Electrical Presentation PPT on Construction And Use Of Broadband Transformers

Introduction to Construction And Use Of Broadband Transformers Seminar Topic:

Privacy infringement long with security issues can reflected as a serious problem for many applications of RFID systems which is also known as radio frequency identification. Most of these problems occurred because of the lack of user control between the readers and the RFID tags. If the user is given the RFID link can eradicate the problems of security. A smart card system can obstruct the unauthorized payment of the credit card or unwanted identification theft which can be released by a simple integration of the electrical touch switch with a 14443 smart card.

When the users touch the switch the smart card will get activated. The capacitor impedance changes with a finger touch of the user. In the application of public transport, e-passports, admission cards and circuit cards the radio frequency identification system is used. The deployment of this system exacerbates the need to get the most ideal method of obstructing the unwanted disclosure of details that is stored in the chip of RFID.

There is no mechanism of the smart cards for obstructing a third party from inserting a reader within the zone of interrogation of the card system to steal information that are stored in the card. Hardware designs and authenticated protocol systems have been recently proposed by experts for the purpose of security.  Hash-locks, tree-walking, re-encryption are some of the cryptographic hardware that has been present. Faraday cage is the other type of security measure. The hardware used in the RFID can be changed by the shield tags.

A smart card system is investigated by us and it can be controlled by the users with a simple touch of fingers. It also comes with integrated switches that helps in providing high level security and protection of privacy. The simple manufacturing process helps in meeting the needs of additional processes in the stage of mass production.

Download Electrical Presentation PPT on Construction And Use Of Broadband Transformers  .

Seminar Report on Bluetooth Technology with PPT

It can easily replace the need of cables that is used to connect both the devices of communication. Bluetooth used a single radio link over a short range. The laptop can replace the cable that is used today and the availability of Bluetooth radio technology that is built in both the mobile phones. This enables to connect the mobile with the laptop with any need of cables. The Bluetooth radio technology provides a bridge to the data networks.

At the same time it also provides a mechanism and a peripheral interface to create a small ad hoc group that connects devices that are away from the fixed infrastructures. The document on Bluetooth technology provides a brief definition about the usage models and it also explains the optimization of Bluetooth architecture. The security implementation is also described in this document. It also focuses on the applicants as well as the future developments as well as the positioning of the Bluetooth in relation to other standards of wireless technology.

The Bluetooth technology was launched back in the year 1994 and it was a real surprise for the portable lifestyle. It was designed to provide a interconnection without using any kind of wires between mobile phones and their peripherals. It also provides a great solution for the cable free connections of computers which gives a real freedom in the environment of working despite of the availability of wire and location.

Bluetooth connection allows portable notebook, computers, personal digital assistant, mobiles and other gadgets hat make use of short range and low power technology to connect with each other. The transfer rate of Bluetooth is 400 KBPS and it operates in the frequency band of 2.4 GHz which is almost similar to the cordless phones and wireless LAN technology. At the same time it supports computer connection of 10-m at a speed of 1 MBPS.

Download Seminar Report on Bluetooth Technology with PPT .

Text Segmentation for MRC Document Compression ECE Matlab Project

For the document compression a particular framework known as the mixed raster content or MRC in short. This can improve the quality trade off in comparison to the lossy algorithm that are traditionally used for compression. The separation of the document into the background and foreground is made possible only with the help of the MRC compression. This represents the binary mask. The ratio of compression and the resulting quality of the encoder document based on MMRC is dependent upon the algorithm that is used for the computation of the binary mask.

In order to enhance the accuracy of the text,  multi scale framework is used with various sizes. Computers, printers, copiers, scanners are some of the networked equipment’s that are used widely and with time it has become more necessary to efficiently store, transfer and compress large files and documents.

As per the previous works the texts, images etc. were not compressed or stored as it lead to loss of data. It can even scan a colored document at 300 dpi which approximately need 24 Mbytes of storage capacity without any need for compression. The tools that are used frequently for compression of natural images are JPEG2000 and JPEG. For raster documents that are formed of scanned compound are not really every effective and typically it consist of graphics texts and images. This is only due to the DCT that is fixed or transformation of wavelet for all typical contents thus resulting in ringing distortion near line –art and edges.

Some of the disadvantages are :

The text detection accuracy is quite low

The compressed data will be lost along with the storage details while transmitting the information’s.

Document files of large sizes cannot be transferred

The Otsu’s method as the most simple and traditional approach in our proposed system. Its divide the histograms into two different parts.

Final Year ECE Seminar Topic on Application of Swarm Robots with Full Report

Introduction to Seminar Topic on Application of Swarm Robots:

This paper shows a prologue to the universe of swarm robots and adumbrates its requisitions. Swarm robotics is right now without a doubt the most imperative provision ranges for swarm insights. The specialist has an essential thought of advancing swarm robots for the security reason. The aforementioned robots can spy in any locale without any block of spotting it shape. Swarms furnish the conceivability of improved job exhibition, heightened reliability (blame tolerance), easy unit many-sided quality and diminished cost over conventional robotic frameworks.

They can achieve certain assignments that could be implausible for a lone robot to actualize. Swarm robots might be connected with a large number of fields, for example adaptable assembling frameworks, shuttle, Inspection/maintenance, development, horticulture, and pharmaceutical work.

Swarm-bots are a gathering of portable robots fit to self-amass and to self-compose to tackle situations that lack the capacity to be explained by a solitary robot. The proposed robots consolidate the force of swarm knowledge with the adaptability of self-reconfiguration as total swarm-bots can rapidly update their structure to match natural shifts. Swarm robots are more than unequivocally arrangements of autonomous executors; they are plausibly reconfigurable systems of imparting executors fit for of composed sensing and collaboration with nature. Robots are determined to be a critical part of the fate.

In the close destiny, it might be plausible to prepare and convey imposing various cheap, disposable, meso-scale robots. Admitting that confined in single ability, such robots conveyed in vast numbers can speak for a unyielding total drive comparable to a state of ground dwelling insects or swarm of killer bees

This boid model appears sensible depending on if we acknowledge it from a different outlook, that of it acting as per magnetism and aversion between neighbors in a group. The repugnance association outcomes in the shirking of impacts and magnetism makes the group keep shape, i.e., replicating developments of neighbors might be viewed as a sort of pull. The middle control plays a function in both pull and aversion. The swarm conduct of the recreated run is the consequence of the thick collaboration of the moderately effortless conducts of the unique bids.

Download Final Year ECE Seminar Topic on Application of Swarm Robots with Full Report .

Study of Synthesis Tools Using Half Adder and Full Adder

Synthesis is a mechanical system for changing over a higher level reflection to an easier level reflection. The synthesis devices undercover enlist transfer level (RTL) portrayal to entryway level net posts. These entryway level net posts comprise of interconnected door level macro cells. These entryway level net posts as of now might be enhanced for region, speed and whatnot.

The dissected objective is synthesized to library of parts, regularly entryways, hooks, or flip flounders. Progressive plans are synthesized in lowest part up style that is more level segments are synthesized before higher level segments. Once the outline is synthesized we have a door level net catalogue. This door level net record might be recreated. Defer for the unique parts are ready as a component of the portrayal of the segment libraries. Timing exact recreation is not conceivable right now for the reason that the genuine timing qualities are dead set by the physical situation of the plan with the FPGA chip. Yet, the useful reproduction that is conceivable right now is a significant spot more correct than recreation dependent upon user specified postpones.

Additionally regarded as Electronic System Level Synthesis and C Synthesis, High Level Synthesis is a robotized plan strategy that changes over the algorithmic depiction of a framework into the comparing fittings circuit. In this course of action, which is genuinely a part of heightened level plan rush, the framework conduct is portrayed at an absolutely elevated level of deliberation. This system enhances the benefit and decreases the shot of blunder.

Synopsys presented Behavioral Compiler, the original behavioral synthesis instrument, in 1994. Verilog was utilized as the info dialect. 10 years later, diverse cutting edge High Level Synthesis (HLS) instruments were presented in the business sector. The aforementioned devices offered circuit synthesis, depicted in elevated level dialect and Register Transfer Level. Producers of the aforementioned devices furnished broad PC underpin for broad extend of device issues. Equipment plan may be advanced at different levels of deliberation. The most regular reflection levels are Algorithmic Level, Register Transfer Level and Gate Level.

Embedded Systems B.tech Final Year Seminar Topic on Smart Phones with Report

A system of architecture is present with us in this paper that allows user interaction with the systems that are embedded. They act within the proximity with the help of smart phones. Four interaction models have been identified by us between the surrounding environments and smart phones. Dual connectivity, gateway connectivity universal remote control and peer-to-peer are the four connections and although each of them are completely different from the other but our framework is unique for all.

The communication of hybrid has been just central to our architecture system and it has the capabilities to incorporate the use of smart phones. Short range wireless connectivity are the special and unique features of this connectivity like Bluetooth and internet connection. All these are possible only in a single handset. Along with high processing power these features can change a smart phone into a simple mobile device that can be easily carried by people. 

In this paper we have discussed about converting the smart into a simple mobile device so that it can easily fit inside a pocket thus making it easy for people to carry it with them wherever they go. Usually Smartphones can be used as personal server as well as a personal assistant. The former one helps in storing and downloading of data as per the needs of the users whereas the later one helps in remote interaction along with the systems that are embedded and located in the near proximity of the user’s.

For achieving this goal we have presented a system architecture for various models. In the central position of the universal integration architecture there is a dual connectivity system of smart phones that allows them to communicate with the close environments with the use of short-range networking of wireless connections. This is one of the best proposed system that will increase the smart phone usage.

 Download Embedded Systems B.tech Final Year Seminar Topic on Smart Phones with Report.

ECE Technical Seminar Topic on Serial Communication of Devices with Report

The communication is termed as synchronous when a character or byte is received at constant intervals of time with a regular gap in the phases. Data that are formed are sent in a tine internal of a maximum time and this time also varies in time. In certain special cases it is known as ISO-synchronous. Again, asynchronous commission signifies those bytes that are received at various intervals of times. Voice data and telephone line are the examples of asynchronous mode.

Internal devices are available in micro controllers like SCI, SPI and SI. Separate status, registers for controlling purposes are available for each device and so that they can transmit and receive serial and data bits. Moreover, each of the devices is programmable and can be used in IO mode programs as well as in interrupted driven transmission.

The synchronous peripheral interface port has the feature of full duplex for the purpose of synchronous communication. For MOSI, MISO output and SCLK there are signals. In clock bits there is is a programmable rate with SPI feature. It also helps in the programming of positive and negative edges with a bits interval in the serial data in and out. It can also be programmed for the selection of device for slave and master.

The serial interface port is also known as a USART port and programmable rate registers are a one of its most important features. SI works in the mode of half duplex synchronous call mode0 and the full asynchronous mode is termed as mode 1 mode 3 or mode 2.

Serial connect interface port is also a UART asynchronous port mode and communication is made in the full mode of duplex for the transmission and receiver of SCI. The band arts for SCI baud are fixed and the receiver of SCI comes with a wake up character which can be programmable using RWU or Receiver Wake Up Unavailable bits.

Download ECE Technical Seminar Topic on Serial Communication of Devices with Report.

PIC Microcontroller Features

The base of the project is the Peripheral Interface Controller Microcontroller. The PIC 16F877A is applied in the project. The project is a simple oriented 8 bit microprocessor used which is applicable and known for the good performance and consumes less power. The information of the processing is invisible in the product. The Microcontrollers are important part in the processor system.  

The Micro controller is being used in the Weather forecasting station. The Microcontroller is the one electronic chip posses the CPU, I/Ports, RAM, ROM, the timers and the COM ports. The importance can be observed in the low place to occupy and the low power consumption. The PIC is the advanced chip in the microchips designing.  The name PIC is given by the Microchip Technology Inc. USA. The chip is very famous in the embedded systems that has been won in 20000 chip designs. The PIC chip used in this project is a microcontroller that is developed on the CMOS Technology. The difference between the Microcontroller and Microprocessor are the Microcontroller needs peripheral devices like the RAM, ROM all included in it.

The important features of the Microcontroller

  1. Efficient performance RISC  CPU.
  2. It has only 35 words to give the instruction.
  3. The instructions are only a single run and for the program codes are two run.
  4. The operating speed is DC- 20 MHz clock input.
  5. The DC- 200 ns instruction run.
  6. The maximum of 8K * 14 words FLASH Program Memory.
  7. The maximum of 368*8 bytes of RAM.
  8. The port is compatible for other 40 pin PIC 16F877.
  9.  The interrupt ability to maximum 14 sources.
  10. The eight stages hardware stack.
  11. The direct, indirect and relative processing modes.
  12. The programmable code threat free.
  13. The selectable oscillator modes.
  14. The low power and high performance CMOS FLASH/ EEPROM Technology.
  15. The in-circuit Serial Programming (ICSP) by two pins.
  16. The in-circuit debugging by two pins.
  17. Low Power need. 

Technical Seminar Topic for ECE Students on Renewable Sources of Energy with Report

Introduction to Technical Seminar Topic on Renewable Sources of Energy:

The main objective of this paper is to educate the people about the use of fuel cells in the production of energy through renewable sources. Due to rapid extinction of the present available energy sources we need to find an alternate way for the energy so the ultimate option for the replacement of non renewable resources are the sustainable energy sources comes from the nature, due to its abundance in nature and cleaner than the fossil fuel are to be utilized properly, the major advantage is these energy sources are replenished by the nature constantly with in shorter span of time.

The various forms of renewable energy are hydro energy, wind energy, solar energy, bio mass energy, tidal energy, geothermal energy, wave energy, bio fuel. So far solar energy is earth most reliable and highly available energy source so we need to convert the conventional solar energy into electricity by using fuel cells.

These conversion plants are known as photo voltaic plants i.e. PV plants. These fuel cells are one kind of electric cell which converts the hydrogen or hydrogen based fuels into electrical energy directly, these fuel cells uses hydrogen as their input fuel, the entire electro chemical reaction is clearly explained in the coming sections, now a day’s these fuel cells are intensively used in commercial applications, and these cells created a new dimension in the production of a neat and clean electrical energy.

 In this paper we presented a brief summary about the origin, chemical composition, advantages and challenges facing by these fuel cells in recent days. These cells are gaining reputation in residential power production and they can be used as portable power suppliers. These are highly reliable and most effective devices. And finally in order meet the increasing demand on electricity these fuel cells are the primary choice for the generation authorities.

Interfacing the Serial / RS232 Port ECE Lab Reference Material

The parallel port is easier to interface in comparison to the serial port and in most of the cases any device that you connect to the serial port it will need to undergo serial transmission. Under this transmission system the serial port is converted back to the port of the parallel system and it can make work easier. The UART is the only process to accomplish this. According to the software side there are various users on a standard parallel port that you need to attain.

Do you know the advantages of using the method of serial data transfer instead of parallel one?

Usually parallel cable is shorter than serial cables. The serial port transmits 1 at -3 to -25 volts and 0 at +3 to +25 volts. On the other hand, parallel port transmits 1 as 5v and 0 as 0v. Therefore 50v is the maximum amount of swing that is possible by a serial port and in comparison to the parallel port it is 45 times more. There the problem of cable loss is not much in serial port as they are in parallel port.

As in case of parallel transmission, serial port installation does not require much wires. If also you learn to mount it at a far away distance from the computer then you can use the null modem configuration that is going to cost much less than the original wiring. This configuration usually requires 3 core cable and it is cheaper than using 25 or 19 core cable wires. The cost of interfacing at both the ends must be taken into consideration.

Recently, the use of microcontrollers has proven to be very useful and most of these are built in SCI future. This can be used to communicate with the outside world. On the other hand, serial communication reduces the count of pin of these MPU’s. Two pins are used commonly that includes receive data and transmit data.

Download Interfacing the Serial / RS232 Port ECE Lab Reference Material.