Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Ilovepdf Merged (3) (2)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

BELGAVI, KARNATAKA -590 018

A Seminar Report on
“ZIGBEEE Technology-The Past Present and Future challenges”

Submitted By

Vishwas Prabhu K M 4MH20CS118

8th Semester, B
In
Computer Science and Engineering
Under the Guidance of:

Prof. Sahana B R Prof. Agughasi Victor Ikechukwu


Project Guide Technical Seminar Coordinator
Assistant Professor Assistant Professor
Department of CS&E Department of CS&E
MIT Mysore MIT Mysore

2023-2024
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
MAHARAJA INSTITUTE OF TECHNOLOGY MYSORE
Belawadi, S.R. Patna Taluk, Mandya Dist-571477.
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
MAHARAJA INSTITUTE OF TECHNOLOGY MYSORE

CERTIFICATE

Certified that the seminar work entitled “ZIGBEE Technology the Past Present and

Future challenges” has been presented by Vishwas Prabhu K M(4MH20CS0118) for

the partial fulfillment of Eight Semester in Computer Science & Engineering under

Visvesvaraya Technological University, Belagavi during academic year 2023-24.

It is certified that all corrections/suggestions indicated have been incorporated in the

report. The report has been approved as it satisfies the requirements.

_________________ _________________ _________________


Signature of Guide Signature of Technical Seminar Signature of the HOD

Prof. Sahana B R Coordinator Dr. Shivamurthy R C


Assistant Professor Prof. Agughasi Victor Professor & HOD
Dept. of CS&E Dept. of CS&E
Ikechukwu
MIT Mysore MIT Mysore
Assistant Professor
Dept. of CS&E
MIT Mysore
ACKNOWLEDGEMENT

It is the time to acknowledge all those who have extended their guidance, inspiration,

and their wholehearted co-operation all along our project work.

We are also grateful to Dr. B G Naresh Kumar, principal, MIT Mysore and Dr.

Shivamurthy R C, HOD, CS&E, MIT Mysore for having provided us academic environment

which nurtured our practical skills contributing to the success of our project.

I would like to express our deepest gratitude to our guide, Prof. Sahana B R and

Technical Seminar Coordinator Prof. Agughasi Victor Ikechukwu, for their continuous

guidance and expertise. Their valuable insights and feedback have been instrumental in

shaping the direction and presenting our project work.

We wish to place a deep sense of gratitude to all Teaching and Non-Teaching staffs of

Computer Science and Engineering Department for whole-hearted guidance and constant

support without which Endeavour would not have been possible.

Our gratitude will not be complete without thanking our parents and our friends, who

have been a constant source of support and aspirations.

Vishwas Prabhu K M
3D Object Detection and Currency Recognition for Visually Impaired People

Table of Contents
CHAPTER – 1: INTRODUCTION ............................................................................................................................. 2
CHAPTER – 2: LITERATURE SURVEY ..................................................................................................................... 3
Paper 1: MBDM:Multinational Banknote Detecting Model for Assisting Visually Impaired People [2023] 3
Methodologies ............................................................................................................................................. 3
Advantages .................................................................................................................................................. 4
Disadvantages: ............................................................................................................................................. 4
Paper 2: Object Detection Using Deep Learning, CNNs and Vision Transformers [2023] ................................ 5
Methodologies ............................................................................................................................................. 5
Advantages .................................................................................................................................................. 5
Disadvantages: ............................................................................................................................................. 5
Paper 3: CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People. [2023] .... 6
Methodologies ............................................................................................................................................. 6
Advantages .................................................................................................................................................. 7
Disadvantages: ............................................................................................................................................. 7
CHAPTER – 3: METHODOLOGY ............................................................................................................................ 8
CHAPTER – 4: APPLICATIONS ............................................................................................................................. 10
Advantages .................................................................................................................................................... 11
Disadvantages: ............................................................................................................................................... 12
CHAPTER – 5: CONCLUSION ............................................................................................................................... 14
CHAPTER – 6: REFERENCES ................................................................................................................................ 15
Appendix ............................................................................................................................................................ 16

Dept. of CS&E, MIT Mysore 2023-2024 1


3D Object Detection and Currency Recognition for Visually Impaired People

CHAPTER – 1: INTRODUCTION
Zigbee is a wireless communication technology that's often used for short-range, low-power
applications like home automation, industrial control, and sensor networks. It operates on the
IEEE 802.15.4 standard, defining the physical and data link layers of the OSI model. Here's a
brief introduction to its key aspects:

1. Low Power Consumption: Zigbee devices typically consume very little power, making
them suitable for battery-operated devices that need to operate for long periods
without frequent battery changes.
2. Mesh Networking: Zigbee employs a mesh networking topology, allowing devices to
communicate with each other through intermediary devices, called routers or
coordinators. This enables robust and reliable communication, as messages can be
relayed through multiple nodes if necessary.
3. Low Data Rate: Zigbee is designed for low data rate applications, such as sensor
networks and home automation. Its data rate typically ranges from 20 to 250 kbps,
which is sufficient for transmitting sensor data, control signals, and small messages.
4. Frequency Bands: Zigbee operates in several frequency bands depending on the
region, including 2.4 GHz, 915 MHz, and 868 MHz. The 2.4 GHz band is globally
available and widely used, but it may suffer from interference from other devices like
Wi-Fi and Bluetooth.
5. Security: Zigbee incorporates various security features to protect communication
between devices. These include encryption, authentication, and key management
mechanisms to prevent unauthorized access and data tampering.
6. Application Profiles: Zigbee Alliance defines application profiles, which are
standardized sets of rules and specifications for specific applications. These profiles
ensure interoperability between different Zigbee devices from different manufacturers.
Examples of application profiles include Zigbee Home Automation, Zigbee Light Link,
and Zigbee Smart Energy.
7. Deployment Flexibility: Zigbee can be deployed in various environments, including
homes, commercial buildings, and industrial settings. Its low power consumption, mesh
networking capability, and support for numerous devices make it suitable for diverse
applications.

Dept. of CS&E, MIT Mysore 2023-2024 2


3D Object Detection and Currency Recognition for Visually Impaired People

Dept. of CS&E, MIT Mysore 2023-2024 3


3D Object Detection and Currency Recognition for Visually Impaired People

CHAPTER – 2: LITERATURE SURVEY

Paper 1: Smart Grid Security based ON Blockchain with Industrial Fault Detection Using Wireless
Sensor and Deep learning Techniques [2023]

Authors: Manivala Kandasamy,s.Anto,k. Baranitharan, Ravi Rastogi

Methodologies:

1. Understanding Smart Grid Security Challenges: Begin by comprehensively


identifying and understanding the security challenges faced by smart grids, including
cyber threats, data integrity, privacy concerns, and potential points of vulnerability.
2. Blockchain Technology Exploration: Dive into the fundamentals of blockchain
technology, including its decentralized and immutable nature, cryptographic security,
consensus mechanisms, and smart contracts. Understand how these features can
address the security challenges of smart grids.
3. Integration of Blockchain with Smart Grids: Investigate how blockchain can be
integrated into smart grid infrastructure to enhance security. This involves designing a
blockchain architecture suitable for smart grid applications, considering factors such as
scalability, interoperability, and performance.
4. Wireless Sensor Deployment and Fault Detection: Develop a strategy for deploying
wireless sensors within the industrial infrastructure of the smart grid to monitor various
parameters such as voltage, current, temperature, and equipment status. Implement
algorithms for real-time fault detection and localization based on the data collected
from these sensors.
5. Data Collection and Transmission: Establish protocols for collecting sensor data and
transmitting it securely to the blockchain network. Utilize encryption techniques and
secure communication protocols to prevent data tampering or interception.
6. Blockchain-Based Security Measures: Implement security measures on the
blockchain layer to safeguard critical smart grid data and transactions. This includes
access control mechanisms, cryptographic hashing for data integrity verification, and
consensus algorithms to ensure agreement on the state of the network.
7. Smart Contracts for Automation and Enforcement: Develop smart contracts to
automate various processes within the smart grid infrastructure, such as energy
trading, billing, and grid maintenance. Ensure that these smart contracts enforce
security policies and facilitate secure interactions between different entities in the
ecosystem.
8. Testing and Evaluation: Conduct comprehensive testing and evaluation of the
proposed methodology in a simulated or real-world environment. Assess its
effectiveness in enhancing smart grid security, detecting faults, and ensuring reliable
operation.

Dept. of CS&E, MIT Mysore 2023-2024 4


3D Object Detection and Currency Recognition for Visually Impaired People
9. Performance Optimization and Scalability: Continuously optimize the performance
of the blockchain-based security solution and ensure its scalability to accommodate
the growing demands of the smart grid infrastructure.
10. Continuous Monitoring and Updates: Establish procedures for continuous
monitoring of the smart grid security posture and promptly apply updates or patches
to address emerging threats or vulnerabilities.

Fig1: Blockchain-based smart grid sensor network architecture

Advantages:
• Immutable Security
• Decentralization
• Transparent and Auditable
• Efficient Fault detection

Disadvantages:
• Higher Computational Cost,
• Limited Scale Invariance Performance
• Energy Consumption

Dept. of CS&E, MIT Mysore 2023-2024 5


3D Object Detection and Currency Recognition for Visually Impaired People
Paper 2: A Comprehensive Analysis Evaluating Security Characteristics of Xbee Devices against
Zigbee Protocol [2023]

Authors: Vlad Gavra,Ovidiu A and lonut Dobra

Methodologies:
1. Define Objectives and Scope:
• Clearly define the objectives of the security analysis, such as identifying
vulnerabilities, assessing encryption mechanisms, or evaluating authentication
protocols.
• Define the scope of the analysis, including specific XBee device models and
versions, Zigbee protocol implementations, and targeted attack scenarios.
2. Gather Information:
• Collect technical documentation, datasheets, and specifications of the XBee
devices and Zigbee protocol.
• Review existing research, whitepapers, and security advisories related to XBee
devices and Zigbee protocol vulnerabilities.
3. Threat Modeling:
• Identify potential threats and attack vectors targeting XBee devices and the
Zigbee protocol.
• Consider various threat actors, including hackers, insiders, and malicious
entities.
• Assess the impact of potential security breaches on confidentiality, integrity, and
availability of data and systems.
4. Security Analysis:
• Conduct a thorough analysis of the security features implemented in XBee
devices, including encryption algorithms, authentication mechanisms, and
access controls.
• Evaluate the robustness of Zigbee protocol security features, such as network
key management, packet encryption, and secure joining procedures.
• Assess the effectiveness of security measures against common attack vectors,
including eavesdropping, replay attacks, spoofing, and denial-of-service (DoS)
attacks.
5. Penetration Testing:
• Perform penetration testing to identify vulnerabilities and weaknesses in XBee
devices and Zigbee protocol implementations.
• Utilize automated tools and manual testing techniques to simulate real-world
attack scenarios and assess the resilience of the system against exploitation.
• Verify the effectiveness of security controls, such as firewalls, intrusion
detection/prevention systems (IDS/IPS), and encryption protocols.
6. Risk Assessment:
• Evaluate the identified vulnerabilities and security weaknesses in terms of their
likelihood of exploitation and potential impact on the system.

Dept. of CS&E, MIT Mysore 2023-2024 6


3D Object Detection and Currency Recognition for Visually Impaired People
• Prioritize security risks based on their severity, considering factors such as ease
of exploitation, potential consequences, and likelihood of detection.

7. Mitigation Strategies:
• Develop mitigation strategies and recommendations to address identified
security vulnerabilities and mitigate risks.
• Propose security best practices, configuration guidelines, and software updates
to enhance the overall security posture of XBee devices and Zigbee protocol
implementations.

Fig2: Zigbee Protocol layers

Advantages:
• Low Power Consumption
• Mesh Networking
• Interoperability
• Reliability

Disadvantages:
• Scope Limited Bandwidth
• Limited Data Rate

Dept. of CS&E, MIT Mysore 2023-2024 7


3D Object Detection and Currency Recognition for Visually Impaired People
Paper 3: Mobile agents assisted data collection in wireless sensor network utilizing
Zigbee technology [2023]

Authors: Hoang thuan Tran1,Cuong V.Nguyen2,Nghia Trung Phung2,Minh T.Nguyen3

Methodologies:
Designing a methodology for mobile agents assisted data collection in wireless sensor
networks (WSNs) utilizing Zigbee technology involves several key steps and considerations:

1. Problem Definition: Clearly define the objectives of data collection in the WSN.
Determine what type of data needs to be collected, at what frequency, and for what
purpose. Understand the constraints and requirements of the application.
2. Network Architecture Design: Design the architecture of the WSN, including the
placement of sensor nodes, their communication protocols, and the integration of
Zigbee technology for wireless communication.
3. Mobile Agent Concept: Understand the concept of mobile agents and how they can
be utilized in the WSN for efficient data collection. Mobile agents are autonomous
software entities that can move between nodes, gather data, and perform tasks.
4. Agent Mobility Strategy: Develop a strategy for the movement of mobile agents
within the WSN. Consider factors such as the number of agents, their routes,
scheduling of agent movement, and optimization techniques to minimize energy
consumption and maximize data collection efficiency.
5. Zigbee Communication Protocol: Familiarize yourself with the Zigbee
communication protocol and its features such as low power consumption, low data
rate, and short-range communication. Utilize Zigbee for reliable and energy-efficient
communication between sensor nodes and mobile agents.
6. Data Collection Protocol: Define a protocol for data collection that specifies how
sensor nodes transmit data to mobile agents. Consider issues such as data
aggregation, data fusion, error handling, and security.
7. Energy Management: Implement energy-efficient strategies to manage the energy
consumption of sensor nodes and mobile agents. This includes techniques such as
sleep scheduling, duty cycling, and energy-aware routing algorithms.
8. Fault Tolerance and Reliability: Implement mechanisms to ensure fault tolerance and
reliability in the WSN. This includes techniques such as redundancy, error detection,
and error recovery mechanisms.

Dept. of CS&E, MIT Mysore 2023-2024 8


3D Object Detection and Currency Recognition for Visually Impaired People

Fig3:Data Collection in wireless sensor network utilizing Zigbee technology

Advantages:
• Efficient Data Collection
• Reduced Energy Consumption
• Improved Scalability
• User privacy and security

Disadvantages:
• Complexity
• Latency
• Mobility Management

Dept. of CS&E, MIT Mysore 2023-2024 9


3D Object Detection and Currency Recognition for Visually Impaired People

CHAPTER – 3: METHODOLOGY

1. Requirements Analysis: Understand the requirements of the application or system where


Zigbee technology will be used. Identify the specific needs such as range, data rate, power
consumption, and network topology.
2. Network Planning and Design: Design the Zigbee network architecture based on the
requirements analysis. Determine the layout of Zigbee nodes, including coordinators, routers,
and end devices. Plan the communication paths and network topology to ensure reliable and
efficient communication.
3. Selection of Zigbee Components : Choose Zigbee-compatible hardware components
such as modules, microcontrollers, and antennas based on the application requirements and
network design. Consider factors such as range, power consumption, data rate, and form factor.
4. Configuration of Zigbee Devices: Configure Zigbee devices according to their roles in
the network (coordinator, router, or end device). Set parameters such as PAN ID, channel,
network address, and security settings to establish communication within the Zigbee network.
5. Implementation of Zigbee Communication: Develop firmware or software for
Zigbee-enabled devices to enable communication and data exchange within the network.
Implement Zigbee communication protocols such as Zigbee Pro, Zigbee 3.0, or Zigbee Green
Power depending on the application requirements.
6. Security Implementation: Implement security measures to protect Zigbee communication
from unauthorized access, interception, and tampering. Utilize Zigbee security features such as
AES encryption, link keys, and network keys to ensure data confidentiality and integrity.
7. Power Management: Implement power management techniques to optimize energy
consumption and prolong battery life in Zigbee devices. Utilize low-power sleep modes, duty
cycling, and efficient data transmission strategies to minimize power consumption without
compromising performance.
8. Network Monitoring and Management: Implement monitoring and management
mechanisms to monitor the health and performance of the Zigbee network. Use tools and
protocols such as Zigbee Alliance's Zigbee Network Analyzer (ZNA) or Simple Network
Management Protocol (SNMP) for network monitoring and troubleshooting.
9. Testing and Validation: Conduct thorough testing and validation of the Zigbee network to
ensure proper functionality, reliability, and performance. Test communication range, data
throughput, latency, and power consumption under various operating conditions to validate the
methodology.
10. Deployment and Maintenance: Deploy the Zigbee network in the target environment
and perform initial setup and configuration. Regularly monitor and maintain the network to
address any issues, optimize performance, and ensure long-term reliability.

Dept. of CS&E, MIT Mysore 2023-2024 10


3D Object Detection and Currency Recognition for Visually Impaired People

Fig4:Zigbee technology

Dept. of CS&E, MIT Mysore 2023-2024 11


3D Object Detection and Currency Recognition for Visually Impaired People

CHAPTER – 4: APPLICATIONS
Zigbee technology finds applications across various industries and domains due to its low-power, low-
cost, and reliable wireless communication capabilities. Here are some common applications:

1. Home Automation: Zigbee is widely used in home automation systems for controlling
lights, thermostats, door locks, and other smart devices. It enables wireless communication
between sensors, actuators, and central control units, allowing users to remotely monitor and
control their home environment.

2. Industrial Automation: In industrial settings, Zigbee is used for wireless sensor networks
(WSNs) to monitor environmental conditions, track assets, and automate processes. It enables
real-time data collection, remote monitoring, and predictive maintenance in industrial
automation systems.

3. Healthcare Monitoring: Zigbee-based wearable devices and medical sensors are used for
remote patient monitoring, health tracking, and telemedicine applications. These devices can
monitor vital signs, activity levels, and medication adherence, providing valuable insights to
healthcare providers and improving patient outcomes.

4. Smart Agriculture: Zigbee technology is utilized in precision agriculture systems for


monitoring soil moisture, temperature, humidity, and other environmental parameters. Wireless
sensor networks deployed in fields enable farmers to optimize irrigation, fertilization, and crop
management practices, leading to increased crop yields and resource efficiency.

5. Asset Tracking : Zigbee-based asset tracking systems are used to monitor the location and
movement of assets such as vehicles, equipment, and inventory in warehouses, logistics
centers, and manufacturing facilities. These systems provide real-time visibility into asset
locations, streamline operations, and improve inventory management.

6. Building Automation: Zigbee is employed in building automation systems for energy


management, lighting control, HVAC (heating, ventilation, and air conditioning) optimization,
and occupancy sensing. It enables efficient utilization of resources, reduces energy
consumption, and enhances occupant comfort and safety in commercial and residential
buildings.

7. Smart Metering: Zigbee-enabled smart meters are deployed by utility companies for
remote monitoring and management of electricity, water, and gas consumption. These meters
enable automated meter reading, real-time billing, and demand response programs, empowering
consumers to track their energy usage and reduce costs.

8. Environmental Monitoring: Zigbee-based sensor networks are used for environmental


monitoring applications such as air quality monitoring, water quality monitoring, and wildlife
tracking. These networks enable scientists, researchers, and environmental agencies to collect
data on environmental parameters and study ecosystem dynamics.

Dept. of CS&E, MIT Mysore 2023-2024 12


3D Object Detection and Currency Recognition for Visually Impaired People

9. Retail Analytics : In retail environments, Zigbee technology is used for shopper tracking,
inventory management, and customer engagement. Zigbee-enabled beacons and sensors
deployed in stores capture shopper behavior data, optimize product placement, and deliver
personalized shopping experiences through location-based services

10. Smart Cities : Zigbee plays a crucial role in smart city initiatives by enabling IoT solutions
for traffic management, parking optimization, waste management, public safety, and
environmental sustainability. Zigbee-based sensor networks deployed throughout the city
infrastructure facilitate data-driven decision-making and improve the quality of urban life.

Additional Advantages:

1. Frequency Band Flexibility: Zigbee operates in the 2.4 GHz ISM band, which is globally
available and license-free, ensuring compatibility and regulatory compliance across
regions. Additionally, Zigbee supports regional variants in other frequency bands,
providing flexibility for deployment in specific geographic areas and avoiding interference
with other wireless technologies. This frequency band flexibility enables manufacturers to
target diverse markets with a single product design, streamlining development and
reducing time-to-market.
2. Support for Various Topologies: Zigbee supports different network topologies,
including star, mesh, and cluster tree configurations, allowing designers to tailor the
network architecture to specific application requirements. Each topology offers unique
advantages in terms of scalability, range, and reliability, allowing developers to optimize
performance and efficiency based on the deployment environment. Whether deploying a
small-scale smart home system or a large-scale industrial IoT network, Zigbee's support for
various topologies ensures flexibility and adaptability to diverse use cases.

Disadvantages:

Technical Limitations:

1.Compatibility and Standardization Issues: While Zigbee is based on open standards


developed by the Zigbee Alliance, interoperability between Zigbee devices from different
manufacturers may still be a concern. Variations in implementation, firmware versions, and
optional features can lead to compatibility issues and interoperability challenges. Ensuring
seamless integration and compatibility between Zigbee devices may require additional testing
and certification efforts.
2.Security Concerns: While Zigbee incorporates security features such as encryption and
authentication, vulnerabilities and security flaws may still exist, posing risks to Zigbee
networks and connected devices. Weaknesses in encryption algorithms, improper key
management, or insufficient security practices can expose Zigbee networks to unauthorized

Dept. of CS&E, MIT Mysore 2023-2024 13


3D Object Detection and Currency Recognition for Visually Impaired People
access, data breaches, and cyber attacks. Ensuring robust security measures and regularly
updating firmware are essential for mitigating security risks in Zigbee deployments.
3. Limited Market Adoption in Some Areas: While Zigbee technology is widely used in
certain industries and applications, its market adoption may be limited in others.
Competition from alternative wireless technologies, differences in regional regulations, and
varying market preferences can impact the adoption of Zigbee technology in different
regions and sectors. Additionally, the proliferation of competing standards and proprietary
solutions may hinder the widespread adoption of Zigbee in certain markets..

Cost and Accessibility:

1.Cost of Zigbee Hardware: The cost of Zigbee hardware components, such as


microcontrollers, transceivers, and development kits, has decreased over time due to
advancements in semiconductor manufacturing and increased competition among
component suppliers. Additionally, economies of scale resulting from the growing adoption
of Zigbee technology have further contributed to cost reductions. As a result, Zigbee
hardware is now more affordable and accessible to manufacturers, developers, and
consumers alike.
2.Accessibility of Zigbee Modules and Development Tools: Zigbee modules, development kits,
and software tools are readily available from various suppliers and distributors, making it
easier for developers to prototype, test, and deploy Zigbee-enabled products. The availability
of off-the-shelf Zigbee modules and reference designs simplifies the development process
and reduces time-to-market for IoT solutions leveraging Zigbee technology. Additionally,
open-source Zigbee stacks and development platforms contribute to the accessibility of
Zigbee technology by providing developers with free, community-driven resources for
building Zigbee-based applications.
3.Integration into Consumer Products: Zigbee technology is increasingly being integrated into
a wide range of consumer products, including smart home devices, wearable gadgets, and
home appliances. The proliferation of Zigbee-enabled products from leading brands and
manufacturers enhances accessibility for consumers seeking interoperable smart home
solutions. With the rise of smart home ecosystems and platforms supporting Zigbee
connectivity, consumers have more choices and flexibility when building and expanding their
connected homes.
4.Affordable Smart Home Solutions: Zigbee's low-cost hardware components and
energy-efficient design make it an attractive option for affordable smart home solutions.
Entry-level Zigbee devices such as sensors, smart plugs, and light bulbs are competitively
priced compared to other wireless technologies, offering consumers cost-effective options for
automating and monitoring their homes. As the smart home market continues to grow and
mature, Zigbee technology plays a vital role in democratizing access to IoT-enabled devices
and services.
5.Industrial and Commercial Applications: In industrial and commercial settings,
Zigbee technology offers cost-effective solutions for building automation, asset tracking, and
environmental monitoring. Zigbee's scalability, reliability, and low power consumption make it
well-suited for deploying large-scale IoT networks in warehouses, manufacturing facilities,
and office buildings.

Dept. of CS&E, MIT Mysore 2023-2024 14


3D Object Detection and Currency Recognition for Visually Impaired People

Dept. of CS&E, MIT Mysore 2023-2024 15


3D Object Detection and Currency Recognition for Visually Impaired People

Other Considerations:

1.Network Range and Coverage: While Zigbee's mesh networking capability enhances
coverage and reliability, the effective range of a Zigbee network depends on factors such as
transmit power, antenna design
2.Interference and Coexistence: Zigbee operates in the crowded 2.4 GHz ISM band, which is
shared with other wireless technologies like Wi-Fi and Bluetooth. Coexistence with these
technologies can lead to interference issues, affecting Zigbee network performance.
• .

Social and Environmental Challenges:

1. E-Waste: As with any electronic device, Zigbee-enabled products contribute to


electronic waste (e-waste) when they reach the end of their lifecycle. Improper disposal
of e-waste can lead to environmental pollution and health hazards due to the presence
of hazardous materials such as lead, mercury, and brominated flame retardants in
electronic components.
2. Resource Consumption: The production and operation of Zigbee-enabled devices
consume natural resources such as energy, water, and raw materials. Manufacturing
processes

Dept. of CS&E, MIT Mysore 2023-2024 16


3D Object Detection and Currency Recognition for Visually Impaired People

CHAPTER – 5: CONCLUSION

In conclusion, Zigbee technology represents a versatile and cost-effective solution for wireless
connectivity in the Internet of Things (IoT) era. With its low power consumption, mesh networking
capability, and support for interoperability, Zigbee has emerged as a leading standard for diverse
applications ranging from smart homes and industrial automation to healthcare and environmental
monitoring.

Despite its numerous advantages, Zigbee technology is not without its challenges. Social and
environmental considerations, including e-waste generation, resource consumption, and digital divide
concerns, highlight the importance of sustainable and equitable deployment of Zigbee-enabled
solutions. Addressing these challenges requires collaboration among stakeholders to promote
responsible innovation, inclusive access to technology, and environmentally conscious practices
throughout the product lifecycle.

By leveraging the strengths of Zigbee technology while mitigating its limitations and impacts, we can
unlock its full potential to create connected, efficient, and sustainable ecosystems that improve quality
of life and address societal challenges. Through continued innovation, standardization, and stakeholder
engagement, Zigbee technology will play a vital role in shaping the future of wireless communication
and enabling the next generation of IoT applications.

Dept. of CS&E, MIT Mysore 2023-2024 17


3D Object Detection and Currency Recognition for Visually Impaired People

CHAPTER – 6: REFERENCES

[1] C. Park and K. R. Park, "MBDM: Multinational Banknote Detecting Model for Assisting
Visually Impaired People," Mathematics, vol. 11, no. 6, p. 1392, Mar. 2023.
[2] B. Amjoud and M. Amrouch, "Object Detection Using Deep Learning, CNNs and Vision
Transformers: A Review"
[3] F. Ashiq et al., "CNN-Based Object Recognition and Tracking System to Assist Visually
Impaired People"
[4] J. Bai, S. Lian, Z. Liu, K. Wang, and D. Liu, "Virtual-Blind-Road Following-Based Wearable
Navigation Device for Blind People," IEEE Transactions on Consumer Electronics, vol. 64,
no. 1, pp. 136-143, Feb. 2018.
[5] M. A. Rahman and M. S. Sadi, "IoT Enabled Automated Object Recognition for the Visually
Impaired," Comput. Methods Programs Biomed. Update, vol. 1, p. 100015, 2021.
[6] D. R. Kumar, H. K. Thakkar, S. Merugu, V. K. Gunjan, and S. K. Gupta, "Object Detection
System for Visually Impaired Persons Using Smartphone," in ICDSMLA 2020, Lecture Notes
in Electrical Engineering, vol. 783, pp. 1631-1642, 2022.
[7] Faudzi, M., A. Ghapar, A., Abdul Rahim, F., & Amira Nor Hisham, Z. (2020). A Systematic
Literature Review of the Mobile Application for Object Recognition for Visually Impaired
People. In 2020 8th International Conference on Information Technology and Multimedia
(ICIMU) (pp. 316-322). IEEE.
[8] P. Kasture, A. Kumkar, Y. Jagtap, A. Tangade, and A. Pole, "A Survey on 'Object Detection
Algorithms for Visually Impaired People'," Int. J. Adv. Res. Sci. Commun. Technol., vol. 3,
no. 2, pp. 62–66, Mar. 2021.

Dept. of CS&E, MIT Mysore 2023-2024 18


3D Object Detection and Currency Recognition for Visually Impaired People

Appendix

Dept. of CS&E, MIT Mysore 2023-2024 19


3D Object Detection and Currency Recognition for Visually Impaired People

Dept. of CS&E, MIT Mysore 2023-2024 20

You might also like