Advanced Security Measures in a Wireless LAN Computer Seminar

The research paper Advanced Security Measures in a Wireless LAN Computer Seminar is about the Wireless Local Area Networks or WLANs and how they metamorphosed the arena of Computer Networking. The growing demand of mobile computing devices, such as laptops and personal digital assistants, and a subsequent demand for continual network connections without having to “plug in,” are heralding enterprise WLANs.

Benefits of WLAN: Network Managers are vouching for the benefits of WLAN. This research paper talks about the multiple benefits of WLAN. WLANs are extremely useful in a scenario that requires almost a frequent shift of working space, and other geographical and spatial barriers (that interfere with the smooth functioning of processes). WLANs provide the freedom of working without being tethered by wires. The research paper speaks of various technologies that help in accessing networked data.

These days, there are four types of Wireless networks, ranging from slow and inexpensive to fast and expensive. They are: WECA (Wireless Ethernet Compatibility Alliance) -WI-Fi, Bluetooth, IrDA (Infrared Direct Access) and HomeRF.

LAN Security: WLAN security, that has been traditional so far, includes the use of Service Set Identifiers (SSIDs), open or shared-key authentication, static WEP keys and optional Media Access Control (MAC) authentication. This combination offers a basic level of access control and privacy. But like any other security systems this one is not free from shortcomings. The research paper discusses these things in depth.

How WLAN is attacked: Eavesdropping, tampering, utilizing antennas, war driving, malicious association, blue drive attack and some more explained in the research paper show possible threat to WLAN.

Conclusion:

The research paper offers some brilliant security measures. It suggests to have a single access point controlled via secure operating system like Linux. It is suggested in the research paper to occasionally boot up and trap sections of traffic to look for any attack signatures. The user must connect via a VPN, the access point is secured so it cannot be reset, WEP is enabled, and access point is in a position that limits travel of the radio frequency outside of the premises.

Download Advanced Security Measures in a Wireless LAN CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT..

Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation

The research paper Cyborgs – An advanced Robotic Technology Btech CSE Seminar Presentation talks about the Cyborgs- An Advanced Robotic Technology. Pictures like Bicentennial Man and the Last Mimzi have glorified the field of Robotics like never before. There has been an upsurge in choosing the career domain as an inevitable career option. There is a breakthrough in the research in Robotics almost daily. Cyborg is one such advanced technology that has many promises to make to the coming generations.

Literally a Cyborg is a hypothetical human being with programmed for an alien or hostile environment. A Cyborg has artificial limbs or other body parts. Hollywood glorified Cyborgs in blockbusters like Terminator. A Cyborg can also be a human being seeking respite in artificial intelligence to overcome his/her physical/mental constraints.

Besides fiction and Hollywood Cyborg acts as a panacea for people who might have suffered a limb/limbs amputation in wars or accidents. iLimb and C-Leg are some major breakthrough in the domain of Cyborgs. The iLimb acts as a prosthetic to help the victim cope with the loss of hand/leg. Besides aiming at helping the victim assume a natural gait the iLimb also has magnetic and cochlear implants that help the victim with sensory perception.

A British Research Scientist Kevin Warwick made 100 electrodes fire his neurons in order to make his mind communicate with the internet. He carried many other researches successfully.

Cyborgs also play a vital role in safeguarding and managing huge records/databases.

Types of Cyborgs:

There are two types of Cyborgs- Restorative and Enhanced. As the name suggests the restorative Cyborgs help in restoring the activity of lost limbs, organs etc.  The enhanced Cyborgs works towards maximizing the output of the artificial limb/organ. Cyborgs has also penetrated deeper into fields called as ‘Cryonics’—wherein a patient deemed dead is preserved and treated at a later stage. Cyborgs plays a vital role in military too.

Besides given a lease of life to sports personnel by gifting them with high performance limbs which otherwise might have been amputated in some accident.

Conclusion:

Cyborgs has a great future lying ahead. One may in the future have a machine body with the muscular brain, or a muscular body harboring a computer brain!!

Download Cyborgs – An advanced Robotic Technology  Btech CSE Seminar Presentation.

History of Computers CSE Seminar Topic

The research paper History of Computers CSE Seminar Topic speaks about the History of Computers. Post-modernization if anything has marveled the world it is ‘Computers’. Computers have now become omnipresent. They are omnipresent too. No official work this day is possible without using a computer. Be it extracting money from an ATM or sending mails, presentations or any other valuable data, computers are indispensable to all processes and procedures.

Computers primarily manipulate data and are even used desktop publishing. There has been colossal research in the domain of computers and now it has sophisticated domains like Artificial Intelligence, Robotics and many more. Gaming also is an emerging field that is ingrained in the domain of computers. The first electronic computer, the Electronic Numerical Integrator and Computer (ENIAC), was developed in 1946. It measured 18 feet by 80 feet and weighed 30 tons. Today’s desktop computers weigh much less, can store a million times more information, and are 50,000 times faster. In recent years, notebook-size laptop computers and hand-held Personal Digital Assistants (PDAs) have become popular.

All Parts of Computer:

The computer case is the metal and plastic box that contains the main components of the computer. A desktop case lies flat on a desk, and the monitor usually sits on top of it. A tower case,  is tall and sits next to the monitor or on the floor.

The front of the case usually has an on/off switch and two or more drives. On the back of the computer case are connection ports made to fit only one type of plug-in device. The ports include monitor cable port, keyboard/mouse ports, network cable port, microphone/speaker/auxiliary input ports and printer port (SCSI or Parallel). There’s also a place for the power cord plug.

The monitor, which resembles a television, is where the computer displays text and pictures.

The CPU or the Central Processing Unit is the brain of the computer. Its duty is to carry out the commands. The computer has both input and output devices. CDs, Pen-drives, floppies are input devices. Printers, webcam, scanners are an output device. The short-term memory of a computer is called RAM ( Random Access memory). IT stores memory in the form of MBs or GBs. The hard-disk or the C drive stores more data and information on your computer. Through the ROM ( Read only memory) you can only read but cannot store.

Download History of Computers CSE Seminar Topic.

4G Technology that Gets the World in your Palm CSE Seminar Topic

4G Technology that Gets the World in your Palm CSE Seminar Topic research paper talks about 4g and the future the technology standard has. 4G is the fourth generation wireless communication standard. It has been earlier preceded by 1G, 2G, 3G and 4 G. The 4G applications are characteristically user-driven, user controlled services and context aware applications. In comparison with 3G , 4G has higher data rates and it focuses on one of the primary features ‘QoS’ ( Quality of Service) which is the main criteria in 4G wireless communication.

4G Technology?

A quicker means of networking and communication is what that attracts people to applications like 4G.The technology not only envisages a surge of economy and a landslide improvement in the infrastructure of telecom companies but also assure a better and evolved way of reaching out to the customers and serving them in the best possible way. The emerging new communications standard and of course trendsetter, assumes a user to be able to access services independently of her or his location, in an almost transparent way, with the terminal being able to pick the preferred access technology at current location (ad-hoc, wired, wireless LAN, or cellular), and move between technologies seamlessly i.e. without noticeable disruption. Unified, secure, multi-service, and multiple-operator network architectures are now being developed in a context commonly referenced to as networks Beyond-3G or, alternatively, 4G networks .A 4G Network is routed through a :

  • A user – a person or company with a service level agreement (SLA) contracted with an operator for a specific set of services
  • A MT (Mobile Terminal) – a terminal from where the user accesses services.
  • AR (Access Router) – the point of attachment to the network, Paging Agent (PA), QOS Broker, AAAC System, Network Management System, Interoperator Network Interchange, Mobility of users across terminals, Mobility among multiple terminals, Per hop Behavior ( PHB), Monitory and Measurement functions and above all confidentiality.

A 4G Technology when discussed at an operational level has many subtleties and nuances. This QoS architecture is able to support multi-service, multi-operator environments, handling complex multimedia services, with per user and per service differentiation, and integrating mobility and AAAC aspects. Although the future of 4G is very promising it still has shortcomings owing to its different server orientation. A major issue in 4G systems is to make the high bit rates available in a larger portion of the cell, especially to users in an exposed position in between several base stations.

In current research, this issue is addressed by macro-diversity techniques, also known as group cooperative relays and also by beam division multiple access.

Conclusion

Sprint Nextel, Scartel in Russia, Belarus and Nicaragua use the 4G technology. Ericsson and Nokia Siemens too have come up with some latest versions of  Technology in the Scandinavian part of the world.

Download 4G Technology that Gets the World in your Palm CSE Seminar Topic.

A Zigbee Network Based Heart Monitoring System for Pre-Mature Babies Projects for Engineering

This Zigbee Network Based Heart Monitoring System for Pre-Mature Babies Projects for Engineering Paper introduces Zigbee technology in monitoring the heart rate of pre-mature babies, which broadens the previous radio standards to include higher flexibility, security and reliability. It includes features like mobility, low power consumption, longer battery life and hence can be incorporated in everyday applications.

a-zigbee-network-based-heart-monitering-system-for-pre-mature-babies-projects-for-engineeringWireless communication popularly shortened to “Wireless” as the name indicates is a kind of tele-communications without the use of wires or cables. It is a good replacement to overcome impractical considerations like long distance cabling and perfect for usage over long distances, provides connectivity through satellites connecting mobiles, workstations etc. GPS, Wi-Fi, Bluetooth are names synonymous with wireless.

In this project, Zigbee aims at upgrading heart monitoring systems such as ECG. The Zigbee wireless network is used to monitor the heart-rate of premature babies kept in different incubator rooms. Through wireless technology, their heart rate is closely examined and any signs of increase in heart rate or vice-versa can be communicated to the central monitoring system and immediate aid can be provided. Every baby’s heart rate is monitored by an individual Zigbee sensory nodule and information sensed by it is transmitted to the Zigbee central coordinator which in turn relays the information to the central monitoring system through LAN. The central coordinator will alert the central monitoring system if any premature baby requires immediate attention.

Conclusion:

A heart-rate monitoring system in hospitals requires to be operated all the time. Thus, Zigbee technology offering low power consumption, low cost, high battery life, less interference with other wireless devices and hence is ideal for heart-rate monitoring systems. Moreover, it is capable for remote monitoring and is less expensive than other heart rate monitors available in the market which use Bluetooth technology. Thus, Zigbee technology aims at infusing simple and cost-effective wireless technology options seamlessly into the market and targeting mainly automation and remote control applications.

Download A Zigbee Network Based Heart Monitoring System for Pre-Mature Babies Projects for Engineering CSE Computer Science Engineering B Tech/ BE Final Project Paper Presentation and Seminar PPT.

Communication Projects on Home Automation Using Mobile Communication

Technology has surged so ahead that it has now unlocked the potential for you to manage your home appliances without your physical presence. This project Communication Projects on Home Automation Using Mobile Communication enables you to control home appliances like bulbs, fans, water pumps etc with the pressing of your mobile keys. Consequently, if you do not remember to switch them off before you leave your house; you can easily do it through your mobile which serves as a remote.

communication-projects-on-home-automation-using-mobile-communicationThis project Communication Projects on Home Automation Using Mobile Communication consists of three main parts namely microcontroller, DTMF (dual-tone multiple-frequency) decoder and voice recording and playback device. While on a call, if a handset key is presses, a tone analogous to the key pressed is heard on the other side. This tone received (known as the DTMF tone) is processed by the microcontroller with aid of a DTMF decoder. The decoder further translates the tone into its corresponding binary digit and sent to the microcontroller.

‘Touch-tone’ is an edition of the DTMF used in telephone dialing. The use of DTMF here is that it allocates a particular frequency to each button which makes it easily identifiable for the electronic circuit. 8-bit microcontroller is used here which is programmable and has erasable ROM.  Discrete components like transformer, rectifier too are incorporated in the circuit.

Before the circuit starts functioning, all connections are tested and the ac supply is provided. Magnitude of the output is measured by the multimeter and its waveform seen in the oscilloscope.

Conclusion:                                 

                 Communication Projects on Home Automation Using Mobile Communication can be made use of in a wide range of home appliance devices. One of them is watering system where the principle of this project is applied and used to control a relay signal to the water pump. This project design can also be applied to automate garden lamps and also security systems.

Download Communication Projects on Home Automation Using Mobile Communication.

Home appliance control by mobile phone (DTMF) ECE Final Year Project

The aim of this project Home appliance control by mobile phone (DTMF) ECE Final Year Project is to enable consumers to have a remote-based control over their home devices through a cellular interface like mobile phone.

To implement this system the consumer should send a unique code accompanied by the required function to his home control system through GSM.

home-appliance-control-by-mobile-phone-dtmf-ieee-ece-final-year-projectTo design this project a microcontroller is used as a control unit which gets inputs (instructions, commands) from a mobile connected through GSM.

To make the connection more secure, consumer authentication along with a password will be provided.

To switch on/off any appliance positioned at controller’s part, a call is made and after the call is tended to automatically, the appropriate tone and password are entered.

The tone entered is decoded via the DTMF decoder which further translates it into binary values. Binary values are the input to the microcontroller which verifies each tone individually and corresponding output is given at the output terminal.

This output from microcontroller is used to drive the matching relay driver where in each relay drive is coupled to a home appliance. Thus when the relay drive is activated by the microcontroller, the device either gets ON or is switched OFF as per the requirement. Home appliance control by mobile phone project makes use of auto answer facility and hence eliminates the need of a ring detector circuit.

Related Projects:

Remote Control for Home Appliances

Home appliance control by mobile phone (DTMF) ECE Final Year Project Conclusion:

This project is targeted at the average consumer who desires to access remote control over home devices which can be controlled electrically. Additional features like audio interaction as well as feedback mechanism to determine the current state could serve as add-ons for this project.

However it must be ensured that the consumer must be living in an area which has strong signal connectivity and only one person should be authorized for the controlling of these devices to ensure maximum security.

Download Home appliance control by mobile phone (DTMF) ECE Final Year Project.

Highly efficient wavelength converter using direct bonded PPZnLN ridge waveguide

There are several wavelength conversion proposal methods out of which this project emphasis “Highly efficient wavelength converter using direct bonded PPZnLN ridge waveguide”. These are highly recommended owing to factors like large signal bandwidth, high conversion efficiency, etc.

highly-efficient-wavelength-converter-using-direct-bonded-ppznln-ridge-waveguideThere is an ever increasing demand to extend the communication capacity. For this purpose optical networks in the coming future will expand WDM (wavelength division multiplexing) technology to exploit the large bandwidth of the fiber. Large WDM networks will pave the way for construction of flexible networks. These WDM networks need wavelength converters in order to have signal path routing.

In this project, direct-bonded wavelength converters which are ridge-shaped in structure is created by employing ultra-precision machinery fitted with a diamond blade. This waveguide exhibits strong opposition to photorefractive damage as there ion-exchange process is excluded from its fabrication process which further ensures no degradation to its non-linear coefficient. It operates both in the TM as well as TE modes. This characteristic makes polarization diversity realizable and delivers high conversion efficiency. this is a primary requisite in telecommunication applications. Also, this fabricated waveguide allows the propagation of 1560 nm light (travelling in single-mode).

Conclusion:

Therefore in this project Highly efficient wavelength converter using direct bonded PPZnLN ridge waveguide fabrication of a 50-mm-long PPZnLN ridge waveguide was achieved by utilizing direct bonding and methods of dry etching. Examination of device characteristics revealed that a SHG efficiency of 2400%/W accompanied by an SHG output power of 148 mW was obtained.

Here a QPM-LN fiber-coupled module with the PPZnLN ridge waveguide was fabricated with 4 dB insertion loss. Wavelength conversion founded on SHG/DFG cascading scheme (1.55 µ m band) was successfully established. This wavelength converter using the highly efficient PPZnLN waveguide would prove very useful in making a photonic network in the future.

Download Highly efficient wavelength converter using direct bonded PPZnLN ridge waveguide.

Projects for Electronics High Speed Low Power Multiplier with the Spurious Power Suppression

Projects for Electronics High Speed Low Power Multiplier with the Spurious Power Suppression depicts the application of  an advanced edition of Spurious Power Suppression Technique (SPST) on either high speed multipliers with low power consumption. In this technique, when we come across a part of data that has no effect in the final results computed then the circuit of the SPST responsible for data controlling latches this part so as to prevent unnecessary data transmissions in the mathematical units. This means that spurious data signals are removed through filtering. To perform multiplication, a modified form of Booth Algorithm is used.

projects-for-electronics-high-speed-low-power-multiplier-with-the-spurious-power-suppressionThis Topic  makes use of a detection logic circuit which is used to identify the useful range of data of arithmetic units i.e. adders or multipliers. This method implements the concept of dividing the arithmetic units into Most significant part (MSP) and Least Significant Part (LSP). It then disregards those MSP parts which have no effect on the result and hence only using those bits which are computed in the final result.

There are two methods to filter out the unnecessary switching power. One way is through registers and the other is through AND gates. On scrutiny through simulation of SPST realization through AND gates shows that this combination possesses high flexibility in terms of regulating the data assertion time. This leads to a marked increase in speed and reduction in power.

Conclusion:

Thus, Projects for Electronics High Speed Low Power Multiplier with the Spurious Power Suppression is designed. The multiplier in this project is devised by furnishing SPST on a Booth encoder amended for this purpose. This encoder will lessen the number of partial products. The Spurious Power Suppression technique eliminates unnecessary addition and thereby reduces the switching power dissipation. The design of this project is established by making use of  Xilinx 9.1 utilizing Verilog HDL coding.

Download Projects for Electronics High Speed Low Power Multiplier with the Spurious Power Suppression.

Microcontroller Projects on Hamming-Cut-Matching Algorithm in Iris Recognition

The following paper on Microcontroller Projects on Hamming-Cut-Matching Algorithm in Iris Recognition defines what iris is-its location, importance and how to recognize it. It also explains how the scanned pattern of iris is matched by transforming into 256 bytes for easy storage and retrieval from the database. Further this paper throws light on realization of HAMMING-CUT-MATCHING algorithm which is effective in decreasing the time taken to match the scanned pattern with database where massive databases are in place.

            microcontroller-projects-on-hamming-cut-matching-algorithm-in-iris-recognition The software employed for iris-identification uses around 256 reference points and begins to look through the data for a match. Every single separate iris pattern is demodulated so as to obtain phase information and then leading to phase quantization and allocation of 256 bytes for every iris pattern. Consequently a single iris pattern is transformed into phasor bits and stored in the software and deployed for comparison later.

When an image is scanned and used to contrast with the database, the value of hamming distance is required. Hamming distance is used to determine the difference of bits between the iris code of the scanned image with that of the iris code records in the database. This processing is very quick and just takes a few seconds time. The final result produces two-digit code specifying how much the codes vary.

Conclusion:

Hamming-Cut-Matching algorithm in Iris recognition stands out because it offers high security and absolute accuracy plus with an ease in administrative duties. It abolishes the need for passwords, PIN etc as they more risk prone. It’s another specialty is its uniqueness with respect to every individual. The iris recognition scheme is not limited as age increases. From the age of seven till the course of a man’s life it remains unchanged. Moreover, scanning of iris does not cause any damage to the eyes of the person.

Download Microcontroller Projects on Hamming-Cut-Matching Algorithm in Iris Recognition.