ECE Seminar Topic on Eye Writer

Introduction to ECE Seminar Topic on Eye Writer:

Eye tracker is a device which measures the movement and positions of eye. Eye writer glasses and the open source software translate it to lines on screen. There are several eye trackers available and the most popular one in which employs video imaging method for tracking the movement of eye. This paper discusses the working model of eye writer and its applications in various fields.

Brief on eye writer:

From the 18th century the research are going on for tracking the movement of eye. Eye trackers measure the rotations of eye and there are three methods for measuring the rotation of eyes. In the first method we use a contact lens embedded with a mirror or a sensor which calculates the rotation of eyes.

We can use a optical sensor which measure the movement of eye.  The other method to calculate the movement of eye is to place electrodes around the eye which captures the electric potentials by which we can measure the rotation of eye. We will employ a bright pupil or a dark pupil for measuring the movement of eye. The difference among the bright pupil and dark pupil occur by placing the illumination source with respect to the optics.

Applications:

These are very helpful for handicapped persons where they can send emails and convey their information on a computer screen. These are used in research purposes for exploring various fields of science and technology.

Download ECE Seminar Topic on Eye Writer  .

An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction

Introduction to An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction:

The main objective of this paper is to give secure transaction to the customers over internet. Generally, as the technology is advancing and globalization is rapidly growing.e-commerce came into existence ,i.e the products and services are sold over internet. Many of the frauds are being done over credit cards when the payment is being done.

To avoid this fraud, this theory has developed.IP technology is widely used by various devices. IP technology uses HTTP protocol, but this protocol uses high power. To, overcome all this disadvantages, a new protocol called constrained application protocol has been developed.

Brief into design and working

COAP is a web transfer protocol developed for resource constrained networks. It uses REST architecture. REST architecture allow applications to rely on loosely coupled services which can be shared and reused and are controlled by the server and identified by a Universal Resource Identifier (URI). It uses some methods used by HTTP.

COAP supports additional functionalities such as multicast, asynchronous communication and subscriptions. The packet overhead compression has drastically reduced the power consumption and has increased the power life time. This is being used in many web applications also. The main aim of the application is to allow the user to access data directly from a web browser.

The complexity of gateway is reduced and the system scalability is increased. Hence, by using this safe transaction can be done by the customers.

Download An Efficient Iris Authentication Using Chaos Theory Based Cryptography for E-Commerce Transaction .

Mechanical Seminar Topic On Power Generation from Speed Breakers through Air Compression Method

Introduction to  Power Generation from Speed Breakers through Air Compression Method Seminar Topic:

The main aim of this paper is to generate power from speed breakers. As we know electricity plays an important role in human life. Each and every equipment rely’s on electricity. In our day to day life, on roads we do come across many speed breakers. Many vehicles pass through them daily. This is to say that we can generate electricity from these speed breakers without using any resources such as coal, water etc. This electricity being generated from speed breakers is eco-friendly and can help mankind.

Brief into design and working:

Generally, speed breakers are made of tar. Here in case of this, speed breakers are made of vibrating type i.e springs. The speed breakers are in trapezoid shape. When the vehicle passes through them the spring is compressed and the air at the base will be compressed. In pneumatic design, it consists of cylinder, nozzle.

The cylinder  has the FRL joined to that. The pressure inside this FRL makes the nozzle to open and this converts the energy into  kinetic energy. This kinetic energy is given to the impeller. The alternator which is present at the impeller acts as an electric generator, this works under the faraday’s principle.

The mechanical energy generated is given as input to the alternator and it converts into electrical energy. The electrical energy generated is about 10kw. Casing is the most important one. If the casing is properly done, this can avoid many problems. 

Download Mechanical Seminar Topic On Power Generation from Speed Breakers through Air Compression Method .

Artificial Vision For Blind People Seminar Report

Introduction to Artificial Vision For Blind People Seminar Topic:

The main aim of this paper is curing blindness. Blindness is the one which is more feared by public. As the technology is advancing the researchers are in a effort to illuminate the dark world of blind. The scientists had made commitment for developing artificial vision system which cures blindness upto some extent.

These researchers are inspired from another device cochlear implant which has successfully restored hearing of thousands of people.  Retina plays a important role in human eye. it consists of rods ,cones and ganglion cells. Information received by rods and cones are transferred to brain by ganglion cells. In the absence of these rods and cones, blindness occurs. This concept laid to the developing of artificial vision system by artificial cones and rods.

Brief into design and working

After carrying many experiments, they found that electrical currents can simulate cells. They developed artificial silicon retina which is very tiny at a diameter of 2mm. This is placed in the eye without disturbing any other parts. The artificial silicon retina consists of 3500 microscopic solar cells through which light is converted into electrical pulses.

The solar cells which are present generates the needed power. The main parts of this system are miniature video camera, a signal processor, and the brain implants. Light enters the camera and data is sent to the wireless wallet sized computer. the computer processes and displays it on the LED screen on goggles .The led screen reflects the image to the artificial silicon retina chip. This chip converts  image into signals that brain can understand.

Download Artificial Vision For Blind People Seminar Report .

Latest ECE Seminar Topic 2012 on Advanced Communication through Flesh Redtacton

Introduction on Advanced Communication through Flesh Redtacton:

The main objective of this paper is to give an idea of how our body can act as transmission media. Communication becomes difficult in a busy place where numbers of Bluetooth devices are found. As the technology is advancing day by day redtaction is developed which is different from wireless and infrared, The transmission can be done by using redtaction receiver. Once the human body comes in touch with the receiver, transmission path is formed. Using the body as path for communications more beneficial.

Brief into working :

Redtacton technology does not depend upon electromagnetic or light waves to carry data, it makes use of weak electric fields. The photonic electric field sensor in the transmitter induces the weak electric field on the body. The weak electric field generated is not same as the natural electric field which dissipates into earth.

The receiver comprises of photonic electric field sensor and electro optic crystal. Use of this photonic electric field can measure stand-alone contacts without being influenced by grounds and long distance communication is possible. This receiver senses the electric field generated through sensors and data is transferred. By using this technology broadband communication can also be done at rate of 10 mbps.

It is proven that Redtaction technology is excellent in terms of communication performance and user convenience when compared to wireless. The data can be transferred securely in this technology and even if the data is encrypted there is possibility to decrypt it if we pick it up.

Download Latest ECE Seminar Topic 2012 on Advanced Communication through Flesh Redtacton .

ADHOC Networks Seminar Report

Introduction to ADHOC Networks Seminar Topic:

The main objective of this paper is to give an idea of adhoc networks. As we already there is a tremendous growth in usage of internet and the computing is also cheaper earlier. Generally personal networks which we come across daily are wired and have complicated topology. Due to this adhoc networks are being developed. This network does not require any router. In ad hoc networks base stations are not present and any two nodes are allowed to communicate directly if they are close to each other. Many of the companies have been offering their product s and services due to this.

Brief into design and working

The routing protocols used in this adhoc networks are table driven and source initiated. Table driven protocol maintain updated information from each and every node where as source initiated is  demand driven i.e it routes only when asked by source node only. There are two types of architectures available in wireless networks. In Stand alone architecture (adhoc mode) all the devices are communicating with each other in peer to peer connection mode whereas in centrally coordinated architecture all devices are connected to wireless network with the help of access point i.e router.

Advantages and Disadvantages:

The adhoc networks are easy to set up when compared to that of conventional networks. These networks are highly Portable and reliable. The adhoc networks do not require any additional equipment like wires and devices like hub and routers. The main disadvantage of this network is that if computer is connected to the Internet gateway then it should be always turned on.

Download ADHOC Networks Seminar Report .

Seminar Report on PID Controller

Introduction to PID controller

Proportional-Integral-Derivative controller or PID controller are widely used in the industrial control applications. These are preferred due to its robust characteristics against changes at the system model. Unlike other controllers, PID controller can adjust process inputs based on the history and rate of change of the error signal, which gives more accurate and stable control.  There are many methods such as first order, second order and tuning methods. But, all general methods can be applied for control design of PID controller.

Brief into working of PID controller

The PID controller compares the  output value (y) with the reference set point (r) value . Then the error signal is generated. The error signal is then processed and the control signal is calculated such that the output reaches desired value. There are three parameters the Proportional, the Integral and Derivative values which are mainly involved in the calculation procedure.

The Proportional value is used to determine the reaction to the current error; the Integral value is used for the reaction based on the sum of recent errors, and the Derivative value for determining the reaction based on the rate at which the error has been changing. If these three parameters are not chooses correctly, then this leads to the instability.

To avoid these tuning methods must be applied. Manual tuning method is done if the system has to be online and this does not require any math’s, Ziegler Nichols method is the proven method and used when the system has be online.  Software tools method is the constituent tuning method, the system can be online or offline. Cohen-coon method is the offline method and can be used only for first order processes.

Download Seminar Report on PID Controller .

Adaptive Equalizer For Digital Systems

Introduction to Adaptive Equalizer For Digital Systems:

This project aims at reducing the effects caused due to multi paths in mobile communications. In non line sight communication the signal does not go in a direct path and it gets effected due to various factors as it under goes deviation. We propose adaptive equalization method for the reduction of multi path signals at the receiver. In this paper we will discuss the working model of adaptive equalizer.

Brief into working of adaptive equalizer:

Due to deviation in the signals the multiple copies are signals are received at the receiver so it becomes difficult to trace out the original signal, by which the accuracy of the signal gets reduced. By using an adaptive equalizer the received signal can be nullified so as to reduce the noise components. Channel response at the receiver is estimated by using a pilot carrier or a training sequence. Approximation inverse filter is used to isolate the distortions occurred in the signal. A matched filter is used to boost up the signal as it undergoes through various processes. Adaptive filter is always inserted in front of the channel so as to compensate the signal. To make the incoming response equal we will use a feedback supply for the channel.

Advantages:

By employing adaptive equalizer the accuracy of the system gets increased.  As the original signal can be traced easily we can increase the quality of the signal. This is an efficient technique for reducing the effects due to scattering and distortions. Thus we can conclude that adaptive equalization technique is the best method to overcome the multipath signals in mobile communication 

Download Adaptive Equalizer For Digital Systems .

Long Flashover Arrester Seminar Topic and Report

Introduction to Long Flashover Arrester Seminar Topic:

Long flashover arrester is a voltage control device which controls the voltage fluctuations in power lines when lightening occurs. This device is connected in the power lines poles so as to protect the power lines from the electric discharges occurred during lightening. In this paper we will discuss the causes of lightening and the working model of long flashover arrester.

Working model of Long flashover arrester:

Electric discharge occurs due to lighting and there are two possibilities for occurrence of lighting. In direct stroke the electric discharge occurs directly from the cloud to the overhead line. Due to presence of charged cloud electro statistically induced charges occur in indirect stroke. The long flash over arrester works on the principle of power arc flow. The long flashover arrester consists of two cables made of semiconductor material and they are arrested in such a way so as to form three flashover modules. To protect the power line from lightening the flashover is mounted and connected parallel to the insulator on the pole.

Applications and future scope:

This cost effective device for protecting the power lines from high voltages, the resistors are capable of arresting the voltage fluctuations in all the three phase lines. These voltage arrester can also be used in lager industrial equipment where voltage fluctuations occur frequently. If there are more number of voltage lines we can increase the flash over modules as per the requirement and it can operate at higher voltages.

Download Long Flashover Arrester Seminar Topic and Report .

Latest ECE Seminar Topics 2012 On SQUID

Introduction to super conducting quantum interfacing device Seminar Topic:

Squid is sensitive magnetometer which is used to detect extremely weak electromagnetic signals. The construction of squid based of the principle of Josephson junction. In this paper we will discuss the construction details and working model and applications of squid. It can detect signals which are 100 billion times weaker than a electromagnetic signals.

Construction and working of Squid:

The squid is made up of lead alloy where a tunnel barrier is sandwiched between a base electrode and a top electrode of the lead alloy. A josephson junction consists of superconductors separated by a thin insulator which allows the electrons to pass through them. The josephson junction is mounted on the conducting ring so as to achieve superposition which makes the electrons to pass in both directions. The voltage changes occur between the ring and conducting when applied current with an external oscillator. These voltage fluctuations are measured so as to measure the values. Due to resistive property of the device we can measure the minute changes accurately.

Applications of Squid:

These devices are used in medical fields. MEG is device which is based on the principle of squid which is used to measure the minute neural changes in the brain. These are used to trace out the path of the drugs injected in the body. The devices are employed to take MRI of the body.  The squid devices are used in exploiting minerals and to find changes in the earth’s gravitation to predict the chances of earthquakes.

Download Latest ECE Seminar Topics 2012  On SQUID .