential benefits[21]. During the implantation in different type of Virtualization types,
implementation for an example of a database different virtual environment and varies workload and
Virtualization high level of support and services is a users’ transactions over the peak and nonpeak time.
VIII. REFERENCES
[1] "Grids, clouds and virtualization [electronic [13] R. McDougall and J. Anderson, "Virtualization
resource] / Massimo Cafaro, Giovanni Aloisio, performance: perspectives and challenges
editors.." London ;: Springer,, 2011. ahead," ACM SIGOPS Operating Systems
[2] S. R. Smoot, "Private cloud computing Review, vol. 44, no. 4, pp. 40-56, 2010.
[electronic resource] : consolidation, [14] M. F. Mergen, V. Uhlig, O. Krieger, and J.
virtualization, and service-oriented infrastructure Xenidis, "Virtualization for high-performance
/ Stephen R. Smoot, Nam K. Tan.." Waltham, computing," ACM SIGOPS Operating Systems
Mass. :: Morgan Kaufmann,, 2012. Review, vol. 40, no. 2, pp. 8-11, 2006.
[3] E. Ray and E. Schultz, "Virtualization security," [15] G. Vallee, T. Naughton, C. Engelmann, H. Ong,
p. 42. and S. L. Scott, "System-Level Virtualization for
[4] K. Kline, "Megatrend: Virtualization," Database High Performance Computing," in Parallel,
Trends and Applications, vol. 25, no. 4, pp. 30- Distributed and Network-Based Processing,
30, 2011. 2008. PDP 2008. 16th Euromicro Conference
[5] K. Dutta and D. VanderMeer, "Cost-based on, 2008, pp. 636-643.
decision-making in middleware virtualization [16] J. Sahoo, S. Mohapatra, and R. Lath,
environments," European Journal of Operational "Virtualization: A Survey on Concepts,
Research, vol. 210, no. 2, pp. 344-357, 2011. Taxonomy and Associated Security Issues," in
[6] G. Shields, The Shortcut Guide to Implementing Computer and Network Technology (ICCNT),
Virtualization in the Small Environment: 2010 Second International Conference on, 2010,
Realtimepublishers. com, 2009. pp. 222-226.
[7] D. Yokoyama, V. Dias, H. Kloh, M. Bandini, F. [17] T. Kiefer and W. Lehner, "Private Table
Porto, B. Schulze, and A. Mury, "The Impact of Database Virtualization for DBaaS," in Utility
Hypervisor Layer on Database Applications," and Cloud Computing (UCC), 2011 Fourth IEEE
pp. 247-254. International Conference on, 2011, pp. 328-329.
[8] J. Brodkin, "A look at bare-metal hypervisor [18] A. A. Soror, A. Aboulnaga, and K. Salem,
basics," Network World, vol. 27, no. 14, pp. 1- "Database Virtualization: A New Frontier for
1,11, 2010. Database Tuning and Physical Design," in Data
[9] G. Vallee, T. Naughton, and S. L. Scott, "System Engineering Workshop, 2007 IEEE 23rd
management software for virtual environments," International Conference on, 2007, pp. 388-394.
pp. 153-160. [19] D. McCafferty, "The Growing Appetite for
[10] is in personal folders [Online]. Available: Virtualization," Baseline, no. 92, pp. 24-26,28,
http://library.books24x7.com/assetviewer.aspx?b 2009.
ookid=46282&chunkid=165734483 [Accessed: [20] S.-H. Li, D. C. Yen, C.-C. Hu, W.-H. Lu, and
[11] S. Loveland, E. M. Dow, F. LeFevre, D. Beyer, Y.-C. Chiu, "Identifying critical factors for
and P. F. Chan, "Leveraging virtualization to corporate implementing virtualization
optimize high-availability system technology," Computers in Human Behavior,
configurations," IBM Systems Journal, vol. 47, vol. 28, no. 6, pp. 2244-2257, 2012.
no. 4, pp. 591-604, 2008. [21] VMware. The Roadmap to Virtual
[12] G. Shields, "The Shortcut Guide to Infrastructure: Practical Implementation
Implementing Virtualization in the Small Stratgies [Online]. Available:
Environment," vol. 80.8 KB, T. S. G. t. I. V. i. t. http://download3.vmware.com/elq/pdf/wp_road
S. Environment, Ed.: Realtime Publishers, 2009, maptovirtualinfrastructure.pdf [Accessed: 6
pp. Virtualization consolidates many March].
underutilized physical machines onto a single
virtual host.
Abstract - Augmented Reality also called Mixed Reality. It 2) Entertainment: The game combines with virtual
aims at augment the interaction between people and virtual objects and real world environment gives people more
information. It applies the computer technology to add the pleasure;
virtual information into the surrounding environment, so 3) Medical treatment: To help doctor locate the
that, the virtual images or animations can overlay with the
real world. Augmented Reality is the improvement of the
surgery spot accurately;
Virtual Reality Technology. VR technology emphasizes to 4) Military affairs: Access to local related
the immersion of virtual world. But one disadvantage is geographic information through the orientation
users cannot see the real world at the same time. The recognition;
augmented reality technology combines the two dimensions 5) Monuments restoration: Recover the original
world and the real world together. It is a kind of state on the cultural relics sites;
information technologies which supplement and enhance the 6) Travel: Display the related information when
real world environment. people is looking at the scenery;
Generally, the AR system applies the head-mounted 7) Build: Construction planning will show directly
equipment. Through combining the imaging technology and
in the real scene.
3D registration algorithm together, user can see the virtual
objects and information in reality and in right place.
Augmented Reality has many applications, different areas II. TYPES OF APPLICATIONS
can benefit from it, such like education, medical, industrial The basic question of AR system is how to combine
design and navigation. This topic will cover the general virtual images and real world. According to today’s
types of AR system, mobile phone applications and the technology, this can be done in many ways, like the see-
present registration technologies. through HMD (Head Mounted Display) [1], the monitor-
Keywords: Augmented Reality, Virtual Reality, based system or AR mobile phone applications.
Visualization Technology, Registration technology.
The concept has been presented almost 40 years long, Figure 2: Optical see-through HMD conceptual diagram
because the limitation of hardware and software, AR [17]
develops slowly. Presently, AR is already used on many
different platforms, such like Head Mounted Display, 2) Video see-through HMDs [3] also called the
Monitor-based system, computers and smart phones. The closed-view displayers. The two front cameras can
AR still limit by work environment and location. How to provide user the view of the surrounding environment.
increase the precision of registration in real environment The scene generator creates the virtual images that user
will be an important issue. Even though, there are a lot of wanted, and video compositor blends real and virtual
problems in this area, the AR applications are already images together.
applied in different field and brought the benefit to us.
Some current applications of AR technologies:
1) Internet: Overlay the internet information in real
world ;
C. Monitor-based system [6] has one or more Currently, 3D registration contains the static registration
cameras to view the real world, the video will combine and dynamic registration. Static registration needs the
with virtual image such as the two see-through HMDs camera and the target object keep relative static state.
cases above, and then, the result will display on the Dynamic registration means when movement happened
monitor. One advantage is users do not need to wear any between the camera and object, the system needs to keep
equipment. Optionally, it can be made into stereo video. their relative direction and position. This process can
Users can see the stereo images by wearing the stereo separate into some steps, like image capture, image
glasses. extraction and recognition, parameter calculation, virtual
objects depicted. These procedures are easy to cause the
delay. Because of the system delay, the virtual
information will lag behind the movement of user’s head.
This may lead a phenomenon, the virtual objects moving
around near the real objects. So, dynamic registration will
be the key issue in the AR applications. Generally, there
are three kinds of dynamic registration techniques. The
registration based on the tracker, vision, and mixed for example, the software ARToolKit, and the Magic Eye
registration: Project [12], which developed by Washington University
and Carnegie Mellon University respectively.
A. Tracking based on hardware: There are four
main types of sensors used in the AR application, the 2) Marker less tracking: Marker less tracking does
magnetic tracking, acoustic tracking, optical tracking and not need artificial markers. The system can recognise the
the inertial tracking. The purpose of these sensors is to location and direction information according to some
record and recognise user’s direction and motion. special natural characteristic, such like the doors,
windows, buildings, graphic patterns. In marker less
1) Magnetic tracking technology: It determines the tracking system, the recognition of characteristic is
target’s position according to the coupling relationship harder. This system is suitable for some special
between magnetic field signal and magnetic induction environment where the markers cannot be deployed. In
signal. this condition, the system will apply the priori-knowledge
and real-time video to determine the transformation
2) Acoustic tracking: In general, this technique is to relation between cameras and real environment’s
deploy the ultrasonic sensors which used to send and coordinate. And then, system can get the transformation
receive the ultrasonic waves. By measuring the difference relation between the virtual objects and real world.
of arriving time (also called the Time of Flight) the Finally, overlay the virtual objects into the environment.
system can determine the distance of the surrounding
objects. But the disadvantage is that it is easily affected C. Mixed tracking technique: In fact, all of these
by other ultrasonic wave sources. mentioned technologies above, each individual
technology cannot satisfy all requirements of an AR
3) Optical tracking technology: It uses the cameras application. The general way is to integrate multiple
or photosensitive diodes to capture the reflected light techniques to improve the property of the application. So,
from objects. In order to reduce the interference by the mixed tracking technology needs to adopt at least two or
visible light, cameras also use the infrared light as the more tracking techniques in one AR application. Every
light source. single technology has both advantages and disadvantages,
like magnetic and inertial tracking technologies, their
4) Inertial tracking technology: The system real-time performance are good, but lack of precision.
contains a Gyroscope sensor and an Accelerator sensor. Instead, vision based tracking technology has perfect
Gyroscopes can track the motion of object by measuring precision, but poor real-time performance. Hence,
its angular velocity. Similar to the Gyroscope, the combine these two technologies will be a nice idea to
Acceleration sensor can provide the object’s moving make the AR applications become better. The current
direction. By combining the information of these two applications contain magnetic-vision tracking, magnetic-
sensors, the users’ motion and position can be optical tracking, acoustic-inertial tracking, vision-inertial
determined. tracking, and so on. The main difficulty is to fuse the
different sensors’ data. In addition, the property of
B. Vision based tracking technology: Before 1980, integration is also a question needs to be taken into
computers only can process and analyse the static account.
pictures, because of the limitation of the hardware. After
the optical flow method [10] has been presented, some
dynamic questions have been solved. But the calculation CONCLUSIONS AND FUTURE WORK
is too much, even for now days’ computer. Compare with The development of AR technology faces a lot of
the hardware tracking method, the computer vision challenges, but it also changes our life at the same time.
tracking technique only need simple equipment, also it is Here is another similar concept called sixth sense
cheap. According to whether adopts the artificial Marker technology [13]. Sixth sense technology is a very
[11], the computer vision technology can split into two fascinating idea, which also based on today’s smart
types: devices. By unify the devices and sensors together. Users
can manipulate the system without some fixed human-
1) Marker tracking: Firstly, the markers should be computer interface [14]. The common goal is to
deployed in the working environment, as the tracking encourage people interacting with the virtual information.
standard. They can be placed in real environment or fixed For example, users’ special hand gestures can make the
on the object. In many applications, the augmented different command to the system. It allows people cast off
information needs to keep relative static with users rather the discomfort of using different device platforms. As the
than the fixed environment. When system starts, it optical see-through equipment, sixth sense system uses a
extracts mark points from the image, and then recognises micro-projector to overlay the information on the
the mark points’ position and direction. Then, add the surrounding objects’ surface. If there is a way to unify
virtual images on markers. Finally, apply the perspective these two ideas together, it may bring great change in our
projection principle to finish the process of 3D world.
registration. Here are some representative applications,
Furthermore, since the AR technology is to augment the [7]. Augmented Reality Applications. [Online]. Available:
http://mashable.com/category/augmented-reality/ [Accessed: 13
real world, it that possible to apply AR in other field. It March 2013].
might be extended to sound. Sound wave can offset each [8]. Quasi-zenith Satellite System (QZSS) [Online]. Available:
other under certain conditions [14]. That could be applied http://www.jaxa.jp/projects/sat/qzss/index_e.html [Accessed: 13
to reduce the effect of noise. Users may need to wear March 2013].
[9]. H. Kato, M. Billinghurst, Marker Tracking and HMD Calibration
some equipment which has the external microphones. for a Video-based AR Conferencing System. [Online]. Available:
These microphones can detect the appointed incoming http://www.hitl.washington.edu/artoolkit/Papers/IWAR99.kato.pdf
voice, then generate the wave that has same frequency [Accessed: 12 march 2013].
and opposite direction. This would give the system a [10]. Performance of Optical Flow Techniques. . [Online]. Available:
http://www.cs.toronto.edu/~fleet/research/Papers/ijcv-94.pdf
chance to mask or cover up selected real sounds from the [Accessed: 12 march 2013].
environment by generating a masking signal that exactly [11]. Marker Tracking. [Online]. Available:
cancelled the incoming real sound [15]. This may not be http://www.hitl.washington.edu/artoolkit/documentation/tutorialmul
an easy issue, but still has the possibility. ti.htm [Accessed: 6 march 2013].
[12]. Magic Eye Project. [Online]. Available:
http://www.cs.cmu.edu/afs/cs/user/mue/www/magiceye.html
REFERENCES [Accessed: 16 march 2013].
[1]. Caudell, Thomas P. and David W. Mizell. Augmented Reality: An [13]. P. Maes, P. Mistry, 2009, Unveiling the "Sixth Sense," game-
Application of Heads-Up Display Technology to Manual changing wearable tech. [Online]. Available:
Manufacturing Processes. Proceedings of Hawaii International http://www.pranavmistry.com/projects/sixthsense/ [Accessed: 12
Conference on System Sciences (January 1992), 659-669. march 2013].
[2]. ‘‘Jannick P. Rolland, Optical Versus Video See-Through Head [14]. P O’Hagan, Zelinsky, Rougeaux, “Visual Gesture Interfaces to
Mounted Displays in Medical Visualization. [Online]. Available: Virtual Environments,” Proceedings of 1st Australasian User
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.85.3591 Interface Conference (AUIC2000). Canberra, Australia, January
&rep=rep1&type=pdf [Accessed: 12 march 2013]. 2000.
[3]. Bajura, Mike. Camera Calibration for Video See-Through Head- [15]. Z. Zhou and A. D. Cheok, Interacting with Computers, 2004,
Mounted Display. UNC Chapel Hill Department of pp.1043-1068.
ComputerScience technical report TR93-048 (July 7, 1993), 6 [16]. P H. Salmi, ‘‘Towards an Open Learning Environment via
pages. Augmented Reality (AR): Visualising the Invisible in Science
[4]. J Heikkila, A Four-step Camera Calibration Procedure with Implicit Centres and Schools for Teacher Education’’ in Procedia - Social
Correction, IEEE Proceedings of Computer Vision and Pattern and Behavioral Sciences. 2012, pp.284-295.
Recognition, 1997, pp. 1106-1112. [17]. R. Azuma, A Survey of Augmented Reality, 1997, pp.355~385.
[5]. Pinhole module. [Online]. Available: [18]. Yelp, iPhone software. [Online]. Available:
http://www.pinhole.cz/en/index.php [Accessed: 13 March 2013]. https://itunes.apple.com/us/app/yelp/id284910350?mt=8 [Accessed:
[6]. ARToolKit software library for building Augmented Reality (AR) 15 march 2013].
applications. [Online]. Available: [19]. ARToolKit software. [Online]. Available:
http://www.hitl.washington.edu/artoolkit/ [Accessed: 12 march http://www.hitl.washington.edu/artoolkit/ [Accessed: 12 march
2013]. 2013].
Abstract: Our era is regarded as the information age, at the the past, this would have been described as a myth or
same time there is a trend to couple information with an something that could only happen in movies but with the
appropriate knowledge about the sixth sense technology. help of this technology people will get information on
Though not widely known Sixth sense technology may well anything and from any part of the world within a couple
be regarded as the next generation of devices ranging from
gaming to more serious activities and tasks, as it is now, it
of seconds. Not only will people have the ability to
possibly will revolutionize ways of interaction between interrelate or communicate with things on a different
people and the real world, giving full understanding and level but also with each other. The potential behind this
knowledge of the environment around us. technology is its capability to scan objects or even people
Sixth sense technology also known as the wearable and visualise this information on any surface [3].
technology comprises of some basic components; a small
projector attached to a camera and a computing device With other devices, information is confined and trapped
(Smart phone) that functions as the processor and on a screen, in a desktop or a mobile device, the sixth
connected to the cloud where information are retained on
sense breaks these constraints and brings information to
the net.
the real world; rather than adjusting ourselves to gadgets
This research paper aims to describe how each component sixth sense adjusts the machine to people and trains it to
of the sixth sense technology is integrated to generate a understand natural hand gestures. Technology is changing
viable technology; it will also examines other research lives and the world at large.
carried out on related technologies and future enhancement
to the technology. II. UDERSTANDING SIXTH SENSE
This technology will certainly provide users with a
fresh perspective of the world with information at
their finger tips. The power of Sixth Sense lies on its Steven Mann was the first to have an initiative of the
capability to connect the real world with the Internet sixth sense technology back in 1998 called the
and masking the information on the world itself. Telepointer or otherwise known as synthetic synesthesia
of the sixth sense but was later developed by a PhD
Keywords: Sixth Sense, Wearable technology, student at MIT Media Lab [4].
Information, Internet.
Sixth sense is a wearable device that uses different
I. INTRODUCTION technologies like gesture recognition, image capturing
and processing; it is about comprehending information
more than the available senses.
Humans have evolved over time to sense the world
around, when encountered with something, someone or
place. As individuals, the awareness of the five basic EARLIER PROTOTYPE
senses is apparent and these senses are; touch, smell, The initial prototype was a wristband that would read
sight, hearing and taste. What individuals are not well radio frequency identification (RFID) tag to know for
aware of is the sixth sense and this is the sense of example which movie an individual picks of a shelf in a
otherworldliness: a connection to things greater than blockbuster shop; also a ring that uses infrared to
physical senses humans are capable to observe. communicate by signal to supermarket smart shelves to
provide information about the product [5] e.g. if a can of
Sixth sense technology enables people access the World milk is picked from the shelf the ring would glow a
Wide Web without the use of a screen, monitor or even a particular colour stating whatever information was
keyboard; any surface can be used as a display screen [1]. programmed on the system.
The whole idea was to make information more functional
It is a hi-tech device that seamlessly integrates analog and important to people in real time with less effort, the
information with the activities of the real world [2]. wrist band was showing good prospects but the use of
cell phones was still needed to get the information that
As of now individuals use devices like computers, smart was transmitted from the RFID. The main essence is
phones etc to acquire information required; with sixth attaining information from the internet and projecting it
sense individuals will use a device not bigger than the was a step further, someone wearing the wrist band picks
current smart phone and will eventually get much smaller up a book and the information is projected onto a surface
to connect with the internet [3]. This technology will in the store. At first a big projector was mounted on a
allow humans interact with the world like never before, in helmet, but that proved cumbersome because if the
person with the helmet got distracted the data would be based techniques and sends the data to the Smartphone.
projected to another surface, another prototype consisted Basically, the system executes a gesture camera that takes
of a camera recorder attached to a bicycle helmet [6]. photos of the scene by detecting the framing gesture [10].
B. MIRROR:
As the projector is suspended, steering downwards from
the neck, it projects the output image onto the mirror and
the mirror reflects the image onto the surface [10].
C. PROJECTOR:
The purpose of any projector is to project visual
Fig 1.1: Early Prototype [1] information and it is no different in this case. It projects
information allowing all surfaces around to be act as an
RECENT PROTOTYPE interface.
The new prototype is more user friendly; it is made up of
a miniature projector, a mirror and a camera which are D. SMARTPHONE:
attached together in a pendent-like mobile wearable All mobile devices transmit and receive data; a web
device. A supplementary Smartphone works with the enabled Smartphone processes the data by means of
sixth sense software and conducts the connection to the vision algorithms to recognize the object. The software
internet. The camera acts like a digital eye; it tracks searches the internet and interprets the hand gestures [10].
movement of the thumb and fingers of the user. The
software scrutinizes the internet for information that is E. COLOURED MARKERS:
related to a particular situation and the projector projects This is placed on the finger tips of the user or the finger
it on a surface. tips will be coloured with different colours. Marking the
Using the same example of a bookstore, once a book is finger tips with different colours of tape helps the camera
picked by a user, sixth sense recognises and searches the recognise gestures. The movement and arrangement of
internet, it then displays online reviews and prices of the the markers are deduced into different gestures that work
book on the cover of the book. Basically, all the work is as instructions for the projected application interfaces.
in the software; it constantly tries to find out what is [10].
around a user and what the user is trying to achieve [7]. It
has been declared open source as of January 05 2012, and B. WORKING PROCESS
runs on windows and the code is mainly written in c++
and c# [8].
INPUT
Camera
Coloured Markers
Smartphone Connects to
the internet
Projector Projects on
Mirror desired surface
OUTPUT
brings out the information from the confinements of the there is basically no end to what this technology can
virtual world and places it in the physical world [10]. do[12].
The sixth sense software recognises 3 kinds of gestures;
Multi-touch gestures: these are consistent motions
used to interact with devices, the ability to
simultaneously detect and resolve multiple touch
points [11]. Apple and Microsoft applications use
this gesture.
RFID is an electronic tagging technology that permits the but once it is made it will be a whole lot cheaper
discovery and tracing of tags/chip and subsequently the than the production price [13].
objects they are fixed to [14]. The tag comprises of a
microchip connected to a radio antenna which is placed
Connection linking the real and digital world [11]
on a surface to receive and transmit signals; the basic aim
is to enable the transmission of data via the tag. RFID
technology is used with Biometrics technology for Easy access to information: By means of the device
security [16]. the user can effortlessly get information from any
device instantaneously; data access by means of
E. COMMERCIAL PRODUCTS THAT USE SIXTH hand gestures is a lot effortless and user friendly
SENSE
compared to writing which requires a keyboard.
There are some products that use the sixth sense
technology and these are briefly explained below:
Open source software: it is made available to the
A) WHIRLPOOL WASHING MACHINES: general public and this gives the enablement for
other software programmers add to the improvement
Sixth sense technology sensors initially calculate the load
size. It further regulates the water level, the temperature of the system [8].
and the washing cycle in the interest of saving power and
natural resources. The sensors allow the appliance to Reduces machine dependence.
continue monitoring and adjusting the programme to
make sure ideal results and utmost efficiency is reached. Everything that has advantages also has disadvantages
[15]. and listed below are a few demerits:
B) TUMBLE DRYERS: Projector cannot cast perfect size images from
Sixth sense technology constantly measures the humidity all elevations.
level in fabric with the aid of sensors. It mechanically
regulates the drying cycle to finish when the cycle is Different surfaces may cause sensitivity
done, hence reducing time and energy. It carefully dries problem.
delicate fabrics and also washes and dries mixed coloured
fabric.[15]. Vulnerable to security threats.
C) FRIDGES AND FREEZERS: With every wearable there is the issue of health
Sixth sense technology controls the temperature for concerns, wearing the device too long is not
preservation of food and only cools when required; which
advisable.
boosts the energy efficiency of the machine. It also
User Safety Concerns: Because it is a wearable
investigates change in temperature after the door has been
opened and regulates cold air into the region of the fridge
that cool air escaped and replaces the lost temperature device, it can disrupt the user while driving and
[15]. this can lead to an accident.
IV. ADVANTAGES AND DISADVANTAGES OF SIXTH
SENSE V. FUTURE DEVELOPMENT
The advantages of sixth sense are enormous but to Sixth sense is still a working process and
mention a few:
Convenient: A core benefit of the device is its
recommendations have already been put in place and the
inventor and his team plan to make future enhancement
miniature dimension and portable size; the device for the technology and these enhancement or
can effortlessly be carried around. [13]. developments are listed below:
Eliminate the use of a mirror: mirrors reflect and
Support multi touch and user interaction: Multi deflect rays
sensing system permits the user to communicate Eliminate the use of color markers
with system with multiple fingers at a time. This is
usually helpful for large interface scenarios such as Compact ability: Implementing the use a laser
interactive table tops and walls [13]. projector and incorporating the projector and camera
inside the mobile computing device to make it a
Low Cost: Cost of production is quiet low, as the single unit for compact ability and easier to carry.
transmission of information thus improving the range [4] G. Sudhakaran, “Sixth Sense”, B.Tech Report
of the device.[3] ETAHECS017, Dept. of Computer Science and Eng.,
Govt. Engineering College, Thrissur, December 2010
Incorporating the sixth sense and third eye: This is a [5] T. Berners-Lee, P. Maes, J. Utko, “Highlights from
new system that has the capability of dividing the TED”-Tech News and Analysis. Available at:
screen for multiple users have access to different http://gigaom.com/2009/02/06/highlights-from-ted-tim-
berners-lee-pattie-maes-jacek-utko/ [Accessed: 11
resources. For example, with third Eye; two people
February, 2013]
can watch their favourite channels on the same [6] BBC NEWS|Technology| SixthSense blurs digital and
screen. [3] real. Available at:
Visual Cryptography
E.S Ikeremo
School of Engineering, Design, and technology
University of Bradford
ABSTRACT: With the recent development of cryptography, cryptography some basic terminologies have to be
it has more challenging for intruders to detect or see the defined: the visual cryptography schemes consist of
information and data transferred over a network. Visual double goals often examined that include little pixel
cryptography is a new technique of encrypting data or enlargement and bigger contrast. The contrast shows the
information sent via the internet. Visual cryptography is a
method of encrypting visual information (this has been said
brightness in both the place of black pixel and the place
before) such as picture, text, etc. and decrypts it without the of white in shapely image dissemblance. The secret image
need of computer. The underlying principle is a logical is conceal with the number of pixel
operation which allows encoding of a secret image into n multiplication[1],[2],[3].
shares that are distributed to n participants; the scheme Ordinary Visual Cryptography conceal image into many
separately reveals only the size of the image and this image fragment containing noise-like black spots in each, the
can be reconstructed by stacking the shares. actual image been deteriorated when unveiled, is not good
This paper examines visual cryptography schemes and its for fragmenting digital ceramics but can be used in
application, the advantages and disadvantages of various fragmenting secret images. In other to attain grand
visual cryptographic methods. It also contrasts image
quality and security applying different visual cryptography
attribute of the unveiled image. Visual cryptography
schemes. fractioning gray-level and colour images by using colour
It also examines the different visual cryptography schemes dissolution system and image haltone method [11] [12].
method in the aspect of security, quality of images, and There are various methods of implementing visual
contrast. cryptography Boolean operation are applied for defining
Visual cryptography has many methods such as halftone particular techniques. There is no requirement for bigger
visual cryptography, watermarking, colour visual bandwidth and the memory that are interrelated in
cryptography, Error diffusion and Boolean operation, etc. fragment pair, parallel error diffusion and auxiliary black
Visual cryptography can be used in wide areas of pixel, which are used in different methods of visual
applications such as online transaction, Trojan secure
Authentication using a PIN, Access control user image,
cryptography such as watermarking visual cryptography,
voting with a receipt based on visual cryptography halftone visual cryptography and extended visual
Key words: visual cryptography, secret, image, pixel. cryptography.
II. RELATED WORK
I. INTRODUCTTION Naor and Shamir introduced a method in which pixel are
The process of data generation in a masked format shared into multiple pixels. These multiple pixels consist
involving the protection, authentication and of one half white and remaining half black [4], [5]. These
confidentiality of the data is simply known as pixels can be combined in four possible ways, which are
“crptography”. Visual cryptography is a new form of black-white, white-black, and black and white. The black
cryptography that is currently in use in the information and white are represented with numbers o and 1
technological world to protect the exchange of secret respectively. The grayscale image or white image and the
message data or information. black are perform with permutation and combination
This method of cryptography does not require any form calculation. The principle of blue noise dithering and void
of cryptographic algorithm in its operations unlike the cluster algorithm used in encrypting of image employs
previous types of cryptography such as symmetric more complication than the computing period in this
(DES,AES,TRIPLE DES etc) and asymmetric (RSA, method. The fragment image shows twice the breadth of
Diffie-Hellman, Elliptic curve cryptography) algorithms. the actual image which involves sub pixel principle by
In 1994, visual cryptography was invented by Noar and using the grayscale image that shows in figure 1.the
Shamir, and it was employed in solving completely the actual image and the fragment image are used with the
problem of system complexity involved in the encryption above stated principle[4],[6],[7]. The idea of probability
and decryption technique of the two way communication for any of the pixels in figure 2 applies the combination
system [5]. Both public and private key algorithms are and permutation method with these colours.
employed in the traditional method of cryptography but
this is only made possible by sharing of the keys between
the sender and the receiver. Other techniques used in
traditional method of cryptography for the encryption and
decryption of data include the diffie-Hellman method.
Visual Cryptography has the name suggests depend on
images, and the attainment of visual cryptography
schemes is always described in term of pixel expansion
and the contrast. For a clearer understanding of visual
transactions on image processing, pp.1057-7149 [21] Yu-Chi Chen, Student Member, IEEE, Gwoboa
IEEE vol. 15, no. 8, August 2006. Horng, and Du-Shiau Tsai “ Comment on
[19] Jayanta Kumar Pal, J. K. Mandal and Kousik “Cheating Prevention in Visual
Dasgupta “a (2, n) visual cryptographic Cryptography”IEEE TRANSACTIONS ON
technique for banking applications” International IMAGE PROCESSING, VOL. 21, NO.7,
Journal of Network Security & Its Applications pp.1057-7149, July 2012.
(IJNSA), Vol.2, No.4, October 2010. [22] Cimato Yang “Visual Cryptography and Secret
[20] InKoo Kang, Member, IEEE, Gonzalo R. Arce, Image” Sharing CRC Press, Taylor & Francis
Fellow, IEEE, and Heung-Kyu Lee, Member, Group, 6000 Broken Sound Parkway NW, Suit
IEEE “Color Extended Visual Cryptography 300 ,ISBN 978-1-4398-3721-4.
Using Error Diffusion” IEEE transactions on
image processing, vol. 20, no. 1, pp.1057-7149,
January 2011.
Abstract - Since 1980s, researches have been conducted on the main role in surveillance, threat detection, electronic
identifying and classifying modulation types; driven by warfare, electronic counter measures, early warning,
requirements of civilian applications such as signal jamming, target acquisition and homing [2].
confirmation, interference regulation, spectrum monitoring, For this, numerous methods have been published for
etc. and military applications including surveillance, threat different types of modulation schemes based on various
detection, electronic warfare, early warning, jamming, characteristics of the intercepted signal over the past
target acquisition and homing. Recently, modulation years. Since almost the entire communication technology
identification is also gaining wide applications in the
realisation of 4G software defined radios and it is the main
is becoming digital, the primary concern of this paper is
requirement for future cognitive radio systems to allow with digitally modulated signals; specifically the basic
radio platform independent communications between radio digital modulation schemes, amplitude shift keying,
systems. frequency shift keying and phase shift keying.
Numerous methods have been proposed, out of which many II. DIGITAL MODULATION
of them require much memory, long processing time and/or
priori information of the signal (i.e. baud rate, centre Digital modulation is the process of transforming digital
frequency, bandwidth, carrier recovery etc.). The intent of symbols, 0’s and 1’s, into waveforms so that they are
this paper is to provide a robust modulation identification compatible with the characteristics of the transmission
method that uses no-priori information and employs
instantaneous frequency, instantaneous amplitude and
channel. These waveforms are pulses, for baseband
signal stationarity test with adaptive threshold setting modulation and high frequency sinusoids of desired
scheme. These features make the method suitable for faster characteristics called carriers for bandpass modulation
and online analysis with less system memory usage. [3], [4].
The proposed method has a capability to distinguish Digital bandpass modulation: this can be either analogue
between ASK, PSK, and FSK and furthermore, it identifies or digital in which a high frequency sinusoidal carrier is
intra-class modulation types within ASK and FSK. The modulated by information signal so that its signal
paper also presents MatLab simulation results on synthetic characteristics (i.e. amplitude, frequency and/or phase)
signals and gives conclusions and directions for future are modified for purposes of transmission [3], [4], [5].
enhancements.
Keywords: Modulation Identification, Software Defined
The general form of the carrier signal, S(t), is usually
Radio, Cognitive Radio, Instantaneous Frequency, written as:
Instantaneous Amplitude, Stationarity test, Adaptive S(t) = A(t) cos (t) (1)
threshold Where A(t) is the time-varying amplitude and (t) is the
I. INTRODUCTION time-varying angle. It is more convenient to write:
(t) = ωot + ϕ(t)
Digital modulation identification is the act of classifying (2)
a specific communication and non-communication signals so that
of interest based on their signal signatures and features.
Since late 1980s and beginning of 1990s, considerable S(t) = A(t) cos [ωot + ϕ(t)] (3)
interest by military research institutes, signal intelligence Where ωo is the angular frequency of the sinusoid and
systems venders, academic research centres, and different ϕ(t) is the phase. The terms f and ω will each be used to
telecom industries has focussed around the research and denote frequency and related by ω = 2πf [3], [5].
development of modulation identification systems. Both The most commonly used and basic types of digital
military and civilian applications make use of such modulation formats are amplitude shift keying (ASK),
systems; Civilian authorities, like telecommunication frequency shift keying (FSK) and phase shift keying
regulation bodies use these systems for monitoring (PSK).
transmissions in order to maintain a control over unlawful A. Amplitude Shift Keying
communications and sensing unlicensed transmitters,
signal confirmation, interference regulation and spectrum The general analytic expression is [4]:
monitoring. Recently, such systems are also gaining wide
applications in the implementation of 4G software
defined radios and it is the main requirement for future ;
cognitive radio systems to allow radio platform for 0≤ t ≤T and i = 1… M (4)
independent communications between radio systems and Equation (4) represents a typical expression for ASK,
to be able to automatically select the correct modulation where the amplitude term will have M discrete values,
schemes used in an unknown received signal in wireless which can be chosen by design and the phase term is
networks [1]. For military application, these systems play usually set to be an arbitrarily constant. In the amplitude
Amplitude(volts)
1
Signal(samples)
Fig. 6. ASK Signal 0.5
B. Frequency Shift Keying
0
The general analytic expression for FSK is [4]:
-0.5
; -1
for 0≤ t ≤T and i = 1… M (5)
Where the frequency term will have M discrete values, -1.5
0 50 100 150 200 250
and phase term is an arbitrarily constant. The FSK
waveform in Fig. 2, illustrates a typical 4-FSK signal Signal(samples)
with sudden frequency changes at the symbol transitions. Fig. 8. PSK Signal
In this illustration M is set to 4, corresponding to 4 level III. INSTANTANEOUS VALUES OF A SIGNAL
frequency shifts. In general any arbitrary number, M, can
be used for modulation of M-array, but in practice M is This section offers some mathematical preliminaries for
usually a nonzero radix-2 (i.e. 2, 4, 8 …). instantaneous value calculations.
The instantaneous amplitude, frequency, and phase of a
4-FSK given signal can be evaluated from the analytic
1.5
representation of the signal. One way of achieving the
Amplitude(volts)
-1
= (8)
Where the impulse response, hq(t), is given by
-1.5
0 50 100 150 200 250 300 350 400 450
Signal(samples) Substituting this in (8), the expression for the Hilbert
Fig. 7. FSK Signal
transformation can be rewritten as:
C. Phase Shift Keying
C. Instantaneous Frequency
Where i = 1, 2, 3... N-1 and j = i+1, i+2, i+3…N-1,
Finally the instantaneous frequency of a signal is from , the number of reverse arrangements, A, can be
achieved by derivation of the instantaneous phase and calculated as follows [6]:
relating the angular and linear frequencies by ω = 2πf.
Therefore the instantaneous frequency of a signal is:
(18)
IV. STATIONARITY TEST
From signal analysis and processing point of view, there Now, based on N (number of segments) observations we
is nothing more applicable than observing the statistical can produce the mean and variance as follows [6]: the
properties of a signal as a function of time to classify it as first equation is mean and the second is variance.
a stationary, when these properties are relatively similar
over the observed range of time and non-stationary unless
otherwise. In practice, we usually take advantages of
some statistical properties such as RMS, mean, skewness
or kurtosis over other properties like power, spectral Finally we define the null hypothesis of the reverse
density, etc. Best way to carry out the stationarity test in arrangements test as: “a given raw signal, to be said a
Where
is tested for stationarity. Besides the M-array PSK signals RMS of Inst Frequency
have always constant amplitude while M-array ASK has 7
A(N;1-a/2)= 4.533
‘m’ different amplitudes the same as M-array FSK that 6
A= 4.923
has M frequency levels. Based on these characteristics of A(N;(a )/2)= 4.663
the signals, the intra-class modulation identifications of 5 showing Non-stationarity
RMS values
FSK and ASK are carried out by counting the frequency
levels for FSK and amplitude levels for ASK modulation 4
0
0 5 10 15 20 25 30
Segmented Inst Frequency
Fig. 12. Interpolated RMS
-1 0
0 200 400 600 800 1000
-1.5 Number of tones
0 50 100 150 200 250 300 350 400 450 Fig. 13. Normalized Histogram
Signal(samples) B. 4-ASK
Fig. 10. FSK Signal a. Time Domain Representation
b. Instantaneous Frequency 4-ASK Waveform
5
Instantaneous Frequency
1.5
Amplitude(volts)
Amplitude(volts)
1
0
0.5
-5
0 100 200 300 400 500 600
0
0 50 100 150 200 250 300 350 400 450 Signal(samples)
Signal(samples) Fig. 14. ASK Signal
Fig. 11. Inst. Frequency Signal
b. Instantaneous Amplitude
c. Statistical Property of The Instantaneous
Frequency, RMS Value
Amplitude(volts)
1
4
0.5
3
0
2
-0.5
1 -1
0 -1.5
0 100 200 300 400 500 600 700 800 900 0 50 100 150 200 250
Signal(samples) Signal(samples)
Fig. 18. PSK Signal
Fig. 15. Inst. Amplitude Signal
5 Showing stationarity
200
4
3 0
2
-200
1
0 -400
0 5 10 15 20 25 30
0 100 200 300 400 500 600 700 800
Segmented Inst Frequency
Fig. 16. Interpolated RMS
Signal(samples)
Fig. 19. Inst. Frequency Signal
d. Histogram of The Instantaneous Amplitude,
c. Instantaneous Amplitude
Counting Number of Amplitudes
Instantaneous amplitude
Histogram 1.6
1
1.4
Amplitude(volts)
Amplitude Values
0.4
0.2
0.2
0 0
0 100 200 300 400 500 600 700 800 900 1000 0 100 200 300 400 500 600 700 800 900
number of amplitudes Signal(samples)
Fig. 17. Normalized Histogram Fig. 20. Inst. Amplitude Signal
5 Showing stationarity
PSK, 2 - 64ASK and 2 - 64FSK signals. However signals
4 in real world are entirely different from synthetic signals
due to many factors, such as non-linearity effects of
3
transmitters, modulators, mixers, multiplexers, power
2 amplifiers, and filters, manmade and thermal noises,
multipath effects, interferences, pulse shaping and
1 windowing effects, etc. As a result practical signal
analysis and processing of real signals need special care
0
0 5 10 15 20 25 30 before processing that is pre-processing of the intercepted
Segmented Inst Frequency signal. Pre-processing of the received or intercepted
Fig. 21. Interpolated RMS signal increases the performance of the modulation
identification algorithm as it tries removing windowing,
shaping effects, and unwanted signalling schemes within
e. Histogram of The Instantaneous Amplitude, the signal like ARQ signals, equalising the channel
Counting Number of Amplitudes effects and signal fades, reducing the noise, and the like.
Histogram Furthermore, this algorithm can be enhanced to make it a
1
rugged and robust digital modulation identification
system, which is strong enough even for signals with low
Amplitude Values
single Amplitudes indicating PSK 1(one) amp SNR levels and buried in noises by integrating it with
0.8 other algorithms like wavelet based and statistical
modulations identification algorithms.
0.6 REFERENCES
[1] B. Jaspal and T.Neeta, “Analysis of Digital Modulation Signals
Using Instantaneous and Stochastic, for classification,”
0.4 International Journal of Soft Computing and Engineering, vol.1,
no.2, May 2011.
[2] E. E. Azzouz and A. K. Nandi, Automatic Modulation Recognition
0.2 of Communication Systems. Dordrecht, Kluwer Academic
Publishers, 1996.
[3] B. Sklar, Digital communications: fundamentals and applications,
0 2nd ed., Englewood Cliffs, NJ, Prentice Hall, 2008.
0 200 400 600 800 1000 [4] E. A. Lee and D. G. Messerschmitt, Digital communications, 2nd ed.
number of amplitudes Norwell, Massachusetts, Kluwer Academic Publishers, 1999.
[5] C. R. Johnson and W. A. Sethares, Telecommunication Breakdown.
Fig. 22. Normalized Histogram
Upper saddle river, NJ, Prentice Hall, 2003.
[6] A. Brandt, Noise and Vibration Analysis: Signal Analysis and Ex
perimental Procedures. Chichester, John Wiley and Sons, 2011.
[7] M. H. Hayes, Statistical Digital Signal Processing and Modelling.
New York, John Wiley and Sons, 1996.
Wendong An
School of Engineering, Design and Technology
University of Bradford
Abstract--In wireless communication, bandwidth for between neighbour channels avoiding signal overlap.
data transmission is limited and valuable. Within a However this method wastes lots of valuable bandwidth,
given spectrum, high speed transmission is demanded in other words, decreasing bandwidth efficiency, further
by the new generation of telecommunication stander. limit the data rate.
However frequency-selective fading caused by signal However, in OFDM every channel is orthogonal to
multipath transmission creates inter-symbol each other, making it possible to let them overlapping,
interference to limit faster data transmission speed. then resulting in saving extra bandwidth, increasing the
For overcoming inter-symbol interference, data rate.
Orthogonal Frequency Division Multiplexing exhibits
advantages over conventional modulation but also
imposes several shortages.
OFDM divides wideband signal into multi-orthogonal
narrowband subcarriers, making each subcarriers
experience flat fading rather than frequency-selective
fading, contributing to minimize inter-symbol
interference. But the superposition of a number of
modulated sub-carriers may lead to a high
instantaneous signal peak power, thus usually high
linear power amplifier is required in OFDM system.
A large peak-to-average power (PAP) ratio introduces Fig.1. FDM and OFDM Spectrum Allocation [2].
new problems like inter-carrier interference, high out-
of-band radiation and so on. This paper will study and B. OFDM System
demonstrate several techniques -- signal distortion
technique, special sequence technique and others--
which are applied to reduce the peak-to-average
power (PAP) ratio. And combining with industry
realization factor, evaluate which techniques are
suitable for practical employment.
Keywords: OFDM, Peak-to-Average Power Ratio,
Reduction, Clipping, Special Sequence
I.INTRODUCTION
OFDM was standardized as the European digital audio
broadcast (DAB) as well as digital video broadcast
(DVB) scheme. It also constituted a credible proposal for
the recent third-generation mobile radio standard
competition in Europe. In 2003, OFDM was selected as
the high performance local area network’s transmission
technique as well as becoming part of the IEEE 802.11 Fig.2.Simple OFDM Block Diagram [3]
Wireless Local Area Network (WLAN) standard [1]. C. Serial to parallel convention
OFDM as a new generation modulation stander shows
a plenty of advantages to deal with telecommunication In the OFDM scheme, after digital modulation, the
problem comparing with conventional data transmission. whole serial data stream is passed through a serial-to-
So this paper first talks about OFDM theory and parallel convertor which splits the data into a number of
explain its advantages. Then introduce one of OFDM parallel channels.
biggest drawbacks which is high Peak-to-Average Ratio The data in each channels are applied to a modulator,
problem. Regard to this problem, the paper will propose for N channels there are N modulators whose carrier
several reduction methods. frequencies are f0, f1,…, fn-1. If Rb represents the serial
II. OFDM THEORY bit rate, Tb is period time between each bit, then each
A. Comparison of FDM and OFDM parallel symbol rate reduces to Rb/N, the symbol period
enhancing to Ts = N*Tb. Interval of each parallel channel
In frequency domain, conventional frequency division is Δf = 1/Ts = Rb/N. Each parallel channel frequencies
multiplexing (FDM) would leave empty spectrum are fi = fc+ i* Δf, i = 0 ,1,2…N-1. Fc is a base frequency.
The whole bandwidth of the N modulated parallel sub close spectrum space, so the energy of subcarrier could be
channels is N*Δf. And during an N-symbol duration added together, which require a high-liner amplifier to
period of the conventional serial system, each of the N send off. Usually this high peak power will be distorted
number of OFDM sub channel modulators carriers only by the amplifier and then break the orthogonality of each
one symbol, each of the symbol has an N times longer subcarriers. So receiver can’t tell data from each
duration. subcarrier correctly.
D. FFT and IFFT Modulation and Demodulation Furthermore, large signal amplitude swings are
encountered, when the time domain signal traverses from
A problem of OFDM scheme after serial-to-parallel a low instantaneous power waveform to a high power
convention is its increased complexity to employing N waveform, which may result in a higher out-of-band
modulators at the transmitter to modulate data to (OOB) harmonic distortion power. This then potentially
orthogonal carriers, which is sinusoidal and cosinusodia contaminates the adjacent channels with adjacent channel
signal. The same problem is also in receiver, asking for N interference.
demodulators. So this is the reason limited OFDM for A large PAP ratio also increases complexity of the
commercial apply until FFT and IFFT was invented in analog-to-digital (A/D) and digital-to-analog (D/A)
1970s. converters and a reduced efficiency of the RF power
The simple conceptual reason for using IFFT and FFT amplifier.
to do modulation and demodulation is that the OFDM A. PAP Ratio Formula Definition
sub-channel modulators use a set of harmonically related
sinusoidal and cosinusoidal sub-channel carriers, just like The definition of Peak-to-Average-Power Ratio is
PAR (dB ) 10 log10
the basis function of the DFT[1]. The contribution of max{| x(t ) |2 } (1)
IFFT and FFT is making modulation and demodulation E{| x(t ) |2 }
faster and easier.
Another definition is also useful, which is crest factor, the
E. Cyclic Prefix
ratio of signal to the square root of average power.
CF(dB) 10log10
max{| x(t ) |}
By adding guarder time in front of each symbol,
E{| x(t ) |2}
OFDM system would increase the robustness against (2)
inter-symbol interference. However, at the same time, the
X ke
orthogonality of each subcarriers would be broken, inter- When parallel signal sums up, x(t) could express as
N 1
x (t )
j 2
k
channel interference be caused. So instead of transmitting 1 T
t
max{ ( X k e T ) 2 }
each other. So equation could denote as
1 N 1 j 2 t
k
N k 0
( ( X k ) 2 (e T ) 2 } * N * ( X k ) 2
1 N 1
max{
j 2 t
k
1
N k 0 N (5)
(Xk ) 2
( ( X k ) 2 (e T ) 2 } ( E{( X k ) 2 }(e T ) 2
Fig.3. Guard time Interval for OFDM symbol.[4]
1 N 1 1 N 1
E{
j 2 t j 2 t
k k
F. Conclusion of Advantages of OFDM (6)
N k 0 N k 0
OFDM sub-channel is very narrow when compared to (X k )2
the normal channel’s bandwidth. So Flat-fading is N
suffered by each parallel channel, instead of frequency-
chosen fading.
And by adding forward error correction and cyclic So PAP ratio would be
PAPR N
( X k )2
prefix, inter-symbol interference almost is avoided in (7)
( X k )2
OFDM system. That makes OFDM operating without a
N
classic channel equaliser.
So for N subcarriers, the PAPR would be 10logN dB. For
III. PEAK-TO-AVERAGE-POWER RATIO PROBLEM
Example N = 256, the PAPR is 24dB.
As Fig.1 shows, in the OFDM sending system, the
IV. REDUCTION METHOD
parallel signal would be sent at the same time and in a
For solving this peak power problem, or peak-to- In the case of clipping resulting in a certain amount of
Average Power (PAP) Ratio problem, there are three out-of-band radiation, the Peak cancellation idea is to use
different categories of method to deal with. an envelope detector to get the peak signal, then by
The first category is signal distortion techniques, which frequency shift and scale changing, subtract whole signal
reduce the peak power by nonlinear distorting the OFDM with creating peak signal, resulting in reducing PAP ratio.
signal at or around the peaks. Such as Clipping, peak Peak cancellation can be assured that the peak power
windowing and peak cancellation. The second category is reduction will not cause any out-of-band interference.
coding techniques that use a forward-error correcting
code set that excludes OFDM symbols with a large PAP
Ratio. The third is based on multiplying each OFDM
symbol with different phase factor and selecting that
gives the smallest PAP ratio.
A. Clipping
| x(t ) | Ath
the amplitude needs to be clipped. [2]
x(t ) {
x(t ),
j ( x ( t ))
, | x(t ) | Ath
(8)
Ath e
Where Ath is the clipping level and Θ(x(t)) represents the
phase of x(t).
Although clipping is definitely the simplest solution,
there are a few problems associated with it. First, by Fig.5. OFDM Peak Cancellation Theory
distorting the OFDM signal amplitude, since the high
peak signal was clipped, the bit error rate (BER) will An efficient way to generate the cancellation signal is
degrade. Second, the spectrum of the clipped OFDM to use a peak detection and an impulse generator in
signal is viewed as the input OFDM spectrum convolved OFDM. In Figure.5, for each OFDM symbol, peak
with the spectrum of the rectangular window function. detection detects which signals exceed the predefined
Spectrum of rectangular function has a very slow rolloff, amplitude. Then, for every signal peak, an impulse is
resulting to increase the level of the out-of-band generated whose phase is equal to the peak phase and
radiation[2]. whose amplitude is equal to the peak amplitude. Then
To remedy the out-of-band problem of clipping, some through FFT and a lowpass filter to remove channel
nonrectangular windows could be used to clip the signal, noise. Finally using IFFT to modulate the peak impulse
such as cosine, Kaiser, and Hamming windows. To then subtract with the original signal.
minimize the out-of-band interference, the spectrum of
window should be as narrowband as possible.
C. Coding Reduction
2 N , i 0;
the sum of both autocorrelation functions[5]:
N 1
( x k xk i y k y k i ) {
0, i 0;
(9)
k 0
By taking the flourier transforms of both sides of (9),
| X ( f ) |2 | Y ( f ) |2 2 N
the above condition is translated into
Fig.6. For one sub channel implementing SLM when D = 4.
(10)
The information about the selected phase sequence
Here, X(f)2 is the power spectrum of x, which is the FT
should be transmitted to the receiver as side information.
X ( f ) xke j 2kfTs
of its autocorrelation function. The DFT X(f) is defined as
N 1
At the receiver, reverse operation should be performed to
(11) recover the unmodified OFDM symbol by using side
k 0 information.
Here, Ts is the sampling interval of the sequence x. From
the spectral condition (10), it follows that the maximum The disadvantage of SLM is selection functions may
| X ( f ) |2 2 N
value of the power spectrum is bounded by 2N: require n implementationally demanding IFFT operations
(12) for arriving at n different mapping choices [9].
Because the average power of X(f) in (11) is equal to N, E. Partial Transmit Sequences
assuming that the power of the sequence x is equal to 1,
the PAP ratio of X(f) is bounded as A different approach of the mapping concept is to use
PAP ratio 2
2N partial transmit sequences.
(13)
N
In [8], PTS method is explained as: the frequency domain
Here give an example of complementary code:
symbols, X, get partitioned into V disjoint
we have (+1, +1, +1, −1) and (+1, +1, −1, +1) two
blocks(1),X(2),..X(V). So the whole symbol X could be
sequence . Their autocorrelation functions are
denote as
(4, 1, 0, −1) and (4, −1, 0, 1), so they are complementary
sequence. When two sequences add up, get (2, 2, 0, 0).
X X (v )
V [1] Lajos L. Hanzo, M. Münster, B. J. Choi, Thomas
(15)
v 1
Keller, OFDM and MC-CDMA for Broadband
The beauty of PTS is that this can be done in the time Multi-User Communications, WLANs and
domain since the linear property of IFFT. That is,
Broadcasting,Sussex,UK:Wiley,2003,pp5,pp24.
xd (t ) IFFT ( X ( v ) Rd )
V [2] Dipol.[Online].Available:http://newsletter.dipolnet.ro
v 1
REFERENCES
O.O. Okesola
School of Engineering, Design and Technology
University of Bradford
Abstract- Voice and data are important elements in cellular network to actualize the green network. These
telecommunications. However over the past decade, the include implementing energy saving network protocols
demand for the provision of improved data rate and high and architecture, network planning and deployments,
speed voice services from cellular operators have placed base station redesign, cooperative relaying and cognitive
enormous pressures on the cellular operators to endlessly radio. Focusing on base stations, design changes have
update existing infrastructures in order to remain been proposed to power amplifiers. Also, introducing
significant and competitive in the cellular industry. power saving protocols to the base station, base station
Studies and surveys have indicated that the energy power management, efficient deployment strategies and
consumed by cellular networks is very enormous and it is cooperative relaying can also be implemented on the base
predicted that the figures will double in the next two station [1]. The role of MIMO cannot be ignored.
decades. Base stations have been discovered to consume
majority of the energy and this could be dangerous to the
environment in terms of carbon foot prints and also
radiation effects if, in order to improve Quality of Service
(QoS), energy is increased beyond safety threshold. More
research works aimed at managing energy consumption
more efficiently while maintaining good QoS are being
explored.
This paper provides an overview of the various techniques
that are employed to reduce energy consumption in the
communication industry with the main focus on the
incorporation of Multiple-Input Multiple-Output (MIMO)
technologies and schemes at the base stations and in cellular
networks to achieve energy efficiency.
Keywords: Multiple-Input Multiple-Output, Base station,
Cellular Network, Energy Efficiency Fig.1. Power consumption of a typical wireless cellular
network [5]
I. INTRODUCTION
Wireless communication has witnessed a remarkable
growth over the past decade because of the ever
increasing demand for high speed voice and data services.
This has placed the cellular industry in a most precarious
position because of these services that they provide to
mobile users and subscribers. These have prompted their
need to consistently upgrade and improve their
infrastructures in order to cope with these demands
without incurring high financial cost. However other
forms of concern begin to emerge in forms of
environmental safety and energy consumptions [1].
Statistics have confirmed that of the total energy Fig.2. Growth in base stations in developing regions 2007-
consumed over the entire network, the base station 2012
consumes 80% of this energy. The estimated number of (GSMA Research) [6]
base stations serving mobile users is more than 4million II. AN OVERVIEW OF MIMO
and predicted to almost double as at 2012 in developing
regions [1, 2]. This statistics should be a cause for alarm Figs.3 and 4 describes a MIMO system and channel
because it indicates that mobile operators will be model
responsible for the increase in carbon foot prints in the
environment and this is characterized with detrimental
effects. Regulatory bodies such as International
Telecommunication Union (ITU) and Network operators
3rd Generation Partnership Project (3GPP) to mention a
few have championed researches focused on methods in
realizing energy efficient networks also called, “Green
Cellular Networks” [3, 4]. Fig.1 and Fig.2 shows the
analyses of the energy a cellular network consumes and
an estimate of the growth rate of base stations in Fig.3 Illustration of a MIMO system, the transmitter has
developing regions respectively. Research interests have M antenna elements and the receiver has N antenna
identified areas to minimize energy consumptions in a elements [7]
A relay is simply a device that is placed between a the congested cells to cells of lower congestion.
signal source and its destination in order to increase the The advantages of zooming in a cellular network
signal strength that has been attenuated by distance. cannot be ignored. Most important is the energy
Cellular network comprises cells served by a base station. consumption reduced at the BS by saving power by 40%
Mobile users (MU) in a cell will experience varying which is really good. Other advantages are increased
signal strength from the transmitting BS depending on throughput in the network, higher diversity gain for MUs
their location in the cell with those at the cell edge likely and improved network coverage [13, 14].
to experience lower signal strength. This means that
either the BS increases transmission power or another BS C. Deployment of Heterogeneous Networks
is deployed in the same cell to compensate for the MUs A heterogeneous network in Fig.6 basically means
that have low signal strength to prevent dropped calls. different networks of various sizes interacting with each
However, in both cases more energy is consumed. other by specialized protocols to provide various level of
A relay station is a better replacement because it access to users within these cells. These cells are
consumes less energy than the BS and does not require a distinguished by their size and coverage capabilities.
wired connection to the BS backhaul. It also extracts They can be categorised as femto, pico, micro and macro
spatial diversity from available channels. cells in order of increasing capacity and coverage. Fig 7
The concept of relaying is that the BS transmits describes a typical heterogeneous network.
signals to MUs in its cell. The relay also receives these These cells are served by BS of various sizes
signals and retransmits them to the recipient MUs. MUs corresponding to their individual cell size and capacity.
that are farther away from the BS will still be in coverage The macro cell being the biggest is served by the largest
because the relay will compensate for the distance BS and the femto cell being the smallest is served by a
between the BS and MUs thereby increasing coverage much smaller low power BS. It is important to note that
and capacity. all these cells are contained within the macro cell which
Several concepts can be applied to relaying to make is the main cellular network architecture.
it more robust. These include: increasing the number of Femto cells are generally suitable for indoor services
relays in a cellular network to further increases capacity such as in houses to provide broadband access. Pico and
and coverage. Also, introducing cooperative schemes to micro and high traffic areas such as offices, shopping
the relays and some other intelligent relay schemes such malls
as Decode-and-forward (DF), Hybrid Decode-Amplify
and-Forward (HDAF) etc improve the performance and
efficiency of the entire system.
Implemented in a cellular network reduces the total
energy consumed by the BS by acting as an intermediary
between the MUs and the BS. The BS does not have to
increase transmission power to support the defined QoS
[12]
B. Cell Zooming
Cells in a cellular network can experience congestions
as the number of MU increases resulting in increased data
traffic in the network. The BS serving these cells will be
highly worked as it tries to meet this traffic demand. It
will increase transmission power to compensate for the Fig.6. Beamforming for Smart antenna [12].
traffic demand. This therefore increases the energy
consumed by the BS to assume the status of an energy
inefficient network.
The zooming technique is a form of beamforming
because it allows BSs to increase or reduce the size of the
cells depending on network congestion. It requires BSs
cooperation to implement this. When a cell gets
congested, it can zoom in to accommodate the users in its
boundaries while neighboring cells that are less congested
can zoom out to cover the cells that are not served by the
congested cell. Cells can switch to sleep mode/idle if
there is no demand for them to zoom saving more
energy[13]
In order to implement cell zooming, a Cell Zooming Fig.7. A heterogeneous network deployment [1]
server (CS) that makes zooming decisions based on the
information it gathers like CSI, cell load, etc. Based on and residential areas.
these information gathered, it sends specific instructions The overall aim of deploying a heterogeneous
to the specific base stations to control the sizes of the network is to reduce the activity of the macro BS and
affected cells. The zooming technique could be physical delegate to other low power BS. Like relaying, the
i.e. controlling the antenna height, its tilt and also the deployment of smaller BS reduces the propagation
transmission power. It could also be by the use of relays. distance between the macro BS and the MUs thus
The relays can decongest cells by transferring users from lowering transmission power. In the advent of high traffic
demand, the Macro base station does not have to increase [4] ITU-T Focus Group on Future Networks (FG FN), FG-FN
transmission power as the lower power BS can provide OD-66, Draft Deliverable on “Overview of Energy Saving of
the required capacity and coverage. Networks”, October 2010.
Available:http://www.itu.int/dmspub/itut/oth/
Plextek [15] analysed a femto cell deployment and 3A/05/T3A050000660001MSWE.doc.3.
compared with a macro cell expansion to provide similar [5] H. Congzheng, T. Harrold, S. Armour, I. Krikidis, S. Videv,
indoor coverage. They concluded that the femto cell had P. M. Grant, H. Haas, J. S. Thompson, I. Ku, W. Cheng-
a 7:1 operational energy advantage ratio to the macro Xiang, L. Tuan Anh, M. R. Nakhai, Z. Jiayi, and L. Hanzo,
expansion. Another observation was made when a pico "Green radio: radio techniques to enable energy-efficient
and macro cell network was combined, and their energy wireless networks," Communications Magazine, IEEE, vol.
49, no. 6, pp. 46-54, 2011.
saving matrices compared with a 100% macro cell [6] Green Power for Mobile, GSMA, “Community Power Using
network. The pico cell comprised 20% of the MU in the Mobile to Extend the Grid”. Available:
combined network. It was concluded that the combined http://www.gsmworld.com/documents/
network saved 60% energy unlike the full macro cell gpfm community power11 white paper lores.pdf.
network. It can be deduced from this analysis that with [7] K. Yu and B. Ottersten, "Models for MIMO propagation
the right combination of cell deployments, the best channels: A review," Wireless Communications and Mobile
energy saving network can be realized. Other advantages Computing, vol. 2, no. 7, pp. 653-666, 2002.
[8] A. J. Paulraj, D. A. Gore, R. U. Nabar, and H. Bolcskei, "An
such as increased capacity, increased coverage and higher overview of MIMO communications - a key to gigabit
data rate can also be observed. wireless," Proceedings of the IEEE, vol. 92, no. 2, pp. 198-
Overall, the smaller BSs consume less energy than 218, 2004.
the larger macro BS. Increasing the number of these [9] W. Jedi. 802.11n and Spatial Multiplexing [Online].
small BSs by joint deployment of smaller cells increase Available: http://wifijedi.com/2009/02/01/how-stuff-works-
the overall network energy efficiency [16]. However it is spatial-multiplexing/ [Accessed: 4th March2013].
[10] Andromida. Spatial Multiplexing Techniques and Antenna
safe to note that beyond certain thresholds, deploying an
Diversity for Multiuser MIMO Capacity Improvement
extra small cell can reduce the energy efficiency of the [Online]. Available:
network [15]. http://andromida.hubpages.com/hub/spatial-multiplexing-
In essence, the MIMO concepts can be observed in the spatial-diversity [Accessed: 14th March 2013].
number of channels available from the various numbers [11] Alloyant. Advanced Antenna Systems (AAS) and
of BS antennas available to exploit spatial multiplexing Beamforming: Technology and Advantages [Online].
Available:
and diversity gains.
http://www.alloyant.com/Whitepaper_Beamforming_Techno
logy_and_Advantages.html [Accessed: 14th March].
IV. CONCLUSION [12] R. Pabst, B. H. Walke, D. C. Schultz, P. Herhold, H.
Yanikomeroglu, S. Mukherjee, H. Viswanathan, M. Lott, W.
Cellular networks will always be essential for voice Zirwas, M. Dohler, H. Aghvami, D. D. Falconer, and G. P.
Fettweis, "Relay-based deployment concepts for wireless and
and data services. It is imperative that network mobile broadband radio," Communications Magazine, IEEE,
architectures can adapt to changes to cope with the ever vol. 42, no. 9, pp. 80-89, 2004.
evolving applications that demand high QoS. The [13] S. Bhaumik, G. Narlikar, S. Chattopadhyay, and S.
implementation of MIMO technologies to cellular Kanugovi, "Breathe to stay cool: Adjusting cell sizes to
networks can be the key to realizing this. Most reduce energy consumption," in 1st ACM SIGCOMM
importantly, Energy efficiency can also be achieved at the Workshop on Green Networking, Green Networking '10, Co-
located with SIGCOMM 2010, August 30, 2010 - August 30,
base station and the entire network with QoS not being 2010, 2010, pp. 41-46.
compromised. [14] N. Zhisheng, W. Yiqun, G. Jie, and Y. Zexi, "Cell zooming
for cost-efficient green cellular networks," Communications
REFERENCES Magazine, IEEE, vol. 48, no. 11, pp. 74-79, 2010.
[15] D. Calin, H. Claussen, and H. Uzunalioglu, "On femto
[1] Z. Hasan, H. Boostanimehr, and V. K. Bhargava, "Green deployment architectures and macrocell offloading benefits
Cellular Networks: A Survey, Some Research Issues and in joint macro-femto deployments," Communications
Challenges," Communications Surveys & Tutorials, IEEE, Magazine, IEEE, vol. 48, no. 1, pp. 26-32, 2010.
vol. 13, no. 4, pp. 524-540, 2011. [16] H. Claussen, L. T. W. Ho, and F. Pivit, "Effects of joint
[2] W. Guo, C. Turyagyenda, H. Hamdoun, S. Wang, P. Loskot, macrocell and residential picocell deployment on the
and T. O'Farrell, "Towards a low energy LTE cellular network energy efficiency," in Personal, Indoor and Mobile
network: Architectures," in 19th European Signal Processing Radio Communications, 2008. PIMRC 2008. IEEE 19th
Conference, EUSIPCO 2011, August 29, 2011 - September 2, International Symposium on, 2008, pp. 1-6.
2011, 2011, pp. 879-883.
[3] 3GPP TR 32.826, Telecommunication management; Study
on Energy Savings Management (ESM), (Release10), Mar
2010. Available: http://www.3gpp.org/ftp/Specs/html-
info/32826.htm., 2012.
Abstract - Communication has evolved from the archaic with unified communications systems that affords them a
circuit switched networks to a more complex and robust huge choice in their mode of communication [3].
data networks. The demand for higher data rate has The main drive for this evolution is obviously the
spurred research in different areas of communication. To demand for more data rate and good quality of service for
meet this demand, Multiple-Input Multiple-Output (MIMO)
technology is deployed. MIMO is a wireless technology that
end user. Fig. 1 shows the trend in communication with
uses more than one antenna at the transmitter and receiver respect to range in meters and download speed.
to transfer more data at the same time in multipath channel
without drawing additional power from the transmitter. II. HOW DOES MIMO WORK?
MIMO technology is not only a paradigm shift in wireless
communications; it inverts the wireless design principle that Future technologies are expected to support high data rate
multipath transmission causes interference and should be which may include high voice quality and motion images
eliminated. Instead, the presence of multipath which is [5]. To meet this demand, MIMO technology is
considered as a drawback in conventional Single Input
deployed. MIMO is an antenna technology that uses
Single Output (SISO) is now a major advantage for
increasing the data rate and improving quality of service for multiple transmitters and receivers to transfer more data
today’s technological demand for higher data rate. rate at the same time without increasing the transmit
This paper addresses how MIMO works, current power.
transmission schemes, MIMO system performance and The environment with its multipath propagation is an
antenna configurations for MIMO. So also, the prospect of integral part of transmission [6]. Each multipath route
MIMO for future network is discussed. acts as a separate channel and it serves as a virtual link
Keywords: Multipath, Multiple-Input Multiple-Output, over which to transmit signals. Conventionally, single-
Data rate input single-output (SISO) systems are confused by this
multipath while MIMO takes advantage of it to increase
I. INTRODUCTION
range and throughput. In operation, MIMO uses
From time immemorial, information and communication beamforming, antenna diversity and spatial multiplexing
technology have always formed the basis of human and these three concepts are discussed.
existence. It started with a simple fax, e-mail services and
voice calls perhaps between researchers or users in
different continent. However, mobile communication is
by any measure one of the fastest and most dynamic
segments of the communication industry. As such, this
field has captured the attention of communications
engineers and the imagination of the public. The
exponential growth of cellular telephone and the use of
smart phones for voice and data communications have led
to great optimism in mobile communications. Currently,
we have more than five billion users worldwide and the
main drivers of growth continues to be Asia-Pacific
region which accounted for 47percent of global mobile
connections at the end of second quarter of 2012 [1].
A. Trend In Mobile Communication
be phased array or adaptive array antenna. the base-station gets from the mobile subscriber (MS).
The phased array antenna consists of predefined patterns The pre-coding matrix indicator (PMI) information is
which can be switched to base on the direction required. missing. Without the ranking indicator (RI) feedback
On the contrary, adaptive array antenna has an infinite information, OLSM[11] can still be operated.
number of patterns and it is capable of directing beam in
the exact direction needed in real time. This property Closed-loop method: in closed-loop spatial
makes adaptive array antenna suitable for mobile
multiplexing (CLSM), the receiver reports three
communication. [8]
feedbacks: channel quality indicator, pre-coding
Beamforming itself does not increase the data rate but it
does increase the range. So also, de-correlation is not matrix indicator and the ranking indicator to the base
required at the receiver and this makes the design fairly station transmitter. Despite the fact that the MS sends
straight forward and easy but at the transmitter end, ranking information which indicates the number of
energy must be focussed in the right direction. spatial layers that the MS can support based on its
B. Antenna Diversity present channel conditions, the base station is still at
In antenna diversity, more than one antenna is used to liberty to decide whether to use different rank based
transmit and receive signals along different propagation on other measurements like amount of data in its
paths to compensate for multipath interference [8]. In downlink buffer. Due to this feedback, closed-loop
SISO, outage occurs if antenna falls into null and with method can respond to changing circumstances[11].
this situation; energy is wasted by sending in an With MIMO spatial multiplexing, mobile operators
unwanted direction which results in interference. can now use spectrum resources more effectively. The
Due to multipath propagation interference effects increased overall network throughput can be used to
between network nodes, the received signal strength may increase system capacity and service users more
vary strongly for a small change in the propagation
efficiently [9].
environment, affecting the link quality. These fading III. ANTENNA CONFIGURATIONS FOR MIMO SYSTEMS
effects can result in error or loss of connection between
For a communication channels, different models
devices.
can be used in describing the behaviour of air
Applying antenna diversity technique in scenarios above
will increase channel reliability for the allocated interface. A simple model is the Additive White
spectrum. Gaussian Noise (AWGN) which assumes the linear
addition of noise to the required signal with a constant
C. Spatial Multiplexing spectral density and Gaussian distribution of the
Spatial multiplexing is not intended to make transmission amplitude [8]. However, a more realistic scenario
more robust; rather it increases the data rate [6]. In order considers the impact of multipath propagation.
to achieve this in a simple way, a MIMO configuration In reality, a transmitted signal is susceptible to reflection
using two antennas at the transmitter and two antennas at and refraction on trees, buildings e.t.c. At the receiver, the
the receiver (2 X 2 MIMO) may divide data into separate received signals arrive with different phase and
streams and the streams are transmitted independently amplitude. All signals received superpose to cause an
through separate antennas as shown in Fig.2. effect called fading. Using different antenna configuration
allows the evaluation of different multipath scenarios to
reduce the effect of fading or interference.
Fig. 3 below illustrates the various antenna configurations
for the deployment of MIMO systems at the base stations
(BS). So also, Table 1 describes the antenna
configurations shown in fig.3.
of scattering which means that different designs must be 6] Rhode & Schwarz, (2011). Two-Channel Method for OTA
deployed for different environment or geographic Performance Measurements of MIMO-Enabled Devices.[Online
eBook]. Available: http://cdn.rohde-
location. So also, complex algorithm is required at the schwarz.com/dl_downloads/dl_application/application_notes/1sp12
receiver end to combine the received signal. /1SP12_1e.pdf [Accessed: 12 Mar. 2013]
3. Poor system performance at low signal to noise [7] Radio-Electronics, MIMO Antenna Beamforming.[Online].
Ratio Available:http://www.radio-electronics.com/info/antennas/mimo/
At low Signal to Noise Ratio (SNR), MIMO and SISO antenna-beamforming.php [Accessed: 12 Mar.2013]
performance is the same. To work effectively, MIMO [8] ATMEL, Antenna Diversity.[Online]. Available:
requires a good SNR level http://www.atmel.com/Images/doc8158.pdf [Accessed: 14
CONCLUSION Mar.2013]
[9] TE Wireless and Services, Distributed Antenna Systems and
Deploying MIMO technology in mobile communications
MIMO technology.[Online]. Available:
offers a large capacity in terms of gain over a SISO http://www.te.com/content/dam/te/global/english/industries/wireles
system. With perfect understanding of the propagation s-adc/knowledge-center/documents/distributed-antenna-systems-
environment, power can be allocated optimally over and-mimo-technology-109936AE.pdf [Accessed: 14 Mar.2013]
different receive and transmit antenna to increase the [10] 3G Americas, (2009). MIMO Transmission Schemes for LTE
range and data throughput. The inherent benefit of MIMO and HSPA Networks.[Online eBook]. Available:
has made it a subject of discuss and the future of mobile http://www.3gamericas.org/documents/Mimo_Transmission_Sche
mes_for_LTE_and_HSPA_Networks_June-2009.pdf [Accessed: 17
communications now hinges on this technology as it has Mar. 2013]
been adopted by the 3GPP for LTE networks. [11] Adigun, O.; Politis, C., "Energy efficiency analysis for MIMO
REFERENCES transmission schemes in LTE," Computer Aided Modeling and
[1] GSMA, (2010, July). GSMA Announces that Global Mobile Design of Communication Links and Networks (CAMAD), 2011
Connections Surpass 5 Billion.[Online]. Available: IEEE 16th International Workshop on , vol., no., pp.77,81, 10-11
http://www.gsma.com/newsroom/gsma-announces-that-global- June 2011
mobile-connections-surpass-5-billion.[Accessed: 25 Feb.2012]. doi: 10.1109/CAMAD.2011.5941122
[2] G.L Stuber, principles of mobile communications, 2nd ed. [12] Chiurtu, N.; Rimoldi, B.; Telatar, I.E., "On the capacity of
Norwell, MA: kluver Academic publisher,2004, p 3-10. multi-antenna Gaussian channels," Information Theory, 2001.
[3] T. Wakefield, Introduction to mobile communications: Proceedings. 2001 IEEE International Symposium on , vol., no.,
technology, services, markets. Ed. Boca Raton, Auerbach, pp.53,, 2001
publications, 2007. doi: 10.1109/ISIT.2001.935916
[4] NQ logic, (2010, Apr.).Broadband goes mobile.[Online]. [13] Foschini G. J. and Gans M. J. "On limits of wireless
Available:http://www.nqlogic.com/2010/04/broadband-goes- communications in a fading environment when usingmultiple
mobile.html.[Accessed: 25 Feb.2012]. antennas" Wireless personal Communications, vol. 6,pp 311-
[5] Ng, J. C -L; Letaief, K.B.; Murch, R.D., "Antenna diversity 335,1998
combining and finite-tap decision feedback equalization for high-
speed data transmission," Selected Areas in Communications, IEEE
Journal on , vol.16, no.8, pp.1367,1375, Oct 1998,doi:
10.1109/49.730446.[ Accessed 12 Mar.2013]
[
Abstract-The transition from analogue to digital aliasing, sampling the signal and assigning the samples
broadcasting has been a heated discussion among appropriate quantization levels.
stakeholders in the broadcast industry recently. The The promise of better spectrum utilization through
experiences of countries that have made successful digital compression and ease of manipulating digital
migration show that it is an intricate process involving
policy creation, access regulation, technical implementation,
signals among others encouraged the decision for a global
network planning and public enlightenment. Digital video switch to digital broadcasting. In the buildup to a
broadcasting (DVB) holds much promise especially in areas successful analogue to digital transitions, various bodies
of spectrum utilization, high definition content delivery, around the world have come up with technical
mobile television integration, high user television specifications or standards which are unified by the ITU
interactivity and future internet incorporation. Digital video to ensure quality of operation and interoperability. These
broadcasting standards define the benchmark for TV standards encompass source coding, error correction,
broadcasting. First-generation DVB standards are slowly modulation and decoding of signals. The Digital Video
giving way to research in future generation standards which Broadcasting (DVB) Project; an organization made of
emphasize adaptability. In a bid to meet the 17 July 2015
International Telecommunication Union (ITU)’s deadline
over 260 countries [5], was set up originally to develop
for the transition, several developing countries have made technologies for digital video broadcasting via the three
efforts through task force committees, trial transmission and traditional broadcasting distribution media; Cable
policy processes. Nigeria: a developing country with network, satellite systems and terrestrial networks leading
population densities higher in urban centers than rural to three earlier standards viz. DVB-C, DVB-S and DVB-
areas need to take into consideration the issue of sufficient T respectively and its standards have enjoyed wider
coverage. deployment around the world [6].
This paper makes an overview of digital video broadcasting Data available at the time of writing shows that many
standards. In addition it proposes the combination of developed countries have completed their digital
satellite communication and terrestrial broadcasting
systems as an effective approach to achieving an inclusive
switchover: in Europe, twenty two countries have made
coverage of Nigeria for a successful transition. successful analogue switch off with Hungary, Ukraine,
Poland and Russia having their switch over underway [7].
Keywords: Digital Broadcasting, Satellite Communication, In Asia; South Korea, Japan, China have had successful
Broadcasting Standards, Quadrature Amplitude Modulation, switch overs while Cambodia, Sri Lanka, Marshall
High Definition Television Islands, Malaysia, Brunei have theirs underway[8]. The
I. INTRODUCTION United States and Canada have also made successful
Since the invention of television in the 1920s [1], migration.
various analogue television standards have been Though DVB-S and DVB-C technology are spread
developed which include Phase Alternating Line (PAL), around the world [9], developing countries have shown a
Séquentiel Couleur à Mémoire Systeme (SECAM) and slow pace towards the transition to digital broadcasting,
National Television Systems Committee (NTSC). These with countries in Africa lagging behind. There have been
standards are basically spectrum sharing techniques more appreciable efforts on the parts of Kenya, Tanzania,
which have their inherent frailties prominent among Rwanda, South Africa, Uganda and lately Ghana than
which are cross-colour, cross luminance and “relatively some others. Some African countries have started pilot
poor chrominance definition” [2]. The move towards broadcasts while others are still at the policy stages.
digital transmission of video signals has not been a II. DIGITAL VIDEO BROADCASTING STANDARDS
sudden switch; auxiliary digital services employed to Standards for digital video broadcasting can be viewed
improve image quality have been developed all along. In or studied from the standpoint of the distribution media or
the 1970s, Vertical Insertion Test signals (VITs) were by looking at the technical specifications for each stage of
employed while Video Programmes System (VPS), the broadcast process. The former finds prominence in
Multiple Subsampling Encoding system (MUSE), this paper.
Multiplexed Analogue Components (MAC), D2MAC and A. The Satellite Standards
High Definition-MAC(HD-MAC) were developed in the Designing a system of moving pictures with
1980s [3]. These efforts in the digital direction had the accompanying audio which employs satellite
advantages of less susceptibility to degradation in quality, communication will require considering the drawbacks of
unique visual effect and ease of television interoperability this distribution medium. Satellite channels suffer from
[4]. Digitization of analogue video signal involves the signal degradation due to the course travelled by the
filtering of incoming signals from the camera to avoid transmitted signal to arrive at the receiver(s) and this in
turn decreases carrier-to-noise ratio. This explains the
choice of Quadrature Phase Shift Keying (QPSK) as a formats which added to the MPEG transports stream of
modulation technique for the DVB-S standard which was DVB-C. There is a parallel between the format for error
developed in 1994. The DVB-S system based on the protection in DVB-C2 and DVB-S2; both use FEC
Moving Picture Experts Group-2(MPEG-2) for source encoding which employs BCH outer coding, LDPC inner
coding is able to provide multi-programming services coding and bit interleaving which allows for cable
through Time Division Multiplexing (TDM) [10]. Error retransmission of received satellite signals. The higher
correction is achieved by combining convolutional order QAM mappings are implemented up to the level of
forward error correction (FEC) for inner coding and 4096QAM [16]. Furthermore in DVB-C2, the single
Reed-Solomon (RS) codes for outer coding to ensure a carrier modulation method is replaced by the multi-carrier
balance between power efficiency and spectrum Orthogonal Frequency Division Multiplexing (OFDM).
utilization. The performance of DVB-C2 shows low impact of
DVB-S2 essentially builds upon DVB-S and DVB- narrow band interference and negligible impact of burst
DSNG (DVB-Digital Satellite News Gathering) adding to errors and impulsive noise under simulated conditions
them advancement in coding schemes and flexibility to [17].
satisfy users’ demand for capacity and interactivity [11]. C. The Terrestrial Standards
It employs Adaptive Coding and Modulation (ACM) Terrestrial broadcasting has been the mainstay of local
which allows transmission parameters variation instead of broadcasting especially in the analogue mode. It suffers
the constant coding and modulation (CCM) used in DVB- from less attenuation when compared to satellite
S. The DVB-S2 standard specifies 8PSK, 16APSK and broadcasting but its channel is not as secure as the cable
32APSK modulation schemes in addition to the QPSK in channel. It is arguable that terrestrial broadcasting in the
the earlier standards. A combination of Bose-Chaudhuri- analogue mode holds attraction in areas where affording
Hocquenghem (BCH) for outer coding, Low Density set top boxes and (or) satellite dishes is beyond the
Parity Check (LDPC) for inner coding and bit financial capacity of locals.
interleaving provides robust forward error coding suitable In the DVB-T system, the RS code is implemented on
for the noise prone satellite channel. Furthermore a the MPEG-2 transport stream for outer coding coupled
backward compatibility feature of DVB-S2 allows for the with a punctured Viterbi Convolutional code for inner
accommodation of already existing DVB-S equipment coding. This combination serves to provide error
while its non-backward compatibility mode ensures full protection while OFDM transmission provides good
utilization of the digital “dividend” provided by its multipath performance for the QPSK, 16-QAM, and
deployment [12 - 14]. A comparison of some DVB-S and 64QAM modulated data carriers [18]. Digital Video
DVB-S2 parameters is shown in Table 1. Broadcasting over terrestrial systems- second generation
TABLE 1 (DVB-T2) deployed in 2009, nine years after the first
COMPARISON OF DVB-S AND DVB-S2 FEATURES [13]
generation standard extends the performance of the earlier
standard by adding LPDC, BCH and interleaving(bit, cell,
DVB-S DVB-S2
time and frequency interleaving) FEC for error
Modulation QPSK QPSK, 8PSK,
16ASK, 32ASK protection; constellation rotation; Multiple Physical Layer
Coding Scheme Viterbi and Reed LDPC AND BCH Pipes; extended interleaving and optional Multiple Input,
Solomon single Output (MISO) transmission mode. It also adds a
Coding Rates ½, 2/3, ¾, 5/6, 7/8 ¼, 1/3, 2/5, ½, 3/5, higher modulation level of 256-QAM, uses the active
2/3, ¾, 4/5, 5/6, constellation and tone detection techniques to reduce the
8/9, 9/10
Adaptive Coding No(CCM only) VCM and ACM*
Peak to Average Power Ratio (PAPR) [19]. Comparisons
(*Requires return of some features of both generations are shown in Table
channel) 2. DVB-T2 is not the only standard for Digital Terrestrial
Roll-Off 0.35 0.20, 0.25, 0.35 Television Broadcasting; in the United States, the
Spectral 1.0 – 1.75 bits/Hz 0.5 – 4.5 bits/Hz Advanced Television Systems Committee(ATSC) has
Efficiency
standards which bear its name; in Japan there is the
Integrated Services Digital Broadcasting-
B. The Cable Standards Terrestrial(ISDB-T) standard and in China the Digital
Similar to the satellite standard, presently there are two Terrestrial Multimedia Broadcast(DTMB) standard is
generations of the cable standard. Developed in 1994, the deployed. Simailar among these standards is their
DVB-C (DVB-over cable standard) is built upon the progress into the second generation. The progress of the
Quadrature Amplitude Modulation (QAM) development of the digital television standards has helped
accommodating 16 to 256-QAM constellations with a free up spectrum for incoperation of internet services on
roll-off factor of 0.15. The cable medium is relatively the broadcasting channnel creating avenue for interactive
less noisy since it is shielded and so error protection is services, reception of satellite and cable services on
based upon a shortened Reed-Solomon (RS) Code while mobile devices leading to specifications for handheld
convolutional interleaving ensures protection of the error terminals, internet protocol based broadcasting(Internet
protected packets against burst errors [15]. With Protocol Television) and possible convergence of the
improvement in coding techniques, the specifications for broadcasting standards. These feats have employed
digital broadcasting over cable was expanded to allow for cutting edge technologies for example in DVB-S2 and
higher order modulation in DVB-C2, adaptable input
DVB-C2, the Shannon’s limit has been nearly reached services have been slower in the digital switch though a
raising doubts over a next generation’s standard. The partnership between the National Televisions
deployement of digital terrestrial television around the Authority(NTA) and StarTimes Group(a China based
world is shown in Fig. 1. pay-TV provider) has initiated pilot digital terrestrial
television broadcast in some cities in the country. These
efforts have been felt more in the urban centers where the
TABLE 2 bulk of those who subscribe to these services reside than
COMPARISON OF FEATURES OF DVB-T AND DVB-T2 [20] in rural areas where awarenes of the broadcast trend is
less [21].
NIgComSat-1R in parallel with the efforts of private MILCOM 2005. [Online]. Available: IEEEXplore, DOI:
10.1109/MILCOM.2005.1605678. [Accessed: 8 Mar. 2013]
operators while digital terrestrial broadcasting can serve
for retransmission of received satellite signals and for [12] Ibid. 11
intended terrestrial signals. This state based satellite
service can be subsidized by government to provide news [13] B. Labsky and T. Kratochvil(2010). “DVB-S/S2 satellite
television broadcasting measurement and comparison.” Presented
and local entertainment content to its people. at 2010 20th International Conference Radioelektronika
Furthermore competing standards provides an (RADIOELEKTRONIKA). [Online]. Available:IEEEXplore,
opportunity for the country to engage foreign market DOI: 10.1109/RADIOELEK.2010.5478588. [Accessed: 8 Mar.
players interested in promoting their standards in the 2013]
rapid development of Nigeria’s broadcasting sector in [14] DVB Project, (2012, July). Digital Video Broadcasting (DVB);
exchange for standard adoption. Such development can Second Generation Framing Structure, Channel Coding and
be by way of manpower training and quality of content Modulation Systems for Broadcasting, Interactive Services, News
improvement. This is an opportunity for a leapfrog in Gathering and other Broadband Satellite Applications.[Online].
Available: http://www.dvb.org/technology/standards/A83_DVB-
broadcasting technology. S2.pdf . [Accessed: 8 Mar. 2013]
Abstract:-Datacentre (DC) is the most critical part of any Over the past 10 years there have been significant
organization; it is the heart of Information Technology (IT) developments to the design of datacentres. There are,
services where a number of servers, storages switches and now, a number of new technology and devices such as
all other IT equipment which run the organization’s rack mountable servers, blades chassis which contains a
business are located. It could contain hundreds of servers
and other equipment that consume a vast amount of energy.
number of blades servers (as much as 18 servers in some
Therefore, it is considered to be one of the main reasons for brands[3]) and other equipment such as load balances,
constant increase in carbon emissions. Additionally, fire walls, backup systems and storage units. However,
datacentres are major contributors to overheads cost which the footprint of these new developments has decreased
significantly impact on the IT budgets of organisations. due to technology evolution as well as the high capability
This research paper will focus on the datacentre cooling and density of the new equipment. [4]
system which plays a major role in the efficiency and cost The number of cores in new servers is 12 or 16 [5] per
effectiveness of the datacentre. An overview will be processer in some brands. The fast trend of business and
presented of datacentre cooling systems’ structures as well competition in the modern market results in a significant
as a number of techniques and best practice in the efficient
control of the airflow insider the datacentre. Finally, the
increase in demand for computing power, which
achievement of green datacentre through the utilization of gradually raises the number of datacentres around the
natural resources will be examined drawing on some success world. These datacentres consume about 8% of electric
stories. energy, and this percentage is steadily increasing. In most
The datacentre should be designed, implemented and datacentres, the largest portion of the power is
monitored most proficiently. The appropriate choice and transformed into heat [6]. This heat needs to be
implementation of a datacentre cooling system will help the monitored, controlled and reduced by efficient cooling
organization to increase its profit margin, minimize the systems in order to provide the requisite environmental
carbon footprint and protect the environment. ambience in the datacentre. This can be largely achieved
Keywords: Datacentre, efficiency, cooling system, carbon by following international standards which are presented
emissions in the following section.
INTRODUCTION
Arregoces describes the function of datacentres thus:
“Datacentres house critical computing resources in INTERNATIONAL ORGANISATIONS
controlled environments and under centralized GOVERNING STANDARDS FOR COOLING
management, which enable enterprises to operate around SYSTEMS
the clock or according to their business needs.” [1] It is There are a number of organisations which set
clear, therefore, that datacentres and their efficient standards and guides that should be considered in the
operations are of crucial importance for many design of datacentre cooling systems. As has already been
organisations. stated, proper adherence to and implementation of these
The number of datacentres is growing rapidly and standards can significantly enhance the performance and
contributes significantly to annual energy consumption efficiency of datacentres. The most prominent of these
around the world. Determining the exact number of DCs international organisations are presented below with a
is very difficult due to the reluctance of organisations to précis of their standards:
disclose information which is considered to be of a AMERICAN SOCIETY OF HEATING AND AIR-
sensitive nature. However, there are ethical issues CONDITIONING ENGINEERS (ASHRAE)
surrounding datacentres and their cooling systems insofar This was formed in 1959 when the American Society
as these impact on the environment and these issues are, of Heating and Air-Conditioning Engineers (ASHAE)
therefore, of public concern and not simply organizational and The American Society of Refrigerating Engineers
matters. However, it will be argued here that adherence to (ASRE) were merged into one society. ASHRAE is based
international standards and best practice will not only on research and studies of best standards of building
minimize environmental impacts but will also maximize systems, energy efficiency, indoor air quality and
the benefits for the organization through greater energy sustainability within the industry. The mission of the
efficiency. These standards have implications for the society is “to advance the arts and sciences of heating,
design and monitoring of the datacentre cooling system ventilating, air conditioning and refrigerating to serve
leading to a reduction of energy use and an increase in the humanity and promote a sustainable world.” [7]
lifecycles of devices. Seagate (famous for the NETWORK EQUIPMENT-BUILDING SYSTEM (NEBS)
manufacture of hard disks) point out that the hard disk This is “the most common set of safety, spatial and
Mean Time between Failures(MTBF) for each 10ºC environmental design guidelines applied to
increase in the temperature will reduce by 40%.[2] telecommunications equipment in the United States.” [8]
and advocates the physical protection of equipment by
testing the reliability of electronic systems to achieve a air into the raised floor. The perforated tiles are placed in
long life cycle in different environments.[8] the front of servers racks where cool air is needed to pass
EUROPEAN TELECOMMUNICATIONS STANDARDS through these servers and remove the heat to the cold
INSTITUTE (ETSI) aisle.
ETSI is an officially recognized organization by the
European Union. It produces globally-applicable
standards for information and communication
technologies. [9]
THE AMERICAN NATIONAL STANDARDS INSTITUTE
(ANSI)
ANSI was founded in 1918 by five engineering
societies and three government agencies. Its main goal is
to improve the global competitiveness of American
business through promoting and facilitating quality
standards. [10] ANSI is broad based and publishes
reviews and comments on draft standards.
Fig. 1 Hot-aisle/cold-aisle configuration.[13]
DATACENTRE COOLING SYSTEM OVERVIEW:
The environment inside the room should be controlled COMPUTER ROOM AIR CONDITION:
in such a way as to meet the industrial standards in order
to protect the devices. The cooling system in the The common air conditioning systems in raised floor
datacentre has two main roles. The first is the reduction of datacentres use air for controlling the temperature and
heat from the datacentre and the second is the control of humidity inside the datacentres. Computer Room Air
humidity. Conditioning (CRAC) and Computer Room Air-Handling
EXHAUST OR REMOVAL OF HEAT FROM THE (CRAH) both are used for raised floor environments and
DATACENTRE: each of them has a different structure.
The heat generated by standalone devices such as The CRAC system is also known as direct expansion
personal computers can be absorbed by the ambient air in (DX) and is divided into two units. One of them is located
a normal office environment. However, in high power inside and consists of compressor, evaporator coil and the
density equipment such as a cluster of blade servers expansion valve as shown in Figure (1) above. The
chassis in a row of rack, high levels of heat are generated second unit is outside the datacentre. Its role is to block
which should be removed immediately from the the heat and it consists of a condensing coil. This unit is
datacentre. located on the roof of the building. This type of
HUMIDITY CONTROL: datacentre air condition is cheaper and easier to maintain.
Heat is not the only problem which could affect the However, it is not suitable for large datacentres. [15]
datacentre devices. High levels of humidity could result The CRAH system also consists of two units but it
in tape media errors, excessive wear and corrosion differ from the CRAC system in having only fans and
whereas low levels of humidity could cause electrostatic cooling coils and in most cases it uses chilled water to
discharge (ESD),which also could damage the tape eliminate heat from the data center. The outdoor unit for
products. The recommended range for humidity in the CRAH systems consists of a chiller system. [15]
datacentre set by ASHRAE is 40-55%. [11] Both CRAC and CRAH systems in the datacentre work
in similar ways by pushing the cool air under the raised
DATACENTRE COOLING SYSTEM floor. The cool air comes out through the perforated tiles
STRUCTURES in the cold aisles and is sucked away by the fans inside
the equipment, which are assembled in the racks, absorbs
In most datacentres, the cooling system consumes 40% of the heat from the equipment and diverts it into the hot
the total power. [12] The typical cooling system is based aisles. Most of the hot air rises and eventually returns to
on cooling the entire datacentre; the room design the intake of the air conditioning units to be cooled and
configurations include a raised floor with height of 0.3 to returns again to the datacentre; however some of the hot
1.2 m, the raised floor is covered by tiles , the standard air escapes to the cold aisles and mixes with cold air
tile size is 610mmX610mm (2ftx2ft). There are two which causes a decrease to the efficiency of the cooling
types of tiles: solid tiles and perforated tiles. The room system. [16] There does not yet appear to be an efficient
should be carefully covered and sealed by the solid tiles. solution to this aspect of their functioning.
[13] Figure 1 illustrates a basic diagram of a datacentre
cooling system. The servers racks are organized in rows. COOLING SYSTEM DESIGN CHALLENGES
The area where the servers face each other, called the
cold aisle, and the area where the servers back each other In the initial design for a datacentre, the requirement
is called the hot aisle. [4 , 14] The air conditioning units for cooling capacity is based on assumptions for the
are placed in the beginning of cold aisles to push the cold growth of the datacentre in the future. However, due to
is a need for international agreements involving all 2010 5th International Conference on, 2010, pp.
countries so that best practice and standards can be 347-352.
implemented appropriately within specific context. On [12] N. Ahuja, C. Rego, S. Ahuja, M. Warner, and A.
the other hand, due to the increasing demand for Docca, "Data center efficiency with higher
datacentres, the next challenge is to adopt virtualization ambient temperatures and optimized cooling
and cloud computing so as to minimize their numbers in control," in Semiconductor Thermal
the future. Measurement and Management Symposium
(SEMI-THERM), 2011 27th Annual IEEE, 2011,
REFERENCES pp. 105-109.
[13] B. Fakhim, M. Behnia, S. W. Armfield, and N.
[1] M. Arregoces. Data Center Fundamentals Srinarayana, "Cooling solutions in an
[Online]. Available: operational data centre: A case study," Applied
http://www.books24x7.com/marc.asp?bookid=4 Thermal Engineering, vol. 31, no. 14–15, pp.
5396 [Accessed: 27 Feb 2013]. 2279-2291, 2011.
[2] D. Wang, "Cooling challenges and best practices [14] J. Cho, T. Lim, and B. S. Kim, "Measurements
for high density data and telecommunication and predictions of the air distribution systems in
centers," in High Density Microsystem Design high compute density (Internet) data centers,"
and Packaging and Component Failure Energy and Buildings, vol. 41, no. 10, pp. 1107-
Analysis, 2006. HDP'06. Conference on, 2006, 1115, 2009.
pp. 49-54. [15] 42u.com. CRAC / CRAH: Computer Room Air
[3] fujitsu.com. PRIMERGY BX900 S2 - Fujitsu Conditioner / Computer Room Air Handler
Technology Solutions [Online]. Available: [Online]. Available:
http://www.fujitsu.com/fts/products/computing/s http://www.42u.com/cooling/crac-
ervers/primergy/blades/bx900s2/index.html crah/computer-room-ac.htm [Accessed: 2 March
[Accessed: 13 March 2013]. 2013].
[4] R. R. Schmidt, E. E. Cruz, and M. Iyengar, [16] Z. Rongliang, W. Zhikui, C. E. Bash, and A.
"Challenges of data center thermal McReynolds, "Data center cooling management
management," IBM Journal of Research and and analysis - a model based approach," in
Development, vol. 49, no. 4.5, pp. 709-723, Semiconductor Thermal Measurement and
2005. Management Symposium (SEMI-THERM), 2012
[5] hp. HP ProLiant DL385 G7 Server [Online]. 28th Annual IEEE, 2012, pp. 98-103.
Available: [17] R. Tozer and M. Salim, "Data center air
http://h10010.www1.hp.com/wwpc/us/en/sm/W management metrics-practical approach," in
F05a/15351-15351-3328412-241644-241475- Thermal and Thermomechanical Phenomena in
4132832.html?dnr=1&jumpid=ex_R2515/us/en/ Electronic Systems (ITherm), 2010 12th IEEE
ISS/cclicks/4AA0- Intersociety Conference on, 2010, pp. 1-8.
1233ENW/Mark_Launch/dl385%2520G7 [18] S. K. Shrivastava, A. R. Calder, and M. Ibrahim,
[Accessed: 13 March 2013]. "Quantitative comparison of air containment
[6] J. Cho, T. Lim, and B. S. Kim, "Viability of systems," in Thermal and Thermomechanical
datacentre cooling systems for energy efficiency Phenomena in Electronic Systems (ITherm),
in temperate or subtropical regions: Case study," 2012 13th IEEE Intersociety Conference on,
Energy and Buildings, vol. 55, no. 0, pp. 189- 2012, pp. 68-77.
197, 2012. [19] D. Alger. Grow a greener data center [Online].
[7] Ashrae.org. About ASHRAE [Online]. Available:
Available: https://www.ashrae.org/about-ashrae/ http://library.books24x7.com/toc.aspx?bookid=4
[Accessed: 27 Feg 2013]. 5418 [Accessed: 13 March 2013].
[8] Telcordia.com. Telcordia [Online]. Available:
http://www.telcordia.com/services/testing/nebs/
[Accessed: 27 Feb 2013].
[9] ETSI.ogr. About ETSI [Online]. Available:
http://www.etsi.org/about [Accessed: 27 Feb
2013].
[10] ANSI.org. American National Standards
Institute - ANSI eStandards Store [Online].
Available: http://webstore.ansi.org/default.aspx
[Accessed: 27 Feb 2013].
[11] M. Pawlish and A. S. Varde, "Free cooling: A
paradigm shift in data centers," in Information
and Automation for Sustainability (ICIAFs),
Abstract-Our world is continuously growing and expanding Availability (CIA).Confidentiality deals with the
in all frontiers. The complexities and changes in the society prevention of unauthorised disclosure, integrity is the
are often critical to personal and business operations. prevention of unauthorized modification while
Society has become more increasingly dependent upon availability is the prevention of unauthorized withholding
information systems (IS) that operate in an unbounded
network environment. These networks develop into large-
of information respectively [11]. Present day information
scale systems that are linked and managed by different systems infrastructure characteristics such as; Large-
entities around the globe. scale distribution, open source, Mobility and flexibility,
As networks develop, the ability of these independent etc., are the main drivers for survivability concerns [2].
systems to effectively work together is most often times Similarly, the essential properties of survivability are
uncertain and problematic. Traditionally, information recognition, resistance and recovery [9]. Currently within
systems security principle is based on: confidentiality, the concept of survivability emphasis is placed upon a
integrity and availability (CIA). system of robust hardware and software as the enabling
This principle is restrictive and also becoming moribund in technology for system trustworthiness [2]. This trend is
the face of present day challenges and system security needs
in which the survivability of information systems is
expected to change as the information society expands
imperative. Survivability is the ability of a system to ensure [2].A precise definition of survivability is not yet given
the delivery of critical services and maintain essential and the concept is still being developed including the
properties in the event of system failures, attacks and creation of survivability models. The findings of this
accidents. research within current literature will amongst all other
Today, information systems security is growing beyond CIA issues, enumerate the barriers and challenges associated
due to its inbuilt characteristics and the need to contain risk with the pursuit of information systems survivability.
and increase security. Sectors such as healthcare, financial II. INFORMATION SYSTEMS OVERVIEW
services, telecommunication, energy and defence are
continually dependent on systems survivability. Its unique Before dealing with the survivability of information
features of maintaining essential properties, quality systems, it is important that some basic concepts of
attributes, identifying essential services are useful to
information systems are defined and explained.
consumers and businesses. Survivability is however an
evolving field with challenges. A. Data, Information and knowledge.
This paper focuses on survivability concepts, its essential
properties, survivable systems and drivers that force Information is an organisations most valuable resources
change. and the term is often confused with data [4]. Most of the
time, the terms data, information and knowledge are
Keywords: Survivability, Information systems, Networks, sometimes used interchangeably [5].
Security, Environment. . Data are raw facts [4].It refers to raw facts that are
converted into information when processed [5].
Examples of data are: customer names, addresses, ages
I. INTRODUCTION
and purchases, hours worked in a week, employee
number, sales order etc. [5]. Data can also be defined as
Information technology continues to play a vital role and an unstructured fact about objects, events or people [6]. A
penetrate different aspects of life for an increasing unit of data is known as a datum and is one or more
number of people and organisations all over the globe. symbols that are a representation of something [7].
Society is growing increasing dependent on systems that . Information is an interpreted data [7].It is the result of
operate in unbounded network environment. An the processing of data into something meaningful [5].
information system enriches humanity and also develops Information is the process of selecting, summarising and
complexities that create new dependencies and risk to the presentation of data such that it becomes useful to the
society [1]. There have been concerted efforts by security recipients [6]. This is the process of organising and
experts and practitioners to harden systems from all forms processing of data so that it would have additional value
of attack. However, despite these efforts, it is obvious that beyond the value of the individual facts [6]. An example
no form of system hardening can guarantee that a system of information is a list of customers between a particular
connected to an unbounded network will be invulnerable age grade that a sales officer is interested in reaching for
to attacks either maliciously or by accident [2]. the purpose of advertising a new product [5].
Survivability ensures that systems deliver essential .Knowledge is the understanding of relationships in
services and maintain essential properties such as information [4]. It is the ability to apply information
confidentiality, integrity in the face of attacks, failures effectively for particular purposes [6].This is the next
and accidents [9]. The traditional Information system stage in the conversion of data to a useful resource for
security principles are; Confidentiality, integrity and planning and decision making .it makes it possible to
utilise and share information after being created, gathered Hardware are the computer equipment, software are the
and stored [5]. instructions for the hardware, while data is for processing
B. Characteristics of Valuable information. through the system [5].
TABLE 1
DRIVERS THAT FORCE CHANGE FROM SECURITY-CENTRIC APPROACH TO A MORE HOLLISTIC ONE [8]
definition proposed [1], [2],[8],[9],[11],[12],[14]. For the rather than the compartmental approach aimed at pure
purpose of this reseach, survivability is defined as the security [8]. The unbounded nature of networks,
ability of a network information system to achieve its emerging technologies such as web services technologies
main mission in a timely manner while suffering from an and grid computing are becoming challenging for
attck, accident or fault [14].It is the continouis assurance traditional security-centric technologies. Efforts to
of stored information’s confidentality, integrity and contain risk and increase security also include the use of
avalabilty over time [15].Information suvivability is the technologies such as routers, firewalls, multi-tier
ability of an information system to continue to function application architectures, access control and proxy
while experiencing anomalous system behaviour, faults or servers. Current adoptions are integrated middle ware
malicious attack. solutions such as provisioning, Single sign-on (SSO), etc.
VI. BEYOND SECURITY [8]. Emergence of survivability takes care of the
deficiencies enumerated above and just as can be seen
The shift in perspective from security to survivability from figure 3 below, there is a shift in the current IT
involves the reorganisation of the security elements (CIA infrastructure state in organisations from security to
traid) and infrastructural component during survivability centric infrastructure.
implementation without sacrificing its security objectives.
Survivability entails taking the infrastructure as a whole
TABLE 2
SURVIVABILITY CHARACTERISTICS AND THE CORRESPONDING REPRESENTATIVE SURVIVABILITY PRIMITIVES [17]
Malice immunization
The need for manual intervention as a result of In addition to the traditional information security
application exceptions stalls survivability principle of confidentiality, integrity, and availability
specification of systems. (CIA), the principles of responsibility, integrity, trust and
ethicality (RITE) is key in securing information system in
These challenges can be overcome by the systems the future. This is because while technical control is
performing the task of self-configuration, self-heal, important, there is a need for; morality, integrity and
self-manage and self- distribute. The property of self- ethics on the part of the sophisticated future users of
configuration enables new devices to be configured information systems.
and fit into a system containing existing devices A survivable system ensures that when a network system
without necessarily needing the intervention of is threatened and failures loom, the essential services are
humans. Self-healing attributes allows the system to initiated and managed so as to avert the consequences that
recover on its own in the event of failures. The may be catastrophic and even fatal.
REFERENCES
challenge of performance overload could be managed [1] A. Ayara and F .Najjar, A Formal Specification
by the self –distribution capabilities [8]. Model of Survivability for Pervasive Systems. Presented
X. FUTURE TRENDS
at International Symposium on Parallel and Distributed
Current advances in information systems and electronic Processing with Applications, 2008. [Online]. Available:
networks present a great opportunity to process, transmit, IEEEXplore, DOI 10.1109/ISPA.2008.62. [Accessed 1
store and transmit data. It will change the social, Feb. 2013].
economic, political and global ways of doing things. This [2] K. Kyamakya, K. Jobmann, M. Meincke,
changes in technology and particularly the future trend Security and Survivability of Distributed Systems: An
has raised a number of concerns about the security and overview. Presented at 21st Century Military
survivability of organisational information assets [11]. Communications, 2000. [Online]. Available:
Security principles and survivability will be highly IEEEXplore, DOI: 10.1109/MILCOM.2000.904993.
influenced by the developments in information [Accessed: 1 Feb. 2013].
technology. A consensus on the nature security and the [3] J. C. Mingers, (1995). Information and meaning:
survivability of information systems will become more foundations for an intersubjective account, Information
difficult to manage in the coming future. Amidst the Systems Journal,[Online] vol. 5, pp. 285–30, Available:
technological development, new organisational structures DOI: 10.1111/j.1365-2575.1995.tb00100.x
will emerge with less, centralised, monolithic structures [4] R.Stair and G.Reynolds, Information systems
characterised by cooperation rather than autonomy and Essentials, 6th ed. New York, cengage learning, 2012.
control. This is expected to facilitate intense information [5] J.C Simon, Introduction to information systems.
sharing and a high level of inter-organisational and Danvers, John Wiley & Sons, 2001.
interpersonal connectivity [11]. [6] D. Avison and G. Fitzgerald, Information
The future will bring about organisation that are not systems development: methodologies, techniques and
bound by space but rather will be made up of network of tools, 3rd ed. Berkshire, McGraw-Hill Education, 2003.
individuals who process, create, hold and distribute [7] P. Beynon-Davies, Information systems
information. The globe would be borderless enabled by development, 2nd ed. London, the Macmillan Press Ltd,
technology with the focus shifting so as to consider the 1993.
wholeness and soundness of information systems. [8] R. Ramanathan, (2006). Thinking beyond
A subculture of responsibility, integrity, trust and security. EDPACS, [Online]. Vol 33(10), pp. 15-20,
ethicality (RITE) will be the key in securing information Available: Proquest,
assets of the future organisation. This in turn will impact http://search.proquest.com/docview/234908059?accounti
on the long debated definition of survivability and its d=17193 [Accessed: 2nd Feb. 2013].
relationship with dependability. [9] J.C. Knight, E. A. Strunk, K.J. Sullivan, ``
Towards a Rigorous Definition of Information System
XI. CONCLUSION Survivability.” Presented at DARPA Information
Survivability Conference and Exposition (DISCEX’03),
Survivability is crucial for any information system that 2003. [Online]. Available: IEEEXploe, DOI:
supports critical services in the organisation and society 10.1109/DISCEX.2003.1194874.[Accessed 12 Feb.
because of the severity and consequences of failures. 2013].
Since the society and the global social infrastructure have [10] Experts mind, (2013). Components of
increasingly become more dependent on different Information Systems. [Online]. Available:
essential services provided over distributed network http://www.expertsmind.com/learning/components-of-
systems such as energy, transportation, banking , defence, information-system-assignment-help-7342872605.aspx
finance, education, Telecommunications, utility , health [Accessed: 2 Feb. 2013]
care, emergency services , government , and health care, [11] G. Dillon and J. Backhouse, (2000). Information
it is very important to understand the components and system security management in the new millennium,
algorithms of survivability in the system. Association for Computing Machinery. Communications
of the ACM. [Online]. Vol. 43(7), pp. 125-128,
Abstract--Computer vision is extensively used in mobile to the exact measurement of obstacle’s size and shape and
robot observation systems. Mobile robots which are ultimately lead to accurate depth calculation.
supported with different type of sensors such as laser and Hence, the objective of this research was to explain the
sonar for their navigation are not only very expensive but idea of obstacle avoidance by detecting the obstacle using
also their accuracy and precision is not as good as the robots
which use visual information
the stereo vision technique implemented on mobile robot.
The vision system involves a process of acquiring frames II. Stereo Vision & Depth Estimation
from a live video stream obtained from two cameras Computer stereo vision operation is a process in visual
mounted on a physical support called stereo rig. Different perception that imitates the human sense of vision by
image processing algorithms are applied on this stream placing two cameras at a certain distance and they take
to sense the presence of any object in the robots way and pictures of one similar scene as shown in Figure 1 [2].
then calculate its size and distance .As far as machine These two projections, lead to the depth calculation.
vision is concerned stereo vision provide the best results.
The research paper focuses on the development of stereo
depth perception systems and obstacle detection
algorithms which are capable of providing movement of
the robot without any collision in a known environment.
Disparity map produced by stereo matching process is
responsible for the calculation of the distance of obstacle
form the robot. Stereo matching is based on area based
matching algorithm that uses Sum of Absolute
Differences (SAD) and gradient. The paper also discusses
different techniques like rectification camera calibration,
stereo correspondence and calculation of disparity.
I. INTRODUCTION
Autonomous robot is a need of the modern world as its
applications can be found in many industrial areas, such
as, people tracking, mobile robotics navigation, and FIGURE 1: PROJECTIONS OF A SINGLE SCENE OBTAINED
mining. It is also used in industrial automation and 3D FROM THE TWO CAMERAS
machine vision applications to execute tasks such as bin From a computational standpoint, a stereo system must
picking, volume measurement, automotive part determine the corresponding items in the images obtained
measurement and 3D object location and recognition [1]. from left and right cameras. The difficulty in
Therefore, it is essential that the mobile robot must be correspondence is the difference in perception due to
able to perform two tasks; first, it should have acceptable which few parts of the images obtained by two
sensing capabilities and second, it should be able to use eyes/cameras will not correspond. A stereo algorithm
its sensing abilities to navigate itself in an unknown must be able to handle parts of the image that may not be
environment. matched.
Autonomous robot basically rely on its own sensing skill, In order to find the same physical points in a scene, stereo
and for that, most of the systems deploy ultrasonic and vision corresponding algorithm is used that places the two
infrared sensors for navigation. However, these sensors different images on top of each other and find the two
fail to give adequate results when size and position of the pixels that correspond to each other. The distance
obstacle are needed. In that case, spatial sensing is between two corresponding pixels in image coordinates is
applied to the mobile robot. Spatial sensing is a three called the disparity and is inversely proportional to depth.
dimensional sensitivity system that extracts information Stereo vision triangulation algorithm is used to calculate
from the environment and allows the robot to adapt itself the distances of two objects by measuring disparity of all
in an ever changing dynamic environment. the pixels in the two images.
Stereo vision is a technique that is extensively being used III. STEREO VISION STEPS
for spatial sensing. Stereo vision mimics human visual The first step in stereo vision is pre-processing of the
apparatus to gain depth information. Two cameras images as images obtained from the two cameras are
provide different perspectives of a similar scene and lead
C. Camera Calibration
Camera calibration means assessing the camera’s intrinsic
and extrinsic model parameters. Camera calibration is
needed mainly for assuring epipolar constraint or for
rectification.
Steps In camera calibration [10]
• Acquiring images from both cameras The major problems that can be faced while correlating
• Uses chessboard pattern the two images are:
b) Matching cost computation
• Corners extraction from chess board
c) Cost Aggregate
• Results in .mat file including intrinsic and d) Disparity Optimization
extrinsic parameters of stereo camera
e) Disparity refined
For satisfactory results the intrinsic parameters of the The most common algorithm for stereo matching is local
Logitech camera model 2.0 should be: approach. In local approach a pixel from left image is
Focal Length: fc = [353.13743 352.32978] ± matched with all pixels of the same row of right image by
[8.08085 8.23615] shifting. This is a very simple technique and is widely
used in stereo matching; the local approach is illustrated
Principal point: cc = [167.26989 120.14406] ± in Figure 6 [12].
[7.71296 10.28340]
Skew: alpha-c = [0.00000] ± [0.0000] =>
angle of pixel axes = 90.00000 ± 0.00000 degrees
Distortion: kc = [0.14315 -0.96487 0.00008 -
0.00188 0.00000] ± [0.14581 1.34769 0.01398
0.00889 0.00000]
Pixel error: err = [0.16729 0.18380]
In the same way, the extrinsic parameters of the camera
should be:
Translation vector: Tc_ext = [-78.231335 -53.225431
584.101418]
FIGURE 6: STEREO MATCHING FROM RIGHT TO LEFT
Rotation vector: omc_ext = [2.169627 2.155013
0.116551] One of the benefits of local operation is that it reduces
signal to noise ratio SNR and uses WTA to calculate
Rotation matrix: Rc_ext = [ 0.006944 0.993779 disparity.
0.111155 A disparity map is used for keeping the depth of every
0.999970 -0.006531 pixel in an image. Every pixel in this disparity map
-0.004076 resembles to the same pixel in the reference image. A
disparity map can be generated by finding out the
-0.003325 0.111180
disparity of a physical point in multipoint view
-0.993795]
projections, and then repeating the same processor all the
Pixel error: err = [0.10002 0.13720] points in a 3D scene.
D. Image Rectification V. OBSTACLE DETECTION AND DEPTH
MEASUREMENT
The intrinsic and extrinsic parameters obtained from the
camera calibration and can be used to satisfy the Epipolar Object detection is the post processing operation. After
constraints and hence used for rectification of left and getting the disparity map of images from the stereo
right images. matching process each disparity level is put into different
matrix. The detection of obstacle and finding its distance
For a quick rectification Bouquet’s algorithm performs from the stereo hardware is carried out with the help of
best as it pre calculates the important indices and disparity [13]. As discussed earlier disparity is inversely
blending coefficients. The process of rectification is done proportional to the depth of the objects, in other words
only once before the acquisition of images and after this, the greater the disparity value smaller the distance, so the
the same indices and coefficients are used. object which is closer to the stereo rig is represented by
The process of rectification often results in the tilting or the darker value as compared to the object which is
shifting of the images that were obtained from the two relatively far from the cameras. The maximum disparity
cameras and because of these shifts; some regions of the level of 20 is suitable for slow moving robots.
images are padded with zeros or ones. To eliminate these So to detect accurate shape and size of the obstacle,
void regions, the image is cropped, where only the different operations such as connected pixels, region
meaning full contents of the image are retained and the properties, boundary detection and morphological
void regions are deleted. operation need to be performed. Once the object is clearly
detected, the distance of the closest object is detected
IV. STEREO MATCH
using tie points. To calculate the distance, the disparity
The stereo match algorithm finds the corresponding pixel map is analyzed and then different values are assigned to
in the images obtained from the two cameras. different disparity levels, depending on the world
REFERENCES
[1] Pasquale Foggia, Jean-Michel Jolion, Alessandro
Limongiello, Mario Vento “A New Approach For
Stereo Matching In Autonomous Mobile Robot
Applications”
Yeates, Amanda
School of Engineering, Design and Technology
University of Bradford
Abstract - In the ever changing world of today, one thing From its conception, there has been a gradual shift in
that is certain is the continuous and growing involvement of the industry from manual jobs to automated ones. Some
computerized machines in our day to day lives. Since the jobs have disappeared, new ones created, and others
introduction of automation into the society, there has been a modified completely. [1]
visible evolution in the way activities are performed:
Machines now replace humans in performing everyday
II. HISTORY OF AUTOMATION
tasks which range from simple household activities, to
computing, security management manufacturing and even Automation began much earlier in time than we
multi-million dollar guided missile systems. imagine. We can see an instance in an invention such as
This research is focused on the effects the introduction of the ball-float valve which controls the water level in
automation has brought about on the way of life of people. plumbing which is actually an ancient invention by the
It explores the changes in the management of activities from Romans. The word “automation” however did not
before automation, to after automation (the present). It also become popular until 1947 when General Motors
delves into the points of view of different people of the
established their automation department. From the
society concerning automation, and its continuous growth.
The effect of automation on the livelihood of the average
introduction of automation into the company, the factory
person is also investigated; several perspectives are output nearly doubled, while the number of blue collar
considered: those who see it as a means of conserving money workers began to decline.[2]
(companies), and those who end up being affected negatively During early automation, one of the major short
(workers being replaced). comings was that the machinery was inflexible. The
From all the facts accumulated, a prediction is made on invention of computers enabled a great development in
how the future would look like with this continuous that area, as computers could now be used to control
involvement of automation into our everyday lives. automated systems. Using Computer Integrated
Key Words: Automation, society, evolution.
Manufacturing, entire factory operations can now be
controlled with software packages.[3]
I. INTRODUCTION
The greatest evolution in all forms of automation as of
Right from the beginning of time, man has always tried present is operations which are designed to replicate
to invent ways to improve his life. This can be seen from human thought processes. These machines being created
one of the earliest instances: the invention of the wheel to have the ability to “think”. They are able to perform
make transportation of goods and people more efficient, basic reasoning not programmed initially into their
the invention of fire for heat as a means of defending memory. This is called artificial intelligence.[4]
himself.[1] The future will consists of smarter and more efficient
Automation can be defined as “the use of machines, machines, taking the place of humans in performing
control systems and information technologies to optimize almost every task.
productivity in the production of goods and delivery of
services”.[2] Automation is a step beyond mechanism, III. TYPES OF AUTOMATION
which requires machines to assist humans in the muscular Automation today has a vast range of applications
requirements of production activities. Automation beyond manufacturing where it started from. These
requires very little human sensory and mental include:
requirements, while at the same time increasing load Automated retail:
capacity, repeatability and speed in the process.[2] It is Food and drink: Restaurants such as McDonald’s use
driven by people’s need for higher quality at lower prices. automation, with their touch screen ordering and payment
The benefits provided by automation[2] are: systems. Others now utilize applications on mobiles and
1. Increased throughput or productivity tablets enabling costumers order and pay for their meals
2. Improved quality or increased predictability of online. In some places, conveyor belts systems are used
quality. to convey food, and hence eliminate the need for manual
3. Improved robustness (consistency), of processes waiters.[2]
or product. Stores: The introduction of self checkout systems in
4. Reduces operation time and work handling time many supermarkets and even smaller stores has greatly
reduced the need for checkout workers. Even more
significantly.
efficient is online shopping where payment and checkout
5. Provides higher level jobs in the development, are done through an automated online transaction
deployment, maintenance and running of the processing system, and the goods delivered to the
automated processes. costumer.[2]
economy. People’s need to be attended to with the theatres, airlines, and hotels) respond to by hiring more
friendliness and warmth that humans provide will not be workers.”[13]
enough reason for the government to halt the continuous We cannot forget that the workers are still the
introduction of new automated technologies into our consumers. Therefore, no matter how cheap the
world. The most they could do would be to make these commodities being provided in the future are, people with
devices more fool-proof and user- friendly. no work will not be able to afford them.
A solution offered for the unemployment crisis was one
V. AUTOMATION: THE ISSUE OF of education: to retrain people rendered obsolete, because
TECHNOLOGICAL UNEMPLOYMENT in the future, not all tasks could be done by machines.
In the 1930’s, the economist, John Maynard Keynes This plan however could cause a serious dent in the
expressed concerns about automation and the fact that it economy of the countries accepting it. [10]
would lead to mass unemployment. This theory never The theory is that although these machines take away
transpired though, and so the idea was regarded as a jobs, they would however need people to maintain them.
fallacy. [10] However, looking at trends taking place in This could still provide at least one tenth of the jobs. But
different parts of the world today, the concept of even that is starting to change. We are starting to build
technological unemployment seems to be becoming more machines to take care of these machines.[15]
and more of a reality: Machines taking over the jobs of Drum stated “We’re not building machines to take over
humans, and causing an increased rate of unemployment. physical labour; we’re building machines to take over
In the US, each year, millions of jobs are created to mental labour.” [15]
keep up with the growing population. Even the present Are any jobs truly safe from automation? Rally,
jobs are becoming lower-wage jobs. In the near future, Comrades! renders a solution: the best move would be
these jobs, both those requiring low skill and high skill public ownership of the technologies for the benefit of the
will be replaced by automation.[12] The predictions for society. [13]
America by were of 50% unemployment in the next 40 “At the same time, the problem is not the technology
years, as robots take upwards of 50 million jobs. [13] So itself. It’s not about destroying the machines and turning
what happens to the people being put out of work? to older ways of producing. New productive technologies
offer the possibility of producing what every human
being needs to not only survive, but thrive, allowing us to
turn our attention away from fighting each other based on
the old notion of scarcity. Instead, the abundance these
machines make possible can enable us to solve the issues
we as a planet are facing: hunger, homelessness,
sustainable energy, environmental degradation, disease,
etc. These are achievable ends, but it will require
harnessing these technologies to benefit all humanity, and
this will only be possible if they are owned by all of
humanity.” [13]
such as design, test/calibration and production aids like Of Automation - In the home [Online].
precision mechanical tooling, robotization and industrial Available:
automation. Also, the capital required for those facilities http://science.jrank.org/pages/679/Automation.ht
proved expensive for industries in the small scale sector: ml [Accessed: 15 March].
Unfortunately more than 70 percent of the manufacturing [5] M. MITCHELL. Automation and the Elderly
units in developing countries). [16] [Online]. Available:
However, these countries have also begun to evolve http://www.channel4.com/programmes/richard-
with new policies and also help from the United Nations wilson-on-hold/articles/automation-and-the-
Industrial Development Organization (UNIDO): which elderly [Accessed: March 16].
provides assistance for the establishment of centres for [6] K. Liz. Are Self Checkouts Already Fading
industrial automation technology in the developing Away? The Numbers May Surprise You
countries. [16] [Online]. Available:
http://www.theblaze.com/stories/2011/09/26/are-
VIII. THE FUTURE WITH AUTOMATION self-checkouts-already-fading-away-the-
Predicting the future of automation could be tricky, due numbers-may-surprise-you/# [Accessed: 15
to the complexity of the automation systems and March].
industrial operations of today.[17] At present, in the [7] W. Denise. The Problem with Self-service
manufacturing industry, the machines (robots) are quite Checkouts [Online]. Available: [Accessed:
expensive and cannot be afforded by smaller [8] B. Schneier. The Problem With Electronic
organizations. The next generation of machines will be Voting Machines [Online]. Available:
cheaper and easier to assemble. They shall be more http://www.schneier.com/blog/archives/2004/11/
powerful and more functional, at the same time, smaller the_problem_wit.html [Accessed: 17th March].
and consume less energy. [18] The effects of this both on [9] T. P. Blog. Elderly, people with
the economy and society will be huge. The equation is disabilities suffer more with automation
tilting toward the favour of the machines. [Online]. Available:
http://pcij.org/blog/2010/05/10/elderly-people-
with-disabilities-suffer-more-with-automation
IX. CONCLUSION [Accessed: 17th March].
Automation, though slow to develop over time, is [10] A. Frank. Could Automation Lead to Chronic
taking over the world. As more and more countries adapt Unemployment? Andrew McAfee Sounds the
to the trend, we are approaching a future that years ago Alarm [Online]. Available:
would have seemed impossible: A future where our http://www.forbes.com/sites/singularity/2012/07
surroundings and activities can be controlled by less than /19/could-automation-lead-to-chronic-
the touch of a button. It seems so much like paradise, like unemployment-andrew-mcafee-sounds-the-
scenes from science fiction movies. alarm/ [Accessed: 17th March].
The fact we have to face however is the huge gap of [11] M. Ford. Will Robots cause Mass
change before a world like this can come to be. With so Unemployment in China [Online]. Available:
much power being given in favour of automation, we [Accessed:
need to ask ourselves: Is this the best way for humans? [12] M. Ford. Job Automation: Is a Future
Can we manage both the people and machines to produce Unemployment Crisis Looming? [Online].
a positive outcome for all? Or do we need to slow down? Available:
We cannot just become a utopia overnight. The change is http://www.huffingtonpost.com/martin-ford/job-
commencing quicker that we imagine. The impacts could automation-is-a-futur_b_832146.html
be drastic if something does not change. The future [Accessed: 16th March].
might just be here before we are ready. [13] C. Rally. A Future without Jobs: What is the
REFERENCES Solution? [Online]. Available:
[1] I. Annelise. The History of Automation [Online]. http://www.lrna.org/2-
Available: http://ezinearticles.com/?The- pt/articles/v22ed2art1.html [Accessed: March
History-of-Automation&id=3770263 [Accessed: 17th].
15 March]. [14] K. Mats. Will Automation Lead to Economic
[2] t. f. e. Wikipedia. Automation [Online]. Collapse? [Online]. Available:
Available: http://www.ted.com/conversations/13603/will_a
http://en.wikipedia.org/wiki/Automation utomation_lead_to_econom.html [Accessed:
[Accessed: 15 March]. 17th March].
[3] C. G. McKown, "The evolution of automation in [15] K. Drum. Who Will Tend the Machines That
the 21st century," in Northcon/93. Conference Tend the Machines? [Online]. Available:
Record, 1993, pp. 2-4. http://www.motherjones.com/kevin-
[4] T. Blaze. Automation - History, Types Of drum/2011/09/who-will-tend-machines-tend-
Automation, The Role Of Computers In machines [Accessed: 16th March].
Automation, Applications, The Human Impact
[16] V. Shatravko, "Centre for Industrial Automation [18] F. Don. The past and future of automation—
Promotion in Developing Countries," in what’s in store for the next 40 years? [Online].
Intelligent Motion Control, 1990. Proceedings of Available:
the IEEE International Workshop on, 1990, vol. http://www.isa.org/InTechTemplate.cfm?templat
2, pp. 855-858. e=/ContentManagement/ContentDisplay.cfm&C
[17] C. Mike. The Future of Automation [Online]. ontentID=82308 [Accessed: 17th March]
Available:
http://www.isa.org/InTechTemplate.cfm?templat
e=/ContentManagement/ContentDisplay.cfm&C
ontentID=90801 [Accessed: 16th March].
Abstract - The chief reason for governments bearing the very vital element when it comes to power systems since
expenditure for the distribution and generation of electricity the requirement for the electricity has gone up and also
is its high cost; subsidizing electricity tariffs for the people the technological era has seen advent of hackers and
takes a large chunk from a government’s budget. Yearly, malicious viruses which organizations are using for their
governments around the world are allocating large amounts
of money in order to improve their energy sector.
competitive advantage which in result requires constant
Governments are now keen to find ways to maximize monitoring and security of a electrical network system.
efficiency in the distribution of electricity; which can be
achieved by putting in a smart grid system in place. Policy Smart grid system consists of mainly smart devices such
makers in the energy sector around the world have reached meters which monitors and acquire information regarding
a strong consensus amongst governments to change the old the stream and condition of power , two way
electricity grid systems and upgrade to a newer, communication unlike traditional grid which consistently
modernized, and efficient system. sends and receives information regarding the conditions
of the equipments in operation and advanced software
This research paper will highlight the basic infrastructure of
a smart grid system and give more detail as to what benefits
which helps in manipulating and communicating with
governments can avail when opting in to upgrade to the new smart devices.
system. It will also examine the economic impacts of the new
smart grid system compared to the old grid system by 2. SMART GRID SOLUTION
highlighting the positive and fundamental economic impacts The journey of evolution from traditional grid technology
it can have on the growing economy and even exploitation of to smart grid has enabled the consumers and the service
renewable and non-renewable energy sources. Smart Grid providers to establish a two way communication via
technology is not only beneficial and economically wise in broadband to take timely decisions. Smart grid consists of
the long term perspective but also essential in lowering a smart meters to automated computer and independent
nation’s carbon footprint; which can improve the overall
energy ecosystem.
smart devices which can respond and act digitally to the
vibrant and varying electric demands. With the
Keywords : Smart Grid technology, Smart grid solutions, introduction of smart grids the efficiency of electricity
renewable energy, sustainable energy has improved to a large extant and offering solutions such
1. INTRODUCTION as quick restoration of power failures. Smart grid
Distribution, transmission and generation of electricity is technology also allow opportunities for the customers to
undergoing a major progression which has given a birth regulate themselves according to their electricity demand
to a new frontier of Smart Grids Technology. Innovations which can also help in reducing the carbon foot print. The
in the sectors of renewable energy and micro-generations, important tools which make up the smart grid system are
massive research and development and now in the mass discussed in the next section.
production of electrical vehicles has created a
requirement for transmission and distribution of
electricity in more efficient and reliable manner. In order
to meet such requirements, the governments and
multinational companies around the world and investing
huge amounts in order to make the power systems more
intelligent and secure. The transition from traditional
energy supplying system to new smart grid system will
require massive investment initially. However, the
product of this massive investment will be able to meet
the need of the industry and domestic for many years to
come. Smart grid system will be vital in bringing the
carbon content to a more optimum level.
which helps the service providers to tackle any power gathered in order to send it to the HMI, Remote Terminal
deficits. Units (RTUs) are installed which is a smart device which
The benefits of AMI a huge and various but the ones has both digital and analogue inputs and outputs[7]
which are worth to be noted are consumer benefits which through which the information is processed and is then
allows the costumer to select through various prices transmitted as a telemetry data which allows the
listings and range of services the electricity provider has measurements to be made over the distance[8].
to offer. In regards to the smart grids the AMI hands out The another worth mentioning hardware which is used as
as a new smart grid stage which helps in providing the a subsystem under the SCADA umbrella is
amplified bandwidth and broader regional coverage Programmable Logic Controller (PLC) which is used as
which then directs to broader range of services for the an independent smart device containing variable number
grid innovation. of input/output ports [9] and acting as a digital computer
to control and manipulate equipment. There are multiple
types of PLCs available in the market depending on the
functionality, demand and requirement of the applications
for which it is needed. PLCs can act both as input and
output depending on the requirement of the environment
and can work in harsh conditions such dust, heat and
cold. PLCs execute the software repeatedly in controlled
environment. PLCs uses ladder logic which is basically
based on circuit diagrams of the relay logic. The ladder
logic looks a lot like ladder with vertical rails and
horizontal lines between them. This ladder logic is used
since the sequential control of a process is required.
3. PLUG-IN ELECTRICAL VEHICLES, A FORCE
FOR SMART GRIDS
Fig 4. : Advanced Metering Infrastructure Protocol
The wide-ranging network between both the service The automotive industry has not only given us. The
provider and the consumer can integrated in the present pollution created by automotive industry is so dangerous
grid system which can be beneficial in terms of services and lethal that it is twice as deadly as traffic accidents
and cost collection for both the parties. The AMI has a according to a study of UK air quality.[10]. Luckily the
structure built in such a way which comprises of the automotive manufacturer have started to shift towards a
smart meter which can measure the electrical network much more cleaner energy than the old traditional cars to
widely down to the end user. The application of AMI new electric and hybrid cars. These manufacturers are
running at the consumer level can process the information offering customers with increased incentives by the
gathered and an display and can do the pricing real time governments plug-in electric vehicles (PEVs) or plug-in
and can initiate an organized process and then assess the hybrid vehicles (PHEVs) for domestic and commercial
prices locally without having to go to central. AMIs can usage with battery rating varying from 16 - 28 kWh[11]..
also to a great extent perk up the outage management The options for recharging the batteries of these vehicles
system and develop the reporting of power quality will be available at home or at a commercial fleet yards.
problems. The vehicles would normally require to inject power in
2.3.2 SUPERVISORY CONTROL & DATA them in the off-peak periods which is being seen by the
energy pundits and gurus as a potential which can
ACQUITISON (SCADA) improve the profitability of a mart grid system which
It is another software package which is one of the latest often operates below its peak capacity.
tools developed in lieu of the smart grids after much Smart grid can meet the demand which is being created
research and development of further independent by PEVs and PHEVs by interacting with these vehicles to
softwares. SCADA is designed and developed in such a charge at most optimal time. By connecting huge number
way that it can display information for a system operator of batteries for charging these hybrid cars in to the smart
in an easy graphical user interface. The information grid regionally, this option can potentially introduce any
displayed on the screen can be customized depending in extra power in the grid system which is available in the
the needs of the operator or the service provider which batteries and are not being used during blackouts or peak
can monitor alarms to logging the reports of the power when the power required is at maximum. Up till
equipment being used in the grid. now, the municipalities and private companies are
SCADA comprises of multiple subsystems in which the offering free of charge option to recharge the batteries of
worth mentioning are the Human Machine Interface hybrid vehicles as an incentive but these free fuel
(HMI) through which the operator monitors and then it recharging will come eventually to an end and the owners
controls the whole process by using a remote computer of these vehicles will be in search of a more fitting way of
which is connected via broadband or through wireless charging their cars. Smart grids offers a solution to such a
internet and is used in critical industrial infrastructures problem where the car owner can plug the batteries of its
and managed from the control room[6]. The information car at charging station where the PEVs can identify
themselves using their software when the batteries are feasible to prevent hackers to penetrate it easily and
plugged in and the electricity used can be billed to that pricings can be tracked and optimized and can also be
owner of the car which will not only make issued real time.
straightforward the transactions but also permit the car [1] Smart Grid News. Self-healing smart grids: Siemens
owners to charge the batteries without having them to use and Rugged Com team up in Virginia.
their credit card or cash. http://www.smartgridnews.com/artman/publish/Delivery_
Distribution_Automation/Self-healing-smart-grids-
Siemens-and-RuggedCom-team-up-in-Virginia-
4. ECONOMIC IMPACTS OF INTRODUCING
3982.html#.UVStUByeNzI [Accessed 25 Mar. 2013]
SMART GRIDS [2] Guo Zhizhong. Schemes of self-healing control frame
of powergrid[J]. Automation of Electric Power Systems.
The integration of smart grids in the traditional electric
network can translate into huge financial and economic 2005,29(10):85-91.
boom for the power industry from United Kingdom. The [3] Massoud Amin. Toward self-healing energy
exploitation of smart grids will introduce an increase in infrastructure systems [J].IEEE Computer Applications
the level of goods and service exports. Not only goods
and services can help the power sector of United in Power, 2001,14(1):20-28.
Kingdom but it can also help them sell intellectual [4] C. Eu, “European Smartgrids Technology Platform-
property overseas. The research in the field of demand Vision and Strategy for Europe Electricity Networks of
response management system is one of the most frontline the Future,” European Commission, 6-8 September 2006.
projects which is advanced and considered one of the best [5] M. Samotyj and B. Howe, “Creating Tomorrow’s
the market has to offer can also present with huge Intelligent Electric Power Delivery System,” 18th
opportunities and vast potential to capture the market in International Con- ference and Exhibition on Electricity
overseas. Distribution, Palo Alto, 6-9 June 2005, pp. 1-5.
Smart grid can also present United Kingdom with [6] Center for the Protection of National
potential opportunities by exploiting this field and Infrastructure.SCADA.http://www.cpni.gov.uk/advice/cy
benefitting from Foreign Direct Investment (FDI). Britain ber/business-systems/scada/. [Accessed 17 Mar. 2013]
is by now one of the most attractive hub for European [7] CSE Semaphore. Remote Terminal Unit (RTU)
companies and countries for investment where in 2010 Products.
approximately 20% of the investment in the sector of http://www.csesemaphore.com/products/kingfisher/kingfi
energy efficiency and smart technologies were gained by sher-plus/io-modules/ai-10-analog.php [Accessed 18 Mar.
it [12]. 2013]
5. CONCLUSION [8] "Telemetry: Summary of concept and rationale".
NASA. NASA Technical Reports Server. Retrieved 26
The rate at which the world is advancing by investing,
September 2011. [Accessed 19 Mar. 2013]
researching and mobilizing their resources in order to
[9] WiseGeek. What Is a Programmable Logic Controller
attain the cutting edge technologies in the field of power
(PLC)?. http://www.wisegeek.org/what-is-a-
generation and distribution are also producing a huge
programmable-logic-controller.htm. [Accessed 26 Mar.
amount of pollution which is effecting the environment
2013]
on a very severe level on daily basis. Due to smart
[10] BBC news. Technology.
devices the smart grids can promote cleaner atmosphere,
http://www.bbc.co.uk/news/science-environment-
lower carbon emitting generation and can also promote a
17704116 [Accessed 17 Mar. 2013]
balanced exploitation of renewable energy in comparison
[11] Digital Trends. BEST ELECTRIC CARS OF 2012.
to the non-renewable energy which can allow the
http://www.digitaltrends.com/cars/best-electric-cars-of-
consumers to keep a tab on the units of electricity that are
2012/. [Accessed 28 Mar. 2013]
being used and can curb it . This efficient response
[12] European Commission. Europe 2020.
system will ensure that the reliance on the additional
http://ec.europa.eu/europe2020/pdf/themes/13_energy_an
fossil fuels which can then as a effect can reduce the
d_ghg.pdf [Accessed 22 Mar. 2013]
emission of CO2 and other environmental hazards.
[13] U.S Energy Information Administration. :
Smart grids can ensure a reliable and secure network
http://www.eia.doe.gov/cneaf/electricity/epa/epat7p3.htm
which can reduce the frequency of blackouts and outages
l [Accessed 17 Mar. 2013]
or any security breach. Recent estimates show the annual
[14] “San Diego Smart Grid Study,” Prepared for the
cost of power interruptions in US is of $80 billion[13].
Energy Policy Initiatives Center, University of San Diego
Also by using smart grids there is a huge benefit of
School of Law, October 2006
improved operational efficiency where in San Diego $450
[15] Carnegie Mellon .Electrical & Computer
million of investment in smart grid can reduce the cost up
Engineering Department.
to $1.4 billion[14].
http://www.ece.cmu.edu/~electriconf/2012/posters/poster
Not only smart grid technology can help in bringing the
Rohan.pdf [Accessed 21 Mar. 2013]
carbon content in the atmosphere down but also it will be
economically wise in the long run to the governments and
service providers since it is a protected, consistent and
O.C. Madubuko
School of Engineering, Design and Technology
University of Bradford
Abstract- Intelligent transportation system (ITS) involves intelligent devices used in road and rail transportation, the
the combination of software and hardware technologies to technologies involved were visualized as intelligent
boost the efficiency of the transportation system. The vehicle highway systems (IVHS) with the aim to mitigate
growth and development of the world economy rely on traffic congestion, improve the movement of transit users,
various modes of transportation because they play vital roles
in establishing mobility amongst countries.
reduce pollution, and promotes time management [2]. As
The number of passengers transiting from one location to
technology advanced, IVHS was finally renamed as the
another has increased tremendously, and this has affected intelligent transportation system. [1].Intelligent
the transportation system leading to issues such as: traffic transportation system blends the software and hardware
congestion, carbon dioxide (CO2) emission, fuel technologies together to boost transportation efficiency.
consumption and accidents. Today, the transportation This paper discusses the concept of intelligent devices
systems are handled intelligently with the use of Information deployed, its applications and maintenance for the
and Communication Technology (ICT) to mitigate the essence of safety in transportation.
problems associated with road and rail transportation II. INTELLIGENT
systems. This is achieved with the use of devices such as: TRANSPORTATION SYSTEM OVERVIEW
Closed Circuit Televisions (CCTV), traffic lights, traffic
signs, road headways, Global Positioning Systems (GPS) and
map navigators. This research paper focuses on intelligent A. What is ITS?
devices deployed in the transportation system, their B.
applications, and maintenance. Intelligent Transportation System is the practical use
Keywords: intelligent device, information and
of information and communication technologies in the
communication technology (ICT), safety.
transportation to ensure the safety of the transit user,
driver and the environment. These technologies assist in
I. INTRODUCTION
making life easier for humans, as users are updated
In the United States, an assembly of private sector through the data gotten from intelligent devices such as
representatives, the federal and state transportation travel information, the best route path to a location
officials held a meeting in the year 1986 with respect to through smart devices and weather conditions that might
the way forward on the transportation systems. The interfere with travel schedules [3] , [4]. Furthermore ITS
assembly anticipated on the interstate system bill project plays a vital role in the transportation network as it steps
that was to be developed by the States. The meeting was up the country’s economic growth achieved through
as a result of some key factors that affected the efficiency mobility. It ensures the safety of the environment and its
of transportation such as traffic congestion and safety habitat as the rate of traffic congestion that generates
issues which reduced economic productivity and carbon dioxide (CO2) emissions is cut down [4]. In
competitiveness of trade amongst countries. Furthermore, addition, intelligent devices in transportation systems are
emphasis on the safety of the environment and its habitat used to track and locate stolen vehicles, promote access to
was an important issue which could no longer be users and restrict population access to urban areas by
neglected [1]. In the course of the meeting, construction using electronic toll collection [5].
of more roads was considered as an avenue to alleviate
the problems faced in transportation. However, the
C. The technologies involved in
suggested solutions when implemented did not make
ITS
much impact to the society; rather they were seen from
another perspective. The assembly of officials towards These are the technologies that have assisted the
the growth of transportation extended to managers of growth of the transportation system.
automobile companies and researchers in Europe, Japan
Global Positioning System
and North America [2]. The final outcome of the way
(GPS)
forward in transportation system was the application of
technologies in relation to safety. Technologies that This is a technology that depends on satellite to
involved the use of sensors were introduced through receive signals which are used to track vehicles, get
Information Communication and Technology (ICT) to information on weather conditions and guidance of
address the key problems faced in the transportation route in the transportation network [6]. The European
system. The association responsible for the changes grew global navigation system (Galileo) is used in locating
in population and assisted the United States department of logistics, enhancing resources like consumption of fuel
transportation (DOT) to ensure the safety of the transit and time management [7].
users. As a result of the solutions gotten from the
in the transportation network [1], [11]. It controls the flow
Radio frequency identification movement of trains, vehicles and pedestrians with the aid
(RFID) of traffic signs. It also monitors the way vehicles are
This technology allows the transmission of data parked to avoid traffic congestion. [12]. Fig. 2, illustrates
through the use of radio waves from a tag or chip the flow control of information in the transportation
attached to a vehicle. It is used to track and monitor the system in case an accident occurs.
number of passengers permitted to board on a journey,
arrival and departure of vehicles. The data read from B. Advanced Travellers
the vehicles are distributed to the passengers in stations Information System (ATIS)
and vehicle stand through the headways. RFID does This system communicates with the drivers and
not require a direct line of sight for operation [9]. passengers by delivering information to them at home, in
offices, train or bus stations and smart devices. The
information could be on weather conditions, travel delay,
Roadside camera recognition
restricted routes and shortest route to a destination
This technology involves different cameras like [1],[14]. They also supply data to drivers with respect to
speed cameras and CCTV located on route path, for parking slots on different car parks [6]. In automobiles
the use of congestion payment and detection of and trains, they serve as road headways and real time map
vehicles at high speeds. These cameras capture the navigators for users not familiar with a particular route.
license plate numbers of vehicles and send the Present location and destination are inputted into the
information across to the law enforcement agencies for system and ATIS selects the best route, directing with an
future action to be taken [6]. Fig. 1 illustrates the speed arrow on the map navigator. For pedestrians, smart
cameras mounted on traffic lights used for the tracking devices like mobile phones, iPods and laptops, are used
and identification of vehicles exceeding the designated with the assistance of certain applications installed like
speed assigned to a particular route. Google maps [11]. Fig 3, Shows a real time map
navigator in vehicles, which assists the driver in locating
unfamiliar routes when in motion.
Fig. 3. Real time map navigator [6]. Fig. 4. Headways in Bradford interchange train station
D. Advanced Vehicle Control G. Commercial Vehicle
System (AVCS) Operations (CVO)
AVCS is a system that controls the interaction of In order to ensure the growth of transportation, CVO
vehicles in motion from colliding with each [2]. It also systems are used to promote the safety of commercial
assists the drivers to detect roadside obstacles that might vehicles. Various applications of commercial vehicle
run into vehicles when in motion. The technology behind systems include recovery of stolen cars, tracking of
these systems improves the safety of travellers and vehicles and electronic toll collection [11], [16]. The
drivers by its reduction in traffic congestion. During high
classification of CVO is explained briefly
speeds, AVCS regulates the vehicle steering and brakes Commercial vehicle electronic
giving a maximum distance between the vehicles in front clearance
and behind [1],[15].
This service takes place when a vehicle gets to a
check point. There is an interaction between the vehicle
E. Advanced Public and the intelligent devices on roadways. The essence of
Transportation System (APTS) the interaction is to ensure safety of the passengers and
APTS disseminate information to public transit users, goods by monitoring vehicle’s status, weight and
enhance the collection of fare and properly scheduled stability [3].
vehicles used in public transportation [1]. These systems Automated roadside safety
are used to track the location of vehicles and their arrival inspection
time with the support of automatic vehicle location
(AVL). A practical illustration of APTS is the road Just as the name implies, an automated safety
headways, microcomputers in stations, bus stops and inspection is carried out, to check the speed limit,
moving vehicles displaying the location and time for performance of the vehicle brakes and steering [3].
passengers to have a clue of how long they can wait [11]. On-board Safety Monitoring
Fig. 4 is an illustration of a headway indicating the travel
departure of various locations, their time schedule and To ensure safety the driver’s alertness, goods,
exit stands. specific parts of the vehicles like the tires and lights are
monitored [3].
F. Advanced Rural
Transportation Systems (ARTS) IV. BENEFITS OF ITS
A. Safety
These systems are used to enhance the safety of the
environment and its inhabitants in rural areas. Drivers are With intelligent devices used in transportation
signalled when obstacles like live stocks interfere with systems, safety is ensured amongst the driver, passenger,
the roads. Road signs are made available to notify the goods and pedestrians [6]. Transportation issues like
driver of information ahead like route path with sharp traffic congestion that results in pollution of the
bends, roadways with bumps and weather changes that environment is mitigated [15].
may affect transportation [11].
B. Accessibility
ITS deployed in transportation has assisted the
elderly and disabled citizens without creating room for
barriers. Information on transportation schedules are
made available to passengers and payments can be made
online through cards. Details of the transit users are saved
and tickets are assigned immediately without requiring [2] S. E. Shladover, "Research and development needs for
advanced vehicle control systems," Micro, IEEE, vol. 13, no.
the user's presence [5]. 1, pp. 11-19, 1993.
C. Economic Growth [3] M. A. Chowdhury and A. Sadek, Fundamentals of Intelligent
Transportation Systems Planning, 1st ed. Boston,MA:
With the technologies involved in intelligent Artech House, 2003.
transportation systems, exchange of goods and services [4] A. M. Khan, "Risk analysis of intelligent transportation
system investments," Intelligent Transport Systems, IET, vol.
amongst countries are implemented safely. Mobility 3, no. 3, pp. 358-368, 2009.
established as a result of the transportation network [5] European Commission, "Intelligence at the service of
promotes the economy. transport networks," I. T. Systems, Ed. Brussels: European
Commission,Energy and Transport DG, 2003, pp. 2-14.
[6] S. Ezell, Explaining International IT Application Leadership:
Intelligent Transportation Systems [Online]. Available:
V. ITS MAINTENANCE http://www.itif.org/files/2010-1-27-ITS_Leadership.pdf
For the effective operation of intelligent devices used [Accessed: 10 Mar 2013].
[7] European Commission, Satellite navigation Galileo:
in transportation systems, proper inspection of hardware Application for road transportation [Online]. Available:
should be carried out to ensure safety of the driver, http://ec.europa.eu/enterprise/policies/satnav/galileo/
passenger and environment. Intelligent transportation applications/road/index_en.htm [Accessed: 15 Mar 2013].
system maintenances are; [8] Y. Zhu, X. Zhu, S. Zhu, and s. Guo, "Intelligent
transportation system based on Internet of Things," in World
Hardware servicing and Automation Congress (WAC), 2012, 2012, pp. 1-3.
[9] M. F. M. Hasan, G. Tangim, M. K. Islam, M. R. H.
replacements Khandokar, and A. U. Alam, "RFID-based ticketing for
Proper check up on devices such as cleaning of public transport system: Perspective megacity Dhaka," in
Computer Science and Information Technology (ICCSIT),
dirty CCTV domes, snow or dirt blockage removal, 2010 3rd IEEE International Conference on, 2010, vol. 6,
replacement of street light bulbs and power supply pp. 459-462.
failure should be carried out at least twice a year [17]. [10] F.W.Parker. Streets Smarts: How Intelligent Transportation
System Save Money,Lives and the Enxironment [Online].
Available: http://www.acsinc.com/
wp_street_smarts_intelligent_transportation_systems.pdf
Increase of devices [Accessed: 11 Mar 2013].
[11] L. E. Sweeney, Jr., "An overview of intelligent vehicle
The rate at which population in countries increases highway systems (IVHS)," in WESCON/'93. Conference
requires the expansion of existing intelligent devices to Record, 1993, pp. 258-262.
be able to carter to the safety and efficient use of [12] J. R. Wootton, A. García-Ortiz, and S. M. Amin, "Intelligent
transportation system. transportation systems: A global perspective," Mathematical
and Computer Modelling, vol. 22, no. 4–7, pp. 259-268,
1995.
[13] J. L. Adler and V. J. Blue, "A cooperative multi-agent
Software updates transportation management and route guidance system,"
Transportation Research Part C: Emerging Technologies,
Software's applications on intelligent devices are vol. 10, no. 5–6, pp. 433-454, 2002.
updated regularly in relation to the information [14] M. B. Khan, M. K. Khan, Z. Jiashu, and Z. Dianye,
distribution in transportation. Information such as traffic "Enhancing the Security of Intelligent Transportation
Systems (ITS) using Iris/Finger-based Multimodal
signs timing for pedestrians, notification on travel Biometrics," in Engineering of Intelligent Systems, 2006
schedule changes through SMS or email [18]. This IEEE International Conference on, 2006, pp. 1-6.
update also provides drivers with information on [15] B. J. Kanninen, "Intelligent transportation systems: An
parking slot availability at locations like shopping malls, economic and environmental policy assessment,"
Transportation Research Part A: Policy and Practice, vol.
universities and conference centres [19]. 30, no. 1, pp. 1-10, 1996.
[16] V. Psaraki, I. Pagoni, and A. Schafer, "Techno-economic
assessment of the potential of intelligent transport systems to
VI. CONCLUSION reduce CO2 emissions," Intelligent Transport Systems, IET,
vol. 6, no. 4, pp. 355-363, 2012.
This research paper deliberated on the concept of [17] Bureau of Highway Safety and Transport Engineering,
intelligent devices deployed in transportation systems, Intelligent Transportation Systems Maintenance
their applications, and how to maintain the intelligent Standards [Online].Available:
ftp://ftp.dot.state.pa.us/public/pubsforms/Publications/
devices for the safety of passengers, drivers and freights PUB%20697.pdf [Accessed: 13 Mar 2013].
in road and rail transportation. With the assistance of [18] Declan Technologies Intelligent networks [Online].
intelligent devices like closed circuit television, Available: http://delcantechnologies.com/technologies/
headways, traffic signs and lights in transportation intelligent-networks/ [Accessed: 16 Mar 2013].
[19] Declan Technologies, Intelligent Parking [Online].
system, the environment is safe for the habitants and there Available: http://delcantechnologies.com/technologies/
is an increase in economic growth. intelligent-parking/ [Accessed: 16 Mar 2013].
REFERENCE
[1] J. Sussman, Introduction to Transportation Systems, 1st ed.
Boston, MA: Artech House, 2000.
K. Palaniappan
School of Engineering, Design and Technology
University of Bradford
as neuron. Upper motor neurons can be described as the In the advancement phase, electrical wheelchair was later
messages being conveyed from the brain to nervous introduced. Control options like elevating the wheelchair
system. The ultimate pathway for signals reaching the to get hold of height capability and rechargeable batteries
respective muscle is described as lower motor neurons that are used to run the motors were included in the
[5]. wheelchair’s mechanism which allows the user to move
Information that is travelling to the brain through spinal for a longer distance. It was found later that the electric
nerve which is partially or totally cut-off below the level wheelchair was heavy and bulky for the user to handle
of injury is known as tetraplegia/quadriplegia or when user is moving from one place to another.
paraplegia [6]. The region affecting above the first Therefore, in order to control and get hold of the
thoracic vertebrae or the neck is known as tetraplegia, wheelchair easily, a proposal of an eye tracking method is
commonly known as quadriplegia. Due to this kind of proposed to meet the needs of people with partial
paralysis, progression starts to slow down in the limb paralysis and disabilities who are not capable of using
region. Paralysis such as paraplegia occurs in the upper such wheelchair interfaces.
back region which is located below the first thoracic V. SPECIFICATIONS OF WHEELCHAIR PROTOTYPE
vertebrae [7]. In paraplegia cases, arms and hands will be
fully functional but movement in legs will be lost. Apart A prototype wheelchair controlled by means of eye
from that, one side of the body which is partially tracking method is designed and implemented. To
paralyzed is known as hemiplegia. One side of the body determine the motion of eye, an eyeball sensor module is
will not be functioning involving the arms and legs. This used. A 12volts (V) rechargeable battery pack is used to
is generally known as palsy. drive the wheelchair prototype. The eyeball sensor
module which is fitted in a goggles comprises of light
dependent resistors (LDR’s), small resistors and small
light-emitting diodes (LED’s) attached to a circuit board.
In order for the sensor module to function and start eye
tracking process, user needs to wear the goggles first. A
distance of 5mm is the placements between each LDR in
the eyeball sensor module’s circuit board. Moreover, the
distance between the user’s point of eye contact and
placement of eyeball sensor module in the goggles is
10mm.
The eyeball sensor module detects the resulting variations
in eye positions and interprets the user’s point of sight.
Microcontroller acts as the key brain of this whole system
in terms of controlling the wheelchair prototype.
Moreover, microcontroller processes the incoming signals
Fig. 1. Paralysis in different regions of human body [5]. that are being input via the eyeball sensor module. The
IV. DEVELOPMENT OF WHEELCHAIRS wheelchair prototype steers in a determined direction
according to the resulting output from the
After certain advancement and perfection made to cater microcontroller.
the needs of users, a variety of wheelchairs have been The mechanical aspects include a 12V dc geared motor
made. Firstly, the usage of conventional wheelchairs used to navigate the wheelchair prototype. In a bi-
started to roll out which is also known as the manual directional mode, the motor is capable of providing
wheelchairs. Users use their hands to drive the wheelchair different speed control which results in a smooth
manually excluding those who are not capable of doing it operation. The utilization of a simplest gear type known
due to other disabilities. as spur gear train is used with a torque rating of up to 0.2
Furthermore, different types of electrical and robotic Newton meter (Nm) to function. The motor can achieve a
wheelchairs have been developed and are commercially maximum speed of 60 revolutions per minute (rpm).
available for people with disabilities. A powered Apart from that, other specifications also includes the
wheelchair was later introduced in the development phase range of ambient temperature which is -20o to +60o
which comprises of a controller board interfaced with Celsius (C) , axial shaft load of 5 Newton’s (N) and radial
joystick control, battery packs mounted to the wheelchair shaft load of 10 N [8].
and additional control options to navigate a wheelchair With the aid of Peripheral Interface Controller (PIC)
around with the help of this function. In a recent clinical 16F877A type microcontroller chip, it helps controlling
survey conducted, about 9%-10% of patients with the signals in the form of commands that is being sent in
disabilities found difficulties in the training provided to and out of the system. The chip accurately performs a
use powered wheelchairs as the patients could not cope specific task that is programmed to do so. MPLAB IDE
and use it to for carrying out daily activities [1]. It clearly v8.85 is the software platform used to program the
explains that people with disabilities find it hard to learn microcontroller chip.
on how to operate and handle a sophisticated powered
wheelchair.
IX. CONCLUSION
REFERENCES
Disabled People with Voice, Ultrasonic and Infrared Sensor [14] T. Gomi and A. Griffith, “Developing Intelligent Wheelchairs for
Control”, Department of Electronics, University of Alcaldde Handicapped”, In Proceedings IVS’96, Tokyo, Japan, September
Henares, Ctra, Madrid-Barcelona, 1995. 1996.
[10] Eye Tracking. [Online]. Available: http://www.tobii.com/Global/ [15] P. Britto, J. Indumathi, S. Sivarasu and L. Mathew, “Automation of
Analysis/Training/WhitePapers/Tobii_Using_EyeTracking_to_Test Wheelchair using Ultrasonics and Body Kinematics,”, NCCI 2010 -
_Mobile_Devices_WhitePaper.pdf [Accessed: 1 March 2013]. National Conference on Computational Instrumentation CSIO
Chandigarh, INDIA, 19-20 March 2010
[11] H. Sermeno, “Vision-Based Control Of A Smart Wheelchair For
The Automated Transport And Retrieval System”, Master thesis, [16] Summary of new approaches in Eye Tracking. [Online].
Department of Computer Science, University of Lehigh. Lehigh, Available: http://www.academia.edu/245640/
2006 Summary_of_new_approaches_in_Eyetracking
[Accessed: 2 March 2013].
[12] T. Bourke, “Development of a Robotic Wheelchair”, Degree thesis,
Department of Electrical and Electronics Engineering, University of [17] Part 1: Eye-Tracking: Characteristics and Methods, Part 2: Eye-
Wollongong, Wollongong, 2001. Tracking: Research Areas and Application.[Online]. Available:
http://eyethink.org/resources/lab_papers/Richardson2004_Eye_
tracking_C.pdf [Accessed: 2 March 2013].
[13] O. Landolt, “Visual Sensors using Eye Movements”,
Neurotechnology for Biomimetic Robots, 2002.
out of which European countries dominated the use of the The characteristics of radio frequency are the wavelength
GSM. It was also widely used in Asian countries [2]. and frequency. The distance travel by a complete cycle of
Technical composition of mobile phone an electromagnetic wave is called wavelength while the
A mobile phone is compose of a transducer, modulator, number of waves passing a point within one second is
amplifier, transmitter and receiver all fabricated in the called frequency of an electromagnetic wave, and the unit
same circuit board normally very small in size. It is a is hertz [14]. The wavelength and frequency are the two
transreceiver device that has the capability of transmitting properties used to categorized electromagnetic energy.
and receiving radio frequency signal simultaneously. Electromagnetic spectrum consists of radio frequency and
In the traditional wired telephony, their circuits contain microwaves, the range of radio frequency in the
transmitter that is wired to the nearest base station and the microwave spectrum is between 3 kHz to 300 kHz [14].
receiver is connected to another wire separately to same Radio frequency is identified as a non-ionizing
base station, this means that a pair of wire is required one electromagnetic which means that it has no ability to
for transmission and the other for reception of radio break chemical bond found in Deoxyribonucleic acid
frequency signal, hence they are referred to as receivers. (DNA) and also have no sufficient energy for changing
However, in the modern wireless technology whole unit substances by ionization [6].
is called transceiver because it uses radio transmitter and
radio receiver and has transmission and reception speed HAZARDS PERCEIVED
of up to 100GHz [12]. Evolution of mobile phone technology were met with
While using mobile phone for a phone call, the audio series of challenges such as market penetration,
voice of the person speaking at one end is converted into competition, interoperability among existing networks,
electrical pulses by a transducer (mouthpiece) which in review telephony standards and most importantly alleged
turn is modulated with high frequency called carrier perceived health hazards. Emphasis on the perceived
signal and then the resulting modulated signal is health hazards is discussed among others, through the
amplified and finally radiated into the channel (space for following factors
the signal propagation) via the phone antenna that serves (a)Threat of litigation
as transmitter. The radiated weak signal from the mobile Many mobile phone/service providers suffered law suit
phone is intercepted by the nearest available network base filed against them by communities, activists, as well as
station which in turn relayed the signal on to the base mobile phone users across the world. It was recorded that
station that is nearest to the receiving end. The receiving in Nov, 2012 a family in Illinois have filed a law suit, in
end mobile phone intercept the signal via its antenna the superior court, against many phone manufacturers
which serves as a receiver. The signal is then after the head of the family was diagnosed with the brain
demodulated and recovered and finally pass on to the tumour in his left frontal lube [6]. He maintained that the
earpiece where the audio is heard and answered and the brain tumour was as a result of a prolonged exposure to
conversation continued till end. radio frequency radiation through the usage of his mobile
Taking care of the mobility while making phone calls, the phones. He also accused the dependant of their continued
mobile phone network providers divided geographical operation and telling the public that it is safe to use
area into hexagonal region and each region is equipped mobile phones despite their awareness of the studies
with a base station. This enhances a smooth switch over conducted in 1940s. The complaint maintained that the
from one base station to another while moving from one world health organisation (WHO) have stated in the
geographical area to another without service interruption interphone study that the persistence usage of mobile
[13]. phones for a period of ten years may results in developing
The bandwidth of mobile phone networks has 800 a brain tumour [6].
frequencies, 400 for transmission and 400 for reception.
This means that each subscriber is using two frequencies, It was also recorded in the year 2009, a telephone
one for sending his audio voice and the other for company in France was asked by a French high court to
receiving the response [13]. remove a mobile phone mast (repeater station) after it
CONCEPT OF ELECTROMAGNETIC were sued by a community of Charbonnieres. But later
RADIATION the ruling was reversed by the Versailles court of appeal,
Electromagnetic radiation constitute two forms of energy saying in its ruling the reality of the health risks perceived
these are electric energy and magnetic energy. These remain hypothetical [7].
together are radiated in the channel (space) and they
travel with a speed of light [14]. Electromagnetic energy A court in Italy have disregarded short term studies of
is constituted by electric field and magnetic field. Volts radio frequency radiation hazards and granted a business
per meter (V/m) is the unit used when field strength is man called Innocente Marcoloni a retirement fund due to
measured, on the other hand Amperes per meter (A/m) is the disease he developed which was related to his usage
the unit used when strength of a magnetic field is of mobile phone for six hours a day in twelve years of his
measured. The function of an antenna is to transmit job [7].
microwaves and radio waves which are which are Last year, in India, a case was filed against mobile service
electromagnetic energy [14]. providers to remove their mobile towers from the
residential areas, schools and hospitals. An advocate
summon the mobile phone service providers for the As mentioned earlier, many companies are heavily
removal of mobile phone towers based on the suspected funding research for finding ways to mitigate the
death of one late Hermant Sharma and based on the perceived effects of radio frequency on human body. For
World Health Organisation (WHO) notification in May, the mean time mobile phone companies are struggling to
2011 that the radiation emitted by the mobile phone lower the specific absorption rate (SAR), which is
repeater stations have been classified as conceivably defined as the rate at which body, when exposed to radio
carcinogenic [7]. frequency radiation, absorbed energy. This means that
power absorbed per mass of tissue measured in watts per
(b) Suffered investments kilogram (W/Kg). The range of radio frequency within
which the measurement of SAR takes place is between
The mobile phone companies have suffered greatly in 100 KHz to 10 GHz [9].
their investment caused by the perceived health hazards. This index is indicated in each mobile phone product by
Many researchers were sponsored in the past and are still their manufacturers. This index is one of the factors
sponsored by mobile telecommunication companies to costumers consider when buying one, the lower the SAR
verify and find out exactly the truth and level of the rate the less likely radiation absorbed however, the high
perceived health hazards posed by the usage of mobile SAR rate the more radiation absorbed. The maximum
phone and the radiation of radio frequency at the various permitted SAR in the European countries is 2.0W/Kg
repeater stations situated around the residential buildings, [10].
schools, healthcare centres and governmental Federal communication commission in US, accept
installations. Some of the companies that sponsored and 1.6W/Kg as an upper limit of SAR of mobile phone
are still sponsoring the research on the radio frequency product. The mobile phone manufacturers are expected to
radiation hazards to the human body include; Vodafone, abide by the SAR limit [11].
Motorola, Nokia, Samsung etc.
However, environmentalist suspect biased reports from HAZARDS IDENTIFIED
such mobile phone companies sponsored researches. As long as we can be able to identify hazards, we now
Governments and independent organisation have also can be able to look into various methods and techniques
sponsored a comprehensive researches on the perceived of solving the issues associated. Hazards in this context
health hazards posed by mobile phone usage. A specialist can be described as the threat that radio frequency
in bio electromagnetic that run an independent laboratory, radiation posed to human being.
named Roger Cog hill, stress that a health warning should Having taken series of scenarios of the perceived health
be carried on mobile phones [8]. hazards posed by the usage of mobile phone through the
threat of litigation, suffered investment and market
“My laboratory has carried out research which shows competition by the mobile companies the following
that after a seven-and-half hour exposure to a mobile
phone on stand-by there was serious degradation of the
hazards are identified;
Prolonged mobile phone calls which means taking too
white blood cells (the cell that fight disease). A day after much time in a single call at a time. This poses hazard
exposure there was substantial fall in variability of white and may result in skin heating and burns like any other
blood cells, and after the second day only 13% of white
heat source does when exposed to a human body.
blood cells were viable” [8] Mobile phone product identified with high SAR value is
clearly telling you the degree of health hazards that is
However, the director of information and communication
associated with that particular product.
technology for the federation of the electronics industry
Mobile phone masts located in residential areas are
Tom Wills-Sandford, have argue that the cell phone usage
always having high electromagnetic signal strength
has no connection with the health risk [8]. Moreover, the
within the surrounding radius. This may increase
UK government sometime in the past have funded a
exposure to electromagnetic energy even to the persons
committee which was headed by Sir William Stewart
that actually not using mobile phone.
came up with conclusion that no health risk evidence for
Most of the people that claim developed brain tumours or
mobile phone usage [8].
other health concern as a result of their usage of mobile
phone were elderly, meaning that hazard associated with
In response to the undergoing inconclusive world debate
use of mobile phone could be identified with old age.
on the perceived health hazard posed by mobile phone
usage, the United Kingdom government have set to find
the truth by lunching a £7.4m research project [8]. SOLUTION TO THE IDENTIFIED HAZARDS
Having identified hazards with regards to the usage of
(c) Market competition mobile phone, the following steps should be taken by
individual. The government and independent
A mobile phone product may likely lose out from the organizations should go about campaign on enlightening
competitors when use of a particular technology proves public on the precautionary measures to take on the usage
better. of their mobile phones pending the outcome of the
ongoing research that expected to find out the truth and
scientific evidence of the perceived health hazards.
such as using earphones. the mobile telephone with a view of its future, BT Technology Journal.
More technology is required to improve the specific [Online]. Vol 21 (3).
Available:http://dm.ncl.ac.uk/courseblog/files/2010/03/a-social-history-
absorption rate SAR on the mobile phone product. When of-the-mobile-telephone-with-a-view-of-its-future.pdf
it comes to buying mobile phones, people should strictly [3] Wikipedia, (2013, march). Wireless. [Online]. Available:
buy a product with lowest SAR irrespective of the design http://en.wikipedia.org/wiki/Wireless#Cordless. [Accessed: 27 Feb,
2013].
and decoration.
[4]http://www.phys.hawaii.edu/~anita/new/papers/militaryHandbook/m
The government should come up with law prohibiting odulate.pdf
mobile service providers from erecting mobile phone [5] R. Bekkers and J. Smits, Mobile Telecommunications: standard,
base station in and around residential areas, hospitals, regulation and application, MA: Artech House, 1999
[6] Cell Phone Radiation Lawsuit Alleges Illinois Man Developed Brain
schools and governmental buildings.
Tumor Following Years of Heavy Cell Phone Use, (Nov, 2012).
Elderly persons should strictly device an alternative [Online]. Available http://www.prweb.com/releases/Cell-Phone-
means of communication, such as using landlines Radiation/Cell-Phone-Lawsuit/prweb10133486.htm: [Accessed: 12
telephony, hands free methods of using mobile phone and March, 2013]
[7] Wikipedia, (2013, march). Mobile phone radiation and health.
the use of computers for their communication. [Online].Available:http://en.wikipedia.org/wiki/Mobile_phone_radiatio
n_and_health#French_High_Court_ruling_against_telecom_company
[Accessed: 13 March, 2013].
CONCLUSION. [8] BBC News, (Jan, 2002). Are mobile phones a health hazard?
In conclusion, it can be clearly stated that there is no any [Online].Available: http://news.bbc.co.uk/1/hi/health/314363.stm
scientific evidence that links brain tumour with mobile [Accessed: 15 March, 2013].
[9] Wikipedia, (2013, Feb). Specific absorption rate.
phone usage for now. All the claims of health hazard [Online].Available:http://en.wikipedia.org/wiki/Specific_absorption_rat
were found to be baseless and only turn out to be e [Accessed: 13 March, 2013].
psychological perceptions, this is because the [10] cnet/UK, (June, 2011). Which phone emits the most radiation?
environmentalists and activists have lack concrete [Online].Available:http://reviews.cnet.co.uk/mobile-phones/which-
phone-emits-the-most-radiation-50004092/ [Accessed: 02 March, 2013].
evidence scientifically and hence it remains perceptions. [11] http://www.consumerinjurylawyers.com/
However, the only evidence of the hazards associated [12] http://en.wikipedia.org/wiki/Transceiver
with the usage of mobile phone is the skin heating, which [13] http://www.physics.org/article-questions.asp?id=82
is capable of burning human skin like any other source of [14] http://hps.org/hpspublications/articles/rfradiation.html
[15] cellphone-health.com
heat does when subjected to the human body, found in the
prolong usage.
Finally precautionary measures stated should be taken
pending the outcome of research funded by the UK
government recently.
Abstract-China is the second biggest electric power because it is not only one of green energy, but also has
consumer in the world, and Chinese electric power not risk from fuel price vibration [2]. According to the
consumption is just a little less than the USA. But depends data from Global Wind Statistics (as shown as Fig.1),
on the largest population in China, the average electric wind power industry is growth rapidly over the past 10
power consumption per person in China is only one sixths of
the USA. In order to satisfy the demand, the power stations
years, the global cumulative installed wind capacity has
should provide a huge number of powers than before. been reached 282,000 MW, and this number is occupied
Establishing more thermal power stations is not a good idea 53.13% of renewable energy in 2012.
in nowadays, because it leads the air pollution and releases
the greenhouse gases. As one of the green energy, wind
power resource is more and more concerned by the world in
recent years, especially in the developed countries. Chinese
government has launched several wind power station
programs in Xinjiang Province and Inner Mongolia
Province. However, it is still can not satisfy with the average
power consumption demand.
using few wind turbines. Second, most of cities in the However, put the wind farm on the sea is not a simple
world are located near the coastline, and offshore wind thing. Tropical cyclone is the big challenge in Chinese
farm is near the major demand centres, avoiding for the offshore wind farm. In the coastal zone to the south of
need of long transmission lines. Third, wind farm avoid a China, typhoon is an important factor to limiting the
large amount of land occupation [10]. development of offshore wind turbines, especially in the
Guangdong, Fujian and Zhejiang Provinces [12]. Every
year, around 7 of typhoons will attack Chinese south-
eastern China between May to October [13], at the same
time, this period is the peak of electricity consumption.
Hence, typhoon is not only the big challenge for wind
turbine producer, but also a serious examination for
Chinese government and national emergency
departments.
typhoon attack, so almost whole offshore wind farms are VII. A RECOMMENDATION FOR THE CHINESE
located in transitional depth where the depth of seawater
GOVERNMENT
is lees than 50 metres.
VIII. CONCLUSION
REFERENCES
Fig.6.1 Chinese power plants and energy regions [16] [1] Sailboat History Timeline. [Online]. Available:
http://www.timeline-help.com/sailboat-history-timeline.html.
In my view, according to the Chinese 12th Five Year [Accessed: 20 February 2013].
Plan, in the next decades, offshore wind farm will be [2] Yun zhoun and Quanfeng Wang. (2009) Wind Power In China.
developed as the backbone of electricity contributor in the [Online].Available: http://hig.diva-
eastern coast at the end of 2020. At the eastern coast, the portal.org/smash/get/diva2:225297/FULLTEXT01 [Accessed: 22
February 2013].
major power energy will be changed from coal energy to [3] Global wind statistics, (2012). [Online]. Available:
offshore wind energy. The number of coal power station http://www.gwec.net/wp-content/uploads/2013/02/GWEC-PRstats-
will be reduced substantially in next few years. As shown 2012_english.pdf. [Accessed: 25 February 2013].
as Fig.7.1, there is no doubt that these power stations are [4] Wind Resources (2009). China Wind Power Center. [Online].
Available: http://www.cwpc.cn/cwpc/zh-cn/node/6295. [Accessed: 25
the biggest contributors of electric power, but they are February 2013].
also the culprit of greenhouse emission and air pollution [5] Installed wind power capacity. [Online]. Available:
in the eastern coast. Meanwhile, most coal power stations http://www.cwpc.cn/cwpc/en/node/6425. [Accessed: 25 February 2013].
are far from the coal mine area, this lead the increase of [6] China-Dabancheng Wind Farm now has a combined generating
capacity of 500 MW (2010). [Online]. Available:
transport cost. http://www.evwind.es/2010/10/05/china-dabancheng-wind-farm-now-
has-a-combined-generating-capacity-of-500-mw/7664. [Accessed: 25 [13] Forecasting yearly number of tropical cyclones affecting Hong
February 2013]. Kong. [Online]. Available:
[7] The World Factbook (2013). Central Intelligence Agency. [Online]. http://www.weather.gov.hk/education/edu01met/01met_tropical_cyclon
Available: https://www.cia.gov/library/publications/the-world- es/ele_typhoon14_e.htm. [Accessed: 10 March 2013].
factbook/geos/ch.html. [Accessed: 27 February 2013] [14] Offshore Wind Turbines- Corrosion Protection of Electric Systems
[8] China’s Action on Clean Power (2012). Environment and Energy and Support Structures (2010). [Online]. Available:
Study Institute (EESI). [Online]. Available: http://www.brighthub.com/environment/renewable-
http://files.eesi.org/IssueBrief_China_Clean_Energy_101112.pdf. energy/articles/67156.aspx [Accessed: 15 March 2013]
[Accessed: 1 March 2013] [15] Plans for Floating Offshore Wind Farm Making Waves in Mass
[9] China’s 12th Five-Year Plan Power Industry in New Directions (2009). [Online]. Available: http://crispgreen.com/2009/10/plans-for-
(2012). POWER NETWORK. [Online]. Available: floating-offshore-wind-farm-making-waves-in-mass/. [Accessed: 15
http://www.powermag.com/gas/Chinas-12th-Five-Year-Plan-Pushes- March 2013]
Power-Industry-in-New-Directions_4257.html. [Accessed: 8 March [16] OGPSS-China’s coal industry (2012). [Online]. Available:
2013]. http://bittooth.blogspot.co.uk/2012/09/ogpss-chinas-coal-industry.html.
[10] Offshore wind (2012). Global Wind Energy Council (GWEC). [Accessed: 8 March 2013]
[Online]. Available: http://www.gwec.net/global-figures/global- [17] Wind power density in Chinese eastern coast (2011). CMA WIND
offshore/. [Accessed: 12 March 2013] AND SOLAR ENERGY RESOURCES CENTER. [Online]. Available:
[11] Lixuan Hong and Bernd Möller (2012). An economic assessment of http://cwera.cma.gov.cn/Website/index.php?ChannelID=120&NewsID=
tropical cyclone risk on offshore wind farms. [Online] Available: 1977. [Accessed: 10 March 2013]
http://www.sciencedirect.com/science/article/pii/S0960148112000213. [18] China revises up 2015 renewable energy goals (2011).
[Accessed: 10 March 2013] [Online].Available: http://www.reuters.com/article/2011/08/30/us-
[12] Oceans of opportunity (2009). European Wind Energy Association. china-energy-renewable-idUSTRE77T0CM20110830. [Accessed: 8
[Online]. Available: March 2013].
http://www.ewea.org/fileadmin/ewea_documents/documents/publication [19] Global Offshore Wind Farms Database. [Online]. Available:
s/reports/Offshore_Report_2009.pdf. [Accessed: 10 March 2013] http://www.4coffshore.com/offshorewind/