Nothing Special   »   [go: up one dir, main page]

Intelligent Technologies For Sensors: Applications, Design, and Optimization For A Smart World 1st Edition S. Kannadhasan (Editor)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

Intelligent Technologies for Sensors:

Applications, Design, and Optimization


for a Smart World 1st Edition S.
Kannadhasan (Editor)
Visit to download the full and correct content document:
https://ebookmeta.com/product/intelligent-technologies-for-sensors-applications-desig
n-and-optimization-for-a-smart-world-1st-edition-s-kannadhasan-editor/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Machine Learning and IoT for Intelligent Systems and


Smart Applications 1st Edition

https://ebookmeta.com/product/machine-learning-and-iot-for-
intelligent-systems-and-smart-applications-1st-edition/

Wearable technologies for sweat rate and conductivity


sensors design and principles design and principles 1st
Edition Pietro Salvo

https://ebookmeta.com/product/wearable-technologies-for-sweat-
rate-and-conductivity-sensors-design-and-principles-design-and-
principles-1st-edition-pietro-salvo/

Technologies for Solar Thermal Energy: Theory, Design


and, Optimization 1st Edition Md Hasanuzzaman (Editor)

https://ebookmeta.com/product/technologies-for-solar-thermal-
energy-theory-design-and-optimization-1st-edition-md-
hasanuzzaman-editor/

Mobile Applications Design Development and Optimization


Tejinder S. Randhawa

https://ebookmeta.com/product/mobile-applications-design-
development-and-optimization-tejinder-s-randhawa/
AI Aided IoT Technologies and Applications for Smart
Business and Production Alex Khang

https://ebookmeta.com/product/ai-aided-iot-technologies-and-
applications-for-smart-business-and-production-alex-khang/

Smart CMOS Image Sensors and Applications 2nd Edition


Jun Ohta

https://ebookmeta.com/product/smart-cmos-image-sensors-and-
applications-2nd-edition-jun-ohta/

Machine Learning and Optimization for Engineering


Design 1st Edition Apoorva S. Shastri

https://ebookmeta.com/product/machine-learning-and-optimization-
for-engineering-design-1st-edition-apoorva-s-shastri/

Cambridge IGCSE and O Level History Workbook 2C - Depth


Study: the United States, 1919-41 2nd Edition Benjamin
Harrison

https://ebookmeta.com/product/cambridge-igcse-and-o-level-
history-workbook-2c-depth-study-the-united-states-1919-41-2nd-
edition-benjamin-harrison/

Artificial Intelligence Machine Learning and


Optimization Tools for Smart Cities Designing for
Sustainability Springer Optimization and Its
Applications 186 Panos M Pardalos Stamatina Th Rassia
Arsenios Tsokas
https://ebookmeta.com/product/artificial-intelligence-machine-
learning-and-optimization-tools-for-smart-cities-designing-for-
sustainability-springer-optimization-and-its-
INTELLIGENT TECHNOLOGIES
FOR SENSORS
Applications, Design, and Optimization
for a Smart World
INTELLIGENT TECHNOLOGIES
FOR SENSORS
Applications, Design, and Optimization
for a Smart World

Edited by
S. Kannadhasan
R. Nagarajan
Alagar Karthick
First edition published 2023
Apple Academic Press Inc. CRC Press
1265 Goldenrod Circle, NE, 6000 Broken Sound Parkway NW,
Palm Bay, FL 32905 USA Suite 300, Boca Raton, FL 33487-2742 USA
760 Laurentian Drive, Unit 19, 4 Park Square, Milton Park,
Burlington, ON L7N 0A4, CANADA Abingdon, Oxon, OX14 4RN UK

© 2023 by Apple Academic Press, Inc.


Apple Academic Press exclusively co-publishes with CRC Press, an imprint of Taylor & Francis Group, LLC
Reasonable efforts have been made to publish reliable data and information, but the authors, editors, and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors, editors, and publishers have attempted
to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to
publish in this form has not been obtained. If any copyright material has not been acknowledged, please write and let us know so
we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any
form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and
recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright
Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC
please contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification
and explanation without intent to infringe.

Library and Archives Canada Cataloguing in Publication


Title: Intelligent technologies for sensors : applications, design, and optimization for a smart world / edited by S. Kannadhasan,
R. Nagarajan, Alagar Karthick.
Names: Kannadhasan, S., editor. | Nagarajan, R. (Control engineer), editor. | Karthick, Alagar editor.
Description: First edition. | Includes bibliographical references and index.
Identifiers: Canadiana (print) 20220481946 | Canadiana (ebook) 20220481997 | ISBN 9781774911853 (hardcover) |
ISBN 9781774911860 (softcover) | ISBN 9781003314851 (ebook)
Subjects: LCSH: Intelligent sensors. | LCSH: Detectors.
Classification: LCC TK7871.676 .I58 2023 | DDC 681/.2—dc23
Library of Congress Cataloging-in-Publication Data

CIP data on file with US Library of Congress

ISBN: 978-1-77491-185-3 (hbk)


ISBN: 978-1-77491-186-0 (pbk)
ISBN: 978-1-00331-485-1 (ebk)
About the Editors

S. Kannadhasan is working as an Assistant Professor


in the Department of Electronics and Communication
Engineering at Study World College of Engineering,
Coimbatore, Tamil Nadu, India. He has 12 years of teaching
and research experience. He has completed his PhD in the
field of Smart Antenna at Anna University in 2022. He
earned his BE in ECE at Sethu Institute of Technology,
Kariapatti, in 2009 and ME in Communication Systems
at Velammal College of Engineering and Technology, Madurai in 2013. He
earned his MBA in Human Resources Management at Tamil Nadu Open
University, Chennai. India. He has published around 45 papers in reputed
indexed international journals indexed by SCI, Scopus, Web of Science, and
other major indexing services, and he has presented/published more than 146
papers in national and international journals and conferences. In addition, he has
contributed a book chapter. He also serves as a board member, reviewer, speaker,
session chair, advisory and technical committee member of various colleges and
conferences. He has attended various workshops, seminars, conferences, faculty
development programs, short-term training programs, and online courses.
His areas of interest are smart antennas, digital signal processing, wireless
communication, wireless networks, embedded systems, network security,
optical communication, microwave antennas, electromagnetic compatibility
and interference, wireless sensor networks, digital image processing, satellite
communication, cognitive radio design, and soft computing techniques. He is a
member of IEEE, ISTE, IEI, IETE, CSI, IAENG, SEEE, IEAE, INSC, IARDO,
ISRPM, IACSIT, ICSES, SPG, SDIWC, IJSPR, and EAI Community.

R. Nagarajan is currently working as Professor of


Electrical and Electronics Engineering at Gnanamani
College of Technology, Namakkal, Tamil Nadu, India.
He has published more than 70 papers in interna­
tional journals and conferences. He has also worked
in industry as an electrical engineer. His research
interest includes power electronics, power system,
communication engineering, network security, soft
vi About the Editors

computing techniques, cloud computing, big data analysis, and renewable


energy sources. Dr. Nagarajan received his BE in Electrical and Electronics
Engineering from Madurai Kamarajar University, Madurai, India, in 1997.
He received his ME in Power Electronics and Drives from Anna University,
Chennai, India, in 2008. He received his PhD in Electrical Engineering from
Anna University, Chennai, India, in 2014.

Alagar Karthick is working as Associate Professor in


the Electrical and Electronics Engineering Depart­
ment in KPR Institute of Engineering and Technology,
Coimbatore, Tamil Nadu, India. He has published more
than 30 international journals and is also reviewer for
various journals, such as Solar Energy, Fuel, Journal
of Cleaner Production, Heliyon, and Building Services
Engineering Research and Technology. He received
his Doctor of Philosophy in the field of Building Integrated Photovoltaic
(BIPV) from Anna University, Chennai in 2018. He received a master’s
degree in Energy Engineering and bachelor ’s degree in Electrical and
Electronics Engineering. He has received best paper awards for his research
articles on biomass conversion. His research area includes solar photovoltaic,
bioenergy, zero energy buildings, energy with artificial intelligence, machine
learning, and deep learning algorithms.
Contents

Contributors.............................................................................................................xi
Abbreviations ........................................................................................................ xvii
Preface ................................................................................................................... xxi

PART I: Applications of Intelligent Technologies for Sensors ............................1


1. Product Details Identification for Visually Impaired Persons ....................3
M. Suganthi and K. Pandi Selvi

2. IoT-Based Teaching Assistant System for Smart Classrooms...................13


Manoj Kumar Sahoo, Sudhir Ranjan Pattanaik, Yashwardhan Kumar,
S. Sovan Kumar, Monik Raj Sahu, Sai Swarup Patnaik, and Sanjana Mahapatra

3. Legendre Neural Network Method for Solving Nonlinear


Singular Systems ...........................................................................................25
Murugesh Veerasamy, Subash Chandra Bose Jaganathan, Chandramohan Dhasarathan,
Azath Mubarakali, Velmani Ramasamy, R. Kalpana, and Ninoslav Marina

4. Characterization of Syzygium cumini Particulates-Filled


Epoxy Composites.........................................................................................39
C. Balaji Ayyanar, K. Marimuthu, and B. Gayathri

5. HCI: Designing a Smart Tool for Analyzing Human Brain


Signals and Operating Smart Home Devices..............................................45
M. Tamilselvi, R. Geetha, Anitha G., J. A. Dhanraj, and V. Mohanavel

6. Internet of Things Enabled Energy-Efficient Flying Robots for


Agricultural Field Monitoring Using Smart Sensors ................................59
M. Tamilselvi, T. Manimegalai, G. Ramkumar, S. A. Shifani, and V. Mohanavel

7. Medical Devices and Sensor Application ....................................................75


Apoorva Joshi, Ambrish Kumar Sharma, Karuna Nidhi Pandagre, and Sanjeev Gour

8. IoT-Based Smart Security and Home Automation System .......................89


M. Suresh, Sandipan Mallik, Yashwardhan Kumar, Obbinti Sankar Rao,
Madhvi Singh, Deepika Adhikary, Sai Swarup Patnaik, and Monik Raj Sahu
viii Contents

PART II: Design of Intelligent Technologies for Sensors ....................103

9. Design and Development of Web-Based ECG Signal


Monitoring and Vital Parameters Measurement .....................................105
W. S. Nimi, P. Subha Hency Jose, and R. Jegan

10. Efficient Internet of Things Enabled Smart Healthcare


Monitoring System Using RFID Security Scheme...................................125
Anitha G, G. Ramkumar, R. Thandaiah Prabu, S. Ramesh,
V. Mohanavel, and Alagar Karthick

11. Modeling of an Active Voltage Doubler: Resonant DC–DC


Converter for Wide Range DC Drive Applications..................................145
R. Banupriya, J. Manjushree Kumari, and L. Suganya

12. Future Prospects of Electronic Skin..........................................................163


B. Leelamani and V. V. R. Raman

13. A Low-Cost Advanced Device for the Detection of


Pesticides with NDVI Method ..................................................................... 181
S. Sovan Kumar, D. Panda, R. R. Padhi, V. R. K. Patro, S. R. Dash,
Kanishk Kashyap, T. K. Giri, D. Mishra, and Sandipan Mallik

14. IoT-Based Traffic and Router Management System for Drivers............199


Manoj Kumar Sahoo, Ashish Kumar Dash, Swadhin Kumar Senapati,
Bora Pavani, P. Deepak, Swastid Dash, and G. Akshaykumar

15. Intelligent Big Data Analytics: A Perspective for


Online Education System ...........................................................................213
Manoj Kumar Sahoo, Bhabani Sankar Gouda, Priyanka Pratihari,
Anand Kumar Satapathy, Shyam Sundar Pradhan, and Sonalika Nayak

16. Automatic Fault Detection, Locating, and Monitoring in


Distribution Lines Using LabVIEW..........................................................231
Kunjabihari Swain, Sandipan Mallik, Kanishk Kashyap,
Sumanjit Pattanayak, and Arpita Bebarta

PART III: Optimization of Intelligent Technologies for Sensors........251

17. Performance Analysis of Clustered Routing Protocol for Wearable


Sensor Devices in an IoT-Based WBAN Environment ............................253
J. Vijitha Ananthi and P. Subha Hency Jose
Contents ix

18. Recent Trends in Wearable Sensor Technology for


E-Health Monitoring ..................................................................................271
Renjith V. S. and P. Subha Hency Jose

19. Design and Simulation of Cantilever Structured Flexible


Polymer-Based Piezoelectric Pressure Sensors for
Biomedical Applications .............................................................................289
Lokesh Singh Panwar and Varij Panwar

20. Design and Optimization of Low-Cost RF Energy-Harvesting


Circuit ..........................................................................................................305
Pradeep Chindhi, H. P. Rajani, Geeta Kalkhambkar, and Rajashri Khanai

21. The Future Network 2030: A Simplified Intelligent


Transportation System ...............................................................................315
Velmani Ramasamy and Mădălin-Dorin Pop

22. The Future of Web Crowdfunding: An Ethereum


Blockchain Approach..................................................................................337
Subash Chandra Bose Jaganathan, Murugesh Veerasamy, Azath Mubarakali,
Chandramohan Dhasarathan, Velmani Ramasamy, R. Kalpana, and Ninoslav Marina

Index .....................................................................................................................373
Contributors

Deepika Adhikary
Department of Electronics and Communication Engineering, NIST (Autonomous),
Berhampur, Odisha, 761008, India

G. Akshaykumar
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India

Anitha G.
Department of Electronics and Communication Engineering, Saveetha School of Engineering,
Saveetha Institute of Medical and Technical Sciences (SIMATS), Chennai 602105, Tamil Nadu, India;
E-mail: anipsg09@gmail.com

J. Vijitha Ananthi
Department of Biomedical Engineering, Karunya Institute of Technology and Sciences, Coimbatore,
India; E-mail: vijithaananthi@karunya.edu.in, vijithaananthij@gmail.com

C. Balaji Ayyanar
Department of Mechanical Engineering, Coimbatore Institute of Technology, Coimbatore 60014,
Tamil Nadu, India; E-mail: balajiayyanar2007@gmail.com
R. Banupriya
Department of Electrical and Electronics Engineering, PGP College of Engineering & Technology,
Namakkal, Tamil Nadu, India; E-mail: priyarangasamy85@gmail.com
Arpita Bebarta
Department of Electronics and Communication Engineering, National Institute of Science and Technology,
Berhampur 761008, Odisha, India

Pradeep Chindhi
Department of Electrical Engineering, SGMCOE, Mahagaon 416503, Maharashtra, India;
E-mail: pradeepchindhi.4003@gmail.com

Ashish Kumar Dash


Department of School of Computer Science and Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India

Swastid Dash
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India

S. R. Dash
Department of Electronics Communication Engineering, NIST (Autonomous) Berhampur,
Berhampur 760010, Odisha, India

P. Deepak
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India
xii Contributors

J. A. Dhanraj
Centre for Automation and Robotics (ANRO), Department of Mechanical Engineering,
Hindustan Institute of Technology and Science, Padur, Chennai 603103, Tamil Nadu, India

Chandramohan Dhasarathan
Computer Science and Engineering Department, Thapar Institute of Engineering and Technology,
Patiala, Punjab, India
B. Gayathri
Department of Chemistry, Coimbatore Institute of Technology, Coimbatore 60014, Tamil Nadu, India

R. Geetha
Department of Information Technology, Saveetha School of Engineering, Saveetha Institute of Medical
and Technical Sciences (SIMATS), Chennai 602105, Tamil Nadu, India
T. K. Giri
Department of Electronics Communication Engineering, NIST (Autonomous) Berhampur,
Berhampur 760010, Odisha, India

Bhabani Sankar Gouda


Department of Computer Science and Engineering, NIST (Autonomous), Berhampur 760010, Odisha,
India

Sanjeev Gour
Department of Computer Science, Career College Bhopal, MP, India

Subash Chandra Bose Jaganathan


School of Computing Science and Engineering, VIT Bhopal University, Sehore, MP, India

R. Jegan
Department of Biomedical Engineering, Karunya Institute of Technology and Sciences,
Coimbatore 641114, India
P. Subha Hency Jose
Department of Biomedical Engineering, Karunya Institute of Technology and Sciences,
Coimbatore 641114, India

Apoorva Joshi
Department of Computer Science, Career College Bhopal, MP, India; E-mail: apoorvajoshi16@gmail.com

S. Kannadhasan
Department of Electronics and Communication Engineering, Cheran College of Engineering, Karur,
Tamilnadu, India; email: kannadhasan.ece@gmail.com

Alagar Karthick
Electrical and Electronics Engineering Department, KPR Institute of Engineering and Technology,
Coimbatore, Tamilnadu, India; email: Karthick.power@gmail.com

Kanishk Kashyap
Department of Electrical and Electronics Engineering, National Institute of Science and Technology,
Berhampur 761008, Odisha, India

Geeta Kalkhambkar
Department of Electronics and Telecommunication Engineering, SGMCOE, Mahagaon, Maharashtra, India

R. Kalpana
Dept. of Computer Science and Engineering, Madanapalle Institute of Technology and Science,
Angallu, Andhra Pradesh, India
Contributors xiii

Alagar Karthick
Department of Electrical and Electronics Engineering, KPR Institute of Engineering and Technology,
Coimbatore 641024, Tamil Nadu, India

Rajashri Khanai
Department of Electronics and Communication Engineering, KLE’S Dr. MSSCET, Belgaum,
Karnataka, India
S. Sovan Kumar
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur,
Odisha 760010, India

Yashwardhan Kumar
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur,
Odisha 760010, India

J. Manjushree Kumari
Department of Electrical and Electronics Engineering, Gnanamani College of Technology, Namakkal,
Tamil Nadu, India
B. Leelamani
Department of Biotechnology, Aurora’s Degree and PG College, Chikkadpally, Hyderabad, Telangana,
India
Sanjana Mahapatra
Department of Computer Science and Engineering, NIST (Autonomous), Berhampur, Odisha 760010, India

T. Manimegalai
Department of CSE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences
(SIMATS), Saveetha University, Chennai 600124, Tamil Nadu, India
Sandipan Mallik
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur,
Odisha, 761008, India; E-mail: sandi.iitkgp@gmail.com; sandipan@nist.edu
K. Marimuthu
Department of Mechanical Engineering, Coimbatore Institute of Technology, Coimbatore 60014,
Tamil Nadu, India

Ninoslav Marina
University of Information Science and Technology, “St. Paul the Apostle” Ohrid, North Macedonia

D. Mishra
Department of Computer science and Engineering, NIST (Autonomous) Berhampur,
Berhampur 760010, Odisha, India

V. Mohanavel
Centre for Materials Engineering and Regenerative Medicine, Bharath Institute of Higher Education and
Research, Chennai 600073, Tamil Nadu, India

Azath Mubarakali
College of Computer Science, Department of CNE, King Khalid University, Abha, Saudi Arabia

R. Nagarajan
Department of Electrical and Electronics Engineering, Gnanamani College of Technology,
A. K. Samuthiram, Namakkal, Tamilnadu, India; email: krrajan71@gmail.com
xiv Contributors

Sonalika Nayak
Department of Electronics Communication Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India

W. S. Nimi
Department of Biomedical Engineering, Karunya Institute of Technology and Sciences,
Coimbatore 641114, India; E-mail: nimiwsrec@gmail.com
R. R. Padhi
Department of Electronics Communication Engineering, NIST (Autonomous) Berhampur,
Berhampur 760010, Odisha, India

D. Panda
Department of Electronics Communication Engineering, NIST (Autonomous) Berhampur,
Berhampur 760010, Odisha, India

Karuna Nidhi Pandagre


Department of Computer Science, Career College Bhopal, MP, India

Lokesh Singh Panwar


Department of Electronics and Communication, Polymer Sensor and Actuator Lab,
Graphic Era Deemed to be University, Dehradun, India; E-mail: lokesh31j@gmail.com

Varij Panwar
Department of Electronics and Communication, Polymer Sensor and Actuator Lab,
Graphic Era Deemed to be University, Dehradun, India

Sudhir Ranjan Pattanaik


Department of School of Computer Science and Engineering, NIST (Autonomous), Berhampur,
Odisha 760010, India; E-mail: sudhir.pattanaik@nist.edu
Sai Swarup Patnaik
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur,
Odisha 760010, India
Sumanjit Pattanayak
Department of Electrical and Electronics Engineering, National Institute of Science and Technology,
Berhampur 761008, Odisha, India

V. R. K. Patro
Department of Computer science and Engineering, NIST (Autonomous) Berhampur,
Berhampur 760010, Odisha, India

Bora Pavani
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India

Mădălin-Dorin Pop
Computer and Information Technology Department, Politehnica University of Timișoara, România

R. Thandaiah Prabu
Department of Electronics and Communication Engineering, Saveetha School of Engineering,
Saveetha Institute of Medical and Technical Sciences (SIMATS), Chennai 602105, Tamil Nadu, India

Shyam Sundar Pradhan


Department of Information Technology Engineering, NIST (Autonomous), Berhampur 760010, Odisha,
India
Contributors xv

Priyanka Pratihari
Department of Computer Science and Engineering, NIST (Autonomous), Berhampur 760010, Odisha, India

H. P. Rajani
Department of Electronics and Communication Engineering, KLE’S Dr. MSSCET, Belgaum,
Karnataka, India
G. Ramkumar
Department of Electronics and Communication Engineering, Saveetha School of Engineering,
Saveetha Institute of Medical and Technical Sciences (SIMATS), Chennai 602105, Tamil Nadu, India;
E-mail: pgrvlsi@gmail.com

V. V. R. Raman
Department of Computer Science, Aurora’s Degree and PG College, Chikkadpally, Hyderabad,
Telangana, India

Velmani Ramasamy
Computer Science and Engineering Department, Adithya Institute of Technology, Kurumbapalayam,
Coimbatore, Tamil Nadu, India
S. Ramesh
Department of Electronics and Communication Engineering, Saveetha School of Engineering,
Saveetha Institute of Medical and Technical Sciences (SIMATS), Chennai 602105, Tamil Nadu, India
Obbinti Sankar Rao
Department of Electronics Communication Engineering, NIST (Autonomous), Berhampur,
Odisha 761008, India

Manoj Kumar Sahoo


Department of School of Computer Science and Engineering, NIST (Autonomous), Berhampur,
Odisha 760010, India; E-mail: mksahoo@nist.edu; mksahoo@hotmail.com

Monik Raj Sahu


Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur,
Odisha 760010, India

Anand Kumar Satapathy


Department of Computer Science and Engineering, NIST (Autonomous), Berhampur 760010, Odisha,
India

K. Pandi Selvi
Thamirabharani Engineering College, Tirunelveli, Tamil Nadu, India

Swadhin Kumar Senapati


Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur 760010,
Odisha, India

Ambrish Kumar Sharma


Department of Computer Science, NRI College, Bhopal, MP, India

S. A. Shifani
Department of ECE, Jeppiaar Maamallan Engineering College, Chennai 602108, Tamil Nadu, India

Madhvi Singh
Department of Electronics and Communication Engineering, NIST (Autonomous), Berhampur,
Odisha 761008, India
xvi Contributors

L. Suganya
Department of Electrical and Electronics Engineering, PGP College of Engineering & Technology,
Namakkal, Tamil Nadu, India

M. Suganthi
AP/CSE Department, Thamirabharani Engineering College, Tirunelveli, Tamil Nadu, India;
E-mail: sugi.mp@gmail.com
M. Suresh
Department of Electronics Communication Engineering, NIST (Autonomous), Berhampur,
Odisha, 761008, India; E-mail: msuresh73@gmail.com

Kunjabihari Swain
Department of Electrical and Electronics Engineering, National Institute of Science and Technology,
Berhampur 761008, Odisha, India

M. Tamilselvi
Department of Mechatronics Engineering, T.S. Srinivasan Centre for Polytechnic College and Advanced
Training, Vanagaram, Chennai 600095, Tamil Nadu, India
Murugesh Veerasamy
Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India

Renjith V. S.
Department of Biomedical Engineering, Karunya Institute of Technology and Sciences Coimbatore,
India; E-mail: notify_renjithvs@yahoo.com
Abbreviations

ABS automatic blocking system


ACK acknowledge
ADC analog to digital converters
ADS advanced design system
AES Advanced Encryption Standard
AI artificial intelligence
ALPR automatic license plate recognition system
ANPR automatic number plate recognition system
APTS advanced public transportation system
ATCC automatic traffic counter cum classifier
ATIS advanced traveler information system
ATMS advanced transportation management system
ATPS advanced transportation pricing system
ATR attenuated total internal reflection
AWS Amazon Web Services
BCI brain–computer interface
BF bamboo flour
BG blood glucose
BP blood pressure
BPM beats per minute
BSHDT brainwave-based smart home device triggering
BSN body sensor network
BT body temperature
CAGR compound annual growth rate
CAIDI customer average interruption duration index
CEHS cooperative-based energy harvesting scheme
C-ITS cooperative-ITS
CMOS complementary metal–oxide semiconductor
CNN convolutional neural network
CoRE constrained restful environment
CSEE clustered-based security and energy-efficient
CT current transformer
CVD cardio vascular disease
CVS cooperative vehicle system
xviii Abbreviations

DApps distributed applications


DAS driver assistant system
DCM discontinuous current mode
DEs differential equations
DNN deep neural networks
DOTs departments of transportation
DSP digital signal processors
DSRC dedicated short-range communications
ECB emergency calling box
ECG electrocardiogram
EDA electro-dermal activity
EEG electroencephalograph
ELHMS enhanced learning-based healthcare monitoring system
EMD empirical mode decomposition
EMG electromyogram
ERP event-related potential
ETH ethereum
EXI efficient XML interchange
E2E end-to-end
FIA flow injection analysis
FIR finite impulse response
FL fault location
FN future network
FPGA Field Programmable Gate Array
GC gas chromatography
GDPR general data protection regulation
GHG greenhouse gas
G-IoT green internet of things
GIS Geographical Information System
GPS global positioning System
GPSR general-packet-radio-service
GSM global system for mobile
HB harmonic balance
HCI human–computer interaction
HD Hodgkin’s disease
HPF high-pass filter
HPLC high-performance liquid chromatography
HR heart rate
IaaS infrastructure as a service
ICO initial coin offering
Abbreviations xix

IETF internet engineering task force


IIR infinite impulse response
IoE internet of energy
IoE internet of everything
IoS internet of services
IoT Internet of Things
IoTaaS Internet of Things as a service
IPTV internet protocol television
IR infrared
ISM industrial scientific and medical band
ITS intelligent transportation systems
JS JavaScript
LeNN single layer legendre neural network
MaaS Mobility-as-a-Service
MDS meteorological data station
MEMS micro-electro-mechanical-systems
MIMO multiple-input and multiple-output
MRCS mobile radio communication system
MS mass spectrometry
NDVI Normalized Difference Vegetable Index
NHL non-Hodgkin lymphoma
NHSR National Health Statistics Reports
ODE ordinary differential equations
OCR optical character recognition
PaaS platform as a service
PD photodetector
PDE partial differential equations
PP polypropylene
PLI power line interference
PV photovoltaic
QoS quality of service
RF radio frequency
RFID radio frequency identification
RHD resistive heat detectors
RHF rice husk fiber
ROI return on investment
ROLL routing over low-power and lossy networks
ROM read-only memory
RSA Rivest–Shamir–Adleman
RSSI receiver signal strength indicator
xx Abbreviations

SAIDI system average interruption duration index


SAIFI system average interruption frequency index
SCS Syzygium Cuminiseed
SDGs sustainable development goals
SFMU smart field monitoring unit
SG smart grid
SHCMK smart healthcare monitoring kit
SNR ratio signal to noise ratio
SOC system on a chip
SPDEs singularly-perturbed differential equations
SpO2 oxygen saturation
S-RAM static-random access memory
SRV ServiceCoin
SSL secure sockets layer
STWS single term Walsh series
TCP/IP Transmission Control Protocol/Internet Protocol
TCR temperature coefficient of resistance
TDMS time-division multiple access
TMCs traffic management centers
TMCs transportation management centers
TxDOT Texas Department of Transportation
ULP ultra-low power
VANET vehicle ad-hoc networks
VIDS video incident detection system
VMS variable message sign
VMT vehicle miles travelled
VR virtual reality
VRP vehicle-routing problem
VSH virtual smart home
V2I vehicle-to-infrastructure
V2IoT vehicle-to-IoT
V2V vehicle-to-vehicle
V2X vehicle-to-everything
WBAN wireless body area network
WF waste fish
WHO World Health Organization
WSNs wireless sensor network
6LoWPAN IPv6 over low-power wireless personal area networks
W3C World Wide Web Consortium
Preface

This book provides an overview of systems and machines that are intelligent.
It is intended for anybody who is interested in future advancements in these
domains or wants to be informed on the current state of these multidisciplinary
technologies.
Sensor devices that are flexible and printable have received a lot of interest
in recent years. New techniques like as printing and additive manufacturing
are being developed to realize a wide range of readily deployable systems
such as displays, sensors, and RFID tags. The needs of the growing area of
modular and writable sensors are being met by repurposing silicon-based
planar electronics and solid-state sensing technology. This book brings
together leading academics, architects, and scientists who are experts in the
subject from across the globe. Engineers discuss about their research projects,
experiments, discoveries, innovative ideas and principles, contributions, and
advancements in the fields of inventions and software, measurement theories
and applications, and instrumentation theories and applications.
Pervasive, reliable, robust, and streamlined positioning technologies will
benefit a wide range of resources, including personal navigation, search and
rescue, robot and fleet control, and health care. Despite the fact that there
are mature GNSS solutions for outside areas, more than 10 years of sensor
technology research and development have failed to provide a widely available
offer of generic and cheap standard solutions for inside. A new technology is
the requirement for sophisticated computing technologies to evolve in order to
satisfy the increasing needs of knowledge and communication technologies in
smart real-time world applications. There are a number of clever technologies
that may help the educational system significantly.
We would like to take this opportunity to thank our family members and
friends, who encouraged us a lot during the preparation of this book. First
and most obviously, we give all the glory and honor to our almighty Lord for
his abundant grace that sustained us for successful completion of this book.
We would like to thank the authors for their contribution in this edited book.
We would also like to thanks Apple Academic Press, CRC Press, a Taylor &
Francis Group and its whole team for facilitating the work and providing us
the opportunity to be a part of this work.
PART I
Applications of Intelligent Technologies
for Sensors
CHAPTER 1

Product Details Identification for Visually


Impaired Persons
M. SUGANTHI1* and K. PANDI SELVI2
1
AP/CSE Department, Thamirabharani Engineering College, Tirunelveli,
Tamil Nadu, India
2
Thamirabharani Engineering College, Tirunelveli, Tamil Nadu, India
*
Corresponding author. E-mail: sugi.mp@gmail.com

ABSTRACT

Android is a smartphone and tablet operating system that is free and open-
source. Smartphones are used for the majority of activities, such as e-commerce
and commercial processing. People with visual impairment face difficulties
to read the details of the product. So to help the visually impaired people in
purchasing the projects, we developed an application in Android and PHP. As
most of the supermarkets sell products of all brands in a single place, visually
impaired people can shop easily with the assistance of QR code generated
by shop owners through the web application. The product information for
the QR code produced will be registered by the business owner. Then the
customer with the “VIP Helper” Android application can easily scan the QR
code and the application speaks aloud the product details like product name,
brand, price, expiry date of the product which is embedded. So this greatly
helps the visually impaired people by eliminating the third person’s assistance
in shopping at ease.

Intelligent Technologies for Sensors: Applications, Design, and Optimization for a Smart World.
S. Kannadhasan, R. Nagarajan, & Alagar Karthick (Eds.)
© 2023 Apple Academic Press, Inc. Co-published with CRC Press (Taylor & Francis)
4 Intelligent Technologies for Sensors

1.1 INTRODUCTION

A customer looks through the available items or services from one or more
merchants with the intention of purchasing a suitable option. Scholars have
developed a shopper typology that categorizes one sort of shopper as recre­
ational shoppers, or those who like shopping as a leisure activity. Consumers
can now look up product information and place purchases across several
platforms, making internet shopping a major disruptor in the retail industry.
Customers’ purchases are delivered to their homes, offices, or other locations
by online retailers. Thanks to the business to consumer approach, customers
may now choose any product from a retailer’s website and have it delivered
quite quickly. By not having to travel to actual stores, consumers who utilize
online shopping strategies save time and energy. They may be able to save
both time and money as a result of this. A retailer, often known as a shop, is
a business that exhibits a wide range of goods and offers to trade or sell them
to customers in return for money or other goods. Customers’ purchasing
experiences may vary. They are influenced by a variety of factors, including
how the customer is treated, the ease with which the transaction is completed,
the items purchased, and the consumer’s mood.

1.2 ONLINE SHOPPING

One of the earliest sorts of internet commerce was IBM’s online transaction
processing, which was developed in the 1960s and allowed for the real-time
processing of financial transactions. The Semi-Automatic Business Research
Environment, a computerized ticket reservation system for American
Airlines, was one of its uses. A massive IBM mainframe computer linked
computer terminals at multiple travel agencies, processing, and coordinating
transactions so that all travel agents had access to the same information at
the same time. The growth of online shopping1 as we know it now began
with the introduction of the Internet. Initially, this platform was just a tool for
companies to promote and share information about their products. It quickly
advanced from this fundamental utility to true online purchase transactions
thanks to the creation of dynamic Web sites and secure connections. With the
initial sales of Sting’s album “Ten Summoner’s Tales” in 1994, the internet
started to grow as a secure purchasing channel. Wine, chocolates, and flowers
were among the first retail categories to promote the expansion of online
shopping, and they were among the pioneering retail categories. The presence
of e-commerce-ready items is a strong predictor of Internet success, according
Product Details Identification for Visually Impaired Persons 5

to researchers. Many of these things worked well because they were generic
items that customers did not have to touch or feel before buying. But, more
importantly, there were few internet users in the early days, and those that did
were from a certain demographic: rich guys in their 30s.

1.3 RETAIL SHOPPING

Retail is the business of earning money by selling consumer goods or services


to customers via different distribution channels. A supply chain has identified
a requirement that retailers must satisfy. The word “retailer” is used when a
service provider fills modest orders for a large number of end-users rather than
large purchases for a small number of wholesale, corporate, or government
customers. Shopping refers to the act of buying items. This is done to get final
things, such as food and clothing, and it is also done as a recreational activity.
Window shopping and browsing are popular leisure shopping activities that
may not always result in a purchase. Markets and retail businesses have a long
and famous history that dates back to antiquity. The earliest retailers were
itinerant peddlers.7 Throughout the years, retail businesses have grown from
basic “rude booths” to elaborate shopping malls of the modern day.

1.4 PRODUCT DETAILS IDENTIFICATION

As we progress into the contemporary era of technology, we may discover


that many engineering-related applications are very helpful to society’s
development. This is the technological world, where individuals utilize
cellphones to do everyday activities such as shopping, job management, and
so on. The specifics of a product are difficult to read for those with vision
impairment. By scanning the QR code of the goods, this initiative assists
visually challenged individuals in learning about the product description.
This programme may also be used to create new QR codes. This application
is for visually impaired individuals who want to provide product information
via voice. It focuses on shopping facilities.

1.4.1 EXISTING SYSTEM

Visually challenged individuals used to shop with the assistance of others


under the current arrangement. They need regular people’s assistance. The
6 Intelligent Technologies for Sensors

checkout operator software in an existing system produces a table containing


the product name and expiry date, which is subsequently uploaded to the
cloud. The customer scans a single Quick Response number written5 on the
purchase receipt using his or her smartphone. The table is then instantly
downloaded from the cloud to the smart phone.

1.4.2 PROBLEM DEFINITION

The existing system gives the notification to display product details. User
must depend on third person to know the details of product. Locating the
barcode using mobile is difficult.

1.5 PROPOSED SYSTEM

In the proposed system, to help the visually impaired people in purchasing


the project, we develop the application in Android. This application reads
the product information from the QR code. The PHP language is used to
create the QR code. The product information is incorporated in the QR code
when it is being generated. An event like QR scanning and reading product
information does not involve the use of the internet is shown in Figure 1.1.

1.5.1 SYSTEM ARCHITECTURE

FIGURE 1.1 Block diagram of product details identification.

1.5.2 IMPLEMENTATION

When the theoretical design is transformed into a working system, it is called


implementation. This is the most important stage in creating a new, effective
Product Details Identification for Visually Impaired Persons 7

system. It can only be deployed once all testing has been completed and
the system has been confirmed to fulfill the criteria. The implementation
phase includes a number of tasks. The purchase of hardware and software
is completed. It’s possible that the system will need the creation of certain
software. The compilation and execution of the planned system are both
part of software implementation. During this stage, modular and subsystem
programming code will be completed. The developers do unit and module
testing at this stage.
The proposed system has three modules. The modules are:
• QR generation
• QR reading
• Output as speech

QR Generation

The administrator module is where this is done. This QR code for available
items is generated by the business or shopping center owner. The site’s controller
is the Category Administrator. He is in charge of product development. The
product’s category is created by the first administrator. It is then presented in
the module when it has been constructed. The unwelcome category may then
be deleted from the website. The primary division of items such as Cookies,
Cosmetics, Hair oil, and Dairy Products are examples of categories.

New Product

In this module, the administrator creates a new product. First administrator


selects the categories that were created earlier, and then the product name,
brand, units, and price are entered. Then the product is created. The created
product is displayed in this module and unwanted products can be removed.

Edit Product

If the administrator needs to modify the product information such as price,


brand, and name, then in this module it can be changed. After selecting the
product the product information is shown in the screen. Then the adminis­
trator can modify any information of the product. Then on submitting the
form the product information is modified and stored in the server.
8 Intelligent Technologies for Sensors

Print QR Code

The administrator can print QR codes by categories. On selecting the catego­


ries the corresponding QR code and the name of the product are printed in
the screen. Then the administrator can take print using the printer. This QR
code can be placed in the products in the shop, so that the customers can read
the QR code with the android application.

QR Reading

This is done using android-based mobile phones. Using the camera in the
mobile phone the user can scan the available QR code. Then it fetches the
information that is embedded inside the QR code given by the administrator
who generated the QR code.

Output as Speech

The last job is to read out the information derived from the QR code. The QR
code carries product information such as the product name, brand, price, and
so on. The QR code is then scanned by the Android application and spoken
to the user. As a result, blind individuals may shop for things without the
need for an aid.

FIGURE 1.2 Home page.


Product Details Identification for Visually Impaired Persons 9

FIGURE 1.3 Login page.

FIGURE 1.4 Create category.

1.6 CONCLUSION

The application’s creation provides us with a nice experience while deliv­


ering great outcomes. The goal of the project “VIP Helper” is to identify
10 Intelligent Technologies for Sensors

users who have a basic understanding of computers. It enables individuals


to do their essential tasks through the internet. The project is completed on a
computer. It is a quick procedure that saves both time and money.

FIGURE 1.5 Create new product.

FIGURE 1.6 Edit product details.


Product Details Identification for Visually Impaired Persons 11

FIGURE 1.7 Generate QR code.

1.7 FUTURE ENHANCEMENT

We know that much information cannot be stored in a QR code under the


present system. So, in the future, more information should be stored in QR
codes so that more information may be retrieved even when the QR code is
used by visually impaired individuals. We’ll create a sound in several more
languages in the future.

KEYWORDS

• android
• QR code
• shopper
• authetication
• customer
12 Intelligent Technologies for Sensors

REFERENCES

1. Mohammed, R. H.; Khan, T. Automatic Expiry Date Notification System Interfaced


with Smart Speaker. Int. J. Eng. Sci. Invent. 2020, ISSN: 2319-6734, 515–525.
2. Padmapriya, V.; Suresh, R.; Nithyasri, B.; Pavithra, L. Expiry Date and Cost Tracking in
Medicine for Visually Impaired. Int. Res. J. Eng. Technol. 2020, 07(03).
3. Shahnoor, A.; Syeda, A. K.; Amulya, K. S.; Monisha, K. S. Product Details and Its Expiry
Date Recognition through Speech. Int. J. Eng. Res. Technol. 2019, ISSN: 2278-0181.
4. Devipriya, D.; Sushma Sri, V.; Mamatha, I. In Smart Store Assistor for Visually Impaired.
International Conference on Advances in Computing, Communications and Informatics
(ICACCI), 2018.
5. Kumar, K.D.; Thangavel, S. K. Assisting Visually Challenged Person in the Library
Environment. Lect. Notes Comput. Vision Biomech. 2018, 28, 722–733.
6. Elgendy, M.; Sik-Lanyi, C.; Kelemen, A. Making Shopping Easy for People With Visual
Impairment Using Mobile Assistive Technologies. Appl. Sco. 2019, 9(6), 1061.
7. Tiwari, S. In An Introduction to QR Code Technology, 2016 IEEE International Conference
on Information Technology (ICIT), 2016.
8. Singh, V.; Verlekar, P.; Mishra, N. R.; Shaikh, S. Expiry Remainder. Int. J. Innov. Res. Sci.
Technol. 2016.
9. Zientara, P.; Advani, S.; Shukla, N.; Okafor, I.; Irick, K.; Sampson, J.; Datta, S.; Narayanan,
V. K. A Multitask Grocery Assistance System for the Visually Impaired. IEEE Consumer
Electron. Mag. 2017, 6(1), 73–81.
CHAPTER 2

IoT-Based Teaching Assistant System for


Smart Classrooms
MANOJ KUMAR SAHOO1*, SUDHIR RANJAN PATTANAIK1*,
YASHWARDHAN KUMAR2, S. SOVAN KUMAR2, MONIK RAJ SAHU2,
SAI SWARUP PATNAIK2, and SANJANA MAHAPATRA1
1
School of Computer Science and Engineering, NIST (Autonomous),
Berhampur, Odisha 760010, India
Department of Electronics and Communication Engineering,
2

NIST (Autonomous), Berhampur, Odisha 760010, India


Corresponding author. E-mail: mksahoo@nist.edu;
*

mksahoo@hotmail.com; sudhir.pattanaik@nist.edu

ABSTRACT

In the present generation of smart technology, students are expecting


colleges and university campus life to be innovative and inclined toward
advanced learning methods. Cloud/Mesh computing technologies, IOT, and
a robust system of communication transfer data at long distances with a
cost-effective method. This leading edge technology is called LoRa (Long
Range) communication, which is a secure and low-power technology and
can give solutions for a smart and suitable classroom and campus to upgrade
the teaching technique of the students as well as the efficiency of classroom.
To initiate a smart classroom for teaching, we try to give teachers as well as
students the indistinguishable experiences as received in a normal classroom
during the lectures. The Smart Classroom could sincerely perceive, listen,
and obey the lecturer and the lecturer can also be written on a virtual board
by their hands or may take the help of speeches and indication to manage the

Intelligent Technologies for Sensors: Applications, Design, and Optimization for a Smart World.
S. Kannadhasan, R. Nagarajan, & Alagar Karthick (Eds.)
© 2023 Apple Academic Press, Inc. Co-published with CRC Press (Taylor & Francis)
14 Intelligent Technologies for Sensors

class, for the outlying students. Students can also use Personal Digital Assis­
tance to approach the given assignments and exam appearance by online
platforms. Lectures can be shared in the cloud, online lecturing permits
students to remotely attend classrooms. Attendance during classroom hours
is very important, because it affects the academic achievement of students.
Therefore, several institutions impose a minimum percentage of attendance
criteria for students to be allowed to seat in examinations. Conventional
methods for taking student attendance in the classroom, such as roll-call and
sign-in, are time taking and also increase teacher’s workload. This system
can also track student’s attendance and keep track of who leave out classes,
send alert notifications that assist students to focus on educational work regu­
larly. This system consists of various hardware components such as sensors,
microcontroller, and LoRa technology. We are also designing the software
structure to process the data to and from sensors which will be transferred
to cloud storage. In this paper, it is described how precisely Cloud, IOT, and
low power communication technology restructure the traditional classroom
and teaching techniques.

2.1 INTRODUCTION

The continuous up-gradation of modern technology encourages the update


of the modern education system. The continuous updating of the education
system is integrated with the up-gradation of the classrooms performance.
It has established a suitable environment for the operation of the new-age
education system in academia.1 The uses of modern accessories to develop
and assist smart learning as the teaching assistant have become a familiar
circumstance and then advancement into a smart tutoring mode.2 Depending
upon the thought of energy-saving management, smart accessories manage­
ment in the smart classroom develops an android application-based IoT
device for online/offline education and obtains direct management of class­
room circumstance3–5 detail information, coupled with the advancement of
smart educational campus. The circumstances are organized by the smart
classroom reviving students’ passion in schooling, consequently developing
the feature of educating6 to get the full benefit of the IoT network to increase
the information management of the classrooms. This chapter displays the
traditional classroom and teaching techniques using the IoT platform and
LORA technology. We are also designing the software structure to process
the data to and from sensors which will be transferred to cloud storage. This
system can also track student’s attendance and keep track of who leaves
IoT-Based Teaching Assistant System for Smart Classrooms 15

out classes, and send an alert notification that assists students to focus on
educational work regularly.

2.2 RELATED WORK

In recent years,7 many institutes have relied on roll-call and paper-based


methods to determine the students’ attendance. It is challenging and time-
consuming for this roll-call and paper-based system to take attendance. In
this manual, papers and a variety of stationery materials are used to work out.
There had previously been little work completed on the academic attendance
monitoring issue. There has previously been software designed to keep track
of attendance.8,9 This process requires that a teacher or staff member enter
the data manually, which can be time-consuming and difficult. As a result,
no solution has been found. A follow-up procedure is used to integrate the
RFID system with the attendance-monitoring system. The database stores
the records that are executed in an MS SQL Server database. SQL Server is
fast and easy to use, and it can handle very large records, can be accessed
from anywhere, and requires little configuration.10 Similarly, the database in
this system must also be manually updated by the staff. As such, the matter
remains unresolved. There are also a lot of new ideas being proposed, such
as face recognition technology to keep attendance records. However, this
system is expensive, and it does not produce accurate results.

2.3 WORKING PROCESS OF PROPOSED SYSTEM

In this prototype we have proposed a finger print-based attendance system


and an android application-based personal teaching assistance system that
will give a new experience to an online/offline education system. For the
attendance system that we developed, we used fingerprint scanners on
Android smartphones because we used biometric methods to identify users
during the biometric identification research. So we need to take the finger­
prints of 100 volunteers (participants) as well as personal information for
the identification test and attendance system. Next, we develop a fingerprint
matching algorithm. The hardware equipment is also located outside the
classroom door for offline purposes. Before entering a classroom, students
must have to give their fingerprints for their identification. The attendance of
a student is recorded upon identification.
16 Intelligent Technologies for Sensors

First take a student’s/teacher’s fingerprint sample and create a digital


copy. It consists of a set of features. The features of an individual fingerprint
that make it unique are known as a feature set as shown in Figure 2.1.

FIGURE 2.1 Student making their attendance before entering the classroom.

After that the user will retrieve the templates from the repository (data­
base). Thereafter, it compares the fingerprint with the fingerprint templates
stored in the database and makes a match-or-no-match decision. Figure 2.2
illustrates the process of identification.

FIGURE 2.2 Represents process of identification.

If the match is found, fetch student information (roll number, depart­


ment, subjects) from the database. At last we locate the scheduled lecture
in the database and mark attendance if the student is present within 30
min of the lecture starting time. (For more information, see the rules). In
the event of a verification error or an incorrect fingerprint enrolment, the
system returns to its initial state without marking the attendance as shown
in Figure 2.3.
IoT-Based Teaching Assistant System for Smart Classrooms 17

FIGURE 2.3 Flowchart of the attendance system.

2.4 SYSTEM DESIGN

The circuit diagram for the smart classroom is simple. Starting with the power
supply, the voltage for Arduino UNO should be within 9 to 12 V, and it is
regulated internally by the board to 5 V. All the components are connected to
the Arduino UNO with the help of jumper wires. For the attendance system,
we have used an optical fingerprint sensor, the Vcc of this sensor connected
to a 5 V pin, ground to GND pin, the RX and TX connected to D3 and D2
pins respectively of the Arduino board. The fingerprint sensor takes the input
data as a fingerprint, transmitting it to the database with the help of the LoRa
SX1278 Transmitter. LoRa SX1278 Transmitter cannot be operated at 5 V,
so the Vcc of Lora should be connected to the 3.3 V pin of Arduino. The
ground should be connected to the GND pin of the Arduino. Now, connect
the RST pin to D9 and the DIO0 to D2. The SPI Pins NSS, MOSI, MISO,
SCK are connected to pins D10, D11, D12, D13 of Arduino, respectively,
18 Intelligent Technologies for Sensors

and the same connection goes for the LoRa SX1278 Receiver. The LoRa
SX1278 Receiver will receive the data and store it on the Cloud server.

2.5 IMPLEMENTATION

FIGURE 2.4 Flowchart of smart classroom attendance system.

The flowchart shown in Figure 2.4 displays the overall structure of


IoT-based Attendance system for smart classrooms. This framework
operates basically in two stages. At the first stage, the application turns on,
and then the app will show to choose the category (Student/Teaching Staff/
Non-Teaching Staff); then fingerprint will be taken for attendance using
the fingerprint scanner. After giving the fingerprint the fingerprint data will
be verified. In this process, the verification will work as an interface, by
updating and storing the data in the database. At last, the attendance report
will be shown where we can see the status of our attendance. The next stage
means after the verification of the data will mismatch with the user and some
problem in data, in this situation you have to give the manual attendance,
where we have to write our ID number; then the data will update and store in
the database and then the attendance will be shown.
IoT-Based Teaching Assistant System for Smart Classrooms 19

2.6 APPLICATIONS

FIGURE 2.5 The overall architecture of smart classroom application.

2.7 CLOUD STORAGE

The main idea behind this chapter is to build a wireless teaching system
between the teacher and the student where we need not to use pen and paper
for storage of information of students. HTML can be used as an interface
20 Intelligent Technologies for Sensors

between smartphone/pc and cloud server.11 Smartphones are becoming


most essential part of human life as convenient tools for communication
irrespective of time and place. That is why we can use mobiles, PDA as
teaching instruments. However, these devices are facing many challenges
in communications. But these challenges are tackled to some extent by
using cloud computing. The integration of cloud computing in PDA offers
a betterment to use networks, servers, and other infrastructures, platforms,
software etc. It ensures that the applications and data should be available
offline also. Smart campus, smart class rooms can be provided by IoT-based
cloud computing technology for teaching and management of teacher’s and
student’s activities.12 Students and staff can use PDA (mobiles, laptops, and
touch pads) for easy access of teaching and learning process. It helps teachers
for easy monitoring of students and their activities. It allows both online and
offline lectures for students which makes a big advantage for students over
the manual teaching system.
In our proposed system, HTML5 is used for applications and database.
Database covers the information of students and staff which also includes the
subjects, assigned teachers, syllabus, identifications, materials, attendance,
and other required stuffs. All these information is stored in cloud so that both
students and teachers can access the data from anywhere, anytime, and from
any device. The classrooms will be provided with laptops or the students
can connect themselves with their PDAs and smartphones. It will make the
teaching learning process more convenient13 as shown in Figure 2.5. This
system will give an innovative platform for teachers and students to use their
pc/smartphones for a smart classroom. Even teachers can take online classes
with no inconvenience and students can also access the materials and other
required information from any place. Thus data will be available in both
online and offline; it will make an advantage for students who skip a class.

2.8 LORA TECHNOLOGY

The LoRa protocol is a secure, low-power, long-range, and low-cost wireless


communication technology that can be used as a foundation for IoT. It uses
chirp spread spectrum modulation, which has many of the same characteris­
tics as FSK modulation but is able to handle long-distance communications.14
Sensors, gateways, devices, animals, people, machines, and other objects
can be connected wirelessly to the cloud using LoRa. LoRa uses different
bands of frequency in different areas.15 LoRa transmits over megahertz radio
frequency bands without a license. Its communications can reach distances
IoT-Based Teaching Assistant System for Smart Classrooms 21

of ten miles or more in rural areas using low power. To accomplish this,
LoRa’s bandwidth should be narrowed.
By developing an internet-of-things platform that provides real-time
tracking and management of many educational buildings and their different
characteristics,14,16 the objective of this technology is to establish IoT networks
with the help of LoRa so that various kinds of sensors are embedded in IoT
networks that can operate in a lot of buildings and spread in several rooms
inside each building. LoRa gateways should be installed on the roof of the
building or at a height of at least 15 m above the ground.15 The data collected
from various sensors are now uploaded to the cloud and later on, the data can
be accessed from the web server by anyone as shown in Figure 2.6.

FIGURE 2.6 Shows the working process of LoRa technology.

LoRa technology offers many benefits for an educational institute’s


operation such as interactive learning: In17 this era of digital textbooks,18
Students can engage in learning by providing them with materials, assign­
ments, and recorded class videos for proper understanding of the subject
with the Internet of Things. Learners with disabilities: LoRa technology is
useful as it can be used to teach and enable the disabled to work and support
them. Attendance monitoring system: Educational institutes can benefit from
an attendance monitoring system in many ways. For example, it will send an
alert message to a student if their attendance is below 75%.
As a result of LoRa technology, e-learning services benefit from an
expanded learning ecosystem that integrates a physical and virtual component.

2.9 RESULT

The proposed IoT-based teaching assistant system for smart classroom is


being set up and tested over prototype in our college in which we have used
22 Intelligent Technologies for Sensors

finger print sensor for attendance and android application-based personal


digital assistance for student as well as for faculty for online teaching.

2.10 CONCLUSION AND FUTURE WORKS

IoT technology will turn out and exist in the real world in the near future.
Especially, IoT in the education sector is regarding the ability to learn new
things. The IoT-based teaching assistant for the smart classroom for a smart
campus creates an evolution in education technique results in high efficiency
in classroom teaching methodology. Experimentally, IoT has been proven that
a smart classroom with a teaching assistant system is functioning correctly
by connecting devices that are being effectively controlled. This system
will assist the teacher and students in time-saving and focus on studies. The
architecture of our device can be extended to smart home implementation
and also in a smart office. Two applications can be converted into a single
application for the desirable use of the user. We are planning to implement
text-to-speech system work using multiple languages in near future.

KEYWORDS

• cloud computing
• intelligent education system
• IoT
• LoRa technology
• smart classroom
• teaching assistant
• innovation

REFERENCE

1. Memos, V. A.; Minopoulos, G.; Stergiou, C.; Psannis, K. E.; Ishibashi, Y. In A Revolutionary
Interactive Smart Classroom (RISC) With the use of Emerging Technologies, 2020 2nd
International Conference on Computer Communication and the Internet (ICCCI), 2020,
pp 174–178.
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of
Historical record of the Eighty-seventh

Regiment, or the Royal Irish Fusiliers


This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.

Title: Historical record of the Eighty-seventh Regiment, or the Royal


Irish Fusiliers
Containing an account of the formation of the regiment in
1793, and of its subsequent services to 1853

Author: Richard Cannon

Release date: April 17, 2024 [eBook #73415]

Language: English

Original publication: London: Parker, Furnivall & Parker, 1853

Credits: Brian Coe, John Campbell and the Online Distributed


Proofreading Team at https://www.pgdp.net (This file was
produced from images generously made available by The
Internet Archive)

*** START OF THE PROJECT GUTENBERG EBOOK HISTORICAL


RECORD OF THE EIGHTY-SEVENTH REGIMENT, OR THE
ROYAL IRISH FUSILIERS ***
TRANSCRIBER’S NOTE
Footnote anchors are denoted by [number], and the footnotes have been placed at
the end of each major section.
Some minor changes to the text are noted at the end of the book.
BY COMMAND OF His late Majesty WILLIAM THE IVTH.
and under the Patronage of
Her Majesty the Queen.

HISTORICAL RECORDS,
OF THE

British Army
Comprising the
History of every Regiment
IN HER MAJESTY’S SERVICE.
By Richard Cannon Esqre.
Adjutant General’s Office, Horse Guards.
London.
Printed by Authority.
GENERAL ORDERS

HORSE GUARDS,
1st January, 1836.
His Majesty has been pleased to command that, with the view of
doing the fullest justice to Regiments, as well as to Individuals who
have distinguished themselves by their bravery in Action with the
Enemy, an Account of the Services of every Regiment in the British
Army shall be published under the superintendence and direction of
the Adjutant-General; and that this Account shall contain the
following particulars, viz.:—

—— The Period and Circumstances of the Original Formation of


the Regiment; The Stations at which it has been from time to time
employed; The Battles, Sieges, and other Military Operations in
which it has been engaged, particularly specifying any
Achievement it may have performed, and the Colours, Trophies,
&c., it may have captured from the Enemy.
—— The Names of the Officers, and the number of Non-
Commissioned Officers and Privates Killed or Wounded by the
Enemy, specifying the Place and Date of the Action.
—— The Names of those Officers who, in consideration of their
Gallant Services and Meritorious Conduct in Engagements with
the Enemy, have been distinguished with Titles, Medals, or other
Marks of His Majesty’s gracious favour.
—— The Names of all such Officers, Non-Commissioned Officers,
and Privates, as may have specially signalized themselves in
Action.
And,
—— The Badges and Devices which the Regiment may have
been permitted to bear, and the Causes on account of which such
Badges or Devices, or any other Marks of Distinction, have been
granted.

By Command of the Right Honorable


GENERAL LORD HILL,
Commanding-in-Chief.

John Macdonald,
Adjutant General.
PREFACE.

The character and credit of the British Army must chiefly depend
upon the zeal and ardour by which all who enter into its service are
animated, and consequently it is of the highest importance that any
measure calculated to excite the spirit of emulation, by which alone
great and gallant actions are achieved, should be adopted.
Nothing can more fully tend to the accomplishment of this
desirable object than a full display of the noble deeds with which the
Military History of our country abounds. To hold forth these bright
examples to the imitation of the youthful soldier, and thus to incite
him to emulate the meritorious conduct of those who have preceded
him in their honorable career, are among the motives that have given
rise to the present publication.
The operations of the British Troops are, indeed, announced in the
“London Gazette,” from whence they are transferred into the public
prints: the achievements of our armies are thus made known at the
time of their occurrence, and receive the tribute of praise and
admiration to which they are entitled. On extraordinary occasions,
the Houses of Parliament have been in the habit of conferring on the
Commanders, and the Officers and Troops acting under their orders,
expressions of approbation and of thanks for their skill and bravery;
and these testimonials, confirmed by the high honour of their
Sovereign’s approbation, constitute the reward which the soldier
most highly prizes.
It has not, however, until late years, been the practice (which
appears to have long prevailed in some of the Continental armies)
for British Regiments to keep regular records of their services and
achievements. Hence some difficulty has been experienced in
obtaining, particularly from the old Regiments, an authentic account
of their origin and subsequent services.
This defect will now be remedied, in consequence of His Majesty
having been pleased to command that every Regiment shall, in
future, keep a full and ample record of its services at home and
abroad.
From the materials thus collected, the country will henceforth
derive information as to the difficulties and privations which chequer
the career of those who embrace the military profession. In Great
Britain, where so large a number of persons are devoted to the
active concerns of agriculture, manufactures, and commerce, and
where these pursuits have, for so long a period, been undisturbed by
the presence of war, which few other countries have escaped,
comparatively little is known of the vicissitudes of active service and
of the casualties of climate, to which, even during peace, the British
Troops are exposed in every part of the globe, with little or no
interval of repose.
In their tranquil enjoyment of the blessings which the country
derives from the industry and the enterprise of the agriculturist and
the trader, its happy inhabitants may be supposed not often to reflect
on the perilous duties of the soldier and the sailor,—on their
sufferings,—and on the sacrifice of valuable life, by which so many
national benefits are obtained and preserved.
The conduct of the British Troops, their valour, and endurance,
have shone conspicuously under great and trying difficulties; and
their character has been established in Continental warfare by the
irresistible spirit with which they have effected debarkations in spite
of the most formidable opposition, and by the gallantry and
steadiness with which they have maintained their advantages
against superior numbers.
In the Official Reports made by the respective Commanders,
ample justice has generally been done to the gallant exertions of the
Corps employed; but the details of their services and of acts of
individual bravery can only be fully given in the Annals of the various
Regiments.
These Records are now preparing for publication, under His
Majesty’s special authority, by Mr. Richard Cannon, Principal Clerk
of the Adjutant-General’s Office; and while the perusal of them
cannot fail to be useful and interesting to military men of every rank,
it is considered that they will also afford entertainment and
information to the general reader, particularly to those who may have
served in the Army, or who have relatives in the Service.
There exists in the breasts of most of those who have served, or
are serving, in the Army, an Esprit de Corps—an attachment to
everything belonging to their Regiment; to such persons a narrative
of the services of their own Corps cannot fail to prove interesting.
Authentic accounts of the actions of the great, the valiant, the loyal,
have always been of paramount interest with a brave and civilized
people. Great Britain has produced a race of heroes who, in
moments of danger and terror, have stood “firm as the rocks of their
native shore:” and when half the world has been arrayed against
them, they have fought the battles of their Country with unshaken
fortitude. It is presumed that a record of achievements in war,—
victories so complete and surprising, gained by our countrymen, our
brothers, our fellow-citizens in arms,—a record which revives the
memory of the brave, and brings their gallant deeds before us,—will
certainly prove acceptable to the public.
Biographical Memoirs of the Colonels and other distinguished
Officers will be introduced in the Records of their respective
Regiments, and the Honorary Distinctions which have, from time to
time, been conferred upon each Regiment, as testifying the value
and importance of its services, will be faithfully set forth.
As a convenient mode of Publication, the Record of each
Regiment will be printed in a distinct number, so that when the whole
shall be completed the Parts may be bound up in numerical
succession.
INTRODUCTION
TO

THE I N F A N T R Y.

The natives of Britain have, at all periods, been celebrated for innate
courage and unshaken firmness, and the national superiority of the
British troops over those of other countries has been evinced in the
midst of the most imminent perils. History contains so many proofs of
extraordinary acts of bravery, that no doubts can be raised upon the
facts which are recorded. It must therefore be admitted, that the
distinguishing feature of the British soldier is Intrepidity. This
quality was evinced by the inhabitants of England when their country
was invaded by Julius Cæsar with a Roman army, on which
occasion the undaunted Britons rushed into the sea to attack the
Roman soldiers as they descended from their ships; and, although
their discipline and arms were inferior to those of their adversaries,
yet their fierce and dauntless bearing intimidated the flower of the
Roman troops, including Cæsar’s favourite tenth legion. Their arms
consisted of spears, short swords, and other weapons of rude
construction. They had chariots, to the axles of which were fastened
sharp pieces of iron resembling scythe-blades, and infantry in long
chariots resembling waggons, who alighted and fought on foot, and
for change of ground, pursuit or retreat, sprang into the chariot and
drove off with the speed of cavalry. These inventions were, however,
unavailing against Cæsar’s legions: in the course of time a military
system, with discipline and subordination, was introduced, and
British courage, being thus regulated, was exerted to the greatest
advantage; a full development of the national character followed, and
it shone forth in all its native brilliancy.
The military force of the Anglo-Saxons consisted principally of
infantry: Thanes, and other men of property, however, fought on
horseback. The infantry were of two classes, heavy and light. The
former carried large shields armed with spikes, long broad swords
and spears; and the latter were armed with swords or spears only.
They had also men armed with clubs, others with battle-axes and
javelins.
The feudal troops established by William the Conqueror consisted
(as already stated in the Introduction to the Cavalry) almost entirely
of horse: but when the warlike barons and knights, with their trains of
tenants and vassals, took the field, a proportion of men appeared on
foot, and, although these were of inferior degree, they proved stout-
hearted Britons of stanch fidelity. When stipendiary troops were
employed, infantry always constituted a considerable portion of the
military force; and this arme has since acquired, in every quarter of
the globe, a celebrity never exceeded by the armies of any nation at
any period.
The weapons carried by the infantry, during the several reigns
succeeding the Conquest, were bows and arrows, half-pikes, lances,
halberds, various kinds of battle-axes, swords, and daggers. Armour
was worn on the head and body, and in course of time the practice
became general for military men to be so completely cased in steel,
that it was almost impossible to slay them.
The introduction of the use of gunpowder in the destructive
purposes of war, in the early part of the fourteenth century, produced
a change in the arms and equipment of the infantry-soldier. Bows
and arrows gave place to various kinds of fire-arms, but British
archers continued formidable adversaries; and, owing to the
inconvenient construction and imperfect bore of the fire-arms when
first introduced, a body of men, well trained in the use of the bow
from their youth, was considered a valuable acquisition to every
army, even as late as the sixteenth century.
During a great part of the reign of Queen Elizabeth each company
of infantry usually consisted of men armed five different ways; in
every hundred men forty were “men-at-arms,” and sixty “shot;” the
“men-at-arms” were ten halberdiers, or battle-axe men, and thirty
pikemen; and the “shot” were twenty archers, twenty musketeers,
and twenty harquebusiers, and each man carried, besides his
principal weapon, a sword and dagger.
Companies of infantry varied at this period in numbers from 150 to
300 men; each company had a colour or ensign, and the mode of
formation recommended by an English military writer (Sir John
Smithe) in 1590 was; the colour in the centre of the company
guarded by the halberdiers; the pikemen in equal proportions, on
each flank of the halberdiers; half the musketeers on each flank of
the pikes; half the archers on each flank of the musketeers, and the
harquebusiers (whose arms were much lighter than the muskets
then in use) in equal proportions on each flank of the company for
skirmishing.[1] It was customary to unite a number of companies into
one body, called a Regiment, which frequently amounted to three
thousand men; but each company continued to carry a colour.
Numerous improvements were eventually introduced in the
construction of fire-arms, and, it having been found impossible to
make armour proof against the muskets then in use (which carried a
very heavy ball) without its being too weighty for the soldier, armour
was gradually laid aside by the infantry in the seventeenth century:
bows and arrows also fell into disuse, and the infantry were reduced
to two classes, viz.: musketeers, armed with matchlock muskets,
swords, and daggers; and pikemen, armed with pikes from fourteen
to eighteen feet long, and swords.
In the early part of the seventeenth century Gustavus Adolphus,
King of Sweden, reduced the strength of regiments to 1000 men. He
caused the gunpowder, which had heretofore been carried in flasks,
or in small wooden bandoliers, each containing a charge, to be made
up into cartridges, and carried in pouches; and he formed each
regiment into two wings of musketeers, and a centre division of
Pikemen. He also adopted the practice of forming four regiments into
a brigade; and the number of colours was afterwards reduced to
three in each regiment. He formed his columns so compactly that his
infantry could resist the charge of the celebrated Polish horsemen
and Austrian cuirassiers; and his armies became the admiration of
other nations. His mode of formation was copied by the English,
French, and other European states; but so great was the prejudice in
favour of ancient customs, that all his improvements were not
adopted until near a century afterwards.
In 1664 King Charles II. raised a corps for sea-service, styled the
Admiral’s regiment. In 1678 each company of 100 men usually
consisted of 30 pikemen, 60 musketeers, and 10 men armed with
light firelocks. In this year the King added a company of men armed
with hand grenades to each of the old British regiments, which was
designated the “grenadier company.” Daggers were so contrived as
to fit in the muzzles of the muskets, and bayonets, similar to those at
present in use, were adopted about twenty years afterwards.
An Ordnance regiment was raised in 1685, by order of King James
II., to guard the artillery, and was designated the Royal Fusiliers
(now 7th Foot). This corps, and the companies of grenadiers, did not
carry pikes.
King William III. incorporated the Admiral’s regiment in the second
Foot Guards, and raised two Marine regiments for sea-service.
During the war in this reign, each company of infantry (excepting the
fusiliers and grenadiers) consisted of 14 pikemen and 46
musketeers; the captains carried pikes; lieutenants, partisans;
ensigns, half-pikes; and serjeants, halberds. After the peace in 1697
the Marine regiments were disbanded, but were again formed on the
breaking out of the war in 1702.[2]
During the reign of Queen Anne the pikes were laid aside, and
every infantry soldier was armed with a musket, bayonet, and sword;
the grenadiers ceased, about the same period, to carry hand
grenades; and the regiments were directed to lay aside their third
colour: the corps of Royal Artillery was first added to the Army in this
reign.
About the year 1745, the men of the battalion companies of
infantry ceased to carry swords; during the reign of George II. light
companies were added to infantry regiments; and in 1764 a Board of
General Officers recommended that the grenadiers should lay aside
their swords, as that weapon had never been used during the Seven
Years’ War. Since that period the arms of the infantry soldier have
been limited to the musket and bayonet.
The arms and equipment of the British Troops have seldom
differed materially, since the Conquest, from those of other European
states; and in some respects the arming has, at certain periods,
been allowed to be inferior to that of the nations with whom they
have had to contend; yet, under this disadvantage, the bravery and
superiority of the British infantry have been evinced on very many
and most trying occasions, and splendid victories have been gained
over very superior numbers.
Great Britain has produced a rate of lion-like champions who have
dared to confront a host of foes, and have proved themselves valiant
with any arms. At Crecy, King Edward III., at the head of about
30,000 men, defeated, on the 26th of August, 1346, Philip King of
France, whose army is said to have amounted to 100,000 men; here
British valour encountered veterans of renown:—the King of
Bohemia, the King of Majorca, and many princes and nobles were
slain, and the French army was routed and cut to pieces. Ten years
afterwards, Edward Prince of Wales, who was designated the Black
Prince, defeated at Poictiers, with 14,000 men, a French army of
60,000 horse, besides infantry, and took John I., King of France, and
his son, Philip, prisoners. On the 25th of October, 1415, King Henry
V., with an army of about 13,000 men, although greatly exhausted by
marches, privations, and sickness, defeated, at Agincourt, the
Constable of France, at the head of the flower of the French nobility
and an army said to amount to 60,000 men, and gained a complete
victory.
During the seventy years’ war between the United Provinces of the
Netherlands and the Spanish monarchy, which commenced in 1578
and terminated in 1648, the British infantry in the service of the
States-General were celebrated for their unconquerable spirit and
firmness;[3] and in the thirty years’ war between the Protestant
Princes and the Emperor of Germany, the British Troops in the
service of Sweden and other states were celebrated for deeds of
heroism.[4] In the wars of Queen Anne, the fame of the British army
under the great Marlborough was spread throughout the world;
and if we glance at the achievements performed within the memory
of persons now living, there is abundant proof that the Britons of the
present age are not inferior to their ancestors in the qualities which
constitute good soldiers. Witness the deeds of the brave men, of
whom there are many now surviving, who fought in Egypt in 1801,
under the brave Abercromby, and compelled the French army, which
had been vainly styled Invincible, to evacuate that country; also the
services of the gallant Troops during the arduous campaigns in the
Peninsula, under the immortal Wellington; and the determined
stand made by the British Army at Waterloo, where Napoleon
Bonaparte, who had long been the inveterate enemy of Great Britain,
and had sought and planned her destruction by every means he
could devise, was compelled to leave his vanquished legions to their
fate, and to place himself at the disposal of the British Government.
These achievements, with others of recent dates, in the distant
climes of India, prove that the same valour and constancy which
glowed in the breasts of the heroes of Crecy, Poictiers, Agincourt,
Blenheim, and Ramilies, continue to animate the Britons of the
nineteenth century.
The British Soldier is distinguished for a robust and muscular
frame,—intrepidity which no danger can appal,—unconquerable
spirit and resolution,—patience in fatigue and privation, and cheerful
obedience to his superiors. These qualities, united with an excellent
system of order and discipline to regulate and give a skilful direction
to the energies and adventurous spirit of the hero, and a wise
selection of officers of superior talent to command, whose presence
inspires confidence,—have been the leading causes of the splendid
victories gained by the British arms.[5] The fame of the deeds of the
past and present generations in the various battle-fields where the
robust sons of Albion have fought and conquered, surrounds the
British arms with a halo of glory; these achievements will live in the
page of history to the end of time.
The records of the several regiments will be found to contain a
detail of facts of an interesting character, connected with the
hardships, sufferings, and gallant exploits of British soldiers in the
various parts of the world where the calls of their Country and the
commands of their Sovereign have required them to proceed in the
execution of their duty, whether in active continental operations, or in
maintaining colonial territories in distant and unfavourable climes.
The superiority of the British infantry has been pre-eminently set
forth in the wars of six centuries, and admitted by the greatest
commanders which Europe has produced. The formations and
movements of this arme, as at present practised, while they are
adapted to every species of warfare, and to all probable situations
and circumstances of service, are calculated to show forth the
brilliancy of military tactics calculated upon mathematical and
scientific principles. Although the movements and evolutions have
been copied from the continental armies, yet various improvements
have from time to time been introduced, to ensure that simplicity and
celerity by which the superiority of the national military character is
maintained. The rank and influence which Great Britain has attained
among the nations of the world, have in a great measure been
purchased by the valour of the Army, and to persons who have the
welfare of their country at heart, the records of the several regiments
cannot fail to prove interesting.
FOOTNOTES:

[1] A company of 200 men would appear thus:—

20 20 20 30 20 30 20 20 20
Harquebuses. Muskets. Halberds. Muskets. Harquebuses.
Archers. Pikes. Pikes. Archers.
The musket carried a ball which weighed 1/10th of a pound; and
the harquebus a ball which weighed 1/25th of a pound.
[2] The 30th, 31st, and 32nd Regiments were formed as Marine
corps in 1702, and were employed as such during the wars in the
reign of Queen Anne. The Marine corps were embarked in the
Fleet under Admiral Sir George Rooke, and were at the taking of
Gibraltar, and in its subsequent defence in 1704; they were
afterwards employed at the siege of Barcelona in 1705.
[3] The brave Sir Roger Williams, in his Discourse on War, printed
in 1590, observes:—“I persuade myself ten thousand of our
nation would beat thirty thousand of theirs (the Spaniards) out of
the field, let them he chosen where they list.” Yet at this time the
Spanish infantry was allowed to be the best disciplined in Europe.
For instances of valour displayed by the British Infantry during the
seventy Years’ War, see the Historical Record of the Third Foot,
or Buffs.
[4] Vide the Historical Record of the First, or Royal Regiment of
Foot.
[5] “Under the blessing of Divine Providence, His Majesty
ascribes the successes which have attended the exertions of his
troops in Egypt to that determined bravery which is inherent in
Britons; but His Majesty desires it may be most solemnly and
forcibly impressed on the consideration of every part of the army,
that it has been a strict observance of order, discipline, and
military system, which has given the full energy to the native
valour of the troops, and has enabled them proudly to assert the

You might also like