4-1 Project Report
4-1 Project Report
In
By
T. DEEP (170040841)
1|Page
K L (Deemed to be) University
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
DECLARATION
This is certify that the project based report entitled “ANALYSIS OF DIURNAL
AND SPATIAL VARIABILITY OF LIGHTNING ACTIVITY IN SOUTHERN
INDIA” is a bonafide work done and submitted by G. Sathya Jahnavi (170040268), T.
Deep (170040841), N. Lohith Kumar (170041057) in partial fulfillment of the
requirements for the award of the degree of BACHELOR OF TECHNOLOGY in
Department of Electronics And Communication Engineering during the academic year
2021-2022.
T. DEEP (170040841)
2|Page
K L University
(2021-2022)
K L (Deemed to be) University
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
CERTIFICATE
This is certify that the project based report entitled “ANALYSIS OF DIURNAL
AND SPATIAL VARIABILITY OF LIGHTNING ACTIVITY IN SOUTHERN
INDIA” is a bonafide work done and submitted by G. Sathya Jahnavi (170040268), T.
Deep (170040841), N. Lohith Kumar (170041057) in partial fulfillment of the
requirements for the award of the degree of BACHELOR OF TECHNOLOGY in
Department of Electronics And Communication Engineering during the academic year
2021-2022.
3|Page
ACKNOWLEDGEMENT
The success in this project would not have been possible but for the timely help and
guidance rendered by many people. Our wish to express my sincere thanks to all those
who has assisted us in one way or the other for the completion of my project.
Our greatest appreciation to my guide Dr. I. Govardhani, Professor, Department of
Electronics & Communication Engineering which cannot be expressed in words for his
tremendous support, encouragement and guidance for this project.
We express our gratitude to Dr. Suman Maloji, Head of the Department for Electronics &
Communication Engineering for providing us with adequate facilities, ways and means by
which we are able to complete this Project Based Lab.
We thank all the members of teaching and non-teaching staff members, and also who have
assisted me directly or indirectly for successful completion of this project.
Finally, I sincerely thank my parents, friends and classmates for their kind help and co-
operation during my work.
T. DEEP (170040841)
4|Page
ABSTRACT
Lightning strokes, whether direct or indirect, are among the main causes of
power quality disturbances. In order to assist the analysis of lightning effects,
we present an integrated database analysis, including local electric field
measurement, information from lightning location status, and utility
databases.
These thunderstorms have been very much devastating for tropical regions of
southern parts of India. So, in order to maintain preventive measure to this
situation, a brief data analysis on data recorded by lightning detectors have
been very much effective.
5|Page
To prevent damage due to lightning, every system or organization is using
lightning arrestors, to simply ground the charge caused by lightning. There is
no research done towards the damage done to the signal transmission before
grounding the lightning. We simply can't ignore the fact the certain amount of
damage is done to the signal transmission.So, we decided work in this
direction as there is no research and background work done previously in this
area.
So, the main objective of our work is to perform data analysis on real-time
lightning detector data. To find specific parameters from our data (electric
field). Compare it with real-time signal transmission. And find out how much
deviation is present in signal transmission due to electric field due to
lightning.
6|Page
Table of Contents
CONTENTS PAGE
NO.
CHAPTER 1: LIGHTNING ACTIVITY & IT’S DETECTION 9-24
INTRODUCTION 10-11
TYPES OF LIGHTNING 12-13
LIGHTNING PHENOMENON 14
LIGHTNING EFFECTS 15-19
LIGHTNING DETECTION 20-23
CHALLENGES IN LIGHTNING DETECTION 24
CHAPTER 2: LIGHTNING EFFECT ON 25-35
COMMUNICATION
INTRODUCTION 26
EFFECT ON IONOSPHERE ATMOSPHERE ZONE 27-28
ELECTRIC AND MAGNETIC FIELD PRODUCED 29-30
FIELD CHARGES REPRESENTATION 31-32
CALCULATION METHODS FOR THESE CHARGES 33-35
CHAPTER 3: OUR PROJECT 36-5
INTRODUCTION TO OUR PROJECT 28-33
PROBLEM DEFINITION 34
LITERATURE REVIEW 35-37
IMPLEMENTATION METHODOLOGY 38
FLOW CHART 39
ENCODING CODE 40-42
OUTPUT-1 43
DATA OBFUSCATION TECHNIQUE ALGORITHM 44-45
OUTPUT-2 50
CONCLUSION 53
REFERENCES 54
7|Page
CHAPTER – 1
8|Page
LIGHTNING ACTIVITY AND IT’S
DETECTION
Introduction:
Lightning is one of the most beautiful displays we can see in our nature which
can certainly be deadly at times. It is a sudden electrostatic discharge between
the electrically charged regions of the cloud. As we know that it occurs due to
electrically charged storms but still the method of charging of clouds remains
elusive.
In ancient times when amber was rubbed with fur, it attracted light-weighted
objects such as hair. If we change our cloth in the dark we will see or hear
some kind of spark. In 1752, one of the American scientists Benjamin
Franklin said that the phenomenon of sparks from the clothes and lightning is
the same but people did not agree with him and it took 100 years to realize
the truth.
9|Page
We have seen electric sparks at many places for example sometimes we see
electric sparks in electric poles when the wires become loose. We also see
sparks in the plug if the connections in the socket are loose. In ancient times
people did not understand the cause of lightning, and they thought that it is
some kind of wrath of gods which is visiting them.
As a result of this process, the positive charges collect near the upper edge
and the negative charges accumulate near the lower edge of the cloud and
also near the ground.
As the charge gets accumulated, its magnitude becomes very large. Water
droplets in the air act as a conductor of this charge.
Most, if not all, lightning flashes produced by storms start inside the cloud. If
a lightning flash is going to strike ground, a channel develops downward
toward the surface. When it gets less than roughly a hundred yards of the
ground, objects like trees and bushes and buildings start sending up sparks to
meet it. When one of the sparks connects the downward developing channel,
a huge electric current surge rapidly down the channel to the object that
produced the spark. Tall objects such as trees and skyscrapers are more likely
than the surrounding ground to produce one of the connecting sparks and so
are more likely to be struck by lightning. Mountains also make good targets.
However, this does not always mean tall objects will be struck. Lightning can
strike the ground in an open field even if the tree line is close by.
10 | P a g e
Types of Lightning:
11 | P a g e
Lightning is formed by energy transferred from positive and negative charges
in clouds or the ground. There are three primary types of lightning which
include: cloud-to-ground (the most commonly known type), cloud-to-air, and
cloud-to-cloud.
With cloud-to-ground lightning, the rapid discharge of lightning is a channel
of negative charge that is attracted to the positively charged ground. Once the
two charges are connected by the stepped leader (the initial invisible
connection between the two charges) and a positive return stroke from the
positively charged ground, the electrical current that is seen as lightning
forms. Sometimes, the cloud can be positively charged, and the ground
negatively charged, but this doesn’t occur as often. The NSSL states that
cloud-to-air and cloud-to-cloud lightning have 5 to 10 times more lightning
strikes than cloud-to-ground. (Below is a picture of cloud-to-ground
lightning.)
Cloud-to-air lightning is described by the National Weather Service (NWS)
as “lightning that occurs when the air around a positively charged cloud top
reaches out to the negatively charged air around it.” In other words, these
lightning strikes are an attraction between clouds and air that are opposite
charges and never reach the ground. Most of the time though, the positive
charge forms atop of a storm cloud and is attracted towards a negative charge
in the air nearby. (Below is a picture of cloud-to-air lightning.)
12 | P a g e
Lastly, there is cloud-to-cloud lightning. The NWS describes this type of
lightning as “lightning that occurs between two or more separate clouds.”
This lightning forms by one cloud being a mostly negative charge and another
being a mostly positive charge, causing the attraction between the two. The
NSSL explains that a type of cloud-to-cloud lightning called a “spider
lightning” are formed underneath stratiform clouds (low-level, thin clouds
that may produce a light drizzle) and flashes travel horizontally. (Below is a
picture of cloud-to-cloud lightning.)
There are a few more lightning types that aren’t necessarily categorized as
part of the three main types of lightning. These lightning types include: red
sprites, blue jets, and elves. Red sprites usually occur above a large
thunderstorm and are normally a red color. Red sprites usually occur during a
cloud-to-ground lightning strike. They can be seen from space as they extend
up to 60 miles above a cloud top. They can reach all the way to the
mesosphere! Blue jets also form above a storm cloud but, unlike red sprites,
they are not associated with cloud-to-ground lightning. They reach up to 22-
35 miles above a cloud and can be seen by aircraft. They can sometimes just
reach the stratosphere. Lastly, elves are described as a glowing disk that can
extend up to 300 miles. This upper-atmospheric lightning can reach the
ionosphere. The Space Shuttle discovered elves in 1992.
Lightning Phenomenon:
13 | P a g e
In a fraction of a second, lightning heats the air around it to incredible
temperatures—as hot as 54,000 °F (30,000 °C). That's five times hotter than
the surface of the Sun!
If we are watching the sky, we see the lightning before we hear the thunder.
That is because light travels much faster than sound waves. We can estimate
the distance of the lightning by counting how many seconds it takes until we
hear the thunder. It takes approximately 5 seconds for the sound to travel 1
mile. If the thunder follows the lightning almost instantly, you know the
lightning is too close for comfort!
Scientists use data from GOES-R series satellites, along with data from the
Lightning Imaging Sensor on NASA's Tropical Rainfall Measuring Mission
satellite, to study lightning. This complete picture of lightning at any given
time will improve "now-casting" of dangerous thunderstorms, tornadoes, hail,
and flash floods.
Lightning Effects:
14 | P a g e
Different effects
The effects of lightning are those of a high-strength impulse current that
propagates initially in a gaseous environment (the atmosphere), and then in a
solid, more or less conductive medium (the ground):
15 | P a g e
Direct effects
Thermal effects: These effects are linked to the amount of charge associated
with lightning strikes. They result in fusion points melting holes of varying
sizes at the point of impact of materials with high resistivity. For material
which is a poor conductor, a large amount of energy is released in the form of
heat. The heating of water vapour contained in the material results in very
high abrupt localized pressure which may cause it to explode.
16 | P a g e
Luminous effects: A lightning strike nearby violently sensitizes the retina of
an observer. The eye is dazzled and vision is lost for several long seconds.
17 | P a g e
Indirect effects
The ever increasing use of sensitive electronics means that electrical
equipment is becoming more and more vulnerable to transient over voltages
caused by lightning. The over voltages are either of atmospheric origin or
industrial origin. The most harmful are however atmospheric over voltages
which are the result of three main effects:
18 | P a g e
Rising up from the ground: When a lightning strike hits, an overvoltage can
rise up from the ground attempting to find a more favorable path to ground.
This can, in part, be dealt with through a) equipotential bonding between the
metal structures and ground of the entire installation of a structure. b)
overvoltage protection installed on services.
19 | P a g e
Lightning Detection:
These methods differ in how they detect lightning and some are more
sophisticated than others.
For example, acoustic lightning detection simply refers to hearing thunder to
detect lightning. We wouldn’t want people or business to plan from this
detection method, so we don’t consider it operational.
We’ll leave that one out as we examine some reliable, operational examples
of optical and electric field detection. These methods are the best way to
perform accurate lightning detection of real-time lightning strikes.
Optical
When we say they’re geostationary, that just means they don’t move. So,
these detectors are continuously looking at the same spot.
20 | P a g e
There is one that looks at the eastern U.S., Atlantic Ocean, and South
America, and there is another in the west that looks at Hawaii and the Pacific
Ocean.
The National Oceanic and Atmospheric Administration (NOAA) operates this
advanced piece of lightning detection equipment.
Electric Fields
Thunderstorm Development
Understanding how lightning detection works starts with understanding how
thunderstorms (and lightning) form.
21 | P a g e
Lightning is an electric current that starts in a cloud. When the ground is hot,
it heats the air above it. As the hot air rises, water vapor cools and forms a
cloud.
As air continues to rise the cloud gets bigger and bigger. In the top of the
clouds the temperature is below freezing and water vapor turns to ice.
Now this is what we consider a thundercloud. The ice particles then bump
into each other as they move around and build up electric charges.
Eventually, the entire cloud fills up with these electrical charges. The lighter,
positive charges form at the top of the cloud while the heavier, negative
charges sink to the bottom.
When these charges grow large enough, a giant spark occurs between them
within the cloud. We call this in-cloud lightning.
Some lightning happens in between the cloud and the ground. We call
this cloud-to-ground lightning.
Total lightning is the combination of all in-cloud and cloud-to-ground
lightning strikes.
How To Detect Lightning – Lightning & Radio waves
There are a lot of different bands within a radio we can use to detect
lightning, including:
22 | P a g e
Low frequency (LF)
Mid frequency (MF)
Very high frequency (VHF)
Our Earth Networks Total Lightning Network uses MF. VHF is best for
physics and scientific research, not operational lightning detection.
23 | P a g e
Challenges in Lightning Detection:
Each system used for lightning detection has its own limitations.
These include -
24 | P a g e
CHAPTER – 2
25 | P a g e
Introduction:
The partially ionized plasma of the ionosphere, which ranges from about 60
to 1,000 km, can "bounce" radio signals transmitted from the Earth. This
property enables them to travel long distances over the horizon and can
distort radio signals traveling to satellites important to communications,
navigation or national security.
26 | P a g e
EFFECT ON IONOSPHERE
ATMOSPHERIC ZONE:
Due to the low electron density in the lower ionosphere, active probing of
its electron distribution is difficult. Therefore, the perturbative effects from
thunderstorms are poorly understood.
Tropospheric thunderstorms create ionospheric disturbances through the
influence of the electric field associated with the lightning. These findings
indicate that enhanced electron attachment is responsible for the reduction in
electron density.
27 | P a g e
sources and impacts of ionospheric disturbances aids the Laboratory's
fulfilment of its national security mission.
28 | P a g e
Electric and Magnetic Field Produced:
29 | P a g e
Electrical field generation
As a thundercloud moves over the surface of the Earth, an equal electric
charge, but of opposite polarity, is induced on the Earth's surface underneath
the cloud. This is known as an image charge. The induced positive surface
charge, when measured against a fixed point, will be small as the
thundercloud approaches, increasing as the centre of the storm arrives and
dropping as the thundercloud passes. The referential value of the induced
surface charge could be roughly represented as a bell curve.
The oppositely charged regions create an electric field within the air between
them. This electric field varies in relation to the strength of the surface charge
on the base of the thundercloud – the greater the accumulated charge, the
higher the electrical field.
30 | P a g e
Field Charges Representation:
Charge Separation -
Meanwhile, downdrafts transport hail and ice from the frozen upper regions
of the storm. When these collide, the water droplets freeze and release heat.
This heat in turn keeps the surface of the hail and ice slightly warmer than its
surrounding environment, and a "soft hail", or "graupel" forms.
When this graupel collides with additional water droplets and ice particles, a
critical phenomenon occurs: Electrons are sheared off of the ascending
particles and collect on the descending particles. Because electrons carry a
negative charge, the result is a storm cloud with a negatively charged base
and a positively.
Field Generation -
However, the atmosphere is a very good insulator that inhibits electric flow,
so a TREMENDOUS amount of charge has to build up before lightning can
occur. When that charge threshold is reached, the strength of the electric field
overpowers the atmosphere's insulating properties, and lightning results.
The electric field within the storm is not the only one that develops. Below
the negatively charged storm base, positive charge begins to pool within the
surface of the earth (see image left). This positive charge will shadow the
storm wherever it goes, and is responsible for cloud-to-ground lightning.
However, the electric field within the storm is much stronger than the one
between the storm base and the earth's surface, so most lightning (~75-80%)
occurs within the storm cloud itself.
32 | P a g e
Calculation Methods for These Charges:
In that case, the magnetic fields and electric fields are related through the
free-space impedance (or through the speed of light) and the Poynting vector
is directed radially outward from the origin. When the return stroke speed is
less than c (typical values range from c/3 to 2c/3), the electric and magnetic
field waveforms within a few tens of kilometers are quite different from each
other and from the causative current waveform.
Threshold times of 10% and 20% of the peak provide very similar results
compared to those corresponding to the peak of the first derivative of the
magnetic field, and the threshold time exceeds 50% of the initial rising.
35 | P a g e
CHAPTER - 3
OUR PROJECT
36 | P a g e
Introduction to Our Project:
Conclusion:
37 | P a g e
Mono crypt SSA is based on obfuscation technique. According to the proposed
Mono crypt SSA technique, the data are obfuscated before they are forwarded to the
cloud storage. This Proposed technique not only ensures the confidentiality of the
data, but also reduces the size of the plaintext. The already existing techniques are not
reducing the size of data after obfuscation. Data storage is more effective in storing
data from the user.
It provides the SMEs with cost efficient use. SMEs do not have the complete
infrastructure needed to hold their data with their premises. Data outsourcing helps
small and medium-sized businesses manage their data efficiently through cloud
storage. Data outsourcing has Cloud storage data protection problems. The proposal is
for the SSA, namely Mono crypt. Mono crypt SSA is built on obfuscation technique.
By using this proposed technique, the data are obfuscated until it is forwarded to the
cloud storage. This technique stifles numerical values. Mono crypt SSA blur the
plaintext into ASCII character code, thus reducing the size of the blurred text. The
proposed technique not only preserves the confidentiality of the data but also
decreases the size of the plaintext. Existing techniques do not minimize data size after
obfuscation. The simulation is done with various data sizes and output is measured
based on the time taken to obtuse. From the results obtained, it is obvious that the
proposed Mono crypt provides maximum protection in the minimum time for
outsourced data.
References:
38 | P a g e
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and
emerging IT platforms: Vision, hype, and reality for delivering computing as
the 5th utility. Elsevier Science Publishers; 2009; 25(6):599–616.
https://www.geeksforgeeks.org › encode-ascii-string-base-64-format
Data Obfuscation 2013.Available from:
http://www.techopedia.com/definition/250 15/data obfuscation do
Robertson C. PDF obscuritu Aprimer. 2012.
Accessible from: https://www.sans.org/perusing
room/whitepapers/building/pdf-jumbling preliminary 34005
39 | P a g e