You are on page 1of 146

MECHANICAL

Advanced Technologies To Improve IC Engine efficiency


Soayajula Sravani JNTU COLLEGE OF ENGINEERING Mahanthi Sowmya

Abstract:
Commonly Internal Combustion engines only 15% of fuel energy is utilized to run the vehicle.Remaining 85% of fuel is wasted to improve this energy some advanced technologies can be used to improve the efficiency of the engine.Losses like engine losses,idling losses,driveline losses,overcoming inertia;braking losses,rolling resistance,aerodynamic drag and accessories.To overcome these losses some advanced technologies like variable valve timing and lift,Cylinder deactivation,Turbo charging,Direct fuel injection;Integrated starter/generator(ISG), automated manual transmission,continousiy variable transmission and etc

Recent Trends in Automobile Engineering


Sheik Ruksana MVGR college of engineering Abstract: Since the invention of the internal combustion engine, automotive engineers, speed junkies and racecar designers have been searching for ways to boost its power. One way to add power is to build a bigger engine. But bigger engines, which weigh more and cost more to build and maintain, are not always better. Another way to add power is to make a normalsized engine more efficient. Adding either a turbocharger or a supercharger is a great way to achieve forced air induction. Both superchargers and turbochargers pressurize the air intake to above atmospheric pressure. The difference between the two devices is their source of energy. Turbocharger is an exhaust gas driven compressor used in internal-combustion engines to increase the power output of the engine by increasing the mass of oxygen entering the engine. A key advantage of turbochargers is that they offer a considerable increase in engine power with only a slight increase in weight. Unlike turbochargers, which use the exhaust gases created by combustion to power the compressor, superchargers draw their power directly from the crankshaft . Superchargers increase intake by compressing air above atmospheric pressure, without creating a vacuum. This forces more air into the engine, providing a "boost." With the additional air in the boost, more fuel can be added to the charge, and the power of the engine is increased. There are three types of superchargers: roots, centrifugal, twin-screw. Bhanu

ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS IN MEDICAL FIELD P.Dinesh MVGR college of engineering Abstract: Artificial Intelligence, in light of definition of intelligence, is simply the application of artificial or non-naturally occurring systems that use the knowledge-level to achieve goals. This presentation illustrates how focused, specialized intelligent systems can be used in the healthcare environment whenever their knowledge areas are well bounded.Physicians are more willing to accept systems focused on very specific areas than those attempting to solve more generalized problems such as diagnosis (see Table II).Medical imaging is often thought of as a way of viewing anatomical structures of the body. It is often useful, however, to acquire images of physiologic function rather than of anatomy. M.Ram babu

AUTOMOBILE MONITORING SYSTEM USING RF-ID N.Sandhya B.R Sushma G.Bharati

VIGNANS INSTITUTE OF ENGINEERING FOR WOMEN

Abstract:
In the process of checking vehicles manpower is used instead we use electronic system to check vehicles. In everyday life we have increasing development on transport system. It is hard to checkout all vehicles by available man power and also there is an increasing rate of crimes using automobile all over the world. Thus automobile monitoring system plays a dominant role in checking and controlling crime rates and ensures the security of the nation.This paper involves a tamper proof wireless tag fixed in the vehicle and a wireless receiver in the check post. Whenever the vehicle passes the check post the transmitted value is received in the receiver and the time is automatically noted. The noted values are logged in a common data base server

BULLET PROOF VESTS USING NANO TECHNOLOGY

S.HIDAYATH THULLA KIRAN

G.MUNI

Gokula Krishna College of engineering

Abstract:
Carbon nano tubes are allotropes of carbon. Carbon nano tubes are just a few billions of a meter across, but are ultra strong. Their unusual properties promise to revolutionize electronics, computers, and chemistry and material sciences. They had been discovered in 1991.One of the main applicants of carbon nano tubes is stronger bullet proof vests. A new bullet proof material is designed which actually rebounds the force of a bullet. Bullet proof materials at that moment are designed to spread the force of a bullet. Bullet proof materials at the moment are designed to spread the force. The nature of the bonding of nano tube is described by applied quantum chemistry, specifically, orbital hybridization. The chemical bonding of nano tubes are composed entirely of sp2 bonds, similar to those of graphite. The lightweight fibre, made up of millions of tiny carbon nano tubes, is starting to reveal exciting properties. The fibre is very strong, lightweight and good at absorbing energy in the form of fragments travelling at very high velocity. Inherent property of elasticity is the main reason for it. Carbon nano tubes exhibit extraordinary mechanical properties.It is stiff as diamond. The material is already up to several times stronger, tougher and stiffer than fibres currently used to make protective amour. For body armour, the strength of the fibres in a fabric is critical parameter. Recently preparing bullet proof t-shirts can save lots of people from bullet hits. In future these amours can be used for military applications.

NANO-ROBOT HARDWARE ARCHITECTURE FOR MEDICAL DEFENCE


G.Laxmi M.Beulah Godavari Institute of Engineering and Technology

Abstract:
As is correctly said that a stitch in time saves nine. So imagine that one could diagnose the major diseases of the world in a living being before it could really affect that being and relay it self into an epidemic outbreak. As the ultimate aim of medicine is rightly judged as immortality, perhaps this paper may take us one step closer towards that much awaited goal. Targeted to rural areas ,this architecture provides us a new tool by which we could achieve continuous monitoring of the person at the nano scale and apply effective methodologies even before that persons body is affected by influenza to over (3-4)% of the total infection capabilities. This work presents a new approach with details on the integrated platform and hardware architecture for nanorobots application in epidemic control, which should enable real time in vivo prognosis of biohazard infection. The recent developments in the field of nanoelectronics, with transducers progressively shrinking down to smaller sizes through nanotechnology and carbon annotates, are expected to result in innovative biomedical instrumentation possibilities, with new therapies and efficient diagnosis methodologies.

HYDROGEN ITS PROSPECTS AS A CLEAN ENERGY OPTION OF 21STCENTURY


P.SAI GURUGOVIND KUMAR Gokula Krishna College of engineering V.DILIP

Abstract:
A major portion of the worlds energy needs is obtained through fossil fuels. Coal provides a dominant portion of the electrical energy production in the world and especially in India. Today many of the industries work on fossil fuels like Petrol, Diesel and other useful fuels. But as it is a renewable source of energy it no longer holds in good position to satisfy present human needs for a long period of time. However the future of fossil fuels is clouded by the environmental threat posed by green house gas effect.

AUTOMATIC SPEED CONTROL SYSTEM IN 4-WHEELERS TO AVOID RASH DRIVING

K.Sneha Lakshmi MVGR,Vijayanagaram.

K.Venkata

Abstract:
Every life that alive in this universe likes to enjoy the beauty in the nature. In this human beings also one kind. Towards achieving these enjoyments human beings invented & created the vehicles. But actually what happens, they are satisfying their needs by using these, but also suffering with accidents and losing valuable lives & property due to rash driving of drivers especially in highly populated regions. So to avoid rash driving and to prevent loosing of valuable property we need some safety systems in the vehicles. We can make this true by using sensors and other electronic components. But those have more cost which causes increase in cost of the vehicle. With out using those electronic components also we can achieve this by using mechanical arrangements. To achieve this I designed a simple mechanical system for providing safety, for avoiding rash driving in highly

NANOBOTS
D.GANESH BABU P.MANIKANTHA SWAMY G.KUMAR

GONNA INSTITUTE OF INFORMATION TECHNOLOGY AND SCIENCES

Abstract:
In this global world where the hands of science and technology is stretching outward very vastly so man has created robots and he has discovered many impossibilities with the help of these robots. Everything that we see is made of out of matter and there are particles which are smaller and cannot be seen with our naked eyes. This particular particle is none other but nano particles and technology so related with such vital concept is nanotechnology. In this paper we are going to discuss about the application of nanotechnology in the field of robotics and these application leads to the birth of nano robots. Nanobots are one of the applications of nanotechnology. Finally we conclude by discussing its advantages, disadvantages and applications of Nanobots in the fields of medicine and computer science.

HARBINGER OF NEW FUTURE NANOTECHNOLOGY


J.SIVA KRISHNA K.PHANI SRIKANTH

SWARNANDHRA COLLEGE OF ENGINEERING&TECHNOLOGY

Abstract:
Nanotechnology is being harbingered as the next enabling technology that will redesign the future of several technologies, products and markets. The nanotechnology industry is heral ding a new world order. It is described as an enabling technology that will pave the way for novelty in every stream of technology. The number of sectors that are involved are many, due to the multi -disciplinary nature of the technology, offering scope for numerous opportunities.This paper emphasizes on the nanotechnology, nanomaterials. One of the benefits of having smaller computers is convenience. The reduction in size of all the modern -day equipment we carry around with us is just one application for th e field of nanocomputing. It deals with the evaluation of modern computers with the use of carbon nanotubes and silicon nanowires

NANO MATERIALS FOR DEFENSE APPLICATIONS ACCELERATING THE TRANSITION


P.N.B.DHANVANTARI. SASI ENGINEERING COLLEGE P.RAGHAVENDRA

Abstract:
In the present world every country thinking of making there nation secured & safe. The countries which were developed are investing much on the weapons, communication systems e.t.c., to strengthen their strengths. But the countries which were still developing were unable to invest such large investments. Nanotechnology is a hybrid science co mbining engineering and chemistry.Nanotechnology holds out the promise of materials of precisely specified composition and properties, which could yield structures of unprecedented strength and computers of extraordinary compactness and power.

ANTI LOCK BRAKING SYSTEM


U.Naveen kumar B.Lavan Kumar

AVANTHIS RESEARCH & TECHNOLOGICAL ACADEMY

Abstract:
Antilock brake system (ABS), equipped in a vehicle, increases safety because it prevents wheels from being locked up and minimizes the danger of skidding, allowing the vehicle to stop in a straight line. ABS also allows drivers to maintain steering control of a vehicle during emergency braking of it. So the vehicle can avoid obstacles or another vehicles on the road. This paper deals with an antilock brake controller for full air brake system, which is widely used in heavy vehicles such as buses,cars and trucks. Two methods of evaluating the ABS controller and the algorithms were focused on: laboratorial test and field test. For the laboratorial test, a hardware in-the-loop simulator (HILS) was made. This includes actual pneumatic brake hardware between the controller input and vehicle dynamics output, thus simulating a whole bus under braking in real time.

NANO TECHNOLOGY
P.N.B.DHANVANTARI.
SASI ENGINEERING COLLEGE

P.RAGHAVENDRA.

Abstract:
In the present world every country thinking of making there nation secured & safe. The countries which were developed are investing much on the weapons, communication systems e.t.c., to strengthen their strengths. But the countries which were still developing were unable to invest such large investments. Nanotechnology is a hybrid science combining engineering and chemistry.Nanotechnology holds out the promise of materials of precisely specified composition and properties, which could yield structures of unprecedented strength and computers of extraordinary compactness and power.The soldiers in the war weighing large weapons, huge weights. So, to these all problems a solution is to be there. Yes, for every problem there will be a solution. Here for this problem the solution is NANO TECHNOLOGY.

AIR BRAKE SYSTEM


D.Suresh D.Surya Teja AVANTHIS RESEARCH AND TECHNOLOGICAL ACADEMY

Abstract:
Air brakes are used in trucks,busses,trials, and semi-Trialers. George westinghouse first developed air brakes for use in railway service. He patented a safer air brake on March 5, 1872. Originally designed and built for use on railroad train application, air brakes remain the exclusive systems in widespread use. Westinghouse made numerous alterations to improve his air pressured brake invention, which led to various forms of the automatic brake and the subsequent use on heavier road vehicles

IT

Multimodal Biometric Voting System


A.Ratnakar(CSE) Visakha institute of engineering & technology ABSTRACT: This paper encloses the information regarding the present interesting topic, the biometrics; biometrics technology allows determination and verification of ones identity through physical characteristics To put it simply, it turns your body in to your password. Wediscussed various biometric techniques like finger scan, retina scan, facial scan hand scan etc. An algorithm have been proposed by taking a multi modal biometric voting system to authenticate a person and consider his voting . We conclude that this voting system is superior for use in a general election when compared with traditonal voting system and ven Keywords Biometrics, Hashing, Database, Covert Surveillance K.Ajay(CSE)

Steganography
A.Ravi Kiran Vignans Institute of Information Technology Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "to write". K.V.Saikiran

WIRELESS COMMUNICATION
M. Divya
(Sri Gnaneswari Research & Technological Academy for Women College) K. Chakradhar Ananth Kumar- (Lendi Institute of Engineering & Technology College)

Abstract: Wireless Local Area Networks have become the focus of great attention by both business and consumer users with the advent of low cost 802.11 access points and preequipped laptops. While the initial products are convenient and useful, just as with their wired counterparts there is already interest in how to greatly increase the capacity and speed of wireless LANs.

4G technology Srinivasarao.Rejeti Sudheer.Ganti

Aditya Institute of Technology And Management ABSTRACT : Mobile communication is continuously one of the hottest areas that are developing at a booming speed, with advanced techniques emerging in all the fields of mobile and wireless communications. Current times are just the beginning for deploying 3G mobile communication systems, while research on the next generation of mobile communications, 4G wireless and mobile networks begin to save the way for the future. This paper studies the visions of 4G from a technical perspective. After a brief review on the development history and status of mobile communications and related 4G perspectives, we present an overall 4G feature framework based on the kernel concept of integration.

SIXTH SENSE TECHNOLOGY


G.SANDHYA RANI GIET ENGINEERING COLLEGE ABSTRACT: We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world. SOWJANYA.

CLOUD COMPUTING
M.SRI SAILAJA ABSTRACT : Next Generation IT will leverage a new computing platform which makes the development and delivery of applications significantly easier than it is today. This new platform consists of Cloud Computing, Software As A Service and Dynamic Languages. Cloud Computing offers mainframe or better infrastructure through a small set of services delivered globally over the Internet. Software as a Service is a new delivery model which provides flexibility to both the provider and the customers.This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing, and outlines cloud architecture and its major components. Cloud computing infrastructure allows enterprises to achieve more efficient use of their IT hardware and software investments Enterprises strive to reduce computing costs.The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. CH.DIVYA LAKSHMI DURGA

Cloud Computing.
A.V.P.DEEPTHI G.ASHA ST.THERESSA INST OF ENGG &TECH ABSTRACT: Computing is usually defined as the activity of using and developing computer technology, computer hardware and software. Computing includes designing and building hardware and software systems for a wide range of purposes; processing, structuring, and various kinds of information. In this computing there are many types. In these types one of the computing is Cloud Computing.The Cloud services concept centers on the idea that information technology applications are being delivered to the face of a web browser from an amorphous cloud.This is one of the major market forces converging to drive the nascent Cloud Computing revolution into a full-fledged information technology model change is just beginning to appear in the Firms need to respond faster to changing customer expectations and business demands, while using fewer resources. As more applications are moving into the cloud, businesses are seeing new opportunities to cloud marketplace, is Business Process Management (BPM) software. In todays tough economic environment, more and more companies are looking to BPM to help them survive and thrive. B.J.PRASHANTI

CLOUD COMPUTING
Zafreen, T.Sindhu, M.V.G.R. College Of Engineering S.Uma Maheshwari

ABSTRACT:The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively scalable, efficient, agile, reliable and secure. The Telecommunications networks have for many years, demonstrated their ability to reliably enable network (voice) services creation, assurance and delivery on a massive scale. Based on an analysis of the Intelligent Networks in telecommunications to identify proven concepts and key lessons that can be applied to enable next generation IT datacenters experience this paper asserts that: In order to scale cloud service reliably to millions of service developers and billions of end users the next generation cloud computing and datacenter infrastructure will have to follow an evolution similar to the one that led to the creation of scalable telecommunication networks.

CLOUD INTEROPERABILITY USING WEB SERVICES


V.SRIVALLI Abstract: In its simplest form, cloud computing consists of shared computing resources that are virtualized and accessed as a service, through an API. The cloud enables users in an organization to run applications by deploying them to the cloud, a virtual datacenter. The physical resources may reside in a number of locations inside and outside of an organization: on local hardware, in an enterprise data center, or at remote or managed service providers on a pay-to-use basis. Cloud computing resources are offered as a service on an as-needed basis, and delivered by IP-based connectivity, providing highly scalable, reliable on-demand services with agile management capabilities. K.PRIYANKA

CLOUD COMPUTING
K.KALYANI ABSTRACT Cloud computing is the process of taking services and tasks performed by our computer and bringing them to the web.It involves Grid computing, Utility computing, Virtualization, Clustering.Types of cloudsPublic Clouds: Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the clouds servers, storage systems, and networks.Private Clouds: Private clouds are built for the exclusive use of one client, providing the extreme control over data, security, and quality of service. Hybrid Clouds: Hybrid clouds combine both public and private cloud models. They can help to provide on-demand, externally provisioned scale. A.DEEPIKA

CYBORG
Arun kumar patnaik, B.dileep

ABSTRACT

Since the time man has been able to understand his senses, he has always tried to make his life better. Began with the invention of wheel, to cars, to computers and now artificial humans. He always tried to make a replica of himself. Some one has a better grasping power, someone with better logic, someone with better memory, someone with more creativity and so on. He is trying to combine all these into one. This struggle to make a perfect human who can control every thing created by God, has led to foundation of all technological advancements of today. Amidst these has come up the idea of making machines not to be slaves of humans (robotics) but a part of them Cyborg is the result. A combination of man and machine for betterment of humankind. This is the Cyborg a theoretical concept which has attracted scientists, technologists, philosophers, doctors world over. The day is not far away when we will all be Cyborgs!!!!!

DIGITAL JEWELLERY K. Geetha Rao, ,Abstract Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery adorns the body, and has very little practical purpose. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence i.e., Digital jewelry. Digital jewellery can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper also discusses about a new Java -based, computerized ring that will automatically unlock doors and log on to computers. H. Jeevan Kumar

DISTRIBUTED COMPUTING
R.SUMA Abstract: Ever since computers were invented researchers and computer scientists were constantly working for enhancing the capabilities in terms of computational power and speed of the systems. The result of such a pursuit is the distributed computing architecture. The idea is to share the computing activity between systems that are physically distributed. In computer science, distributed computing studies the coordinated use of physically distributed computers. T.N.V.SATYAVENI

DATA WAREHOUSING AND DATA MINING B.Praveenkumar V.Pavankumar D.J.Kishore

ADITYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Abstract: The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".

Data mining and data warehousing BUDDI RESHMA CHOWDARY PADYALA ANUSHA

PRASAD INSTITUTE OF TECHNOLOGY AND SCIENCES. Abstract Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate of data capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time.The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".

Data mining and data warehousing P.ASHWINI KUMARI Abstract: Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate ofdata capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time. K.SUJANA

EYE INTERFACE TECHNOLOGY ELECTRO OCULOGRAPHY


S.GOPI KRISHNA B.SOUNDHARYA S.R.K.R ENGINEERING COLLEGE ABSTRACT: Today the use of computers is extended to every field. Many sophisticated devices like touch screen, track ball, digitizers etc made interaction with computer ease from novice to professional. But physically disabled individuals are deterred from using computers due to

their inability to control mouse. However, if directional discrimination of an icon can be achieved, quadriplegics can take the function of a mouse without the use of hand. In this paper I come before with a new model of based on Electro-Oculography which uses Electro-oculogram Bio potential amplified signal to control computer.I also discuss its implementation details, including software and hardware design. As my contribution to this paper I introduce a new keyboard design, some modifications in design to overcome the drawbacks in existing model.

FPGA TECHNOLOGY
B.Sankara Narayana Abstract: A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by the customer or designer after manufacturing-hence field programmable. The word field in the name refers to the ability of the gate arrays to be programmed for a specific function by the user instead of by the manufacturer of the device. The word array is used to indicate a series of columns and rows of gates that can be programmed by the end user. FPGAs can be used to implement any logical function A.V.Sriram

APPLICATIONS OF GENETIC ALGORITHM


G.GOWTHAMI, Abstract:
Genetic Algorithms (GA s) are adaptive heuristic search algorithm premised on the volutionary ideas of natural selection and genetic. The basic concept of GA s is designed to simulate processes in natural system necessary for evolution, specifically those that follow the principles As such they represent an intelligent exploitation of a random search within a defined search space to solve a problem.Genetic Algorithms has been widely studied, experimented and applied in many fields in engineering worlds. Not only does GA s provide alternative methods to solving problem, it consistently outperforms other traditional methods in most of the problems link. Many of the real world problems involved finding optimal parameters, which might prove difficult for traditional methods but ideal for GA s.

G.SHALINI,

AN EMBEDDED SYSTEMS APPROACH IN DESIGNING A AUTOMATED VENDING MACHINE USING IMAGE PROCESSING FOR CURRENCY RECOGNITION
SOBHA GOTTAPU M.U.V.JAGANMOHAN RAO

ABSTRACT: An embedded approach in designing a automated vending machine using image processing for currency recognition. Automation had become time-sharing, fast and sophisticated approach in both Public Sector Units and Private Sector Units today. From computerized billing machine in a small shop to a missile launching process, everything is automated.This paper presents unique idea of a fully automated ticket vending machine, an embedded system, which makes the process of ticket procurement a hassle free job and thereby decreases the burden of a patient clerk who sits in the counter for issuing tickets.

REMOTE VEHICLE MONITORING & SECURITY SYSTEM


B.MANOJ KUMAR ABSTRACT: In this modern, fast moving and insecure world, it is become a basic necessity to be aware of ones safety. Maximum risks occur in situations wherein an employee travels for money transactions. Also the Company to which he belongs should be aware if there is some problem. What if the person traveling can be tracked and also secured in the case of an emergency?! Fantastic, isnt it? Of course it is and heres a system that functions as a tracking and a security system. Its the VMSS. This system can deal with both pace and security.The VMSS (Vehicle Monitoring and Security System) is a GPS based vehicle tracking system that is used for security applications as well. The project uses two main underlying concepts. These are GPS (Global Positioning System) and GSM (Global System for Mobile Communication). The main application of this system in this context is tracking the vehicle to which the GPS is connected, giving the information about its position whenever required and for the security of each person travelling by the vehicle A.BHARAT MURALI A.Y.V.SURESH

MICRO PROCESSOR CONTROLLED VARIABLE SPEED DIRVES


D.Satya jyothi R.Dinesh

ABSTRACT: In recent years, there has been a trend toward using variable speed to operate motors for equipment and systems that provide heating, ventilation, and air conditioning for buildings. Variable speed has been shown to improve the operating efficiency of equipment such as fans, chillers, and pumps, the capacity of which must be modulated for proper system operation. Furthermore, designers now understand that motors powering devices traditionally operated at constant speed, such as fan coils and fan-powered terminal units, can benefit enormously in terms of both performance and efficiency from the application of variable speed. It is becoming clear that virtually every motor involved in a building HVAC system today has the capacity to improve the efficiency and effectiveness of the system when operated with variable speed. Todays industry places high demands on control accuracies, flexibility, easy of operation, repeatability of parameters for many drives applications. To meet these requirements, use of micro processors have become imperative. Microcomputer technology is moving at such a fast rate that the use of efficient high level language with large hardware integration already is possible and possibly VLSI implementation of the controller is the next goal. Unlike dedicated hardware control, a microcomputer executes control in serial fashion, i.e., multitasking operations are performed in time multiplexed method

Mobile Computing
K.SINDHURI ABSTRACT: The term Mobile Computing emphasizes the basic feature of mobility which refers to a person or a device that moves between different geographical locations or M.SWETHA REDDY

different networks or different communication devices or in different applications. So mobile computing is a process that deals with the way of communication by using a Mobile Computer. The communication in a Mobile Computer can be done by u sing different Networks which includes various protocols for different issues. A protocol is necessary for transferring the information from one node to other through wireless medium.

Mobile Computing

KRISHNA CHAITANYA.KARRI

KRISHNA RAO.DUMPA

Abstract: Mobile computing has been undergoing a bit of a renaissance lately. A few years ago it was a simple matter of finding a data -compatible mobile phone, a PC card modem, and a matching cable and installing it as a modem. Then people started to use PDAs as well. Cell phones started to come with infrared ports to allow communication with laptops. Then cell phones started to come with modems built in. The connecting methods of mobile computing, its introduction, connection types, factors affecting connections, mobile applications and its limitations are explained.

Network Security
H.Sailaja ABSTRACT : With the rapid growth of application of Internet in various walks of life, the study of Network Security has become inevitable. So it is very important for all the users to get familiar with various aspects of Network Security. More people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. With the millions of Internet users able to pass information from the network, the security of business networks is a major concern. The very nature of the Internet makes it vulnerable to attack. The hackers and virus writers try to attack the Internet and computers connected to the Internet. With the growth in business use of the Internet, network security is rapidly becoming crucial to the development of the Internet. Many business set up firewalls to control access to their networks by persons using the Internet. Firewalls acts as barriers to M.V.Lakshmi

unauthorized entry into a network that is connected to the Internet allowing outsiders to access public areas but preventing them from exploring proprietary areas of network. Also First generation firewalls (packet filtering), second generation firewalls (proxy services), third generation firewalls are discussed. Our paper covers the overview of network security and different types of network securitymethods.

NETWORK SECURITY & CRYPTOGRAPHY


CH.HARIKA SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them. Some history of networking is included, as well as an introduction to TCP/IP and internetworking . We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace. V.ANUSHA

Neuroprosthetics

Mohammad.Khajamohiddin D.S.DattaKumar Aditya Engineering College

Gunnam.Manindrah

Abstract: Neuroprosthetics is an area of Neuroscience concerned with neural prostheses, that is artificial devices used to replace or improve the function of an impaired nervous system. There have been several important advances in recent years in neural prosthetic technology, but a critical area for long-term functional implants will be the engineering of stable neuron/electronic interfaces for the bidirectional flow of information between the electronic and the biological systems. Neural implants may be placed directly in the brain or along the peripheral nervous system. In both cases, engineers, material scientists, and physicists must discover the best way to create safe and effective electrical interfaces without causing physical damage to the cell and surrounding tissues.

Optical Computing
D.Sravani V.Ramadevi Kakinada Institute of Engineering and Technology for WOMEN Abstract: Now a days we are using the electronic computer, just think for a while if all the electronic components are replaced with optical one. Optical computer is the computer which performs operations ten or more times faster than the conventional electronic computers. This optical computer uses the infrared beams to manipulate store, transmit data.

DATA WAREHOUSING AND DATA MININ G


Sree.Prasanna D.M.S.S.V.H. College of Engineering Abstract : Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate of data capture is very high, but the processing of this data into information that can b e utilised for decision making, is not developing at the same pace. Knowledge and data mining provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time. The data warehouse, also called knowledge, allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting K.Reshma

new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".

Pervasive Computing
P. Anusha GVPCOE, VIZAG Abstract :The aim of Pervasive Computing is for computing available wherever it's needed. It spreads intelligence and connectivity to more or less everything. So conceptually, ships, aircrafts, cars, bridges, tunnels, machines, refrigerators, door handles, lighting fixtures, shoes, hats, packaging clothing, tools, appliances, homes and even things like our coffee mugs and even the human body and will embedded with chips which are almost invisible to connect to an infinite network of other devices and to create an environment where the connectivity of devices is embedded in such a way that it is unobtrusive and always available. Pervasive computing, therefore, refers to the emerging trend toward numerous, easily accessible computing devices connected to an increasingly ubiquitous network infrastructure. Y. Uday Sagar

NETWORK SECURITY & CRYPTOGRAPHY


G.M.LAKSHMI SUBRAHMANYAM CH.KRISHNA VENI

CHAITANYA ENGINEERING COLLEGE ABSTRACT: This paper introduces CryptographyThe science of protecting data and Network Security keeping information private and Secure from unauthorized Users Communication has always been an integral part of our existence. The rapid advances in communications technology have also given rise to security threats to individuals and organizations. Network Security help us to build the largest free security library on the internet by submitting your own security related content thus easily controlling users, applications and threats to generate the security and perform our needs. Cryptography is one essential aspect for secure communications. This plays important role in network security. The objective of cryptography is to hide information. So that only intended recipient can unhide it. In crypto terms, the hiding information is called encryption and when the information is unhidden it is called decryption. We are also going to include about history of cryptography.

Mobile Computing
P.S.L.PRASANNA MANJARI CH.DHANALAKSHMI

CHAITANYA ENGINEERING COLLEGE ABSTRACT: A mobile computing system can be viewed as an autonomous decentralized system in which hosts physically change location and communicate with other hosts using wireless network technology. Compared with traditional wired networks, mobile systems present additional challenges in a number of areas related to autonomy and adaptation, including message routing, support for disconnected operation, and providing Quality of Service (QoS).Mobile computing systems are computing systems that may be easily moved physically and whose computing capabilities may be used while they are being moved. Examples are laptops, personal digital assistants (PDAs), and mobile phones..

PRETTY GOOD PRIVACY


V.MAHESH KUMAR ABSTRACT: Pretty Good Privacy was originally developed by Phillip Zimmerman in 1995 to provide a means of secure communication in an insecure electronic environment. Pretty Good is an understatement the framework it is based on, PKI (Public Key Infrastructure) and its encryption standards (it can use Diffie-Helman or RSA algorithms of varying strengths),have been subjected to rigorous cryptanalysis. PGP has since grown into a more versatile application under the direction of its current owner, Network Associates Until the most recent release PGP has been completely open source, allowing anyone to review the code and suggest improvements. S.RAJASEKHARRAJU

VERY LARGE SCALE INTEGRATION


A.Rishikesh G.Pullaiah College of Engineering and Technology Abstract:
Electronic devices are manufactured according to the clients requirements and we need to be able to add any new feature anytime, this unique feature is provided by a PSoC (Programmable System on Chip ) which is a part of very large scale integration. PSoC is software configured, mixed -signal array with a built -in MCU core. The PSoC architecture consists of configurable analog and digital blocks, a CPU subsystem and programmable routing and interconnect. PSoC lets you plug in predefined and tested IP from the PSoC library of functions, or code your own. Either way, you have the flexibility to build innovation and competitive advantage into your products.

A ROBOT WITH FINGER-TIP SENSITIVITY

N. Deepthi AITAM Abstract :

M.Gowtami

A Robot with Finger-Tip Sensitivity is a product of Artificial Intelligence. Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines.There are lots of innovations are discovered by scientists in this area. Robots with artificial intelligence are one of the greatest innovations.This paper described about the Robot with finger-tip sensitivity which is the latest innovations in the Robotics domain

VIRTUAL REALITY

B.Soundharya

T.Anusha AITAM

V.Srujana

Abstract: In order to better understand the interaction between various depth cues, we analyzed two 3D depth cues that are found in both natural spaces and virtual reality environments shape from shading and motion parallax. We wanted to see how well subjects used these cues as sole information for depth and how they weighted or integrated the two cues. In particular, we were interested in individual variance and potential differences along sex lines. Our results showed that subjects, without practice or experience, are virtually unable to acquire depth information when 2D cues such as luminance and speed are removed and only one 3D cue remains. Because of the irregular performance of our subjects, it is difficult to determine what individual variation exists and whether it was controlled by experience, social influences, or biological factors.

Web based robot control


K.Srinivasa Rao K.Krishna Raviteja SRKR Engg College ABSTRACT: Wireless device control is becoming one of the popular technologies in the present scenario. Based on this technology, we have made a project to control any wireless device using web. In this, we are dealing with controlling a wireless robot from a remote area using a WAP enabled cell phone or a laptop. We can enable this application by simply sending emails from any place. We can implement this technology in various fields such as home automation, surgeries in medical field, military, automobile industries etc. S.Gopi Krishna

WEB TECHNOLOGIES

K.LAVANYA

CH.PRATYUSHA ADITYA INSTITUTE OF TECHNOLOGY MANAGEMENT

ABSTRACT: New knowledge is produced at a continuously increasing speed, and the list of papers, databases and other knowledge sources that a researcher in the life sciences needs tocope with is actually turning into a problem rather than an asset. The adequate management of knowledge is therefore becoming fundamentally important for life scientists, especially if they work with approaches that thoroughly depend on knowledge integration, such as systems biology. Several initiatives to organize biological knowledge sources into a readily exploitable resourceome are presently being carried out. Ontologies and Semantic Web technologies revolutionize these efforts. Here, we review the benefits, trends, current possibilities, and the potential this holds for the biosciences. The developmental process of architectural design of a simple Web-based adaptive learning system. The research in such systems has advanced significantly in recent years but there are few attempts to report the development process that could be useful for practitioner community. The system described in this project is divided into four modules that allow for various didactic, tutoring and student styles.

WIFI
Saikrishna behara AITAM A.v.pradeep Chandra

ABSTRACT: WiFi Think of it as an eighteen-wheeler screaming down the pike, carrying the future of computing with it. The driver is friendly. You can stick out your thumb and hitch a ride, or be left in the dust. WIFI, in the broadest sense is a term used for a specific protocol to network your computer to another computer or network.It allows you to connect to the Internet from your couch at home, a bed in a hotel room or a conference room at work without wires with a speed several times faster than the fastest cable connection. We have attempted to review all the major aspects of wireless networking and the 802.11x protocol corresponding to Wi-Fi .The paper deals with the basic concepts of wireless networking and goes into the in-depth of 802.11x protocol which forms the backbone of the upcoming technology, Wi-Fi. Seamless networking is neither a compromise anymore nor a showpiece of high end business markets. The wave of the future is already sweeping through wire less technology.

WIRELESS COMMUNICATION THROUGH BLUE TOOTH TECHNOLOGY S. Krishna mohan Sri sivani college of Engg ABSTRACT: The paper describes the fastest upcoming wireless communication technology. The Blutooth Technology. It depicts how a kind of close personal area network (PAN) can be formed for different user applications, using bluetooth protocols and procedures. The paper K. Ramesh

gives details description of standard Bluetooth protocol stack. All layers of protocol stack are discussed with the necessary functions that are expected to be performed by them. plementation options and possibilities that can be employed for designed Bluetooth system are also suggested. The paper explains the most important & key issue in wireless communications i.e. data security. Finally, the document concludes with major difference in Bluetooth and other ubiquitous competing wireless technologies followed by suggested references

ARTIFICIAL PASSENGER
O. Govinda Rao Ch. Hari Prasad

ADITYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Abstract: Telematics services in cars (like navigation, cellular telephone, internet access) are becoming increasingly popular, but they may distract drivers from their maindriving tasks and negatively affect driving safety.This paper addresses some aspects of voice user interface in cars, as a mechanism to increase driver safety. Voice control becomes more efficient in reducing driver distraction if drivers can speak commands in a natural manner rather than having toremember one or two variants supported by the system. In this paper we discuss some ways to increase naturalness. Computers in cars are usually not very powerful due to cost considerations. Low CPU resources are a limiting factor for embedded speech solutions. Another aspect of this paper is a recently introduced novel solution for using a speech interface to reduce driver drowsiness and prevent a driver from falling asleep. All driver activities in cars (driving,talking over telephone, controlling Telematics devices, etc.) contribute to driver workload. Designing workload management in a user interface is a difficult task. In our paper we analyze some aspects of this problem. Finally, we introduce the idea of a distributed user interface between cars. It is well known that the safety of a driver depends not only on the driver himself but on the behavior of other drivers nearby. Therefore sharing some information about other cars and driver conditions could lead to increased driving safety.

BLUETOOTH
VAMBARILLI RAMBABU YALLA GNANAMANI

SRI SIVANI COLLEGE OF ENGINEERING, CHILAKAPALEM, SRIKAKULAM ABSTRACT:Bluetooth is a new short-range wireless technology designed to enable wireless communication between diverse devices. It is gaining increasing popularity and acceptance in the world today. There is a growing body of research on the subject, but very few, if any of the analyses, provide a balanced view of the technology, which describe its pros and cons and implications for businesses. This paper attempts to critically analyze the Bluetooth technology from a various perspectives. It begins with a description of the technology in terms of its hardware, software, and network infrastructure. Then it addresses the related issues of interference, security, and reliability. This microanalysis is followed by a larger macro analytical view, which includes the advantages of this technology, its role in the global third generation (3G) wireless scheme, health/safety issues, and business implications. It concludes with the applications of Bluetooth and its future potential.

CLOUD COMPUTING
A.S.L.PRASANNA SRI ADITYA ENGINEERING COLLEGE ABSTRACT This paper aims at presenting the concept of CLOUD COMPUTING .With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our own pc. Although documents can be accessed from other computers on the network, they cant be accessed by computers outside the network. This is PC-centric. With cloud computing, the software programs one use arent run from ones personal computer, but are rather stored on servers accessed via the Internet. If a computer crashes, the software is still available for others to use. Same goes for the documents one create; theyre stored on a collection of servers accessed via the Internet. Anyone with permission can not only access the documents, but can also edit and collaborate on those documents in real time. S.PAVANI

DATA WAREHOUSING & DATA MINING


K.Praneetha MVGR COLLEGE OF ENGINEERING Abstract Over the past 10 years data warehousing evolved from providing nice to know data toneed to know information The decision support systems providing summarized reports to executives have advanced to integrated information factories providing vital information to the desktops of knowledge workers.Data warehousing has benefited through the use advanced techniques of sifting through data to produce information. This discussion will cover data mining techniques used in specific business cases as well as attempt to describe problems that still exist M.Sunnila

DIGITAL SIGNAL PROCESSING


LAXMI PRASANNA AITAM ABSTRACT:
A real-time face recognition system can be implemented on an IBM compatible personal computer with a video camera, image digitizer, and custom VLSI image correlator chip. With a single facial image under semi-controlled lighting conditions, the system performs (i) image preprocessing and template extraction, (ii) template correlation with a database of 173 images, and (iii) postprocessing of correlation results to identify the user. System performance issues including image preprocessing, face recognition a lgorithm, software development, and VLSI hardware implementation are addressed. The complete system is able to identify a user from a database of 173 images of 34 persons in approximately 2 to 3 seconds.

L.SUNANDA

FINFET TECHNOLOGY
B.Tanuja S.Bharani Gayathri vidya parishad (womens) ABSTRACT: The introduction of FinFET Technology has opened new chapters in Nanotechnology. Simulations show that FinFET structure should be scalable down to 10 nm. Formation of ultra thin fin enables suppressed short channel effects. It is an attractive successor to the single gate MOSFET by virtue of its superior electrostatic properties and comparative ease of manufacturability. The distinguishing characteristic of the FinFET is that the conducting channel is wrapped around a thin silicon "fin", which forms the body of the device. The dimensions of the fin determine the effective channel length of the device. In current usage the term FinFET has a less precise definition. Among microprocessor manufacturers, AMD, IBM, and Motorola describe their double-gate development efforts as FinFET development whereas Intel avoids using the term to describe their closely related trigate architecture. In the technical literature, FinFET is used somewhat generically to describe any fin-based, multigate transistor architecture regardless of number of gates. K.Manisha

HEART FAILURE ALERT SYSTEM


K.Anwesh Kakatiya Institute of tech and science ABSTRACT: Now-a-days the deaths caused due to the heart failure have been of major concern .The majority of the deaths caused by heart failures are due to the lack of medical assistance in time. This paper gives an insight of a new technology that relates directly to the exploding wireless marketplace. This technology is a whole new wireless and RFID (Radio Frequency Identification) enabled frontier in which a victims actual location is integral for providing valuable medical services.The paper will be demonstrating for the first time ever the usage of wireless telecommunications systems and miniature sensor devices like RFID passive Tags , that are smaller than a grain of rice and equipped with a tiny antenna which will capture and wirelessly transmit a person's vital body-function data, such as pulse or body temperature , to an integrated ground station. In addition, the antenna will also receive information regarding the location of the individual from the GPS (Global Positioning Satellite) System. M.Charan

MOBILE COMPUTING LOCATION MANAGEMENT


CHANDRA RAGA MADHURI BAPATLA.BHARADWAJA

NRI Insistitue Of Technology

ABSTRACT: Mobile computing is a new emerging computing paradigm of the future. Data management and location management in this paradigm poses many challenging problems to the Mobile database community. In the past decade, Mobile communications have experienced an expensive growth due to recent technological advances in mobile networks and cellular telephone manufacturing. Location management is a very important problem among these challenges. It consists of updating the location of the user, searching the location and performing search-updates. When the host changes location, an update occurs. When the host want to communicate with a mobile host whose location is unknown to the requesting host, a search occurs. A search-update occurs after a successful search, when the requesting host updates the location information corresponding to the searched mobile host. The goal of a good location management scheme should be to provide efficient searches and updates. In this paper, the different location management schemes, various search & update strategies are discussed.

OPTICAL CAMOUFLAGE
Bheema Raju.kada SRI SAI ADITYA INSTITUTE OF SCIENCE & TECHNOLOGY Abstract: Invisibility has been on humanity's wish list at least since Amon-Ra, a deity who could disappear and reappear at will, joined the Egyptian pantheon in 2008 BC. With recent advances in optics and computing and with the advent of flexible electronics suchas a flexible liquid crystal display, that would allow the background image to be displayed on the material itself, however, this elusive goal is no longer purely imaginary .In 2003, three professors at University of Tokyo Susumu Tachi, Masahiko Inami and Naoki Kawakami created a prototypical camouflage system in which a video camera takes a shot of the background and displays it on the cloth using an external projector. They can even reflect images when the material is wrinkled. The same year Time magazine named it the coolest invention of 2003. It is an interesting application of optical camouflage and is called the Invisibility Cloak. Through the clever application of some dirt-cheap technology, the Japanese inventor has brought personal invisibility a step closer to reality.

Sixth Sense
K .Jaidev Giet ABSTRACT 'Sixth Sense' is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. Information is confined traditionally on paper or digitally on a screen. K.Niharika

Wearable Computing
S. NAGA THRIVENI CH.DIVYA K.SRAVANI

GAYATRI VIDYA PARISHAD COLLEGE OF ENGINEERING FOR WOMEN

Abstract Current portable computers and PDA s fail to truly become part of our daily lives in the sense that we need to stop what we are doing and expend conscious effort to use them. They also do not have the situational awareness that they should have: while they are not being explicitly used, they are unable to remain attentive to possible ways to help the user. In response to these problems, a personal, wearable and multimedia computer that perceives and responds to the wearer's affective state offers a new kind of perceptual interface. Instead of asking the user to continuously select preferences from a menu, the affective wearable gets to know its wearer's preferences by recognizing and responding to signals that carry emotional information. This paper exploits wearable computers unique opportunity to record and index the visual environment of the user from the first-person perspective.It describes How the capabilities of wearable computers may be used to Provide task guidance in mobile computers.Here first we Introduce the wearable computing idea and discuss requirements for a wearable computer systems.We then discuss its various real time applications and finally conclude with an outlook on future research directions.

Web based robot control


K.Srinivasa Rao K.Krishna Raviteja SRKR Engg College ABSTRACT: Wireless device control is becoming one of the popular technologies in the present scenario. Based on this technology, we have made a project to control any wireless device using web. In this, we are dealing with controlling a wireless robot from a remote area using a WAP enabled cell phone or a laptop. We can enable this application by simply sending emails from any place. We can implement this technology in various fields such as home automation, surgeries in medical field, military, automobile industries etc. G.Sarathchandra

EEE

BRUSHLESS DIRECT CURRENT MOTOR


G.Santosh

M.suresh SIVANI COLLEGE OF ENGG

ABSTRACT: Brushless Direct Current (BLDC) motors are one of the motor types rapidly gaining popularity. BLDC motors are used in industries such as Appliances, Automotive, Aerospace, Consumer, Medical, Industrial Automation Equipment and Instrumentation. As the name implies, BLDC motors do not use brushes for commutation; instead, they are electronically commutated. BLDC motors have many advantages over brushed DC motors and induction motors. A few of these are: Better speed versus torque characteristics , High dynamic response, High efficiency, Long operating life Noiseless operation, Higher speed ranges In addition, the ratio of torque delivered to the size of the motor is higher, making it useful in applications where space and weight are critical factors. In this paper, the detail construction, working principle, characteristics and typical applications of BLDC motors are explained.

ELECTRICAL MEASUREMENTS AND INSTRUMENTATION


G.DHIVYA L.MANAS

SRI SIVANI COLLEGE OF ENGINEERING


THE PAPER CONSIDERS THE PROBLEM WHICH THE DIVERSITY OF MEASUREMENT AND INSTRUMENTATION SCIENCE AND TECHNOLOGY POSES FOR THE TEACHING OF THE DISCIPLINE.IT PROPOSES DESIGN ORIENTED TEACHING OF THE SUBJECT AS THE SOLUTION.SYSTEMATIC DESIGN METHODOLOGY,WHICH IS THE BASIS OF SUCH TEACHING,IS BRIEFLY REVIEWED.PRINCIPALS OF DESIGN ORIENTED TEACHING OF MEASUREMENT AND INSTRUMENTATION ARE OUTLINED.

ELECTRICAL MEASUREMENTS IS THE SET OF THE METHODS, CALCULATIONS AIMED TO MEASURE ELECTRICAL QUANTITIES.

DEVICES

AND

POWER QUALITY AND ENERGY MANAGEMENT


SAIDEEPA.G PRAMODA.M

SRI SIVANI COLLEGE OF ENGINEERING

ABSTRACT
THE PRESENT PAPER GIVES A BRIEF INTRODUCTION TO POWER QUALITY AND WAYS FOR ENERGY CONSERVATION. ELECTRIC POWER QUALITY MAY BE DEFINED AS A MEASURE OF HOW WELL ELECTRIC POWER SERVICE CAN BE UTILIZED BY CUSTOMERS. THE TERM POWER QUALITY MEANS DIFFERENT THINGS TO DIFFERENT PEOPLE. THERE IS NO AGREED DEFINITION FOR POWER QUALITY, IT MAY BE DEFINED AS THE PROBLEMS MANIFESTED IN VOLTAGE, FREQUENCY AND THE EFFECT OF HARMONICS, POOR POWER FACTOR THAT RESULTS IN MIS OPERATION/FAILURE OF CUSTOMER EQUIPMENT. THE WIDESPREAD USE OF HIGH-POWER SEMICONDUCTOR SWITCHES AT THE UTILIZATION, DISTRIBUTION AND TRANSMISSION LEVELS HAVE MADE NON-SINUSOIDAL LOAD CURRENTS MORE COMMON. CERTAIN TYPE OF POWER QUALITY DEGRADATION RESULT IN LOSSES AND THUS LOSSES IN TRANSMISSION AND DISTRIBUTION SYSTEM HAVE COME UNDER GREATER SCRUTINY IN RECENT YEARS.THIS PAPER OUTLINES THE ISSUES RELATING REACTIVE POWER MANAGEMENT TO POWER QUALITY AND HENCE CAPACITOR DEMAND METER HAS BEEN DISCUSSED AS A POWER QUALITY ENHANCER. THE ROLE OF CAPACITOR IN POWER QUALITY ISSUES PROVES TO BE BENEFICIAL PARTICULARLY WHEN ENERGY CONSERVATION IS OUTLINED.THIS PAPER ALSO GIVES A VIEW ON VARIOUS FACTORS THAT AFFECT POWER QUALITY

POWER QUALITY IMPROVEMENT BY UPQC USING ANN CONTROLLER AND ENERGY MANAGEMENT
Santosh Kumar B.Kranthi Kumar

SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT:


Any electrical power system consists of wide range of electrical, electronic and power electronic equipment in commercial and industrial applications. The quality of the power is effected by many factors like harmonic contamination, due to the increment of non-linear loads, such as large thyristor power converters, rectifiers, voltage and current flickering due to arc in arc furnaces, sag and swell due to the switching of the loads etc.since most of the electronic equipment is nonlinear in nature these will induce harmonics in the system, which affect the sensitive loads to be fed from the system. These problems are partially solved with the help of LC passive filters. However, this kind of filter cannot solve random variation in the load current wave form and voltage wave form. Active filters can resolve this problem. However, the cost of active filters is high. They are difficult to implement in large scale. Additionally, they also present lower efficiency than shunt passive filters. One of the many solutions is the use of a combined system of shunt and active series filters like unified power quality conditioner which aims at achieving a low cost under highly effective control.

RECENT TRENDS IN ELECTRIC DRIVE AND TRACTION


CHANDANA.A SRILAKSHMI.P

SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT:


THIS PAPER PRESENTATION RECENT TRENDS IN ELECTRIC DRIVE AND TRACTION GIVES U INFORMATION ABOUT THE EVOLUTION OF MACHINES.ELECTRIC DRIVE MAY BE DEFINED AS AN ELECTRIC MOTOR TOGETHER WITH ITS CONTROL EQUIPMENT AND ENERGY TRANSMITTING DEVICE.THIS TOPIC MAKES US UNDERSTAND THE VARIOUS ELECTRIC DRIVES USED AND THE PURPOSE OF THIS TREND IN ELECTRIC FIELD.CONSIDERING THE COST AND VARIOUS CONDITIONS PREVALING IN THE TECHNOLOGY SCIENTISTS HAD INTRODUCED DIFFERENT MOTORS .NOT ONLY CONSIDERING THE COST,THEY HAVE ALSO CONSIDERED THE EFFICIENCY THUS A WIDE INCREASE IN OUTPUT. THIS PAPER OUTLINES THE ISSUES RELATING TO DIFFERENT TYPES OF DRIVES AND HOW THEY DIFFER EACH OTHER IN THAT THE MOTIVE POWER IN DC AND AC DRIVES IS PROVIDED BY DC MOTORS AND AC MOTORS RESPECTIVELY

SUBMETERING P.Bharath SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT:Submetering is using meters to measure parts of total load measured by the Electric Utilitys Master Meter/submetering is encouraged by the state and federal governments, US and Canada The load side of the Master Meter, owned by the Electric Utility, is the POCC Submetering is the measurement and billing of electricity use in separate units of a master metered building. The Submeters are owned by the building owner master meter and issue a single billing to the owner. The Submeters do not measure the total load seen by the master meter, e.g., Meters do not measure their own load
Building owner buys energy at bulk rate and bills tenants for usage instead of utility; rate is

K.Jaganadha Rao

the utility continues to read the buildings

guaranteed to be lower than residential rates in most states.

Submetering is often linked to Building Energy Management System to improve efficiency

FREE SPACE OPTICS


S.vinay kumar B.V.C.INSTITUTE OF TECHNOLOGY&SCIENCE S. naga Shankar rao

Abstract:
Five years ago, downloading a simple web page was no less than a test of your patience. Thanks to fiber optic communications technology, now we are able to watch large movies online. Now speaking about communication in defence, few major concerns associated with it are longstanding connectivity and high security. Traditionally used radio waves come with a serious threat of poor security and poor connectivity. Fiber optics serves both these purposes, but connecting soldiers with cables in the battle field sounds a bit weird, as it completely seizes the mobility of soldiers. Moreover, maintainance of fiber optic network would probably cost more than arms and ammunitions. Hence,there began a quest for a new technology which finally landed on FREE SPACE OPTICAL COMMUNICATION. In our paper, we have discussed how to overcome the connectivity and security issues of defence communication using FSO.

Wireless electricity
B.Sri hari naidu

suresh

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY


ABSTRACT
Can we imagine the life without electrical wires? From now answer to this question is Yes. The method proposed in the present paper called Witricity will facilitate to Transfer power without using wires. The efficient midrange power can be transmitted to any device which uses that range of power by the technique used in this Witricity concept.Now a days there is a Rapid development of autonomous electronics like Laptops, Cell-phones, House-hold robots and all the above devices typically rely on chemical energy storage(Battery) .As they are becoming daily needs to present generation, Wireless energy transfer would be useful for many applications as above and they need midrange energy. This is the main reason to prepare this paper. When two Magnetically Resonating objects at Strongly coupled regime tend to exchange energy efficiently by transfer of power in the non-radiating fields. This is the basic principle involved in it. By taking two coils having same magnetic resonance and one is coupled to source and other is coupled to Device. So that the energy transfer is efficient even the air gap between them is high.This paper describes the basic history of wireless power transmission, what are Magnetic resonance and Strongly coupled regime, Experimental design, Range and rate of coupling (coupling calculations) and Design of parameters and Simulation for variation of power with and without the external object between source and load.

Wireless Transmission of Electricity Development and Possibility


V. Sriram Prasad KIET COLLEGE J.padmanabham

Abstract:
In the present paper the various technologies available so far for wireless transmission of electricity and the need for a Wireless System of Energy Transmission is being discussed to find its possibility in actual practices, their advantages, disadvantages and economical consideration. This paper is mainly concentrated on : i) The most popular concept known as Tesla Theory, ii) The microwave power transmission(MPT) called Solar power satellite, and iii) The highly efficient fibre lasers for wireless power transmission. Many concepts, research papers, patents are available on wireless transmission of electricity but the commercial technologies are yet to be materialized. The paper also discusses the possible ways to get useful and practical results out of all research carried out so far elsewhere. Microwave oven magnetron with electronics to control the output power. The output microwave power ranges from 50 W to 200 W at 2.45 GHz. A coaxial cable connects the output of the microwave source to a coax-to-waveguide adapter. This adapter is connected to a waveguide ferrite circulator which protects the microwave source from reflected power. The circulator is connected to a tuning waveguide section to match the waveguide impedance to the antenna input impedance. The slotted waveguide antenna consists of 8 waveguide sections with 8 slots on each section.

Speed Control Based on Adaptive Fuzzy Logic Controller For AC-DC Converter Fed DC Motor Drives
Y.SHIRIDI BABU S.MADHAN

Sri Sivani Institute of Technology


ABSTRACT: This paper presents fuzzy logic control (FLC) based speed control system for a DC Motor drive through the use of Genetic optimization. The control system design and implementation procedures of DC motor drive using Digital Signal Processor are described. Results of simulation and experimental on the real control system demonstrated that the proposed FLC is able to overcome the disadvantage of use PI controller. Also, the results obtained have shown the feasibility and effectiveness of the control system.

SINGLE PHASE INDUTION TYPE METERS


B.PRATAP B.SOWJANYA D.V.A.S.N. NAIDU,

VITAM COLLEGE OF ENGINEERING ABSTRACT: An electric meter or energy meter isa device that measures the amount of electrical energy consumed bya residence, business or an electrically powered device. Electric meters aretypically calibrated in billing units, the most common one being the kilowatt hour.Periodic readings of electric meters establishes billing cycles and energy used during a cycle.

Satellite Solar Power System


.Balakrishna C.Niharika V.I.E.T, NARAVA AbstractThis paper gives a brief detail about the space solar power transmission to earth by using a medium of satellite in the form of micro waves. By this paper you can know the advantages And disadvantages of micro wave transmission and the future uses of this technology. Technology to be used for Satellite Solar Power Station (SSPS) has been proposed mostly as a part of each study of SSPS concepts or as research plans. The conventional solar power satellite (SPS) designs have masses of about 50,000 metric tons to generate 5 GW of electricity. The launching cost of satellite and transportation cost of arrays at satellite is dependent on the mass. Index terms-About solar power transmission, satellite construction, travelling of micro waves, and future uses of the satellite solar power transmission, advantages and disvantages, applications, conclusion. K.Sowjanya

Recent Trends in Power Quality


K.Jayaram Shankar,

Improvement Techniques
V.L.S.S.N.Phani Reddy,

Avanthi Institute of Engg and Tech


ABSTRACT: The increase in electricity generation capacity has not been keeping up with thegrowing steady state and escalating peak demand in many parts of the world.Construction of new large MW generators is a lengthy development process,both in getting the necessary approvals and the construction, itself. The Not-InMy-Backyard (NIMBY) sentiment of many communities will further lengthen orderail the construction. Hence, it is not likely to provide a timely

solution.Distributed generation (or embedded generation) has gained significant attentionin the past few years as one of more viable and cost effective solutions. Someutilities have been investigating connecting existing backup, standby and otherunder-utilized capacity to help increase capacity, while independent suppliers arelooking to build new smaller scale generation to connect in. Yet, connecting inadditional generation capacity can have a serious effect on the system reliabilityand power quality. Careful monitoring and control is needed to ensure that"more" is not "less."

VARIABLE FREQUENCY DRIVES

K.Premchand
TPIST,bobbili

Gullipalli Chandrika

Abstract
Several industrial applications like flow control require variable speed operations like throttling valves, gear. Etc have been meeting these industrial requirements, for a long time now. However, these devices are not quite suitable for controlling the speed, as these are highly inefficient, have high noise levels and call for high maintenance levels. Today, with the advent of variable frequency drives (vfds). It is possible to vary the speed of driving induction motors. In fact, varying the frequency of the supply, which is used to feed the induction motors.

POWER QUALITY
A.R.K.SAI SWAROOP Lendi institute of engineering and technology In view of current and foreseeable energy shortage and environmental scenario, the exploitation of renewable energy sources offer great potential to satisfy the energy lack and to decrease the dependence on fossil fuel, also reducing global warming caused by CO2 emissions. However, widespread implementation of these sources will be more attractive only if they operate together with energy storage technologies. Besides, an effective storage energy management is essential to deal with some mismatches among power quality, efficiency, costs and environmental constrains. This paper presents a methodology taking as basis the analytic hierarchy process and fuzzy multi-rules and multi-sets. By exploiting a multi-criteria decision making, this methodology evaluates the operation of energy storage systems such as: pumped hydro storage (PHS), compressed air energy storage (CAES), H2 storage, flywheel, super-capacitors, lithium-ion and NaS advanced batteries and VRB flow battery. The main objective of the study is to develop a multicriteria analysis to find the most appropriate energy storage system concerning a power quality priority. For this, the criteria in analysis are: efficiency, load management, technical maturity, costs, environment impacts and power quality. Considerations and results described in this paper are part of the Research & Development Program undertaken by the Federal University of Santa Maria, Brazil. M.V.SATISH KUMAR

HUMAN AREA NETWORK


SEKHAR BATTI ANURAG MANDAL PYDAH COLLEGE OF ENGG. & TECH ABSTRACT: Technology has been growing rapidly making bigger things small and tuffer jobs easy. Every thing here is to do with information. Information has become the blood of the century. In this arena transferring data ideally is a myth, while thinking of a better medium, concept of body conductivity comes into action .when body can conduct current through it then why not information .yes using this success has been achieved to an extent in tackling the situation. The physical resistance offered by the human body could be used to create a virtual keyboard on a patch of skin. The skin can be used as a power conduit and data bus. So here body becomes the backbone for networking in a group, and it is a Human Area Network. The key component of the transceiver is an electric-field sensor implemented with an electro optic crystal and laser light is employed here. Human area networking technology that enables communication by touching, which we call Red Tacton. Typical applications of Red Tacton includes in health services, Defense applications at war fronts, advanced space research etc. Our paper gives you the large applicability of the this human area network and also how it is better the present considered good technologies such as blue tooth,infra red,and so on.

A Method of the Measurement of Moisture in IC Packages Using Microwaves


NAIDU, PRATAP VITAM college of engineeringg Abstract A new method to measure the moisture content of integrated circuit (IC) packages is demonstrated. The moisture contained in the encapsulant resin was determined by usin microwaves. The microwave signal was transmitted into the encapsulant resin and reflected at the surface of the chip pad. The amplitude and phase of the reflection coefficient of the microwave signal, which varied with the moisture content of the encapsulant resin, were measured in order to determine the moisture content. A preliminary experiment was carried out, and the calibration equation was developed. The present technique indicates the possibility of determining the moisture content directly without drying and weighing IC packages. SOWJANYA

CONTROLLING AND MONITORING OF SUBSTATION AUTOMATION


V. Deepthu kumar, G.V.P COLLEGE OF ENGINEERING VISAKHAPATNAM Abstact:
Protection and substation control have Under gone dramatic changes since the advent of powerful micro-processing and digital communication. Smart multi functional and communicative feeder units, so called IEDs(Intelligent Electronic Devices) have replaced traditional conglomerations of mechanical and static panel instrumentation. Combined protection, monitoring and control devices and LAN based integrated substation automation systems are now state of the art.Modern communication technologies including the Internet are used for remote monitoring, setting and retrieval of load and faultdata. Higher performance at lower cost hasresulted in a fast acceptance of the new technology. The trend of system integration will continue, driven by the cost pressure of competition and technological progress. The ongoing development towards totally integrated substations is expected to pick up speed with the approval of the open communication standard IEC61850 in the next years.

V.Bhanu venkatesh,

\EMBEDDED SYSTEMS[

N.K.Kishan

K.Chandramouli
Godavari Institute of Engineering & Technology
ABSTRACT

Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewelry adorns the body, and has very little practical purpose. However, researchers are looking to change the way we think about the beads and bobbles we wear. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence.

ELETRIC TRACTION
V S G Ashish BharadwaJ Jagan P

Abstract:
Can we imagine this world without electricity? Obviously the answer is no. There are many applications of electricity, electric traction is one of the those which is being discussed in this paper. What is a Traction? The act of drawing or pulling is known as Traction. And an electric traction is meant by the act of drawing a vehicle or a load over a surface by motor power. And is mainly used in locomotives. The main advantage of using this act in locomotives is Eco-friendly in nature. The usage of this act of electric traction can be done by electrifying the locomotives in many ways like; over head wire system, third rail system, on board energy(chemical cells, power obtained by diesel etc.) storage systems. This paper describes about the history of electric traction. The different sources used for the traction system in locomotives. Different types of current collectors used in the over head systems. Types of motors used in this traction process and their characteristics. Advantages of this electric locomotives rather than using a diesel type of locomotives.

FRACTIONAL

FREQUENCY TRANSMISSION SYSTEM


K. KRISHNA PRADEEP

SRI SIVANI INSTITUTE OF TECHNOLOGY CHELAKAPALAM, SRIKAKULAM

ABSTRACT

The fractional frequency transmission system (FFTS) is a very promising long-distance transmission approach, which uses lower frequency (50/3 Hz) to reduce the electrical length of the ac power line, and thus, its transmission capacity can be increased several fold. This paper introduces the installation of FFTS and primary experiment results. In this paper, the phase-controlled cycloconverter is used as the frequency changer, stepping up 50/3 Hz electricity to 50 Hz electricity and supplying it to the utility grid. Thus, a new flexible ac transmission system device is successfully established. The synchronizing process of 50/3 Hz transmission system with 50 Hz utility system is introduced in this paper. The experiment results show that a 1200 km/500 kV transmission line can transmit more than 2000 MW electric power when employing the FFTS. This paper also illustrates that there is no essential difficulty to realize FFTS in engineering practice.

HIGH POWER DENSITY TRANSFORMERS


YALLA V.V .N. D. NARASIMHA RAO RUDRAKSHULA.MURALI B.V.C ENGINEERING COLLEGE

ABSRACT:
This paper describes a way to compare the relative power capacities of medium power transformers as related to their temperature rise and the technology of the basic insulation systems used in the design. Examples are provided to demonstrate the use of hybrid technology in the development of high density power transformers. This new approach can be of value in regions, such as Asia Pacific, where the load growth is high, and the optimum use equipment is desired. This relates to the reduction of space allowed for transformers and the environmental impact of the transformers.

A Method of the Measurement of Moisture in IC Packages Using Microwaves B.PRATAP B.SOWJANYA VITAM College of Engineering, Visakhapatnam
ABSTRACT

DVASN NAIDU

IMPROVEMENT OF POWER QUALITY BY ACTIVE FILTERS


P.Suvarna Latha RAJAMAHENDRI C.N.Sujini INSTITUTE OF ENGINEERING AND TECHNOLOGY

Abstract
This paper describes different power qualityproblems in distribution systems and their solutions with power electronics basedequipment. Shunt and series active power filters are described showing theircompensation characteristics and principles of operation. Different power circuitstopologies and control scheme for each type of active power filter are analyzed. Thecompensation characteristics of each topology with the respective control scheme are provedby simulation and experimentally

MAGLEV TRAINS

CH.KRISHNA MADHURI

M.VENKATA LAVANYA

RAJAMAHENDRI INSTITUTE OF ENGINEERING AND TECHNOLOGY ABSTRACT MAGNETIC LEVITATION It uses magnetic fields to levitate a metallic object .By manipulating magnetic fields and controlling their forces an object can be levitated. Because of the growing need for quicker and more efficient methods for moving people and goods, researchers have turned to a new technique, one using electromagnetic rails and trains. This rail system is referred to as magnetic levitation, or maglev. Maglev is a generic term for any transportation system in which vehicles are suspended and guided by magnetic forces. Instead of engines, maglev vehicles use electromagnetism to levitate (raise) and propel the vehicle. Alternating current creates a magnetic field that pushes and pulls the vehicle which weighs almost about 1500 tonnes and keeps it above the support structure, called a guide way.

Power generation using fuel cells

V.SRI RAMYA

CH.ASHA

G.I.E.T RAJANAGARAM
ABSTRACT Of the many emphatic tasks to the mankind the most challenging one regarding the energy and environment of the globe. In India mainly power is generated using Non Renewable resources. As growth of

population has increased the energy demand by 800 per cent, the Non Renewable resources of energy such as coal, oil, natural gas etc are not adequate for the ever-increasing demand and need. The right way to meet this energy crisis is to harness the Renewable resources of energy such as solar energy, wind, biomass, fuel cells etc. Technological innovation and commercialization is taking place at an ever increasing pace. Throughout the world, the need of the hour is energy conservation and environmental protection and a breakthrough in this filed is Fuel Cells, which can also meet these requirements. Many researches and developments have been demonstrated and many tests have been performed throughout the world with promising results. By the turn of this century, we hope this milestone may become the torchbearers of a new energy revolution. These are clean, efficient and could dramatically reduce urban air pollution, decrease oil imports and trade deficit. This system offers a better mean of utilization of fossil fuels such as natural gas.Thus, fuel cell can be considered to be the sound solution for the future problems of power generation and this paper is an effort to exhibit Fuel cells.

Non-Conventional Energy FUEL CELLS


Y.SHIRIDI BABU, Sri Sivani Institute of Technology ABSTRACT: Energy is todays basic necessity; we dont produce energy but transfer it to different forms and use it. We have selected this presentation NON-CONVENTIONAL ENERGY because it suggests logical solutions to how we have produced energy and power for such a long time till humans existed on earth. In this presentation we have described the general idea of fuel cell energy with chemical reactions and processes involved in them. We have covered the history of fuel cell, principle and its working, types of fuel cells, construction of low temperature PEM fuel cell and benefits of fuel cells. There after we concluded up with the applications of these fuels cells. S. MADHAN

CIVIL

\WASTELAND RECLAMATION AND MANAGEMENT

Sudarsini .

Uppalapati,

Mithra institute of Technology, Etcherla,

ABSTRACT:

Wastelands are those degraded lands which can be brought under vegetative cover, with reasonable effort, and which is currently under utilized and land which is deteriorating for lack of proper water and soil management or an account of natural causes. Wastelands are the important part of our environment. These lands have not been used for agricultural purpose from the last many years or which have not been put into cultivation due to natural causes. The concern for the development of degraded lands is not a new one. The extent of wastelands is being increasing day by day and this issue is complex and needs tackling on many fronts. So, they need reclamation and we have to manage them properly to make a great change. We should take many measures like development of forest areas and many other technical methods. Thus, we being the part of Environment should go forward with the sustainable development of Wastelands. We should pay attention in all such matters that are good to the Environment

Finite Element analysis


. Sri Bhargav T. Sai Sindhuri

Institute: GITAM University

Abstract Finite element analysis is a numerical technique. In this method all the complexities of the problems, like varying shape, boundary conditions and loads are maintained as they are but the solutions obtained are approximate. We may seek the distribution of temperature in the piston of an engine or we may seek the distribution of displacements and stress in a pairing slag. This method is not only used for analysis in solid mechanics, but even in the analysis of fluid flow, heat transfer, electric and magnetic fields and many more. Both static and dynamic problems can be handled by finite element analysis. Civil engineers use this method extensively for the analysis of beams, space frames, plates, shells, folded plates, foundations rock mechanic problems and seepage analysis of fluid through porous media and for analysis and design of ships, air crafts, electric motors and heat engines. A number of popular brands of finite element analysis packages are available. In the present study of finite element analysis ANSYS software is used to create a finite model. ANSYS is being used as it is user friendly. Results obtained from the laboratory model are used to validate the finite element model. Behavior of model is observed by varying thickness, elastic modulus and loading piston.

Green Buildings

Akash Prakashan

Sujit Kumar

Viswanadha Institute of Technology and Management ABSTRACT: The goal of the "Green Building" project is to reduce the impact of construction on the environment. Also known as sustainable construction. The Green Building project differs from conventional building projects by assigning equal priorities to economical, social, and environmental goals. These buildings are designed per the Leadership in Energy & Environmental Design (LEED*) rating system . The objectives of the design process: To achieve energy and water savings. To incorporate environmental friendly materials into the building.

ECO FRIENDLY HOUSING

JAIBHARATH.L.N.P

P.HARI PRASAD

T. SUDHEER

MVGR COLLEGE OF ENGINEERING ABSTRACT Eco friendly homes are not just politically correct; it is about how they save money and how an alternative architecture creates more than just buildings. The green brigade is slowly gaining ground across the rest of the country as well, not simply because it makes ecological sense but because economically and aesthetically too there is little to beat alternative building technology. As much a philosophy as a building style, a green home can slash your initial construction costs, help us t o harvest rainwater and to harness solar energy. Eco- friendly and climate-sensible design can keep your home cool in summer and warm in winter, recycle water and harness sunlight. The present paper explains the capability of an Ecohouse, which can effectively and efficiently save energy in various forms and means and can be used for diversified fields of engineering .It is no longer a question of whether to go green, it is, how much greener your home can become. It costs as much, if not more, to design the concrete eyesores, so one can simply opt to build a home that not only makes you feel good, it is actually good for you.

ENVIRONMENTAL POLLUTION AND CONTROL


I. Sandeep ABSTRACT: Humans probably first experienced harm from air pollution when they built fires in poorly ventilated caves. Since then we have gone on to pollute more of the earth's surface. Until recently, environmental pollution problems have been local and minor because of the Earth's own ability to absorb and purify minor quantities of pollutants. The industrialization of society, the introduction of motorized vehicles, and the explosion of the population, are factors contributing towards the growing air pollution problem. Today, many people dump their garbage into streams, lakes, rivers, and seas, thus making water bodies the final resting place of cans, bottles, plastics, and other household products. We may enhance the soil by helping its processes, along but we can never recreate what we destroy. The soil is a resource e for which there is no substitute. . The natural environment contains many sources of noise - wind, volcanoes, oceans, and animal sounds are all familiar intrusions accepted at various levels. S.Avinash Srivatsav

EXTRA-TERRESTRIAL BUILDINGS
S.Pranathi MVGR College of Engineering, Chinthalavalasa, Vizianagaram. Abstract In the present scenario, our ideas led to the expansion of our civilization to the Moon. Structures are needed which should protect the inhabitants from radiation, extreme temperatures and meteoroids, when idea of space is encouraged. And for that, transporting the building materials straight from Earth will be a mere difficult and expensive task. But fortunately, researches have found some indigenous materials, which include lunar Regolith, cast Regolith, glass and glass composites, metals and concrete. The most promising materials are cast Regolith and lunar glass. This paper has the goal of introducing these materials and their properties. Then the so called environmental and constructional problems that our Civil engineers need to overcome will be dealt in this paper. This paper provides information of how to construct structures with and within the lunar environment. Additional information about the robotic construction will also be provided in the end of this paper

EFFECTIVE USAGE OF E-WASTE IN THE CONSTRUCTION INDUSTRY


N.S.ANUSHA M.ANUSHA MVGR COLLEGE OF ENGINEERING, VIZIANAGARAM. ABSTRACT The development of technology is at amazing rate today. Since the developing nations like India have become a junkyard of electronic waste, the society is experiencing a huge dangerous effect in day -to-day life. So we the engineers, researchers and technologists are in need of finding the best system of electronic waste management. One such system is An effective usage of electronic waste in the fabrication of construction materials which will bring an effective attempt for reusing the electronic waste products in various industries. Hence our paper is about mixing the electronic waste in the construction elements and there by reducing the waste in a greater way. The primary objective of our paper deals with the collection, shredding and mixing of electronic waste in the construction materials. This idea has been implemented and tests were carried out on our specimen. So, its our real time project that we carried out that we found that the strength of the fabricated construction material has increased considerably.

FIBRE REINFORCED CONCRETE INCLUSIVE OF DIFFERENT FIBRES


B.SANTOSH KUMAR K.SAMBASEN

CHAITANYA INSTITUTE OF ENGINEERING AND TECHNOLOGY

ABSTRACT: Fibre reinforced concrete: (FRC) is concrete containing fibrous material which increases its structural integrity.It contains short discrete fibres that are uniformly distributed and random oriented. Fibres include steel fibres, glass fibres, synthetic fibres and natural fibre. Within these different fibres that character of fibre reinforced concrete changes with varying concretes, fibre materials, geometries, distribution, orientation and densities. Historical perspective: The concept of using fibres as reinforcement is not new. Fibres have been used as reinforcement since ancient times. Historically, horse hair was used in mortar and straw in mud bricks. In the early 1900s, asbestos fibres were used in concrete.And in the 1950s the concept of composite materials came into being and fibre reinforced concrete was one of the topics of interest. There was a need to find a replacement for the asbestos used in concrete and other building materials once the health risks associated with the substance were discovered. By the 1960s, steel (GFRC), and synthetic fibres such as polyperene fibres were used in concrete, and research into new fibre reinforced concretes continues today. Effect of fibres in concrete: Fibres are usually used in concrete to control cracking due to both plastic shrinkage and drying shrinkage. They also reduce the permeability of concrete and thus reduce bleeding of water. Some types of fibres produce greater impact, abrasion and shatter resistance in concrete. Generally fibres do not increase the flexural strength of concrete, and so cannot replace moment resisting or structural reinforcement. Indeed, some fibres actually reduce the strength of concrete. The amount of fibres added to a concrete mix is expressed as a percentage of the total volume of the composite (concrete and fibres), termed volume fraction (Vf). Vf typically ranges from 0.1 to 3%. Aspect ratio (l/d) is calculated by dividing fibre length (l) by its diameter

GABION WALLS

SOUMYA MANDAVA

RAKSHITH REDDY ERRA GITAM UNIVERSITY. .

ABSTRACT:

Gabions are rectangular baskets fabricated from a hexagonal mesh of heavily galvanized steel wire. The baskets are filled with rock and stacked atop one another to form a gravity type wall. Gabions depend mainly on the interlocking of the individual stones and rocks within the wire mesh for internal stability, and their mass or weight to resist hydraulic and earth forces. Gabions are a porous type of structure that can sometimes be vegetated. Gabions are considered to be a ha structural solution that has rd minimal habitat and aesthetic value. Gabions are defined as double twisted woven wire mesh box shaped baskets of various sizes and dimensions. The selvedges of the gabion baskets are the thicker perimeter and edge wires to which the wire mesh is secured as to withstand sudden or gradual stress from any direction. Reinforcing wires are the thicker wires incorporated into the netting during fabrication. The diaphragms are internal wire mesh partitions which divide the gabions into cells. Lacing or tie wire is the wire used to assemble and join the gabion units. Connecting wires are the internal wires used to prevent the gabions from bulging Gabions are used to slow the velocity of concentrated runoff or to stabilize slopes with seepage problems and/or non-Cohesive soils. Gabions can be used at soil-water interfaces, where the soil conditions, water turbulence, water velocity, and expected vegetative cover are such that the soil may erode under the design flow conditions. Gabions can be used on steeper slopes than riprap and are sometimes the only feasible

GREEN BUILDINGS

K.A nvesh

M.santosh kumar GAYATRI VIDYA PARISHAD COLLEGE OF ENGINEERING

ABSTRACT:
With the rapid advancement in the technology, the building industry is growing at an enormous pace. This has resulted in an adverse impact, being made on the environment.The pollution, resulting, from the construction activities, is disturbing the natural ecosystems and the damage caused by it, is irreparable. One area of concern is the energy consumption and release ofCO2. Green building technology is expected to provide solutions to the problems faced by the world.engineers, architects and builders must ensure that the development is sustainable and for the betterment of the society. An attempt has been made, I this paper, to outline the various concepts and outcomes of using green buildings.

Optimization of Energy by Using Intelligent Buildings


U.Chaitanya Krishna 1, MVGR College of Engineering R.D. Venkatesh 2

Abstract
Until recent years energy efficiency has been a relatively low priority and low perceived opportunity to building owners and investors. However with the dramatic increase and awareness of energy use concerns and the advances in the cost effective technologies, energy efficiency is fast

becoming part of real estate management, facilities management and operations strategy. This paper deals with the intelligent buildings, Building management systems (BMS) which encompasses on enormous variety of technologies across Commercial, Industrial, Institutional and domestic buildings including energy management systems and building controls. The function of BMS is central to the concept of Intelligent Buildings and its purpose is to control, monitor and optimize building services Such as lighting, CCTV and alarm systems, access control time and attendance control(staff movement and availability) etc. In this concept of Intelligent Buildings major important system is HVAC (Heating, Ventilating, and Air conditioning) System and its function is to regulate temperature, air quality and humidity. This is also known as Climate control system which is more efficient and environment friendly.

ENVIRONMENTAL POLLUTION AND ITS CONTROL GOBAL WARMING

J.KRANTHI KUMAR

S.A.SAMEER SRI VENKATESWARA UNIVERSITY COLLEGE OF ENGINEERING

ABSTRACT:Global warming is probably the biggest challenge that humanity is facing right now. We can also think of it as being part of air pollution. Along with the increasing awareness on global warming and the greenhouse gases emissions from governments, organizations and individuals, carbon footprint is becoming a new popular concept during the past two years. Global warming is now defined as the overall amount of greenhouse gas emissions in terms of CO2 equivalent emitted associated with human s activities. Regardless of whether global warming is occurring, it is a fact that every year chemicals with extremely long lifetimes are being emitted into the atmosphere. Because the Long-term effect of these substances on the atmosphere and global climate is not known, the U.S. Semiconductor industry is researching ways of changing its processes to decrease, if not completely eliminate, these long-lived

EMERGING TRENDS IN CONSTRUCTIONRECOVERING RESOURCES REDUCING, RECYCLING AND REUSING CONSTRUCTION AND DEMOLITION MATERIALS AT LAND REVITALIZATION PROJECTS
J.KRANTHI KUMAR W.ANANTH

SRI VENKATESWARA UNIVERSITY COLLEGE OF ENGINEERING ABSTRACT:

Parallel to rapid urbanization, environment impacts from construction and demolition (C&D) waste increasingly has become a major issue in urban waste management. Here comes the need for recycling and reuse. Recycling and reuse of the C&D wastes appear to be making continuous progress. The benefits of reuse and recycling of waste streams from building construction and demolition include diversion of waste materials from landfill sites and reduced depletion of natural resources. The paper focuses primarily on recycling of concrete and steel but also considers other materials such as non-ferrous metals, gypsum and wood. Technical and economic factors and the relevant standards that contribute to the success of reuse and recycling are identified. The technical and other barriers are presented and the research that is underway to remove these barriers is discussed. Economic barriers include the need for rapid demolition and clearing of the site, the cost of separating the material to be recycled from contaminating materials and the relative economic advantage of disposal versus recycling. These issues and the role of market are as a driver for increased reuse and recycling of construction and demolition waste is addressed. The progress in terms of recycling and reuse of C&D waste in our country has not reached the required standard. The government of India should make it necessary for all manufacturing companies to start recycling the wastes that have been produced by them.

RAIN WATER HARVESTING METHODS

V.RAMACHANDRA

G .SUPRABHAT

Abstract : Rain water harvesting system comprises components of various stages1) Transporting rain water 2) Filtration 3) Storage tanks This paper deals with the potential of rain water harvesting methods, the basic concept involved in the process in urban and rural areas, structural components and implementation of the process. The main advantages of the process are 1) Ground water is maintained 2) Water quality is improved 3) Meet domestic as well as irrigation needs 4) Minimizes wastage of water The methods involved in this are 1) Roof top harvesting 2) open land harvesting

PREFAB CONSTRUCTION IN LOW COST


Y.D. Pavan Kumar, CHAITANYA ENGINEERING COLLEGE ABSTRACTTo construct a building it take s more time and the cost of construction is more. If any calamities occur it is hard to construct. Where as prefab construction would improve the speed of construction and reduce the construction cost. Casting operations are not effected by environmental conditions. As the components are ready made self supporting, shuttering and scaffolding are eliminated with savings in shuttering cost. Prefab system results in saving of time and increase in our country s economy. This is a trail to introduce this novel and innovative idea to our civil engineering for better future. In prefabrication system better quality control, shape and size of structural elements can be achieved. Similar types of components are produced repeatedly resulting in increased productivity and economy in construction. To effectively meet the requirements of present day situations prefab constructions may be taken up.

N.Sruthi

REINFORCEMENT FIBERS FOR FRP COMPOSITE PRODUCTS


SHAIK MUKARRAM PASHA SIDDARTHA COLLEGE ABSTRACT: This paper presents a brief description about the different types of artificial reinforcement fibers that are commonly used for the fabrication of fiber reinforced polymer composite products. The classification, types of fibers and the commonly used reinforcement products in making FRP products are also discussed. The structure, property and application of each type of fibers are

explained in this paper. Glass fibers are suggested for making the FRP products that are used in the civil engineering constructional works.

Water

Resources

SystemsHydrological

Risk,Management

and

Development

Sk.Arifulla

V.Praveen

Amara Institute of Engineering and Technology INTRODUCTION This volume contains 43 contributions authored by experts from 31 countries which is certainly a reflection of the importance of management and risk issues in water resources in many parts of the world. The publication has been organized into seven topics. The following is a brief summary of the main themes and results of the individual contributions, highlighting the overall findings of the symposium as far as hydrological risk and water management are concerned. A more prevalent finding is an increasing vulnerability to floods. This is consistent with the results of Ben-Zvi & Azmon who examine temporal trends in flood peaks in a number of regions in Israel. Except for one region, the changes are of local extent, if any. In some catchments flood peaks appear to increase, but they appear to decline in others. While these contributions focus on isolating temporal trends and relating them to climatic indicators, the following two contributions examine individual flood processes more closely. Merz & Blschl propose a framework for identifying the causative mechanisms of floods at the regional scale. They test the framework on flood data in Austria and are able to stratify the flood peaks into long-rain floods, short-rain floods, flash floods, rain-on-snow floods and snow-melt floods. All the flood types exhibit

CHEMICAL

PLASTIC2PETROL
G.V.PHANEENDRA VARMA M.V.G.R.COLLEGE OF ENGINEERING ABSTRACT A plastic material is of a wide range of synthetic or semi-synthetic organic amorphous used in the manufacture of industrial products.These plastics have low density, low weight, Tensile strength, flexibility, elasticity, etc. Even though the over use age of this substance ruins lives due to the indigestible facts that: y y y y y y Plastics deforms under load. Plastics are low heat resistant and poor ductility. Plastics release poisonous gases on combustion. Plastic destroys soil fertility. It is a recycle process, but it is very costly. Even though we are use this in our daily lives regularly, right from early morning (with milk packet) to till going on to bed (many utilities).If we go on continue using this we could mountains of plastics around every street not mo decade.

Fuel/Energy shortage: Our country is facing critical fuel and energy deficiency. As the petroleum reserves are fast depleting we have to find some other sources of energy.Though we cant eliminate Plastic from our lives we can produce useable fuel from its waste.Prof. Mrs. Alka Umesh Zadgaonkar succeeded in producing hydrocarbons from the plastic waste.

IMPORTANCE OF SUSTAINLE DEVELOPMENT G venkata sainath B.S.S.Krishna Sastry RVR&JC College ofEngineering ABSTRACT Present day to day life innovations are just based on the requirement of common man. A human utilizes the natural resources without any limitations. So there should be a technology which can reach the present needs of man, without disturbing the resources that are available for future generations. And hence, SUSTAINABILITY is one of the wonderful emerging technologies which can fulfill the needs of man. By the definition itself, it is the development that meets the needs of present without compromising the ability of future generations to meet their own needs.

BIO HYDROGEN THE FUTURE FUEL


J.GIRIRAJ R.V.R&JC SK.LIYAKHATH AHMED

ABSTRACT Hydrogen is a valuable gas as a clean energy source and as feedstock for some industries. Therefore, demand on hydrogen production has increased considerably in recent years. Electrolysis of water, steam reforming of hydrocarbons and auto-thermal processes are wellknown methods for hydrogen gas production, but not cost-effective due to high energy requirements. . Biological production of hydrogen gas has significant advantages over chemical methods. The major biological processes utilized for hydrogen gas production are bio-photolysis of water by algae, dark and photo-fermentation of organic materials, usually carbohydrates by bacteria. Sequential dark and photo-fermentation process is a rather new approach for biohydrogen production.Currently, there is a huge demand of the chemical and bio hydrogen. There is no log on the production volume and use of hydrogen world-wide. However the estimated consumption of hydrogen is expected to reach 900 billion cubic meters in 2011.A important future application of hydrogen could be as an alternative for fossil fuels, once the oil deposits are depleted. This application is however dependent on the development of storage techniques to enable proper storage, distribution and combustion of hydrogen. If the cost of hydrogen production, distribution, and end-user technologies decreases, hydrogen as a fuel could be entering the market in 2020.

Cancer and its Diagnosis


A.Durga Deepthi, RVR&JC Abstract: Cancer is an uncontrolled multiplication of cells.Tumors are of two types namely benign tumors and malignant tumors.Malignant tumors are nothing but the condition of cancer.The study of cancer is known as oncology.The gene that is responsible for cancer is known as oncogene.For a better treatment we need proper diagnosis.Though there are many types of treatments if clear cut diagnosis is not done right treatment can not be given.Generally used treatments are chemotherapy and drugs.But advanced treatments of cancer include enzymes and stem cells.As the commonly used treatments are having many side effects these advanced are being chosed as they are biological with less side effects.Prominently used enzyme is L-asparaginase.CT scans and MRIs can not confirm cancer absolutely. M.Sri Pavani,

METALLURGICAL CHANGES DUE TO CRYOGENIC PROCESSES & ITS APPLICATIONS


S. L .K. B. Laxmi A. U. College Of Engineering ABSTRACT: Cryogenic processing is a supplementary process to conventional heat treatment process in steels .It is an inexpensive one time permanent treatment affecting the entire section of the component unlike coatings. Though the benefits have been reported widely, there are issues debated upon , in respect of the treatment parameters, extent of benefits experienced in different materials, underlying mechanism and pretreatment conditions. A Study on the improvement in wear resistance and the significance of treatment parameters in different materials has been made .It is found that cryogenic treatment imparts nearly 110% improvement in tool life .It is even superior to tin coatings. The underlying process is essentially an isothermal process. B. V. Nikhila

Waste management of power plants, production of zeolite from fly ash


B.Ravi kumar , A.Ramu A U college of engg, ABSTRACT: Power plants burning coal generate a large amount of coal fly ash (CFA)as waste matter. Cement and concrete manufacturing consumes most of the CFA produced. Zeolite synthesized from CFA is a minor but interesting product, with high environmental applications. Zeolites may be easily obtained from CFA by relatively cheap and fast conversion processes.The objective of this study is to produce zeolitic adsorbents that possesses high adsorptive capacity for toxic cations..the experamental part consists of treating fly ash brought from a local power plant and treating that with various conditions of Na2co3 concentration (5 to 40% ), reaction time from 3 to 96 hours and at the various temperatures of about 100C. The results of the experiment showed that the coal fly ash should be synthesized with 40%Na2CO3 have good adsorptive capacity. The zeolitic adsorbents showed higher cation exchange capacity values than the natural zeolite in removing NH 4 + , Pb2+, Ca2+and Cd2+ions.. A review of potential applications of different zeolitic products for waste water and flue gas treatment is also given. The examination of the data presented by different authors reveals that one of the main potential application of this material is the uptake of heavy metals from polluted waste waters. ,P. Prasanth

Inherently Safer Design and Chemical Plant Security and Safety


V.Vivek, Andhra University College of Engineering, ABSTRACT: The Center for Chemical Process Safety (CCPS) is sponsored by the American Institute of Chemical Engineers (AIChE), which represents the Chemical Engineering Professionals in technical matters in the United States. CCPS is dedicated to eliminatingmajor incidents in chemical, petroleum, and related facilities by: Advancing state of the art process safety technology and management practices Serving as the premier resource for information on process safety Fostering process safety in engineering and science education Promoting process safety as a key industry value CCPS was formed by AIChE in 1985 as the chemical engineering professions response to the Bhopal, India chemical release tragedy. In the past 21 years, CCPS has defined the basic practices of process safety and supplemented this with a wide range of technologies, tools, guidelines, and informational texts and conferences. CCPS output includes more than 70 guideline books, more than 90 university lectures, and a monthly e-mail process safety lesson delivered to more than 600,000 plant personnel around the world in 16 languages. The CCPS book P. Nithin Chand

REALTIME STUDY ON HAZARD & RISK CONTROL IN CHEMICALINDUSTRY


B.Sangeetha , M.Kranthi Rekha ANDHRA UNIVERSITY,Vishakapatnam K.Soumya

ABSTRACT The industrial revolution has resulted in rapid growth of industries manufacturing wide range of chemicals. The chemicals find use almost in all the sectors ranging from food, cosmetics, perfumes, Drugs, Pharmaceuticals, textiles, paints, plastics, paper, pesticides, fertilizers explosives etc. Ethyl acetate is solvent widely used in these chemical industries. Ethyl acetate has manufactured by the use of alcohol, acetic acid in the presence of sulphuric acid.In chemical industries, hazardous operations are carried out and highlyflammable, toxic and corrosive chemicals are manufactured, stored and handled. Hazards like fire, explosion, flammable material release, toxic release and corrosive chemical release are possible in chemical industries. In the industry where this study was carriedout, flammable toxic and corrosive chemicals are kept in storage and in processequipments. Loading

DRAG REDUCTION BY POLYMER ADDITIVES


U.Aditya , M.V.V.Satyanarayana

Andhra University College of Engineering ABSTRACT In this paper, in order to study the mechanism of drag reduction by polymer additives, the turbulent intensities and Reynolds stresses in a mixing layer and pipe flow are measured by LDA respectively. The results show that polymer additives do not simply suppress the turbulent fluctuation as we expected. The turbulence structures are changed rather than suppressed.Based on macroscopic balances, mathematical equations for efflux time during gravity draining of a Newtonian liquid ( below its bubble point) from large open storage tanks of different geometries through exit pipe of same length and cross sectional area ( the flow in the exit pipe being turbulent) located at the centre of the bottom of the respective storage tanks are developed. The equations so developed are useful in arriving at the minimum time required for draining the contents of the respective storage vessels. To drain the same volume of liquid at the same Reynolds number, the mathematical equations so developed are compared to find out Which of the tanks considered empty faster. REPLACE SILICON WITH NANOTECHNOLOGY
d.raghavendra deepak, g.n.vbhargav

ABSTRACT
Nanotechnology, a groundbreaking design for future Nano-electronics which enable 'low-cost, high yield fabrication'. A completely new way of designing an electronic interconnects for nano-scale circuits using coding theory, by using cross-bar architecture. The design consists of a pair of parallel wires crossed by a second set of wires. Together they create a switch that can deliver the functions currently assigned to transistors on silicon processors. Each latch is incredibly tiny, only a few microns wide. The crossbar latch design is "well-suited to tolerate the inevitable defects that are bound to occur in the fabrication process at such tiny dimensions"

A Review on Looking Future through Nano Technology


V.Vivek, P. Nithin Chand Andhra University College of Engineering

Abstract: Nanotechnology is the control of matter on an atomic and molecular scale. As nanotechnology is a truly multi-disciplinary field, the coordination among researchers in all related areas are crucial to the success of nanotechnology. It deals with structures 100 nanometers or smaller, and involves developing materials or devices within that size. Nanotechnology is an extremely diverse, ranging from novel extensions of conventional physics, and completely new approaches based upon molecular self-assembly, results in developing new materials with dimensions on the nanoscale. Much of the work being done today that carries the name 'nanotechnology' is not in the original meaning of the word. Nanotechnology, in its traditional sense, means built up from the bottom up, with atomic precision. Nanotechnology has the potential to create many new materials and devices with wide-ranging applications, such as in medicine, electronics, pharmaceuticals, manufacturing industry, textile, electrical, agriculture, pollution control, optics, automobiles, telecommunications, chemical industry and energy production. Nanotechnology can be used to make wonders in the present scenario for providing renewable clean energy, clean water supply, and space development and for the quick recovery from major health problems.

PHYTOR EMEDIATION: USE OF PLANTS TO CLEAN UP THE ENVIORNMENT


DB Santosh Kumar MVGR College of Engineering ABSTRACT: India is now a faster growing economy in the world. This faster economy is due to the industrialization. Industrialization especially chemical industries has its benefits and inconveniences. One of the inconveniences is the quantity of diverse toxic and hazardous wastes and its eventual contamination to soil and groundwater. To remove, destroy or sequester hazardous substances from the environment we can use plants and bacteria to clean up the environment this technique is known as PHYTOREMEDIATION. The plants can be introduced into an environment and allowed to absorb contaminants into its leaves and roots. These plants can then be harvested and treated as hazardous wastes. There have been studies where these plants have turned the contaminants into a harmless substance and then once harvested can be used for mulch, animal feed, paper etc. Higher plants possesses a pronounced ability for the metabolism and degradation of many recalcitrant xenobiotics and can be considered as green livers. Many of the plant species are able to hyperaccumulate toxic metals in their tissues. Phytoremediation can and has been used to clean up xenobiotics, heavy metals, pesticides, solvents, explosives, crude oil, polyaromatic hydrocarbons, land fill leachates, agricultural run off, acid mine drainage and radioactive contamination. Phytoremediation is an environment friendly safe cheap way to clean up contaminants early estimates on the costs have shown that plants could do that same job as a group of engineers for one tenth of the cost. However several drawbacks and limitations of Phytoremediation also exists. A long time is often required for remediation; the treatment is generally limited to soils at a meter from the surface and ground water within the few meters of the surface. DV Aditya

WASTE MANAGEMENT W2E GASIFICATION & BIO-METHANATION


g.v.phaneendra varma m.v.g.r collage of engineering ABSTRACT:OBJECTIVE:The presentation focuses on the waste management in India. It deals with the Bio-degradable waste & Sewage Treatment using Bio- methanation plant and unsorted non Bio- degradable waste treatment using W2E gasification plant. PRACTICAL ISSUES WITH WASTE MANAGEMENT IN INDIA:y Physical characteristics Unsorted waste-Mixed waste of bio degradable and nonBiodegradable. Low calorific value High moisture content Presence of hazardous waste y Lack of awareness y Unplanned growth and development of cities y Land Availability y Identifying appropriate technology for waste management:At Source treatment - Bio-degradable waste & Sewage Treatment Bio-Methanation Plant Unsorted & Non-biodegradable Waste Treatment W2E Gasification Plant d.b.santosh

MICROBIAL FUEL CELL (MFC)-A POTENTIAL ALTERNATIVE FOR POWER GENERATION


V.Abhina Andhra University ABSTRACT: A microbial fuel cell converts chemical energy to electrical energy by the catalytic reaction of microorganisms. A typical microbial fuel cell consists of anode and cathode compartments separated by a cation (positively charged ion) specific membrane. In the anode compartments, fuel is oxidized by microorganisms, generating electrons and protons. Electrons are transferred to the cathode compartment to the cathode compartments through the membrane. Electron and protons are consumed in the cathode compartment, combining with oxygen to from water. In general ,there are three types of microbial fuel cells mediator , mediator less microbial fuel cells, and microbial Electrolysis cell Microorganisms may be harnessed through fuel cells to convert organic materials into electricity, hydrogen, or industrially useful chemicals, or to remediate polluted environmental sites. In a typical microbial fuel cell (MFC), microbes transfer electrons through a traditional electron transport chain onto an electrode surface generating electricity while producing a proton motive force for ATP generation. MFC based research continues to expand knowledge about the diversity of extracellular electron transfer processes, mechanisms used in such processes and biofilm ecology. Although gram positive bacteria can generate electrical energy in MFCs, how they transfer electrons without outer membranes is a mystery.

AN INNOVATION IN WASTE WATER TREATMENT MICROBIAL FUEL CELL G.V.Phaneendra Varma MVGR College of Engineering Abstract: Present day wastewater treatment plant utilizes high amounts of energy and is costly to operate. These conventional wastewater treatment plants utilize aerobic bacteria. Organic material in wastewater contains energy that can be harvested. We propose to biologically harvest this energy in the form of electricity from wastewater obtained at The Tapowan Wastewater Treatment Plant in Nasik city. But by using a microbial fuel cell (MFC), electricity can be extracted from wastewater! The microbial fuel cell converts organic material to electricity using bacteria, leaving behind clean drinking water in the process. This is an exciting prospect for people around the world (especially in India & Third world country) who lack adequate sanitation and the means to afford it. In addition, water treatment plants require a lot of power to treat water. Each year, almost 25 billion dollars are spent in treating wastewater. A lot of money and resources could be saved if the wastewater could be used as a fuel!

PRODUCTION OF HYDROGEN FROM SOLAR ENERGY


Ch.Geetha R.V.R&J.C College of Engineering ABSTRACT In present scenario,crisis of fossil fuel and environment pollutin caused by fossil fuel is of great concern. In search of alternative energy source,hydrogen is emerging as clean, renewable energy source,the only drawback of hydrogen as a fuel is its cost.Today, most industril hydrogen is produced by using fossil fuel(natural gas) as a raw material as well as the energy source for steam reformation.But these hydrogen production methodsresult in a net increase in air pollution and are highly inefficient froman energy conversion perspective.Therfore there is a need for development of pollution free process,which can be used for hydrogen production.Hydrogen can be simply produced by cleavage of water and on burning with oxygen or air it forms water again with the release of energy/electricity,which doesn't cause any pollution.The water splitting is endothermic process and it requires high energy that can be supplied by inexhaustable solar energy through photovoltaic cell. C.N.Mounika

Determination Of Formaldehyde In Liquid, Solid And Semisolid Pharmaceuticals And Cosmetics By Flow Injection-Pervaporation B.Sangeetha M.Kranthi Rekha K.Soumya

Andhra University College Of Engineering Abstract: A spectrophotometric method is proposed for the determination of formaldehyde inliquid, solidandsemisolid cosmetic and pharmaceutical samples, employing, for the firsttime in this field, the coupling of a continuous flow configuration to a pervaporationunit. The method is based on the reactionof the analyte with pararosaniline in acidicmedium and subsequent formation of a coloured product(alkylsulfonic acidchromophore) with sodium sulfite, which was monitored spectrophotometrically. Themethod was applied to samples in which the formaldehyde content is regulated by law.In the present work, formaldehyde, removed by pervaporation, was taken up by anacidic stream of pararosaniline. The sytream leaving the unit was mixed with a sulfitesolution to yield the coloured product, which was spectrophotometrically monitored at578 nm. The method was applied to the determination of the analyte in liquid, solid andsemisolid samples such as cosmetics and pharmaceuticals products, without anyprevious treatment.

Formation of Organic Acids during the Hydrolysis and Oxidation of Several Wastes in Sub- and Supercritical Water
K.Soumya B.Sangeetha Andhra University College Of Engineerging Abstract: The objective of this work was to evaluate the transformation characteristics of fourorganic substances in supercritical water. The purpose was to demonstrate the yield andstability of the acetic acid produced under hydrolytic and oxidative conditions. Otherorganic acids, such as formic, glycolic, and lactic acids, were monitored. Cellulose andcoconut oil solutions, as well as brewery and dairy effluents, were used as feedstocks.Batch tests were performed at fixed conditions of 400 C, 27.6 MPa, and 5 min of reaction time. Hydrogen peroxide was the oxidant. Under hydrolytic conditions, 70% of the initial carbon remained as the liquid product. On the contrary, in the presence of excess oxygen, there was a 95% conversion to the gaseous product. Typically, less than 15% of the initial total organic carbon was converted to the acids. The use of catalysts (i.e., TiO2) and additives (i.e., H2SO4) did not enhanced the organic acid yield. However, catalysts addition facilitated feedstock breakdown at lower oxygen levels. To evaluate the effect of alkali addition and the use of lower temperatures, continuous flow tests were conducted using glucose as the substrate. M.Kranthi Rekha

EFFECTS OF GLOBAL WARMING ON EARTH


U.Aditya Andhra University College of Engineering, ABSTRACT The globalization averaged surface temperature of the Earth had increased during the past century by about 0.7C. Most of the like can be attributed to the greenhouse effect, the increases in the atmospheric concentration of carbon dioxide that is emitted when fossil fuels are combustible to produce energy. This study begins with the important distinction between weather and climate, followed by data showing how carbon dioxide has increased and the incontrovertible evidence that it is caused by burning fossil fuels (i.e., coal, oil, and natural gas). This syntax also exhibits the inevitable skepticism that how global warming arouses and offers a number of responses to the global warming skeptics. After dealing with the skeptics, we analyze both the current and future effects of global warming. These future effects are based on scenarios or storylines put forth by the International Institute for Applied Systems Analysis. Hereafter we address the controversial (and grim) suggestion that we have already passed the tipping point, which is the time after which, regardless of our future actions, global warming will cause considerable hardship on human society. We intend this study to be approachable for all concerned citizens, and most of students of the sciences and engineering who will soon be in a position to make a huge difference in the areas of energy and the environment. We have tried to frame the debate in terms of what the engineering community must do to help to combat global warming. We have no choice but to think in terms of global environmental constraints as we design new power plants, factories, automobiles, buildings, and homes. The best thing for scientists to do is to present what we know, clearly separating what is known from what is suspected, in a non-apocalyptic manner. If notions are clearly and passionately offered to the public, we must be prepared to accept the willingness of the people. This presents the scientific community with an enormous responsibility. M.V.V.Satyanarayana

GREEN TECHNOLOGY Pytoremediation: green technology for the clean up of toxic metals in the environment
S.L.K.B.Laxmi T.V.S.Santhi rupa B.V.Nikhila

A.U.COLLEGE OF ENGINEERING ABSTRACT The temperature on the earths surface is increasing day-to-day ;due to which the problems like global warming ,ozone layer depletion ,etc.. are existing. This inturn affects human life. What are the strategies to be implemented to reduce these problems? How can ecological balance be maintained? Does the future of the world really hang in balance? ANS:GREEN TECHNOLOGY-STRATEGIES This Paper gives how smart we can use environmental strategy to innovate ,create, build a healthy and eco-friendly environment ,move people from an environmentally friendly thinker to a green living genius..i.e.-GREEN TO GOLD .The contamination of environment by toxic metals poses a threat for "Man and biosphere", reducing agricultural productivity and damaging the health of the ecosystem. In developed nations, this problem is being addressed and solved to some extent by using "green technology" involving metal tolerant plants and the application of genetic manipulation, should hasten the process of transferring this technology from laboratory to field. Therefore, it is essential to investigate and understand how plants are able to tolerate toxic metals and to identify which metabolic pathways and genes are involved in such a process.

GREEN THUMB
B.PADMAJA G.AVINASH

PYDAH COLLEGE OF ENGINEERNG AND TECHNOLOGY ABSTRACT: Green thumb is a type of robot which deals in the protection of plants. In the green thumb robot there are two LEDs. When the red LED blinks, the plant needs water. A blinking yellow LED indicates sufficient or too much water. The solar panel on the back side of the PCB easily provides the necessary 100uA at 1.9V, even on a very rainy day. When there is more sunlight, LED brightness goes up automatically. The soil resistance is measured using a tiny alternating current (less than a microwatt). To avoid corrosion, the PCB has been tinned and the sensor poles were gold-plated. Prototypes are entering their second summer, and have been doing a good job for various plants. we don't have them by nature, "green Thumbs." Plants need new soil and enough water; that usually keeps them growing pretty well.Enough water. How much is that? A substatial layer of water will cause the roots to decay. The soil should be moist. That means neither wet nor dry. Difficult to judge, as the top layer can be quite dry even though there is still more than sufficient water below. Now, modern electronics and small solar panels allow construction of a nice, not too complex and fairly cheap Green Thumb. MOBILE COMPUTING
Harithasri S.,D.Madhuri ,M.V.Soumya

M.V.G.R. College Of Engineering Abstract Mobile computing has fast become an important new paradigm in today's world of networked computing systems. Ranging from wireless laptops to cellular phones and WiFi/Bluetoothenabled PDAs to wireless sensor networks, mobile computing has become ubiquitous in its impact on our daily lives. The debut if iPhones and the proliferation of other handheld devices has spurred excitement and interest in this evolving field. Mobile computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile IP, the more popular global mobility solution, was designed to support mobility of a single host. Even though the same protocol can be applied in the case of network mobility, providing connectivity to mobile networks introduces many issues related to the scalability, security and QoS. Instead, a mobile network can be cited as a remote site, trying to establish secured communication with the home network. This view of mobile network solves many issues related to QoS, security and scalability.

ARTIFICIAL NEURAL NETWORKS FUZZY LOGIC (AUTOMATED AUTOMOBILES) ANISH KUMAR JAIN ABSTRACT Automobiles have become an integrated part of our daily life. The development of technology has improved the automobile industry in both cost & efficiency. The automobile speed has increased . But under stress and tension he falls as a prey to accidents. The manual control of speed & braking of a car fails during anxiety. Thus automated speed control & braking system is required to prevent accidents. This automation is possible only with the help of Artificial Intelligence (Fuzzy Logic). In this paper, Fuzzy Logic control system is used to control the speed of the car based on the obstacle sensed. The obstacle sensor unit senses the presence of the obstacle. The sensing distance depends upon the speed of the car. Within this distance, the angle of the obstacle is sensed and the speed is controlled according to the angle subtended by the obstacle. If the obstacle cannot be crossed by the car, then the brakes are applied and the car comes to rest before colliding with the obstacle. Thus, this automated fuzzy control unit can provide an accident free journey. CH. VAMSI KRISHNA

CSE

Mobile computing

G.Meena Kumari

CH.Sruthi

ADITYA INSTITUTE OF TECHNOLOGY AND MANAGAMENT ABSTRACT A widely accepted prediction is that computing is moving background projecting the human user into foreground. Today computing has become a key in every technology. If this prediction is to come true, then next generation computing, which we will call as human computing is about anticipatory user interfaces that should be human centered, built for humans based on human model. In the present paper we will discuss how human computing leads to understanding of human behavior , number of components of human behavior, how they might be integrated into computers & how far we are from enabling computers to understand human behavior. SECURING Wi-Fi NETWORK FROM HACKERS

K. SADHANA

Y. LATHA

ADITYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT


ABSTRACT

The Wi-Fi networking technology for the data communication that made an evolution for cheaper and easy operation for the communication of devices. The solution for a problem will always lead to a new problem and the new problem will lead to a new solution thats how the world of technology moves on. The technology made the user easy to access the computer

devices by using the Wi-Fi technology with a cheaper in cost and efficient in working but the loophole in the technology help the devil minded to use in another way.The terrorist attacks in Delhi and Mumbai are planned by

ADVANCED NETWORK SECURITY K.Santhosh Kumar Vaishnavi Engg College, Srikakulam ABSTRACT In todays world, the importance of information cannot be overemphasize. All the services and systems of various organizations and institutions, both government and private, depend on the information fed to them. Information has attained the same or perhaps even greater significance than that of any other tangible object that is of any practical consequence. All this makes it imperative for individuals and organizations alike to safeguard their data and avoid its misuse, destruction, duplication or distribution by unauthorized people, especially after witnessing the havoc that can be unleashed by such attacks. Since the inception of conglomeration of Computers with Networks, the consequence of which shrunk the communication world, hitherto unknown, umpteen ilks of security breaches took their origin. Tersely quoting some security ditherers Eavesdropping, Hacking, Hijacking, Mapping, Packet Sniffing, 1Spoofing, Dos attacks, etc. Recent threats to the information systems of the world have led to unprecedented efforts to seek a way out to stop these miscreants. Organizations the world over have joined hands to combat this menace with their entire technological prowess. These efforts have led to the development of computer security systems that are far more rugged and comprehensive than their earlier counterparts. Computer security has become synonymous with network security. Our paper deals with one such system that is presently under development and has been named PALLADIUM. Various other antidotes that are in fact inextricable from security issues such as the Cryptography, Authentication, Integrity and Non Repudiation, Key Distribution and V.Ravi

certification, Access control by implementing Firewalls etc. also feature in the discussion in the form of the KERBEROS AUTHENTICATION SYSTEM, IP Sec & THE DMZ ZONE.

ANDROID WITH GPS ALARM

1.Ch.Sai Siddhartha

2.K.Anil kumar

JNTUK,UNIVERSITY COLLEGE OF ENGINEERING OBJECTIVE: To develop an Android based application for triggering locator. Alarm with GPS

Android is an open source software stack that includes the operating system, middleware, and key applications along with a set of API libraries for writing mobile applications that can shape the look, feel, and function of mobile handsets. In Android, native and third-party applications are written using the same APIs and executed on the same run time. These APIs feature hardware access, location-based services, support for background services, map-based activities, relational databases, Inter device peer-to-peer messaging, and 2D and 3D graphics. Android sits alongside a new wave of mobile operating systems designed for increasingly powerful mobile hardware. Android offers new possibilities for mobile applications by offering an open development environment built on an open source Linux kernel. Hardware access is available to all applications through a series of API libraries, and application interaction, while carefully controlled, is fully supported. In Android, all applications have equal standing. Third-party and native Android applications are written using the same APIs and are executed on the same run time. Users can remove and replace any native application with a third-party developer alternative; even the dialer and home screens can be replaced.

BRAIN COMPUTER INTERFACE S.Joshua Johnson, Avanthi Institute of Engg and Tech ABSTRACT: As the power of modern computers grows alongside our understanding of the human brain, we move ever closer to making some pretty spectacular science fiction into reality. Imagine transmitting signals directly to someone's brain that would allow them to see, hear or feel specific sensory inputs. Consider the potential to manipulate computers or machinery with nothing more than a thought. It isn't about convenience -- for severely disabled people, development of a brain-computer interface (BCI) could be the most important technological breakthrough in decades. In this article, we'll learn all about how BCIs work, their limitations and where they could be headed in the future. The reason a BCI works at all is because of the way our brains function. Our brains are filled with neurons, individual nerve cells connected to one another by dendrites and axons. Every time we think, move, feel or remember something, our neurons are at work. That work is carried out by small electric signals that zip from neuron to neuron as fast as 250 mph [source: Walker]. The signals are generated by differences in electric potential carried by ions on the membrane of each neuron. CATASTROPHY WARNING SYSTEM THROUGH MOBILE PHONES G.KAVYA, K.GOPI CHAITANYA COLLEGE OF ENGINEERING, FARHEENNAAZ A.Sravya,

ABSTRACT
This system warns subscribers wherever they are, via a mobile text message. The alarm system picks up seismic signals from global stations and consolidates the information. If there is a danger an alarm is sent out to subscribers via an SMS. ABSTRACT: Worst catastrophies tsunamis, like cyclones cannot be prevented or precisely predicted, but there are many systems being developed to warn and save the people from dying and from being homeless. earthquakes, Mobile for (GSM) standard used here for making calls such as text messaging.

CLOUD COMPUTING
P.SAI BHARGAV , SAI DEEPAK,

SRI MITTAPALLI COLLEGE OF ENGINEERING ABSTRACT Cloud computing is basically an Internet-based network made up of large numbers of servers - mostly based on open standards, modular and inexpensive. Clouds contain vast amounts of information and provide a variety of services to large numbers of people. The benefits of cloud computing are Reduced Data Leakage, Decrease evidence acquisition time, they eliminate or reduce service downtime, they Forensic readiness, they Decrease evidence transfer time The main factor to be discussed is security of cloud computing, which is a risk factor involved in major computing fields Cloud computing is Internet- ("CLOUD-") based development and use of computer technology ("COMPUTING")

CRYPTOGRAPHY
K. Suseela Aishwarya , A.Naga sai durga

SRI VASAVI ENGINEERING COLLEGE

ABSTRACT: This paper introduces Advance Cryptography Techniques. Cryptography is The science of protecting data and Network Security keeping information private and Secure from unauthorized Users. This paper also gives the Fundamental Requirements for the Data Transmission, The security attacks like Interruption, interception, Modification of the data Transmission.

Cryptology
. D.janakiramana SRI SIVANI College of Engineering Abstract The present century has been one of many scientific discoveries and technological advancements. The issue of security came with the advent of technology. As computing systems became more complicated, there was an increasing need for security. If the unauthorized disclosure or alteration of the information could result in any negative impact, it should be secured. This paper deals with cryptography, which is one of the methods to provide security. It involves the use of a cryptographic algorithm used in the encryption and decryption process. Encryption is the science of changing data so that it is unrecognizable and useless to an unauthorized person. Decryption is changing it back to its original form. The main focus of this paper is on Quantum Cryptography, which has the advantage that the exchange of information can be shown to be secure in a very strong sense, without making assumptions about the intractability of certain mathematical problems. It is an approach of securing communications based on certain phenomena of quantum physics. The quantum computers could do some really phenomenal things for cryptography if the practical difficulties can be overcome. B.sravya

EMBEDDED SYSTEMS
SAI SANDEEP TIRLANGI NAGUR BABU CHINNAM

Sasi Institute of Technology & Engineering Abstract: As you go about the affair of living, you put your life safe and luxurious with all the available resources .Now days we all are entrenched with computers and almost all depended on them. Devices with intelligence rule the world. Imbibing intelligence to these devices is through a system called EMBEDDED SYSTEM. an example of Embedded System. Its applications provide marvelous opportunities

for ingenious use of computer technology. Almost all every system introduced into the market is

Firewall
S.Hasish Vignans Institute of Information Technology A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. A firewall is a sigle point of defence between two networks. GADGETS P.Geeta Devi SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT This topic explains you all about, what is a gadget and various examples of gadget. A biologically sensible agelength structured multispecies Gadget model (incorporating minke whales, cod, herring, and capelin) for the Barents Seaacting as the operating model has been linked to Fisheries Library in Racting as the management procedureto perform management strategy evaluations. Assessments may be run using either XSA, survey-based methods, or by taking modelled stock numbers directly. Total allowable catches are based on the assessment and harvest control rules (HCRs). The tool can be used for assessing a wide variety of sources of uncertainties within the assessment process. Model structure and linkages are K.Sirisha M.V.Ravikumar

described and a fit to the historical data is presented. A base case of future dynamic (non-steady state) stock trends, based on the existing HCRs, is compared with alternative management and environmental scenarios. The relative differences for each scenario in terms of stock size and catches highlight a number of uncertainties within the biological and fisheries system. The results indicate that the current management rules are robust to the range of scenarios examined so far.

HONEY POTS FOR NETWORK SECURITY

JOSHITA KOTHURI GITAM UNIVERSITY

RENATI SOUSEELYA

Abstract: Honey pots are an exciting new technology. They allow us to turn the tables on the bad guys.In the past several years there has been growing interest in exactly what this technology is and how it works. A honey pot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. One goal of this paper is to show the possibilities of honey pots and their use in research as well as productive environment. Compared to an intrusion detection system, honey pots have the big advantage that they do not generate false alerts, as each observed traffic is suspicious, because no productive components are running in the system. So in this paper we discuss about honey pots a method for providing network security and briefly about firewalls.

KEY LOGGERS -A THREAT TO NETWORK SECURITY MAVALAPALLI SESHANK GITAM University\ Abstract: KONATHALA CHANAKYA

A key logger is any software or hardware that is designed to secretly monitor and save all the keystrokes. Key loggers developers release them as legitimate software but still they are used mainly for hacking purposes to steal personal user data. In the present world of information technology, key loggers along with phishing became most common way of hacking. Many users are still unaware of this dangerous attack and are falling victim to cyber frauds. This paper describes what exactly a key logger is? The different types of key loggers like hardware keyloggers, hook based keyloggers and kernel keyloggers, working mechanism of these keyloggers. Algorithms to detect various types of keyloggers, used by different antiviruses, including new behavior based detecting techniques and how to prevent oneself from being a victim of the key loggers?

CLOUD COMPUTING
P.SAI BHARGAV , T.RAVI TEJA

SRI MITTAPALLI COLLEGE OF ENGINEERING ABSTRACT Cloud computing is basically an Internet-based network made up of large numbers of servers mostly based on open standards, modular and inexpensive. Clouds contain vast amounts of information and provide a variety of services to large numbers of people. The benefits of cloud computing are Reduced Data Leakage, Decrease evidence acquisition time, they eliminate or reduce service downtime, they Forensic readiness, theyDecrease evidence transfer time The main factor to be discussed is security of cloud computing, which is a risk factor involved in major computing fields Cloud computing is Internet- ("CLOUD-") based development and use of computer technology ("COMPUTING")

PHISHING
A.Sagar. K.Murali ManoharBrahmam MVGR COLLEGE OF ENGINEERING Abstract:- Phishing scams have rocked Internet users for some time now. The global media runs stories on an almost daily basis covering the latest organization to have their customers

targeted and how many victims succumbed to the attack. . Phishing is an online scam used to commit identity theft. A fraudulent, but official-looking is sent to a user in an attempt to con that user into divulging personal and/or private information, which is then used for identity theft. If someone can get vital authentication information, that person may be able to access another's bank accounts, charge accounts or credit information. This paper describes attacks that exploit the online Marketplaces susceptibility to covert fraud, and social engineering to hijack account Access and ultimately steal money. The attacker introduces a fatal security flaw into a trusted embedded system (e.g. computer motherboard, network interface card, network router, cell phone),distributes it through the online marketplace at a plausible bargain, and exploits the security flaw to steal information. consumer risk far exceeds the price of the good. By understanding the tools and techniques used by professional criminals, and analyzing flaws in their own perimeter security or applications, organizations can prevent many phishing attack vectors.

WIRELESS LAN SECURITY


D.GAUTAM AITAM J.JAYA KRISHNA

ABSTRACT:

Although a variety of wireless network technologies have or will soon reach the general business
market, wireless LANs based on the 802.11 standard are the most likely candidate to becomewidely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth comparable to a standard Ethernet wired LAN in performance. An upcoming

version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work wireless even if ITstaff and security management administrators do not yet recognize

LANs as an approved technology. This paper addresses the security concerns raised by both

current and upcoming 802.11 network technologies.

SURFACE COMPUTING
K. ABHINAV MANJEERA.M GAYATRI VIDYA PARISHAD ABSTRACT: The name Surface comes from "surface computing," and Microsoft envisions the Coffee-table machine as the first of many such devices. Surface computing uses a blend of wireless protocols, special machine-readable tags and shape recognition to seamlessly merge the real and the virtual world an idea the Milan team refers to as "blended reality." The table can be built with a variety of wireless transceivers, including Bluetooth, WI-Fi and (eventually) radio frequency identification (RFID) and is designed to sync instantly with any device that touches its surface. SRIVIDYARANI.M

ARTIFICIAL NEURAL NETWORKS FUZZY LOGIC (AUTOMATED AUTOMOBILES) ANISH KUMAR JAIN ABSTRACT Automobiles have become an integrated part of our daily life. The development of technology has improved the automobile industry in both cost & efficiency. The automobile speed has increased . But under stress and tension he falls as a prey to accidents. The manual control of speed & braking of a car fails during anxiety. Thus automated speed control & braking system is required to prevent accidents. This automation is possible only with the help of Artificial Intelligence (Fuzzy Logic). In this paper, Fuzzy Logic control system is used to control the speed of the car based on the obstacle sensed. The obstacle sensor unit senses the presence of the obstacle. The sensing distance depends upon the speed of the car. Within this distance, the angle of the obstacle is sensed and the speed is controlled according to the angle subtended by the obstacle. If the obstacle cannot be crossed by the car, then the brakes are applied and the car comes to rest before colliding with the obstacle. Thus, this automated fuzzy control unit can provide an accident free journey. CH. VAMSI KRISHNA

SPINS: SECURITY PROTOCOL IN WIRELESS SENSOR NETWORK


N.Sai Manasa
This paper proposes a security protocol for Wireless Sensor Networks which are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations.

105

SIXTH SENSE TECHNOLOGY G.SANDHYA RANI S.SOWJANYA

GIET ENGINEERING COLLEGE ABSTRACT: We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. Information is confined traditionally on paper or digitally on a screen. SixthSense bridges this gap, bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via naturalBasically, Sixth Sense is a mini-projector coupled with a camera and a cellphonewhich acts as the computer and your connection to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority Report.However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its magicand a lot moreeverywhere, even while you are jumping hysteric over Oprah's sofa. Steganography- the art of hiding information D.S.Raghu Ram, S.Rajeswari,

Avanthi Institute of Engg and Technology

The Right to privacy is the most comprehensive of rights and the right most valued by civilized man.. - Justice Louis Brandies, US Supreme Court, 1928. Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.

106

Mobile Computing in Data Communications


M.SWETHA R.SUMA

GODAVARI INSTITUTE OF ENGINEERING AND TECHNOLOGY

MOBILE COMPUTING is defined as a technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the cellular networks over last few years. So for the extension of this technology mobile. Computing is used for data communication. In this paper we are presenting an overview of existing cellular network and detail description of the CDPD technology which allows data communication across cellular network. Among the other alternatives of this technology CircuitSwitched Cellular, Specialized Mobile Radio, Wireless Data Networks . CDPD is more advantageous, because it splits data into packets those packets are inserted on momentarily unoccupied voice frequencies during the idle time on voice signals. The network hierarchy of CDPD network has different levels; each level performs its own specified task. So CDPD is BEST in Speed, Security, Cost of Service, Cost of Deployment, Mobility, and Interoperability. Finally we are describing the applications of Mobile Computing and the FUTURE of Mobile Computing .

107

108

ECE

109

4G Communications
K.Srinivas SIST ABSTRACT: Mobile communication is continuously one of the hottest areas that are developing at a ooming speed, with advanced techniques emerging in all the fields of mobile and wireless communications. With this rapid development generation mobile systems will be unched within decades. 4G mobile systems focus on seamlessly integrating the existing wireless technologies. This contrasts with 3G, which merely focuses on developing new standards and hardware. 4G systems will support comprehensive and personalized services,providing stable system performance and quality service. "4G" doesn't just define a standard; it describes an environment where radio access methods will be able to interoperate to provide communications sessions that can seamlessly "hand-off" between them. More than any other technology, 4G will have a profound impact on the entire wireless landscape and the total value chain. This paper focuses on the vision of 4G and briefly explains the technologies and features of 4G. A.Vamsi krishna

4G Communications
Abhishek karanam MVGR Abstract Mobile communication is continuously one of the hottest areas that are developing at a booming speed, with advanced techniques emerging in all the fields of mobile and wireless communications. With this rapid development it is expected that fourth generation mobile systems will be launched within decades seamlessly integrating

110

A REAL TIME FACE RECOGNITION SYSTEM USING VLSI L.Divya M.Latha RAGHU ENGG COLG Abstract: A real-time face recognition system can be implemented on an IBM compatible personal computer with a video camera, image digitizer, and custom VLSI image correlator chip. With a single frontal facial image under semi- HARDWARE controlled lighting conditions, the system performs (i) image preprocessing and template extraction, (ii) template correlation with a database of 173 images, and (iii) postprocessing of correlation results to identify the user. System performance issues including image preprocessing, face recognition algorithm, software development, and VLSI hardware implementation are addressed. In particular, the parallel, fully pipelined VLSI image correlator is able to perform 340 Mop/second and achieve a speed up of 20 over optimized assembly code on an 80486/66DX2. The complete system is able to identify a user from a database of 173 images of 34 persons in approximately 2 to 3 seconds. While the recognition performance of the system is difficult to quantify simply, the system achieves a very conservative 88% recognition rate using cross-validation on the moderately varied database. V.S.Bharathi

Adaptive System Simulation and Noise Analysis Toolbox


B. Lavanya Rajeswari Vignan Institute of Engineering

Abstract

This paper introduces Adaptive System Simulation and Noise Analysis Toolbox (ASSNAT) version 1.1 (v1.1), which is an open source MATLAB based software package for simulation and analysis of Adaptive signal processing systems and noises, with its new feature learning curve method, where we can make an advanced level comparative study based analysis. ASSNAT v1.1 contains a variety of adaptive systems, filter algorithms and a wide range of input signals for simulation for a user friendly graphical interface. Central and advanced features, underlying models and algorithms,

111

AUTONOMOUSCARS (EMBEDDED SYSTEMS)


G RANGA RAJESH QIS COLLEGE OF ENGINEERING& TECH Abstract:As you go about the affair of living, you put your life safe and luxurious with all the available resources .Now a days we all are entrenched with computers and almost all depended on them. Devices with intelligence rule the world. Imbibing intelligence

CAPSULE CAMERA
B.RAMANAND MVGR COLLEGE OF ENGINEERING ABSTRACT: An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, which is specifically designed for a particular kind of application device. Capsule camera is one of those. Here a technique called capsule endoscopy is used which allows us to see places inside the small bowel where other methods cannot reach. Capsule camera is a camera with the size and shape of a pill. It contains a miniature camera, battery, light, computer chip and wireless transmitter. G.GAYATRI

CONTENT BASED IMAGE RETRIVAL


R.Viveknandakumar SIST ABSTRACT

SYSTEM
G.Santoshkumar

Digital Image Processing generally refers to processing of a two dimensional images by a digital computer. A digital image is an array of real or complex numbers represented by a finite number of bits. Interest in DIP methods stems from two principal application areas: Improvement of practical information for human interpretation and Processing of scene data for autonomous machine perception. The Digital Image Processing is a highly studied research area within signal processing and computer graphics.

112

DSP FOR SMALL R.SRI SRAVANTHI

BIOMETRIC

SOLUTIONS

CH.PRASANANJALI KIET

ABSTRACT Biometrics is the science of measuring and statistically analyzing biological data. In information technology, biometrics refers to the use of a persons biological characteristics for personal identification and authentication. Fingerprint, iris-scan, retinal-scan, voiceprint, signature, handprint and facial features are some of the

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING


K.SWATHI HEMA VITAM COLLEGE OF ENGINEERING ABSTRACT; A fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer. Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures, which are collectively called the minutiae. It explains the finger print characteristics S.NAVYA VIGNAN S WOMEN COLLEGE

113

Global Positioning System N.MOUNICA ABSTRACT GPS (Global Positioning System), a constellation of 24 NAVSTARs (Navigation Satellites for Time and Ranging) in six groups of four owned and operated by the Department Of Defense (DOD), is the first positioning system to offer highly precise location data for any point on the planet, in any weather. Todays GPS receivers are extremely meters. For example Militaryapproved equipment can pinpoint accuracy
P.DIVYA BHARATHI MVGR

IridiumSatelliteConstellation --THE ULTIMATE WIRELESSNETWORK


V.Yaswanth Raghava BVC ENGINEERING COLLEGE ABSTRACT: Iridium is a satellite based on wireless personal communications network P.Padmanabham

designed to permit a wide range of mobile telephone services including voice, data, networking, facsimile, geo location, fax capabilities and paging. Mobile satellite systems (MSS) provide the vehicle for a new generation of wireless telephone services called personal communications satellite systems (PCSS).

114

NETWORK SECURITY THROUGH QUANTUM CRYPTOGRAPHY


SIR C R REDDY COLLEGE OF ENGINEERING T Durvasulu Abstract: Quantum cryptography provides a secure means for distributing secret keys between two parties on an optical network. A unique feature of the technique is that the secrecy of the keys is independent of the resources available to a hacker. In particular, their secrecy does not rely upon a difficult mathematical problem that could be solved, or a clever algorithm that could be cracked or even some ingenious hardware that might one day be reverse engineered. In this report we focus on quantum cryptography protocols A Rajesh

115

INTELLIGENCE WIRELESS VIDEO CAMERA USING COMPUTER


V. BINDU MADHAVI ABSTRACT: The intelligent wireless video camera described in this paper is designed using wireless video monitoring system, for detecting the presence of a person who is inside the restricted zone. This type of automatic wireless video monitors is quite suitable for the isolated restricted zones, where the Y. APARNA M.PRIYANKA

MST RADER
M.RAJESH KUMAR, PITS ENGG COLLEGE ABSTRACT: MSTRADER means Mesosphere-Stratosphere-Troposphere (MST) radar was established at Gadanki near Tirupati as a national facility.MST radar uses the scattering and reflection from variation in radio refractive index of neutral atmosphere, which in turn depends on variability of humidity, temperature and electron density induced by turbulence in the lower and middle atmosphere.We are using two basic

TRACK WHILE SCANNING (TWS) IN RADAR SERVO TRACKING SYSTEMS Y.LAXMI LAVANYA P.ANUSHA

M.V.G.R. COLLEGE OF ENGINEERING, ECE DEPARTMENT ABSTRAC The purpose of a tracking system is to determine the location or direction of a target on a near-continuous basis. An ideal tracking system would maintain contact and constantly update the target's bearing (azimuth), range and elevation. The output of the tracking system can be sent to a fire control system, which stores the information and derives the target'smotion and therefore its future position.

116

SELF-RECONFIGURABLE ROBOTS FOR ADAPTIVE AND RADIO FREGQUENCY IDENTIFICATION B.ANUSHA ANITA RAJA SAGI MVGR COLLEGE OF ENGINEERING An EPC RFID tag used by Wal-Mart. Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID.

SELF-RECONFIGURABLE ROBOTS FOR ADAPTIVE ANDS ENSI NG FOR DANGER AN EFF ECT IVE S OL UT ION F OR TERRORISM AN D OT HER THREATS US ING CORREL AT ED S ENS OR NET WO RKS A.Kamal INTROD UCT ION T O S ENS OR: A s ens or is a t ype of trans ducer . Dir ect -indi cat ing s ens or s, for exa mpl e, a mer cur y t her momet er , ar e huma n-r eadabl e. Ot her s ens ors mus t be pair ed wit h an indi cat or or dis pla y, for ins tance a t her mocoupl e. Most s ens or s ar e el ectr ical or el ectr oni c, alt hough ot her t ypes exist G.B.M.Venkatesh

117

118

SKINPUT:SKIN AS INPUT SURFACE T. V. N. Sai Krishna1, T. Neel Kamal Reddy2, N. Varshney3 Dept. of Electronics & Communication Engineering GITAM INSTITUTE OF TECHNOLOGY

Abstract- Skinput which marries the words skin and input is a technology with specialized sensors that gauge vibrations happening inside of the human body. A tap on the wrist or finger can be read and classified as a certain command and then matched with interactive activities. We collect these signals using a novel array of sensors worn as an armband. This approach provides an always available, naturally portableSMART ANTENNA n

D.Manideep ABSTRACT:

K.Pavan Kumar

One of the most rapidly developing areas of communications is Smart Antenna systems. This paper deals with the principle and working of smart antennas and the elegance of their applications in various fields such a 4G telephony system, best suitability of multi carrier modulations such as OFDMA etc..,

SMART ANTENNA FOR MOBILE COMMUNICATION N.siva Krishna reddy S.S.vamsi Krishna

smart antennas are one of the most hottest topics in mobile communication. The smart antenna technology can significantly improves wireless system performance and economics for a range of potential users. It enable operators of PCs cellular and wireless local loop networks to realize significant increase in signal quality, network capacity and coverage. In truth it is not the antenna that is smart but the antenna system are smart. Firstly we present different types of smart antenna systems and features and benefits of smart antenna systems, next we deal with the basic problem of wireless transmission such as co-channel interference multi path propagation .

119

B.BALA MANOJKUMAR

CH.DILEEP KUMAR

K.V.V.S.S.MEGHANA

On 26 December 2004, a series of devastating waves attacked costlines all around the Indian Ocean, taking the largest toll of any tsunami ever recorded. The surges decimated entire cities and villages, killing more than 2,25,000 people within a matter of hours and leaving atleast a million homeless. We, then, only wished we could mitigate the pain and suffering of those affected.

120

UNIQUE P-MAIL ADDRESSING ---An Internet based application

K. Kala Manasa K. Anusha SRI VAISHNAVI COLLEGE OF ENGINEERING ABSTRACT

K. sridivya

Technology can be utilized for learning in many ways. The modern way of learning integrates Internet technology. We should provide still more security to the Internet applications and we should improve the standards. For development of Internet in INDIA first of all we should make the people to be aware of this concept. As an Internet application developer we should implement

WIRELESS COMMUNICATION IN ZIGBEE SRI SARATHI INSTITUTE OF ENGG & TECHNOLOGY

K.PRATHYUSHA.

L.RAMYASREE.

Abstract:The concept of Zigbee is associated with controlling of all electronic devices and communicating with themselves in the surrounding environment with the help of simply our mobile or PC by using this latest technology .The serious problem of more cables for physical connection among devices which is solved by this wireless technique.

121

ZigBee MVGR College

T.PRIYAMVADA

R.MONIKA ESWARI

A wireless network consists of nodes that are not connected by cables, but communicate with each other via radio, infra-red or other electromagnetic radiation. Therefore, each node is able to transmit and receive messages through the relevant medium. In addition, most nodes run one or more applications

PYDAH ENGG OF COLLEGE


P.KIRANSAI, Abstract : This paper presents a new method to control and guide mobile robots. In this case, to send different commands we have used electrooculography (EOG) techniques, so that, control is made by means of the ocular position (eye displacement into its orbit). An inverse eye model is developed based in electrooculography and therefore the saccadic eye movements can be detected and know where user is looking. This control technique can be useful in multiple applications, but in this work it is used to guide an autonomous robot (wheelchair) as a system to help to people with severe disabilities. K. Ruthvik,

122

CYBER ATTACKS P.RAMU 08981A0493 ECE DEPT P.HARSHA 08981A0492 ECE DEPT

This paper presents a new method to control and guide mobile robots. In this case, to send different commands we have used electrooculography (EOG) techniques, so that, control is made by means of the ocular position (eye displacement into its orbit). An inverse eye model is developed based in electrooculography and therefore the saccadic eye movements can be detected and know where user is looking. This control technique can be useful in multiple applications, but in this work it is used to guide an autonomous robot (wheelchair) as a system to help to people with severe disabilities. The system consists of a standard electric wheelchair with an on-board computer, sensors and graphical user interface running on a computer.

Multimedia streaming technology in 4G Mobile Communication systems

M. Swetha Sri 2nd Year E.C.E. Dept.

Navya 2nd Year E.C.E. Dept.

ABSTRACT: The popularity and evolution of mobile devices like laptops, mobile phones and Personal Digital Assistants (PDA), and the evolution of fast mobile networks in the last decade, have made it possible to increase the complexity of mobile applications and services provided to end-users. It is also a spectacular growth in multimedia communication especially via the World Wide Web. This paper explore some of the current technology of mobile devices, mobile networks and multimedia systems, and is based on the exploration outline some issues for design and development of mobile multimedia systems in 4G Mobile Communication System.

123

CRYPTOGRAPHY: SECURING THE INFORMATION P. Sri lakshmi A. Divya P.Saranya

SRI SIVANI INSTITUTE OF TECHNOLOGY ABSTRACT: Cryptography's aim is to construct schemes or protocols that can still accomplish certain tasks even in the presence of an adversary. A basic task in cryptography is to enable users to communicate securely over an insecure channel in a way that guarantees their transmissions' privacy and authenticity. Providing privacy and authenticity remains a central goal for cryptographic protocols, but the field has expanded to encompass many others, including e-voting, digital coins, and secure auctions. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data This paper explains what cryptography is about and how we can scientifically justify a cryptographic scheme's security.

ADAPTIVE MISSILE GUIDANCE USING GPS BY SATELLITE COMMUNICATION

M JAGADEESH KUMAR

M GOPI CHAND

St.Anns College of Engineering & Technology ABSTRACT : In the modern day theater of combat, the need to be able to strike at targets that are on the opposite side of the globe has strongly presented itself. This had led to the development of various types of guidedmissiles. These guided missiles are self-guiding weapons intended to maximize damage to the target while minimizing collateral damage. The buzzword in modern day combat is fire and forget.

124

ANTENNAS AND RADAR

M.Srujana MVGR Abstract RADAR DEFINITION

P.Vishnu vandana

Radar is an object-detection system which uses electromagnetic waves specifically radio waves to determine the range, altitude, direction, or speed of both moving and fixed objects such as aircraft, ships, spacecraft, guided missiles, motor vehicles, weather formations, and terrain.

THE BIO-ARTIFICIAL LIVER

K.SUGUNA

K.RADHIKA SRI SIVANI

R.SOWMYAVASANTHI

INTRODUCTION: The only treatment available for liver failure is liver transplant surgery; but donor organs are difficult to obtain, and the procedure, which is expensive and complex, is frequently unsuccessfulA workable artificial liver is desperately needed. Unlike the heart and the kidneys, the liver is able to regenerate; many people who have suffered liver damage would survive if they could be supported by an artificial liver until their own livers heal. The device could also save the lives of hepatitis victims, and offer a means of survival for the millions of people whose livers are in failure. And, an artificial liver could support patients awaiting transplant surgery, or waiting for a new donor organ after a transplant has failed

125

BEAMED POWER TRANSMISSION FROM SOLAR POWER SATELLITES K. Tarakesh, Lendi Institute of Engineering and Technology ABSTRACT: The desire of the modern man for more and more amenities and sophistication led to the unscrupulous exploitation of natural treasure. Though nature has provided abundant source of resources. It is not unlimited. Hence the exhaustion of the natural resources is eminent. The only exception to this is sunlight.

126

127

The Brain Fingerprinting Technology

Y.Sowjanya,

V.Santoshi MVGR College of Engg.

N.Harika

ABSTRACT:Brain Fingerprinting is a new computer-based technology to identify the perpetrator of a crime accurately and scientifically by measuring brain-wave responses to crime-relevant words or pictures presented on a computer screen. Brain Fingerprinting has proven 100% accurate in over 120 tests, including tests on FBI agents, tests for a US intelligence agency and for the US Navy, and tests on real-life situations including felony crimes. BRAIN FINGERPRINTING

Abstract:

Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection derives from studies suggesting that persons asked to lie show different patterns of brain activity than they do when being truthful. Issues related to the use of such evidence in courts are discussed. The author concludes that neither approach is currently supported by enough data regarding its accuracy in detecting deception to warrant use in court.

128

BRAINPORT Tongue Display Technology

G.Prudhvi Vivekananda

A.V.S.N Abhishek

St.Theressa Institution of Engineering

Abstract: Scientists have been studying electrotactile presentation of visual information since the early 1900s, at least. These research setups typically used a camera to set current levels for a matrix of electrodes that spatially corresponded to the camera's light sensors. The person touching the matrix could visually perceive the shape and spatial orientation of the object on which the camera was focused. BrainPort builds on this technology and is arguably more streamlined, controlled and sensitive than the systems thatcame before it

CELL PHONE COMMUNICATION TECHNOLOGIES A.HARIKA SRI SIVANI COLLEGE OF ENGG CHILAKAPALEM A b s t r ac t : T he a b i l i t y t o c o m m u n i c a t e wi t h t h e p e o p l e o n m o v e ha s e x p a n d e d a l ot b y u s i n g C el l p h o n es i n t h e p r es e nt w or l d es p e c i a l l y f o r t h e B u s i n es s M a g n et s & P r of es s i o na l j ob h ol d er s w h o n e e d s t o c o m m u n i c a t e du r i n g j ou r n e y i n c a r s . I ni t i a l l y t h er e w er e o n l y f e w d i s t r i b u t or s & P e op l e w h o r ea l l y n e e d e d M o b i l e C o m mu ni c a t i o n s c a p a b i l i t y i ns t a l l e d r a di o t el ep h o n e s i n t h e i r c a r s . I n t h e r a di o t el ep h o n e s ys t e m, t h er e wa s o n e c e nt r a l a nt e n na t o w er p er c i t y, wi t h a b o u t 2 5 c ha n n e l s . S o t h e p h o n e i n t h e c a r n e e ds a p o w er f u l T r a n s mi t t er b i g e n ou g h t o t r a ns m i t u p t o 5 O k m. o n l y 2 0 0 0 c o n s u m er s c ou l d u s e t h e m, a s t h er e w er e o n l y a f e w c ha n n e l s b u t i n t h e 2 1 s t c e nt ur y c u r r e nt l y t h er e a r e a r ou n d 1 4 0 0 mi l l i o n s u b s c r i b er s i n t h e w or l d. SWETHA

129

A PAPER PRESENTATION ON COGNITIVE RADIO K.SRAVANI B.C.MONIKA

KRISHNAS PRAGATHI INSTITUTE OF TECHNOLOGY DIWANCHERUVU, RAJAHMUNDRY.

INTRODUCTION:
Cognitive Radios are defines as: A radio that can autonomously change its parameters based on interaction with, and possibly learning of, the environment in which it operates. Through appropriate radio resource management, such a cognitive radio should make flexible and efficient use of network/spectrum resources.

CR would consist of Intelligent Sensing hardware and Intelligent Sensing Algorithms. There are two types ofCR being considered:

130

DIGITAL IMAGE PROCESSING

K. UMA

P.UMA

KRISHNAS PRAGATHI INSTITUTE OF TECHNOLOG

131

Image

processing

Image Processing is the science of enhancing an image in order to increase the image quality and to extract useful information from the image. It is generally used in machine vision applications as part of a data preprocessing step for a pattern recognition system. Image processing algorithms apply point, local, global operations on a digital image depending on the particular purpose, such as edge detection, high frequency noise elimination, contrast stretching. Images can be RGB color, greyscale or binary. There are a lot of professional image editing software (like Photoshop) which use basic or advanced image processing techniques for image enhancement. Another extension of the image processing is image analysis or image understanding which is also called as machine vision. There are a lot of resources, online books, courses on the web for digital image processing.

Earth Remote Sensing in Agricultural Instrumentation


K.Srinivas SSIT ABSTRACT: This paper describes the earth remote sensing techniques used in agriculture. Space borne remote-sensing instruments are used for applications ranging from global climate monitoring to combat-theater tracking to agricultural and forestry assessment. Aerospace has pioneered numerous remote- sensing technologies and continues to advance the field. Aerospace work in remote sensing supports not only the Department of Defense (DOD), but NASA, NOAA, and other governmental agencies as well. In coming years, as these organizations seek to coordinate their remote-sensing efforts, Aerospace research and analysis will play an important role in determining what type of systems are developed and deployed. Remote sensing has shown potential for use in agricultural management for a number of years; however, the availability of fine spatial resolution, near real-time data has limited its application. New companies that provide aircraft-based imagery to meet the resolution and temporal requirements for agricultural management are now emerging. The promise of commercially available, high-resolution satellite imagery will also provide additional sources of remotely sensed data. . A.Vamsee Krishna.C

132

INTERFEROMETRIC MODULATOR TECHNOLOGY A REVOLUTION IN DISPLAYS A.SHARHMILA K.SUNITHA K.K.ANUSHA

Aditya Institute of Technology and Management,Tekkal i

Todays cell phones are a far cry from the devices of 20or even 5years ago. Gone are the days of carrying a separate camera, phone, music player and PDAtodays smart phones incorporate each of these functions into one multipurpose device. As computer technology and multimedia converge in the mobile phone, the industry has witnessed a dramatic change in how consumers view their wireless devices. Todays cell phone is an indispensable tool, bringing users information and entertainment. But as cell phones functionality increases and consumers use them for more than just making and receiving calls, consumers are demanding more from their mobile phones including extended battery life and superior view ability in all environmental conditions in short, an Always-On cell phone. The key to such improvements is the display. Todays liquid-crystal displays (LCDs)

IRIS RECOGNITION TECHNOLOGY A Paper Presentation By

Ch . Swarna K . Dhanya Veena KRISHNAS PRAGATI INSTITUTE OF TECHNOLOGY bstract: The pressures on todays system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Iris recognition, a biometric, provides one of the most secure methods of authentication and identification thanks to the unique characteristics of the iris of a human eye. Once the image of the iris has been captured using a standard camera, the authentication process, involving comparing the current subjects iris with the stored version, is one of the most accurate with very low false

133

EYE INTERFACE TECHNOLOGY ELECTRO OCULOGRAPHY ----Control computer with eyes

VP. Praveen GITAM, ABSTRACT:

K.charan teja,

Today the use of computers is extended to every field. Many sophisticated devices like touch screen, track ball, digitizers etc made interaction with computer ease from novice to professional. But physically disabled individuals are deterred from using computers due to their inability to control mouse. However, if directional discrimination of an icon can be achieved, quadriplegics can take the function of a mouse without the use of hand.

Paper on Mechanical Radios


Krishna Teja, Krishna Kanth

Krishnatejag2002@gmail.com
#

ECE, MVGR college of engineering Andhra Pradesh, India

134

We do love our cell phones. And we hate them, too, of coursewhen they drop a call, go dead in the middle of a conversation, or simply fail to work in another country thinking that our handsets cant receive satellite TV broadcasts or last more than a week on a single charge. Though better microelectronics provide higher data rates, lower power consumption, and greater flexibility in the types of communication ,But transistor advances alone will probably not be enough, these incredible shrinking transistors might not do much to eliminate dropped calls. In this respect, the most significant improvements may, in fact, come from what seems a bizarre source: better mechanical components

MST RADER

M.RAJESH KUMAR,

ABSTRACT: MST RADER means Mesosphere-Stratosphere-Troposphere (MST) radar was established at Gadanki near Tirupati as a national facility. MST radar uses the scattering and reflection from variation in radio refractive index of neutral atmosphere, , which in turn depends on variability of humidity, temperature and electron density induced by turbulence in the lower and middle atmosphere.We are using two basic techniques for proper working of mst rader. MST radar is a state-of-the-art instrument capable of providing estimates of atmospheric parameters with very high resolution on a continuous basis, which is essential for the study of different dynamical process in the atmosphere

135

136

137

REDTACTON G.RAMYASAI K.SRAVANI

KRISHNAS PRAGATI INSTITUTE OF TECHNOLOGY

Technology is making many things easier; I can say that our concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many

more but here is new concept of RED TACTON which makes the human body as a communication network by name ....HAN. NTT LAB from Japan is currently testing & developing this revolutionary technology. Red Tacton is a new Human Area networking technology that uses the surface of the human body as a safe, high-speed network transmission path. Red Tacton uses the minute electric field generated by human body as medium for transmitting the data. The chips that will be embedded in various devices contain transmitter and receiver built to send and accept data in digital format.

138

MULTI- FEATURED ROBOT R.Anil kumar M.S.N Rajeev

Avanthi ABSTRACT:-

Institute of Engineering

and

Technology

The importance of robotics has been increasing day by day, as a result we are moving forward with advanced and innovative designs. Our project name is MULTIFEATURED ROBOT. The journey of our model routed by getting the inspiration from the movie WALL E in which a single robot performs multiple tasks. We used this idea as a solution for the problems facing by many students who are using various robots in different competitions. Finally we made a robot which can perform multiple tasks based on the designers requirement.

role of Wireless Communication in Patient Response Time: A Study of Vocera Integration with a Nurse Call System

D.LALITHA

NIROSHA

CH.RUPA

The goal of this paper is to investigate the use and impact of wireless Voice over Internet Protocol (VoIP) communication technology developed by Vocera

communications and used by clinicians and mobile workers in a healthcare setting. Of particular interest for this study was the impact of a newly installed component of the Vocera system, the Vocera Messaging Interface (VMI), which enables connectivity between external systems and the Vocera system via the Vocera Server.

139

SENSOTRONIC BRAKE CONTROL

Sensotronic Brake Control (SBC) works electronically, and thus faster and more precisely, than a conventional hydraulic braking system. As soon as you press the brake pedal and the sensors identify the driving situation in hand, the computer makes an exact calculation of the brake force necessary and distributes it between the wheels as required. This allows SBC to critically reduce stopping distances. SBC also helps to optimise safety functions such as ESP, ASR, ABS and BAS. SIXTH SENSE TECHNOLOGY Dadi institute of Engineering & Technology

ABSTRACT Sixth Sense is a wearable gestural interface. It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT Media Lab. The true power of Sixth Sense lies on its potential to connect the real world with the Digital world. Basically, Sixth Sense is a mini-projector coupled with a camera and a cell phonewhich acts as the computer and your connection to the Cloud, all the information stored on the web. Smart Antenna for Mobile Communication M.Harish#1, CH.V.Siva kumar*2 Abstract Smart antennas are one of the most hottest topics in mobile communication. The smart antenna technology can significantly improves wireless system performance and economics for a range of potential users. It enable operators of PCs cellular and wireless local loop networks to realize significant increase in signal quality, network capacity and coverage. In truth it is not the antenna that is smart but the antenna system are smart. Firstly we present different types of smart antenna systems and features and benefits of smart antenna systems, next we deal with the basic problem of wireless transmission such as co-channel interference multi path propagation , fading and signal to interference ratio. The advantages of smart antennas over `conventional antennas i.e Extension of range increasing capacity, reduced inter channel interference are also presented in this paper. Then we have presented how the smart antennas are useful for TDMA and CDMA technologies. Lastly future developments such as MIMO systems concludes our paper.

140

IMAGE PROCESSING - DEPTH EDGE AND STYLIZED RENDERING USING MULTI-FLASH IMAGING Chaitanya Institute of Engineering & Technology Rajahmundry-533104 , EG Dt

This paper gives a detailed description about MultiFlash Imaging and the algorithm for Depth Detection Using Multi Flash Imaging. This technique finds a major implementation in the fields of medicine and photography. The algorithm needs a minimum of five images to detect depth edges of all orientations. Ambient image taken without flash and four images where the flashes are positioned above, below, left and right of the lens respectively. This algorithm which functions by detecting and exploiting the shadows is a simple efficient method for detecting depth edges and differentiating them from texture edges and is suitable for most scenes and situations.

Traffic queue length Measurement Using an Image processing

141

Traffic queue length Measurement

Using an Image processing

ABSTRACT As the social economic activities grow variously in recent days, an advanced traffic control system corresponding to the changes of road traffic circumstances becomes an u convenience for travelers and commodity distribution are also needed regent matter. And traffic information service or the profit traffic flow information for the traffic signal control which realizes this ITCS And in this working group we started examining a specification of the image sensor UNDER WATER WIRELESS COMMUNICATION Students from kaushik college of engineering. Ch.divya,ECE M.aswini,ECE sravani; ECE. ABSTRACT:Underwater communication has a range of applications including remotely operated vehicle (ROV) and autonomous underwater vehicle (AUV) communication and docking in the offshore industry. Current underwater transmission techniques is primarily utilise sound waves for large distance at lower frequencies and the velocity of sound in water is approximately 1500m/s the resultant communications have problems with multi-path propagation and low bandwidth problems. The use of electromagnetic (EM) techniques underwater has largely been overlooked because of the attenuation due to the conductivity of DESIGN OF ARITHEMETIC AND LOGIC UNIT USING VHDL PRESENTED BY: Anirudh Sai. A D.Praveen name:manikanta

ABSTRACT: Digital System performing computation uses arithmetic and logical units. The design of ALU using HDL is reliable instead of cracking it from the basic gates. Arithmetic and Logic Unit internally consists of Control unit, flags, and registers. Control unit consists of control memory, sequencing logic, registers and decoders.

142

WIRELESS CHARGING OF MOBILE PHONES USING MICROWAVES

143

K.SARITHA, II YEAR E.C.E, JNTU NO: 09W61A0452 Ph no: 9493343162 E-mail: saritha.kuriti@gmail.com

B.SAI PRASANNA II YEAR E.C.E, JNTU NO: 09W61A0414 Ph no:7569632187 SRI SIVANI COLLEGE OF ENGENEERING CHILAKAPALEM

ABSTRACT : With mobile phones becoming a basic part of life, the recharging of mobile phone batteries has always been a problem. The mobile phones vary in their talk time and battery stand by according to their manufacturer and batteries. All these phones irrespective of their manufacturer and batteries have to be put to recharge after the battery has drained out. The main objective of this current proposal is to make the recharging of the mobile phones independent of their manufacturer and battery make. In this paper a new proposal has been made so as to make the recharging of the mobile phones is done automatically as you talk in your mobile phone! This is done by use of microwaves. The microwave signal is transmitted from the transmitter along with the message signal using special kind of antennas called slotted wave guide antenna at a frequency is 2.45 GHz. There are minimal additions, which have to be made in the mobile handsets, which are the addition of a sensor, a Rectenna, and a filter.

144

RAVI TEJA. K 08ME1A0421 III-B. Tech Ph .no: 8143697721

Wireless Charging of Mobile Phones using Micro Waves VARUN KUMAR.K 08ME1A0422 III-B.Tech ph. no: 9966996634 Mail: varun0422@gmail.com

Mail: ravi.tj90@gmail.com ABSTRACT

The mobile phones becoming a basic part of life, the recharging of mobile phone batteries has always been a problem. Portable electronic devices are very popular nowadays. The mobile phones vary in their talk time and battery stand by according to their manufacturer and batteries. All these phones irrespective of their manufacturer and batteries have to be put to recharge after the battery has additions, which have to be made in the mobile handsets, which are the addition of a sensor, a rectenna and a filter. With the above setup, the need for separate chargers for mobile phones is eliminated and makes charging universal. Thus the more you talk, the mobile phones is eliminated and makes charging universal. Thus the more you talk, the more is your mobile phone charged! With this proposal the manufacturers would be able to remove the talk time and battery stand by from their phone specifications

145

146

You might also like