Saturday, November 20, 2010

Humanoid robots used for surveillance

                          Today is a world of new scientific invention. As this paper includes the use of humanoid robots in the field of security. There is a wide range of use of robot like in restaurant, in spying; in medical .our main objective is to bring this humanoid robot in the field of surveillance. My paper will give immense use to the army personnel those who are survellancing in the remote areas of the India. Now question arises why only humanoid robots used for the surveillance purpose? Now for this answer take the example of Mumbai terror attack the terrorist have done the damage for 72 hrs.now the N.S.G doesn’t know how many terrorist are there in hotel Taj .for this reason the robots are designed in a such a way to counter such terror activities .
This paper presents some modification in the robot i.e. to use the metal detector, infrared cameras for sensing in the very dim light or no light .temperature detector for detecting the human inside the building. In my paper I have used 10 mega pixel camera 360 rotation to get the clear cut view of the inside building .so this will help the army personnel to counter strike with the terrorist. There will be fewer casualties to army as well as human being. My motive for bringing this paper to you that there is a great scope of enhancement in the field of robotics for the security inside the country. The robot will also carry insurgency operation in country for countering terrorism. Human-Robot has recently received considerable attention in the academic community, in labs, in technology companies, and through the media. Because of this attention, it is desirable to present a survey of HR to serve as a tutorial to people outside the field and to promote discussion of a unified vision of HR within the field.


  Download :     Full Report (.doc)
read more...

Tunable spiral inductors

                           A tunable micro-electromechanical systems integrated inductor with a large-displacement electro-thermal actuator is discussed here. Based on a transformer configuration, the inductance of a spiral inductor is tuned by controlling the relative position of a magnetically coupled short-circuited loop. Theoretical studies are backed by a variety of fabricated and measured tunable inductors that show a 2 : 1 inductance tuning ratio over a wide frequency range of approximately 25 GHz. In addition, the maximum and minimum quality factors of the tunable inductor are measured to be 26 and 10 which is high compared to previous designs. They can considerably extend the tuning capabilities of critical reconfigurable circuits such as tunable impedance matching circuits, phase shifters voltage controlled oscillators, and low noise amplifiers.
  Download :     Full Report (.doc)
read more...

Petrogasoline Purity Tester

                           Recent years have witnessed dramatic progress in the design and development of fiber optic sensors as detection of chemical species is important in many industrial and chemical processes in addition to environmental control. Fiber optic sensors offer several advantages over conventional chemical sensing systems, specifically immunity to electromagnetic interference, possibility of distributed sensing over long lengths of fiber and their capability for safe operation in hazardous environments. Fiber optic chemical sensors include refractometric` sensors and evanescent wave absorption sensors, more recently indicator mediated, in which the evanescent field of guided light is absorbed by the chemical of interest.

Adulteration of petroleum products especially petrol and diesel has become a serious problem. Kerosene is the most important domestic fuel for economically weaker sections of society and hence is heavily subsidized. The large differences in the prices of petrol, diesel and kerosene, the easy availability of kerosene and the fact that it is miscible in petrol and diesel, make the unhealthy and unethical practice of adulteration of petrol and diesel. This not only results in less availability of kerosene to the poor, but results in severely damaging automotive engines and increased motor vehicle emissions which are a cause of major concern to environmental pollution.

  Download :     Full Report (.doc)
read more...

Microwave Superconductivity

                           Superconductivity is a phenomenon occurring in certain materials generally at very low temperatures, characterized by exactly zero electrical resistance and the exclusion of the interior magnetic field (the Meissner effect). It was discovered by Heike Kamerlingh Onnes in 1911. Applying the principle of Superconductivity in microwave and millimeter-wave (mm-wave) regions, components with superior performance can be fabricated. Major problem during the earlier days was the that the cryogenic burden has been perceived as too great compared to the performance advantage that could be realized. There were very specialized applications, such as low-noise microwave and mm-wave mixers and detectors, for the highly demanding radio astronomy applications where the performance gained was worth the effort and complexity. With the discovery of high temperature superconductors like copper oxide, rapid progress was made in the field of microwave superconductivity.

This topic describes the properties of superconductivity that can be exploited in microwave and mm-wave technologies to yield components with appreciable performance enhancement over conventional systems. Superconducting signal transmission lines can yield low attenuation, zero-dispersion signal transmission behavior for signals with frequency components less than about one tenth the superconducting energy gap. No other known microwave device technology can provide a similar behavior. Superconductors have also been used to make high speed digital circuits, josephsons junction and RF and microwave filters for mobile phone base stations.

  Download :     Full Report (.doc)
read more...

3D TELEVISION

Three-dimensional TV is expected to be the next revolution in the TV history. They implemented a 3D TV prototype system with real-time acquisition transmission, & 3D display of dynamic scenes. They developed a distributed scalable architecture to manage the high computation & bandwidth demands. 3D display shows high-resolution stereoscopic color images for multiple viewpoints without special glasses. This is first real time end-to-end 3D TV system with enough views & resolution to provide a truly immersive 3D experience.Japan plans to make this futuristic television a commercial reality by 2020as part of abroad national project that will bring together researchers from the government, technology companies and academia. The targeted "virtual reality" television would allow people to view high definitionimages in 3D from any angle, in addition to being able to touch and smell the objects being projected upwards from a screen to the floor.

Three-dimensional TV is expected to be the next revolution in the TV history. They implemented a 3D TV prototype system with real-time acquisition transmission, & 3D display of dynamic scenes. They developed a distributed scalable architecture to manage the high computation & bandwidth demands. 3D display shows high-resolution stereoscopic color images for multiple viewpoints without special glasses. This is first real time end-to-end 3D TV system with enough views & resolution to provide a truly immersive 3D experience.

  Download :     Full Report (.doc)    Presentation(.pptx)
read more...

Friday, November 19, 2010

Phishing

                          In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes.

There are many variations on this scheme. It is possible to Phish for other information in additions to usernames and passwords such as credit card numbers, bank account numbers, social security numbers and mothers’ maiden names. Phishing presents direct risks through the use of stolen credentials and indirect risk to institutions that conduct business on line through erosion of customer confidence. The damage caused by phishing ranges from denial of access to e-mail to substantial financial loss.

This report also concerned with anti-phishing techniques. There are several different techniques to combat phishing, including legislation and technology created specifically to protect against phishing. No single technology will completely stop phishing. However a combination of good organization and practice, proper application of current technologies and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. Anti-phishing software and computer programs are designed to prevent the occurrence of phishing and trespassing on confidential information. Anti-phishing software is designed to track websites and monitor activity; any suspicious behavior can be automatically reported and even reviewed as a report after a period of time.

This also includes detecting phishing attacks, how to prevent and avoid being scammed, how to react when you suspect or reveal a phishing attack and what you can do to help stop phishers.

  Download :     Full Report (.doc)
read more...

Wednesday, November 10, 2010

Green Cloud

                          Cloud computing is offering utility oriented IT services to users world wide. It enables hosting of applications from consumer,scientific and business domains. However data centres hosting cloud computing applications consume huge amounts of energy,contributing to high operational costs and carbon footprints to the environment. With energy shortages and global climate change leading our concerns these days, the power consumption of data centers has become a key issue. Therefore,we need green cloud computing solutions that can not only save energy,but also reduce operational costs. The vision for energy efficient management of cloud computing environments is presented here. A green scheduling algorithm which works by powering down servers when they are not in use is also presented.

In 1969, Leonard Kleinrock , one of the chief scientists of the original Advanced Research Projects Agency Network (ARPANET) which seeded the Internet, said: “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of „computer utilities‟ which, like present electric and telephone utilities, will service individual homes and offices across the country.” This vision of computing utilities based on a service provisioning model anticipated the massive transformation of the entire computing industry in the 21st century whereby computing services will be readily available on demand, like other utility services available in today’s society. Similarly, users (consumers) need to pay providers only when they access the computing services. In addition, consumers no longer need to invest heavily or encounter difficulties in building and maintaining complex IT infrastructure.


  Download :     Full Report (.doc)
read more...

Mobile Adhoc Network (MANET)

                           The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time , without using any kind of fixed wired infrastructure. MNET are actually self organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration.

As for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission bandwidth battery power and CPU time and the requirement to cope with the frequent topological changes resulting from the mobility of the nodes. Nodes of a MANET cooperate in the task of routing packets to destination nodes since each node of the network is able to communicate only with those nodes located within its transmission radius R, while the source and destination nodes can be located at a distance much higher than R.

A first attempt to cope with the mobility is to use the specific techniques aimed to tailoring the conventional routing protocols to the mobile environment while preserving their nature. For this reason the protocol designed around such techniques are referred to as table-driven or proactive protocols. To guarantee that routing tables are up to date and reflect the actual network topology, nodes running a protocol continuously exchange route updates and re calculate paths to all possible destinations. The main advantage of the proactive protocols is that a route is immediately available when is needed for data transmissions.

A different approach in the design of the routing protocol is to calculate a path only when it is necessary for data transmission. These types of protocols are called as the reactive protocols or on-demand routing protocols. A reactive protocol is characterized by a path discovery procedure and a maintenance procedure. Path discovery is based on a query –reply cycle that adopts flooding of queries. The destination is eventually reached by the query an at least one reply is generated. Path discovery procedure is called when there is a need for data transmission and the source does not the path to the destination. Discovered paths are maintained by the route maintance procedure until they are no longer in used.

  Download :     Full Report (.doc)
read more...

Android

                          Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to write managed code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code.
The unveiling of the Android platform on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted to advancing open standards for mobile devices. When released in 2008, most of the Android platform will be made available under the Apache free-software and open-source license.


  Download :     Full Report (.doc)
read more...

Daknet

                          As a government representative enthusiastically talks about the new telephone for a village in remote rural India, a villager asks, “Who am I going to call? I don’t know anybody who owns a telephone.” Yet, despite this sensible observation, a phone is dutifully installed as part of the current government mandate to connect villages to neighbouring towns. Although some villagers do use the phone occasionally, most still travel sometimes days to talk to family or to obtain the forms and other data that citizens in developed nations can call up on a computer in a matter of seconds.

In short, the goal of “broadband connectivity for everyone” has been shelved in favor of cutting back to the minimum possible standard telephone service in the mistaken belief that this is the cheapest way to provide connectivity. This compromise is particularly tragic given recent advances in wireless technology, which make running a copper line to an analog telephone far more expensive than broadband wireless Internet connectivity. Rather than backpedal on the goal of connecting everyone, society should be thinking, How can we establish the kernel of a user network that will grow seamlessly as the village’s economics develop? In other words,what is the basis for a progressive, market-driven migration from government seed services- e-governance -to universal broadband connectivity that local users will pay for?
DakNet, an ad hoc network that uses wireless technology to provide asynchronous digital connectivity, is evidence that the marriage of wireless and asynchronous service may indeed be that kernel -the beginning of a road to universal broadband connectivity. Developed by MIT Media Lab researchers, DakNet has been successfully deployed in remote parts of both India and Cambodia at a cost two orders of magnitude less than that of traditional landline solutions. Villagers now get affordable Internet services-and they’re using them. As one man in a small village outside of New Delhi remarked, “This is better than a telephone!”

  Download :     Full Report (.doc)
read more...

Generalized Multiprotocol Label Switching (GMPLS)

                           The emergence of optical transport systems has dramatically increased the raw capacity of optical networks and has enabled new sophisticated applications. For example, network-based storage, bandwidth leasing, data mirroring, add/drop multiplexing [ADM], dense wavelength division multiplexing [DWDM], optical cross-connect [OXC], photonic cross-connect [PXC], and multiservice switching platforms are some of the devices that may make up an optical network and are expected to be the main carriers for the growth in data traffic.

Generalized MPLS (GMPLS) differs from traditional MPLS in that it supports multiple types of switching, i.e. the addition of support for TDM, lambda, and fiber (port) switching. The support for the additional types of switching has driven GMPLS to extend certain base functions of traditional MPLS and, in some cases, to add functionality. These changes and additions impact basic LSP properties, how labels are requested and communicated, the unidirectional nature of LSPs, how errors are propagated, and information provided for synchronizing the ingress and egress LSRs.

  Download :     Full Report (.doc)
read more...

Plastic Memory

                          A conducting plastic has been used to create a new memory technology which has the potential to store a mega bit of data in a millimeter- square device-10 times denser than current magnetic memories. This device is cheap and fast, but cannot be rewritten, so would only be suitable for permanent storage.

The device sandwiches a blob of a conducting polymer called PEDOT and a silicon diode between perpendicular wires.The key to the new technology was discovered by passing high current through PEDOT (Polyethylenedioxythiophene) which turns it into an insulator, rather like blowing a fuse .The polymer has two possible states- conductor and insulator, that form the one and zero, necessary to store digital data.However tuning the polymer into an insulator involves a permanent chemical change, meaning the memory can only be written once.

A new form of permanent computer memory which uses plastic and is much cheaper and faster than the existing silicon circuits was invented by Researchers at Princeton University working with Hewlett-Packard.This new memory technology is created by using a conducting plastic which has the potential to store a megabit of data in a millimeter-square device - 10 times denser than current magnetic memories.

This utilizes a previously unknown property of a cheap, transparent plastic called PEDOT - short for polyethylenedioxythiophene. The inventors say that data densities as high as a megabit per square millimeter can be possible. By stacking layers of memory, a cubic centimeter device could hold as much as a gigabyte and be cheap enough to compete with CDs and DVD.

  Download :     Full Report (.doc)
read more...

MAGNETO HYDRO DYNAMIC POWER GENERATION

When an electrical conductor is moved so as to cut lines of magnetic induction, charged particles in the conductor experience a force in a direction mutually perpendicular to the B field and to the velocity of the conductor. The negative charges tend to move in one direction, and the positive charges in the opposite direction. This induced electric field, or motional emf, provides the basis for converting mechanical energy into electricalenergy. In conventional steam power plants, the heat released by the fuel is converted into rotational mechanical energy by means of a thermo cycle and the mechanical energy is then used to drive the electric generator. Thus two stages of energy conversion are involved in which the heat to mechanical energy conversion has inherently very low efficiency.

Also, the rotating machine has its associated losses and maintenance problems. In MHD generation, electrical energy is directly generated from hot combustion gases produced by the combustion of fuel without moving parts. The conventional electrical machines are basically electro mechanical converters while an MHD generator is heat engine operating on a turbine cycle and transforming the internal energy of gas directly into electrical energy.

  Download :     Full Report (.doc)
read more...

Gasoline Direct Injection

In recent years, legislative and market requirements have driven the need to reduce fuel consumption while meeting increasingly stringent exhaust emissions. This trend has dictated increasing complexity in automotive engines and new approaches to engine design. A key research objective for the automotive engineering community has been the potential combination of gasoline-engine specific power with diesel-like engine efficiency in a cost-competitive, production-feasible power train. One promising engine development route for achieving these goals is the potential application of lean burn direct injection (DI) for gasoline engines. In carburetors the fuel is sucked due to the pressure difference caused by the incoming air. This will affect the functioning of the carburetor when density changes in air are appreciable. There was a brief period of electronically controlled carburetor, but it was abandoned due to its complex nature. On the other hand in fuel injection the fuel is injected into the air.

  Download :     Full Report (.doc)      Presentation (.ppt)
read more...
Related Posts with Thumbnails