Detection of Malaria Parasite Infected Blood Images ECE Project

Introduction to Detection of Malaria Parasite Infected Blood Images Project:

The effected red blood corpuscles will have a different shape when infected by a malarial parasite. These can detect by using 3D analysis which can improve the diagnosis of the disease. In this paper we will see how 3D analysis is conducted for detected the infected red blood corpuscles. A 3D statistical approach is used for examining the curved structure of the cells and then 3D moments of the curved surface are calculated.

Brief into 3D analysis:

 A statistical analysis is used which diagnoses the 3D moments of the blood samples and compares the infected and the normal red blood corpuscles. The red blood and white blood corpuscles can be easily differentiated as they differ in size and structure. To make a shape analysis of the blood moments we use probability theory.

The region moments of the blood cells represent a normalized grey level image to which the 3D statistical applied. By using this algorithm we can analyze the degree of infection and by further digital analysis we can know the presence of plasmodium in the blood cell. When compared to manual analysis the digital process takes less time foe performing the analysis.

Advantages of using 3D analysis:

There are various chemical processes for detecting the extent of the parasite in the blood but the 3D analysis can give better and efficient results. By using 3D analysis we can make a better diagnosis of the disease. The time taken for performing the test is very less and it is a low cost available method.

  Download  Detection of Malaria Parasite Infected Blood Images ECE Project.

ECE Seminar Report on Nano Robot in Human Body

Introduction to  Seminar Topic on Nano Robot in Human Body:

The objective of this model is to design a nano robot which moves through the blood vessels of our body and kills the pathogens and repairs the damaged tissues. For designing these robots nano technology is employed. This is advancement in the nano biotechnology which reduces the diseases the occurred in the body and the person need not consult a doctor or even need not take a medicine.

Brief into the design and working:

Nanotechnology is the science which deals with the direct manipulation of atoms and molecules for the development of substances which use the novel properties which are of few nano meters in size. Electric sensors are present in the nano robot which detects the surroundings and cell condition by electrical and chemical means.

Actuators are bio motors are artificially manufactured in laboratories by using dilute nucleic acid. The biomotors get the required power from the ATP present in the body. Control mechanism is provided for the robot which handles the functions to be performed and the control mechanism offered by the control assembly is equivalent to a PC.

Advantages:

This type of nano robots can completely destroy the pathogens present in the human body due to which the immunity increases. This kind of robots can increase the life span the human beings as they repair the damage tissues. The nano robots proper treatment to the disease occurred. The nano robs may come to availability in the coming five to ten years of time.

 Download  ECE Seminar Report on Nano Robot in Human Body.

Seminar Report on Delay Tolerant Networking

Introduction to Seminar Topic on Delay Tolerant Networking:

Due to the growing network applications they should be able to communicate with all the desperate working environments which have different physical and operational constraints. In this paper we will propose an architecture called least denominator protocol which can work in multiple desperate network environments. The proposed architecture can work in both terrestrial and interplanetary environments even in extreme cases. In this paper we will look into the interplanetary protocols which are used for dynamically loading the applications.

Brief into the working:

For interplanetary communication the internet protocols cannot be best suited due to the space environments. The proposed types of protocols are used for maintaining end to connectivity between the systems and for dynamically loading the applications in the outer space stations. Consultative committee for space data systems is using the telemetry and telecom and wireless protocols for space communication over the past years.

 In the recent years CFDP is developed which is implemented by using data re transmission procedure is being used to reduce the error rate. By using CFDP the round trip latency is reduced has it never waits for the acknowledgement of the transmitted one before beginning another one. A delay tolerant network architecture is used which serves as a bride between the different working environments and the stacks in a standard manner.

Advantages:

The proposed protocols can offer the applications and the end to end data transmission services in an efficient and a reliable manner. By using these protocols we can achieve high transmission rates with a continuous connectivity at constant transmission latency. By using this method easily configure the networks for our research purposes in a inexpensive manner.

 Download  Seminar Report on Delay Tolerant Networking.

ECE Project Report on IP over SONET

Introduction to IP over SONET:

IP over SONET technology is deployed in IP backbone networks to provide efficient, cost-effective, high-speed transport fast routers. SONET is an ANSI standard which provides rates, formats and optical parameter specifications for optical interfaces ranging from 51 Mb/s to 9.8 Gb/s capacities. SONET provide: Highly survivable/reliable networking because of standardized switching architecture, multivendor inter networking  interoperability standards, and well-thought-out and standardized transport operations and maintenance capabilities. SONET   multiplexing combines low speed digital signals with required overhead to form Synchronous Transport Signal Level One (STS-1).

SONET was providing huge bandwidth, but there was not enough IP traffic to make use of it. Bandwidth can be used fully by mapping IP traffic into higher volume of ATM traffic before transporting it via SONET. ATM is a packet switched technology which can handle both variable-rate traffic and fixed-rate traffic. ATM is based on transmitting all information in small fixed- size packets i.e., 53-bytes long called cells.  ATM is not the most efficient way to transport IP traffic and future demands for bandwidth cannot be met, because it has too much overhead. For this reason users prefer to use ATM when sending audio, video, voice and other IP data types requiring quality of service. So, IP over SONET can carry all types of traffic and is ideal for data-only networks, because it does not use ATM. Thus eliminates a layer of network stack and has lower overhead. All these considerations has become much more important to carriers as volume of IP traffic has increased and ISPs and large corporate users have begun sending IP directly over SONET as fast, cost-effective, reliable, fault tolerant, and easily configurable alternative. 

SONET has following features:

  1. Network management
  2. Protection
  3. Bandwidth Management
  4. Network Simplification
  5. Mid-fiber meet

The problem with IP over SONET is, it uses entire link between the routers, and no other traffic could be multiplexed with the IP packets. Network provider goal is to provide IP transport solutions with low-cost and value- added services: QOS control, guaranteed service availability, and dynamic bandwidth allocation. Since the nature of data being transported over networks change, the demand for IP over SONET is increasing. Because of this increasing demand, network carriers are looking for efficiency and speed that IP over SONET offers. So IP has become dominant internetworking protocol.  Many carriers already have SONET in their network infrastructures, so adopting IP over SONET is a cost effective for them. 

Download  ECE Project Report on IP over SONET .

Seminar Topic and Report on Speaker Recognition System

Introduction to Speaker Recognition System  Seminar Topic:

The process of speaker recognition is to identify the voice of the speaker and this process is divided into two parts identification of speaker and recognition of speaker. After verifying the voice waves the access to the services is controlled. These are most used in the areas such as financial companies, telephone shopping, database services, computers remote access and information areas. Presently most of the customers have started using the voice recognition cards with sprints.

This technology of speaker recognition has become an important part for the creation of novel services as these make life easier and more secured. The other important place where the technology of speaker recognition used is in the Forensic department. This technology has made prominent place in the field of research from so many decades. The main feature of the speech recognition is the extraction of the categorization problem and this is to reduce the input vector dimensionally.

Later the raised cosine window was called as the Hamming window. Hamming window’s equation is discussed below, the value of the window function is zero for the chosen interval. Which means the function that is zero in other places and stable in the interval is called as the rectangular window. The main aim of the speaker recognition must be capable of eliminating the distribution probability of the vectors. This deals with the quantizing and distribution of the feature vectors.

As storing of each and every vector is not possible it is suggestible to quantize the features of the vector and this is called as the vector quantization and this is the process of considering huge vectors for the production of the small vectors for the distribution. 

Download  Seminar Topic and Report on Speaker Recognition System .

SMS through Temperature Monitoring Project Abstract

Introduction to SMS through Temperature Monitoring Project:

Now days the technology is growing at very fast rate. Scientists are developing many technical things such as sensors, which developing at very fast rate in the world. The waste development in sensors will go to bring a revolutionary impact around the world. Now a day’s technology has became a part of human life. After few all works of human being will be done by machines which will sensors in them which will sense the need of human being. Today various types of sensors are present in the world which can be classified as wired and wireless sensors. Wired sensors use wire for connection and the other i.e wireless doesn’t uses wire for connection.

            The wired sensors read the information from the system and stores there values in some storage device. The presence of internet all around the world makes the sensor possible to transfer the values fro source location to the destination but there still some places in the world which lacks internet access. In research on present eco system, it has found that the buildings are too far from each other so it takes a long hour to transfer.

If the distance is more than the sensors values which are available in it, going to be reduce the needed values. Due to the increase in the cell phone service, the use of short message service (SMS) is also increased. Users transfer the data by using this service that is SMS from a remote location very easily.

This data can be transferred to the sever which make the data easily accessible from person who have access to the internet from a computer anywhere and at anytime. It generally uses GSM modem which is connected to microcontroller which has temperature sensor and connected to LCD.

 Download  SMS through Temperature Monitoring Project Abstract .

Latest ECE Seminar Topic on Smart Card for Network Security

Introduction to Seminar Topic on Smart Card for Network Security:

Network technology means preventing the misuse of computer by providing some security. Now a days it is not very difficult to hack any website or our personal ID. To prevent such hackers we must be careful while providing security to our personal ID. We must use hard and long password with too many combinations of alphabets and small letters and capital letters. We must change it regularly and avoid setting any name as password as they are very easy to detect.

We should use the cryptography technique for providing security to our text. It is a technique that converts our text in to the unreadable text for any outsider.

Smart card looks like a simple card but it consist of embedded microprocessor under the gold pad. It also has the identification of the user. This 8 bit microprocessor has three types of memory for different purpose like: ROM, non-static RAM and EEPROM. Their cards are made of silicon chip which cannot be bend. This smart card consists of key stored with the help of cryptography technique.

Attacks:The key is stored in the EEPROM of the microprocessor so it can be erased with small voltage drop across the microcontroller of the card. Because of these reasons some security sensors are used that create alarm in such conditions. They are called logical attacks.If we cut the chip from the card with the help of knife then we dip into the nitric acid until the silicon surface is visible. Then it can also be attacked directly or exposing the EEPROM in the UV light and so on. These types of attack are physical attack.

Now the ATM magnetic cards are being replaced by smart card for greater security as they can store the information of any person also.

 Download  Latest ECE Seminar Topic on Smart Card for Network Security.

ECE Seminar Topic on Network Security Using Cryptography

Introduction to Network Security Using Cryptography  Seminar topic:

Kerberos is known for network authentication system or authorization system that can be implementing between any networks which may be even unauthenticated. Kerberos works on the principle of Key distribution model produced by theNeedhamand Schroeder. The communication over the networks needs to be proving identity by any user to avoid the replay attacks. It has been using the Cryptography systems like DES for maintaining Data stream integrity and Secrecy. Data stream integrity is to identify the modifications and Secrecy is to avoid the unauthorized accessing. 

The process involves the changing of the plain text into Cipher text which is called Encryption. Whereas the opposite is called Decryption. Cryptography is followed with four principles:

  1. Confidentiality is to maintain the information hiding to un-authorized accessing.
  2. Integrity is the key that aims to unchanged information during storage or transit between the users.
  3. Non-repudiation is to clear the intentions of the developer or sender of the information that cannot be neglected.
  4. Authentication of the sender and the receiver to prove one another identity to access information. 

The above mentioned procedures and protocols are known as Cryptography. 

Kerberos has mainly users and services as principals along with tickets which is used to prove one another and secret or private Cryptographic key for safe communication to other principal. The ticket is a chain of some hundred bytes that are embedded in other end network protocol which allows applying the protocol to make confirm the identity of the principals. 

Kerberos is an idea for mutual authentication and safe communication within the principals in the open network with the help of providing the secret keys to other principal to navigate via network. Kerberos are not involved in password validation so care has to be taken for the individual network to access.

Download  ECE Seminar Topic on Network Security Using Cryptography .

Microcontroller Project on Wireless Technology Based Consumer Application Display System

Introduction to Microcontroller Project on Wireless Technology Based Consumer Application Display System:

Our Project is aimed to come out with an idea of “Data Receiving” with no loss, by implementing of current Wireless technology. The wireless technology we are relied on is ZIGBEE Sensor Network which is explored for accurate and real data receiving. 

The Current System   

The current technology of advertising display system is based on opto-electronic devices, in which the motion digital video is projected on to the screen from a somehow closed or fully covered conveyance or transportation.

The theory of this project here is to eliminate reasons in improper display of the motion video at transportation area. The modular features of invention for easy seeing and nearer of a force display system in the transit area consists of parallel wire mechanism and high speed motion makes the view high standard. 

We have come up with the topic of how to regulate issue of the force display system run by parallel wire mechanism. We have done enough research on developing the quality or performance of display systems by proposing Control laws. The systems performance experimentally  be proved in terms of  quantity, stated that Proposed control laws supports the more acceleration and less reaction force compare to any force display systems. 

The current system is normally based on an Electronic display system, more commonly to the Database Driven Electronic Display System. The Multilanguage Self- Contained Unmanaged Database- Driven Real Time Digital Advertising Display System has dramatically changed the advertising style of Products of the Retail sector with an idea of aiming audiences directly through Display systems in transit areas. This creates to promote the products easily and in a very efficient manner with in limit finance and time. 

The Retail Sector had been using the corporate databases such as Oracle, Microsoft SQL for their promotion of products in the Stores and outside by hoardings. The Multilanguage Self- Contained Unmanaged Database- Driven Real Time Digital Advertising Display System uses high speed internet for their communications and advertisements with upgraded information of the product displayed online. 

Proposed System 

Our innovation is based on the “Wireless Technology based consumer application display system” to reduce the difficulties of Consumer application display and complicated system. Our project is consisting of three units. First is Application User Unit, second is User Display Device 1 and third is User Display Device 2

The Application User Unit is containing ZIGBEE, a Receiver or Transmitter, and PC a server. 

The User Display device 1 and User Display device 2 are the modules that work like a receiver units with user friendly ZIGBEE modules consisting of Microcontrollers that collects data from modem and passes it on LCD display. 

Software specifications include Keil version 3 and Flash magic. Hardware specifications include ZIGBEE module, microcontroller, LCD display, and keyboard.

  Download  Microcontroller Project on Wireless Technology Based Consumer Application Display System.

Electrical seminar topic and Report on Neural Network Applications

Introduction to Neural Network Applications Seminar Topic:

This paper discussed about the importance of chaos theory and how to use the chaos theory in system load forecasting.  Short-term load forecasting is completed by using the load data of Shaanxi province power grid of China.  Artificial Neuron Network (ANN) structure is determined by embedding dimension. ANN is established based on chaos theory and applied into the power system Train and forecast can be done with the help of improved back propagation algorithm (BP) which developed based on genetic algorithm (GA). 

Overview: 

Chaos thery is used to analyze the characters of load time series and employed in power system forecasting.  Many non-linear time series forecasting models are developed based on chaos theory and those are used for power short-term load forecasting. Few of the popular models which are applied to power system load forecasting are regression model, fuzzy logic model, expert system model, time series model and grey-theory model. 

Application and Analysis: 

Standard BP neural network method uses uncertain structure of BP neural network in order to forecast the next-hour load. The results yield by BP is not very accurate and also not so quick.  But by using the chaotic characters of the power load time series, the structure of BP network will get determined then the accuracy in BP network results will get improved. BP neural network model using chaotic characters of the power load time series is more effective in short-term power load forecasting when compared to that of classical standard BP neutral network model. 

Conclusion: 

 All the characters of chaos are exists in power load time series and these are chaotic and nonlinear.  Precision and accuracy of a power load forecasting system is increased greatly by introduced chaos theory in power load forecasting system. BP neural network, developed based on chaos theory which is used for forecasting to in order to increase the accuracy and the training rate.

Download Electrical seminar topic and Report on Neural Network Applications .