Documente Academic
Documente Profesional
Documente Cultură
Submitted By,
Sr. Name of Student Enrollment No.
1. Munshi samih 161340107030
2. Patoliya mehul 161340107041
3. Jasoliya smit 161340107022
4. Patel niyati 161340107036
5. Devganiya rahul 1613401070
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 1
DESIGN ENGINEERING-2(A)
CERTIFICATE
This is to certify that the Design Engineering report, submitted for the Design Engineering-
2A entitled “Hodspital management ” has been carried out by Munshi
samiha(161340107030),patoliya mehul (161340107041),jasoliya smit(161340107022),patel
niyati (161340107036), devganiya rahul(16134010 )at Computer Engineering Department of
prime Institute of Engineering & Technology, navsari for partial fulfillment of Design
Engineering work for Gujarat Technological University. This Design Engineering work has
been carried out under my supervision and is to my satisfaction.
Place:
Date:
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 2
DESIGN ENGINEERING-2(A)
TABLE OF CONTENTS
Sr Content/ Topics Page
No. no
TITLE PAGE I
CERTIFICATE II
LIST OF FIGURES V
LIST OF TABLES VI
ABSTRACT VII
1. INTRODUCTION 1
1.1 Information 3
1.2 Project Definition 5
1.3 Objective 7
1.4 Purpose 8
2. EVALUATION OF IDEA 9
2.1 Observation Record Sheet (AEIOU) Framework 10
2.2 Literature Review/Prior Art Search 12
2.3 Empathy Mapping Canvas 14
2.4 Ideation Canvas 15
2.5 Product Development Canvas 16
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 3
DESIGN ENGINEERING-2(A)
LIST OF FIGURES
2.1.1 AEIOU-Activity 22
2.1.2 AEIOU-Environment 24
2.1.3 AEIOU-Interactions 26
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 4
DESIGN ENGINEERING-2(A)
2.1.4 AEIOU-Interactions 27
LIST OF TABLES
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 5
DESIGN ENGINEERING-2(A)
Chapter:-1
1. Introduction
1.1 Information
A wireless network is any type of computer network that uses wireless data connections for
connecting network nodes. Wireless networking is a method by which homes,
telecommunications networks and enterprise (business) installations avoid the costly process
of introducing cables into a building, or as a connection between various equipment locations.
Wireless telecommunications networks are generally implemented and administered using
radio communication. This implementation takes place at the physical level (layer) of the OSI
model network structure
Examples of wireless networks include cell phone networks, Wi-Fi local networks
Wireless LAN
Wireless LANs are often used for connecting to local resources and to the Internet.A wireless
local area network (WLAN) links two or more devices over a short distance using a wireless
distribution method, usually providing a connection through an access point for Internet access.
The use of spread-spectrum or OFDM technologies may allow users to move around within a
local coverage area, and still remain connected to the network.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 6
DESIGN ENGINEERING-2(A)
Products using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi brand name.
Fixed wireless technology implements point-to-point links between computers or networks at
two distant locations, often using dedicated microwave or modulated laser light beams over
line of sight paths. It is often used in cities to connect networks in two or more buildings without
installing a wired link.
Wireless MAN
Wireless metropolitan area networks are a type of wireless network that connects several
wireless LANs. WiMAX is a type of Wireless MAN and is described by the IEEE
802.16 standard.
Wireless WAN
Wireless wide area networks are wireless networks that typically cover large areas, such as
between neighboring towns and cities, or city and suburb. These networks can be used to
connect branch offices of business or as a public internet access system. The wireless
connections between access points are usually point to point microwave links using parabolic
dishes on the 2.4 GHz band, rather than omnidirectional antennas used ith smaller networks. A
typical system contains base station gateways, access points and wireless bridging relays. Other
configurations are mesh systems where each access point acts as a relay also. When combined
with renewable energy systems such as photo-voltaic solar panels or wind systems they can be
stand alone systems.
The main objective of making the device is to give end user a usable resource which has more
availability and reliability for anyone & anywhere. This network device can be implemented
and it will be free for end user.
The purpose of the project is to increase the wireless network technology and to give more
facilities to the user. This system will eradicate the waste usage and it will be used in the useful
manner.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 8
DESIGN ENGINEERING-2(A)
Chapter:-2
Evaluation of idea
ACTIVITIES:-.
As it Generally happens that when we are out at street we find the open access points and
we connect to the network but sometimes it occurs that the limitations of the user we cant get
connected and we face some problems. By seeing the problem of limited users and the waste
use we describe the limited following activities that are described in activity canvas.
[ fig : 2.1.1 ]
ENVIRONMENT:-
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 9
DESIGN ENGINEERING-2(A)
The things needed for the conviniency of environment mesh network, geographical location,
Low network condition,etc. Related atmosphere like a city area, monsoon, remote area, etc.
Here the environment of more peoples are needed. and the mesh topology is created.It can also
be used where the network conditions are very low.
[ fig : 2.1.2 ]
INTERACTIONS:-
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 10
DESIGN ENGINEERING-2(A)
The persons , pedestrians , the devices which are used get paired
The Mapping cardinalities are used to make a connection ie. one-to-one, one-to-many, manyto-
one, many-to-many.
[ fig : 2.1.3 ]
OBJECTS:-
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 11
DESIGN ENGINEERING-2(A)
Here to develop this application we used some component like a networking algorithms
and USSD code, Router, mobile,etc.
[ fig : 2.1.4 ]
Users:-
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 12
DESIGN ENGINEERING-2(A)
The users of this device are like pedestrians , businessman ,security professional ,
students , etc are using this device
The student can obtain his/her result or the pedestrian can get the urgent information like
railway enquiry , any emergency news , etc.
[ fig : 2.1.5 ]
Research paper
This section involved the basic information regarding to existing research in our project
definition area. So according to it we referred some literature and research paper for it.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 13
DESIGN ENGINEERING-2(A)
(1) Problem loans and cost efficiency in commercial banks by Ian schemiz, Thomas
pathlt, (Volume 25, Issue 1, November 1989)
This paper addresses a little examined intersection between the problem loan literature and the
bank efficiency literature. We employ Granger-causality techniques to test four hypotheses
regarding the relationships among loan quality, cost efficiency, and bank capital. The data
suggest that problem loans precede reductions in measured cost efficiency; that measured cost
efficiency precedes reductions in problem loans; and the reductions in capital at thinly
capitalized banks precede increases in problem loans. Hence, cost efficiency may be an
important indicator of future problem loans and problem banks. Our results are ambiguous
concerning whether or not researchers should control for problem loans in efficiency
estimation.
(2) Some evidence on the uniqueness of bank loans by Christopher James, (Volume 3,
Issue 1.4, November 2009)
This paper presents evidence that banks provide some special service with their lending activity
that is not available from other lenders. I find evidence that bank borrowers, not CD holders,
bear the cost of reserve requirements on CDs. In addition, I find a positive stock price response
to the announcement of new bank credit agreements that is larger than the stock price response
associated with announcements of private placements or public straight debt offerings. Finally,
I find significantly negative returns for announcements of private placements and straight debt
issues used to repay bank loans.
(3) Problem loans and cost efficiency in commercial banks by Ian schemiz, Thomas
pathlt, (Volume 25, Issue 1, November 1989)
This paper addresses a little examined intersection between the problem loan literature and the
bank efficiency literature. We employ Granger-causality techniques to test four hypotheses
regarding the relationships among loan quality, cost efficiency, and bank capital. The data
suggest that problem loans precede reductions in measured cost efficiency; that measured cost
efficiency precedes reductions in problem loans; and the reductions in capital at thinly
capitalized banks precede increases in problem loans. Hence, cost efficiency may be an
important indicator of future problem loans and problem banks. Our results are ambiguous
concerning whether or not researchers should control for problem loans in efficiency
estimation.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 14
DESIGN ENGINEERING-2(A)
(4) Some evidence on the uniqueness of bank loans by Christopher James, (Volume 3,
Issue 1.4, November 2009)
This paper presents evidence that banks provide some special service with their lending activity
that is not available from other lenders. I find evidence that bank borrowers, not CD holders,
bear the cost of reserve requirements on CDs. In addition, I find a positive stock price response
to the announcement of new bank credit agreements that is larger than the stock price response
associated with announcements of private placements or public straight debt offerings. Finally,
I find significantly negative returns for announcements of private placements and straight debt
issues used to repay bank loans.
This section involved the basic information regarding to existing referenced websites and E
documents in our project definition area. So according to it we referred some literature and
research paper for it.
(1) http://www.flipkart.com
This addresses a little examined intersection between the problem loan literature and the bank
efficiency literature. We employ Granger-causality techniques to test four hypotheses regarding
the relationships among loan quality, cost efficiency, and bank capital. The data suggest that
problem loans precede reductions in measured cost efficiency; that measured cost efficiency
precedes reductions in problem loans; and the reductions in capital at thinly capitalized banks
precede increases in problem loans. Hence, cost efficiency may be an important indicator of
future problem loans and problem banks. Our results are ambiguous concerning whether or not
researchers should control for problem loans in efficiency estimation.
(2) http://www.snapdeal.com
This paper addresses a little examined intersection between the problem loan literature and the
bank efficiency literature. We employ Granger-causality techniques to test four hypotheses
regarding the relationships among loan quality, cost efficiency, and bank capital. The data
suggest that problem loans precede reductions in measured cost efficiency; that measured cost
efficiency precedes reductions in problem loans; and the reductions in capital at thinly
capitalized banks precede increases in problem loans. Hence, cost efficiency may be an
important indicator of future problem loans and problem banks. Our results are ambiguous
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 15
DESIGN ENGINEERING-2(A)
concerning whether or not researchers should control for problem loans in efficiency
estimation.
Technical Aspects:
In this part we will discuss about the devices which we can use in the project. The Wireless
Devices are : WIFI , WI-MAX , Bluetooth , NFC , Zigbee
(Mbps) (Mbps)
/HSPA (3.5G)
Bluetooth Wifi
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 16
DESIGN ENGINEERING-2(A)
Bandwidth
Low ( 800 Kbps ) High (11 Mbps )
Hardware
requirement Bluetooth adaptor on all the devices Wireless adaptors on all the devices of the
connecting with each other network, a wireless router and/or wireless
access points
Cost Low
High
Primary
Devices Mobile phones, mouse, Notebook computers, desktopcomputers,
keyboards,office and industrial automation servers
devices
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 17
DESIGN ENGINEERING-2(A)
Ease of Use Fairly simple to use. Can be used to connect It is more complex and requires
upto seven devices at a time. It is easy to configuration of hardware and software.
switch between devices or find and connect
to any device.
Devices 8 2^16
Extendibility no yes
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 18
DESIGN ENGINEERING-2(A)
Users:
In this stage, we find the various users which are directly or indirectly related example:
Businessman, Administrator, Non-Technical user, Security professional, Detection, etc
[ fig : 2.3.1 ]
Stakeholders:
In this stage, we find the user who will directly or indirectly related to users. For example:
Normal Person, Database Administrator, Security, Government Officials, ISP, Websites.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 19
DESIGN ENGINEERING-2(A)
[ fig : 2.3.2 ]
Activities:
The activities done in the system are having the facilities of sending and recieving email,
find the meaning in the google dictionary, the railway inquiry is done,etc.
[ fig : 2.3.3 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 20
DESIGN ENGINEERING-2(A)
Peoples :
In this stage, we find the various peoples which are directly or indirectly related example:
Businessman, Administrator, Non-Technical user, Security professional, Detection, etc
[ fig : 2.4.1 ]
Activities :
In this section the activities mentioned in emphasizing canvas
[ fig : 2.4.2 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 21
DESIGN ENGINEERING-2(A)
Situation/Context/Location :
[ fig : 2.4.3 ]
Props/Possible Solutions :
The urgent sending and receiving of mail can be done by using this technique. The webnet
is created which will provide the communication interface. The USSD code will be able to help
to access the service the wireless device will provide the bandwidth to the webnet.
[ fig : 2.4.4 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 22
DESIGN ENGINEERING-2(A)
Purposes :
In this stage we will know that what is the purpose of developing the product so as we
can see the purposes to develop system like to increase the communication channel and to
create the user friendly device which will do the activities of user and to stop the time
consuming process. To get the info instantly.
[ fig : 2.5.1 ]
Peoples :
The peoples here are those people who will be using this device
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 23
DESIGN ENGINEERING-2(A)
[ fig : 2.5.2 ]
Product Experience :
The product says about the different products that we have used related to the system .Eg :
[ fig : 2.5.3 ]
Product Functions :
The Functions of the product are providing the Fixed Speed , pairing Between the devices and
mapping between the Wireless device
[ fig : 2.5.4 ]
Product Features:
The features of the product are that the user can access by the help of USSD code and at at time
more users connect compare to wifi. and any device can use this system.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 24
DESIGN ENGINEERING-2(A)
[ fig : 2.5.5 ]
Components:
The components that are required to use the device are Mobile phone, router, Routing
algorithms that are applied on network and the repeaters needed to increase the range of wifi.
[ fig : 2.5.6 ]
Customer Revalidation:
This system will be widely useful for the normal people so customer revalidation is necessary
part of the structure and the device.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 25
DESIGN ENGINEERING-2(A)
[ fig : 2.5.7 ]
Reject/Redesign/Retain:
This part is very necessary because to make the changes according to the conviniency of
the user we have to see the reject, redesign and retain. the first thing is to make a long range
network so as to create the vast communication channel and if one device fails there should be
backup or the pairing faster in the other devices.
[ fig : 2.5.8 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 26
DESIGN ENGINEERING-2(A)
Purpose/Product Concept
The purpose of the device is to make such a system which creates the communication channel
in which the user connects "Any time , Any Where , Any Device ".
Tools/method/theories/process/involved
In this we have the method of creating the network like topologies and network
configurations.The topology which is to be used is the mesh topology.
W3C standard , network connection standard, version . In this sem i have research of in all
this topic for in future develop our application.like the version of network simulator
Software/simulation/skill/mathematic requirement
There are network scanning tools which are to be used in the network scanning the
softwares are like Nmap,netcat,NS-3 simulator
The components are divided into two parts wired network and wireless network the wireless
device that are used are wifi, wimax, zigbee, bluetooth, NFC, etc.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 27
DESIGN ENGINEERING-2(A)
[ fig : 3.1 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 28
DESIGN ENGINEERING-2(A)
3.2 Design Consideration [In All tables Write answers related to your
Project only]
A) Design for Performance safety and Reliability
SR_NO PARAMETERS HOW ITS CONCERN WITH YOUR
PROJECT DEFINATION
[ table 3.2.1 ]
• Ergonomics: An applied science concerned with designing and arranging things people use so
that the people and things interact most efficiently and safely.
[ table 3.2.2 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 29
DESIGN ENGINEERING-2(A)
Design for Assembly is a method of analyzing components and sub-assemblies in order to:
Optimize the assembly process steps Identify part relevance Estimate the cost of assembly .
SR_NO. PARAMETERS HOW ITS CONCERN WITH YOUR PROJECT
DEFINATION
1. Design for manufacture Design regarding to perfect user friendly with
add on functionalities
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 30
DESIGN ENGINEERING-2(A)
Social connectivity
[ table 3.2.4 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 31
DESIGN ENGINEERING-2(A)
The next step is to contemplate combining elements of the situation or problem you‟re facing
so as think up something new. This is in line with the view of many creativity experts that
creativity has to do with combining already existing things in a fresh way.
So join, force together or affiliate two or more elements pertaining to your subject matter and
contemplate routes by which such a combination could possibly take you to a solution.
Some questions:
What ideas or parts can be combined?
Can I combine or recombine its parts‟ purposes? Can I combine or merge it
with other objects?
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 32
DESIGN ENGINEERING-2(A)
Some examples of trigger words for „Combine‟ are: become one, bring together, come
together, conjoin, intermix, link, mingle, package, unite, amalgamate, link, relate, and
commingle.
Think if there‟s a solution for another problem that you may mold to suit your situation.
Some questions:
What else is like it?
Is there something similar to it, but in a different context?
Does the past offer any lessons with similar ideas?
What other ideas does it suggest?
What could I copy, borrow or steal?
Whom could I emulate?
What ideas could I incorporate?
What processes can be adapted?
What different contexts can I put my concept in?
What ideas outside my field can I incorporate?
Pose a question to yourself about which ideas you can produce if you magnify or modify your
situation or problem. Magnifying parts of or the whole of your idea may enhance its perceived
worth or furnish fresh insight pertaining to which components are most significant.
Think about ways to magnify or exaggerate your idea.Magnifying your idea or parts of it may
increase its perceived value or give you new insights about what components are most
important.
Modify questions:
Can you change an aspect of your process or product to enhance it?
Can you think of any ways to modify the shape, feel, appearance, color or form of your
product?
What can you add to change this product?
What can you highlight or emphasize to produce more value?
Magnify questions:
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 33
DESIGN ENGINEERING-2(A)
Contemplate how you can put your current idea to different uses or what could be reused from
elsewhere so as to fix your own problem. Frequently, an idea only turns out to be great when
applied in a different manner than first imagined.
Modify the goal of the subject. Contemplate why it exists, its purpose of use and what it is
assumed to do. Confront all of these suppositions and propose new and strange purposes.
What else can it be used for?
Can it be used by people other than those it was originally intended for?
How would a child use it? An older person?
How would people with different disabilities use it?
Are there new ways to use it in its current shape or form?
Are there other possible uses if it‟s modified?
If I knew nothing about it, would I figure out the purpose of this idea?
Can I use this idea in other markets or industries?
Contemplate what would happen if you eliminated components or elements of your idea or if
you minimized, reduced or simplified aspects of it. By way of repeated elimination or trimming
of ideas, processes and objects, it is possible to steadily constrict your challenge to that function
or part of the most significance.
Some questions:
How can I simplify it?
What parts can be removed without altering its function?
What‟s non-essential or unnecessary?
Can the rules be eliminated?
What if I made it smaller?
What feature can I understate or omit?
Should I split it into different parts?
Can I compact or make it smaller?
Rearrange – Contemplate whether you can do some kind of rearranging whether changing the
sequence, pattern or layout; interchanging components; changing schedule; changing pace; or
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 34
DESIGN ENGINEERING-2(A)
interchanging cause and effect. Contemplate changing the order of processes or other hierarchy
involved.
EXAMPLES
Every bicycle has typically the following components: Pedals, Frame, Chain, Drive Sprocket,
Tires, Handlebars, and Brakes. When the SCAMPER technique would be applied to a bicycle,
the ideas below, for improving it, could be generated:
Let‟s imagine another example, where you want to devise a new kind of pen. By applying the
SCAMPER technique, below is one potential output of new ideas for a new version of pen:
• Substitute – replace nib with knife, ink with iron
• Combine – holding with opening, writing with cutting
• Adapt – use the pen top as a container
• Modify – body can be made flexible
• Put to other uses – utilize for writing on wood
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 35
DESIGN ENGINEERING-2(A)
In addition to its application for generating ideas to improve a product or services, SCAMPER
may also be utilized for things like triggering ideas if you‟re writing a book or plan to write a
blog post, coming up with a number of probable solutions for a current political or social
problem or determining methods to make a marketing campaign better.
Reverse Engineering is systematic methodology for analyzing the design for extracting
information of an existing device or system or process, either as an approach to study the design
or as a prerequisite for re-design.
Reverse Engineering, also called as Back Engineering, is the processes of extracting knowledge
or design information from anything man-made and re-producing it or reproducing anything
based on the extracted information. The process often involves disassembling something (a
mechanical device, electronic component, computer program, or biological/chemical/organic
matter) and analysing its components and workings in detail.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 36
DESIGN ENGINEERING-2(A)
Chapter:-4
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 37
DESIGN ENGINEERING-2(A)
In our prototype model we create structure of our topic for specially indicate to any people
actually use of our application and how its work in real life.
The prototype model is nothing but one sample idea of our topic and its show that external
structure of our topic or project. Like example any Computer engineer before its project work
start they create one Algorithm of program.
[ fig : 4.1 ]
Notes:
1. There can be also the same Isp of the routers
2. The speed given to the user is fixed.
3. The range can be increased by using the repeaters.
4.The Routers get paired automatically Through the device which is attached in them.
4.2 Design
4.2.1 Flowchart
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 38
DESIGN ENGINEERING-2(A)
Start
No
Search For the nearby
Device
Yes
Create The Hotspot
Create a hotspot
Repeaters
After Pairing
Verify The No
USSD
Yes
Get Info
END
[ fig : 4.2(b) ]
Process Flowchart
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 39
DESIGN ENGINEERING-2(A)
Chapter 5
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 40
DESIGN ENGINEERING-2(A)
The spiral model combines the idea of iterative development with the systematic, controlled
aspects of the waterfall model. Spiral model is a combination of iterative development process
model and sequential linear development model i.e. waterfall model with very high emphasis
on risk analysis.
[ fig : 5.1 ]
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 41
DESIGN ENGINEERING-2(A)
E-R diagram
The E-R diagram is basically used to represent database system in graphical manner with
overall overview.
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 42
DESIGN ENGINEERING-2(A)
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 43
DESIGN ENGINEERING-2(A)
we are implement the product by wireless sensor , we use the sensor in front side which is parallel
with break .sensor works that when driver is overtake the other vehicle on , obviously they increase
their speed and overtake in case of chances of accident is increase. So when user vehicle and other
vehicle are near to collision the our front side auto sensor is start and alert and which is parallel
with break so it is decrease the speed and we can prevent the accident.
Chapter 6
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 44
DESIGN ENGINEERING-2(A)
Login page:
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 45
DESIGN ENGINEERING-2(A)
Signup Page:
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 46
DESIGN ENGINEERING-2(A)
In free wifi zone the range is less compare to It has vast range and it depends on the routers
The AETD device. Paired each other.
When it gets conjusted with traffic then the In this device the will not face any problem
Users will face the problem of connectivity Because there is more capacity of users to get
Connected.
[ table 6.2 ]
Chapter 7
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 47
DESIGN ENGINEERING-2(A)
Conclusion:
Thus we concluded that from the observation till now we found that the AWTD is
the device which is more useful than the Open Access points .We can replace this technology
and it is also not very costly. This technology is time consuming because to make network vast
and long it is necessary to take a more time.
Future Scope :
In future we are going to work on the hardware device and try to evaluate performance
based on the throughput reliability and efficiency constraints. Once AWDT device comes in
the market for the use of normal people then the users will face less problem compared to the
they are facing right now. They will have the network "Any where, Any Time, Any Device".
The device will give more connectivity than any others.
References :
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 48
DESIGN ENGINEERING-2(A)
• http://www.techonline.com/electrical-engineers/education-
training/techpapers/4129329/Introduction-to-Wireless-Communication-Systems
• http://en.m.wikipedia.org/wiki/Road.transport
• http://www.roadsafe.com/about/default.aspx
• https://en.wikipedia.org/wiki/Sensor
• http://www.drdobbs.com/embedded-systems/wasp-a-programming-language-
forwireless/228701293
• http://en.wikipedia.org/wiki/Reverse_engineering
• http://www.asme.org/kb/news---articles/articles/computational-methods--
modeling/the-rise-of-reverse-engineering
• http://www.flipkart.com/mobiles?otracker=hp_imgModule_Mobiles
• http://www.amazon.in/gp/goldbox/ref=nav_topnav_deals
• http://www.ebay.in/?aff_source=Google_cpc
• https://www.google.co.in/webhp?sourceid=chrome-
instant&ion=1&espv=2&ie=UTF8#q=google
• http://olx.in/books-sports-hobbies/categories/
• Gear crack propagation path studies guidelines for ultrasafe design by Lewicki, D. G.
(2002), Journal of the American Helicopter Society, 47(1), 64–72.
• https://en.wikipedia.org/wiki/Wireless
VIEAT/BE/CE/SEMESTER-V/130940107004 Page 49