Search UandiStar

Showing posts with label PAPER PRESENTATIONS. Show all posts
Showing posts with label PAPER PRESENTATIONS. Show all posts
0

IEEE 802.22 Document Presentation Format and template

  • Ravva Vamsi

  • Many of Students facing problem on how to present the document in seminars,
    So here we are giving the correct IEEE Format on how to present the document

    Click Here to See in a new Window

    1

    Soft Computing In Intelligent Multi-Modal Systems [Paper Presentation]

  • Ravva Vamsi

  • Paper Presentation on Soft Computing In Intelligent Multi-Modal Systems


    ABSTRACT:
    In this paper we will describe an intelligent multi-modal interface for a large workforce management system called the smart work manager. The main characteristics of the smart work manager are that it can process speech, text, face images, gaze information and simulated gestures using the mouse as input modalities, and its output is in the form of speech, text or graphics. The main components of the system are a reasoner, a speech system, a vision system, an integration platform and an application interface. The overall architecture of the system will be described together with the integration platform and the components of the system which include a non-intrusive neural network based gaze tracking system. Fuzzy and probabilistic techniques have been used in the reasoner to establish temporal relationships and learn interaction sequences.

    Download Full Paper: Click Here


    0

    Computer Viruses [Paper Presentation]

  • Ravva Vamsi

  • Paper Presentaion on Computer Viruses

    Abstract:
    Welcome! Viruses can seem mysterious but computer viruses are actually quite easy to understand.
    I'll give you the information you need know to make sure that your PC is safe from viruses and all the other threats that may damage your programs and data. In these pages I'll explain exactly what viruses are, how they work, and how to protect against them.
    Viruses are actually very simple. Once you understand exactly what they can and cannot do, it's much easier to take appropriate precautions. While we'll be spending most of our time talking about viruses, I'll also cover the threats that are much more likely than viruses to damage your programs and data. Although I'll occasionally touch on some rather esoteric or complex topics, you won't need to be a "techy" to understand this text or to find it useful in your day-to-day use of your computer. I will go one step at a time and I will explain all the concepts and jargon clearly before I use the terms. I'll also focus on practical information that will help you protect your PC. Everyone should benefit from reading these pages; those of you that are experts will be able to skip the background information, yet I will still explain everything clearly for those of you that are new to PCs.
    You may even be wondering if viruses are really worth worrying about at all. Do you think you're safe because you rarely download software or buy only from a trusted retailer? Are viruses really a serious threat to your PC or are viruses mostly hype? Let me begin by quickly putting this issue into perspective. Viruses and anti-virus programs are not really the mysterious, complex, and hard to understand software that many people consider them to be. Not only can these programs be understood by anyone, but these days, it's critical that we all fully grasp how they work so as to protect ourselves.

    Download Full Paper: Click Here


    0

    Artificial Intelligence [Paper Presentation]

  • Ravva Vamsi

  • Paper Presentation on Artificial Intelligence

    Abstract:
    Evidence of Artificial Intelligence folklore can be traced back to ancient Egypt, but with the development of the electronic computer in 1941, the technology finally became available to create machine intelligence. The term artificial intelligence was first coined in 1956, at the Dartmouth conference, and since then Artificial Intelligence has expanded because of the theories and principles developed by its dedicated researchers.
    Artificial Intelligence, or AI for short, is a combination of computer science, physiology, and philosophy. AI is a broad topic, consisting of different fields, from machine vision to expert systems.One of the most challenging
    approaches facing experts is building systems that mimic the behavior of the human brain, made up of billions of neurons, and arguably the most complex matter in the univers. Artificial Intelligence has come a long way from its early roots, driven by dedicated researchers.

    Download Full Paper: Click Here


    0

    Transparent Electronics

  • Ravva Vamsi

  • Paper Presentation on Transparent Electronics

    ABSTRACT:
    Transparent electronics is an emerging science and technology field focused on producing ‘invisible’ electronic circuitry and opto-electronic devices. Applications include consumer electronics, new energy sources, and transportation; for example, automobile windshields could transmit visual information to the driver. Glass in almost any setting could also double as an electronic device, possibly improving security systems or offering transparent displays. In a similar vein, windows could be used to produce electrical power. Other civilian and military applications in this research field include realtime wearable displays. As for conventional Si/III–V-based electronics, the basic device structure is based on semiconductor junctions and transistors. However, the device building block materials, the semiconductor, the electric contacts, and the dielectric/passivation layers, must now be transparent in the visible –a true challenge! Therefore, the first scientific goal of this technology must be to discover, understand, and implement transparent high-performance electronic materials. The second goal is their implementation and evaluation in transistor and circuit structures. The third goal relates to achieving application-specific properties since transistor performance and materials property requirements vary, depending on the final product device specifications. Consequently, to enable this revolutionary technology requires bringing together expertise from various pure and applied sciences, including materials science, chemistry, physics, electrical/electronic/circuit engineering, and display science.

    DOWNLOAD FULL PAPER: CLICK HERE

    2

    Nano Machines

  • Ravva Vamsi

  • Paper Presentations on Nano Machines

    Abstract:
           Nanotechnology is the manipulation of matter on the nanoscale. A nanometer is a very small measure of length-it is one billionth of a meter, a length so small that only three or four atoms lined up in a row would be a nanometer. So, nanotechnology involves designing and building materials and devices where the basic structure of the material or device is specified on the scale of one or a few nanometers. Ultimately, nanotechnology will mean materials and devices in which every atom is assigned a place, and having every atom in the right place will be essential for the functioning of the device.

    Download Full Paper: Click Here


    0

    Hi Fi Technology

  • Ravva Vamsi

  • Paper Presentation on Hi Fi Technology


    Abstract:
    This paper presents a sufficiently low bit rate Hi-Fi audio coding technique with low computation designed for transmitting real-time high-quality audio signal over wireless channel. This technique applies wavelet packet transform to decompose audio signal into subbands to eliminate redundant data using spectral and temporal masking properties. The encoded audio data is framed
    with some critical field is protected by channel coding to improve noise immunity when frames are transmitted wirelessly. Experimental results show that transparent CD-audio quality can be achieved at 80kbps encoding bit rate. Moreover, the proposed technique still offers near CD-audio quality when frames are transmitted over AWGN channel with BER below 10-5. These encouraging results clearly exhibit the superior features of our technique compared to others such as Ogg/Vorbis and MP3, which are ubiquitously employed nowadays.

    Download Full Paper: Click Here

    1

    Internet Protocol (IP) Security

  • Ravva Vamsi

  • IP Security


    ABSTRACT:


           IP security (IP sec) is a capability that can be added to either current version of the internet protocol (IPv4 or IPv6), by means of additional headers. IP sec encompasses three functional areas authentication, confidentiality and key management. Authentication makes use of HMAC message authentication code. Authentication mode can be applied to the entire original IP packet (tunnel mode) or to all of the packet except for the IP header (transport mode). Confidentiality is provided by an encryption format known as encapsulating security payload. Both tunnel and transport modes can be accommodated. IPSec defines a number of techniques for key management.

    Download Full Paper: Click Here

    0

    Digital Signal and Image Processing

  • Ravva Vamsi

  • Paper Presentation on Digital Signal and Image Processing

    Abstract:
    A signal is defined as any physical quantity that varies with time, space or any other independent variable or variables. It may be a function of one or more independent variables. The signal itself carries some kind of information available for observation.

    ANALOG SIGNALS: - The analog signals are continuous function of an independent                           variable such as time, space etc.

    DIGITAL SIGNALS:- A discrete signal is a function of a discrete independent variable, which is an integer. A digital signal is same as discrete signal except that the magnitude of the signal is quantized.

    Download Full Paper: Click Here

    0

    DATA COMPRESSION AND ENCODING USING COLORS

  • Ravva Vamsi

  • Paper Presentations on DATA COMPRESSION AND ENCODING USING COLORS

    Abstract:
    The coding formats available today like the barcodes have proved to be successful because of their various applications like coding of products by a manufacturer, coding of books by a publisher, etc. The continuous advancement in the sensors technology can provide advancement in the coding format. The improvement in color sensors technology can give rise to a better and efficient coding technique. One such method “color cells technology” is proposed and described in this thesis.
    Due to its advantages like the compactness, security, and efficiency, this code is well suited to be used as a substitute for all available codes like the barcode.
    In this paper, we provide some insight into color perception, measurement, specification, and look at couple of ways on how data can be produced by a color sensor. Then we study the designing of the color cells encoding technology and its decoding using color sensor and a method to compress data using colors.

    Download Full Paper: Click Here

    0

    Brain Gate System

  • Ravva Vamsi

  • Paper Presentation on Brain Gate System


    ABSTRACT:


             The mind-to-movement system that allows a quadriplegic man to control a computer using only his thoughts is a scientific milestone. It was reached, in large part, through the brain gate system. This system has become a boon to the paralyzed. The Brain Gate System is based on Cyber kinetics platform technology to sense,transmit,analyze and apply the language of neurons. The principle of operation behind the Brain Gate System is that with intact brain function, brain signals are generated even though they are not sent to the arms, hands and legs.The signals are interpreted and translated into cursor movements, offering the user an alternate Brain Gate pathway to control a computer with thought,just as individuals who have the ability to move their hands use a mouse.

            The 'Brain Gate' contains tiny spikes that will extend down about one millimetre into the brain after being implanted beneath the skull,monitoring the activity from a small group of neurons.It will now be possible for a patient with spinal cord injury to produce brain signals that relay the intention of moving the paralyzed limbs,as signals to an implanted sensor,which is then output as electronic impulses. These impulses enable the user to operate mechanical devices with the help of a computer cursor. Matthew Nagle,a 25-year-old Massachusetts man with a severe spinal cord injury,has been paralyzed from the neck down since 2001.After taking part in a clinical trial of this system,he has opened e-mail,switched TV channels,turned on lights.He even moved a robotic hand from his wheelchair. This marks the first time that neural movement signals have been recorded and decoded in a human with spinal cord injury.The system is also the first to allow a human to control his surrounding environment using his mind.
    DOWNLOAD FULL PAPER: Click Here

    0

    Air Brake Systems

  • Ravva Vamsi

  • Air Brake Systems

    Abstract:
         Air brakes are used in commercial vehicles, which require a heavier braking effort than that can be applied by the driver’s foot. The following layout shows the arrangement of the air braking systems in heavy vehicles. Compressed air from compressor passes through the unloader valve and maintains its pressure. This air is stored in the reservoir. From the reservoir it goes to the Brake Chambers through many brake valves. In the brake chamber this pneumatic force is converted into the mechanical force and then it is converted into the rotational torque by the slack adjuster, which is connected to S-cam. This torque applies air brakes. Pipelines connect the brake system components.
    DOWNLOAD FULL PAPER: Click Here

    2

    4G Technology

  • Ravva Vamsi

  • 4G Technology

    4G Technology
    ABSTRACT:
            Third-generation (3G) mobile networks face a new rival: so-called 4G. And, astonishingly, the new networks may even be profitable. Alvin Toffler, an eminent futurologist, once said, “THE FUTURE ALWAYS COMES TOO FAST, BUT IN THE WRONG ORDER”. The state of wireless telecoms is a classic example. Even as 3G mobile networks are being switched on around the world, a couple of years later than planned, attention is shifting to what comes next: a group of newer technologies that are, inevitably, being called Fourth Generation Mobile Networks (4G). 4G is all about an integrated, global network that's based on an open systems approach.

            The goal of 4G is to replace the current proliferation of core cellular networks with a single worldwide cellular core network standard based on IP for control, video, packet data, and VoIP. This integrated 4Gmobile system provides wireless users an affordable broadband mobile access solutions for the applications of secured wireless mobile Internet services with value-added QoS. This paper gives the reasons for the evolution of 4G, though 3G has not deployed completely. And then gives the information on the structure of the transceiver for 4G followed by the modulation techniques needed for the 4G. Later this gives the information about the 4G Processing .Finally concludes with futuristic views for the quick emergence of this emerging technology.

    DOWNLOAD FULL TECHNOLOGY: CLICK HERE

    0

    Paper Presentation on 3D PASSWORD

  • Ravva Vamsi

  • 3D PASSWORD

    Abstract:
                  Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.

                   Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

    DOWNLOAD FULL PAPER: CLICK HERE



    1

    Paper Presentation on MOBILE COMPUTING & NETWORK SECURITY

  • Ravva Vamsi

  • MOBILE COMPUTING & NETWORK SECURITY

    MOBILE COMPUTING & NETWORK SECURITY


    ABSTRACT:-
    The Internet has become an integral part of human society and business, and its full potential is as yet untapped. Internet related crimes are rapidly on the increase, with numerous cases of people illegally accessing private networks. The vulnerability of such networks was underlined when a group of hackers going by the name "Milworm" gained access to the B.A.R.C servers sometime ago. These threats pose an unprecedented challenge to lawmakers and enforcers. Likewise this throws open a new arena of challenge for Network engineers and designers. A sophisticated array of security measures is being used to keep the hackers at bay.
               The first line of defense against external threats to networks is a "Firewall". In this paper we mainly want to focus on how to design a safe network using firewall and what are the different firewalls that are present.


    Download Full Paper: Click Here

    0

    Paper Presentation on Embedded Systems

  • Ravva Vamsi

  • Paper Presentation on Embedded Systems

    Embedded Systems
    Abstract:
    Computers have evolved from few, huge mainframes shared by many people, and mini computers that were smaller but still shared to today’s PCs—millions in number, miniscule in size compared to the mainframes, and used by only one person at a time. The next generation could be invisible, with billions being around and each of us using more than one at a time. Welcome to the world of embedded systems, of computers that will not look like computers and won’t function like anything we’re familiar with.

    Download Full Paper: Click Here

    0

    Paper Presentation Artificial Intelligence & Learning Computers

  • Ravva Vamsi

  • Artificial Intelligence & Learning Computers

    Artificial Intelligence 

    Abstract:
    The term artificial intelligence is used to describe a property of machines or programs: the intelligence that the system demonstrates. Among the traits that researchers hope machines will exhibit are reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects. Constructing robots that perform intelligent tasks has always been a highly motivating factor for the science and technology of information processing. Unlike philosophy and psychology, which are also concerned with intelligence, AI strives to build intelligent entities such as robots as well as understand them. Although no one can predict the future in detail, it is clear that computers with human-level intelligence

    DOWNLOAD FULL PAPER: CLICK HERE

    1

    Paper Presentation on ANDROID TECHNOLOGY

  • Ravva Vamsi

  • Paper Presentation on ANDROID TECHNOLOGY

    ABSTRACT
                     The unveiling of the Android platform on was announced with the founding of the Open Handset Alliance, a consortium of 48 hardware, software, and telecom companies devoted to advancing open standards for mobile devices. Google has made most of the Android platform available under the Apache free-software and open source license.


               Android is a freely downloadable open source software stack for mobile devices that includes an operating system, middleware and key applications based on Linux and Java.

               Google developed Android collaboratively as part of the Open Handset Alliance, a group of more than 30 mobile and technology companies working to open up the mobile handset environment. Android's development kit supports many of the standard packages used by Jetty, and so, due to that fact and Jetty's modularity and lightweight footprint, it was possible to port Jetty to it so that it will be able to run on the Android platform.

              This paper on Android deals with the history of the Android, the early prototypes, basic building blocks of an android application and the features of the android.

    DOWNLOAD FULL PAPERS: CLICK HERE



    0

    MICROCONTROLLER BASED AUTOMATIC RAILWAY GATE CONTROL

  • Anonymous

  • MICROCONTROLLER BASED AUTOMATIC RAILWAY GATE CONTROL
    ABSTRACT:
    The objective of this paper is to provide an automatic railway gate at a levelcrossing replacing the gates operated by the gatekeeper. It deals with two things. Firstly, it deals with the reduction of time for which the gate is being kept closed. And secondly, to provide safety to the road users by reducing the accidents.
    By the presently existing system once the train leaves the station, the stationmaster informs the gatekeeper about the arrival of the train through the telephone. Once the gatekeeper receives the information,he closes the gate depending on the timing at which the train arrives. Hence, if the train is late due to certain reasons,then gate remain closed for a long time causing traffic near the gates.
    By employing the automatic railway gate control at the level crossing the arrival of the train is detected by the sensor placed near to the gate. Hence, the time for which it is closed is less compared to the manually operated gates and also reduces the human labour. This type of gates can be employed in an unmanned level crossing where the chances of accidents are higher and reliable operation is required. Since, the operation is automatic, error due to manual operation is prevented .
    Automatic railway gate control is highly economical microcontroller based arrangement, designed for use in almost all the unmanned level crossings in the country.

    For Complete Details MICROCONTROLLER BASED AUTOMATIC RAILWAY GATE CONTROL

    0

    MICROCONTROLLER BASED SOLAR TRACKING SYSTEM

  • Anonymous

  • MICROCONTROLLER BASED SOLAR TRACKING SYSTEM
    SYNOPSIS Objective:
    The objective of this project is to control the position of a solar panel in accordance with the motion of sun. Brief Methodology: This project is designed with solar panels, LDR, ADC, Microcontroller, Stepper Motor and its driving circuit. In this project two LDRs are fixed on the solar panel at two distinct points. LDR (Light Dependant Resistor) varies the resistance depending upon the light fall. The varied resistance is converted into an analog voltage signal. The analog voltage signal is then fed to an ADC. ADC is nothing but analog to digital Converter which receives the two LDR voltage signals and converts them to corresponding digital signal. Then the converted digital signal is given as the input of the microcontroller. Microcontroller receives the two digital signals from the ADC and compares them. The LDR signals are not equal except for normal incidence of sunlight. When there is a difference between LDR voltage levels the microcontroller program drives the stepper motor towards normal incidence of sunlight. 1) INTRODUCTION Renewable energy is rapidly gaining importance as an energy resource as fossil fuel prices fluctuate. At the educational level, it is therefore critical for engineering and technology students to have an understanding and appreciation of the technologies associated with renewable energy.
    One of the most popular renewable energy sources is solar energy. Many researches were conducted to develop some methods to increase the efficiency of Photo Voltaic systems (solar panels). One such method is to employ a solar panel tracking system .This project deals with a micro- controller based solar panel tracking system. Solar tracking enables more energy to be generated because the solar panel is always able to maintain a perpendicular profile to the sun’s rays. Development of solar panel tracking systems has been ongoing for several years now. As the sun moves across the sky during the day, it is advantageous to have the solar panels track the location of the sun, such that the panels are always perpendicular to the solar energy radiated by the sun. This will tend to maximize the amount of power absorbed by PV systems. It has been estimated that the use of a tracking system, over a fixed system, can increase the power output by 30% - 60%. The increase is significant enough to make tracking a viable preposition despite of the enhancement in system cost. It is possible to align the tracking heliostat normal to sun using electronic control by a micro controller. Design requirements are: 1) During the time that the sun is up, the system must follow the sun’s position in the sky. 2) This must be done with an active control, timed movements are wasteful. It should be totally automatic and simple to operate. The operator interference should be minimal and restricted to only when it is actually required. The major components of this system are as follows.

    For complete details MICROCONTROLLER BASED SOLAR TRACKING SYSTEM


    Subscribe