Page 70 - tech fest 2025 ב״ש חוברת תקצירים
P. 70
70
Audio Analysis of a Drop Impact Water Pool
EEE-B-04
Doron Elbaz; doronrinaelbaz1@gmail.com
Advisors: Dr. Dima Bykhovsky1, Dr. Merav Arogeti1, Dr. Etan Fisher1 1SCE - Shamoon College of Engineering, Be’er-Sheva
This project investigated the acoustic signals generated by water-drop impact and its subsequent motion in a water pool. We analyzed both the physical phenomena resulting from the impact and the drop's properties. The goal was to develop an accessible, cost-effective, and accurate tool for identifying the drops' volume and impact velocity. Recordings were conducted under various controlled conditions, including quiet ambient settings and artificially noisy environments. Acoustic analysis was performed using elementary signal analysis for a single drop, while artificial intelligence, machine learning, and deep learning were applied to data from many drops. High accuracy was achieved in predicting drop characteristics, highlighting the potential for practical applications in leak detection, as well as preventing water damage in industrial systems and machines.
Keywords: acoustic analysis, artificial intelligence, drop impact, drop's properties, leak detection
Mobile Electronic Warfare System
EEE-B-05
Alon Talgouker; alonasdf1@gmail.com Itay Matzri; itai123453@gmail.com
Advisor: Mr. Amit Twik
SCE - Shamoon College of Engineering, Be’er-Sheva
As seen in the events of October 7th in the Gaza envelope and clashes with Hezbollah in Lebanon, adversaries have used encrypted tactical communication for operational coordination, gaining a strategic battlefield advantage. The key challenge is identifying, monitoring, and disrupting these transmissions. This project aimed to prevent the enemy from exploiting these communication networks to their advantage. The system incorporated signal reception, frequency analysis, and precise interference techniques to neutralize enemy coordination. Additionally, innovative methodologies were explored to induce unexpected operational disruptions in target devices over time. The system was able to disrupt the operation of the endpoint device and prevent it from maintaining a stable connection to the information source.
Keywords: communication, disruptions, monitoring