Projects, Thesis, Final Year Projects, IT, MBA, Seminar

Paper Presentation On IMAGE PROCESSING For CSE & IT



A novel method for image processing and pattern recognition using Discrete Fourier Transformations on the global pulse signal of a pulse-coupled neural network (PCNN) is presented in this paper. The PCNN is an image transform that removes “unimportant” details while improving the overall quality of the image. It may also provides substantial noise smoothing without losing image pattern and shape information. We describe the mathematical model of the PCNN and an original way of analyzing the pulse of the network in order to achieve better quality of the image ,scale and translation-independent recognition for isolated objects. During the last few years there was a shift of the emphasis in the artificial neural network community toward spiking or pulse-coupled neural networks. Motivated by biological discoveries, many studies consider pulse coupled neural networks with spike-timing as an essential component in information processing by the brain. Pulse-coupled neural networks (PCNN) were introduced as a simple model for the cortical neurons in the visual area of the cat's brain.These neural models are proposed by Eckhorn and Johnson.

Image Compression & Denoising based on Tree Adapted Wavelet Shrink For CSE



An algorithm is described for simultaneously compressing and denoising images. The algorithm is called tree-adapted wavelet shrinkage and compression (TAWS-Comp). TAWS-Comp is a synthesis of an image compression algorithm, adaptively scanned wavelet difference reduction (ASWDR), and a denoising algorithm, tree-adapted wavelet shrink age (TAWS). As a Compression procedure, TAWS-Comp inherits all of the advantages of ASWDR: its ability to achieve a precise bit-rate assigned before compressing, its scalability of decompression, and its capability for enhancing regions-of interest. Such a full range of features has not been available with previous compressor plus denoiser algorithms. As a denoising procedure, TAWS-Comp is nearly as effective as TAWS alone. TAWS has been shown to have good performance, comparable to state of the art denoisers. In many cases, TAWS-Comp matches the performance of TAWS while simultaneously performing compression. TAWS-Comp is compared with other combined compressor/denoisers, in terms of error reduction and compressed bit-rates. Simultaneous compression and denoising is needed when images are acquired from a noisy source and storage or transmission capacity is severely limited (as in some video coding applications). An application is described where the features of TAWS-Comp as both compressor and denoiser are exploited.
Keywords: image compression; image denoising; signal processing; video coding.

PPT On NETWORK SECURITY AND QUANTUM CRYPTOGRAPHY For CSE


The question, “How to build a secure system?” baffled everyone who are currently enjoying the services provided by recent trends and technological developments achieved in the field of computers, especially the “Internet”. No doubt, gaining access to Internet and its services is quite simple, by just using gateways, dial-up connections, and ISP. But beneath this, the problems of security come as the information may be lost, stolen or corrupted. So, if the question “Why should one hack my PC?” is always backing at your mind, then there is a definite scope to challenge the “Bad guys” who want to break down the layers of security defenses. But there is no single foolproof solution for building such a secured system. Our security has to be a layered structure and that should start all the way from the selection of the Operating System even.In this paper we mainly concentrated on Cryptography Science. We briefly discussed various Cryptographic Systems i.e., Symmetric and Asymmetric key Cryptography and their limitations. Owing to the drawbacks of basic Cryptographic Systems, our focus turned towards Quantum Cryptography whose strength, secrecy and privacy lies in the Laws of Physics than current state of unproven mathematical assumptions in Classical Cryptography. The core of the paper contains the detailed description of the fundamentals of Quantum Cryptography and how this concept overcomes the loopholes in Conventional Cryptographic System, especially “The Key Distribution Problem”. Finally we moved over to Commercial Implementations of Quantum Cryptography paving the path to Research Scope in this arena.

The Brain Fingerprinting Technology Paper Presentation For ECE



ABSTRACT:Brain Fingerprinting is a new computer-based technology to identify the perpetrator of a crime accurately and scientifically by measuring brain-wave responses to crime-relevant words or pictures presented on a computer screen. Brain Fingerprinting has proven 100% accurate in over 120 tests, including tests on FBI agents, tests for a US intelligence agency and for the US Navy, and tests on real-life situations including felony crimes.
Why Brain Fingerprinting??? Brain Fingerprinting is based on the principle that the brain is central to all human acts. In a criminal act, there may or may not be many kinds of peripheral evidence, but the brain is always there, planning, executing, and recording the crime. The fundamental difference between a perpetrator and a falsely accused, innocent person is that the perpetrator, having committed the crime, has the details of the crime stored in his brain, and the innocent suspect does not. This is what Brain Fingerprinting detects scientifically

Paper Presentation On A Fast Simulation Approach (VLSI) For ECE

A Fast Simulation Approach for Inductive Effects of VLSI Interconnects

ABSTRACT: Modeling on-chip inductive effects for interconnects of multiGHz microprocessors remains challenging. SPICE simulation of these effects is very slow because of the large number of mutual inductances. Meanwhile, ignoring the nonlinear behavior of drivers in a fast linear circuit simulator results in large errors for the inductive effect. In this paper, a fast and accurate time-domain transient analysis approach is presented, which captures the non-linearity of circuit drivers, the effect of non-ideal ground and de-coupling capacitors in a bus structure. The proposed method models the non-linearity of drivers in conjunction with specific bus geometries. Linearized waveforms at each driver output are incorporated into an interconnect reduced-order simulator for fast transient simulation. In addition, non-ideal ground and de-coupling capacitor models enable accurate signal and ground bounce simulations. Results show that this simulation approach is upto 68x faster than SPICE while maintaining 95% accuracy.

MOTOR DRIVE SYSTEM USING FUZZY LOGIC CONTROLLER - ECE PPT



Abstract- Basically, the motor drive system comprises a voltage source inverter-fed induction motor (VSIM): namely a three-phase voltage source inverter and the induction motor. The squirrel-cage induction motor voltage equations are based on an orthogonal d-q reference-rotating frame where the coordinates rotate with the controlled source frequency. The paper presents a novel fuzzy logic controller for high performance induction motor drive system. The inputs to the fuzzy logic controller are the linguistic variables of speed error and change of speed error, while the output is change in switching control frequency of the voltage source inverter. In this paper a comparison between fuzzy logic controller and traditional PI controllers are presented. The results validate the robustness and effectiveness of the proposed fuzzy logic controller for high performance of induction motor drive. Simulink software that comes along with MATLAB was used to simulate the proposed model.

Paper Presentation on A DSP based On-Line UPS For ECE


Many facilities such as patient health care centers, data processing systems, critical telecommunication links, LAN servers, offices etc rely on uninterruptible power supplies (UPS) to maintain a continuous supply of power in case of line outage. In addition to requiring continuous power, many critical nonlinear loads are sensitive to the incoming line transients and input harmonic voltage distortion. Conventional UPS systems operate to protect against such disturbances using complex filtering schemes, often employing large passive components. Among the various UPS systems online UPS provides maximum protection to such loads against any power problems. Because of multiple power conversion stages, online UPSs have been the most complex and expensive type of systems. Today’s low cost, high performance Digital Signal Processors(DSPs) provide an improved and cost- effective solution for online UPS design, making them software controllable, adding some facilities like remote configuration and monitoring and other network management facilities. This paper presents the basic design and merits of using real time digital signal processing (DSP) control of UPS systems.

IMAGE IMPULSE NOISE SUPPRESSION - ECE Paper Presentation



This paper introduces, a new intelligent hardware module suitable for the computation of an adaptive median filter is presented for the first time. The function of the proposed circuit is to detect the existence of impulse noise in an image neighborhood and apply the operator of the median filter only when it is necessary. The noise detection procedure can be controlled so that a range of pixel values is considered as impulse noise. In this way, the blurring of the image in process is avoided, and the integrity of edge and detail information is preserved. Experimental results with real images demonstrate the improved performance. The proposed digital hardware structure is capable to process gray-scale images of 8-bit resolution and is fully pipelined, whereas parallel processing is used in order to minimize computational time. In the presented design, a 3x3 or 5x5 pixel image neighborhood can be selected for the computation of the filter output. However, the system can be easily expanded to accommodate windows of larger sizes. The proposed digital structure was designed, compiled and simulated using the Modelsim and Synthesized in Xilinx VERTEX-11. For the implementation of the system the PF10K200SRC240-1 field-programmable gate array device of the FLEX10KE device family is utilized, and it can be used in industrial imaging applications where fast processing is required. The typical clock frequency is 65 MHz.Index Terms-Field-programmable gate arrays (FPGAs), impulse noise, median filter, real-time filtering.

ECE Paper Presentation On POWER QUALITY IN ENERGY



Power electronics and power quality are irrevocably linked together as we strive to advance both board areas. With the dramatic increases over the last20 years in energy conversion Systems utilizing power electronic devices, we have seen the emergence of “power quality” as a major field of power engineering. From a Power quality impact view point, applications such as Switched Mode Power Supplies, adjustable speed drives, and FACTS are often cause for concern. From utility supply system view point, these converter-based systems can lead to Operational and life expectancy problems for other equipment , possibly not owned or operated by the same party. It was from his initial perspective that the field of power quality emerged. In most cases, the same devices and systems that create Power quality problems can also be used to solve power quality problems." Problems solving” applications such as active harmonic filters, Uninterruptible power supplies all utilize the same switching device technology as the “problem causing” applications. In this paper we first discuss what power quality is and then various Categories of power quality .Harmonics is identified as potential power quality problem. We discuss effects of harmonics and methods to minimize harmonics. Finally we discuss various IEEE Standards in case of power quality problems.

ECE PPT On POWER TRANSMISSION WITH HVDC AT VOLTAGES


The use of Ultra High Voltage Direct Current (UHVDC), i.e. voltages above the highest in use, 600 kV, has been found to be economically attractive for power blocks up to 6000 MW for distances above 1000 km, Furthermore the use of 800 kV as transmission voltage will be achievable within the near future with a limited amount of development work. None of the AC equipment, auxiliary equipment or control and protection will be affected by the increase of DC voltage. Also most of the DC equipment is easily modified for 800 kV, such as thyristor valves and DC filter capacitors. However, equipment without resistive DC grading, like bushings and converter transformers, need additional R&D and verification. Also station external insulation and line insulation must be carefully considered. In order to meet the demands, ABB has started an R&D program with the goal to develop and test equipment needed for 800 kV HVDC. Index Terms—800 kV HVDC, Bulk power transmission, Converter stations, HVDC, HVDC External insulation, HVDC Equipment, HVDC Systems, HVDC transmission economy, Insulation coordination, UHVDC.

Quantum Cryptography Making Code Unbreakable - ECE PPT


Secure communication without Eavesdropping is a major issue. Though initially Internet and other networks were built for universities , its applications have reached fields like business and e-commerce where sharing of private and critical details like credit card numbers should not exposed to attack of Eavesdropping . In recent times many schemes have been published and implemented like systems involving RSA algorithm for public key encryption which are based on unproven computational difficulty of certain mathematical functions. These schemes have been shown to break progressively over the years , leading to an increase in the complexity of the schemes used to establish a secure communication. The complexity has nowadays reached its limits ,thus hampering communications with regard to the speed . We wish to present quantum cryptography which is seen as uncrackable and a thing of not-so-far future . It relies on the cutting edge laws of physics like quantum properties of some matter (sub atomic particles ,photons) to establish a secure way to share a public key. It is still in the infant stages of development with constraints regarding duplicate channel , photon generation and recognition equipment . So there is lot of scope for study in the field encryption systems with new algorithms to break the existing ones in record time and thus paving way for quantum cryptography as the future.

WAVELET BASED EMBEDDED COLOR IMAGE CODING - ECE Paper Presentation


In this paper, we propose a simple and efficient technique for embedded color image coding. The proposed algorithm exploits inter- and intra-sub band correlations of the wavelet transformed luminance (Y) and chrominance (U and V) planes as well as the interdependency among the coefficients of the three-color planes. The coefficients of the three-color planes are linked through the composite spatial orientation trees (CSOT) having root nodes in the Y-plane only. The CSOT is defined for blocks of coefficients rather than a single coefficient. Thus, the proposed algorithm combines the features of both zero-tree and zero-block based algorithm into a single algorithm due to the use of block-tree hierarchical structure. Simulation results show the improved performance of the proposed algorithm over other state-of-the-art coders such as MPEG-4, color SPIHT (CSPIHT), color SPECK (CPECK), and JPEG-2000.

CYBERCRIMES - Paper Presentation For Civil Engineering


Today an increasing number of companies are connecting to the Internet to support sales activities or to provide their employees and customers with faster information and services. The virtual world has taken over the real one, E-business and E-commerce, which are the new mantras and electronic transactions and dominate the overall business paradigm. In this rapidly evolving e-world that depends on free flowing information, security is the major problem to be considered. Security on Internet is challenging. Security on an Internet is important because information has significant value. Implementing security involves assessing the possible threats to one’s network, servers and information. The goal is then to attempt to minimize the threat as much as possible. This developing world of information technology has a negative side effect. It has opened the door to antisocial and criminal behavior.

INGENIOUS GOVERNANCE OF BATTLE TANKS - Projects For Civil


An innovative channel for an age-old concept is what this project is all about.The receiver at the top of the tank helps to navigate the vehicle taking into consideration the proceeding and the following tanks.A GPS receiver is used to plot the precise location of tank. The destination of the tank is sketched and the direction the tank should move is passed as control signal by the microcontroller (8952).The stepper motor is controlled with the aid of the following data from the GPS receiver. Our objective primarily was to automate the vehicles so that they relieve us of our headache in sneaking our way through heavy traffic. As a primary step we have tried to implement this automation in a battle tank where driving the vehicle is relatively simple. Besides the battle tank does not have a steering. All that the battle tank uses for its driving are the two tracking sticks.

ELECTRICAL ENERGY (WTEE) TECHNOLOGY Civil Projects

NON CONVENTIONAL ENERGY SOURCES WASTE TO ELECTRICAL ENERGY (WTEE) TECHNOLOGY GENERATING WEALTH FROM GARBAGE


The business capital of India jammed for hours. Being largest railway network city, even the locals also stick to tracks. This incident shows the human connection with electricity. Electrical energy is an essential ingredient for all activities, as well as the lifeblood of economies throughout the world. It plays a vital role for economic growth and quality life improvements: with the increase in population of the world. The demand for power has gradually increased. Hence the burden on the countries, especially developing countries like India have increased to meet the demands in the present day. Most of the demands are met by conventional sources such as fossil fuels, hydal, nuclear power etc.The use of these sources have not only resulted in their depletion. But also increased the population. Hence there is a great need for improving technology in the use of non-conventional sources of energy which could greatly decrease the environmental needs and which would assure the future needs particles to rural people at affordable rates.This paper presents an overview of waste to electrical energy technology The basic concept and different features of WTEE is described. It includes the various processes to produce Refused Desire Fuel (RDF), its characteristics and classifications. This shows the solution to disposal of municipal and agricultural solid waste which is an increasing problem today and the developments and goals are described.

Plant Condition Monitoring - Infrared Thermography - Project For Civil

“Plant Condition Monitoring By Using Infrared Thermography”

Infrared condition monitoring techniques offer an objective way of assessing the condition of plant equipment. Infrared thermography is a condition monitoring technique used to remotely gather thermal information from any object or area, converting it to a visual image. The equipment is more compact, it is easier to use, it provides better imagery, faster analysis and uses software that allows reports to be written easily. Prices are also continually dropping in order to predict the need for maintenance. Thermography also has the ability to generate information that can be used to improve equipment and enhance operational and process modifications.Temperature is a key variable in virtually any situation and for all processes for example, if we have even the slightest deviation from normal body temperature we feel sick. In industry, we have plenty of examples too. All this radiation around us can be imaged, measured and stored by an infrared system for analysis, Infrared thermography is the science of the acquisition and analysis of thermal information from non-contact thermal imaging devices. Another area where thermography can provide significant benefits is in the optimization of preventive maintenance (PM).

REMOTE CONTROLLING - Project For Civil Engineering


The term "wireless" came into public use to refer to a radio receiver or transceiver (a dual purpose receiver and transmitter device), establishing its usage in the field of wireless telegraphy early on; now the term is used to describe modern wireless connections such as in cellular networks and wireless broadband Internet. It is also used in a general sense to refer to any type of operation that is implemented without the use of wires, such as "wireless remote control", "wireless energy transfer", etc. regardless of the specific technology (e.g., radio, infrared, ultrasonic, etc.) that is used to accomplish the operation. Remote control is an electronic device used for a remote operation of a device. The world's first remote controls were radio-frequency devices that directed German naval vessels to crash into Allied boats during WWI. In WWII, remote controls detonated bombs for the first time. The end of the great wars left scientists with a brilliant technology and nowhere to apply it. Sixty years later, some of us spend an hour looking for the remote before we remember there are buttons on the TV.

Aeronautical Engineering Projects - Design & Modification



Verification of a new design of a 6 passenger propeller airplane. Analysis included vertical tail sizing and wing sizing.
•Investigation of forward maneuver area air-delivery systems for the US Navy, US Marine Corps. Creation of a simulation program for air dropping payload. Preliminary design of new airplanes to be used for delivering payload in war-zones.
•Design verification of several fire-fighting airplanes for Air Tractor. Preliminary design verification and performance analysis on a family of small airplanes.
•Design verification of a single engine airplane for Air Tractor. Design verification and performance analysis on a family of small airplanes. Analysis of competitor airplanes and comparison with new designs. Stability and control verification, including control forces.
•New design of a two person kit airplane. Preliminary design of two airplanes based on an existing kit airplane.
•NASA SBIR Phase II contract: development of G.A.-CAD: General Aviation Computer Aided Design. To revitalize the General Aviation industry, NASA Langley awarded DARcorporation a contract to design a preliminary design and analysis tool for PC’s including structural design and drafting capability.
•Preliminary Design of a small freighter/passenger airplane for NEXUS.
•New design of an all composite two person kit airplane for DreamWings. Design includes stability and control analysis for one airplane with three different engines.
•Design verification of a twin engine airplane for Air Tractor. Analysis of competitor airplanes and comparison with new designs. Stability and control verification, including control forces.
•Design verification and stability and control analysis on the VisionAire Vantage business jet

Theremin Hero - Final Projects for ECE



The Theremin Hero game unit emulates the experience of Rock BandTM and Guitar HeroTM by enabling users to play a selection of famous songs via a hands free photoelectric Theremin.The purpose of Theremin Hero is to match the pitch and volume of a photoelectric Theremin to song notes displayed on a television screen, earning points for timing and accuracy.The user uses both hands to play the Theremin, controlling the volume with one hand and the pitch with the other hand through two photoelectric emitter/detectors.The range of the Theremin is from C (~262HZ) to D# (~622Hz), which is played through the speakers via direct digital synthesis (DDS) of the converted sensor signals.The game display features a side scrolling interface similar to the Rock BandTM and Guitar HeroTM interfaces, allowing the user to anticipate upcoming song notes and react accordingly.The screen continually updates the current volume and pitch positioning of the user so that he or she may adjust their notes to align with upcoming song notes. Theremin Hero offers four different game modes, consisting of a practice mode and three preprogrammed songs of increasing difficulty.All menu navigation is accomplished with the photoelectric sensors - allowing for completely hands free operation. During game play the users score at the end of each round is retained if a new record has been established, and the high score is displayed at the main menu.

CMOS Camera Rock Paper Scissors Game System - ECE Project


We created a rock paper scissors game that utilizes a CMOS camera to determine what hand the human player plays. The player is required to wear a glove that has black tape taped on each finger. When the player plays the hand, the camera captures in the image, and based on the quantity of black pixels present, processes and decides whether the player has played a rock, paper, or scissors. The system also generates a random hand, and determines whether the player has won or not, and outputs this onto an LCD screen. We started this project out trying to build a camera-based simultaneous localization and mapping system based on image profiles. However, after getting the camera to work, we realized that the speed at which pixels are read from the camera into the STK500 is much too slow for our purposes. Thus, we decided to switch gears and work on a different project that also utilizes the CMOS camera we had working. To this end, we decided to make a rock paper scissors game, as it is a game that everyone knows how to play.
Our project has two main components, the camera and the LCD screen. The LCD screen outputs the current state of the game to the player, while the camera reads in the image to determine what hand the player has played.

Human Tetris ( Video Object Tracking ) - ECE Final Project


"A real-time video object tracking / shape recognition device, and a fun game library to demonstrate its abilities" project sound byte We have created a real-time video object tracking / shape recognition device, and a fun game library to demonstrate its abilities.For our project, we wanted to push the video sampling and processing capabilities of the ATmega644 8-bit microcontroller. Using a high-speed analog-to-digital converter as an input device, we were able to sample a reasonably high-resolution grayscale image from a color camera's video output. Using this grayscale image, we are able to track objects and recognize shapes that stood out from the background by a customizable threshold.From this system, we created a game called Human Tetris to show the shape recognizition capabillity. In this game, players must contort their bodies into shapes displayed on screen in a given amount of time. To demonstrate the potential for our device to expand to a larger game library, we also implemented a port of Brick Breaker. This game shows off the object tracking capability, where players must physically interact with the bouncing ball to keep it on screen and break bricks.

PowerPoint Presentation On Introduction To Robot Kinematics


The Situation:    You have a robotic arm that starts out aligned with the xo-axis.
You tell the first link to move by Y1 and the second link to move by Y2.
The Quest:    What is the position of the end of the robotic arm?
.  Geometric Approach:    This might be the easiest solution for the simple situation. However, notice that the angles are measured relative to the direction of the previous link. (The first link is the exception. The angle is measured relative to it’s initial position.) For robots with more links and whose arm extends into 3 dimensions the geometry gets much more tedious.
2. Algebraic Approach :    Involves coordinate transformations.

PowerPoint Presentation On Robotics Workshop


Introduction -Get to Know -Why Robotics
Kit Introduction -Software -Pieces -Training Missions
Starting with the Basics -Training Missions -Multi-Chasis Questioning Techniques
What is Available- Team Challenge Kit ($199), Software ($), Additional Resources,Brick Layers ($),Intro Kits,Exploration Software ($), Other Kit Options, Kits ($),Simple Machines ($)
Materials for Workshop-Name Tags, Website/Business Cards, Sorting Outlines,Overview Sheet (at a glance), Curriculum Documents, Butcher Paper, Electrical Tape, Black Marker
Careers Computers Programming Choosing Resources Communication Environmental Impacts     Natural Human Made Problem Solving Construction Manufacturing Modeling Systems

PPT And Power Point Presentation On Robotics


“A re-programmable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks.” “A robot is a one-armed, blind idiot with limited memory  and which cannot speak, see, or hear.” Mobility: It possesses some form of mobility. Programmability: implying computational or symbol- manipulative capabilities that a designer can combine as desired (a robot is a computer). It can be programmed to accomplish a large variety of tasks. After being programmed, it operates automatically. Sensors: on or around the device that are able to sense the environment and give useful feedback to the device Mechanical capability: enabling it to act on its environment rather than merely function as a data processing or computational device (a robot is a machine); and Flexibility: it can operate using a range of programs and manipulates and transport materials in a variety of ways.

PPT And Power Point Presentation On Robotics


“A re-programmable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks.” Mobility: It possesses some form of mobility. Programmability: implying computational or symbol- manipulative capabilities that a designer can combine as desired (a robot is a computer). It can be programmed to accomplish a large variety of tasks. After being programmed, it operates automatically. Sensors: on or around the device that are able to sense the environment and give useful feedback to the device Mechanical capability: enabling it to act on its environment rather than merely function as a data processing or computational device (a robot is a machine); and Flexibility: it can operate using a range of programs and manipulates and transport materials in a variety of ways.

Power Point Presentation On Probabilistic Sensor Models


Sensors for Mobile Robots: Contact sensors: Bumpers, Internal sensors,Accelerometers (spring-mounted masses), Gyroscopes (spinning mass, laser light), Compasses, inclinometers (earth magnetic field, gravity),Proximity sensors, Sonar (time of flight), Radar (phase and frequency), Laser range-finders (triangulation, tof, phase), Infrared (intensity), Visual sensors: Cameras, Satellite-based sensors: GPS.
Typical Measurement Errors of an Range Measurements: Beams reflected by obstacles, Beams reflected by persons / caused by crosstalk, Random measurements,Maximum range measurements.

Power Point Presentation On Introduction To Robotics


Word robot was coined by a Czech novelist Karel Capek in a 1920 play titled Rossum’s Universal Robots (RUR)Robota in Czech is a word for worker or servant.Any machine made by by one our members: Robot Institute of America A robot is a reprogrammable, multifunctional manipulator designed to move material, parts, tools or specialized devices through variable programmed motions for the performance of a variety of tasks: Robot Institute of America, 1979. Asimov proposed three “Laws of Robotics” Law 1:  A robot may not injure a human being or through inaction, allow a human being to come to harm Law 2: A robot must obey orders given to it by human beings, except where such orders would conflict with a higher order law. Law 3: A robot must protect its own existence as long as such protection does not conflict with a higher order law

Paper Presentation And Seminar Report On Cell Phone Jammers Trends in IT


Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, almost 169 million people in the United States had cell-phone service in January 2004. And cell phones are even more ubiquitous in Europe.It's great to be able to call anyone at anytime. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. Who hasn't seethed through one side of a conversation about an incredibly personal situation as the talker shares intimate details with his friend as well as everyone else in the area? While most of us just grumble and move on, some people are actually going to extremes to retaliate. Cell phones are basically handheld two-way radios. And like any radio, the signal can be disrupted, or jammed.

SPINS: SECURITY PROTOCOL IN WIRELESS SENSOR NETWORKS Paper Presentation



          This paper proposes a security protocol for Wireless Sensor Networks which are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.  The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and µTESLA which  overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication  in order to provide a secure Wireless Sensor Network.

Paper Presentation On Mobile RFID Security Issues



Radio Frequency Identification (RFID) is currently being used for auto-identification of objects, assets, pets, and people. Its initial success in offering strategic advantages for businesses, by efficient tracking of inventory in the supply chain, has left this technology wide open to many applications that are only limited by people’s imagination. This technology will have a tremendous impact on our society, once it starts to assist people in their daily life. A right step in this direction would be Mobile RFID, where a RFID reader chip is integrated into a portable mobile device like mobile phone, and PDA. Mobile RFID would help consumers in shopping, and allows quick and easy access to information, just by bringing their mobile devices near to an object that has a RFID tag. This paper pioneers in describing Mobile RFID’s new applications and security challenges. It focuses on different Mobile RFID application zones, and their related security threats, and security requirements. Finally it proposes simple security architecture for Mobile RFID applications in Location-based Services zone.
 Keywords: Mobile RFID, Mobile RFID Security, RFID Security

Projects, Thesis, Final Year Projects, IT, MBA, Seminar

Donate To Maintain This Blog

Dear Readers, Donate (INR 1/-)At-least To Maintain This ProjectsWorlds

Total Pageviews

Most Popular Posts

free counters
DEAR READERS: As There is problem in www.projectsworld.co.cc It is changed to

www.projectsworlds.blogspot.com

For Any Feedback and Suggestions send mail.

If There is any problem in the Document View or Download please send mail to projectsworld@live.com

Enter your email address:

Delivered by FeedBurner

Followers

ProjectsWorlds. Powered by Blogger.