Professional Documents
Culture Documents
Abstract:
Commonly Internal Combustion engines only 15% of fuel energy is utilized to run the vehicle.Remaining 85% of fuel is wasted to improve this energy some advanced technologies can be used to improve the efficiency of the engine.Losses like engine losses,idling losses,driveline losses,overcoming inertia;braking losses,rolling resistance,aerodynamic drag and accessories.To overcome these losses some advanced technologies like variable valve timing and lift,Cylinder deactivation,Turbo charging,Direct fuel injection;Integrated starter/generator(ISG), automated manual transmission,continousiy variable transmission and etc
ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS IN MEDICAL FIELD P.Dinesh MVGR college of engineering Abstract: Artificial Intelligence, in light of definition of intelligence, is simply the application of artificial or non-naturally occurring systems that use the knowledge-level to achieve goals. This presentation illustrates how focused, specialized intelligent systems can be used in the healthcare environment whenever their knowledge areas are well bounded.Physicians are more willing to accept systems focused on very specific areas than those attempting to solve more generalized problems such as diagnosis (see Table II).Medical imaging is often thought of as a way of viewing anatomical structures of the body. It is often useful, however, to acquire images of physiologic function rather than of anatomy. M.Ram babu
Abstract:
In the process of checking vehicles manpower is used instead we use electronic system to check vehicles. In everyday life we have increasing development on transport system. It is hard to checkout all vehicles by available man power and also there is an increasing rate of crimes using automobile all over the world. Thus automobile monitoring system plays a dominant role in checking and controlling crime rates and ensures the security of the nation.This paper involves a tamper proof wireless tag fixed in the vehicle and a wireless receiver in the check post. Whenever the vehicle passes the check post the transmitted value is received in the receiver and the time is automatically noted. The noted values are logged in a common data base server
G.MUNI
Abstract:
Carbon nano tubes are allotropes of carbon. Carbon nano tubes are just a few billions of a meter across, but are ultra strong. Their unusual properties promise to revolutionize electronics, computers, and chemistry and material sciences. They had been discovered in 1991.One of the main applicants of carbon nano tubes is stronger bullet proof vests. A new bullet proof material is designed which actually rebounds the force of a bullet. Bullet proof materials at that moment are designed to spread the force of a bullet. Bullet proof materials at the moment are designed to spread the force. The nature of the bonding of nano tube is described by applied quantum chemistry, specifically, orbital hybridization. The chemical bonding of nano tubes are composed entirely of sp2 bonds, similar to those of graphite. The lightweight fibre, made up of millions of tiny carbon nano tubes, is starting to reveal exciting properties. The fibre is very strong, lightweight and good at absorbing energy in the form of fragments travelling at very high velocity. Inherent property of elasticity is the main reason for it. Carbon nano tubes exhibit extraordinary mechanical properties.It is stiff as diamond. The material is already up to several times stronger, tougher and stiffer than fibres currently used to make protective amour. For body armour, the strength of the fibres in a fabric is critical parameter. Recently preparing bullet proof t-shirts can save lots of people from bullet hits. In future these amours can be used for military applications.
Abstract:
As is correctly said that a stitch in time saves nine. So imagine that one could diagnose the major diseases of the world in a living being before it could really affect that being and relay it self into an epidemic outbreak. As the ultimate aim of medicine is rightly judged as immortality, perhaps this paper may take us one step closer towards that much awaited goal. Targeted to rural areas ,this architecture provides us a new tool by which we could achieve continuous monitoring of the person at the nano scale and apply effective methodologies even before that persons body is affected by influenza to over (3-4)% of the total infection capabilities. This work presents a new approach with details on the integrated platform and hardware architecture for nanorobots application in epidemic control, which should enable real time in vivo prognosis of biohazard infection. The recent developments in the field of nanoelectronics, with transducers progressively shrinking down to smaller sizes through nanotechnology and carbon annotates, are expected to result in innovative biomedical instrumentation possibilities, with new therapies and efficient diagnosis methodologies.
Abstract:
A major portion of the worlds energy needs is obtained through fossil fuels. Coal provides a dominant portion of the electrical energy production in the world and especially in India. Today many of the industries work on fossil fuels like Petrol, Diesel and other useful fuels. But as it is a renewable source of energy it no longer holds in good position to satisfy present human needs for a long period of time. However the future of fossil fuels is clouded by the environmental threat posed by green house gas effect.
K.Venkata
Abstract:
Every life that alive in this universe likes to enjoy the beauty in the nature. In this human beings also one kind. Towards achieving these enjoyments human beings invented & created the vehicles. But actually what happens, they are satisfying their needs by using these, but also suffering with accidents and losing valuable lives & property due to rash driving of drivers especially in highly populated regions. So to avoid rash driving and to prevent loosing of valuable property we need some safety systems in the vehicles. We can make this true by using sensors and other electronic components. But those have more cost which causes increase in cost of the vehicle. With out using those electronic components also we can achieve this by using mechanical arrangements. To achieve this I designed a simple mechanical system for providing safety, for avoiding rash driving in highly
NANOBOTS
D.GANESH BABU P.MANIKANTHA SWAMY G.KUMAR
Abstract:
In this global world where the hands of science and technology is stretching outward very vastly so man has created robots and he has discovered many impossibilities with the help of these robots. Everything that we see is made of out of matter and there are particles which are smaller and cannot be seen with our naked eyes. This particular particle is none other but nano particles and technology so related with such vital concept is nanotechnology. In this paper we are going to discuss about the application of nanotechnology in the field of robotics and these application leads to the birth of nano robots. Nanobots are one of the applications of nanotechnology. Finally we conclude by discussing its advantages, disadvantages and applications of Nanobots in the fields of medicine and computer science.
Abstract:
Nanotechnology is being harbingered as the next enabling technology that will redesign the future of several technologies, products and markets. The nanotechnology industry is heral ding a new world order. It is described as an enabling technology that will pave the way for novelty in every stream of technology. The number of sectors that are involved are many, due to the multi -disciplinary nature of the technology, offering scope for numerous opportunities.This paper emphasizes on the nanotechnology, nanomaterials. One of the benefits of having smaller computers is convenience. The reduction in size of all the modern -day equipment we carry around with us is just one application for th e field of nanocomputing. It deals with the evaluation of modern computers with the use of carbon nanotubes and silicon nanowires
Abstract:
In the present world every country thinking of making there nation secured & safe. The countries which were developed are investing much on the weapons, communication systems e.t.c., to strengthen their strengths. But the countries which were still developing were unable to invest such large investments. Nanotechnology is a hybrid science co mbining engineering and chemistry.Nanotechnology holds out the promise of materials of precisely specified composition and properties, which could yield structures of unprecedented strength and computers of extraordinary compactness and power.
Abstract:
Antilock brake system (ABS), equipped in a vehicle, increases safety because it prevents wheels from being locked up and minimizes the danger of skidding, allowing the vehicle to stop in a straight line. ABS also allows drivers to maintain steering control of a vehicle during emergency braking of it. So the vehicle can avoid obstacles or another vehicles on the road. This paper deals with an antilock brake controller for full air brake system, which is widely used in heavy vehicles such as buses,cars and trucks. Two methods of evaluating the ABS controller and the algorithms were focused on: laboratorial test and field test. For the laboratorial test, a hardware in-the-loop simulator (HILS) was made. This includes actual pneumatic brake hardware between the controller input and vehicle dynamics output, thus simulating a whole bus under braking in real time.
NANO TECHNOLOGY
P.N.B.DHANVANTARI.
SASI ENGINEERING COLLEGE
P.RAGHAVENDRA.
Abstract:
In the present world every country thinking of making there nation secured & safe. The countries which were developed are investing much on the weapons, communication systems e.t.c., to strengthen their strengths. But the countries which were still developing were unable to invest such large investments. Nanotechnology is a hybrid science combining engineering and chemistry.Nanotechnology holds out the promise of materials of precisely specified composition and properties, which could yield structures of unprecedented strength and computers of extraordinary compactness and power.The soldiers in the war weighing large weapons, huge weights. So, to these all problems a solution is to be there. Yes, for every problem there will be a solution. Here for this problem the solution is NANO TECHNOLOGY.
Abstract:
Air brakes are used in trucks,busses,trials, and semi-Trialers. George westinghouse first developed air brakes for use in railway service. He patented a safer air brake on March 5, 1872. Originally designed and built for use on railroad train application, air brakes remain the exclusive systems in widespread use. Westinghouse made numerous alterations to improve his air pressured brake invention, which led to various forms of the automatic brake and the subsequent use on heavier road vehicles
IT
Steganography
A.Ravi Kiran Vignans Institute of Information Technology Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "to write". K.V.Saikiran
WIRELESS COMMUNICATION
M. Divya
(Sri Gnaneswari Research & Technological Academy for Women College) K. Chakradhar Ananth Kumar- (Lendi Institute of Engineering & Technology College)
Abstract: Wireless Local Area Networks have become the focus of great attention by both business and consumer users with the advent of low cost 802.11 access points and preequipped laptops. While the initial products are convenient and useful, just as with their wired counterparts there is already interest in how to greatly increase the capacity and speed of wireless LANs.
Aditya Institute of Technology And Management ABSTRACT : Mobile communication is continuously one of the hottest areas that are developing at a booming speed, with advanced techniques emerging in all the fields of mobile and wireless communications. Current times are just the beginning for deploying 3G mobile communication systems, while research on the next generation of mobile communications, 4G wireless and mobile networks begin to save the way for the future. This paper studies the visions of 4G from a technical perspective. After a brief review on the development history and status of mobile communications and related 4G perspectives, we present an overall 4G feature framework based on the kernel concept of integration.
CLOUD COMPUTING
M.SRI SAILAJA ABSTRACT : Next Generation IT will leverage a new computing platform which makes the development and delivery of applications significantly easier than it is today. This new platform consists of Cloud Computing, Software As A Service and Dynamic Languages. Cloud Computing offers mainframe or better infrastructure through a small set of services delivered globally over the Internet. Software as a Service is a new delivery model which provides flexibility to both the provider and the customers.This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing, and outlines cloud architecture and its major components. Cloud computing infrastructure allows enterprises to achieve more efficient use of their IT hardware and software investments Enterprises strive to reduce computing costs.The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. CH.DIVYA LAKSHMI DURGA
Cloud Computing.
A.V.P.DEEPTHI G.ASHA ST.THERESSA INST OF ENGG &TECH ABSTRACT: Computing is usually defined as the activity of using and developing computer technology, computer hardware and software. Computing includes designing and building hardware and software systems for a wide range of purposes; processing, structuring, and various kinds of information. In this computing there are many types. In these types one of the computing is Cloud Computing.The Cloud services concept centers on the idea that information technology applications are being delivered to the face of a web browser from an amorphous cloud.This is one of the major market forces converging to drive the nascent Cloud Computing revolution into a full-fledged information technology model change is just beginning to appear in the Firms need to respond faster to changing customer expectations and business demands, while using fewer resources. As more applications are moving into the cloud, businesses are seeing new opportunities to cloud marketplace, is Business Process Management (BPM) software. In todays tough economic environment, more and more companies are looking to BPM to help them survive and thrive. B.J.PRASHANTI
CLOUD COMPUTING
Zafreen, T.Sindhu, M.V.G.R. College Of Engineering S.Uma Maheshwari
ABSTRACT:The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively scalable, efficient, agile, reliable and secure. The Telecommunications networks have for many years, demonstrated their ability to reliably enable network (voice) services creation, assurance and delivery on a massive scale. Based on an analysis of the Intelligent Networks in telecommunications to identify proven concepts and key lessons that can be applied to enable next generation IT datacenters experience this paper asserts that: In order to scale cloud service reliably to millions of service developers and billions of end users the next generation cloud computing and datacenter infrastructure will have to follow an evolution similar to the one that led to the creation of scalable telecommunication networks.
CLOUD COMPUTING
K.KALYANI ABSTRACT Cloud computing is the process of taking services and tasks performed by our computer and bringing them to the web.It involves Grid computing, Utility computing, Virtualization, Clustering.Types of cloudsPublic Clouds: Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the clouds servers, storage systems, and networks.Private Clouds: Private clouds are built for the exclusive use of one client, providing the extreme control over data, security, and quality of service. Hybrid Clouds: Hybrid clouds combine both public and private cloud models. They can help to provide on-demand, externally provisioned scale. A.DEEPIKA
CYBORG
Arun kumar patnaik, B.dileep
ABSTRACT
Since the time man has been able to understand his senses, he has always tried to make his life better. Began with the invention of wheel, to cars, to computers and now artificial humans. He always tried to make a replica of himself. Some one has a better grasping power, someone with better logic, someone with better memory, someone with more creativity and so on. He is trying to combine all these into one. This struggle to make a perfect human who can control every thing created by God, has led to foundation of all technological advancements of today. Amidst these has come up the idea of making machines not to be slaves of humans (robotics) but a part of them Cyborg is the result. A combination of man and machine for betterment of humankind. This is the Cyborg a theoretical concept which has attracted scientists, technologists, philosophers, doctors world over. The day is not far away when we will all be Cyborgs!!!!!
DIGITAL JEWELLERY K. Geetha Rao, ,Abstract Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery adorns the body, and has very little practical purpose. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence i.e., Digital jewelry. Digital jewellery can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper also discusses about a new Java -based, computerized ring that will automatically unlock doors and log on to computers. H. Jeevan Kumar
DISTRIBUTED COMPUTING
R.SUMA Abstract: Ever since computers were invented researchers and computer scientists were constantly working for enhancing the capabilities in terms of computational power and speed of the systems. The result of such a pursuit is the distributed computing architecture. The idea is to share the computing activity between systems that are physically distributed. In computer science, distributed computing studies the coordinated use of physically distributed computers. T.N.V.SATYAVENI
ADITYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Abstract: The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".
Data mining and data warehousing BUDDI RESHMA CHOWDARY PADYALA ANUSHA
PRASAD INSTITUTE OF TECHNOLOGY AND SCIENCES. Abstract Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate of data capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time.The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".
Data mining and data warehousing P.ASHWINI KUMARI Abstract: Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate ofdata capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time. K.SUJANA
their inability to control mouse. However, if directional discrimination of an icon can be achieved, quadriplegics can take the function of a mouse without the use of hand. In this paper I come before with a new model of based on Electro-Oculography which uses Electro-oculogram Bio potential amplified signal to control computer.I also discuss its implementation details, including software and hardware design. As my contribution to this paper I introduce a new keyboard design, some modifications in design to overcome the drawbacks in existing model.
FPGA TECHNOLOGY
B.Sankara Narayana Abstract: A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by the customer or designer after manufacturing-hence field programmable. The word field in the name refers to the ability of the gate arrays to be programmed for a specific function by the user instead of by the manufacturer of the device. The word array is used to indicate a series of columns and rows of gates that can be programmed by the end user. FPGAs can be used to implement any logical function A.V.Sriram
G.SHALINI,
AN EMBEDDED SYSTEMS APPROACH IN DESIGNING A AUTOMATED VENDING MACHINE USING IMAGE PROCESSING FOR CURRENCY RECOGNITION
SOBHA GOTTAPU M.U.V.JAGANMOHAN RAO
ABSTRACT: An embedded approach in designing a automated vending machine using image processing for currency recognition. Automation had become time-sharing, fast and sophisticated approach in both Public Sector Units and Private Sector Units today. From computerized billing machine in a small shop to a missile launching process, everything is automated.This paper presents unique idea of a fully automated ticket vending machine, an embedded system, which makes the process of ticket procurement a hassle free job and thereby decreases the burden of a patient clerk who sits in the counter for issuing tickets.
ABSTRACT: In recent years, there has been a trend toward using variable speed to operate motors for equipment and systems that provide heating, ventilation, and air conditioning for buildings. Variable speed has been shown to improve the operating efficiency of equipment such as fans, chillers, and pumps, the capacity of which must be modulated for proper system operation. Furthermore, designers now understand that motors powering devices traditionally operated at constant speed, such as fan coils and fan-powered terminal units, can benefit enormously in terms of both performance and efficiency from the application of variable speed. It is becoming clear that virtually every motor involved in a building HVAC system today has the capacity to improve the efficiency and effectiveness of the system when operated with variable speed. Todays industry places high demands on control accuracies, flexibility, easy of operation, repeatability of parameters for many drives applications. To meet these requirements, use of micro processors have become imperative. Microcomputer technology is moving at such a fast rate that the use of efficient high level language with large hardware integration already is possible and possibly VLSI implementation of the controller is the next goal. Unlike dedicated hardware control, a microcomputer executes control in serial fashion, i.e., multitasking operations are performed in time multiplexed method
Mobile Computing
K.SINDHURI ABSTRACT: The term Mobile Computing emphasizes the basic feature of mobility which refers to a person or a device that moves between different geographical locations or M.SWETHA REDDY
different networks or different communication devices or in different applications. So mobile computing is a process that deals with the way of communication by using a Mobile Computer. The communication in a Mobile Computer can be done by u sing different Networks which includes various protocols for different issues. A protocol is necessary for transferring the information from one node to other through wireless medium.
Mobile Computing
KRISHNA CHAITANYA.KARRI
KRISHNA RAO.DUMPA
Abstract: Mobile computing has been undergoing a bit of a renaissance lately. A few years ago it was a simple matter of finding a data -compatible mobile phone, a PC card modem, and a matching cable and installing it as a modem. Then people started to use PDAs as well. Cell phones started to come with infrared ports to allow communication with laptops. Then cell phones started to come with modems built in. The connecting methods of mobile computing, its introduction, connection types, factors affecting connections, mobile applications and its limitations are explained.
Network Security
H.Sailaja ABSTRACT : With the rapid growth of application of Internet in various walks of life, the study of Network Security has become inevitable. So it is very important for all the users to get familiar with various aspects of Network Security. More people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. With the millions of Internet users able to pass information from the network, the security of business networks is a major concern. The very nature of the Internet makes it vulnerable to attack. The hackers and virus writers try to attack the Internet and computers connected to the Internet. With the growth in business use of the Internet, network security is rapidly becoming crucial to the development of the Internet. Many business set up firewalls to control access to their networks by persons using the Internet. Firewalls acts as barriers to M.V.Lakshmi
unauthorized entry into a network that is connected to the Internet allowing outsiders to access public areas but preventing them from exploring proprietary areas of network. Also First generation firewalls (packet filtering), second generation firewalls (proxy services), third generation firewalls are discussed. Our paper covers the overview of network security and different types of network securitymethods.
Neuroprosthetics
Gunnam.Manindrah
Abstract: Neuroprosthetics is an area of Neuroscience concerned with neural prostheses, that is artificial devices used to replace or improve the function of an impaired nervous system. There have been several important advances in recent years in neural prosthetic technology, but a critical area for long-term functional implants will be the engineering of stable neuron/electronic interfaces for the bidirectional flow of information between the electronic and the biological systems. Neural implants may be placed directly in the brain or along the peripheral nervous system. In both cases, engineers, material scientists, and physicists must discover the best way to create safe and effective electrical interfaces without causing physical damage to the cell and surrounding tissues.
Optical Computing
D.Sravani V.Ramadevi Kakinada Institute of Engineering and Technology for WOMEN Abstract: Now a days we are using the electronic computer, just think for a while if all the electronic components are replaced with optical one. Optical computer is the computer which performs operations ten or more times faster than the conventional electronic computers. This optical computer uses the infrared beams to manipulate store, transmit data.
new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".
Pervasive Computing
P. Anusha GVPCOE, VIZAG Abstract :The aim of Pervasive Computing is for computing available wherever it's needed. It spreads intelligence and connectivity to more or less everything. So conceptually, ships, aircrafts, cars, bridges, tunnels, machines, refrigerators, door handles, lighting fixtures, shoes, hats, packaging clothing, tools, appliances, homes and even things like our coffee mugs and even the human body and will embedded with chips which are almost invisible to connect to an infinite network of other devices and to create an environment where the connectivity of devices is embedded in such a way that it is unobtrusive and always available. Pervasive computing, therefore, refers to the emerging trend toward numerous, easily accessible computing devices connected to an increasingly ubiquitous network infrastructure. Y. Uday Sagar
CHAITANYA ENGINEERING COLLEGE ABSTRACT: This paper introduces CryptographyThe science of protecting data and Network Security keeping information private and Secure from unauthorized Users Communication has always been an integral part of our existence. The rapid advances in communications technology have also given rise to security threats to individuals and organizations. Network Security help us to build the largest free security library on the internet by submitting your own security related content thus easily controlling users, applications and threats to generate the security and perform our needs. Cryptography is one essential aspect for secure communications. This plays important role in network security. The objective of cryptography is to hide information. So that only intended recipient can unhide it. In crypto terms, the hiding information is called encryption and when the information is unhidden it is called decryption. We are also going to include about history of cryptography.
Mobile Computing
P.S.L.PRASANNA MANJARI CH.DHANALAKSHMI
CHAITANYA ENGINEERING COLLEGE ABSTRACT: A mobile computing system can be viewed as an autonomous decentralized system in which hosts physically change location and communicate with other hosts using wireless network technology. Compared with traditional wired networks, mobile systems present additional challenges in a number of areas related to autonomy and adaptation, including message routing, support for disconnected operation, and providing Quality of Service (QoS).Mobile computing systems are computing systems that may be easily moved physically and whose computing capabilities may be used while they are being moved. Examples are laptops, personal digital assistants (PDAs), and mobile phones..
M.Gowtami
A Robot with Finger-Tip Sensitivity is a product of Artificial Intelligence. Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success. John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines.There are lots of innovations are discovered by scientists in this area. Robots with artificial intelligence are one of the greatest innovations.This paper described about the Robot with finger-tip sensitivity which is the latest innovations in the Robotics domain
VIRTUAL REALITY
B.Soundharya
T.Anusha AITAM
V.Srujana
Abstract: In order to better understand the interaction between various depth cues, we analyzed two 3D depth cues that are found in both natural spaces and virtual reality environments shape from shading and motion parallax. We wanted to see how well subjects used these cues as sole information for depth and how they weighted or integrated the two cues. In particular, we were interested in individual variance and potential differences along sex lines. Our results showed that subjects, without practice or experience, are virtually unable to acquire depth information when 2D cues such as luminance and speed are removed and only one 3D cue remains. Because of the irregular performance of our subjects, it is difficult to determine what individual variation exists and whether it was controlled by experience, social influences, or biological factors.
WEB TECHNOLOGIES
K.LAVANYA
ABSTRACT: New knowledge is produced at a continuously increasing speed, and the list of papers, databases and other knowledge sources that a researcher in the life sciences needs tocope with is actually turning into a problem rather than an asset. The adequate management of knowledge is therefore becoming fundamentally important for life scientists, especially if they work with approaches that thoroughly depend on knowledge integration, such as systems biology. Several initiatives to organize biological knowledge sources into a readily exploitable resourceome are presently being carried out. Ontologies and Semantic Web technologies revolutionize these efforts. Here, we review the benefits, trends, current possibilities, and the potential this holds for the biosciences. The developmental process of architectural design of a simple Web-based adaptive learning system. The research in such systems has advanced significantly in recent years but there are few attempts to report the development process that could be useful for practitioner community. The system described in this project is divided into four modules that allow for various didactic, tutoring and student styles.
WIFI
Saikrishna behara AITAM A.v.pradeep Chandra
ABSTRACT: WiFi Think of it as an eighteen-wheeler screaming down the pike, carrying the future of computing with it. The driver is friendly. You can stick out your thumb and hitch a ride, or be left in the dust. WIFI, in the broadest sense is a term used for a specific protocol to network your computer to another computer or network.It allows you to connect to the Internet from your couch at home, a bed in a hotel room or a conference room at work without wires with a speed several times faster than the fastest cable connection. We have attempted to review all the major aspects of wireless networking and the 802.11x protocol corresponding to Wi-Fi .The paper deals with the basic concepts of wireless networking and goes into the in-depth of 802.11x protocol which forms the backbone of the upcoming technology, Wi-Fi. Seamless networking is neither a compromise anymore nor a showpiece of high end business markets. The wave of the future is already sweeping through wire less technology.
WIRELESS COMMUNICATION THROUGH BLUE TOOTH TECHNOLOGY S. Krishna mohan Sri sivani college of Engg ABSTRACT: The paper describes the fastest upcoming wireless communication technology. The Blutooth Technology. It depicts how a kind of close personal area network (PAN) can be formed for different user applications, using bluetooth protocols and procedures. The paper K. Ramesh
gives details description of standard Bluetooth protocol stack. All layers of protocol stack are discussed with the necessary functions that are expected to be performed by them. plementation options and possibilities that can be employed for designed Bluetooth system are also suggested. The paper explains the most important & key issue in wireless communications i.e. data security. Finally, the document concludes with major difference in Bluetooth and other ubiquitous competing wireless technologies followed by suggested references
ARTIFICIAL PASSENGER
O. Govinda Rao Ch. Hari Prasad
ADITYA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Abstract: Telematics services in cars (like navigation, cellular telephone, internet access) are becoming increasingly popular, but they may distract drivers from their maindriving tasks and negatively affect driving safety.This paper addresses some aspects of voice user interface in cars, as a mechanism to increase driver safety. Voice control becomes more efficient in reducing driver distraction if drivers can speak commands in a natural manner rather than having toremember one or two variants supported by the system. In this paper we discuss some ways to increase naturalness. Computers in cars are usually not very powerful due to cost considerations. Low CPU resources are a limiting factor for embedded speech solutions. Another aspect of this paper is a recently introduced novel solution for using a speech interface to reduce driver drowsiness and prevent a driver from falling asleep. All driver activities in cars (driving,talking over telephone, controlling Telematics devices, etc.) contribute to driver workload. Designing workload management in a user interface is a difficult task. In our paper we analyze some aspects of this problem. Finally, we introduce the idea of a distributed user interface between cars. It is well known that the safety of a driver depends not only on the driver himself but on the behavior of other drivers nearby. Therefore sharing some information about other cars and driver conditions could lead to increased driving safety.
BLUETOOTH
VAMBARILLI RAMBABU YALLA GNANAMANI
SRI SIVANI COLLEGE OF ENGINEERING, CHILAKAPALEM, SRIKAKULAM ABSTRACT:Bluetooth is a new short-range wireless technology designed to enable wireless communication between diverse devices. It is gaining increasing popularity and acceptance in the world today. There is a growing body of research on the subject, but very few, if any of the analyses, provide a balanced view of the technology, which describe its pros and cons and implications for businesses. This paper attempts to critically analyze the Bluetooth technology from a various perspectives. It begins with a description of the technology in terms of its hardware, software, and network infrastructure. Then it addresses the related issues of interference, security, and reliability. This microanalysis is followed by a larger macro analytical view, which includes the advantages of this technology, its role in the global third generation (3G) wireless scheme, health/safety issues, and business implications. It concludes with the applications of Bluetooth and its future potential.
CLOUD COMPUTING
A.S.L.PRASANNA SRI ADITYA ENGINEERING COLLEGE ABSTRACT This paper aims at presenting the concept of CLOUD COMPUTING .With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our own pc. Although documents can be accessed from other computers on the network, they cant be accessed by computers outside the network. This is PC-centric. With cloud computing, the software programs one use arent run from ones personal computer, but are rather stored on servers accessed via the Internet. If a computer crashes, the software is still available for others to use. Same goes for the documents one create; theyre stored on a collection of servers accessed via the Internet. Anyone with permission can not only access the documents, but can also edit and collaborate on those documents in real time. S.PAVANI
L.SUNANDA
FINFET TECHNOLOGY
B.Tanuja S.Bharani Gayathri vidya parishad (womens) ABSTRACT: The introduction of FinFET Technology has opened new chapters in Nanotechnology. Simulations show that FinFET structure should be scalable down to 10 nm. Formation of ultra thin fin enables suppressed short channel effects. It is an attractive successor to the single gate MOSFET by virtue of its superior electrostatic properties and comparative ease of manufacturability. The distinguishing characteristic of the FinFET is that the conducting channel is wrapped around a thin silicon "fin", which forms the body of the device. The dimensions of the fin determine the effective channel length of the device. In current usage the term FinFET has a less precise definition. Among microprocessor manufacturers, AMD, IBM, and Motorola describe their double-gate development efforts as FinFET development whereas Intel avoids using the term to describe their closely related trigate architecture. In the technical literature, FinFET is used somewhat generically to describe any fin-based, multigate transistor architecture regardless of number of gates. K.Manisha
ABSTRACT: Mobile computing is a new emerging computing paradigm of the future. Data management and location management in this paradigm poses many challenging problems to the Mobile database community. In the past decade, Mobile communications have experienced an expensive growth due to recent technological advances in mobile networks and cellular telephone manufacturing. Location management is a very important problem among these challenges. It consists of updating the location of the user, searching the location and performing search-updates. When the host changes location, an update occurs. When the host want to communicate with a mobile host whose location is unknown to the requesting host, a search occurs. A search-update occurs after a successful search, when the requesting host updates the location information corresponding to the searched mobile host. The goal of a good location management scheme should be to provide efficient searches and updates. In this paper, the different location management schemes, various search & update strategies are discussed.
OPTICAL CAMOUFLAGE
Bheema Raju.kada SRI SAI ADITYA INSTITUTE OF SCIENCE & TECHNOLOGY Abstract: Invisibility has been on humanity's wish list at least since Amon-Ra, a deity who could disappear and reappear at will, joined the Egyptian pantheon in 2008 BC. With recent advances in optics and computing and with the advent of flexible electronics suchas a flexible liquid crystal display, that would allow the background image to be displayed on the material itself, however, this elusive goal is no longer purely imaginary .In 2003, three professors at University of Tokyo Susumu Tachi, Masahiko Inami and Naoki Kawakami created a prototypical camouflage system in which a video camera takes a shot of the background and displays it on the cloth using an external projector. They can even reflect images when the material is wrinkled. The same year Time magazine named it the coolest invention of 2003. It is an interesting application of optical camouflage and is called the Invisibility Cloak. Through the clever application of some dirt-cheap technology, the Japanese inventor has brought personal invisibility a step closer to reality.
Sixth Sense
K .Jaidev Giet ABSTRACT 'Sixth Sense' is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. Information is confined traditionally on paper or digitally on a screen. K.Niharika
Wearable Computing
S. NAGA THRIVENI CH.DIVYA K.SRAVANI
Abstract Current portable computers and PDA s fail to truly become part of our daily lives in the sense that we need to stop what we are doing and expend conscious effort to use them. They also do not have the situational awareness that they should have: while they are not being explicitly used, they are unable to remain attentive to possible ways to help the user. In response to these problems, a personal, wearable and multimedia computer that perceives and responds to the wearer's affective state offers a new kind of perceptual interface. Instead of asking the user to continuously select preferences from a menu, the affective wearable gets to know its wearer's preferences by recognizing and responding to signals that carry emotional information. This paper exploits wearable computers unique opportunity to record and index the visual environment of the user from the first-person perspective.It describes How the capabilities of wearable computers may be used to Provide task guidance in mobile computers.Here first we Introduce the wearable computing idea and discuss requirements for a wearable computer systems.We then discuss its various real time applications and finally conclude with an outlook on future research directions.
EEE
ABSTRACT: Brushless Direct Current (BLDC) motors are one of the motor types rapidly gaining popularity. BLDC motors are used in industries such as Appliances, Automotive, Aerospace, Consumer, Medical, Industrial Automation Equipment and Instrumentation. As the name implies, BLDC motors do not use brushes for commutation; instead, they are electronically commutated. BLDC motors have many advantages over brushed DC motors and induction motors. A few of these are: Better speed versus torque characteristics , High dynamic response, High efficiency, Long operating life Noiseless operation, Higher speed ranges In addition, the ratio of torque delivered to the size of the motor is higher, making it useful in applications where space and weight are critical factors. In this paper, the detail construction, working principle, characteristics and typical applications of BLDC motors are explained.
ELECTRICAL MEASUREMENTS IS THE SET OF THE METHODS, CALCULATIONS AIMED TO MEASURE ELECTRICAL QUANTITIES.
DEVICES
AND
ABSTRACT
THE PRESENT PAPER GIVES A BRIEF INTRODUCTION TO POWER QUALITY AND WAYS FOR ENERGY CONSERVATION. ELECTRIC POWER QUALITY MAY BE DEFINED AS A MEASURE OF HOW WELL ELECTRIC POWER SERVICE CAN BE UTILIZED BY CUSTOMERS. THE TERM POWER QUALITY MEANS DIFFERENT THINGS TO DIFFERENT PEOPLE. THERE IS NO AGREED DEFINITION FOR POWER QUALITY, IT MAY BE DEFINED AS THE PROBLEMS MANIFESTED IN VOLTAGE, FREQUENCY AND THE EFFECT OF HARMONICS, POOR POWER FACTOR THAT RESULTS IN MIS OPERATION/FAILURE OF CUSTOMER EQUIPMENT. THE WIDESPREAD USE OF HIGH-POWER SEMICONDUCTOR SWITCHES AT THE UTILIZATION, DISTRIBUTION AND TRANSMISSION LEVELS HAVE MADE NON-SINUSOIDAL LOAD CURRENTS MORE COMMON. CERTAIN TYPE OF POWER QUALITY DEGRADATION RESULT IN LOSSES AND THUS LOSSES IN TRANSMISSION AND DISTRIBUTION SYSTEM HAVE COME UNDER GREATER SCRUTINY IN RECENT YEARS.THIS PAPER OUTLINES THE ISSUES RELATING REACTIVE POWER MANAGEMENT TO POWER QUALITY AND HENCE CAPACITOR DEMAND METER HAS BEEN DISCUSSED AS A POWER QUALITY ENHANCER. THE ROLE OF CAPACITOR IN POWER QUALITY ISSUES PROVES TO BE BENEFICIAL PARTICULARLY WHEN ENERGY CONSERVATION IS OUTLINED.THIS PAPER ALSO GIVES A VIEW ON VARIOUS FACTORS THAT AFFECT POWER QUALITY
POWER QUALITY IMPROVEMENT BY UPQC USING ANN CONTROLLER AND ENERGY MANAGEMENT
Santosh Kumar B.Kranthi Kumar
SUBMETERING P.Bharath SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT:Submetering is using meters to measure parts of total load measured by the Electric Utilitys Master Meter/submetering is encouraged by the state and federal governments, US and Canada The load side of the Master Meter, owned by the Electric Utility, is the POCC Submetering is the measurement and billing of electricity use in separate units of a master metered building. The Submeters are owned by the building owner master meter and issue a single billing to the owner. The Submeters do not measure the total load seen by the master meter, e.g., Meters do not measure their own load
Building owner buys energy at bulk rate and bills tenants for usage instead of utility; rate is
K.Jaganadha Rao
Abstract:
Five years ago, downloading a simple web page was no less than a test of your patience. Thanks to fiber optic communications technology, now we are able to watch large movies online. Now speaking about communication in defence, few major concerns associated with it are longstanding connectivity and high security. Traditionally used radio waves come with a serious threat of poor security and poor connectivity. Fiber optics serves both these purposes, but connecting soldiers with cables in the battle field sounds a bit weird, as it completely seizes the mobility of soldiers. Moreover, maintainance of fiber optic network would probably cost more than arms and ammunitions. Hence,there began a quest for a new technology which finally landed on FREE SPACE OPTICAL COMMUNICATION. In our paper, we have discussed how to overcome the connectivity and security issues of defence communication using FSO.
Wireless electricity
B.Sri hari naidu
suresh
Abstract:
In the present paper the various technologies available so far for wireless transmission of electricity and the need for a Wireless System of Energy Transmission is being discussed to find its possibility in actual practices, their advantages, disadvantages and economical consideration. This paper is mainly concentrated on : i) The most popular concept known as Tesla Theory, ii) The microwave power transmission(MPT) called Solar power satellite, and iii) The highly efficient fibre lasers for wireless power transmission. Many concepts, research papers, patents are available on wireless transmission of electricity but the commercial technologies are yet to be materialized. The paper also discusses the possible ways to get useful and practical results out of all research carried out so far elsewhere. Microwave oven magnetron with electronics to control the output power. The output microwave power ranges from 50 W to 200 W at 2.45 GHz. A coaxial cable connects the output of the microwave source to a coax-to-waveguide adapter. This adapter is connected to a waveguide ferrite circulator which protects the microwave source from reflected power. The circulator is connected to a tuning waveguide section to match the waveguide impedance to the antenna input impedance. The slotted waveguide antenna consists of 8 waveguide sections with 8 slots on each section.
Speed Control Based on Adaptive Fuzzy Logic Controller For AC-DC Converter Fed DC Motor Drives
Y.SHIRIDI BABU S.MADHAN
VITAM COLLEGE OF ENGINEERING ABSTRACT: An electric meter or energy meter isa device that measures the amount of electrical energy consumed bya residence, business or an electrically powered device. Electric meters aretypically calibrated in billing units, the most common one being the kilowatt hour.Periodic readings of electric meters establishes billing cycles and energy used during a cycle.
Improvement Techniques
V.L.S.S.N.Phani Reddy,
solution.Distributed generation (or embedded generation) has gained significant attentionin the past few years as one of more viable and cost effective solutions. Someutilities have been investigating connecting existing backup, standby and otherunder-utilized capacity to help increase capacity, while independent suppliers arelooking to build new smaller scale generation to connect in. Yet, connecting inadditional generation capacity can have a serious effect on the system reliabilityand power quality. Careful monitoring and control is needed to ensure that"more" is not "less."
K.Premchand
TPIST,bobbili
Gullipalli Chandrika
Abstract
Several industrial applications like flow control require variable speed operations like throttling valves, gear. Etc have been meeting these industrial requirements, for a long time now. However, these devices are not quite suitable for controlling the speed, as these are highly inefficient, have high noise levels and call for high maintenance levels. Today, with the advent of variable frequency drives (vfds). It is possible to vary the speed of driving induction motors. In fact, varying the frequency of the supply, which is used to feed the induction motors.
POWER QUALITY
A.R.K.SAI SWAROOP Lendi institute of engineering and technology In view of current and foreseeable energy shortage and environmental scenario, the exploitation of renewable energy sources offer great potential to satisfy the energy lack and to decrease the dependence on fossil fuel, also reducing global warming caused by CO2 emissions. However, widespread implementation of these sources will be more attractive only if they operate together with energy storage technologies. Besides, an effective storage energy management is essential to deal with some mismatches among power quality, efficiency, costs and environmental constrains. This paper presents a methodology taking as basis the analytic hierarchy process and fuzzy multi-rules and multi-sets. By exploiting a multi-criteria decision making, this methodology evaluates the operation of energy storage systems such as: pumped hydro storage (PHS), compressed air energy storage (CAES), H2 storage, flywheel, super-capacitors, lithium-ion and NaS advanced batteries and VRB flow battery. The main objective of the study is to develop a multicriteria analysis to find the most appropriate energy storage system concerning a power quality priority. For this, the criteria in analysis are: efficiency, load management, technical maturity, costs, environment impacts and power quality. Considerations and results described in this paper are part of the Research & Development Program undertaken by the Federal University of Santa Maria, Brazil. M.V.SATISH KUMAR
V.Bhanu venkatesh,
\EMBEDDED SYSTEMS[
N.K.Kishan
K.Chandramouli
Godavari Institute of Engineering & Technology
ABSTRACT
Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewelry adorns the body, and has very little practical purpose. However, researchers are looking to change the way we think about the beads and bobbles we wear. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence.
ELETRIC TRACTION
V S G Ashish BharadwaJ Jagan P
Abstract:
Can we imagine this world without electricity? Obviously the answer is no. There are many applications of electricity, electric traction is one of the those which is being discussed in this paper. What is a Traction? The act of drawing or pulling is known as Traction. And an electric traction is meant by the act of drawing a vehicle or a load over a surface by motor power. And is mainly used in locomotives. The main advantage of using this act in locomotives is Eco-friendly in nature. The usage of this act of electric traction can be done by electrifying the locomotives in many ways like; over head wire system, third rail system, on board energy(chemical cells, power obtained by diesel etc.) storage systems. This paper describes about the history of electric traction. The different sources used for the traction system in locomotives. Different types of current collectors used in the over head systems. Types of motors used in this traction process and their characteristics. Advantages of this electric locomotives rather than using a diesel type of locomotives.
FRACTIONAL
ABSTRACT
The fractional frequency transmission system (FFTS) is a very promising long-distance transmission approach, which uses lower frequency (50/3 Hz) to reduce the electrical length of the ac power line, and thus, its transmission capacity can be increased several fold. This paper introduces the installation of FFTS and primary experiment results. In this paper, the phase-controlled cycloconverter is used as the frequency changer, stepping up 50/3 Hz electricity to 50 Hz electricity and supplying it to the utility grid. Thus, a new flexible ac transmission system device is successfully established. The synchronizing process of 50/3 Hz transmission system with 50 Hz utility system is introduced in this paper. The experiment results show that a 1200 km/500 kV transmission line can transmit more than 2000 MW electric power when employing the FFTS. This paper also illustrates that there is no essential difficulty to realize FFTS in engineering practice.
ABSRACT:
This paper describes a way to compare the relative power capacities of medium power transformers as related to their temperature rise and the technology of the basic insulation systems used in the design. Examples are provided to demonstrate the use of hybrid technology in the development of high density power transformers. This new approach can be of value in regions, such as Asia Pacific, where the load growth is high, and the optimum use equipment is desired. This relates to the reduction of space allowed for transformers and the environmental impact of the transformers.
A Method of the Measurement of Moisture in IC Packages Using Microwaves B.PRATAP B.SOWJANYA VITAM College of Engineering, Visakhapatnam
ABSTRACT
DVASN NAIDU
Abstract
This paper describes different power qualityproblems in distribution systems and their solutions with power electronics basedequipment. Shunt and series active power filters are described showing theircompensation characteristics and principles of operation. Different power circuitstopologies and control scheme for each type of active power filter are analyzed. Thecompensation characteristics of each topology with the respective control scheme are provedby simulation and experimentally
MAGLEV TRAINS
CH.KRISHNA MADHURI
M.VENKATA LAVANYA
RAJAMAHENDRI INSTITUTE OF ENGINEERING AND TECHNOLOGY ABSTRACT MAGNETIC LEVITATION It uses magnetic fields to levitate a metallic object .By manipulating magnetic fields and controlling their forces an object can be levitated. Because of the growing need for quicker and more efficient methods for moving people and goods, researchers have turned to a new technique, one using electromagnetic rails and trains. This rail system is referred to as magnetic levitation, or maglev. Maglev is a generic term for any transportation system in which vehicles are suspended and guided by magnetic forces. Instead of engines, maglev vehicles use electromagnetism to levitate (raise) and propel the vehicle. Alternating current creates a magnetic field that pushes and pulls the vehicle which weighs almost about 1500 tonnes and keeps it above the support structure, called a guide way.
V.SRI RAMYA
CH.ASHA
G.I.E.T RAJANAGARAM
ABSTRACT Of the many emphatic tasks to the mankind the most challenging one regarding the energy and environment of the globe. In India mainly power is generated using Non Renewable resources. As growth of
population has increased the energy demand by 800 per cent, the Non Renewable resources of energy such as coal, oil, natural gas etc are not adequate for the ever-increasing demand and need. The right way to meet this energy crisis is to harness the Renewable resources of energy such as solar energy, wind, biomass, fuel cells etc. Technological innovation and commercialization is taking place at an ever increasing pace. Throughout the world, the need of the hour is energy conservation and environmental protection and a breakthrough in this filed is Fuel Cells, which can also meet these requirements. Many researches and developments have been demonstrated and many tests have been performed throughout the world with promising results. By the turn of this century, we hope this milestone may become the torchbearers of a new energy revolution. These are clean, efficient and could dramatically reduce urban air pollution, decrease oil imports and trade deficit. This system offers a better mean of utilization of fossil fuels such as natural gas.Thus, fuel cell can be considered to be the sound solution for the future problems of power generation and this paper is an effort to exhibit Fuel cells.
CIVIL
Sudarsini .
Uppalapati,
ABSTRACT:
Wastelands are those degraded lands which can be brought under vegetative cover, with reasonable effort, and which is currently under utilized and land which is deteriorating for lack of proper water and soil management or an account of natural causes. Wastelands are the important part of our environment. These lands have not been used for agricultural purpose from the last many years or which have not been put into cultivation due to natural causes. The concern for the development of degraded lands is not a new one. The extent of wastelands is being increasing day by day and this issue is complex and needs tackling on many fronts. So, they need reclamation and we have to manage them properly to make a great change. We should take many measures like development of forest areas and many other technical methods. Thus, we being the part of Environment should go forward with the sustainable development of Wastelands. We should pay attention in all such matters that are good to the Environment
Abstract Finite element analysis is a numerical technique. In this method all the complexities of the problems, like varying shape, boundary conditions and loads are maintained as they are but the solutions obtained are approximate. We may seek the distribution of temperature in the piston of an engine or we may seek the distribution of displacements and stress in a pairing slag. This method is not only used for analysis in solid mechanics, but even in the analysis of fluid flow, heat transfer, electric and magnetic fields and many more. Both static and dynamic problems can be handled by finite element analysis. Civil engineers use this method extensively for the analysis of beams, space frames, plates, shells, folded plates, foundations rock mechanic problems and seepage analysis of fluid through porous media and for analysis and design of ships, air crafts, electric motors and heat engines. A number of popular brands of finite element analysis packages are available. In the present study of finite element analysis ANSYS software is used to create a finite model. ANSYS is being used as it is user friendly. Results obtained from the laboratory model are used to validate the finite element model. Behavior of model is observed by varying thickness, elastic modulus and loading piston.
Green Buildings
Akash Prakashan
Sujit Kumar
Viswanadha Institute of Technology and Management ABSTRACT: The goal of the "Green Building" project is to reduce the impact of construction on the environment. Also known as sustainable construction. The Green Building project differs from conventional building projects by assigning equal priorities to economical, social, and environmental goals. These buildings are designed per the Leadership in Energy & Environmental Design (LEED*) rating system . The objectives of the design process: To achieve energy and water savings. To incorporate environmental friendly materials into the building.
JAIBHARATH.L.N.P
P.HARI PRASAD
T. SUDHEER
MVGR COLLEGE OF ENGINEERING ABSTRACT Eco friendly homes are not just politically correct; it is about how they save money and how an alternative architecture creates more than just buildings. The green brigade is slowly gaining ground across the rest of the country as well, not simply because it makes ecological sense but because economically and aesthetically too there is little to beat alternative building technology. As much a philosophy as a building style, a green home can slash your initial construction costs, help us t o harvest rainwater and to harness solar energy. Eco- friendly and climate-sensible design can keep your home cool in summer and warm in winter, recycle water and harness sunlight. The present paper explains the capability of an Ecohouse, which can effectively and efficiently save energy in various forms and means and can be used for diversified fields of engineering .It is no longer a question of whether to go green, it is, how much greener your home can become. It costs as much, if not more, to design the concrete eyesores, so one can simply opt to build a home that not only makes you feel good, it is actually good for you.
EXTRA-TERRESTRIAL BUILDINGS
S.Pranathi MVGR College of Engineering, Chinthalavalasa, Vizianagaram. Abstract In the present scenario, our ideas led to the expansion of our civilization to the Moon. Structures are needed which should protect the inhabitants from radiation, extreme temperatures and meteoroids, when idea of space is encouraged. And for that, transporting the building materials straight from Earth will be a mere difficult and expensive task. But fortunately, researches have found some indigenous materials, which include lunar Regolith, cast Regolith, glass and glass composites, metals and concrete. The most promising materials are cast Regolith and lunar glass. This paper has the goal of introducing these materials and their properties. Then the so called environmental and constructional problems that our Civil engineers need to overcome will be dealt in this paper. This paper provides information of how to construct structures with and within the lunar environment. Additional information about the robotic construction will also be provided in the end of this paper
ABSTRACT: Fibre reinforced concrete: (FRC) is concrete containing fibrous material which increases its structural integrity.It contains short discrete fibres that are uniformly distributed and random oriented. Fibres include steel fibres, glass fibres, synthetic fibres and natural fibre. Within these different fibres that character of fibre reinforced concrete changes with varying concretes, fibre materials, geometries, distribution, orientation and densities. Historical perspective: The concept of using fibres as reinforcement is not new. Fibres have been used as reinforcement since ancient times. Historically, horse hair was used in mortar and straw in mud bricks. In the early 1900s, asbestos fibres were used in concrete.And in the 1950s the concept of composite materials came into being and fibre reinforced concrete was one of the topics of interest. There was a need to find a replacement for the asbestos used in concrete and other building materials once the health risks associated with the substance were discovered. By the 1960s, steel (GFRC), and synthetic fibres such as polyperene fibres were used in concrete, and research into new fibre reinforced concretes continues today. Effect of fibres in concrete: Fibres are usually used in concrete to control cracking due to both plastic shrinkage and drying shrinkage. They also reduce the permeability of concrete and thus reduce bleeding of water. Some types of fibres produce greater impact, abrasion and shatter resistance in concrete. Generally fibres do not increase the flexural strength of concrete, and so cannot replace moment resisting or structural reinforcement. Indeed, some fibres actually reduce the strength of concrete. The amount of fibres added to a concrete mix is expressed as a percentage of the total volume of the composite (concrete and fibres), termed volume fraction (Vf). Vf typically ranges from 0.1 to 3%. Aspect ratio (l/d) is calculated by dividing fibre length (l) by its diameter
GABION WALLS
SOUMYA MANDAVA
ABSTRACT:
Gabions are rectangular baskets fabricated from a hexagonal mesh of heavily galvanized steel wire. The baskets are filled with rock and stacked atop one another to form a gravity type wall. Gabions depend mainly on the interlocking of the individual stones and rocks within the wire mesh for internal stability, and their mass or weight to resist hydraulic and earth forces. Gabions are a porous type of structure that can sometimes be vegetated. Gabions are considered to be a ha structural solution that has rd minimal habitat and aesthetic value. Gabions are defined as double twisted woven wire mesh box shaped baskets of various sizes and dimensions. The selvedges of the gabion baskets are the thicker perimeter and edge wires to which the wire mesh is secured as to withstand sudden or gradual stress from any direction. Reinforcing wires are the thicker wires incorporated into the netting during fabrication. The diaphragms are internal wire mesh partitions which divide the gabions into cells. Lacing or tie wire is the wire used to assemble and join the gabion units. Connecting wires are the internal wires used to prevent the gabions from bulging Gabions are used to slow the velocity of concentrated runoff or to stabilize slopes with seepage problems and/or non-Cohesive soils. Gabions can be used at soil-water interfaces, where the soil conditions, water turbulence, water velocity, and expected vegetative cover are such that the soil may erode under the design flow conditions. Gabions can be used on steeper slopes than riprap and are sometimes the only feasible
GREEN BUILDINGS
K.A nvesh
ABSTRACT:
With the rapid advancement in the technology, the building industry is growing at an enormous pace. This has resulted in an adverse impact, being made on the environment.The pollution, resulting, from the construction activities, is disturbing the natural ecosystems and the damage caused by it, is irreparable. One area of concern is the energy consumption and release ofCO2. Green building technology is expected to provide solutions to the problems faced by the world.engineers, architects and builders must ensure that the development is sustainable and for the betterment of the society. An attempt has been made, I this paper, to outline the various concepts and outcomes of using green buildings.
Abstract
Until recent years energy efficiency has been a relatively low priority and low perceived opportunity to building owners and investors. However with the dramatic increase and awareness of energy use concerns and the advances in the cost effective technologies, energy efficiency is fast
becoming part of real estate management, facilities management and operations strategy. This paper deals with the intelligent buildings, Building management systems (BMS) which encompasses on enormous variety of technologies across Commercial, Industrial, Institutional and domestic buildings including energy management systems and building controls. The function of BMS is central to the concept of Intelligent Buildings and its purpose is to control, monitor and optimize building services Such as lighting, CCTV and alarm systems, access control time and attendance control(staff movement and availability) etc. In this concept of Intelligent Buildings major important system is HVAC (Heating, Ventilating, and Air conditioning) System and its function is to regulate temperature, air quality and humidity. This is also known as Climate control system which is more efficient and environment friendly.
J.KRANTHI KUMAR
ABSTRACT:Global warming is probably the biggest challenge that humanity is facing right now. We can also think of it as being part of air pollution. Along with the increasing awareness on global warming and the greenhouse gases emissions from governments, organizations and individuals, carbon footprint is becoming a new popular concept during the past two years. Global warming is now defined as the overall amount of greenhouse gas emissions in terms of CO2 equivalent emitted associated with human s activities. Regardless of whether global warming is occurring, it is a fact that every year chemicals with extremely long lifetimes are being emitted into the atmosphere. Because the Long-term effect of these substances on the atmosphere and global climate is not known, the U.S. Semiconductor industry is researching ways of changing its processes to decrease, if not completely eliminate, these long-lived
EMERGING TRENDS IN CONSTRUCTIONRECOVERING RESOURCES REDUCING, RECYCLING AND REUSING CONSTRUCTION AND DEMOLITION MATERIALS AT LAND REVITALIZATION PROJECTS
J.KRANTHI KUMAR W.ANANTH
Parallel to rapid urbanization, environment impacts from construction and demolition (C&D) waste increasingly has become a major issue in urban waste management. Here comes the need for recycling and reuse. Recycling and reuse of the C&D wastes appear to be making continuous progress. The benefits of reuse and recycling of waste streams from building construction and demolition include diversion of waste materials from landfill sites and reduced depletion of natural resources. The paper focuses primarily on recycling of concrete and steel but also considers other materials such as non-ferrous metals, gypsum and wood. Technical and economic factors and the relevant standards that contribute to the success of reuse and recycling are identified. The technical and other barriers are presented and the research that is underway to remove these barriers is discussed. Economic barriers include the need for rapid demolition and clearing of the site, the cost of separating the material to be recycled from contaminating materials and the relative economic advantage of disposal versus recycling. These issues and the role of market are as a driver for increased reuse and recycling of construction and demolition waste is addressed. The progress in terms of recycling and reuse of C&D waste in our country has not reached the required standard. The government of India should make it necessary for all manufacturing companies to start recycling the wastes that have been produced by them.
V.RAMACHANDRA
G .SUPRABHAT
Abstract : Rain water harvesting system comprises components of various stages1) Transporting rain water 2) Filtration 3) Storage tanks This paper deals with the potential of rain water harvesting methods, the basic concept involved in the process in urban and rural areas, structural components and implementation of the process. The main advantages of the process are 1) Ground water is maintained 2) Water quality is improved 3) Meet domestic as well as irrigation needs 4) Minimizes wastage of water The methods involved in this are 1) Roof top harvesting 2) open land harvesting
N.Sruthi
explained in this paper. Glass fibers are suggested for making the FRP products that are used in the civil engineering constructional works.
Water
Resources
SystemsHydrological
Risk,Management
and
Development
Sk.Arifulla
V.Praveen
Amara Institute of Engineering and Technology INTRODUCTION This volume contains 43 contributions authored by experts from 31 countries which is certainly a reflection of the importance of management and risk issues in water resources in many parts of the world. The publication has been organized into seven topics. The following is a brief summary of the main themes and results of the individual contributions, highlighting the overall findings of the symposium as far as hydrological risk and water management are concerned. A more prevalent finding is an increasing vulnerability to floods. This is consistent with the results of Ben-Zvi & Azmon who examine temporal trends in flood peaks in a number of regions in Israel. Except for one region, the changes are of local extent, if any. In some catchments flood peaks appear to increase, but they appear to decline in others. While these contributions focus on isolating temporal trends and relating them to climatic indicators, the following two contributions examine individual flood processes more closely. Merz & Blschl propose a framework for identifying the causative mechanisms of floods at the regional scale. They test the framework on flood data in Austria and are able to stratify the flood peaks into long-rain floods, short-rain floods, flash floods, rain-on-snow floods and snow-melt floods. All the flood types exhibit
CHEMICAL
PLASTIC2PETROL
G.V.PHANEENDRA VARMA M.V.G.R.COLLEGE OF ENGINEERING ABSTRACT A plastic material is of a wide range of synthetic or semi-synthetic organic amorphous used in the manufacture of industrial products.These plastics have low density, low weight, Tensile strength, flexibility, elasticity, etc. Even though the over use age of this substance ruins lives due to the indigestible facts that: y y y y y y Plastics deforms under load. Plastics are low heat resistant and poor ductility. Plastics release poisonous gases on combustion. Plastic destroys soil fertility. It is a recycle process, but it is very costly. Even though we are use this in our daily lives regularly, right from early morning (with milk packet) to till going on to bed (many utilities).If we go on continue using this we could mountains of plastics around every street not mo decade.
Fuel/Energy shortage: Our country is facing critical fuel and energy deficiency. As the petroleum reserves are fast depleting we have to find some other sources of energy.Though we cant eliminate Plastic from our lives we can produce useable fuel from its waste.Prof. Mrs. Alka Umesh Zadgaonkar succeeded in producing hydrocarbons from the plastic waste.
IMPORTANCE OF SUSTAINLE DEVELOPMENT G venkata sainath B.S.S.Krishna Sastry RVR&JC College ofEngineering ABSTRACT Present day to day life innovations are just based on the requirement of common man. A human utilizes the natural resources without any limitations. So there should be a technology which can reach the present needs of man, without disturbing the resources that are available for future generations. And hence, SUSTAINABILITY is one of the wonderful emerging technologies which can fulfill the needs of man. By the definition itself, it is the development that meets the needs of present without compromising the ability of future generations to meet their own needs.
ABSTRACT Hydrogen is a valuable gas as a clean energy source and as feedstock for some industries. Therefore, demand on hydrogen production has increased considerably in recent years. Electrolysis of water, steam reforming of hydrocarbons and auto-thermal processes are wellknown methods for hydrogen gas production, but not cost-effective due to high energy requirements. . Biological production of hydrogen gas has significant advantages over chemical methods. The major biological processes utilized for hydrogen gas production are bio-photolysis of water by algae, dark and photo-fermentation of organic materials, usually carbohydrates by bacteria. Sequential dark and photo-fermentation process is a rather new approach for biohydrogen production.Currently, there is a huge demand of the chemical and bio hydrogen. There is no log on the production volume and use of hydrogen world-wide. However the estimated consumption of hydrogen is expected to reach 900 billion cubic meters in 2011.A important future application of hydrogen could be as an alternative for fossil fuels, once the oil deposits are depleted. This application is however dependent on the development of storage techniques to enable proper storage, distribution and combustion of hydrogen. If the cost of hydrogen production, distribution, and end-user technologies decreases, hydrogen as a fuel could be entering the market in 2020.
ABSTRACT The industrial revolution has resulted in rapid growth of industries manufacturing wide range of chemicals. The chemicals find use almost in all the sectors ranging from food, cosmetics, perfumes, Drugs, Pharmaceuticals, textiles, paints, plastics, paper, pesticides, fertilizers explosives etc. Ethyl acetate is solvent widely used in these chemical industries. Ethyl acetate has manufactured by the use of alcohol, acetic acid in the presence of sulphuric acid.In chemical industries, hazardous operations are carried out and highlyflammable, toxic and corrosive chemicals are manufactured, stored and handled. Hazards like fire, explosion, flammable material release, toxic release and corrosive chemical release are possible in chemical industries. In the industry where this study was carriedout, flammable toxic and corrosive chemicals are kept in storage and in processequipments. Loading
Andhra University College of Engineering ABSTRACT In this paper, in order to study the mechanism of drag reduction by polymer additives, the turbulent intensities and Reynolds stresses in a mixing layer and pipe flow are measured by LDA respectively. The results show that polymer additives do not simply suppress the turbulent fluctuation as we expected. The turbulence structures are changed rather than suppressed.Based on macroscopic balances, mathematical equations for efflux time during gravity draining of a Newtonian liquid ( below its bubble point) from large open storage tanks of different geometries through exit pipe of same length and cross sectional area ( the flow in the exit pipe being turbulent) located at the centre of the bottom of the respective storage tanks are developed. The equations so developed are useful in arriving at the minimum time required for draining the contents of the respective storage vessels. To drain the same volume of liquid at the same Reynolds number, the mathematical equations so developed are compared to find out Which of the tanks considered empty faster. REPLACE SILICON WITH NANOTECHNOLOGY
d.raghavendra deepak, g.n.vbhargav
ABSTRACT
Nanotechnology, a groundbreaking design for future Nano-electronics which enable 'low-cost, high yield fabrication'. A completely new way of designing an electronic interconnects for nano-scale circuits using coding theory, by using cross-bar architecture. The design consists of a pair of parallel wires crossed by a second set of wires. Together they create a switch that can deliver the functions currently assigned to transistors on silicon processors. Each latch is incredibly tiny, only a few microns wide. The crossbar latch design is "well-suited to tolerate the inevitable defects that are bound to occur in the fabrication process at such tiny dimensions"
Abstract: Nanotechnology is the control of matter on an atomic and molecular scale. As nanotechnology is a truly multi-disciplinary field, the coordination among researchers in all related areas are crucial to the success of nanotechnology. It deals with structures 100 nanometers or smaller, and involves developing materials or devices within that size. Nanotechnology is an extremely diverse, ranging from novel extensions of conventional physics, and completely new approaches based upon molecular self-assembly, results in developing new materials with dimensions on the nanoscale. Much of the work being done today that carries the name 'nanotechnology' is not in the original meaning of the word. Nanotechnology, in its traditional sense, means built up from the bottom up, with atomic precision. Nanotechnology has the potential to create many new materials and devices with wide-ranging applications, such as in medicine, electronics, pharmaceuticals, manufacturing industry, textile, electrical, agriculture, pollution control, optics, automobiles, telecommunications, chemical industry and energy production. Nanotechnology can be used to make wonders in the present scenario for providing renewable clean energy, clean water supply, and space development and for the quick recovery from major health problems.
AN INNOVATION IN WASTE WATER TREATMENT MICROBIAL FUEL CELL G.V.Phaneendra Varma MVGR College of Engineering Abstract: Present day wastewater treatment plant utilizes high amounts of energy and is costly to operate. These conventional wastewater treatment plants utilize aerobic bacteria. Organic material in wastewater contains energy that can be harvested. We propose to biologically harvest this energy in the form of electricity from wastewater obtained at The Tapowan Wastewater Treatment Plant in Nasik city. But by using a microbial fuel cell (MFC), electricity can be extracted from wastewater! The microbial fuel cell converts organic material to electricity using bacteria, leaving behind clean drinking water in the process. This is an exciting prospect for people around the world (especially in India & Third world country) who lack adequate sanitation and the means to afford it. In addition, water treatment plants require a lot of power to treat water. Each year, almost 25 billion dollars are spent in treating wastewater. A lot of money and resources could be saved if the wastewater could be used as a fuel!
Determination Of Formaldehyde In Liquid, Solid And Semisolid Pharmaceuticals And Cosmetics By Flow Injection-Pervaporation B.Sangeetha M.Kranthi Rekha K.Soumya
Andhra University College Of Engineering Abstract: A spectrophotometric method is proposed for the determination of formaldehyde inliquid, solidandsemisolid cosmetic and pharmaceutical samples, employing, for the firsttime in this field, the coupling of a continuous flow configuration to a pervaporationunit. The method is based on the reactionof the analyte with pararosaniline in acidicmedium and subsequent formation of a coloured product(alkylsulfonic acidchromophore) with sodium sulfite, which was monitored spectrophotometrically. Themethod was applied to samples in which the formaldehyde content is regulated by law.In the present work, formaldehyde, removed by pervaporation, was taken up by anacidic stream of pararosaniline. The sytream leaving the unit was mixed with a sulfitesolution to yield the coloured product, which was spectrophotometrically monitored at578 nm. The method was applied to the determination of the analyte in liquid, solid andsemisolid samples such as cosmetics and pharmaceuticals products, without anyprevious treatment.
Formation of Organic Acids during the Hydrolysis and Oxidation of Several Wastes in Sub- and Supercritical Water
K.Soumya B.Sangeetha Andhra University College Of Engineerging Abstract: The objective of this work was to evaluate the transformation characteristics of fourorganic substances in supercritical water. The purpose was to demonstrate the yield andstability of the acetic acid produced under hydrolytic and oxidative conditions. Otherorganic acids, such as formic, glycolic, and lactic acids, were monitored. Cellulose andcoconut oil solutions, as well as brewery and dairy effluents, were used as feedstocks.Batch tests were performed at fixed conditions of 400 C, 27.6 MPa, and 5 min of reaction time. Hydrogen peroxide was the oxidant. Under hydrolytic conditions, 70% of the initial carbon remained as the liquid product. On the contrary, in the presence of excess oxygen, there was a 95% conversion to the gaseous product. Typically, less than 15% of the initial total organic carbon was converted to the acids. The use of catalysts (i.e., TiO2) and additives (i.e., H2SO4) did not enhanced the organic acid yield. However, catalysts addition facilitated feedstock breakdown at lower oxygen levels. To evaluate the effect of alkali addition and the use of lower temperatures, continuous flow tests were conducted using glucose as the substrate. M.Kranthi Rekha
GREEN TECHNOLOGY Pytoremediation: green technology for the clean up of toxic metals in the environment
S.L.K.B.Laxmi T.V.S.Santhi rupa B.V.Nikhila
A.U.COLLEGE OF ENGINEERING ABSTRACT The temperature on the earths surface is increasing day-to-day ;due to which the problems like global warming ,ozone layer depletion ,etc.. are existing. This inturn affects human life. What are the strategies to be implemented to reduce these problems? How can ecological balance be maintained? Does the future of the world really hang in balance? ANS:GREEN TECHNOLOGY-STRATEGIES This Paper gives how smart we can use environmental strategy to innovate ,create, build a healthy and eco-friendly environment ,move people from an environmentally friendly thinker to a green living genius..i.e.-GREEN TO GOLD .The contamination of environment by toxic metals poses a threat for "Man and biosphere", reducing agricultural productivity and damaging the health of the ecosystem. In developed nations, this problem is being addressed and solved to some extent by using "green technology" involving metal tolerant plants and the application of genetic manipulation, should hasten the process of transferring this technology from laboratory to field. Therefore, it is essential to investigate and understand how plants are able to tolerate toxic metals and to identify which metabolic pathways and genes are involved in such a process.
GREEN THUMB
B.PADMAJA G.AVINASH
PYDAH COLLEGE OF ENGINEERNG AND TECHNOLOGY ABSTRACT: Green thumb is a type of robot which deals in the protection of plants. In the green thumb robot there are two LEDs. When the red LED blinks, the plant needs water. A blinking yellow LED indicates sufficient or too much water. The solar panel on the back side of the PCB easily provides the necessary 100uA at 1.9V, even on a very rainy day. When there is more sunlight, LED brightness goes up automatically. The soil resistance is measured using a tiny alternating current (less than a microwatt). To avoid corrosion, the PCB has been tinned and the sensor poles were gold-plated. Prototypes are entering their second summer, and have been doing a good job for various plants. we don't have them by nature, "green Thumbs." Plants need new soil and enough water; that usually keeps them growing pretty well.Enough water. How much is that? A substatial layer of water will cause the roots to decay. The soil should be moist. That means neither wet nor dry. Difficult to judge, as the top layer can be quite dry even though there is still more than sufficient water below. Now, modern electronics and small solar panels allow construction of a nice, not too complex and fairly cheap Green Thumb. MOBILE COMPUTING
Harithasri S.,D.Madhuri ,M.V.Soumya
M.V.G.R. College Of Engineering Abstract Mobile computing has fast become an important new paradigm in today's world of networked computing systems. Ranging from wireless laptops to cellular phones and WiFi/Bluetoothenabled PDAs to wireless sensor networks, mobile computing has become ubiquitous in its impact on our daily lives. The debut if iPhones and the proliferation of other handheld devices has spurred excitement and interest in this evolving field. Mobile computing is becoming increasingly important due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile IP, the more popular global mobility solution, was designed to support mobility of a single host. Even though the same protocol can be applied in the case of network mobility, providing connectivity to mobile networks introduces many issues related to the scalability, security and QoS. Instead, a mobile network can be cited as a remote site, trying to establish secured communication with the home network. This view of mobile network solves many issues related to QoS, security and scalability.
ARTIFICIAL NEURAL NETWORKS FUZZY LOGIC (AUTOMATED AUTOMOBILES) ANISH KUMAR JAIN ABSTRACT Automobiles have become an integrated part of our daily life. The development of technology has improved the automobile industry in both cost & efficiency. The automobile speed has increased . But under stress and tension he falls as a prey to accidents. The manual control of speed & braking of a car fails during anxiety. Thus automated speed control & braking system is required to prevent accidents. This automation is possible only with the help of Artificial Intelligence (Fuzzy Logic). In this paper, Fuzzy Logic control system is used to control the speed of the car based on the obstacle sensed. The obstacle sensor unit senses the presence of the obstacle. The sensing distance depends upon the speed of the car. Within this distance, the angle of the obstacle is sensed and the speed is controlled according to the angle subtended by the obstacle. If the obstacle cannot be crossed by the car, then the brakes are applied and the car comes to rest before colliding with the obstacle. Thus, this automated fuzzy control unit can provide an accident free journey. CH. VAMSI KRISHNA
CSE
Mobile computing
G.Meena Kumari
CH.Sruthi
ADITYA INSTITUTE OF TECHNOLOGY AND MANAGAMENT ABSTRACT A widely accepted prediction is that computing is moving background projecting the human user into foreground. Today computing has become a key in every technology. If this prediction is to come true, then next generation computing, which we will call as human computing is about anticipatory user interfaces that should be human centered, built for humans based on human model. In the present paper we will discuss how human computing leads to understanding of human behavior , number of components of human behavior, how they might be integrated into computers & how far we are from enabling computers to understand human behavior. SECURING Wi-Fi NETWORK FROM HACKERS
K. SADHANA
Y. LATHA
The Wi-Fi networking technology for the data communication that made an evolution for cheaper and easy operation for the communication of devices. The solution for a problem will always lead to a new problem and the new problem will lead to a new solution thats how the world of technology moves on. The technology made the user easy to access the computer
devices by using the Wi-Fi technology with a cheaper in cost and efficient in working but the loophole in the technology help the devil minded to use in another way.The terrorist attacks in Delhi and Mumbai are planned by
ADVANCED NETWORK SECURITY K.Santhosh Kumar Vaishnavi Engg College, Srikakulam ABSTRACT In todays world, the importance of information cannot be overemphasize. All the services and systems of various organizations and institutions, both government and private, depend on the information fed to them. Information has attained the same or perhaps even greater significance than that of any other tangible object that is of any practical consequence. All this makes it imperative for individuals and organizations alike to safeguard their data and avoid its misuse, destruction, duplication or distribution by unauthorized people, especially after witnessing the havoc that can be unleashed by such attacks. Since the inception of conglomeration of Computers with Networks, the consequence of which shrunk the communication world, hitherto unknown, umpteen ilks of security breaches took their origin. Tersely quoting some security ditherers Eavesdropping, Hacking, Hijacking, Mapping, Packet Sniffing, 1Spoofing, Dos attacks, etc. Recent threats to the information systems of the world have led to unprecedented efforts to seek a way out to stop these miscreants. Organizations the world over have joined hands to combat this menace with their entire technological prowess. These efforts have led to the development of computer security systems that are far more rugged and comprehensive than their earlier counterparts. Computer security has become synonymous with network security. Our paper deals with one such system that is presently under development and has been named PALLADIUM. Various other antidotes that are in fact inextricable from security issues such as the Cryptography, Authentication, Integrity and Non Repudiation, Key Distribution and V.Ravi
certification, Access control by implementing Firewalls etc. also feature in the discussion in the form of the KERBEROS AUTHENTICATION SYSTEM, IP Sec & THE DMZ ZONE.
1.Ch.Sai Siddhartha
2.K.Anil kumar
JNTUK,UNIVERSITY COLLEGE OF ENGINEERING OBJECTIVE: To develop an Android based application for triggering locator. Alarm with GPS
Android is an open source software stack that includes the operating system, middleware, and key applications along with a set of API libraries for writing mobile applications that can shape the look, feel, and function of mobile handsets. In Android, native and third-party applications are written using the same APIs and executed on the same run time. These APIs feature hardware access, location-based services, support for background services, map-based activities, relational databases, Inter device peer-to-peer messaging, and 2D and 3D graphics. Android sits alongside a new wave of mobile operating systems designed for increasingly powerful mobile hardware. Android offers new possibilities for mobile applications by offering an open development environment built on an open source Linux kernel. Hardware access is available to all applications through a series of API libraries, and application interaction, while carefully controlled, is fully supported. In Android, all applications have equal standing. Third-party and native Android applications are written using the same APIs and are executed on the same run time. Users can remove and replace any native application with a third-party developer alternative; even the dialer and home screens can be replaced.
BRAIN COMPUTER INTERFACE S.Joshua Johnson, Avanthi Institute of Engg and Tech ABSTRACT: As the power of modern computers grows alongside our understanding of the human brain, we move ever closer to making some pretty spectacular science fiction into reality. Imagine transmitting signals directly to someone's brain that would allow them to see, hear or feel specific sensory inputs. Consider the potential to manipulate computers or machinery with nothing more than a thought. It isn't about convenience -- for severely disabled people, development of a brain-computer interface (BCI) could be the most important technological breakthrough in decades. In this article, we'll learn all about how BCIs work, their limitations and where they could be headed in the future. The reason a BCI works at all is because of the way our brains function. Our brains are filled with neurons, individual nerve cells connected to one another by dendrites and axons. Every time we think, move, feel or remember something, our neurons are at work. That work is carried out by small electric signals that zip from neuron to neuron as fast as 250 mph [source: Walker]. The signals are generated by differences in electric potential carried by ions on the membrane of each neuron. CATASTROPHY WARNING SYSTEM THROUGH MOBILE PHONES G.KAVYA, K.GOPI CHAITANYA COLLEGE OF ENGINEERING, FARHEENNAAZ A.Sravya,
ABSTRACT
This system warns subscribers wherever they are, via a mobile text message. The alarm system picks up seismic signals from global stations and consolidates the information. If there is a danger an alarm is sent out to subscribers via an SMS. ABSTRACT: Worst catastrophies tsunamis, like cyclones cannot be prevented or precisely predicted, but there are many systems being developed to warn and save the people from dying and from being homeless. earthquakes, Mobile for (GSM) standard used here for making calls such as text messaging.
CLOUD COMPUTING
P.SAI BHARGAV , SAI DEEPAK,
SRI MITTAPALLI COLLEGE OF ENGINEERING ABSTRACT Cloud computing is basically an Internet-based network made up of large numbers of servers - mostly based on open standards, modular and inexpensive. Clouds contain vast amounts of information and provide a variety of services to large numbers of people. The benefits of cloud computing are Reduced Data Leakage, Decrease evidence acquisition time, they eliminate or reduce service downtime, they Forensic readiness, they Decrease evidence transfer time The main factor to be discussed is security of cloud computing, which is a risk factor involved in major computing fields Cloud computing is Internet- ("CLOUD-") based development and use of computer technology ("COMPUTING")
CRYPTOGRAPHY
K. Suseela Aishwarya , A.Naga sai durga
ABSTRACT: This paper introduces Advance Cryptography Techniques. Cryptography is The science of protecting data and Network Security keeping information private and Secure from unauthorized Users. This paper also gives the Fundamental Requirements for the Data Transmission, The security attacks like Interruption, interception, Modification of the data Transmission.
Cryptology
. D.janakiramana SRI SIVANI College of Engineering Abstract The present century has been one of many scientific discoveries and technological advancements. The issue of security came with the advent of technology. As computing systems became more complicated, there was an increasing need for security. If the unauthorized disclosure or alteration of the information could result in any negative impact, it should be secured. This paper deals with cryptography, which is one of the methods to provide security. It involves the use of a cryptographic algorithm used in the encryption and decryption process. Encryption is the science of changing data so that it is unrecognizable and useless to an unauthorized person. Decryption is changing it back to its original form. The main focus of this paper is on Quantum Cryptography, which has the advantage that the exchange of information can be shown to be secure in a very strong sense, without making assumptions about the intractability of certain mathematical problems. It is an approach of securing communications based on certain phenomena of quantum physics. The quantum computers could do some really phenomenal things for cryptography if the practical difficulties can be overcome. B.sravya
EMBEDDED SYSTEMS
SAI SANDEEP TIRLANGI NAGUR BABU CHINNAM
Sasi Institute of Technology & Engineering Abstract: As you go about the affair of living, you put your life safe and luxurious with all the available resources .Now days we all are entrenched with computers and almost all depended on them. Devices with intelligence rule the world. Imbibing intelligence to these devices is through a system called EMBEDDED SYSTEM. an example of Embedded System. Its applications provide marvelous opportunities
for ingenious use of computer technology. Almost all every system introduced into the market is
Firewall
S.Hasish Vignans Institute of Information Technology A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. A firewall is a sigle point of defence between two networks. GADGETS P.Geeta Devi SRI SIVANI COLLEGE OF ENGINEERING ABSTRACT This topic explains you all about, what is a gadget and various examples of gadget. A biologically sensible agelength structured multispecies Gadget model (incorporating minke whales, cod, herring, and capelin) for the Barents Seaacting as the operating model has been linked to Fisheries Library in Racting as the management procedureto perform management strategy evaluations. Assessments may be run using either XSA, survey-based methods, or by taking modelled stock numbers directly. Total allowable catches are based on the assessment and harvest control rules (HCRs). The tool can be used for assessing a wide variety of sources of uncertainties within the assessment process. Model structure and linkages are K.Sirisha M.V.Ravikumar
described and a fit to the historical data is presented. A base case of future dynamic (non-steady state) stock trends, based on the existing HCRs, is compared with alternative management and environmental scenarios. The relative differences for each scenario in terms of stock size and catches highlight a number of uncertainties within the biological and fisheries system. The results indicate that the current management rules are robust to the range of scenarios examined so far.
RENATI SOUSEELYA
Abstract: Honey pots are an exciting new technology. They allow us to turn the tables on the bad guys.In the past several years there has been growing interest in exactly what this technology is and how it works. A honey pot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and used tools. One goal of this paper is to show the possibilities of honey pots and their use in research as well as productive environment. Compared to an intrusion detection system, honey pots have the big advantage that they do not generate false alerts, as each observed traffic is suspicious, because no productive components are running in the system. So in this paper we discuss about honey pots a method for providing network security and briefly about firewalls.
KEY LOGGERS -A THREAT TO NETWORK SECURITY MAVALAPALLI SESHANK GITAM University\ Abstract: KONATHALA CHANAKYA
A key logger is any software or hardware that is designed to secretly monitor and save all the keystrokes. Key loggers developers release them as legitimate software but still they are used mainly for hacking purposes to steal personal user data. In the present world of information technology, key loggers along with phishing became most common way of hacking. Many users are still unaware of this dangerous attack and are falling victim to cyber frauds. This paper describes what exactly a key logger is? The different types of key loggers like hardware keyloggers, hook based keyloggers and kernel keyloggers, working mechanism of these keyloggers. Algorithms to detect various types of keyloggers, used by different antiviruses, including new behavior based detecting techniques and how to prevent oneself from being a victim of the key loggers?
CLOUD COMPUTING
P.SAI BHARGAV , T.RAVI TEJA
SRI MITTAPALLI COLLEGE OF ENGINEERING ABSTRACT Cloud computing is basically an Internet-based network made up of large numbers of servers mostly based on open standards, modular and inexpensive. Clouds contain vast amounts of information and provide a variety of services to large numbers of people. The benefits of cloud computing are Reduced Data Leakage, Decrease evidence acquisition time, they eliminate or reduce service downtime, they Forensic readiness, theyDecrease evidence transfer time The main factor to be discussed is security of cloud computing, which is a risk factor involved in major computing fields Cloud computing is Internet- ("CLOUD-") based development and use of computer technology ("COMPUTING")
PHISHING
A.Sagar. K.Murali ManoharBrahmam MVGR COLLEGE OF ENGINEERING Abstract:- Phishing scams have rocked Internet users for some time now. The global media runs stories on an almost daily basis covering the latest organization to have their customers
targeted and how many victims succumbed to the attack. . Phishing is an online scam used to commit identity theft. A fraudulent, but official-looking is sent to a user in an attempt to con that user into divulging personal and/or private information, which is then used for identity theft. If someone can get vital authentication information, that person may be able to access another's bank accounts, charge accounts or credit information. This paper describes attacks that exploit the online Marketplaces susceptibility to covert fraud, and social engineering to hijack account Access and ultimately steal money. The attacker introduces a fatal security flaw into a trusted embedded system (e.g. computer motherboard, network interface card, network router, cell phone),distributes it through the online marketplace at a plausible bargain, and exploits the security flaw to steal information. consumer risk far exceeds the price of the good. By understanding the tools and techniques used by professional criminals, and analyzing flaws in their own perimeter security or applications, organizations can prevent many phishing attack vectors.
ABSTRACT:
Although a variety of wireless network technologies have or will soon reach the general business
market, wireless LANs based on the 802.11 standard are the most likely candidate to becomewidely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth comparable to a standard Ethernet wired LAN in performance. An upcoming
version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work wireless even if ITstaff and security management administrators do not yet recognize
LANs as an approved technology. This paper addresses the security concerns raised by both
SURFACE COMPUTING
K. ABHINAV MANJEERA.M GAYATRI VIDYA PARISHAD ABSTRACT: The name Surface comes from "surface computing," and Microsoft envisions the Coffee-table machine as the first of many such devices. Surface computing uses a blend of wireless protocols, special machine-readable tags and shape recognition to seamlessly merge the real and the virtual world an idea the Milan team refers to as "blended reality." The table can be built with a variety of wireless transceivers, including Bluetooth, WI-Fi and (eventually) radio frequency identification (RFID) and is designed to sync instantly with any device that touches its surface. SRIVIDYARANI.M
ARTIFICIAL NEURAL NETWORKS FUZZY LOGIC (AUTOMATED AUTOMOBILES) ANISH KUMAR JAIN ABSTRACT Automobiles have become an integrated part of our daily life. The development of technology has improved the automobile industry in both cost & efficiency. The automobile speed has increased . But under stress and tension he falls as a prey to accidents. The manual control of speed & braking of a car fails during anxiety. Thus automated speed control & braking system is required to prevent accidents. This automation is possible only with the help of Artificial Intelligence (Fuzzy Logic). In this paper, Fuzzy Logic control system is used to control the speed of the car based on the obstacle sensed. The obstacle sensor unit senses the presence of the obstacle. The sensing distance depends upon the speed of the car. Within this distance, the angle of the obstacle is sensed and the speed is controlled according to the angle subtended by the obstacle. If the obstacle cannot be crossed by the car, then the brakes are applied and the car comes to rest before colliding with the obstacle. Thus, this automated fuzzy control unit can provide an accident free journey. CH. VAMSI KRISHNA
105
GIET ENGINEERING COLLEGE ABSTRACT: We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. Information is confined traditionally on paper or digitally on a screen. SixthSense bridges this gap, bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via naturalBasically, Sixth Sense is a mini-projector coupled with a camera and a cellphonewhich acts as the computer and your connection to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures, like in the infamous Minority Report.However, instead of requiring you to be in front of a big screen like Tom Cruise, Sixth Sense can do its magicand a lot moreeverywhere, even while you are jumping hysteric over Oprah's sofa. Steganography- the art of hiding information D.S.Raghu Ram, S.Rajeswari,
The Right to privacy is the most comprehensive of rights and the right most valued by civilized man.. - Justice Louis Brandies, US Supreme Court, 1928. Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.
106
MOBILE COMPUTING is defined as a technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. Mobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the cellular networks over last few years. So for the extension of this technology mobile. Computing is used for data communication. In this paper we are presenting an overview of existing cellular network and detail description of the CDPD technology which allows data communication across cellular network. Among the other alternatives of this technology CircuitSwitched Cellular, Specialized Mobile Radio, Wireless Data Networks . CDPD is more advantageous, because it splits data into packets those packets are inserted on momentarily unoccupied voice frequencies during the idle time on voice signals. The network hierarchy of CDPD network has different levels; each level performs its own specified task. So CDPD is BEST in Speed, Security, Cost of Service, Cost of Deployment, Mobility, and Interoperability. Finally we are describing the applications of Mobile Computing and the FUTURE of Mobile Computing .
107
108
ECE
109
4G Communications
K.Srinivas SIST ABSTRACT: Mobile communication is continuously one of the hottest areas that are developing at a ooming speed, with advanced techniques emerging in all the fields of mobile and wireless communications. With this rapid development generation mobile systems will be unched within decades. 4G mobile systems focus on seamlessly integrating the existing wireless technologies. This contrasts with 3G, which merely focuses on developing new standards and hardware. 4G systems will support comprehensive and personalized services,providing stable system performance and quality service. "4G" doesn't just define a standard; it describes an environment where radio access methods will be able to interoperate to provide communications sessions that can seamlessly "hand-off" between them. More than any other technology, 4G will have a profound impact on the entire wireless landscape and the total value chain. This paper focuses on the vision of 4G and briefly explains the technologies and features of 4G. A.Vamsi krishna
4G Communications
Abhishek karanam MVGR Abstract Mobile communication is continuously one of the hottest areas that are developing at a booming speed, with advanced techniques emerging in all the fields of mobile and wireless communications. With this rapid development it is expected that fourth generation mobile systems will be launched within decades seamlessly integrating
110
A REAL TIME FACE RECOGNITION SYSTEM USING VLSI L.Divya M.Latha RAGHU ENGG COLG Abstract: A real-time face recognition system can be implemented on an IBM compatible personal computer with a video camera, image digitizer, and custom VLSI image correlator chip. With a single frontal facial image under semi- HARDWARE controlled lighting conditions, the system performs (i) image preprocessing and template extraction, (ii) template correlation with a database of 173 images, and (iii) postprocessing of correlation results to identify the user. System performance issues including image preprocessing, face recognition algorithm, software development, and VLSI hardware implementation are addressed. In particular, the parallel, fully pipelined VLSI image correlator is able to perform 340 Mop/second and achieve a speed up of 20 over optimized assembly code on an 80486/66DX2. The complete system is able to identify a user from a database of 173 images of 34 persons in approximately 2 to 3 seconds. While the recognition performance of the system is difficult to quantify simply, the system achieves a very conservative 88% recognition rate using cross-validation on the moderately varied database. V.S.Bharathi
Abstract
This paper introduces Adaptive System Simulation and Noise Analysis Toolbox (ASSNAT) version 1.1 (v1.1), which is an open source MATLAB based software package for simulation and analysis of Adaptive signal processing systems and noises, with its new feature learning curve method, where we can make an advanced level comparative study based analysis. ASSNAT v1.1 contains a variety of adaptive systems, filter algorithms and a wide range of input signals for simulation for a user friendly graphical interface. Central and advanced features, underlying models and algorithms,
111
CAPSULE CAMERA
B.RAMANAND MVGR COLLEGE OF ENGINEERING ABSTRACT: An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, which is specifically designed for a particular kind of application device. Capsule camera is one of those. Here a technique called capsule endoscopy is used which allows us to see places inside the small bowel where other methods cannot reach. Capsule camera is a camera with the size and shape of a pill. It contains a miniature camera, battery, light, computer chip and wireless transmitter. G.GAYATRI
SYSTEM
G.Santoshkumar
Digital Image Processing generally refers to processing of a two dimensional images by a digital computer. A digital image is an array of real or complex numbers represented by a finite number of bits. Interest in DIP methods stems from two principal application areas: Improvement of practical information for human interpretation and Processing of scene data for autonomous machine perception. The Digital Image Processing is a highly studied research area within signal processing and computer graphics.
112
BIOMETRIC
SOLUTIONS
CH.PRASANANJALI KIET
ABSTRACT Biometrics is the science of measuring and statistically analyzing biological data. In information technology, biometrics refers to the use of a persons biological characteristics for personal identification and authentication. Fingerprint, iris-scan, retinal-scan, voiceprint, signature, handprint and facial features are some of the
113
Global Positioning System N.MOUNICA ABSTRACT GPS (Global Positioning System), a constellation of 24 NAVSTARs (Navigation Satellites for Time and Ranging) in six groups of four owned and operated by the Department Of Defense (DOD), is the first positioning system to offer highly precise location data for any point on the planet, in any weather. Todays GPS receivers are extremely meters. For example Militaryapproved equipment can pinpoint accuracy
P.DIVYA BHARATHI MVGR
designed to permit a wide range of mobile telephone services including voice, data, networking, facsimile, geo location, fax capabilities and paging. Mobile satellite systems (MSS) provide the vehicle for a new generation of wireless telephone services called personal communications satellite systems (PCSS).
114
115
MST RADER
M.RAJESH KUMAR, PITS ENGG COLLEGE ABSTRACT: MSTRADER means Mesosphere-Stratosphere-Troposphere (MST) radar was established at Gadanki near Tirupati as a national facility.MST radar uses the scattering and reflection from variation in radio refractive index of neutral atmosphere, which in turn depends on variability of humidity, temperature and electron density induced by turbulence in the lower and middle atmosphere.We are using two basic
TRACK WHILE SCANNING (TWS) IN RADAR SERVO TRACKING SYSTEMS Y.LAXMI LAVANYA P.ANUSHA
M.V.G.R. COLLEGE OF ENGINEERING, ECE DEPARTMENT ABSTRAC The purpose of a tracking system is to determine the location or direction of a target on a near-continuous basis. An ideal tracking system would maintain contact and constantly update the target's bearing (azimuth), range and elevation. The output of the tracking system can be sent to a fire control system, which stores the information and derives the target'smotion and therefore its future position.
116
SELF-RECONFIGURABLE ROBOTS FOR ADAPTIVE AND RADIO FREGQUENCY IDENTIFICATION B.ANUSHA ANITA RAJA SAGI MVGR COLLEGE OF ENGINEERING An EPC RFID tag used by Wal-Mart. Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID.
SELF-RECONFIGURABLE ROBOTS FOR ADAPTIVE ANDS ENSI NG FOR DANGER AN EFF ECT IVE S OL UT ION F OR TERRORISM AN D OT HER THREATS US ING CORREL AT ED S ENS OR NET WO RKS A.Kamal INTROD UCT ION T O S ENS OR: A s ens or is a t ype of trans ducer . Dir ect -indi cat ing s ens or s, for exa mpl e, a mer cur y t her momet er , ar e huma n-r eadabl e. Ot her s ens ors mus t be pair ed wit h an indi cat or or dis pla y, for ins tance a t her mocoupl e. Most s ens or s ar e el ectr ical or el ectr oni c, alt hough ot her t ypes exist G.B.M.Venkatesh
117
118
SKINPUT:SKIN AS INPUT SURFACE T. V. N. Sai Krishna1, T. Neel Kamal Reddy2, N. Varshney3 Dept. of Electronics & Communication Engineering GITAM INSTITUTE OF TECHNOLOGY
Abstract- Skinput which marries the words skin and input is a technology with specialized sensors that gauge vibrations happening inside of the human body. A tap on the wrist or finger can be read and classified as a certain command and then matched with interactive activities. We collect these signals using a novel array of sensors worn as an armband. This approach provides an always available, naturally portableSMART ANTENNA n
D.Manideep ABSTRACT:
K.Pavan Kumar
One of the most rapidly developing areas of communications is Smart Antenna systems. This paper deals with the principle and working of smart antennas and the elegance of their applications in various fields such a 4G telephony system, best suitability of multi carrier modulations such as OFDMA etc..,
SMART ANTENNA FOR MOBILE COMMUNICATION N.siva Krishna reddy S.S.vamsi Krishna
smart antennas are one of the most hottest topics in mobile communication. The smart antenna technology can significantly improves wireless system performance and economics for a range of potential users. It enable operators of PCs cellular and wireless local loop networks to realize significant increase in signal quality, network capacity and coverage. In truth it is not the antenna that is smart but the antenna system are smart. Firstly we present different types of smart antenna systems and features and benefits of smart antenna systems, next we deal with the basic problem of wireless transmission such as co-channel interference multi path propagation .
119
B.BALA MANOJKUMAR
CH.DILEEP KUMAR
K.V.V.S.S.MEGHANA
On 26 December 2004, a series of devastating waves attacked costlines all around the Indian Ocean, taking the largest toll of any tsunami ever recorded. The surges decimated entire cities and villages, killing more than 2,25,000 people within a matter of hours and leaving atleast a million homeless. We, then, only wished we could mitigate the pain and suffering of those affected.
120
K. sridivya
Technology can be utilized for learning in many ways. The modern way of learning integrates Internet technology. We should provide still more security to the Internet applications and we should improve the standards. For development of Internet in INDIA first of all we should make the people to be aware of this concept. As an Internet application developer we should implement
K.PRATHYUSHA.
L.RAMYASREE.
Abstract:The concept of Zigbee is associated with controlling of all electronic devices and communicating with themselves in the surrounding environment with the help of simply our mobile or PC by using this latest technology .The serious problem of more cables for physical connection among devices which is solved by this wireless technique.
121
T.PRIYAMVADA
R.MONIKA ESWARI
A wireless network consists of nodes that are not connected by cables, but communicate with each other via radio, infra-red or other electromagnetic radiation. Therefore, each node is able to transmit and receive messages through the relevant medium. In addition, most nodes run one or more applications
122
CYBER ATTACKS P.RAMU 08981A0493 ECE DEPT P.HARSHA 08981A0492 ECE DEPT
This paper presents a new method to control and guide mobile robots. In this case, to send different commands we have used electrooculography (EOG) techniques, so that, control is made by means of the ocular position (eye displacement into its orbit). An inverse eye model is developed based in electrooculography and therefore the saccadic eye movements can be detected and know where user is looking. This control technique can be useful in multiple applications, but in this work it is used to guide an autonomous robot (wheelchair) as a system to help to people with severe disabilities. The system consists of a standard electric wheelchair with an on-board computer, sensors and graphical user interface running on a computer.
ABSTRACT: The popularity and evolution of mobile devices like laptops, mobile phones and Personal Digital Assistants (PDA), and the evolution of fast mobile networks in the last decade, have made it possible to increase the complexity of mobile applications and services provided to end-users. It is also a spectacular growth in multimedia communication especially via the World Wide Web. This paper explore some of the current technology of mobile devices, mobile networks and multimedia systems, and is based on the exploration outline some issues for design and development of mobile multimedia systems in 4G Mobile Communication System.
123
SRI SIVANI INSTITUTE OF TECHNOLOGY ABSTRACT: Cryptography's aim is to construct schemes or protocols that can still accomplish certain tasks even in the presence of an adversary. A basic task in cryptography is to enable users to communicate securely over an insecure channel in a way that guarantees their transmissions' privacy and authenticity. Providing privacy and authenticity remains a central goal for cryptographic protocols, but the field has expanded to encompass many others, including e-voting, digital coins, and secure auctions. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data This paper explains what cryptography is about and how we can scientifically justify a cryptographic scheme's security.
M JAGADEESH KUMAR
M GOPI CHAND
St.Anns College of Engineering & Technology ABSTRACT : In the modern day theater of combat, the need to be able to strike at targets that are on the opposite side of the globe has strongly presented itself. This had led to the development of various types of guidedmissiles. These guided missiles are self-guiding weapons intended to maximize damage to the target while minimizing collateral damage. The buzzword in modern day combat is fire and forget.
124
P.Vishnu vandana
Radar is an object-detection system which uses electromagnetic waves specifically radio waves to determine the range, altitude, direction, or speed of both moving and fixed objects such as aircraft, ships, spacecraft, guided missiles, motor vehicles, weather formations, and terrain.
K.SUGUNA
R.SOWMYAVASANTHI
INTRODUCTION: The only treatment available for liver failure is liver transplant surgery; but donor organs are difficult to obtain, and the procedure, which is expensive and complex, is frequently unsuccessfulA workable artificial liver is desperately needed. Unlike the heart and the kidneys, the liver is able to regenerate; many people who have suffered liver damage would survive if they could be supported by an artificial liver until their own livers heal. The device could also save the lives of hepatitis victims, and offer a means of survival for the millions of people whose livers are in failure. And, an artificial liver could support patients awaiting transplant surgery, or waiting for a new donor organ after a transplant has failed
125
BEAMED POWER TRANSMISSION FROM SOLAR POWER SATELLITES K. Tarakesh, Lendi Institute of Engineering and Technology ABSTRACT: The desire of the modern man for more and more amenities and sophistication led to the unscrupulous exploitation of natural treasure. Though nature has provided abundant source of resources. It is not unlimited. Hence the exhaustion of the natural resources is eminent. The only exception to this is sunlight.
126
127
Y.Sowjanya,
N.Harika
ABSTRACT:Brain Fingerprinting is a new computer-based technology to identify the perpetrator of a crime accurately and scientifically by measuring brain-wave responses to crime-relevant words or pictures presented on a computer screen. Brain Fingerprinting has proven 100% accurate in over 120 tests, including tests on FBI agents, tests for a US intelligence agency and for the US Navy, and tests on real-life situations including felony crimes. BRAIN FINGERPRINTING
Abstract:
Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection derives from studies suggesting that persons asked to lie show different patterns of brain activity than they do when being truthful. Issues related to the use of such evidence in courts are discussed. The author concludes that neither approach is currently supported by enough data regarding its accuracy in detecting deception to warrant use in court.
128
G.Prudhvi Vivekananda
A.V.S.N Abhishek
Abstract: Scientists have been studying electrotactile presentation of visual information since the early 1900s, at least. These research setups typically used a camera to set current levels for a matrix of electrodes that spatially corresponded to the camera's light sensors. The person touching the matrix could visually perceive the shape and spatial orientation of the object on which the camera was focused. BrainPort builds on this technology and is arguably more streamlined, controlled and sensitive than the systems thatcame before it
CELL PHONE COMMUNICATION TECHNOLOGIES A.HARIKA SRI SIVANI COLLEGE OF ENGG CHILAKAPALEM A b s t r ac t : T he a b i l i t y t o c o m m u n i c a t e wi t h t h e p e o p l e o n m o v e ha s e x p a n d e d a l ot b y u s i n g C el l p h o n es i n t h e p r es e nt w or l d es p e c i a l l y f o r t h e B u s i n es s M a g n et s & P r of es s i o na l j ob h ol d er s w h o n e e d s t o c o m m u n i c a t e du r i n g j ou r n e y i n c a r s . I ni t i a l l y t h er e w er e o n l y f e w d i s t r i b u t or s & P e op l e w h o r ea l l y n e e d e d M o b i l e C o m mu ni c a t i o n s c a p a b i l i t y i ns t a l l e d r a di o t el ep h o n e s i n t h e i r c a r s . I n t h e r a di o t el ep h o n e s ys t e m, t h er e wa s o n e c e nt r a l a nt e n na t o w er p er c i t y, wi t h a b o u t 2 5 c ha n n e l s . S o t h e p h o n e i n t h e c a r n e e ds a p o w er f u l T r a n s mi t t er b i g e n ou g h t o t r a ns m i t u p t o 5 O k m. o n l y 2 0 0 0 c o n s u m er s c ou l d u s e t h e m, a s t h er e w er e o n l y a f e w c ha n n e l s b u t i n t h e 2 1 s t c e nt ur y c u r r e nt l y t h er e a r e a r ou n d 1 4 0 0 mi l l i o n s u b s c r i b er s i n t h e w or l d. SWETHA
129
INTRODUCTION:
Cognitive Radios are defines as: A radio that can autonomously change its parameters based on interaction with, and possibly learning of, the environment in which it operates. Through appropriate radio resource management, such a cognitive radio should make flexible and efficient use of network/spectrum resources.
CR would consist of Intelligent Sensing hardware and Intelligent Sensing Algorithms. There are two types ofCR being considered:
130
K. UMA
P.UMA
131
Image
processing
Image Processing is the science of enhancing an image in order to increase the image quality and to extract useful information from the image. It is generally used in machine vision applications as part of a data preprocessing step for a pattern recognition system. Image processing algorithms apply point, local, global operations on a digital image depending on the particular purpose, such as edge detection, high frequency noise elimination, contrast stretching. Images can be RGB color, greyscale or binary. There are a lot of professional image editing software (like Photoshop) which use basic or advanced image processing techniques for image enhancement. Another extension of the image processing is image analysis or image understanding which is also called as machine vision. There are a lot of resources, online books, courses on the web for digital image processing.
132
Todays cell phones are a far cry from the devices of 20or even 5years ago. Gone are the days of carrying a separate camera, phone, music player and PDAtodays smart phones incorporate each of these functions into one multipurpose device. As computer technology and multimedia converge in the mobile phone, the industry has witnessed a dramatic change in how consumers view their wireless devices. Todays cell phone is an indispensable tool, bringing users information and entertainment. But as cell phones functionality increases and consumers use them for more than just making and receiving calls, consumers are demanding more from their mobile phones including extended battery life and superior view ability in all environmental conditions in short, an Always-On cell phone. The key to such improvements is the display. Todays liquid-crystal displays (LCDs)
Ch . Swarna K . Dhanya Veena KRISHNAS PRAGATI INSTITUTE OF TECHNOLOGY bstract: The pressures on todays system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Iris recognition, a biometric, provides one of the most secure methods of authentication and identification thanks to the unique characteristics of the iris of a human eye. Once the image of the iris has been captured using a standard camera, the authentication process, involving comparing the current subjects iris with the stored version, is one of the most accurate with very low false
133
K.charan teja,
Today the use of computers is extended to every field. Many sophisticated devices like touch screen, track ball, digitizers etc made interaction with computer ease from novice to professional. But physically disabled individuals are deterred from using computers due to their inability to control mouse. However, if directional discrimination of an icon can be achieved, quadriplegics can take the function of a mouse without the use of hand.
Krishnatejag2002@gmail.com
#
134
We do love our cell phones. And we hate them, too, of coursewhen they drop a call, go dead in the middle of a conversation, or simply fail to work in another country thinking that our handsets cant receive satellite TV broadcasts or last more than a week on a single charge. Though better microelectronics provide higher data rates, lower power consumption, and greater flexibility in the types of communication ,But transistor advances alone will probably not be enough, these incredible shrinking transistors might not do much to eliminate dropped calls. In this respect, the most significant improvements may, in fact, come from what seems a bizarre source: better mechanical components
MST RADER
M.RAJESH KUMAR,
ABSTRACT: MST RADER means Mesosphere-Stratosphere-Troposphere (MST) radar was established at Gadanki near Tirupati as a national facility. MST radar uses the scattering and reflection from variation in radio refractive index of neutral atmosphere, , which in turn depends on variability of humidity, temperature and electron density induced by turbulence in the lower and middle atmosphere.We are using two basic techniques for proper working of mst rader. MST radar is a state-of-the-art instrument capable of providing estimates of atmospheric parameters with very high resolution on a continuous basis, which is essential for the study of different dynamical process in the atmosphere
135
136
137
Technology is making many things easier; I can say that our concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many
more but here is new concept of RED TACTON which makes the human body as a communication network by name ....HAN. NTT LAB from Japan is currently testing & developing this revolutionary technology. Red Tacton is a new Human Area networking technology that uses the surface of the human body as a safe, high-speed network transmission path. Red Tacton uses the minute electric field generated by human body as medium for transmitting the data. The chips that will be embedded in various devices contain transmitter and receiver built to send and accept data in digital format.
138
Avanthi ABSTRACT:-
Institute of Engineering
and
Technology
The importance of robotics has been increasing day by day, as a result we are moving forward with advanced and innovative designs. Our project name is MULTIFEATURED ROBOT. The journey of our model routed by getting the inspiration from the movie WALL E in which a single robot performs multiple tasks. We used this idea as a solution for the problems facing by many students who are using various robots in different competitions. Finally we made a robot which can perform multiple tasks based on the designers requirement.
role of Wireless Communication in Patient Response Time: A Study of Vocera Integration with a Nurse Call System
D.LALITHA
NIROSHA
CH.RUPA
The goal of this paper is to investigate the use and impact of wireless Voice over Internet Protocol (VoIP) communication technology developed by Vocera
communications and used by clinicians and mobile workers in a healthcare setting. Of particular interest for this study was the impact of a newly installed component of the Vocera system, the Vocera Messaging Interface (VMI), which enables connectivity between external systems and the Vocera system via the Vocera Server.
139
Sensotronic Brake Control (SBC) works electronically, and thus faster and more precisely, than a conventional hydraulic braking system. As soon as you press the brake pedal and the sensors identify the driving situation in hand, the computer makes an exact calculation of the brake force necessary and distributes it between the wheels as required. This allows SBC to critically reduce stopping distances. SBC also helps to optimise safety functions such as ESP, ASR, ABS and BAS. SIXTH SENSE TECHNOLOGY Dadi institute of Engineering & Technology
ABSTRACT Sixth Sense is a wearable gestural interface. It was developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT Media Lab. The true power of Sixth Sense lies on its potential to connect the real world with the Digital world. Basically, Sixth Sense is a mini-projector coupled with a camera and a cell phonewhich acts as the computer and your connection to the Cloud, all the information stored on the web. Smart Antenna for Mobile Communication M.Harish#1, CH.V.Siva kumar*2 Abstract Smart antennas are one of the most hottest topics in mobile communication. The smart antenna technology can significantly improves wireless system performance and economics for a range of potential users. It enable operators of PCs cellular and wireless local loop networks to realize significant increase in signal quality, network capacity and coverage. In truth it is not the antenna that is smart but the antenna system are smart. Firstly we present different types of smart antenna systems and features and benefits of smart antenna systems, next we deal with the basic problem of wireless transmission such as co-channel interference multi path propagation , fading and signal to interference ratio. The advantages of smart antennas over `conventional antennas i.e Extension of range increasing capacity, reduced inter channel interference are also presented in this paper. Then we have presented how the smart antennas are useful for TDMA and CDMA technologies. Lastly future developments such as MIMO systems concludes our paper.
140
IMAGE PROCESSING - DEPTH EDGE AND STYLIZED RENDERING USING MULTI-FLASH IMAGING Chaitanya Institute of Engineering & Technology Rajahmundry-533104 , EG Dt
This paper gives a detailed description about MultiFlash Imaging and the algorithm for Depth Detection Using Multi Flash Imaging. This technique finds a major implementation in the fields of medicine and photography. The algorithm needs a minimum of five images to detect depth edges of all orientations. Ambient image taken without flash and four images where the flashes are positioned above, below, left and right of the lens respectively. This algorithm which functions by detecting and exploiting the shadows is a simple efficient method for detecting depth edges and differentiating them from texture edges and is suitable for most scenes and situations.
141
ABSTRACT As the social economic activities grow variously in recent days, an advanced traffic control system corresponding to the changes of road traffic circumstances becomes an u convenience for travelers and commodity distribution are also needed regent matter. And traffic information service or the profit traffic flow information for the traffic signal control which realizes this ITCS And in this working group we started examining a specification of the image sensor UNDER WATER WIRELESS COMMUNICATION Students from kaushik college of engineering. Ch.divya,ECE M.aswini,ECE sravani; ECE. ABSTRACT:Underwater communication has a range of applications including remotely operated vehicle (ROV) and autonomous underwater vehicle (AUV) communication and docking in the offshore industry. Current underwater transmission techniques is primarily utilise sound waves for large distance at lower frequencies and the velocity of sound in water is approximately 1500m/s the resultant communications have problems with multi-path propagation and low bandwidth problems. The use of electromagnetic (EM) techniques underwater has largely been overlooked because of the attenuation due to the conductivity of DESIGN OF ARITHEMETIC AND LOGIC UNIT USING VHDL PRESENTED BY: Anirudh Sai. A D.Praveen name:manikanta
ABSTRACT: Digital System performing computation uses arithmetic and logical units. The design of ALU using HDL is reliable instead of cracking it from the basic gates. Arithmetic and Logic Unit internally consists of Control unit, flags, and registers. Control unit consists of control memory, sequencing logic, registers and decoders.
142
143
K.SARITHA, II YEAR E.C.E, JNTU NO: 09W61A0452 Ph no: 9493343162 E-mail: saritha.kuriti@gmail.com
B.SAI PRASANNA II YEAR E.C.E, JNTU NO: 09W61A0414 Ph no:7569632187 SRI SIVANI COLLEGE OF ENGENEERING CHILAKAPALEM
ABSTRACT : With mobile phones becoming a basic part of life, the recharging of mobile phone batteries has always been a problem. The mobile phones vary in their talk time and battery stand by according to their manufacturer and batteries. All these phones irrespective of their manufacturer and batteries have to be put to recharge after the battery has drained out. The main objective of this current proposal is to make the recharging of the mobile phones independent of their manufacturer and battery make. In this paper a new proposal has been made so as to make the recharging of the mobile phones is done automatically as you talk in your mobile phone! This is done by use of microwaves. The microwave signal is transmitted from the transmitter along with the message signal using special kind of antennas called slotted wave guide antenna at a frequency is 2.45 GHz. There are minimal additions, which have to be made in the mobile handsets, which are the addition of a sensor, a Rectenna, and a filter.
144
Wireless Charging of Mobile Phones using Micro Waves VARUN KUMAR.K 08ME1A0422 III-B.Tech ph. no: 9966996634 Mail: varun0422@gmail.com
The mobile phones becoming a basic part of life, the recharging of mobile phone batteries has always been a problem. Portable electronic devices are very popular nowadays. The mobile phones vary in their talk time and battery stand by according to their manufacturer and batteries. All these phones irrespective of their manufacturer and batteries have to be put to recharge after the battery has additions, which have to be made in the mobile handsets, which are the addition of a sensor, a rectenna and a filter. With the above setup, the need for separate chargers for mobile phones is eliminated and makes charging universal. Thus the more you talk, the mobile phones is eliminated and makes charging universal. Thus the more you talk, the more is your mobile phone charged! With this proposal the manufacturers would be able to remove the talk time and battery stand by from their phone specifications
145
146