0% found this document useful (0 votes)
67 views4 pages

RF Research Paper-1

This document describes the design and implementation of a wireless RF-based industrial equipment control system. The system uses a 435MHz RF transmitter and receiver to allow remote control of industrial equipment up to 100 meters away. The transmitter unit is connected to a controller that encodes signals from buttons or switches. The encoded signals are transmitted to the receiver unit, which is connected to relays and actuators to control equipment. The system aims to allow remote monitoring and control of industrial sites to eliminate issues with wired connections.

Uploaded by

Ghilman Habib
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views4 pages

RF Research Paper-1

This document describes the design and implementation of a wireless RF-based industrial equipment control system. The system uses a 435MHz RF transmitter and receiver to allow remote control of industrial equipment up to 100 meters away. The transmitter unit is connected to a controller that encodes signals from buttons or switches. The encoded signals are transmitted to the receiver unit, which is connected to relays and actuators to control equipment. The system aims to allow remote monitoring and control of industrial sites to eliminate issues with wired connections.

Uploaded by

Ghilman Habib
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

RF Communication based Wireless Industrial Control

and Monitoring System


Hasan Raza Akhtar Nawaz Miqdad Abbas
Electrical Engineering Electrical Engineering Electrical Engineering
The University of Lahore The University of Lahore The University of Lahore
Lahore, Pakistan Lahore, Pakistan Lahore, Pakistan
BSEE02173124@student.uol.edu.pk BSEE02173036@student.uol.edu.pk BSEE02173037@student.uol.edu.pk

Muhammad Hassan Ishtiaq


Electrical Engineering
The University of Lahore
Lahore, Pakistan
BSEE02173100@student.uol.edu.pk

Abstract—: One of the most often used techniques Monitoring system, this work will be double-checked for
in major companies is panel control instrumentation. accuracy. The set-up includes an RF transmitter and receiver
module, with the RF receiver coupled to the process components
Wires connect the instruments on the control panel, such such as a pumpand lights in the process area. As far as possible
as switches and monitors, to the CPU.With these cables, away from the process, the RF transmitter was linked with
system in control room that was over 100 meters away from the
the processor sends measured variables to the control process station
panel, and the controlpanel sends processed variables to
II. LITERATURE REVIEW
the processor. During wet seasons, subterranean wiring
Communication nodes in the Internet-of-Things (IoT)
canbecome clogged and cause data loss if not properly universe indicate single-purpose devicesin one of the areas
maintained. This could result in a faulty procedure. To where they communicate with one another. Data from a large
get around this, radio frequency waves are employed to
number of sensors is transmitted through a variety of network
types until it reaches the data repository, which may be in the
send the signal from the control panel to the processing cloud. This communication is therefore protected at the point
plant. Personal computers are linked to level converters where the information is created, i.e., at the sensors' outputs
(or inputs). This link must be protected at the point of
and RF transmitters in industrial control rooms. This
information generation, which is within the sensors
research presents the design and implementation of a themselves, in order to be protected. The authors of [2]
wireless RF-based industrial equipment control system. propose an algorithm for exchanging encryption keys in
smart-home systems as a solution to the challenge of
An electrical system can be powered by a button press,
communication security in IoT networks. Smart devices
key turn or drawing the tiled rope on the body, connected to the Internet of Things (IoT) can be mademore
depending on the industry. secure, as described in [3]. One of the most important
categories to examine is one that collects sensitive and private
Keywords— RF communication, Wireless Communication, data systems. This includes, for example, data from sensors
Panel Control. that monitor the human body's essential statistics. A faster
algorithm implementation using the 64- bit Intel AVX2
I. INTRODUCTION microcontroller architecture is provided in [4, where the
To eliminate data loss at the receiving end, wireless authors claim that it isfaster than the existing implementation
industrial process control is an ideal solution. RF-based industry using the SPECK/SIMON cypher. in the sphere of healthcare,
control is well-documented in the literature [1], [2]. An industrial cryptography methods have been examined for their
operation like a pump, blower, lights etc. can be wirelessly appropriateness [5].
controlled. Wireless RF-based industrial equipment control
system design and implementation are presented in this study. III. MATHEMATICAL MODELING AND METHODOLOGY
Depending on the industry, an electrical system can be powered Four hundred thirty-five megahertz (MHz) is the frequency
by pressing a button, turninga key, or pulling a tiled rope across used by the RF transmitter and receiver. At both ends of the
the body [2]–[4]. Frequently, operators have to walk a significant transmission and reception radio signals communicate within
distance to turn on or off the system. The business owners are thedefined frequency range. When a user hits a button on the
concerned when the service is necessary. This endeavor has been
wireless remote at the transmitter unit, the controller picks up
launched to help bridge the gap between the system and the
the signal and encodes it, after which it sends the encoded
operator.The operator can remotely turn on and off machines 100
meters distant from the building usinga 435MHz radio frequency signal. The signal is captured by the receiver at the opposite
[5]–[7]. The electrical apparatus can be controlled from a end to take action. Below is diagrammatic concept about
distance using a transmitter unit and an antenna. In order to turn working of system as shown in Figure 1.
the electricity on or off, the controller sends the signal to a relay,
which functions as a switch. Before it's connected to the
the transmission is projected to endure (even if it is within its
rated range).

Figure 1: - Block Diagram Figure 4: Transmitter Side


The receiver unit must be Arduino Uno compatible in order
When it comes to designing an RF wireless communication- to connect with the Arduino Uno architecture. Receiving,
based system, there are a variety of options. The analysing, and responding to data and signals received from
microcontroller architecture was used to construct a wireless the transmission unit are the responsibilities of the reception
transmitter-receiver interface, which was used to govern the unit. In comparison to the transmitter, it just has three pins
communication between two units that were not identical. As instead of four, which makes it easier to work with. The three
long as the transmitter and receiver are within a range of zero pins provide power, ground, and data/signal transfer for the
to one hundred metres, it is assumed that whatever is whole device. The RF receiver works in the opposite way
delivered to the transmitter will be received at the receiver (0- from the RF emitter. Input data is sent from the transmitter to
100m). the controller unit, where it is processed and relays are
triggered as needed.which are activated or deactivated
depending on the current scenario.
Figure 5: Receiver Side

Figure 2: Proposed Circuit Design on fritzing IV. CONCLUSION


The project is being constructed with the goal of monitoring
and regulating various sites. The sensors we employed for
monitoring had a range of 20 to 30 meters and were
comprised of a variety of light, temperature, and current
sensors. Control is accomplished by the employment of
various actuators that are triggered by the data obtained from
the sensors. The user has the option of connecting to the
server and exerting complete control over the location. The
system's application field is broad because it can be readily
deployed in any area, allowingus to monitor as many sites as
we want at the same time. It can be installed in a home or in
anoffice to provide us with a precise estimate of the quantity
of energy that has been utilized. It also provides the capability
Figure 3: Proposed Circuit Design on Proteus of managing the amount of energy consumed from any
location. Itwill also improve safety in a variety of industrial
In order to work with the Arduino microcontroller interface, settings by allowing complete control over the temperature.
the system's transmission unit has been developed to function Sensors and actuators can be customized for a variety of
at a radio frequency of 435MHz. Even if the challenge of applications,including the monitoring of a mechanical system
incompatibility is successful, data/signals will not be sent due or any industrial robot or machine, among others. With this
to the noise that will be created. All four pins on the update, it can be used to monitor a large range of robots in
transmitter unit are used for transmitting data. One of these is order to ensure that they remain inside particular
a HIGH pin, one is a LOW pin. The data pin is linked to the predetermined boundaries. If necessary, the actuators might
signal peripheral designated by our microcontroller, while the be used to shut down the system in an instant. Furthermore,
power pins are all connected to their respective polarities. this information can be transferred to a central system.
Transmission units are supplied with a voltage that permits Previously, in [4], a similar application of this type was
them to function without any limitations. The greater the developed and implemented. Buildings that are more
supply or input voltage provided to the transmitter, the longer environmentally friendly and that have lower lighting and
heating expenditures are examples of how similar applications [5] T. Thaj Mary Delsy, “Wireless control of industrial process
might be used to benefit the environment. using RF signal,” Int. J. Appl. Eng. Res., vol. 10, no. 3, pp.
6103–6111, 2015.
[6] J. M. Rathod, “Wireless Control for Industrial Instruments
V. FUTURE DIRECTIONS
and Home Appliences At UHF,” Natl. Conf. Recent Trends
The project is being built with the purpose of monitoring and Eng. Technol. Wirel., no. May 2011, pp. 0–4, 2019.
regulating a number of different locations. The sensors we [7] N. Verba, Z. Nagy, and I. Bîrs, “Microcontroller and RF
used for monitoring had a range of 20 to 30 meters and were 434Mhz Communication basedMonitoring and Control
made up of a variety of light, humidity, proximity, System,” no. January, 2014.
temperature, and current sensors, among other components. [8] N. Nahata and A. R. Patel, “RF CONTROLLED SPY
Control is achieved by the use of a variety of actuators that ROBOT WITH NIGHT VISIONCAMERA,” vol. 1, no. 2,
are triggered by the information collected from the sensors. pp.
The user has the option of connecting to the server and
exercising complete control over the location if they so
desire. Due to the ease with which thesystem can be deployed
in any location, the system's application field is vast, allowing
us to monitor as many sites as we want at the same time. The
device can be installed in either a homeor an office, and it will
provide us with an accurate estimate of the amount of energy
that has been consumed. It also has the potential of
controlling the quantity of energy consumed from any
location. Because it allows for perfect control over the
temperature, it will also increase safety in a variety of
industrial contexts. For a number of applications, sensors and
actuators can be customized to meet specific needs. For
example, they can be used to monitor a mechanical system or
any industrial robot or machine, among other things. As a
result of this update, it can be used to monitor a large number
of robots in order to verify that they remain inside specific
specified bounds. If necessary, the actuators might be utilized
to shut down the system in a matter of seconds if it were
necessary. Furthermore, this information can be transmitted
to a centralized system for storage. The development and
implementation of a similar application of this type was
previously documented in [4]. Examples of how similar
applications might be used to benefit the environment include
the construction of buildings that are more environmentally
friendly and that have lower lighting and heating expenditures.
Usingthis technology in an industrial setting would result in
the establishment of a more secure system that could be more
easily monitored, as well as a system that could be more
easily networked.

VI REFERENCE
[1] A. S. Althobaiti and M. Abdullah, “Medium Access Control
Protocols for Wireless Sensor Networks Classifications and
Cross-Layering,” Procedia Comput. Sci., vol. 65, pp. 4–16,
2015, doi: 10.1016/j.procs.2015.09.070
[2] D. T. Otermat, I. Kostanic, and C. E. Otero, “Analysis of the
FM Radio Spectrum for Secondary Licensing of Low- Power
Short-Range Cognitive Internet of Things Devices,” IEEE
Access, vol. 4, pp. 6681–6691, 2016, doi:
10.1109/ACCESS.2016.2616113.
[3] M. Furqan Ali, D. K. Nalin Jayakody, T. D. Ponnimbaduge
Perera, K. Srinivasan, A. Sharma, and I. Krikidis
“Underwater Communications: Recent Advances,” no.
March,pp. 8–10, 2019.
[4] K. H. Park et al., “IEEE Access Special Section Editorial:
Underwater Wireless Communications and Networking,”
IEEE Access, vol. 7, pp. 52288–52294, 2019, doi:
10.1109/ACCESS.2019.2908768..

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy