Design of a Tuning Circuit for Receiving Multiple Frequencies

Verified

Added on  2022/11/13

|22
|4283
|400
AI Summary
This article discusses the design of a tuning circuit that can receive multiple frequencies using a superheterodyne. It also explores the mechanisms to avoid side channel noise and improve frequency selection. Additionally, it covers the remote monitoring of attendance system based on RFID using GSM network, including its hardware and software structure.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CYBER ENGINEERING 1
CYBER ENGINEERING
Name of Student
Institution Affiliation

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER ENGINEERING 2
Design of a tuning circuit
A single tuning circuit that can receive three different frequencies of 96MHz, 100MHz
and 104MHz can be designed by the use of a "superheterodyne. It is simple in the sense that you
need to alter or change the frequency which is being received to a specific fixed second
frequency. At this point, you will have to place a fixed narrowband amplifier or somewhat a
filter. Since this frequency is a fixed frequency, it is aligned only once, and then it should not be
altered again. Almost all the analog radio receivers operate in this principle. Besides, make the
oscillator to be in a position that which it can be tuned in between the desirable frequencies, in
addition, to offset frequencies (Asaner & Elibol, 2018)
By definition. The offset frequency is the intermediate frequency or the fixed
intermediate frequency. In this case, let's take the intermediate frequency to be 10.7 MHz we will
thereafter design an oscillator which will be able to tune from 96 MHz + 10.7 MHz = 106.7
through to 104 MHz + 10.7 MHz = 114.7 MHz after that, incoming received signal is mixed
with this signal but in a non-linear circuit. Among the outputs, one has to be 10.7MHz. This
output will still be carrying the modulation which was present in the original signal. After that,
pass the output signal to the fixed IF amplifier and filters. This amplifier or filters will only
permit one channel to pass through, while strongly objecting others, including the adjacent
Document Page
CYBER ENGINEERING 3
signals. In addition, an RF amplifier can as well be used ahead of the mixer. The amplifier,
however, will be composed of a fixed tuned circuit with a full band that has the capability of
covering the entire groups of interest. In this case, it will cover the frequencies of 96MHz,
100MHz, and 104MHz. A simple tunable circuit that is "ganged" with the local oscillator tuning
circuit can as well be utilized as it is preferable by many designers (Bada et al., 2019).
Alternatively,
The quality factor denoted as Q-factor determines the characteristics of a tuned circuit.
When the tuned circuit is composed of an inductor and capacitor, then the resonance bandwidth
concerning the band center frequency defines the Q factor. In this case, the effective circuit will
comprise of two capacitors and one inductor to maintain the q factor at a high level. At the same
time, one or more values will be varied such that it will be sufficient to vary the resonant
frequency over a range of 8MHz. The circuit will be as shown below (Baheti et al., 2017),
Document Page
CYBER ENGINEERING 4
The center frequency will be =
f = 1 / 2pi x sqrt (Lx C)
An amplifier circuit constructs the circuit with a parallel tuned circuit at the collector
load. At L, a secondary winding can help in generating the output, which can also be obtained
in the coupling capacitor CC. At the amplifier input, the 100 MHz frequency is applied. The
resonant frequency is also made to be 100MHz by way of altering the capacitance value
(capacitor in parallel with the inductor). This results in a high impedance, which maximizes the
tuned circuit output. However, the high impedance is concerning the tuned frequency, which is
100MHz, other frequencies will be restricted. The maximum impedance makes the circuitry thus
to be purely resistive, making the voltage gain to be maximum (Ben-Asher & Gonzalez, 2015).
This makes the gain to drop above, and below the resonant frequency, hence incorporating the
other frequencies. I.e., 96MHZ and 104 MHz. The Q factor will be maintained at the maximum
(Bodeau & Graubart, 2011)
What are the mechanisms to avoid the side channel noise and improve the frequency
selection?
Side channel attacks would depend on the relationship between the leaked data via a side
channel and the secret data. Hence, the main objective when one wants to avoid the side channel
noise is by performing two actions. Elimination the release of such data, and eliminating the
relationship between the leaked and secret data. The countermeasures which are available in
avoiding the side channel noise and tentative enhancement of the frequency selection includes
Enacting displays with proper shielding- these will be able to minimize the electromagnetic
emissions, thereby lessening the susceptibility of the attacks (Bowring et al., 2011).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER ENGINEERING 5
Filtering and power line condition measures- however, such as mechanism should be
used with a lot of care as a simple mistake can compromise the security.
Physical enclosures- having physical enclosures will assist in eliminating the risks associated
with micro monitoring devices during the time of installations and operations, for instance,
microphones (Broy et al., 2014).
Besides, jamming the emitted channel with noise can also prove essential in avoiding the
side channel noise. This can be done by introducing a random delay for purposes of deterring the
timing attacks while utilizing multiple measurements in the process of analysis.
Designing of isochronous software’s which can run at a constant amount of time devoid of the
secret values can also be of significant application. This is mostly for cases whereby targets have
quantized discrete clock cycles. In this manner, timing attacks become impossible (Bruyninckx,
2019).
Also, designing software which makes the data security can also be beneficial, as the
execution path will be independent of the secret values such that all the conditional branches rely
only on the information present at the public.
Cryptographic code- these codes help in monitoring the cache and restricting it to memory
application on the only predictable way
Finally, one general countermeasure which is lo applicable is the masking countermeasure- the
primary aim of this measure is avoiding manipulation of sensitive data while manipulating only a
set of variables known as "shares." (Buczak & Guven, 2015)
Document Page
CYBER ENGINEERING 6
Question 2
SOLUTION
Provided Data
Expected FM carrier frequency = 96MHz
Expected frequency deviation = 20 KHz.
carrier frequency of A narrow band FM generator= 200KHz
Adjustable frequency deviation range = 9 to 10 Hz.
Adjustable oscillator frequency range = 9 to 10MHz.
A bandpass filter with any center frequency,
Available frequencies = frequency doubles.
In this case, the NBFM generator generates fc1= 200 kHz. Also, only frequency doubles are
present, implying that: M1. M2 = 2’’
Document Page
CYBER ENGINEERING 7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER ENGINEERING 8
Document Page
CYBER ENGINEERING 9
Block diagram of the indirect FM modulator
Fig 1: Indirect FM Modulator
Remote Monitoring of Attendance System based on RFID using GSM Network
. Summary
RFID is a radio frequency wireless identification technique used for the identification of
physical objects such as human or products using radio frequency (Cherdantseva et al., 2016). As
compared to other methods, RFID technology is much faster, safe, and secure. Our proposed
network communication model works by employing a GSM cellular network to monitor the
attendance of students in the classroom remotely (Carr, 2016).
Introduction
Over time, teachers have relied on student attendance register to monitor the attendance
of the students. However, it is a time-consuming process which sometimes becomes difficult to
control. The RFID will thus act as a solution to this menace (Cini, A., 2016). Primarily, it will be
Document Page
CYBER ENGINEERING 10
significant in universities, colleges, and schools. Some associated benefits of using RFID
technique incorporated with the GSM to monitor the student's attendance is that it is safe, secure,
and take a short time. The students will only be required to place their RFID card on a reader,
which will detect their attendance (Enokido & Takizawa, 2011).
The attendance is deemed to be accurate since the system operates on a real-time basis.
The system will be linked to the computer by the help of an RS232 which will store the database
which has been collected (Pardini & Parreiras, F.S., 2016). A GSM short message service aid the
proposed system to carry out remote data monitoring. Vb language software is used to write the
communication as it assists in achieving real-time remote data synchronization and control of
serial interface port.
Design
Hardware structure
The hardware system will be composed of the following parts
Connecting wires
Sim card (Pardini, et al., 2017).
Power supply
Sim 300 gsm nodule with antenna
Rfid reader (Fielder et al., 2016

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER ENGINEERING 11
RFID Characteristics
The frequency of the radio frequency identification ranges between the rates of 3 KHz to
300 GHz, hence it is regarded as a wireless technique used to identify various objects. It transfers
data between channels by means of electromagnetic and electrostatic coupling, encoding
techniques, and multiple modulations between the reader and the chip. The transfers of dynamic
changes without acceleration define the electrostatic. On the other hand, modulation relates to
the introduction of a carrier frequency in the transfer of data over longer distances. Encoding as
well refer to the conversion of data into another form from o particular form (Gupta, 2016).
Some of the encoding schemes which are popular includes. NRZ encoding, Polar form,
Manchester encoding, Non-Polar structure, among others. The RFID is composed of two
components, which will be explained in the section below.
RFID Tag
RFID Tag is an IC chip which is composed of exclusive electronic or hexadecimal
product code (EPC). The terms unique in this case implies that the codes are very independent of
each or, and one code does not rely on the ones. Hence, it is also regarded as the RFID key
meaning that it will only act as an opener to just some particular lock (Sallehuddin et al., 2018).
Document Page
CYBER ENGINEERING 12
This RFID tag is grouped into two groups, namely: passive and active tags.
The active tags exit naturally such that they do not need any external device or source as they
already have an inbuilt battery which is able to transmit frequencies over greater distances with
high precision of detection. On the other hand, passive tags do not pose the inbuilt batteries.
Thus, they will transmit only low frequencies that can be detected within just a smaller radius.
The diagram below illustrates an RFID tag or find the key (Harrison et al., 2016).
RFID reader
GSM Characteristics
Originally, GSM was the initials for particular grope mobile, acronyms representing the
name of a group tasked with evaluating the communication standards in European
communication systems. It was however later changed to global system for mobile
communication, and its application was officially launched in 1991 for commercial purposes.
Document Page
CYBER ENGINEERING 13
Advantageously, it designed a digital system by the bits of help of TDMA technology, on which
it operates up to data, with serious of upgrades (Jeschke et al., 2017).
: GSM Architecture
The diagram below illustrates the architecture of the global system for mobile
The diagram below illustrates the gsm module i.e., sim300

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER ENGINEERING 14
The various data transmission rates include 2400bps, 4800bps, 9600bps, or 14400bps.
and the data transmission is aided by the help of at command sets. THE SIM300 achieves the
standards RS232 INTERFACE. This serial interface is directly linked to the serial interface of
the PC (Manrique, et al., 2016).
The Structure of software designed for the Remote Monitoring System
The software which is meant for this system is the Microsoft Visual Basics 6.0.
Transmission of the SMS is achieved through the text mode. For the purpose of communication,
the data is utilized. For instance: upon keying in AT+CMGF=1: the selection of text mode of
SMS gets enabled. Transmission of the message is activated by keying in Ctrl+ Z. whereas
AT+CMGS=”mobile number”: provides us with the details of the number that was used to send
the message on the given mobile number (Mbanaso, et al., 2015).
Program and database
The backbone for the system is the database, as it contains all the information in regards
to a specific identity, for instance, it has information on matters such as the name, identity
number, password, mobile number as well as the attendance record. For the database back end,
we will employ an MS Access while for the front end of the user, will employ Microsoft vb. In
the system used for the front purpose, triple from are designs. The primary trend has buttons,
labels, ado data connection, data grid, time, textbox, swells as the components of the MSCOMM.
Data which has been retrieved from the data base by the ado data connection is transmitted for
viewing on the data grid (Rajkumar and Stankovic, 2010).
Relaying and reception of data will be aided by The UART (RS-232).
The data from the RFID will then be sent to the system, and if it in case it corresponds to the data
on the database, a success message will be updated on the new records. The update or add button
Document Page
CYBER ENGINEERING 15
will then appear as well as the addition of a record followed by relaying of the message. Below
are the screenshots for the designs in vb.
Following are the screens designed in VB:
Document Page
CYBER ENGINEERING 16
Conclusion
The system that has been designed details information on the client who has made an
attendance, with his attendance taken and recorded. In addition, the total number of attendance is
also indicted. This kind of system is very beneficial in the monitoring of class attendance of
students, more so in large populations. There are other multiple benefits which are associated
with this kind of system; for instance, a parent will be able to monitor the attendance of their
children as well as the monitoring of the employee's participation. It also helps in lessening the

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER ENGINEERING 17
compilation of the attendance registers or books. The employees as well will be able to quickly
determine or known in prior the amount of money that they are going to receive at the end of the
working month, depending on the working hours that he attended. This technique will mostly be
of great significance in institutions where the teachers have to deal with a large group of students
(Ramirez-Mendoza et al., 2017).
A protocol for Identification of a person when enters into the building .
A person or strange who enters any building would naturally raise the alarm, even if the
person has no evil motives. Hence, this will be treated as a suspicious activity since no one
knows the purposes of the person. Further, the person can be a terrorist or a thief, who would
shoot at anyone upon attempts of raising the alarm. Therefore, in such a case, the protocol that
seems fit includes
First, do not intervene immediately without any objective, contact the police, and then
provide information relating to the below information.
Name of the building
The exact location that the person is at (Ramirez-Mendoza et al., 2017)
A detailed description of the situation, for instance, the story of the individual, in aspects
of clothes, skin color, height, size, and hair color.
Also, you need to be aware of the things that the person has carried,
Even the direction in which the person emanated from.
You are then advised to keep a safe distance from the person
Do not make an effort of removing the person yourself, or even talking to the person.
Wat until the police or any security personnel arrives at the place. You can then proceed
together with the security personnel into interrogating the person.
Document Page
CYBER ENGINEERING 18
Protocol for handling an emergency scenario: emergency will be an earthquake or earth
tremor.
During the Earthquake, you find yourself inside a building,
Keep calm and do not panic. Remind others as well to stay calm. Further, do not attempt
to go outside.
DROP, COVER & HOLD— protect yourself by going underneath a table, or seeking
cover against a wall. Ensure to protect your neck, and head using your arms.
Stay away from the windows, and have some protection from the falling objects such as
bookcases, shelves, cabinets as well as other furniture’s (Ramirez-Mendoza et al., 2017).
Do not run, stay put, and be still on the ground until the shaking comes to a halt.
When outside a building:
Get away near falling objects such as retaining walls, power poles, and structures
Keep yourself away from the power lines
Shift to an open area and ensure you do not come into contact with either power lines
After The Shaking Stops
After an earthquake has occurred, there is likeliness of aftershocks, which can take place for a
day or a couple of days. Always be ready and prepared for them. Some of the actions to
undertake in the process of aftershocks include
Carefully getting up taking note of the environment around you as it might be damaged
and hazardous (Harrison et al., 2016):
If you have no injuries, check for those that have got injures and administer the first aid.
Document Page
CYBER ENGINEERING 19
Check for the safety hazards areas which might compromise the integrity of the structure,
for instance: smoke, chemical spills, fires, or gas leaks. If there are signs of insecurity to
the building, begin the evacuation strategies.
If possible, switch off the potential risk sources off before evacuating
, the evacuation, ensure to report to the designated building assembly area in Parking Lot
•. From there, you will be able to be guided further.
: However, if you are stuck and in danger, immediately call your immediate supervisor,
if he is not picking, then contact another supervisor as well as colleagues.
Specify your location as well as the physical status
Specify you’re of various structures around you (Harrison et al., 2016).
For life-threatening situations or injuries Call the Department of Public Safety (DPS), and
make a report
Since the person you have notified may not be quick in response, inform nay of the
building emergency response team at the assembly area.
Make use of the mobile phone only on urgent matters.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER ENGINEERING 20
References
Asaner, U.B. and Elibol, A., 2018. Low-cost IoT design and implementation of a remote food
and water control system for pet owners. Hittite Journal of Science & Engineering, 5(4),
pp.317-320.
Bada, M., Sasse, A.M. and Nurse, J.R., 2019. Cyber security awareness campaigns: Why do they
fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Baheti, Radhakisan, and Helen Gill. "Cyber-physical systems." The impact of control
technology 12, no. 1 (2011): 161-166.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, pp.51-61.
Bodeau, D. and Graubart, R., 2011. Cyber resiliency engineering framework. MTR110237,
MITRECorporation.
Bowring, J.F., McLean, N.M. and Bowring, S.A., 2011. Engineering cyber infrastructure for U‐
Pb geochronology: Tripoli and U‐Pb_Redux. Geochemistry, Geophysics,
Geosystems, 12(6).
Broy, M. and Schmidt, A., 2014. Challenges in engineering cyber-physical
systems. Computer, 47(2), pp.70-72.
Bruyninckx, H., 2019. Composable, explainable and verifiable cyber-physical systems-of-
systems: meta models and best practices for resilient holonic architectures.(With a special
focus on robotic systems).
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
pp.1153-1176.
Document Page
CYBER ENGINEERING 21
Carr, M., 2016. Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), pp.43-62.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016.
A review of cyber security risk assessment methods for SCADA systems. Computers &
security, 56, pp.1-27.
Cini, A., 2016. Countermeasures to insider cyber threats for Turkish General Command of
Gendarmerie. Naval Postgraduate School Monterey United States.
Enokido, T. and Takizawa, M., 2011. Purpose-based information flow control for cyber
engineering. IEEE Transactions on Industrial Electronics, 58(6), pp.2216-2225.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI global.
Harrison, R., Vera, D. and Ahmad, B., 2016. Engineering methods and tools for cyber–physical
automation systems. Proceedings of the IEEE, 104(5), pp.973-985.
Jeschke, S., Brecher, C., Meisen, T., Özdemir, D. and Eschert, T., 2017. Industrial internet of
things and cyber manufacturing systems. In Industrial Internet of Things (pp. 3-19).
Springer, Cham.
Manrique, J.A., Rueda-Rueda, J.S. and Portocarrero, J.M., 2016, December. Contrasting internet
of things and wireless sensor network from a conceptual overview. In 2016 IEEE
International Conference on Internet of Things (iThings) and IEEE Green Computing
and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing
(CPSCom) and IEEE Smart Data (SmartData) (pp. 252-257). IEEE.
Document Page
CYBER ENGINEERING 22
Mbanaso, U., Chukwudebe, G. and Atimati, E., 2015. Nigeria's evolving presence in
cyberspace. The African Journal of Information and Communication, 2015(15), pp.106-
113.
Pardini, D.J., Heinisch, A.M.C. and Parreiras, F.S., 2017. Cyber security governance and
management for smart grids in brazilian energy utilities. JISTEM-Journal of Information
Systems and Technology Management, 14(3), pp.385-400.
Pardini, D.J., Heinisch, A.M.C. and Parreiras, F.S., 2017. Cyber security governance and
management for smart grids in brazilian energy utilities. JISTEM-Journal of Information
Systems and Technology Management, 14(3), pp.385-400.
Rajkumar, R., Lee, I., Sha, L. and Stankovic, J., 2010, June. Cyber-physical systems: the next
computing revolution. In Design Automation Conference (pp. 731-736). IEEE.
Ramirez-Mendoza, R.A., Morales-Menendez, R., Iqbal, H. and Parra-Saldivar, R., 2018, April.
Engineering Education 4.0:—proposal for a new Curricula. In 2018 IEEE Global
Engineering Education Conference (EDUCON) (pp. 1273-1282). IEEE.
Ramirez-Mendoza, R.A., Morales-Menendez, R., Iqbal, H. and Parra-Saldivar, R., 2018, April.
Engineering Education 4.0:—proposal for a new Curricula. In 2018 IEEE Global
Engineering Education Conference (EDUCON) (pp. 1273-1282). IEEE.
Sallehuddin, N.F., Jamaluddin, M.H., Kamarudin, M.R., Dahri, M.H. and Anuar, S.U.T., 2018.
Dielectric Resonator Reflectarray Antenna Unit Cells for 5G Applications. International
Journal of Electrical and Computer Engineering, 8(4), p.2531.
.
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]