Electronic Seminar Topic on Types on Onion

Introduction to Electronic Seminar Topic on Types on Onion:

1.     Forward Onions

Forward onions square measure won’t to produce unspecified circuits that are used for normal connections. A forward onion which consists of associate degree onion correct, a respondent header within the goods of an information cell, and target swarm address and port in an exceedingly the payload of an information cell.

 2.     Reply Onions

It is such kind of Onions which is used for create unnamed circuit which will used for reply connections. This consists of an onion proper and responder header. This responder header consists of an onion processor address, port, and onion processor header etc. key seeds; destination host information and process header are encrypted in this reply onion processor.

 3.     Replayable Reply Onions

A replayable reply onion contains associate onion correct, with a little set within the flags field indicating that it’s a reply onion, a communicator header with a little set within the flags field indicating that the onion may be a reply onion, the address and port of the reply onion processor, a reply onion processor header, the destination host address and port and eventually the key seed material. Repayable reply onions square measure comfortable produce anonymous circuits which will be used for replayable reply connections.

 4.     Rekeying Onions

Rekeying onions are 12 layers with encrypted form. Between ordinary onions and rekeying onions there are no such differences. Only difference is their structure. It is mainly used to distribute new symmetric keys. Rekeying onions are encrypted by symmetric cryptography.

 5.     Tunneling Onions

To create anonymous tunnel circuit this type of onions are needed. It consist two or more onion proper, one responder header and destination host information. Last layer of last onion consist a bit which will show indicate when tunneling will occur. After this N DATA CELL will be repackaged where N is the number of cells required.

Download  Electronic Seminar Topic on Types on Onion.

Laser Torch Based Voice Transmitter and Receiver Block Diagram

Since from the very beginning of global communication through radio frequency waves to fiber optic communication the entire criteria had taken several modifications, recently by introduction of lasers in communication systems had made revolutionary change in field of spatial communication in fact I will the future for groundbreaking developments going to take place in communication systems. And lasers will sooner the ultimate replacement of radio signals

In this paper we implemented Laser torch-based voice Transmitter and receiver technology for exchanging data between stations, this paper addresses a new means of voice transfer between persons,

Our project ma goal is to provide a better option where large data is to be transferred with in a shorter duration of time along specified distances. Lasers having high functional abilities and ideal choice for less interference transmission had found many applications in recent days. Lasers exhibits high coherence and crystal clarity in terms transferring data. Though it is youngest technology in communication it became the future scope for the scientists in spatial communication advancements.

Our mainly consists of the following elements, condenser microphone, the name itself shows it’s a capacitor or often called electrostatic microphone its function is to receive the sender voice and transmits to the transistor  amplifier BC548, here the signal is coupled with the laser beam and feed to the receiver where the photo transistor receives this signal and converts it into audio signal, this audio signal is again amplified  and modulated by the LM386 basic power amplifier IC, at the final stage and fed to 0.5w/8ohm Speaker.

We use various types of lasers for transmission of audio signals some of them are Gas lasers, Chemical lasers, Excimer lasers, Fiber-hosted lasers, Photonic crystal lasers, Semiconductor lasers, Dye lasers, free electron lasers. Depending Up their requirement different laser is used for different ranges.

Download  Laser Torch Based Voice Transmitter and Receiver Block Diagram .

Seminar Report On Laser Induced Ignition of Gasoline Direct Injection Engines

In this paper Laser induced ignition of gasoline direct injection engines is presented, laser stands for light amplification by the stimulated emission of radiation and characteristics is in unidirectional nature, monochromatic, without dropping the intensity up to the target. Here we discuss mainly the way the lasers are providing better solutions for ignitions, lasers tease days find enormous application in almost every field and they are the main source for the scientific advancements that are going to happen in future.

I order to achieve more potential in facing the real time problems in ignition methodologies we are introducing a new concept based on laser technology which gaining much in recent times. Apart from the expense of lasers their capability in attaining high reliability, accuracy nullifies its one only drawback. Gas lasers, Chemical lasers, Exciter lasers, Solid-state lasers, Semiconductor lasers, Dye lasers are the different lasers are mentioned in this paper along with their functional characteristics.

The conventional spark plug system is not flexible with slow frame propagation, fire hazardous in nature and frequent maintenance is to be done these drawbacks are nullified by our   Laser induced ignition system, facilitating accurate target location i.e. focal point,  with spark plug flexibility, less  effected from fires, neat and easily maintained with minimum energy requirement.

The combustion chamber experiment is carried out by us along with engine experiments in order to the find the ignition delay time, pressure gradients,  the results are experimentally validated showing that laser induced ignition system is far better than the ordinary conventional spark plug ignition. The margin of fuel consumption is drastically very low when compared to spark plug ignition and it’s about 20%. The smoothness in operation is consistent than spark plug ignition, these lasers can also operate within the fuel spray, and it has minimum percentage of hazardous atmospheric gas emissions.

Download  Seminar Report On Laser Induced Ignition of Gasoline Direct Injection Engines .

Infrared Remote Control ECE Seminar Report

Introduction to Infrared Remote Control Seminar Topic:

Look around your room and count how many things that you have at your house which are controlled by using remote. You can find many things in a single room which works with remote control system. Everyone watch televisions, VCRs, and stereos which works using remote. However, we can also find more appliances using remote control in now-a-days are that lights controllers, the temperature control, drapes, the front door lock and many more. Remote control system firstly used in military purpose in world war I and in world war II. There have been invented many different types of remote controlling systems. Some have helped in society develop, and others led to our demise.

 German, United States military used first remote controls to operate machines during in world war I and in world war II. During world war II, radio-controlled motor boats the German navy to ram enemy ships. By world war II, the use of remote controls began to use around worldwide, remote control weapons, bombs. The military has a lot of uses for remote controls but beginning in late 1940’s, scientists began experiments to discover the use of remote control for other uses than on the battlefield.

The famous scientist, Robert Adler, holds patents for 180 electronic devices, he is well known for his contribution in the remote control development.

Zenith Radio Corporation, now called as Zenith Electronics developed most primitive remote control system in 1950. This project explains how the remote control system developed and operation of the remote control systems which use Infrared IR rays for application. Remote controls are consumer devises used to give commands from a distance to consumer electronics like televisions, DVD players, air conditioner, cars and many other appliances. By using a micro controller we can control the operations of remote control devices which form the heart of the project.

Download  Infrared Remote Control ECE Seminar Report.

Extraction of Text from Video ECE Seminar Report

Introduction to Extraction of Text from Video:

In these modern days everything is online like shopping, education, jobs, music, games, news and many more. To connect with the people far from us through video chat or video calling and many us are also e learners that is they learn by accessing internet and also music lovers watch video songs. Everyday life is circulating around internet only from the wake up to the sleep. In accessing internet we may come across plenty of videos. Sometimes we may not able to understand the voice from a video or we want to extract the text from the video for better understand.

For example consider a Traffic control police uses a digital camera and catches the video of somebody who crossed traffic limits and he wants to see the vehicle number of that person. Here comes the problem of extracting texts from the videos. Not only a traffic police or a police come across these problems, a common people may also come across these kinds of many problems in their day to day life.

This project can solve the above problem of extracting text from a video using video text detection and recognition. By using edge detection based method we can extract the text from video and use matlab for implementation. Here we use the concept of critical angles 90 degree called threshold angles and 180 degree and the text is extracted and by using the edge image concept we recognize the text. Extracting the text from a video is a two step process of finding text region of the original image and separation of text from the background.

This project finds many real time applications like semantic video indexing, video surveillance, summarization and in many more. But the main drawback of this application is that it works only on the images having proper edge.

Download  Extraction of Text from Video ECE Seminar Report.

ECE Seminar Idea on Speech Coding

Introduction to Seminar Idea on Speech Coding:

The speech coding is by done by converting sound waves of our voices into electric signal. The process is carried out by recording the voice by a microphone. A microphone consist of diaphragm, magnet and a coil of wire when we speak the voice waves vibrate the diaphragm which is connected to magnet this cause diaphragm to move on the coil.

While the magnet is moving a electrical current is created the whole process stored at one place and it comes out as sound. Analog signal is used by microphone. For conversion of analog signal into digital signal DAC is used. The analog signal is first passed over band pass filter. The band pass filter filters the signal between 3000Hz to 3KHZ.

Band-Pass Filter:

The band pass filter converts analog signal to digital and as well as digital to analog. The analog digital converter measures the analog signal from microphone 8000 times/second. The ADC takes input for every 125 mille seconds. The sample is quantified with 13-block data. The data rate of 104KBPS is too large to handle so it is to be encoded by speech encoder to reduce bit rate.

Linear predictive coding:

In LPC 13-bit coding are saved in memory.160 of the audio samples make a audio of 20ms this contains 2080 bits.LPC analyzes this 20ms and determines 8 coefficients for filtering.LPC identifies the voice of humans.Lpc encode reduces 20ms from 2080 bits of audio data.

Block Coding:

The audio block of 20ms is transferred to the block coding. They are splatted for reconstruction based on importance. Class 1 bits are very important and they are further divided into IA and Ib. IA are protected by cyclic code Ia and Ib are combined with 4 additional class bits to tail

Convolutional coding:

 In this coding errors are detected and corrected according to limit. Every bit is twice of class 1 entries. The coding uses of 5 consecutive bits to calculate redundancy bits. Class 2 bits are not allowed in convolutional coding.

Download  ECE Seminar Idea on Speech Coding.

Fire Detection by Image Analysis ECE Project Report

Introduction to Fire Detection by Image Analysis Project:

The main aim of this project is to detect the fire by analyzing images. The process is carried out by comparing y, cb, and cr of YcbcR color model. The sensors are not used in this project. For creating Y, CB, Cr components from a RGB image. The color space transformation equation is used for transformation of each RGB pixels in to the Y, CB, and Cr image. Y indicates Luma that is black or white achromatic portion of the image and CB, Cr are red, blue difference between the Chroma components.

These colors are chosen initially why because illumination can be separated easily from the image than other colors. Based on these conditions the alarm will rang. 

 If the fire pixel has y(x,y)>=Cr(x,y)>=Cb(x,y).

  Whenever a non- pixel does not satisfy this condition. That is a fire pixel.

 If certain number of pixels like 10 to 50 satisfy above condition the alarm will rang

Design & Structure:

This fire detection alarm consists of a camera with 12 megapixels for high quality resolution and picture analysis. This is connected to the computer which receives the video bit sequence with 640×480 resolutions and then it analyzed based on the above conditions specified.

The model supposed to detect 70% of fire and 10% of false alarm.

Applications:

  It can be used railway stations

 It can be used in nuclear power plants

  It can be used in bus-station as well as airports

  It can be used in the fireworks manufacturing company

  It can be used in forest which are most frequently lit out

  Where we can find a place for frequent fire catchable it can be used their

Conclusion:

By this model we can only some amount of fire but not accurately.

Download  Fire Detection by Image Analysis ECE Project Report .

Sensor Node Seminar Report

Introduction to Sensor Node Seminar Topic:

Actually sensor nodes were developed in 1998 in smart dust project. The main aim of this project is making of communication between cubic millimeters autonomously. The goal is to completely integrate in a single package for the purpose of wireless communication between devices. It has large motes builded using available peripherals and one of the motes is RF mote which is capable of 60-feest distance communicating and it also have some sensors like humidity, temperature, light intensity, vibration.

Architecture:

The architecture of this device include

  • Micro controller
  • Transceiver
  • External memory
  • Power source
  • Sensors

Micro controller:

The micro controller controls the functions of other components in sensor node. The micro controller is best choice for sensor node. The flexibility in device and less power consumption is the best feature in it. For the general purpose micro controller the power consumption is more than that of micro controller

Transceiver:

ISM band is used by sensor node which gives free radio with huge spectrum allocation and global validity. Both transmitter and receiver are integrated in one device called transceiver. The operational states include transmit, sleep, idle.

External memory:

The memory is used to store the data in flash chip and application related data is also stored in this memory there are two types one is user memory and another is program memory. The memory contains information of identity of a device.

Power Source:

The power is actually supplied by a battery or capacitor but mainly battery is used. The battery is used to supply power for sensor node. There are two types of batteries they are rechargeable and normal battery.

Sensors:

Sensors are hardware devices that can detect change in physical medium. Like temperature and pressure. The sensors detect analog signals and covert them and sent to receiver for further processing.

Download  Sensor Node Seminar Report .

ECE Seminar Topic Latest on Encryption for Image Security

Introduction to Seminar Topic Encryption for Image Security:

Conventionally encryption of the image was done by cryptography. The drawbacks of cryptography is mainly that it is slow and its inability to factorize large numbers. Chaos based encryption have exhibited advanced features and the algorithm involved in the process is mainly based on rearranging the pixels.

Chaos

The history of chaos can be traced back to early 1970s, which exhibits a property known as ‘butterfly effect’.  The property of chaos is that though it is unpredictable and non-linear but it can be used as pseudo number generator.

CAT MAP

It is also known as Arnold’s Cat Map. In this the original organization of pixels is randomized. Extensively Cat map transformations can be made. While recovering an image through continuous iterations image can be retrieved in its original form. Treating Cat map as chaos can also result in magnification of small errors into large form.

Encryption and decryption

The encryption of data is a form of converting it into cipher text which protects the information and when the data reaches its target it can converted back to its original form by decryption. This is utilized by cryptography anddepends mainly on length of the key and algorithm. The objective of this method is to achieve confidentiality, authenticity, integrity, nonrepudiation. There are two types of cipher used namely substitution and transposition ensuring data encryption standards.

S-DES

Simplified data encryption utilizes permutation and substitution. The analysis is made complex when we alternate the linear maps with the non-linear maps.

Chaos and cryptosystem

When comparing the two, cryptosystem requires mixing, sensitivity and dependency on control parameters.  Another observation is that the latter work on finite system.

Formulation of algorithm

This is accomplished by confusion and diffusion that modifies the pixel value.

Conclusion

Chaotic Cat map can be used as secured form of encryption method.

d.  The enhancement of the algorithm would be to add texture while classifying the segments. The experiments also conclude that a variety of images with peculiar features will enable us to setup an assessable image retrieval system.

 Download  ECE Seminar Topic Latest on Encryption for Image Security.

ECE Seminar Report on Image Processing

Introduction to Seminar Topic on Image Processing:

Objective

This abstract can be used as a blue-print for the study done on image processing and the tools that enable us obtain and process image.In order to understand image processing some of the basic parameters should be considered.

Representation of colors

The colors are represented in two scale namely 8-bit grey scale and 24-bit color scale. 8-bit represents 256 shades where 0 represents black and 255 represents white. In case of 24-bit scale color is stored in red, green and blue. The colors can be used in different forms which has its own pros and cons. With the main aim to segregate colors by group different naming nomenclatures are given.

Image representation

Image has been coined as a collection of pixels with each pixel having its own color. The image is determined on the basis on sampling and the resolution. Image can converted into discrete form with the help of modern day devices.Digital cameras enable us by providing high resolution of the image to be captured. This improves the sampling level too.

Image processing clearly shows that with greater resolution of the picture a detailed analysis of an image can be can be obtained. This is because there is a direct relationship between sampling and information of the image.

Histogram

Being an environment friendly technique to analyze an image, it can be a good source of measuring the color spread of the image.

It represents a graphical representation of the count of the frequency at different color level. Extending histogram give a varied feature of plot for each color.

Conclusion

With improving image processing techniques the detailed analysis of the information of the image can be obtained from the image. This not only enhances the quality of the image but also enables us to transmit the image over a channel of communication.

Download  ECE Seminar Report on Image Processing.