Aeronautical Crash Prevention System through RF Communication Project Report

Introduction to Aeronautical Crash Prevention System through RF Communication Project:

Generally if any two vehicles collide on the road, that situation is there then we can avoid that collision because it is in our hand. Then what about flights collision in an air. They don’t what happens in the atmosphere, so chances to flights collision. To avoid this problem in aeronautical sectors we can prevent aeronautical crashes by using RF communication with embedded systems.

Embedded system is used for a specific task with low power supply. It is a combination of both software and hardware. It is mainly used for industrial, aeronautical, automobile, home applications. Now a day wireless communication plays important role in technology, by using this communication we can switch off the lights and entertainment systems to industrial controls through remote monitoring (wireless).

                                    The main aim this project is preventing the aeronautical crashes. Hardware requirements are RF Transmitter (STT-433MHz)/Receiver (STR-433MHz), Microcontroller (AT89C52), Encoder-318, Decoder-318, LCD (16×2 and 20×2), Electromagnetic relays, ULN2803, Buzzer and power supply. Transmitter contains encoder, which takes parallel data from microcontroller as input and gives serial output. Whereas receiver takes serial input and gives parallel output to the microcontroller. Compare to microprocessor microcontroller has three level programmable clocks and low power consumption. This data is processed in receiver and drives the motors in opposite direction. All the status will be displayed in LCD. This unit is placed in flight.

                                   Every aero plane contains both transmitter and receiver; this mechanism will depend on ip address. Transmitter sends the ip address of aero plane to receiver of other. Receiver receives ip address of other aero plane. If any information is there transmitter sends, then the receiver buzzer will glow and produce sound. So there is a chance to crashing aero planes. Then we have to divert the both aero planes to its initial position. So no chance to crash. 

 Download  Aeronautical Crash Prevention System through RF Communication Project Report .

RFID Based Project on Embedded Palm Device for Guiding Applications Using ARM-7 and RFID Techniques

Introduction to RFID Based Project on Embedded Palm Device for Guiding Applications Using ARM-7 and RFID Techniques:

The main objective of this paper is to develop a embedded palm device. In our modern life ,we expect the devices which are intelligent and can satisfy our needs. We need the devices which makes our work simple and faster. When the visitor visited the museum previously the information about the exhibit is given through conventional audio cassette system, in this system there are many problems  and this focused them to develop a guide system for museum  by using personal digital assistants (PDAs) .

This can automatically retrieve all the information about the exhibit which the visitor is looking at. Hence user doesn’t require to search for the information about the exhibit every time.

Brief into design and working of Embedded Palm device:

This embedded palm devices consists of LCD, Arm processor, RFID Reader, Keypad, Flash Memory and audio amplifier circuit. RFID readers use radio frequencies for transmitting data attached to a tag. These are used for automatic identification and tracking purposes. Keypad helps the user to communicate with the device.

Flash memory is used to store the information about the exhibit. Here also the heart of the project is arm processor. The arm-7 processor is used. These processors makes use of von-neuman architecture and is specially designed for devices which use low power. Digital to analog converter is prebuilt in it. Audio amplifier circuit is used to play the files which are stored in flash memory through processor. LCD displays the information about the exhibit. 

Download  RFID Based Project on Embedded Palm Device for Guiding Applications Using ARM-7 and RFID Techniques .

Detection of Malaria Parasite Infected Blood Images ECE Project

Introduction to Detection of Malaria Parasite Infected Blood Images Project:

The effected red blood corpuscles will have a different shape when infected by a malarial parasite. These can detect by using 3D analysis which can improve the diagnosis of the disease. In this paper we will see how 3D analysis is conducted for detected the infected red blood corpuscles. A 3D statistical approach is used for examining the curved structure of the cells and then 3D moments of the curved surface are calculated.

Brief into 3D analysis:

 A statistical analysis is used which diagnoses the 3D moments of the blood samples and compares the infected and the normal red blood corpuscles. The red blood and white blood corpuscles can be easily differentiated as they differ in size and structure. To make a shape analysis of the blood moments we use probability theory.

The region moments of the blood cells represent a normalized grey level image to which the 3D statistical applied. By using this algorithm we can analyze the degree of infection and by further digital analysis we can know the presence of plasmodium in the blood cell. When compared to manual analysis the digital process takes less time foe performing the analysis.

Advantages of using 3D analysis:

There are various chemical processes for detecting the extent of the parasite in the blood but the 3D analysis can give better and efficient results. By using 3D analysis we can make a better diagnosis of the disease. The time taken for performing the test is very less and it is a low cost available method.

  Download  Detection of Malaria Parasite Infected Blood Images ECE Project.

ECE Project Report on IP over SONET

Introduction to IP over SONET:

IP over SONET technology is deployed in IP backbone networks to provide efficient, cost-effective, high-speed transport fast routers. SONET is an ANSI standard which provides rates, formats and optical parameter specifications for optical interfaces ranging from 51 Mb/s to 9.8 Gb/s capacities. SONET provide: Highly survivable/reliable networking because of standardized switching architecture, multivendor inter networking  interoperability standards, and well-thought-out and standardized transport operations and maintenance capabilities. SONET   multiplexing combines low speed digital signals with required overhead to form Synchronous Transport Signal Level One (STS-1).

SONET was providing huge bandwidth, but there was not enough IP traffic to make use of it. Bandwidth can be used fully by mapping IP traffic into higher volume of ATM traffic before transporting it via SONET. ATM is a packet switched technology which can handle both variable-rate traffic and fixed-rate traffic. ATM is based on transmitting all information in small fixed- size packets i.e., 53-bytes long called cells.  ATM is not the most efficient way to transport IP traffic and future demands for bandwidth cannot be met, because it has too much overhead. For this reason users prefer to use ATM when sending audio, video, voice and other IP data types requiring quality of service. So, IP over SONET can carry all types of traffic and is ideal for data-only networks, because it does not use ATM. Thus eliminates a layer of network stack and has lower overhead. All these considerations has become much more important to carriers as volume of IP traffic has increased and ISPs and large corporate users have begun sending IP directly over SONET as fast, cost-effective, reliable, fault tolerant, and easily configurable alternative. 

SONET has following features:

  1. Network management
  2. Protection
  3. Bandwidth Management
  4. Network Simplification
  5. Mid-fiber meet

The problem with IP over SONET is, it uses entire link between the routers, and no other traffic could be multiplexed with the IP packets. Network provider goal is to provide IP transport solutions with low-cost and value- added services: QOS control, guaranteed service availability, and dynamic bandwidth allocation. Since the nature of data being transported over networks change, the demand for IP over SONET is increasing. Because of this increasing demand, network carriers are looking for efficiency and speed that IP over SONET offers. So IP has become dominant internetworking protocol.  Many carriers already have SONET in their network infrastructures, so adopting IP over SONET is a cost effective for them. 

Download  ECE Project Report on IP over SONET .

ECE Project Report on Autonomous Robots

Introduction to Autonomous Robots ECE Project:

Autonomous is the word which clearly tells that it works on its own without any guidance. Autonomous Robots are those which work independently without any particular tasks or any kind of human guidance. Most of the robots works with some extent of autonomy and these are of various kinds some robots can be of autonomy to some extent and some completely.

The strength and the extent of autonomy is based on the work or task that the robot has to be done for example if a robot has to clean a floor or lawn it some one kind of autonomy and the robots which work in space has one kind of autonomy all these are based on the place in which they work. For any kind of robot the exact work and the kind of work and the place in which it has to work must be determined before as this can be unpredictable.

The most important thing in the research of robotics is they have to enable based on the environment it has work as working on the land and in space has many variations. A complete independent robot has a capability of gathering information regarding the environment and also has the capability of working without human intervention for longer period and also can move its parts or some parts without human guidance.

The autonomous robots are designed in a way that they can avoid situations which are harmful to itself or others. The autonomous robots gains novel abilities such as adjusting the strategies based on the surrounding situation and also for completing its tasks. This paper deals with the autonomous foraging which is an apprehension among the social anthropology, human behavioral ecology and also the robotics artificial life and intelligence.     

Download  ECE Project Report on Autonomous Robots .

SMS through Temperature Monitoring Project Abstract

Introduction to SMS through Temperature Monitoring Project:

Now days the technology is growing at very fast rate. Scientists are developing many technical things such as sensors, which developing at very fast rate in the world. The waste development in sensors will go to bring a revolutionary impact around the world. Now a day’s technology has became a part of human life. After few all works of human being will be done by machines which will sensors in them which will sense the need of human being. Today various types of sensors are present in the world which can be classified as wired and wireless sensors. Wired sensors use wire for connection and the other i.e wireless doesn’t uses wire for connection.

            The wired sensors read the information from the system and stores there values in some storage device. The presence of internet all around the world makes the sensor possible to transfer the values fro source location to the destination but there still some places in the world which lacks internet access. In research on present eco system, it has found that the buildings are too far from each other so it takes a long hour to transfer.

If the distance is more than the sensors values which are available in it, going to be reduce the needed values. Due to the increase in the cell phone service, the use of short message service (SMS) is also increased. Users transfer the data by using this service that is SMS from a remote location very easily.

This data can be transferred to the sever which make the data easily accessible from person who have access to the internet from a computer anywhere and at anytime. It generally uses GSM modem which is connected to microcontroller which has temperature sensor and connected to LCD.

 Download  SMS through Temperature Monitoring Project Abstract .

Latest ECE Seminar Topic on Smart Card for Network Security

Introduction to Seminar Topic on Smart Card for Network Security:

Network technology means preventing the misuse of computer by providing some security. Now a days it is not very difficult to hack any website or our personal ID. To prevent such hackers we must be careful while providing security to our personal ID. We must use hard and long password with too many combinations of alphabets and small letters and capital letters. We must change it regularly and avoid setting any name as password as they are very easy to detect.

We should use the cryptography technique for providing security to our text. It is a technique that converts our text in to the unreadable text for any outsider.

Smart card looks like a simple card but it consist of embedded microprocessor under the gold pad. It also has the identification of the user. This 8 bit microprocessor has three types of memory for different purpose like: ROM, non-static RAM and EEPROM. Their cards are made of silicon chip which cannot be bend. This smart card consists of key stored with the help of cryptography technique.

Attacks:The key is stored in the EEPROM of the microprocessor so it can be erased with small voltage drop across the microcontroller of the card. Because of these reasons some security sensors are used that create alarm in such conditions. They are called logical attacks.If we cut the chip from the card with the help of knife then we dip into the nitric acid until the silicon surface is visible. Then it can also be attacked directly or exposing the EEPROM in the UV light and so on. These types of attack are physical attack.

Now the ATM magnetic cards are being replaced by smart card for greater security as they can store the information of any person also.

 Download  Latest ECE Seminar Topic on Smart Card for Network Security.

Implement and Design a Sigma – Delta based ADC for GSM Receiver

MSc Mobile Communications 

Research Dissertation Proposal Form 

Discuss briefly the scope of the research: 

In recent years , the bandwidth for wireless  communication standards keeps on increasing from 1st  generation 1G which is first introduced in 1980’s and had only 200khz signal  bandwidth  to wireless local  area network(WLAN)  and worldwide interoperability microwave access  ( WIMAX)  in recent years , which has 20 MHz  signal bandwidth . Increasing the signal bandwidth allows for faster data transmitting and receiving rate. Meanwhile, it also increases the difficulty of designing the Analogue to Digital converters inside a transceiver.

                 As in this research we Implement and design a sigma – delta based analogue to digital converter for GSM receiver. Sigma – Delta ADC architecture has been preferred for wireless receivers in handheld devices 

Comment on how you might evaluate your own the research goals:  

        We compare the performances of first order      ∑  ∆  modulator, second order ∑  ∆  and third order ∑  ∆  modulators  . When multiple first-order ∑  ∆ loops are cascaded to obtain higher order modulators, the signal that is passed to the successive loop is the error term from the current loop. There will be some error difference between the integrator output and the quantization output. Essentially, the noise shaping function in a ∑  ∆  modulator is the inverse of the transfer function of the filter in the forward path of the modulator.

Concise outline of the Research Methodology you plan to use: 

1)    Design a sigma – delta analogue to digital converter 

2)  Design a GSM receiver 

3)  Simulation and results in two ways           

  • plot for single sine wave
  • plot for GSM  signal

Discuss briefly any equipment you might require, or any data sets with which to commence expedition of the research project: 

I will design the circuits in matlab and execute them in matlab itself, so there is no need of any other equipment 

What knowledge and skills do you have that will be most relevant here? 

We need good skills of Matlab and we should have a thorough knowledge on digital signal processing and communication systems  

Schedule for plan of research and estimated hours: 

  • Understanding on  working principle of Nyquist rate ,oversampling and ∑  ∆ ADC’s 
  • Study of ∑  ∆ ADC in terms of  Bandwidth , Dynamic range oversampling ratio 
  • ∑  ∆ ADC modulators and it advantages 
  • Study and design a GSM receiver and quantify its Dynamic range requires  for the ∑  ∆ ADC 
  • Developing a design of the proposed ∑  ∆ ADC 
  • Simulation and Results 

Increasing Efficiencyin Wireless Network MSc Project Dissertation Proposal

In general routing of data across large number of nodes and routers is a tedious task in a real time wireless networks like MANET’s. To transmit the data across the networks with in the available bandwidhth is most costly issue and consumes many routers and thus the efficiency of the networks is dropped down a lot and to get rid of this situation a new system is being developed, such that is divides the available network resources and bandwidht and thus increasing the effeiciency of the  wireless networks.

A bandwidth routing protocol is proposed in this project for the support of Quality-of-Service (QOS) in a mobile network. In mobile networks, the QOS routing feature is significant for interconnecting wired networks (for instance, internet, ATM etc). Also, in an individual multichip mobile network, QOS routing protocol can work for real-time applications

Bandwidth allocation and end-to-end bandwidth calculation are included in the QOS routing protocol. By using such a routing protocol, the bandwidth is informed to the source and QOS will be available to the mobile network destination.

The proceed with this project, both the qualitative and quantitative methods are used. Effeciency of the wireless networks are measured and increased with the help of qualitative approach and the resultant data is analysed by quantitative methods.

Software Requirements:

Front-end tool: JAVA 1.4

MS ACCESS Data base

Basic Viva Questions and Answers for this project

1. Can you explain what kind of efficiency in wireless network you are talking about, and what kind of wireless network (there are so many: WLAN, MANET, WPAN, WiMAX, WCDMA, are you talking about all of them?)

We are using MANET as the wireless networks.

2. How would you plan to increase such efficiency (if you can explain the 1st question)?

Drawing nodes in a particular network is the main objective of this project. The nodes can be added, deleted, the weight of the node can be changed, and the node can also be removed by making the node weight zero. The best path can also be identified for the designed network and thus the efficiency can be increased. By changing the weight of the node to zero, best path to the designated network can be found.

3. In the problem statement you talked about simulation, what kind of simulation software/package are you referring to?

A typical network is considered and typical nodes are simulated with the help of java software with the help of java.net API and all the routers are simulated here.

4. You also mentioned qualitative and quantitative methods in anticipated artefact. Can you explain what these methods are? Are you going to analyze by theoretical formula / equations?

Qualitative and quantitative methods are used to measure the bandwidth and its calculation using few networking equations. Different networking models are considered here and the transmission requirements are analyzed and below is a sample equation being used

5. Based on question 3 and 4, I do not understand in your project are you going to do simulation or just theoretical analysis, or both? And how will you do that?

In this project, I am doing both practical simulation and also theoretical analysis.

6. In anticipated resource requirement, you mentioned JAVA and ACCESS database, I do not understand how will you use such two software to do analysis / simulation. Can you explain this?

In java, I am going to use java.net package to simulate the nodes and routers and ACCESS database is used to store all the possible routing information and routing tables and a typical JDBC package is used to access the database. 

Network Traffic Routing and its performance over different topologies

ABSTRACT 

       Routing can be considered as the process of selecting the best and cost effective path in the entire network to send the packets to desired designation across the network. Routing can be in different forms like routing through Telephone network, routing though internet and routing through transport networking. Irrespective of the routing methodology used, in general there would be a considerable amount of Network traffic while performing the routing operations.

There would be no guarantee that the packets send across the network are delivered exactly to the designated recipient. There should be some measures to check the efficiency of the delivery mechanisms used to deliver the packets across the network. There are many topology’s available to deliver the packets and many methodologies to measure the efficiency factor. In general there are four types of topology’s and they are as below

  1. Star topology
  2. Ring topology
  3. Bus topology
  4. Mess topology 

       A perfect routing algorithm is always required to check the efficiency of packet delivery by implementing any of the above specified topology. There were many routing algorithms and few of them are listed below. 

  • Flooding
  • Hot-Potato
  • Source Routing
  • Distance Vector (Bellman-Ford)
  • RIP (Routing Information Protocol)
  • Link state 

       By proper execution of these algorithms, a best topology can be selected to deliver the packets across the selected network and can make sure that routing is done in an efficient manner. This entire review is on routing protocol 

INTRODUCTION 

       There were many topology’s available to route the packets across the network. Best routing algorithms should be used to select the best topology for efficient routing. These algorithms are used to test the efficiency of methodologies implemented to route the packets. Nodes to node delivery of packets involve lot of network traffic and the algorithm should always find the best and cost effective solution to route the designated packets. This application deal with all the issues discussed and below is few aspects of the project. 

Research Problem

PROJECT PURPOSE 

       The main purpose of the project is to identify the best topology by using the available routing algorithms and also select the shortest possible route to deliver the packets.   

PROJECT SCOPE 

       The entire of scope of the project resides in explaining the technical aspects of routing. These aspects include detailed explanation of different routing algorithms. Packet safety is also ensured by selecting the best network path, which can be a single or multiple path. 

PROJECT OUTLINE 

       Outline of the project is to make sure that the packets are routed safely across the network, with out any loss or damage with the shortest possible path.      

PROBLEM DEFINITION 

To build an application, that selects the best topology and shortest path to deliver the packets from client to server and server to client.  

REQUIREMENT SPECIFICATION 

EXISTING SYSTEM AND PROBLEMS        

       Many of the routing techniques just ensure the deliver of packet and neglects many of the critical aspects like, selecting the shortest path to route the packets, proper and safe delivery which ensure that the packets are delivered with out any loss or damage. 

PROPOSED SYSTEM 

       A special care is taken in the proposed system, where the broken or damaged packets are taken care. Proposed system selects the best topology and route to deliver the packets. Shortest path routing algorithms are implemented for safe delivery of packets to the desired designation across the network. Efficiency metrics are followed at each node across the network and proper communication channel is established between the client and server. 

MODULES

1) Client

2) Server

3) Router

Routing