0% found this document useful (0 votes)
8 views

SSRN

Ignore this

Uploaded by

joshua zamora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

SSRN

Ignore this

Uploaded by

joshua zamora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Emerging Technology and Innovative Engineering

Volume 5, Issue 5, May 2019 (ISSN: 2394 – 6598)

DEGRADABLE AND NON-DEGRADABLE


WASTE SEPARATION USING
INTELLIGENT APPROACH
S. SULTHAN ALAUDEEN, Dr.A. LAKSHMI

Abstract— Degradable and non-degradable waste is II. PROCEDURE


separated using conveyor belt and proximity sensor, The entire set up is assembled according the pin configuration
Which will detect the object according to the type of
waste where it will be the input of Arduino (Input will be and made enabled using the program which in turn replicate
in DIGITAL SIGNAL by proximity sensor) the the process by repeating the sensor on and off during the
programmed micro-controller 8051 will give the output to
the system (waste material) according to the bio identification of the bio degradable and non-bio degradable of
degradable or non-biodegradable conditions. the waste materials where it can be analyzed and grouped into
Keywords-proximity sensor, conveyor belt, Arduino. its sub categories.

BLOCK DIAGRAM:
I. INTRODUCTION

To prohibit and control the mixing of bio degradable and


non-bio degradable. This device which will act as a (reflex
action) making the system and indicating the obstacle using
sensors .When the whole set up is in drive mode the waste
materials are sensed according to their transition
bio-degradable and non-biodegradable .So sensing of
materials makes the system cautious when there is an non
degradable waste found and the intensity of the sensor
changes constantly according to the waste material
Figure 1: separating technique using aurdino Uno.
conditions .To control the mixing of waste caused by the high
pollution solid waste materials which cause discomfort for the
people residing who may be affected due to this kind of III. WORKING
pollution where they can be saved by using this technique.
The waste from the conveyor is sensed and converted from
analog to digital by A/D converter from the proximity sensor
so that aurdino will make the process where characteristic of
waste material is detected or not. If detected it will indicate

Contact: the aurdino by recognizing the object. Again, if there are no


Dr.A.Lakshmi, electronics and communication, kalasalingam academy
of research and education, Krishnan Kovil, India,, (e-mail:
obstacles found then it will automatically switch to normal
[email protected]). according to the program in microcontroller, here the simplest
S.Sulthan Alaudeen ,electronics and communication, kalasalingam
academy of research and education, Krishnan Kovil,India,(e-mail: form of explanation is this system can predict analyze and
[email protected] ).

301
COPYRIGHT TO IJETIE
Electronic copy available at: https://ssrn.com/abstract=3411966
IJETIE Vol. 5, Issue 5, May 2019

evacuate the waste materials according to the individual voltage will be applied across the motor. By opening S1 and
character on waste materials using the sensor and the S4 switches and closing S2 and S3 switches, this voltage is
supporting peripherals. reversed, allowing reverse operation of the motor.

Using the nomenclature above, the switches S1 and

IV. FUNDAMENTALS OF THIS TECHNIQUE S2 should never be closed at the same time, as this would
cause a short circuit on the input voltage source. The same
This technique is followed by using
applies to the switches S3 and S4. This condition is known as
various components where they are predicted as
shoot-through.
bio-degradable or non-bio degradable A proximity sensor
often emits an electromagnetic field or a beam of The H-bridge arrangement is generally used to reverse the
electromagnetic radiation (infrared, for instance), and looks polarity/direction of the motor, but can also be used to 'brake'
for changes in the field or return signal. The object being the motor, where the motor comes to a sudden stop, as the
sensed is often referred to as the proximity sensor's target. motor's terminals are shorted, or to let the motor 'free run' to a
Different proximity sensor targets and demands different stop, as the motor is effectively disconnected from the circuit.
sensors. For example, a capacitive or photoelectric sensor The following table summarizes operation, with S1 - S4
might be suitable for a plastic target; an inductive proximity corresponding. A relay is an electrical switch that opens and
sensor always requires a metal target. The maximum distance closes under control of another electrical circuit. In the
that this sensor can detect is defined "nominal range". Some original form, the switch is operated by an electromagnet to
sensors have adjustments of the nominal range or means to open or close one or many sets of contacts. It was invented by
report a graduated detection distance. Joseph Henry in 1835. Because a relay is able to control an
output circuit of higher power than the input circuit, it can be
Proximity sensors can have a high reliability and long
considered, in a broad sense, to be a form of electrical
functional life because of the absence of mechanical parts and
amplifier. These contacts can be either Normally Open (NO),
lack of physical contact between sensor and the sensed object.
Normally Closed (NC), or change-over contacts.
The project is based on microcontroller board designs,
Normally-open contacts connect the circuit when the relay is
manufactured by several vendors, using various
activated; the circuit is disconnected when the relay is
microcontrollers. These systems provide sets of digital and
inactive. It is also called Form A contact or "make" contact.
analog I/O pins that can be interfaced to various expansion
Form A contact is ideal for applications that require to switch
boards ("shields") and other circuits. The boards feature serial
a high-current power source from a remote device.
communications interfaces, including USB on some models,
Normally-closed contacts disconnect the circuit when the
for loading programs from personal computers. For
relay is activated; the circuit is connected when the relay is
programming the microcontrollers, the Arduino project
inactive. It is also called Form B contact or "break" contact.
provides an integrated development environment (IDE) based
Form B contact is ideal for applications that require the circuit
on the Processing project, which includes support for the C
to remain closed until the relay is activated. Change-over
and C++ programming languages. An H bridge is an
contacts control two circuits: one normally-open contact and
electronic circuit that enables a voltage to be applied across a
one normally-closed contact. It is also called Form Contact
load in either direction. These circuits are often used in
When a current flows through the coil, the resulting magnetic
robotics and other applications to allow DC motors to run
field attracts an armature that is mechanically linked to a
forwards and backwards.
moving contact. The movement either makes or breaks a

An H bridge is built with four switches (solid-state or connection with a fixed contact. When the current is switched

mechanical). When the switches S1 and S4 (according to the off, the armature is usually returned by a spring to its resting

first figure) are closed (and S2 and S3 are open) a positive position. Latching relays exist that require operation of a

302
COPYRIGHT TO IJETIE Electronic copy available at: https://ssrn.com/abstract=3411966
IJETIE Vol. 5, Issue 5, May 2019

second coil to reset the contact position. By analogy with the [3] Mohammed, Amin Salih, et al. "DETECTION AND
functions of the original electromagnetic device, a solid-state REMOVAL OF BLACK HOLE ATTACK IN
MOBILE AD HOC NETWORKS USING GRP
relay operates a thyristor or other solid-state switching device
PROTOCOL." International Journal of Advanced
with a transformer or light-emitting diode to trigger it. . Most Research in Computer Science 10.6 (2018).
of the devices build today are not able to communicate with [4] Viswanathan, M., et al. "Security and privacy
protection in cloud computing." Journal of
the RS232 world due to voltage differences between them.
Advanced Research in Dynamical and Control
Thus, to have serial communication it is necessary to have Systems (2018): 1704-1710.
level conversion. This level conversion is done by using [5] Nithya, S., et al. "Intelligent based IoT smart city on
traffic control system using raspberry Pi and robust
specifically designed integrated circuits (IC).
waste management." Journal of Advanced Research
The RS232 IC converts the signals from rs232 port into the in Dynamical and Control Systems, Pages (2018):
signals which are compatible to TTL based digital logic. It 765-770.
consists of amplifiers called as line drivers which improve [6] Dhivakar, B., et al. "Statistical Score Calculation of
Information Retrieval Systems using Data Fusion
signal strength and set the voltage levels according to receiver
Technique." Computer Science and Engineering 2.5
unit so that it does not get damaged. In this IC’s, 0 indicates (2012): 43-5.
high and 1 indicates low. Therefore, whenever they receive [7] Mohammed, Amin Salih, Shahab Wahhab Kareem,
and M. Sivaram. "Time series prediction using
signal, it is inverted from its initial state. These IC does also
SRE-NAR and SRE-ADALINE." (2018):
have an inbuilt UART (Universal Asynchronous Transmitter 1716-1726.
Receiver) which performs an overhead process transmitting [8] Abraham, Steffin, Tana Luciya Joji, and D. Yuvaraj.
"Enhancing Vehicle Safety with Drowsiness
and receiving the serial data.
Detection and Collision Avoidance." International
The asynchronous signal consists of start/stop bits as well as Journal of Pure and Applied Mathematics 120.6
error detecting bits. The UART generates start/stop bits and (2018): 2295-2310.
can also detect the error in the transmission. It also acts as an [9] Porkodi, V., et al. "Survey on White-Box Attacks and
Solutions." Asian Journal of Computer Science and
intermediate between serial and parallel communication i.e.
Technology 7.3 (2018): 28-32.
bit-wide communication and byte-wide communication. It [10] Malathi, N., and M. Sivaram. "An Enhanced Scheme
converts byte of data into a single stream when transmitting to Pinpoint Malicious Behavior of Nodes In
Manet’s." (2015).
and converts the bit of data i.e. serial data into parallel when
[11] Sivaram, M. "Odd and even point crossover based
receiving. Tabu ga for data fusion in Information retrieval."
(2014).
[12] Sivaram, M., et al. "Emergent News Event Detection
V. CONCLUSION from Facebook Using Clustering."
[13] Punidha, R. "avithra K, Swathika R, and Sivaram
From these above criteria we conclude this the M,“Preserving DDoS Attacks sing Node Blocking
biodegradable and non-bio degradable waste are classified Algorithm.” International Journalof Pure and
Applied Mathematics, Vol. 119, o. 15, 2018."
and automated and separated using the core operation of
633-640.
proximity sensor and Arduino. [14] Batri, K., and M. Sivaram. "Testing the impact of
odd and even point crossover of genetic algorithm
over the data fusion in information
REFERENCES
retrieval." European Journal of Scientific
[1] Sivaram, M., B. DurgaDevi, and J. Anne Steffi. Research (2012).
"Steganography of two lsb bits." International [15] Mohamme, Sivaram Yuvaraj Amin Salih, and V.
Journal of Communications and Engineering 1.1 Porkodi. "Estimating the Secret Message in the
(2012): 2231-2307. Digital Image." International Journal of Computer
[2] Sivaram, M., et al. "Exploiting the Local Optima in Applications 181.36 (2019): 26-28.
Genetic Algorithm using Tabu Search." Indian [16] Manikandan, V., et al. "PRIVACY PRESERVING
Journal of Science and Technology 12 (2019): 1. DATA MINING USING THRESHOLD BASED

303
COPYRIGHT TO IJETIE Electronic copy available at: https://ssrn.com/abstract=3411966
IJETIE Vol. 5, Issue 5, May 2019

FUZZY CMEANS CLUSTERING." ICTACT


Journal on Soft Computing 9.1 (2018).
[17] Sivaram, M., et al. "The Real Problem Through a
Selection Making an Algorithm that Minimizes the
Computational Complexity."
[18] Sivaram, M., et al. "DETECTION OF ACCURATE
FACIAL DETECTION USING HYBRID DEEP
CONVOLUTIONAL RECURRENT NEURAL
NETWORK."
[19] V. Porkodi, Dr.D. Yuvaraj, Dr. Amin Salih
Mohammed, V. Manikandan and Dr.M. Sivaram.
“Prolong the Network Lifespan of WirelessSensor
Network” (2018): 2034-2038.
[20] M, Sivaram, ENABLING ANONYMOUS
ENDORSEMENT IN CLOUDS WITH
DECENTRALIZED ACCESS CONTROL (March
13, 2019). Available at SSRN:
https://ssrn.com/abstract=
[21] M, Sivaram, INTEGER WAVELET TRANSFORM
BASED APPROACH FOR HIGH ROBUSTNESS
OF AUDIO SIGNAL TRANSMISSION (March 13,
2019). Available at SSRN:
https://ssrn.com/abstract=
[22] M, Sivaram, HEALTHCARE VISIBLE LIGHT
COMMUNICATION (March 13, 2019). Available
at SSRN: https://ssrn.com/abstract=
[23] M, Sivaram, Preserving DDoS Attacks Using Node
Blocking Algorithm (March 13, 2019). Available at
SSRN: https://ssrn.com/abstract=

304
COPYRIGHT TO IJETIE Electronic copy available at: https://ssrn.com/abstract=3411966

You might also like