scholarly journals Fuel Level Monitoring and Security Warning Tools using IoT for Komatsu Excavator PC200-8M0

Author(s):  
Yohanes Acep Nanang Kardana ◽  
Hanny J Berchmans ◽  
Cuk Supriyadi Ali Nandar ◽  
Henry Nasution ◽  
Dena Hendriana

Komatsu PC200-8M0 excavators operate mostly in the mining and forestry sector that covers a very large land area up to thousands hectares. Operation of this excavator requires a fuel tank for refueling process. In many cases, there were fuel thefts from the fuel tank of this excavator because the excavator were located in remote area. To overcome this problem, it is necessary to develop a fuel monitoring tool that can monitor and send warnings to the excavator owner if there is any fuel access into the excavator fuel tank during the rest time of the excavator. The monitoring tool is developed by using a NODEMCU ESP8266 microcontroller that connected to the internet network so that it will be able to communicate with the Thingspeak webserver. With internet access, the monitoring process can be carried out by using a computer and also smart mobile phone.

2021 ◽  
Author(s):  
R. S. Laddha ◽  
P. B. Buchade ◽  
A. D. Shaligram

Author(s):  
G. Vamshi

Fuel theft from vehicles is one of the major problems, the world is facing today. The reason for fuel theft is steady increase in the price. Hence fuel theft is a major concern for everyone, especially the logistics and fuel transport companies. These companies are facing significant losses due fuel theft from their fleet of vehicles which usually include heavy vehicles like trucks, lorries etc. There are several solutions which are used by these companies to prevent or minimize fuel theft which include monitoring cameras, additional security, GPS tracking of vehicles etc. We have come up with this project to prevent fuel theft, especially in fuel transport vehicles. Our proposed system detects any change in fuel level of a fuel tank using ultrasonic sensor and with the integration of GSM module, the message regarding the change in fuel level and the location of the vehicle (detected using GPS) is sent to the owner or the management. The additional feature of our project is, we can lock the fuel tank remotely if needed by the owner.


Author(s):  
MOHAMMED S. KHALIL ◽  
FAJRI KURNIAWAN ◽  
KASHIF SALEEM

Over the past decade, there have been dramatic increases in the usage of mobile phones in the world. Currently available smart mobile phones are capable of storing enormous amounts of personal information/data. The smart mobile phone is also capable of connecting to other devices, with the help of different applications. Consequently, with these connections comes the requirement of security to protect personal information. Nowadays, in many applications, a biometric fingerprint recognition system has been embedded as a primary security measure. To enable a biometric fingerprint recognition system in smart mobile phones, without any additional costs, a built-in high performance camera can be utilized. The camera can capture the fingerprint image and generate biometric traits that qualify the biometric fingerprint authentication approach. However, the images acquired by a mobile phone are entirely different from the images obtained by dedicated fingerprint sensors. In this paper, we present the current trend in biometric fingerprint authentication techniques using mobile phones and explore some of the future possibilities in this field.


2011 ◽  
Vol 130-134 ◽  
pp. 4270-4273
Author(s):  
Jian Guo Yuan ◽  
Sheng Gu

When dealing with such complex systems such as the software package of a smart mobile phone, it is necessary to apply powerful methods to detect and report errors when they occur. This paper probes and analyzes a powerful debug method called trap and exception handling, which is supported by the ARM platforms. The method can easily capture some valuable debug information. When a fatal error occurs during runtime or system detects an abnormal, a trap or an exception shall be logged and stored in the non-volatile random access memory (NVRAM). The information must be enough and easy for engineer to analyze the software error.


3D Research ◽  
2014 ◽  
Vol 5 (1) ◽  
Author(s):  
Jonathan Bar-Magen Numhauser ◽  
Zeev Zalevsky

Sign in / Sign up

Export Citation Format

Share Document