Sunteți pe pagina 1din 49

DESIGN ENGINEERING-2(A)

GUJARAT TECHNOLOGICAL UNIVERSITY


Chandkheda, Ahmedabad
Affiliated

Prime Institute of Engineering and Technology


A
DE-2A Project Report On
Hospital management
Under Subject of
DESIGN ENGINEERING-II [A]
B.E. III, Semester- VI
(Computer Engineering Branch)

Submitted By,
Sr. Name of Student Enrollment No.
1. Munshi samih 161340107030
2. Patoliya mehul 161340107041
3. Jasoliya smit 161340107022
4. Patel niyati 161340107036
5. Devganiya rahul 1613401070

Mr. Gauvrav patel


(Faculty Guide)

Mr.Gauvrav Patel (Head of Department)

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 1
DESIGN ENGINEERING-2(A)

Academic year 2016-17

PRIME INSTITUTE OF ENGINEERING AND


TECHNOLOGY

CERTIFICATE
This is to certify that the Design Engineering report, submitted for the Design Engineering-
2A entitled “Hodspital management ” has been carried out by Munshi
samiha(161340107030),patoliya mehul (161340107041),jasoliya smit(161340107022),patel
niyati (161340107036), devganiya rahul(16134010 )at Computer Engineering Department of
prime Institute of Engineering & Technology, navsari for partial fulfillment of Design
Engineering work for Gujarat Technological University. This Design Engineering work has
been carried out under my supervision and is to my satisfaction.

Place:

Date:

Internal Guide Head of the Department

Mr. Bhavin Patel Mr. Vivek P. Patel

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 2
DESIGN ENGINEERING-2(A)

(Assistant Prof. VIEAT) (HOD, Computer VIEAT)

TABLE OF CONTENTS
Sr Content/ Topics Page
No. no

TITLE PAGE I

CERTIFICATE II

TABLE OF CONTENTS III

LIST OF FIGURES V

LIST OF TABLES VI

ABSTRACT VII

1. INTRODUCTION 1
1.1 Information 3
1.2 Project Definition 5
1.3 Objective 7
1.4 Purpose 8

2. EVALUATION OF IDEA 9
2.1 Observation Record Sheet (AEIOU) Framework 10
2.2 Literature Review/Prior Art Search 12
2.3 Empathy Mapping Canvas 14
2.4 Ideation Canvas 15
2.5 Product Development Canvas 16

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 3
DESIGN ENGINEERING-2(A)

3. PRE-DESIGN AND DESIGN CONSIDERATION 18


3.1Learning Need Matrix 19
3.2Design Consideration 19
A) Design for Performance safety and Reliability 20
B) Design for Ergonomics and Esthetics 21
C) Design for Manufacture and Assembly 21
D) Design for Cost and Environment 22
3.3 SCAMPER Tool 23
3.4 Reverse Engineering 29

4. FAST PROTOTYPE MODEL AND DESIGN CALCULATION 32


4.1Basic Prototype Model 33
4.2Design Calculation 34
4.2.1 Block Diagram 38
4.2.2 Algorithm /Flowchart 42
4.2.3 UML Diagrams
4.2.4 Implementation Technology
4.2.5 Implementation Screenshots

5. CONCLUSION AND FUTURE SCOPE 45


REFERENCES 46

LIST OF FIGURES

2.1.1 AEIOU-Activity 22
2.1.2 AEIOU-Environment 24
2.1.3 AEIOU-Interactions 26

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 4
DESIGN ENGINEERING-2(A)

2.1.4 AEIOU-Interactions 27

LIST OF TABLES

3.2.1 Design for Performance safety and Reliability


3.2.2 Design for Ergonomics and Esthetics
3.2.3 Design for Manufacture and Assembly

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 5
DESIGN ENGINEERING-2(A)

Chapter:-1

1. Introduction

1.1 Information

A wireless network is any type of computer network that uses wireless data connections for
connecting network nodes. Wireless networking is a method by which homes,
telecommunications networks and enterprise (business) installations avoid the costly process
of introducing cables into a building, or as a connection between various equipment locations.
Wireless telecommunications networks are generally implemented and administered using
radio communication. This implementation takes place at the physical level (layer) of the OSI
model network structure

Examples of wireless networks include cell phone networks, Wi-Fi local networks

Types of Wireless Network


Wireless PAN
Wireless personal area networks (WPANs) interconnect devices within a relatively small area,
that is generally within a person's reach. For example, both Bluetooth radio and invisible
infrared light provides a WPAN for interconnecting a headset to a laptop. ZigBee also supports
WPAN applications. Wi-Fi PANs are becoming commonplace (2010) as equipment designers
start to integrate Wi-Fi into a variety of consumer electronic devices. Intel "My WiFi" and
Windows 7 "virtual Wi-Fi" capabilities have made Wi-Fi PANs simpler and easier to set up
and configure.

Wireless LAN

Wireless LANs are often used for connecting to local resources and to the Internet.A wireless
local area network (WLAN) links two or more devices over a short distance using a wireless
distribution method, usually providing a connection through an access point for Internet access.
The use of spread-spectrum or OFDM technologies may allow users to move around within a
local coverage area, and still remain connected to the network.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 6
DESIGN ENGINEERING-2(A)

Products using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi brand name.
Fixed wireless technology implements point-to-point links between computers or networks at
two distant locations, often using dedicated microwave or modulated laser light beams over
line of sight paths. It is often used in cities to connect networks in two or more buildings without
installing a wired link.

Wireless mesh network


A wireless mesh network is a wireless network made up of radio nodes organized in a mesh
topology. Each node forwards messages on behalf of the other nodes. Mesh networks can "self
heal", automatically re-routing around a node that has lost power.

Wireless MAN
Wireless metropolitan area networks are a type of wireless network that connects several
wireless LANs. WiMAX is a type of Wireless MAN and is described by the IEEE
802.16 standard.

Wireless WAN
Wireless wide area networks are wireless networks that typically cover large areas, such as
between neighboring towns and cities, or city and suburb. These networks can be used to
connect branch offices of business or as a public internet access system. The wireless
connections between access points are usually point to point microwave links using parabolic
dishes on the 2.4 GHz band, rather than omnidirectional antennas used ith smaller networks. A
typical system contains base station gateways, access points and wireless bridging relays. Other
configurations are mesh systems where each access point acts as a relay also. When combined
with renewable energy systems such as photo-voltaic solar panels or wind systems they can be
stand alone systems.

Global area network


A global area network (GAN) is a network used for supporting mobile across an arbitrary
number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile
communications is handing off user communications from one local coverage area to the next.
In IEEE Project 802, this involves a succession of terrestrial wireless LANs.[

1.2 Project Definition:


VIEAT/BE/CE/SEMESTER-V/130940107004 Page 7
DESIGN ENGINEERING-2(A)

Wireless Device A(WTD) ["Any Where","Any Time","Any Device"]

1.3 Project objective :

The main objective of making the device is to give end user a usable resource which has more
availability and reliability for anyone & anywhere. This network device can be implemented
and it will be free for end user.

1.4 Project purpose :

The purpose of the project is to increase the wireless network technology and to give more
facilities to the user. This system will eradicate the waste usage and it will be used in the useful
manner.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 8
DESIGN ENGINEERING-2(A)

Chapter:-2

Evaluation of idea

2.1 Observation Record Sheet (AEIOU) Framework.

ACTIVITIES:-.

General impression / Observation

As it Generally happens that when we are out at street we find the open access points and
we connect to the network but sometimes it occurs that the limitations of the user we cant get
connected and we face some problems. By seeing the problem of limited users and the waste
use we describe the limited following activities that are described in activity canvas.

[ fig : 2.1.1 ]

ENVIRONMENT:-

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 9
DESIGN ENGINEERING-2(A)

Style, material & atmosphere

The things needed for the conviniency of environment mesh network, geographical location,
Low network condition,etc. Related atmosphere like a city area, monsoon, remote area, etc.

Elements Features and Special notes:-

Here the environment of more peoples are needed. and the mesh topology is created.It can also
be used where the network conditions are very low.

[ fig : 2.1.2 ]

INTERACTIONS:-

Who is interacting with whom, what?

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 10
DESIGN ENGINEERING-2(A)

The persons , pedestrians , the devices which are used get paired

Elements Features and Special notes:-

The Mapping cardinalities are used to make a connection ie. one-to-one, one-to-many, manyto-
one, many-to-many.

[ fig : 2.1.3 ]

OBJECTS:-

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 11
DESIGN ENGINEERING-2(A)

What component are involved

Here to develop this application we used some component like a networking algorithms
and USSD code, Router, mobile,etc.

How objects are relating to the activities?

The services will be accessed by ustructured supplementary. The wire Replacement


Communication by mesh topology.

[ fig : 2.1.4 ]

Users:-

Who is present? Roles & responsibilities?

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 12
DESIGN ENGINEERING-2(A)

The users of this device are like pedestrians , businessman ,security professional ,
students , etc are using this device

List of identified people involved

The student can obtain his/her result or the pedestrian can get the urgent information like
railway enquiry , any emergency news , etc.

[ fig : 2.1.5 ]

2.2 Literature Review/Prior Art Search

Research paper

This section involved the basic information regarding to existing research in our project
definition area. So according to it we referred some literature and research paper for it.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 13
DESIGN ENGINEERING-2(A)

(1) Problem loans and cost efficiency in commercial banks by Ian schemiz, Thomas
pathlt, (Volume 25, Issue 1, November 1989)
This paper addresses a little examined intersection between the problem loan literature and the
bank efficiency literature. We employ Granger-causality techniques to test four hypotheses
regarding the relationships among loan quality, cost efficiency, and bank capital. The data
suggest that problem loans precede reductions in measured cost efficiency; that measured cost
efficiency precedes reductions in problem loans; and the reductions in capital at thinly
capitalized banks precede increases in problem loans. Hence, cost efficiency may be an
important indicator of future problem loans and problem banks. Our results are ambiguous
concerning whether or not researchers should control for problem loans in efficiency
estimation.

(2) Some evidence on the uniqueness of bank loans by Christopher James, (Volume 3,
Issue 1.4, November 2009)
This paper presents evidence that banks provide some special service with their lending activity
that is not available from other lenders. I find evidence that bank borrowers, not CD holders,
bear the cost of reserve requirements on CDs. In addition, I find a positive stock price response
to the announcement of new bank credit agreements that is larger than the stock price response
associated with announcements of private placements or public straight debt offerings. Finally,
I find significantly negative returns for announcements of private placements and straight debt
issues used to repay bank loans.

(3) Problem loans and cost efficiency in commercial banks by Ian schemiz, Thomas
pathlt, (Volume 25, Issue 1, November 1989)
This paper addresses a little examined intersection between the problem loan literature and the
bank efficiency literature. We employ Granger-causality techniques to test four hypotheses
regarding the relationships among loan quality, cost efficiency, and bank capital. The data
suggest that problem loans precede reductions in measured cost efficiency; that measured cost
efficiency precedes reductions in problem loans; and the reductions in capital at thinly
capitalized banks precede increases in problem loans. Hence, cost efficiency may be an
important indicator of future problem loans and problem banks. Our results are ambiguous
concerning whether or not researchers should control for problem loans in efficiency
estimation.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 14
DESIGN ENGINEERING-2(A)

(4) Some evidence on the uniqueness of bank loans by Christopher James, (Volume 3,
Issue 1.4, November 2009)
This paper presents evidence that banks provide some special service with their lending activity
that is not available from other lenders. I find evidence that bank borrowers, not CD holders,
bear the cost of reserve requirements on CDs. In addition, I find a positive stock price response
to the announcement of new bank credit agreements that is larger than the stock price response
associated with announcements of private placements or public straight debt offerings. Finally,
I find significantly negative returns for announcements of private placements and straight debt
issues used to repay bank loans.

Web Contents Refered:

This section involved the basic information regarding to existing referenced websites and E
documents in our project definition area. So according to it we referred some literature and
research paper for it.

(1) http://www.flipkart.com
This addresses a little examined intersection between the problem loan literature and the bank
efficiency literature. We employ Granger-causality techniques to test four hypotheses regarding
the relationships among loan quality, cost efficiency, and bank capital. The data suggest that
problem loans precede reductions in measured cost efficiency; that measured cost efficiency
precedes reductions in problem loans; and the reductions in capital at thinly capitalized banks
precede increases in problem loans. Hence, cost efficiency may be an important indicator of
future problem loans and problem banks. Our results are ambiguous concerning whether or not
researchers should control for problem loans in efficiency estimation.
(2) http://www.snapdeal.com
This paper addresses a little examined intersection between the problem loan literature and the
bank efficiency literature. We employ Granger-causality techniques to test four hypotheses
regarding the relationships among loan quality, cost efficiency, and bank capital. The data
suggest that problem loans precede reductions in measured cost efficiency; that measured cost
efficiency precedes reductions in problem loans; and the reductions in capital at thinly
capitalized banks precede increases in problem loans. Hence, cost efficiency may be an
important indicator of future problem loans and problem banks. Our results are ambiguous

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 15
DESIGN ENGINEERING-2(A)

concerning whether or not researchers should control for problem loans in efficiency
estimation.

Technical Aspects:

In this part we will discuss about the devices which we can use in the project. The Wireless
Devices are : WIFI , WI-MAX , Bluetooth , NFC , Zigbee

Standard Family Downlink Uplink Coverage

(Mbps) (Mbps)

Wi-Fi 802.11 11/54/150/300 100m

WiMAX 802.16e 144 35 10km

UMTS (3G) 3GPP 14.4 5.76 30km

/HSPA (3.5G)

LTE (4G) 3GPP 360 80 30km

Bluetooth Wifi

Specifications Bluetooth SIG IEEE, WECA


authority

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 16
DESIGN ENGINEERING-2(A)

Year of 1994 1991


development

Bandwidth
Low ( 800 Kbps ) High (11 Mbps )

Hardware
requirement Bluetooth adaptor on all the devices Wireless adaptors on all the devices of the
connecting with each other network, a wireless router and/or wireless
access points

Cost Low
High

Power Low High


Consumption

Frequency 2.4 GHz 2.4 GHz

Security It is less secure It is more secure

Range 10 meters 100 meters

Primary
Devices Mobile phones, mouse, Notebook computers, desktopcomputers,
keyboards,office and industrial automation servers
devices

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 17
DESIGN ENGINEERING-2(A)

Ease of Use Fairly simple to use. Can be used to connect It is more complex and requires
upto seven devices at a time. It is easy to configuration of hardware and software.
switch between devices or find and connect
to any device.

Bluetooth (v1) ZigBee

Protocol Stack 250 kb < 32 kb (4kb)

Range 10 - 100 meters 30 - 100 meters

Link Rate 1 Mbps 250 kbps

Battery rechargeable non-rechargeable

Devices 8 2^16

Air Interface FHSS DSSS

Usage frequently infrequently

Network Join Time long short

Extendibility no yes

Security PIN, 64 bit, 128 Bit 128 bit, AES

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 18
DESIGN ENGINEERING-2(A)

2.3 Empathy Mapping Canvas

Users:

In this stage, we find the various users which are directly or indirectly related example:
Businessman, Administrator, Non-Technical user, Security professional, Detection, etc

[ fig : 2.3.1 ]

Stakeholders:

In this stage, we find the user who will directly or indirectly related to users. For example:
Normal Person, Database Administrator, Security, Government Officials, ISP, Websites.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 19
DESIGN ENGINEERING-2(A)

[ fig : 2.3.2 ]

Activities:
The activities done in the system are having the facilities of sending and recieving email,
find the meaning in the google dictionary, the railway inquiry is done,etc.

[ fig : 2.3.3 ]

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 20
DESIGN ENGINEERING-2(A)

2.4 Ideation canvas

Peoples :
In this stage, we find the various peoples which are directly or indirectly related example:
Businessman, Administrator, Non-Technical user, Security professional, Detection, etc

[ fig : 2.4.1 ]

Activities :
In this section the activities mentioned in emphasizing canvas

[ fig : 2.4.2 ]

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 21
DESIGN ENGINEERING-2(A)

Situation/Context/Location :

[ fig : 2.4.3 ]

Props/Possible Solutions :

The urgent sending and receiving of mail can be done by using this technique. The webnet
is created which will provide the communication interface. The USSD code will be able to help
to access the service the wireless device will provide the bandwidth to the webnet.

[ fig : 2.4.4 ]

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 22
DESIGN ENGINEERING-2(A)

2.5 Product Development Canvas

Purposes :

In this stage we will know that what is the purpose of developing the product so as we
can see the purposes to develop system like to increase the communication channel and to
create the user friendly device which will do the activities of user and to stop the time
consuming process. To get the info instantly.

[ fig : 2.5.1 ]

Peoples :
The peoples here are those people who will be using this device

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 23
DESIGN ENGINEERING-2(A)

[ fig : 2.5.2 ]

Product Experience :
The product says about the different products that we have used related to the system .Eg :

Open Access point, Free Wifi Zone, etc.

[ fig : 2.5.3 ]

Product Functions :
The Functions of the product are providing the Fixed Speed , pairing Between the devices and
mapping between the Wireless device

[ fig : 2.5.4 ]

Product Features:
The features of the product are that the user can access by the help of USSD code and at at time
more users connect compare to wifi. and any device can use this system.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 24
DESIGN ENGINEERING-2(A)

[ fig : 2.5.5 ]

Components:
The components that are required to use the device are Mobile phone, router, Routing
algorithms that are applied on network and the repeaters needed to increase the range of wifi.

[ fig : 2.5.6 ]

Customer Revalidation:
This system will be widely useful for the normal people so customer revalidation is necessary
part of the structure and the device.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 25
DESIGN ENGINEERING-2(A)

[ fig : 2.5.7 ]

Reject/Redesign/Retain:
This part is very necessary because to make the changes according to the conviniency of
the user we have to see the reject, redesign and retain. the first thing is to make a long range
network so as to create the vast communication channel and if one device fails there should be
backup or the pairing faster in the other devices.

[ fig : 2.5.8 ]

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 26
DESIGN ENGINEERING-2(A)

Chapter-3 Phase-2 Pre-Design and Design consideration

3.1 Learning Need Matrix:

Purpose/Product Concept

The purpose of the device is to make such a system which creates the communication channel
in which the user connects "Any time , Any Where , Any Device ".

Tools/method/theories/process/involved

In this we have the method of creating the network like topologies and network
configurations.The topology which is to be used is the mesh topology.

Application standards and design specification/principles & experiments

W3C standard , network connection standard, version . In this sem i have research of in all
this topic for in future develop our application.like the version of network simulator

Software/simulation/skill/mathematic requirement

There are network scanning tools which are to be used in the network scanning the
softwares are like Nmap,netcat,NS-3 simulator

Component materials strength criteria(exploration varieties/testing requirement)

The components are divided into two parts wired network and wireless network the wireless
device that are used are wifi, wimax, zigbee, bluetooth, NFC, etc.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 27
DESIGN ENGINEERING-2(A)

[ fig : 3.1 ]

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 28
DESIGN ENGINEERING-2(A)

3.2 Design Consideration [In All tables Write answers related to your
Project only]
A) Design for Performance safety and Reliability
SR_NO PARAMETERS HOW ITS CONCERN WITH YOUR
PROJECT DEFINATION

1. Performance Faster retrieve data. that is without graphic


24 X 7 connectivity
User can connect easily without any
password

2 Safety there is not any private data


The information shared here is open for all
No misuse or wastage of the data
3 Reliability Easy to use in any type of Device
This application can also work at slow
network connection.

[ table 3.2.1 ]

B) Design for Ergonomics and Esthetics

• Ergonomics: An applied science concerned with designing and arranging things people use so
that the people and things interact most efficiently and safely.

• Esthetics: It's a word to describe someone's idea of what is beautiful.


SR_NO. PARAMETERS HOW ITS CONCERN WITH YOUR PROJECT
DEFINATION
1. Ergonomics Easy to use and easy to learn for normal person
Reduce mind stress regarding to get any info
urgently

Portability with mobile device functionalities


2. Esthetics The response of application is very fast as it is
non graphic

[ table 3.2.2 ]

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 29
DESIGN ENGINEERING-2(A)

C) Design for Manufacture and Assembly

• Design for Manufacture

Design for manufacture or design for manufacturability (DFM) is a design methodology.DFM


is designing the products proactively.It is the process of designing the products to optimize all
the manufacturing functions: procurement, fabrication, assembly, testing, delivery and service.

• Design for Assembly

Design for Assembly is a method of analyzing components and sub-assemblies in order to:
Optimize the assembly process steps Identify part relevance Estimate the cost of assembly .
SR_NO. PARAMETERS HOW ITS CONCERN WITH YOUR PROJECT
DEFINATION
1. Design for manufacture Design regarding to perfect user friendly with
add on functionalities

Module wise Device making


2. Design for Assembly Design process, making wireless device and
creating interface

USSD code generation and connectivity


[ table 3.2.3 ]

D) Design for Cost and Environment

• Design for Cost

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 30
DESIGN ENGINEERING-2(A)

Design-to-Cost (DTC), as part of cost management techniques, describes a systematic


approach to Controlling the costs of product development and manufacturing.

• Design for Environment


Environment is the surrounding things. It includes living things and natural forces
SR_NO. PARAMETERS HOW ITS CONCERN WITH YOUR
PROJECT DEFINITION
1 Design-to-Cost Device Development cost
installation charge
2. Design for Environment Like environment city area, monsoon,
Working of device in any climatic condition

Social connectivity
[ table 3.2.4 ]

3.3 SCAMPER Tool [ HERE FIND ANSWERS OF GIVEN


QUESTION RELATED TO YOUR PROJECT/TOPIC]
• SCAMPER is based on the notion that everything new is some addition or
modification of something that already exists.
• You take a subject and change it into something else.
• The SCAMPER idea generation technique is founded on the belief that everything new is an
alteration of something already in existence. The term ‘SCAMPER’ is actually an acronym.
The full form of the individual letters is given below: S
= Substitute?
C = Combine?
A = Adapt?
M = Magnify? Modify?
P = Put to other uses?
E = Eliminate?
R = Rearrange? Reverse?
• These are seven prompts forming a general-purpose checklist that can be utilized to trigger
questions pertaining to existing products. Each letter indicates a different manner by which
you can play with the features of the object (the product/service) of the challenge for new
ideas.
• Isolate the subject you want to think about and ask a checklist of questions to see what
new ideas and thoughts emerge. You'll find that ideas start popping up almost
involuntarily, when you ask the right questions:
 Can I substitute something?
 Can I combine it with something else?

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 31
DESIGN ENGINEERING-2(A)

 Can I adapt something to your subject?


 Can I magnify or add to it?
 Can I modify or change it in some fashion?
 Can I put it to some other use?
 Can I eliminate something from it?
 Can I rearrange it?
 What happens when I reverse it?
• Answering those questions with the specific situation or problem in mind would help in
triggering new ideas using brainstorming technique.
• The seven steps in the SCAMPER technique are explored in detail in the next paragraphs.

Step 1: “S” for Substitute [HERE FIND ANSWERS OF THE GIVEN


QUESTION ONLY]
• Take away a part of the selected thing, concept or situation and replace it with
something else. Anything can be an item for substitution. The possibilities include steps
in a process, product parts, the people or the place. Substitution is a technique of trial
and error, of replacing one object with another till you are able to determine the correct
idea.
• Some of the kinds of questions you can ask are given below:
 Can I replace or change any parts?
 Can I replace someone involved?
 Can the rules be changed?
 Can I use other ingredients or materials?
 Can I use other processes or procedures?
 Can I change its shape?
 Can I change its color, roughness, sound or smell?
 What if I change its name?
 Can I substitute one part for another?
 Can I use this idea in a different place?
 Can I change my feelings or attitude towards it?

Step 2: “C” for Combine

The next step is to contemplate combining elements of the situation or problem you‟re facing
so as think up something new. This is in line with the view of many creativity experts that
creativity has to do with combining already existing things in a fresh way.
So join, force together or affiliate two or more elements pertaining to your subject matter and
contemplate routes by which such a combination could possibly take you to a solution.

Some questions:
 What ideas or parts can be combined?
 Can I combine or recombine its parts‟ purposes?  Can I combine or merge it
with other objects?

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 32
DESIGN ENGINEERING-2(A)

 What can be combined to maximize the number of uses?


 What materials could be combined?
 Can I combine different talents to improve it?

trigger words and example:

Some examples of trigger words for „Combine‟ are: become one, bring together, come
together, conjoin, intermix, link, mingle, package, unite, amalgamate, link, relate, and
commingle.

Step 3: “A” for Adapt

Think if there‟s a solution for another problem that you may mold to suit your situation.

Some questions:
 What else is like it?
 Is there something similar to it, but in a different context?
 Does the past offer any lessons with similar ideas?
 What other ideas does it suggest?
 What could I copy, borrow or steal?
 Whom could I emulate?
 What ideas could I incorporate?
 What processes can be adapted?
 What different contexts can I put my concept in?
 What ideas outside my field can I incorporate?

Step 4: “M” for Modify/Magnify

Pose a question to yourself about which ideas you can produce if you magnify or modify your
situation or problem. Magnifying parts of or the whole of your idea may enhance its perceived
worth or furnish fresh insight pertaining to which components are most significant.

Think about ways to magnify or exaggerate your idea.Magnifying your idea or parts of it may
increase its perceived value or give you new insights about what components are most
important.

Modify questions:
 Can you change an aspect of your process or product to enhance it?
 Can you think of any ways to modify the shape, feel, appearance, color or form of your
product?
 What can you add to change this product?
 What can you highlight or emphasize to produce more value?

Magnify questions:

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 33
DESIGN ENGINEERING-2(A)

 Is there anything you can make bigger, higher or larger?


 What can you overstate or exaggerate?
 Can you increase the frequency?
 What can you duplicate? Is it possible to create multiple copies?
 Is it possible to include additional features or otherwise add extra value?

Step 5: “P” for Put to another use

Contemplate how you can put your current idea to different uses or what could be reused from
elsewhere so as to fix your own problem. Frequently, an idea only turns out to be great when
applied in a different manner than first imagined.

Modify the goal of the subject. Contemplate why it exists, its purpose of use and what it is
assumed to do. Confront all of these suppositions and propose new and strange purposes.
 What else can it be used for?
 Can it be used by people other than those it was originally intended for?
 How would a child use it? An older person?
 How would people with different disabilities use it?
 Are there new ways to use it in its current shape or form?
 Are there other possible uses if it‟s modified?
 If I knew nothing about it, would I figure out the purpose of this idea?
 Can I use this idea in other markets or industries?

Step 6: “E” for Eliminate (or Minify)

Contemplate what would happen if you eliminated components or elements of your idea or if
you minimized, reduced or simplified aspects of it. By way of repeated elimination or trimming
of ideas, processes and objects, it is possible to steadily constrict your challenge to that function
or part of the most significance.

Some questions:
 How can I simplify it?
 What parts can be removed without altering its function?
 What‟s non-essential or unnecessary?
 Can the rules be eliminated?
 What if I made it smaller?
 What feature can I understate or omit?
 Should I split it into different parts?
 Can I compact or make it smaller?

Step 7: “R” for Rearrange or Reverse

Rearrange – Contemplate whether you can do some kind of rearranging whether changing the
sequence, pattern or layout; interchanging components; changing schedule; changing pace; or

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 34
DESIGN ENGINEERING-2(A)

interchanging cause and effect. Contemplate changing the order of processes or other hierarchy
involved.

Reverse – Contemplate what you would do if a portion of your process/product/probortunity


was done or worked in another order, or in reverse. Reverse the orientation or direction. Turn
it inside-out, upside-down, or backwards – just make it go against the direction it was meant to
be used or to proceed.

Some questions:  What other arrangement


might be better?  Can I interchange
components?
 Are there other patterns, layouts or sequences I can use?
 Can I transpose cause and effect?
 Can I change pace or change the schedule of delivery?
 Can I transpose positives and negatives?
 Should I turn it around? Up instead of down? Down instead of up?
 What if I consider it backwards?
 What if I try doing the exactly opposite of what I originally intended?

“HERE WRITE THE QUESTION & ANSWER RELATED TO


YOUR PROJECT/TOPIC:”

EXAMPLES
Every bicycle has typically the following components: Pedals, Frame, Chain, Drive Sprocket,
Tires, Handlebars, and Brakes. When the SCAMPER technique would be applied to a bicycle,
the ideas below, for improving it, could be generated:

• Pedal grips that strap for the feet to be better secured


• Frames of a much lighter weight founded on new materials
• Stronger chains having special clamps to make changing easier
• Better derailleur gears for the rear sprocket
• New materials for the rear wheel to replace spokes
• Racing handlebars to make the racing position more ergo dynamic

Let‟s imagine another example, where you want to devise a new kind of pen. By applying the
SCAMPER technique, below is one potential output of new ideas for a new version of pen:
• Substitute – replace nib with knife, ink with iron
• Combine – holding with opening, writing with cutting
• Adapt – use the pen top as a container
• Modify – body can be made flexible
• Put to other uses – utilize for writing on wood

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 35
DESIGN ENGINEERING-2(A)

• Eliminate – clip utilizing Velcro


• Rearrange – make the nib flow outwards

In addition to its application for generating ideas to improve a product or services, SCAMPER
may also be utilized for things like triggering ideas if you‟re writing a book or plan to write a
blog post, coming up with a number of probable solutions for a current political or social
problem or determining methods to make a marketing campaign better.

3.4 Reverse Engineering

Reverse Engineering is systematic methodology for analyzing the design for extracting
information of an existing device or system or process, either as an approach to study the design
or as a prerequisite for re-design.

The process often involves disassembling something (a mechanical device, electronic


component, computer program, or biological, chemical, or organic matter) and analysing its
components and workings in detail.

Reverse Engineering, also called as Back Engineering, is the processes of extracting knowledge
or design information from anything man-made and re-producing it or reproducing anything
based on the extracted information. The process often involves disassembling something (a
mechanical device, electronic component, computer program, or biological/chemical/organic
matter) and analysing its components and workings in detail.

Activity 01 - Select Branch Specific artefact/component and Disassemble it

Steps need to follow for Reverse Engineering

1. Select branch specific artefact/component


2. Disassemble it for learning the technical/engineering aspects involved in it
3. Apply Design Thinking approach to find out the Unmet needs of User related to selected
artefact/component
4. Follow phases of Observation, Empathy, Ideation and Product Development by preparing
related canvases/frameworks
5. Modify/redesign the artefact/component to meet Users unmet needs

Activity 02 – User Feedback based refinement and redesign


After Reverse Engineering phase, Students must have to verify their revised concepts of
selected artefact/component with the user before investing their time and efforts further. This
will help students to verify their concepts and help in clarifying the insights that they need for
implementing their idea. Students will again visit the domain/area of their selected
artefact/component for reverse engineering and verify their modification approach taken up in
the PD canvas with the user for functions, features and components.

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 36
DESIGN ENGINEERING-2(A)

Levels of Analysis in RE [Write answers as per Sem-5 Work]


System-Wide Analysis
 Customer Requirements
 Engineering Requirements
 Functional Specifications

 Prediction of Subsystems and Components


Subsystem Dissection Analysis
 Document Disassembly
 Define Subsystems
 Determine Subsystem Functional Specifications
 Determine Subsystem Physical/Mathematical Principles

Individual Component Analysis


 Repeat Dissection Steps to Individual Component
 Define Component Material Selection and Fabrication Process

Suggest Alternative Designs, Systems, Components, and Materials

Chapter:-4

Fast Prototype Model and Design Calculation

4.1 Basic Prototype Model

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 37
DESIGN ENGINEERING-2(A)

In our prototype model we create structure of our topic for specially indicate to any people
actually use of our application and how its work in real life.

The prototype model is nothing but one sample idea of our topic and its show that external
structure of our topic or project. Like example any Computer engineer before its project work
start they create one Algorithm of program.

[ fig : 4.1 ]

Notes:
1. There can be also the same Isp of the routers
2. The speed given to the user is fixed.
3. The range can be increased by using the repeaters.
4.The Routers get paired automatically Through the device which is attached in them.

4.2 Design

4.2.1 Flowchart

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 38
DESIGN ENGINEERING-2(A)

Start

No
Search For the nearby
Device

Yes
Create The Hotspot

Pair With The


Device

Create a hotspot
Repeaters
After Pairing

Verify The No
USSD

Yes

Wrong USSD try


Give The Access
again

Get Info

END

[ fig : 4.2(b) ]

Process Flowchart

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 39
DESIGN ENGINEERING-2(A)

Fig. 4.2.2 [Process Flowchart]

Chapter 5

Implementation Technique & Methodology

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 40
DESIGN ENGINEERING-2(A)

5.1 Software Model

The spiral model combines the idea of iterative development with the systematic, controlled
aspects of the waterfall model. Spiral model is a combination of iterative development process
model and sequential linear development model i.e. waterfall model with very high emphasis
on risk analysis.

[ fig : 5.1 ]

5.2 UML Diagrams [Use either Uml diagram or DFD


diagram as per your project work] Sequence Diagram:

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 41
DESIGN ENGINEERING-2(A)

[ fig : 5.2- Sequence Diagram ]

E-R diagram

The E-R diagram is basically used to represent database system in graphical manner with
overall overview.

Fig. 5.3 [E-R diagram]


DFD Diagram/ UML Diagram
DFD Level 0

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 42
DESIGN ENGINEERING-2(A)

Fig. 5.3.1 [DFD Level 0]


DFD Level 1

Fig. 5.3.2 [DFD Level 1]


5.3 Implementation Technology

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 43
DESIGN ENGINEERING-2(A)

we are implement the product by wireless sensor , we use the sensor in front side which is parallel
with break .sensor works that when driver is overtake the other vehicle on , obviously they increase
their speed and overtake in case of chances of accident is increase. So when user vehicle and other
vehicle are near to collision the our front side auto sensor is start and alert and which is parallel
with break so it is decrease the speed and we can prevent the accident.

Sr. Parameter Type Details/version

1. Front end ASP.NET, HTML  PHP is Open source programming


Language and it has oops concept.
 Visual studio 2010
 HTML is Designing tools

2. Back end DBMS  PHP is Open source programming


Language and it has oops concept.
 PHP version 5.2.1

3. Design CSS  PHP is Open source programming


Language and it has oops concept.
 PHP version 5.2.1

4. Platform Dream weaver,  PHP is Open source programming


wamp server, Language and it has oops concept.
 PHP version 5.2.1

Table. 5.3 [Implementation Technology]

Chapter 6

Simulation and Analysis

6.1 Designing Screenshot

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 44
DESIGN ENGINEERING-2(A)

Login page:

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 45
DESIGN ENGINEERING-2(A)

Fig. 6.1 [Login Page]

Signup Page:

Fig. 6.2 [Signup Page]


Password Retrieve:

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 46
DESIGN ENGINEERING-2(A)

Fig. 6.3 [Password Retrieve]

6.2 Comparison of implementation


Free Wifi Zone New A(WTD) Device
In the free wifi zone the users are connected In this device the user are connected and
And they can use the internet for browsing They have the fix things to access the internet
Any thing. Without graphics.

In free wifi zone the range is less compare to It has vast range and it depends on the routers
The AETD device. Paired each other.

When it gets conjusted with traffic then the In this device the will not face any problem
Users will face the problem of connectivity Because there is more capacity of users to get
Connected.

[ table 6.2 ]

Chapter 7

Conclusion &Future Scope

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 47
DESIGN ENGINEERING-2(A)

Conclusion:

Thus we concluded that from the observation till now we found that the AWTD is
the device which is more useful than the Open Access points .We can replace this technology
and it is also not very costly. This technology is time consuming because to make network vast
and long it is necessary to take a more time.

Future Scope :

In future we are going to work on the hardware device and try to evaluate performance
based on the throughput reliability and efficiency constraints. Once AWDT device comes in
the market for the use of normal people then the users will face less problem compared to the
they are facing right now. They will have the network "Any where, Any Time, Any Device".
The device will give more connectivity than any others.

References :

• Marvell semiconductors USA : http://www.marvell.com/

• Journals of research papers of wifi and all other different devices

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 48
DESIGN ENGINEERING-2(A)

• http://www.techonline.com/electrical-engineers/education-
training/techpapers/4129329/Introduction-to-Wireless-Communication-Systems

• http://en.m.wikipedia.org/wiki/Road.transport
• http://www.roadsafe.com/about/default.aspx
• https://en.wikipedia.org/wiki/Sensor
• http://www.drdobbs.com/embedded-systems/wasp-a-programming-language-
forwireless/228701293
• http://en.wikipedia.org/wiki/Reverse_engineering

• http://www.asme.org/kb/news---articles/articles/computational-methods--
modeling/the-rise-of-reverse-engineering

• http://www.flipkart.com/mobiles?otracker=hp_imgModule_Mobiles
• http://www.amazon.in/gp/goldbox/ref=nav_topnav_deals
• http://www.ebay.in/?aff_source=Google_cpc
• https://www.google.co.in/webhp?sourceid=chrome-
instant&ion=1&espv=2&ie=UTF8#q=google

• http://olx.in/books-sports-hobbies/categories/

• Gear crack propagation path studies guidelines for ultrasafe design by Lewicki, D. G.
(2002), Journal of the American Helicopter Society, 47(1), 64–72.

• “Current/Voltage-Based Detection of Faults in Gears Coupled to Electric otors,” by


Satish Rajagopalan, Thomas G. Habetler, Ronald G. Harley, Tomy Sebastian, and
Bruno Lequesne, IEEE Transactions on industry applications, Vol. 42, No. 6,
November/December 2006

• https://en.wikipedia.org/wiki/Wireless

VIEAT/BE/CE/SEMESTER-V/130940107004 Page 49

S-ar putea să vă placă și