SSRN
SSRN
BLOCK DIAGRAM:
I. INTRODUCTION
301
COPYRIGHT TO IJETIE
Electronic copy available at: https://ssrn.com/abstract=3411966
IJETIE Vol. 5, Issue 5, May 2019
evacuate the waste materials according to the individual voltage will be applied across the motor. By opening S1 and
character on waste materials using the sensor and the S4 switches and closing S2 and S3 switches, this voltage is
supporting peripherals. reversed, allowing reverse operation of the motor.
IV. FUNDAMENTALS OF THIS TECHNIQUE S2 should never be closed at the same time, as this would
cause a short circuit on the input voltage source. The same
This technique is followed by using
applies to the switches S3 and S4. This condition is known as
various components where they are predicted as
shoot-through.
bio-degradable or non-bio degradable A proximity sensor
often emits an electromagnetic field or a beam of The H-bridge arrangement is generally used to reverse the
electromagnetic radiation (infrared, for instance), and looks polarity/direction of the motor, but can also be used to 'brake'
for changes in the field or return signal. The object being the motor, where the motor comes to a sudden stop, as the
sensed is often referred to as the proximity sensor's target. motor's terminals are shorted, or to let the motor 'free run' to a
Different proximity sensor targets and demands different stop, as the motor is effectively disconnected from the circuit.
sensors. For example, a capacitive or photoelectric sensor The following table summarizes operation, with S1 - S4
might be suitable for a plastic target; an inductive proximity corresponding. A relay is an electrical switch that opens and
sensor always requires a metal target. The maximum distance closes under control of another electrical circuit. In the
that this sensor can detect is defined "nominal range". Some original form, the switch is operated by an electromagnet to
sensors have adjustments of the nominal range or means to open or close one or many sets of contacts. It was invented by
report a graduated detection distance. Joseph Henry in 1835. Because a relay is able to control an
output circuit of higher power than the input circuit, it can be
Proximity sensors can have a high reliability and long
considered, in a broad sense, to be a form of electrical
functional life because of the absence of mechanical parts and
amplifier. These contacts can be either Normally Open (NO),
lack of physical contact between sensor and the sensed object.
Normally Closed (NC), or change-over contacts.
The project is based on microcontroller board designs,
Normally-open contacts connect the circuit when the relay is
manufactured by several vendors, using various
activated; the circuit is disconnected when the relay is
microcontrollers. These systems provide sets of digital and
inactive. It is also called Form A contact or "make" contact.
analog I/O pins that can be interfaced to various expansion
Form A contact is ideal for applications that require to switch
boards ("shields") and other circuits. The boards feature serial
a high-current power source from a remote device.
communications interfaces, including USB on some models,
Normally-closed contacts disconnect the circuit when the
for loading programs from personal computers. For
relay is activated; the circuit is connected when the relay is
programming the microcontrollers, the Arduino project
inactive. It is also called Form B contact or "break" contact.
provides an integrated development environment (IDE) based
Form B contact is ideal for applications that require the circuit
on the Processing project, which includes support for the C
to remain closed until the relay is activated. Change-over
and C++ programming languages. An H bridge is an
contacts control two circuits: one normally-open contact and
electronic circuit that enables a voltage to be applied across a
one normally-closed contact. It is also called Form Contact
load in either direction. These circuits are often used in
When a current flows through the coil, the resulting magnetic
robotics and other applications to allow DC motors to run
field attracts an armature that is mechanically linked to a
forwards and backwards.
moving contact. The movement either makes or breaks a
An H bridge is built with four switches (solid-state or connection with a fixed contact. When the current is switched
mechanical). When the switches S1 and S4 (according to the off, the armature is usually returned by a spring to its resting
first figure) are closed (and S2 and S3 are open) a positive position. Latching relays exist that require operation of a
302
COPYRIGHT TO IJETIE Electronic copy available at: https://ssrn.com/abstract=3411966
IJETIE Vol. 5, Issue 5, May 2019
second coil to reset the contact position. By analogy with the [3] Mohammed, Amin Salih, et al. "DETECTION AND
functions of the original electromagnetic device, a solid-state REMOVAL OF BLACK HOLE ATTACK IN
MOBILE AD HOC NETWORKS USING GRP
relay operates a thyristor or other solid-state switching device
PROTOCOL." International Journal of Advanced
with a transformer or light-emitting diode to trigger it. . Most Research in Computer Science 10.6 (2018).
of the devices build today are not able to communicate with [4] Viswanathan, M., et al. "Security and privacy
protection in cloud computing." Journal of
the RS232 world due to voltage differences between them.
Advanced Research in Dynamical and Control
Thus, to have serial communication it is necessary to have Systems (2018): 1704-1710.
level conversion. This level conversion is done by using [5] Nithya, S., et al. "Intelligent based IoT smart city on
traffic control system using raspberry Pi and robust
specifically designed integrated circuits (IC).
waste management." Journal of Advanced Research
The RS232 IC converts the signals from rs232 port into the in Dynamical and Control Systems, Pages (2018):
signals which are compatible to TTL based digital logic. It 765-770.
consists of amplifiers called as line drivers which improve [6] Dhivakar, B., et al. "Statistical Score Calculation of
Information Retrieval Systems using Data Fusion
signal strength and set the voltage levels according to receiver
Technique." Computer Science and Engineering 2.5
unit so that it does not get damaged. In this IC’s, 0 indicates (2012): 43-5.
high and 1 indicates low. Therefore, whenever they receive [7] Mohammed, Amin Salih, Shahab Wahhab Kareem,
and M. Sivaram. "Time series prediction using
signal, it is inverted from its initial state. These IC does also
SRE-NAR and SRE-ADALINE." (2018):
have an inbuilt UART (Universal Asynchronous Transmitter 1716-1726.
Receiver) which performs an overhead process transmitting [8] Abraham, Steffin, Tana Luciya Joji, and D. Yuvaraj.
"Enhancing Vehicle Safety with Drowsiness
and receiving the serial data.
Detection and Collision Avoidance." International
The asynchronous signal consists of start/stop bits as well as Journal of Pure and Applied Mathematics 120.6
error detecting bits. The UART generates start/stop bits and (2018): 2295-2310.
can also detect the error in the transmission. It also acts as an [9] Porkodi, V., et al. "Survey on White-Box Attacks and
Solutions." Asian Journal of Computer Science and
intermediate between serial and parallel communication i.e.
Technology 7.3 (2018): 28-32.
bit-wide communication and byte-wide communication. It [10] Malathi, N., and M. Sivaram. "An Enhanced Scheme
converts byte of data into a single stream when transmitting to Pinpoint Malicious Behavior of Nodes In
Manet’s." (2015).
and converts the bit of data i.e. serial data into parallel when
[11] Sivaram, M. "Odd and even point crossover based
receiving. Tabu ga for data fusion in Information retrieval."
(2014).
[12] Sivaram, M., et al. "Emergent News Event Detection
V. CONCLUSION from Facebook Using Clustering."
[13] Punidha, R. "avithra K, Swathika R, and Sivaram
From these above criteria we conclude this the M,“Preserving DDoS Attacks sing Node Blocking
biodegradable and non-bio degradable waste are classified Algorithm.” International Journalof Pure and
Applied Mathematics, Vol. 119, o. 15, 2018."
and automated and separated using the core operation of
633-640.
proximity sensor and Arduino. [14] Batri, K., and M. Sivaram. "Testing the impact of
odd and even point crossover of genetic algorithm
over the data fusion in information
REFERENCES
retrieval." European Journal of Scientific
[1] Sivaram, M., B. DurgaDevi, and J. Anne Steffi. Research (2012).
"Steganography of two lsb bits." International [15] Mohamme, Sivaram Yuvaraj Amin Salih, and V.
Journal of Communications and Engineering 1.1 Porkodi. "Estimating the Secret Message in the
(2012): 2231-2307. Digital Image." International Journal of Computer
[2] Sivaram, M., et al. "Exploiting the Local Optima in Applications 181.36 (2019): 26-28.
Genetic Algorithm using Tabu Search." Indian [16] Manikandan, V., et al. "PRIVACY PRESERVING
Journal of Science and Technology 12 (2019): 1. DATA MINING USING THRESHOLD BASED
303
COPYRIGHT TO IJETIE Electronic copy available at: https://ssrn.com/abstract=3411966
IJETIE Vol. 5, Issue 5, May 2019
304
COPYRIGHT TO IJETIE Electronic copy available at: https://ssrn.com/abstract=3411966