scholarly journals Smart automatic petrol pump system based on internet of things

Author(s):  
Zahra'a M. Baqir ◽  
Hassan J. Motlak

IoT is that a rapid expanding program presently for blend all equipment things like (sensors, gadgets, hardware and so on.) assemble and embed those with programming creating our own gadgets use The petroleum pump is these days running physically. it's an activity that fundamentally a drawnout time and requires more workforce. Additionally, put fuel stations in away zones is extermely costly. So achievement an automatic fuel filling system using web technology to solve these problems. There are dense proposed systems which goal to improve the fueling operation so as to form it less difficulty and more dependabl and more-safe, guarinte that the purchaser gets the same quantity of fuel in interchange for what he/she pays, so assist to end fraud at different fuel stations. these systems take human-software interaction by the web-enabeled procedure, thus keep off all errors made by people. The fundamental objective of this review paper is to survey of recent projects in design protype of smart petro pump based on RFID as payment tool and control on it remotely with high security level and concluded with future potential direction in design of smart petrol pump system.

Sensi Journal ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 236-246
Author(s):  
Ilamsyah Ilamsyah ◽  
Yulianto Yulianto ◽  
Tri Vita Febriani

The right and appropriate system of receiving and transferring goods is needed by the company. In the process of receiving and transferring goods from the central warehouse to the branch warehouse at PDAM Tirta Kerta Raharja, Tangerang Regency, which is currently done manually is still ineffective and inaccurate because the Head of Subdivision uses receipt documents, namely PPBP and mutation of goods, namely MPPW in the form of paper as a submission media. The Head of Subdivision enters the data of receipt and mutation of goods manually and requires a relatively long time because at the time of demand for the transfer of goods the Head of Subdivision must check the inventory of goods in the central warehouse first. Therefore, it is necessary to hold a design of information systems for the receipt and transfer of goods from the central warehouse to a web-based branch warehouse that is already database so that it is more effective, efficient and accurate. With the web-based system of receiving and transferring goods that are already datatabed, it can facilitate the Head of Subdivision in inputing data on the receipt and transfer of goods and control of stock inventory so that the Sub Head of Subdivision can do it periodically to make it more effective, efficient and accurate. The method of data collection is done by observing, interviewing and studying literature from various previous studies, while the system analysis method uses the Waterfall method which aims to solve a problem and uses design methods with visual modeling that is object oriented with UML while programming using PHP and MySQL as a database.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


2015 ◽  
Vol 2015 ◽  
pp. 1-13
Author(s):  
Yang Liu ◽  
Shuhan Wang ◽  
Peng Dong ◽  
Xiangyang Xu

An electric oil pump (EOP) was integrated into the hydraulic system and an automatic transmission (AT) mechanical oil pump (MOP) was downsized. These processes were performed to combine a start-stop function with the AT and further improve the transmission efficiency. Furthermore, this study established a dynamics model of power loss and leakage of an 8-speed AT; a flow-based control algorithm of the EOP was then developed to realize the start-stop function and support the MOP to meet the flow requirement of the system. Based on a driving simulation method, sizes of the MOP and EOP that ensured optimal fuel economy were selected. A control strategy for the starting clutch was also developed to minimize the starting delay of the test vehicle. A test environment on a rig and prototype vehicle was established to verify the feasibility of the proposed control strategies. The test results indicated that the transmission functioned favorably with the novel two-pump system presented, and a quick and smooth starting performance was achieved when the engine was restarted. The findings in this study are extremely valuable for forward designs of an AT for realizing start-stop function and improving efficiency.


Author(s):  
Robert Adams ◽  
Jinjiang Xiao ◽  
Michael Cross ◽  
Max Deffenbaugh

Switched reluctance motors may be advantageous when used as the primary motor for an electric submersible pump system.  They are less susceptible to jamming failures due to their high starting torque and ability to reverse direction.  Driving these motors requires well-timed pulse waveforms and precise control of the motor based on its rotational position.  In general, voltage-based sensing and control systems at the surface see highly unpredictable waveforms with excessive ringing behaviour due to the impedance characteristics of the long cabling between the surface controller and the downhole motor system.  In this work, a system is detailed which monitors the current waveforms on the motor coil excitation conductors at the surface as a source of motor performance feedback and control.  State-space modelling of the system shows stable current waveforms at the surface controller for both short and long interconnect cable systems.  A laboratory demonstration of the surface controller, interconnect cabling, and motor system is shows excellent agreement with the current and voltage waveforms predicted by the state-space system model.


2020 ◽  
Vol 4 (3) ◽  
pp. 490-495
Author(s):  
Astika Ayuningtyas ◽  
Yuliani Indrianingsih ◽  
Uyuunul Mauidzoh

The development of information and computerized tenology has led to what is called the Internet and the World Wide Web (WWW). In addition, the dramatic development of the Internet has given users more choice and control over content, and also provides individuals, businesses, and public and private organizations with the opportunity to generate and disseminate information. The interactive features of the web can be an effective way to build and maintain mutually beneficial relationships if the web is used properly. The presence of the Internet has proven to have a positive impact on the development of a village, sub-district or district to introduce and inform the potential of its region. This is evident in several regions of Indonesia which have successfully used Internet facilities to introduce tourist destinations to the world. Therefore, the training on the promotion website is an effort to optimize the introduction of high quality village products in the district of Patuk and is also intended to follow the results of research on the design of a promotion of superior products and tourist objects on the web in Patuk Gunungkidul district. On the basis of the website promotion feasibility test during the training for each representative in 11 villages in the Patuk sub-district, 87.36% was obtained, so that it can be said that the Introduction of superior village products via promotional materials based on the website was optimal and met the needs of users.


Author(s):  
Sophie Gastellier-Prevost

Within a more and more complex environment, where connectivity, reactivity and availability are mandatory, companies must be “electronically accessible and visible” (i.e., connection to the Web, e-mail exchanges, data sharing with partners, etc.). As such, companies have to protect their network and, given the broad range of security solutions on the IT security market, the only efficient way for them is to design a global secured architecture. After giving the reader all the necessary materials and explaining classical security and services needs, this chapter proposes three different realistic security-level architectures that may be currently deployed within companies. For more realistic analysis and illustration, two examples of companies with different size and profile are given. A number of advices, explanations and guidelines are provided in this chapter so readers are able to adapt those architectures to their own companies and both security and network needs.


2010 ◽  
pp. 343-364 ◽  
Author(s):  
Henk Eijkman

This chapter addresses a significant theoretical gap in the Web 2.0 (or “Web 2.0+,” as it is referred to by the author) literature by analyzing the educational implications of the “seismic shift in epistemology” (Dede, 2008, p. 80) that is occurring. As already identified in Chapter 2, there needs to be a consistency between our own epistemic assumptions and those embedded in Web 2.0. Hence the underlying premise of this chapter is that the adoption of social media in education implies the assumption of a very different epistemology—a distinctly different way of understanding the nature of knowledge and the process of how we come to know. The argument is that this shift toward a radically altered, “postmodernist,” epistemic architecture of participation will transform the way in which educators and their students create and manage the production, dissemination, and validation of knowledge. In future, the new “postmodern” Web will increasingly privilege what we may usefully think of as a socially focused and performance-oriented approach to knowledge production. The expected subversion and disruption of our traditional or modernist power-knowledge system, as already evident in the Wikipedia phenomenon, will reframe educational practices and promote a new power-knowledge system, made up of new, social ways in which to construct and control knowledge across the Internet. The chapter concludes by advocating strategies for critical engagement with this new epistemic learning space, and posing a number of critical questions to guide ongoing practice.


Author(s):  
Salam Abdallah

The Web of networks has created a convenient global environment for people to work, socialize, learn, buy, and sell. The Web has also been used as a tool to breach privacy, gain illegal possession of property, battlefield for cyber warfare, and in some cases, cause loss of life. The field of ‘information ethics’ was developed to curb this negative impact. Elrod and Smith (2005) define information ethics as a “field that applies ethical principles within the context of information provision, control, and use. This field considers issues about all aspects of information technology and information systems for personal, professional, and public decision-making.” Moore (2005) defines information ethics as having three public interests related to privacy, property, and control. Mason (1986) proposes a different set consisting of privacy, accuracy, property, and access.


Behaviour ◽  
2008 ◽  
Vol 145 (3) ◽  
pp. 277-295 ◽  
Author(s):  
Felipe Gawryszewski ◽  
Paulo Motta

AbstractSeveral orb-web spiders build conspicuous decorations in their webs. The prey attraction hypothesis proposes that decorations increase spider foraging success by attracting prey, and that attraction is linked to UV reflectance. Alternatively, the web advertisement hypothesis proposes that decorations are a signal that advertises the presence of the web to large animals. We tested both hypotheses for the web silk tufts of Gasteracantha cancriformis. Even though tufts are UV reflective, we did not find support for the prey attraction hypothesis. In the field, when webs with tufts painted black and control webs were compared, there were no differences in the number of prey captured, number of damaged areas in webs and type of prey captured. In the laboratory, Drosophila melanogaster did not demonstrate preference for tufted silk lines versus non-tufted silk lines. Our data also did not give support for the web advertisement hypothesis. The proportion of web destruction was similar between web with tufts painted black and control webs during four days of experimentation. Therefore, two of the most favoured hypotheses that attempt to explain decorations do not apply for web silk tufts in our study system. Instead we propose that silk tufts might be an aposematic signal.


Sign in / Sign up

Export Citation Format

Share Document