Code Division Multiple Access Seminar Topic for ECE With Report

Introduction to Code Division Multiple Access Seminar Topic:

With the daily activities the need of mobile phones is increasing rapidly. With the increasing number of users to accommodate the efficient use of broadband is becoming the most important priority among the mobile phone systems. CODE DIVISION MULTIPLE ACCESS SYSTEM is one of the most excellent solution.

For implementation of a communication system that has multiple accessing options CDMA is one of the most important methods. The technique of multiple choices includes many local stations or subscribers who can share the uses of a communication channel. A channel is a part of the limited radio resource that is allocated temporarily for specific purposes like a phone call. The method of multiple access is a description of hoe the spectrum is segregated into various channels and how they allocate it to the users of the system. As there are many users who are transmitting over the single channel therefore a method is must to be established so that individual user will not able to disrupt each other. There are three procedures for performing this: 

FREQUENCY DIVISION MULTIPLE ACCESS                           

The bandwidth available is divided into non overlapping bands of frequency in this technique. Further these sub bands are allocated to users on the basis of time. 

TIME DIVISION MULTIPLE ACCESS

Here each of the users is allocated with spectral occupancy but only for a short period of time and this is known as a time slot. Buffers zones are inserted in between the slots of assigned time in the guard time format. This helps to reduce user interface. This technique also has some of the drawbacks of its own. 

CODE DIVISION MULTIPLE ACCESS

In this technique the limitations of the above techniques are overcome and here the the users spread across the time and frequency in the same channel. This is a combination of TDM and FDMA.

Download Code Division Multiple Access Seminar Topic for ECE With Report. 

EC Technical Seminar Presentation Topic on Relativistic Chips The Spintronics Theory

Introduction to EC Technical Seminar Presentation Topic on Relativistic Chips The Spintronics Theory:

BRAIN is one of the most ultimate biological machines and no kind of microprocessor in the entire world can challenge its functions. Of the current IC technology energy and heat are the main constraints. The law of Moores is the ideal for it and relativity can be the answer. The world’s fastest computer is not very faster but the presence of electrons make them do so. 

The relativity theory is proposed by sir Einstein and the existing theory suggests a latest design for the microchips than usually based on the electron spins. The relativistic effects are minuscule but unless the acceleration of the objects takes place in an important fraction of c, that is 300 million meters per second.

Higher end chips are not so much faster like that of the speed of light but the electrons that are present inside them do so. The short form of spin electronics is spontaneous and it studies about the spin of electrons in various materials for better understanding of its behavior with the developers hope for a new generation of electronic systems.

A spinning sphere is known as electron and it is full of charge and has the property of quantum known as spin which makes its manner similar to the twirling of management on its axis, connecting both the poles that is north and south pole. Spheres or electrons can include spins that are oriented in several directions. Like the compass needle the magnetic field also makes ans electronic swivel and the spin axis also processes like that of a wobbling top.  The electrons do not process and the spin orientation anymore after the removal of the magnetic field. A new high technology world of spintronic devices has opened to us as a completely new world and some of the devices include spintronic sola cells

Ram

Transpinnors

Relativistic transistors.

Download EC Technical Seminar Presentation Topic on Relativistic Chips The Spintronics Theory .

Technical Seminar Topic CSE 2011 PPT on Captcha

Captcha is an automated public Turing test that helps to tell humans and the computers apart. This is discovered at CMU by Luis von Ahn and Manuel Blum. This is a challenging program and it includes a response tests to segregate computers from the human programs. Some of the features of captcha are”

It provides distorted characters to the users

Generic captcha include numbers and distorted letters.

If the letters to be assumed are correct then the user is identified as a human being and thus allow accessing of the system otherwise the user is not permitted to access the system.

The present OCR cannot read the noisy text as well as distorted text and that is possible only by human brains. Therefore whenever the typed letters and numbers do not match the given informations the system will understand the he user is not a human being but a bot which will prevent from any kind of further accessing. The first captcha was used by Altavista in their own sites which gives 95% reduction of spams. Yahoo becomes partner with CMU to reduce the threats they get in the chat messenger service. In the year 2000 captcha was trademarked by Manuel Blum and Luis von Ahn.

The Turing test was proposed by Alan Turning and it helps to test the intelligence level of the ocean. Human judges usually ask two participants and the machine is one among them but he will not know which one id the machine participant. If the judge cannot identify which is the machine participant the the machine will pass the test. A reverse Turing test is employed by the captcha which means a judge= program of captcha and participant = user. If the captcha is passed by the user then he is a human being otherwise it is a machine.

Download Technical Seminar Topic CSE 2011 PPT on Captcha .

Electrical Technical Seminar Topic on CAN-based Higher Layer Protoclols and Profiles

Introduction to Electrical Technical Seminar Topic on CAN-based  Higher Layer Protoclols and Profiles:

Some of the features of CAN-based protocols are as follows:

Network management

Principles of device profiles and modeling

Method of processing data connection establishment

Peer-to-peer communication

Methods of process data exchange

System of message identifier assignment

A predefined set of connection is available for explicating messages between a master device and a slave device and it includes:

Strobe channel

Master poll or cyclic channel or change of state

Slave I/O

Explicit message channel

The three elements that determined the SDS message meaning is:

3 bit service type

7 bit logical address

Pri bit and Dir bit

Device configuration with the help of configuration tools various channels for multi-purpose uses are required. These channels are known as non-time critical channels for communication and they always exist between a device that is needed to be configured and a configuration tool. The data transmission has to be executed by various manners and it needs several higher layer protocols which support configuration device providing peer- to-peer communication option.

Detection as well as identification of network failures is the main function of network management. It also helps to control the status of communication of the nodes that are distributed. The following information must be present to make up a device profile and modeling:

Configuration of data

Interfaces of public to that specified data

A data format that is required for the device

Object model

The use of CAN protocol cannot be under determined in any way and its widespread application ranging from the automobile industry to any sort of industrial applications lead to the development of various high class protocols. In the country of the USA the SAE J1939 standard is widely accepted and it is a related protocol of CAN protocol. This is used for the application of tucks and buses. This is an important a swell as an advantageous application.

Download Electrical Technical Seminar Topic on CAN-based  Higher Layer Protoclols and Profiles .

Spectrum Allocation Policy and Issues PPT Presentation for ECE Students

Spectrum policies are an abstract subject that is reserved for the technocrats and moreover the NSP or the national spectrum policy is very important. The relevance of ICMT is demonstrated by the e-choupal in the society for simple farmers which has further given a hike to the farmers’ income. These farmers due to the introduction of the limited ICMT gets hardly any cost for their products.

The middleman present in the distribution and supply chain operates in distant markets and the age of the internet is termed as “age of dis-inter mediation”. With the introduction of digital tools the cost of transaction in the market has significantly lowered. The technology substitute the middleman who is not giving any productivity and the nation also becomes more productive with the innovation of this new system.

We have learnt a lot from the e-choupal:

Digital inclusion: today the information society is not only reserved for the white collar employed in the offices to sit at the computer desk. Agriculture, rural activities, fishing and small industrial jobs have given a relevant lesson and transformational changes to the rural society. Digital inclusion has a lot of importance for the individuals and it has a measurable income ans empowerment gain. Development of national productivity has increased.

For the first time the objective of PURA or providing urban amenities to rural areas come within the reach of the ICMT through the electronic enablement or BB connectivity.  4G that is beyond the 3G technology is a very powerful technology that supports the mobile and fixed phone requirements at the real speed of broadband. It can also support electronic connectivity for goods transportation and services as well as people empowerment through a converged and a single system of delivery. These networks are also quite costly and requires a high degree of complexity and specialized manpower.

Download Spectrum Allocation Policy and Issues PPT Presentation for ECE Students .

Electrical Presentation PPT on Construction And Use Of Broadband Transformers

Introduction to Construction And Use Of Broadband Transformers Seminar Topic:

Privacy infringement long with security issues can reflected as a serious problem for many applications of RFID systems which is also known as radio frequency identification. Most of these problems occurred because of the lack of user control between the readers and the RFID tags. If the user is given the RFID link can eradicate the problems of security. A smart card system can obstruct the unauthorized payment of the credit card or unwanted identification theft which can be released by a simple integration of the electrical touch switch with a 14443 smart card.

When the users touch the switch the smart card will get activated. The capacitor impedance changes with a finger touch of the user. In the application of public transport, e-passports, admission cards and circuit cards the radio frequency identification system is used. The deployment of this system exacerbates the need to get the most ideal method of obstructing the unwanted disclosure of details that is stored in the chip of RFID.

There is no mechanism of the smart cards for obstructing a third party from inserting a reader within the zone of interrogation of the card system to steal information that are stored in the card. Hardware designs and authenticated protocol systems have been recently proposed by experts for the purpose of security.  Hash-locks, tree-walking, re-encryption are some of the cryptographic hardware that has been present. Faraday cage is the other type of security measure. The hardware used in the RFID can be changed by the shield tags.

A smart card system is investigated by us and it can be controlled by the users with a simple touch of fingers. It also comes with integrated switches that helps in providing high level security and protection of privacy. The simple manufacturing process helps in meeting the needs of additional processes in the stage of mass production.

Download Electrical Presentation PPT on Construction And Use Of Broadband Transformers  .

Seminar Report on Bluetooth Technology with PPT

It can easily replace the need of cables that is used to connect both the devices of communication. Bluetooth used a single radio link over a short range. The laptop can replace the cable that is used today and the availability of Bluetooth radio technology that is built in both the mobile phones. This enables to connect the mobile with the laptop with any need of cables. The Bluetooth radio technology provides a bridge to the data networks.

At the same time it also provides a mechanism and a peripheral interface to create a small ad hoc group that connects devices that are away from the fixed infrastructures. The document on Bluetooth technology provides a brief definition about the usage models and it also explains the optimization of Bluetooth architecture. The security implementation is also described in this document. It also focuses on the applicants as well as the future developments as well as the positioning of the Bluetooth in relation to other standards of wireless technology.

The Bluetooth technology was launched back in the year 1994 and it was a real surprise for the portable lifestyle. It was designed to provide a interconnection without using any kind of wires between mobile phones and their peripherals. It also provides a great solution for the cable free connections of computers which gives a real freedom in the environment of working despite of the availability of wire and location.

Bluetooth connection allows portable notebook, computers, personal digital assistant, mobiles and other gadgets hat make use of short range and low power technology to connect with each other. The transfer rate of Bluetooth is 400 KBPS and it operates in the frequency band of 2.4 GHz which is almost similar to the cordless phones and wireless LAN technology. At the same time it supports computer connection of 10-m at a speed of 1 MBPS.

Download Seminar Report on Bluetooth Technology with PPT .

Final Year ECE Seminar Topic on Application of Swarm Robots with Full Report

Introduction to Seminar Topic on Application of Swarm Robots:

This paper shows a prologue to the universe of swarm robots and adumbrates its requisitions. Swarm robotics is right now without a doubt the most imperative provision ranges for swarm insights. The specialist has an essential thought of advancing swarm robots for the security reason. The aforementioned robots can spy in any locale without any block of spotting it shape. Swarms furnish the conceivability of improved job exhibition, heightened reliability (blame tolerance), easy unit many-sided quality and diminished cost over conventional robotic frameworks.

They can achieve certain assignments that could be implausible for a lone robot to actualize. Swarm robots might be connected with a large number of fields, for example adaptable assembling frameworks, shuttle, Inspection/maintenance, development, horticulture, and pharmaceutical work.

Swarm-bots are a gathering of portable robots fit to self-amass and to self-compose to tackle situations that lack the capacity to be explained by a solitary robot. The proposed robots consolidate the force of swarm knowledge with the adaptability of self-reconfiguration as total swarm-bots can rapidly update their structure to match natural shifts. Swarm robots are more than unequivocally arrangements of autonomous executors; they are plausibly reconfigurable systems of imparting executors fit for of composed sensing and collaboration with nature. Robots are determined to be a critical part of the fate.

In the close destiny, it might be plausible to prepare and convey imposing various cheap, disposable, meso-scale robots. Admitting that confined in single ability, such robots conveyed in vast numbers can speak for a unyielding total drive comparable to a state of ground dwelling insects or swarm of killer bees

This boid model appears sensible depending on if we acknowledge it from a different outlook, that of it acting as per magnetism and aversion between neighbors in a group. The repugnance association outcomes in the shirking of impacts and magnetism makes the group keep shape, i.e., replicating developments of neighbors might be viewed as a sort of pull. The middle control plays a function in both pull and aversion. The swarm conduct of the recreated run is the consequence of the thick collaboration of the moderately effortless conducts of the unique bids.

Download Final Year ECE Seminar Topic on Application of Swarm Robots with Full Report .

Study of Synthesis Tools Using Half Adder and Full Adder

Synthesis is a mechanical system for changing over a higher level reflection to an easier level reflection. The synthesis devices undercover enlist transfer level (RTL) portrayal to entryway level net posts. These entryway level net posts comprise of interconnected door level macro cells. These entryway level net posts as of now might be enhanced for region, speed and whatnot.

The dissected objective is synthesized to library of parts, regularly entryways, hooks, or flip flounders. Progressive plans are synthesized in lowest part up style that is more level segments are synthesized before higher level segments. Once the outline is synthesized we have a door level net catalogue. This door level net record might be recreated. Defer for the unique parts are ready as a component of the portrayal of the segment libraries. Timing exact recreation is not conceivable right now for the reason that the genuine timing qualities are dead set by the physical situation of the plan with the FPGA chip. Yet, the useful reproduction that is conceivable right now is a significant spot more correct than recreation dependent upon user specified postpones.

Additionally regarded as Electronic System Level Synthesis and C Synthesis, High Level Synthesis is a robotized plan strategy that changes over the algorithmic depiction of a framework into the comparing fittings circuit. In this course of action, which is genuinely a part of heightened level plan rush, the framework conduct is portrayed at an absolutely elevated level of deliberation. This system enhances the benefit and decreases the shot of blunder.

Synopsys presented Behavioral Compiler, the original behavioral synthesis instrument, in 1994. Verilog was utilized as the info dialect. 10 years later, diverse cutting edge High Level Synthesis (HLS) instruments were presented in the business sector. The aforementioned devices offered circuit synthesis, depicted in elevated level dialect and Register Transfer Level. Producers of the aforementioned devices furnished broad PC underpin for broad extend of device issues. Equipment plan may be advanced at different levels of deliberation. The most regular reflection levels are Algorithmic Level, Register Transfer Level and Gate Level.

Speed Factory Automated Checkpoint Log System for Bike Races Microcontroller Project Report

Adding RFID is the main object of this project for every participant of biking in rally and to set up a micro controller that is based on the readers of RFID at various checkpoints all along the route. The boards of micro controllers are equipped with RRTC or real clock time to keep a track of the time and EEPROM helps to maintain the cross timing for each and every bike.

These data are later used to develop units of micro controllers that can be transferred to a database that is centralized via the serial that comes with every board of micro controllers. The software of the computer can then be used for generating time based maps, lap records, analysis report results of races and graphical results.

The boards that are based on the micro controllers are present at the various check points and they are equipped with the RFID reader that is used for reading informations from tags of RFID that are used in each and every bike participating in the race. RTC is used to handle the time and data at the time of power loss and EEPROM to save the data of croosing as well as the time.

To maintain the system status a display is used. Low cost check points can also be used in the system and they need to be maintained on a regular basis. These are available widely for collecting informations from all the available check points on a PC that is connected via the serial link one by one. A port connector is provided for all the boards of micro controller that are present at the check post for the message transmission to the PC. The EEPROM include a wide space and is used for storing of information  about the races for several days and weeks. Transmission of messages can take a few minutes and it will be followed by the merging of results.