Showing posts with label ecepapers. Show all posts
Showing posts with label ecepapers. Show all posts

Thursday, 23 October 2014

REMOTE CONTROLLED METAL DETECTING ROBOT



The aim of this project is to control the operation of movement of a remote controlled robot to detect metals and to view the images surrounding the robot.

The main objectives of this project are to use radio frequency bands.

Ø  The movement of robot is controlled by the transmission of signals through air.
Ø  The receiver senses these signals from the air..
Ø  This mini project makes use of the transmitter and receiver at 433MHz that is available at low cost hence making it very complicated.
Ø  The Radio Frequency based control proves to be more advantageous compared to the Infrared Red based control that limits the operating range to only a few meters of distance.

Ø  When the robot is moving on a surface, the system produces a beep sound when metal is detected. This beep sound will be transmitted to remote place. Simultaneously the images around the robot will be transmitted to remote place. User can monitor the images and metal detection alarms on Television.


Thursday, 22 November 2012

Data Allocation Using Genetic Algorithm for MPSoC Systems with Hybrid Scratch-Pad Memory-paper presentation


Data Allocation Using Genetic Algorithm for MPSoC Systems with Hybrid Scratch-Pad Memory

Zhi Chen, Meikang Qiu,JianweiNiu2, Zhonghai Lu, Yongxin Zhu
Dept. of Electrical and Computer Engineering, University of Kentucky, Lexington, KY 40506, USA
School of Computer Science and Engineering, Beihang University, Beijing100191, China
Dept. of Electronic Systems, KTH Royal Institute of Technology, Stockholm, Sweden
School of Microelectronics, Shanghai Jiao Tong University, Shanghai 200240, China

Abstract

Hybrid on-chip memory architecture has gathered muchattention recently. However, if not well managed and optimized, the memory access will be a major energy and time consumer for this architecture. This paper presents a novel hybrid Scratch-Pad Memory (SPM) comprising SRAM and Magnetic RAM(MRAM) for MultiProcessor System-on-Chip(MPSoC) architectures. To reduce memory access costs and write activities on MRAMs, we propose a novel adaptive genetic algorithm to efficiently allocate data to each memory unit of the hybrid SPM. Experimental results show that the proposed genetic algorithm can reduce write operations to MRAMs by 28.33% and energy consumption by 15.32% on average.

Wednesday, 21 November 2012

Computer Network Routing with a Fuzzy Neural Network-paper presentation

Computer Network Routing with a Fuzzy Neural Network

Behzad Mahjour Shafiei, Mohammad Amin Saeed, Farshid Iranmanesh, Fariborz Iranmanesh 

Kerman Branch, Islamic Azad University, Kerman, Iran. 
   
               Behzad Mahjour Shafiei, Mohammad Amin Saeed, Farshid Iranmanesh, Fariborz Iranmanesh;
               Computer Network Routing with a Fuzzy Neural Network


ABSTRACT 

The growing usage of computer networks is requiring improvements in network technologies and
management techniques so users will receive high quality service. As more individuals transmit data through a
computer network, the quality of service received by the users begins to degrade. A major aspect of computer networks that is vital to quality of service is data routing. A more effective method for routing data through a computer network can assist with the new problemsbeing encountered with today’s growing networks.

Tuesday, 20 November 2012

Geographically Distributed Virtual Test Environments for Distributed Embedded Control System using Model-based Design - paper presentation


Geographically Distributed Virtual Test Environmentsfor Distributed Embedded Control System using Model-based Design

Yukikazu Nakamoto  Tadahiro Ito  Kenji Yabuuchi
Tatsunori Osaki
Graduate School of Applied Informatics, University of Hyogo, Japan
OCTOPATH Corporation, Japan
Fujitsu Ten Limited, Japan
nakamoto AT ai.u-hyogo.ac.jp

Abstract

Embedded control systems such as automotive andavionics systems form large-scale distributed ones which
consist of numerous CPUs and devices, including plants and various hardware components. The complexity of such systems has increased for sophisticated control using numerous types of sensor data. Meanwhile, market pressures lead to reducing development periods for the large-scale distributed embedded control systems. A model-based design becomes popular to solve the above problems, especially automotive industries. In this paper, we describe a distributed virtual test environment based on the model based design. The key features are communication middle-ware to enable large-scale distributed test with integrating
the programs in geographically distributed sites and control program execution with models of multiple abstractionlevels in the model-based design.

Saturday, 10 November 2012

Neural Network Trainer through Computer Networks -paper presentation

2010 24th IEEE International Conference on Advanced Information Networking and Applications

Neural Network Trainer through Computer Networks 

Nam Pham†, Hao Yu†, Bogdan M. Wilamowski†, Fellow, IEEE 
†Electrical and Computer Engineering, Auburn University, Alabama, US 

Abstract - 

This paper introduces a neural network training tool through computer networks. The following algorithms, 
such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Levenberg Marquardt (LM) and its 
improved versions are implemented in two different computing methods, traditional forward-backward 
computation and newly developed forward-only computation. The training tool can handle not only conventional multilayer perceptron (MLP) networks, but also arbitrarily connected neuron (ACN) networks. There are several benefits that make this network training tool desirable. Network training process 
can be used remotely through any network connection or any operating system can be used to access the network training tool, making the application operating system independent. Also much less installation time and configuration time is required because the training tool locates on one central machine. Many users can access at the same time. Users can train and see the training results directly through networks. 
And the most important thing is the software producers can protect their intellectual property when network browsers are used as user interface

Friday, 9 November 2012

Performance Evaluation of TOFU System Area Network Design for High-Performance Computer Systems -paper presentation


Performance Evaluation of TOFU System Area Network Design for High-Performance Computer Systems 

P. BOROVSKA, O. NAKOV, S. MARKOV, D. IVANOVA, F. FILIPOV 
Computer System Department 
Technical University of Sofia 
8 Kliment Ohridski Boul., 1756 Sofia 
BULGARIA

Abstract

Switch and system area network architectural designs are significantly influenced by next generation high-performance computer systems and supercomputer technology. As technology evolves, this impact on interconnection network needs to be considered and reevaluated. In this paper we evaluate a communication performance of a high-speed switch and TOFU system area network design by means of network simulations using OMNET++ simulator. The models under investigation have been verified on the basis of parallel program implementations (C++, MPI) on IBM Blade Center

Key-Words: -  Switch Architectural Design; TOFU System Area Networks; Simulation Model; OMNET++, Communication Performance 


Tuesday, 6 November 2012

FPGA: An Efficient And Promising Platform For Real-Time Image Processing Applications -paper presentation


Proceedings of the National Conference on  
Research and Development in Hardware & Systems 
(CSI-RDHS 2008) 
June 20-21, 2008, Kolkata, India 

FPGA: An Efficient And Promising Platform For Real-Time Image Processing Applications 

 Sparsh Mittal, Saket Gupta and S. Dasgupta
 E&C Department, Indian Institute of Technology Roorkee, sparsuch@iitr.ernet.in
 E&C Department, Indian Institute of Technology Roorkee,  freshuce@iitr.ernet.in
 E&C Department, Indian Institute of Technology Roorkee, sudebfec@iitr.ernet.in

Abstract 

Digital  image  processing  (DIP)  is  an  ever  growing  area  with  a variety of applications including medicine, video surveillance, and many  more..    To  implement  the  upcoming  sophisticated  DIP 
algorithms and to process the large amount of data captured from sources  such  as  satellites  or  medical  instruments,  intelligent high speed  real-time  systems  have  become  imperative.  Image processing  algorithms  implemented  in  hardware  (instead  of software)  have  recently  emerged  as  the most  viable  solution  for improving  the  performance  of  image  processing  systems.  This paper  reviews  the  relative  merit  of  FPGA  over  softwares  and DSPs  as  a  platform  for  implementation  of  DIP  applications. Our goal  is  to  familiarize  applications  programmers  with  the  state  of the art in compiling high-level programs to FPGAs, and to survey the  relevant  research  work  on  FPGAs.  The  outstanding  features which  FPGAs  offer  such  as  optimization,  high  computational density,  low cost etc, make them an increasingly preferred choice of experts in image processing field today. 

Power Reduction in VLSI chips by Optimizing Switching Activity at Test Process, Architecture & Gate Level-paper presentation


Power Reduction in VLSI chips by Optimizing Switching Activity at Test Process, Architecture & Gate Level

                                                              Chetan Sharma 
                  (M.Tech-VLSI Design, JSS Academy of Technical Education, Noida, India) 

Abstract: 

Due to increasing the demand of low power VLSI test process, it is necessary to consider all 
small factors which affect on total power dissipation. This paper gives the reduction of power by 
advancement in test pattern generation methods and gives the complete flow of data using switching 
suppression blocks at architecture and gate level.

JPEG steganography: a performance evaluation of quantization tables

         2009 International Conference on Advanced Information Networking and Applications

JPEG steganography: a performance evaluation of quantization tables

Adel Almohammad
Brunel University
adel.almohammad@brunel.ac.uk 
Gheorghita Ghinea
 Brunel University
george.ghinea@brunel.ac.uk
Robert M. Hierons
Brunel University
rob.hierons@brunel.ac.uk

Abstract 

The two most important aspects of any image-based steganography system are the imperceptibility 
and the capacity of the stego image. This paper evaluates the performance and efficiency of using 
optimized quantization tables instead of default JPEG tables within JPEG steganography. We found 
that using optimized tables significantly improves the quality of stego-images. Moreover, we used this 
optimization strategy to generate a 16x16 quantization table to be used instead of that 

Saturday, 3 November 2012

COMBINATION OF JPEG ALGORITHM AND WATERMARKING FOR INCREASING THE QUALITY AND COMPRESSION RATIO - paper presenation


COMBINATION OF JPEG ALGORITHM AND WATERMARKING FOR INCREASING THE                          QUALITY AND COMPRESSION RATIO

1Muhammad Subali
2 Sarifuddin Madenda

              1 Gunadarma University(subali@staff.gunadarma.ac.id) 
2 Departement d’informatique et d’igenierie,UQO,Quebec(m.sarifuddin@uqo.ca)

Abstract

Jpeg formation is compression model of color image which is establish as an ISO and usually public
used. Jpeg compression technique started by RGB to YCbCr colour transformation process. And each color component Y, Cb, and Cr compressed by Discrete Cosine Transform (DCT) process,. Quantizing and Coding step by step. Bits of result coding from each component of Y, Cb and Cr combined one group in series.This paper explained compression technique can be optimized JPEG result compression by bit insertion of coding result from one color component to matrix quantization from another color component. The experiment shows that the same compression quality compression technique which develop in this paper have ratio of compression about 10.99% until 154% better then JPEG codec, and for the same compression ratio this technique give better quality compression. Keywords:Image Compression, JPEG,Watermarkning,MIG

Tuesday, 23 October 2012

Performance-aware Security of UnicastCommunication in Hybrid Satellite Networks-paper presentation


Performance-aware Security of Unicast Communication in Hybrid Satellite Networks

Ayan Roy-Chowdhury Electrical and Computer Engineering Institute for Systems Research University of Maryland College Park, MD 20742 Email: ayan@umd.edu John S. Baras Electrical and Computer Engineering Institute for Systems Research University of Maryland College Park, MD 20742 Email: baras@isr.umd.edu


Abstract—In this work, we address the performance problems that arise when unicast security protocols IPSEC andSSL are applied for securing the end-to-end communication inhybrid satellite networks. Satellite networks use TCP and HTTPperformance-enhancing proxy servers to overcome the adverse effect of the large delay-bandwidth product of the satellite channel. However, the proxy servers cannot function when IPSECand SSL are used for secure unicast communication in hybridsatellite networks. We therefore propose the use of the LayeredIPSEC (LES) protocol as an alternative to IPSEC for networklayer security. We describe a modification to the Internet Key Exchange protocol if dynamic key establishment is needed for Layered IPSEC. For application-level security of web browsing with acceptable end-to-end delay, we propose the Dual-modeSSL protocol (DSSL) to be used instead of SSL. We describe
how LES and DSSL protocols achieve the desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly. Through simulation studies, we
quantify the improvement in performance that is achieved using our proposed protocols, compared to traditional IPSEC and SSL.

WIRELESS SENSOR NETWORK SECURITY ANALYSIS-paper presenattion

International Journal of Next-Generation Networks (IJNGN),Vol.1, No.1, December 2009

WIRELESS SENSOR NETWORK SECURITY ANALYSIS

Hemanta Kumar Kalita and Avijit Kar
Department of Computer Engineering, Jadavpur University, Kolkata, India
hemanta91@yahoo.co.in
Department of Computer Engineering, Jadavpur University, Kolkata, India
avijit.kar@gmail.com

ABSTRACT
The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds,and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources. Cost constraints and the need for ubiquitous, invisible deployments will result in small sized, resource-constrained sensor nodes. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We proposesome of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. We also propose some countermeasures against these threats in Wireless Sensor Network.

Tuesday, 16 October 2012

NEUROMORPHIC VLSI DESIGN USING BAT ECHOLOCATION - paper presentation

NEUROMORPHIC VLSI DESIGN USING BAT ECHOLOCATION 1. ABSTRACT: Birds and bats have long been the envy of engineers, demonstrating fast, accurate sensing and agile flight control in complex, confined 3D spaces, all in a tiny package. Their ability to fly rapidly through cluttered forest environments in search of food far exceeds the capabilities of any existing man-made system. The technology that is developing and propose to bring to this application domain is neuromorphic
VLSI. For more than a decade, a growing number of VLSI researchers worldwide have been developing a common toolbox of hybrid analog and digital VLSI techniques to mimic the signal processing of neural systems. This effort has spawned many projects in smart vision sensors and systems: silicon cochleae,

Network security -paper presentation-3

Network Security Abstract. This paper will give you a basic understanding of security threats and give you an overview of how to defend your network. It will not make specific recommendations as to what your security policy should be. Every network in every organization has different security needs, and security strategies must be adapted to each specific situation. Because it’s not always easy to
distinguish between threats to individual users and threats to networks, this paper will cover a simple range of threats from simple scams to large-scale, denial-of service attacks. 1. Introduction. In today’s world it’s impractical if not impossible to isolate your network. Networks are interconnected and usually feature a full-time connection to the Internet, which can be a dangerous place. Although the vast majority of Internet users are honest and benign, there are a few who, motivated by greed or maliciousness, will

paper presentation on Network Security

ABSTRACT Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become “wired”, an increasing number of people need to understand the basics of security in a networked world. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by
the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together. Network security is becoming more and more important as people spend more and more time connected.

Wednesday, 10 October 2012

5G COMMUNICATION TECHNOLOGY

technology is getting more and more advance now a days. Every day is like a birth day for a new technology. Since the invention of mobile phones each decade seems like we are stepping in to new era of technology. Firstly, we only used wired telephones, then we used cell phones and now here are Smart phones. We all like to have a smart phone in our pocket. This modification of technology is not a result of one night but it has taken many years to establish it. Earlier we have 2G, then there comes 2.5 G and after that 3G, 3.5G and now we are even using 4G(Not for India).What is the benefit of using these smart phones and what is the next in Generation of technology. Here is your answer. It is 5G.

Telephone companies are not using 5G term for this new technology instead they are considering it to say advance 4G. Here in this article I want to share some knowledge about this New Generation technology.
What is 5G ?
Every “G” added to technology refers to advancement in previously available technology. In the same way 5G is the new Generation of mobile and telephony technology. It is said that this will give high bit rate transfer with low costs. It will give high peak rate than the previous one. It is assumed that it will offer low infrastructure deployment cost and high capacity of simultaneous users.
What 5G has for users
As of now, there is a time for 5G to come in the market. But researchers are working to take it to the level which users could not even assume now. Some of the features that 5G will give are listed below
1. High bit transfer rate
2. Near about 1 GBPS speed
3. Low traffic rates
4. Better coverage
5. Better security for users
6. High resolution
7. Remote Diagnostic
8. Larger bandwidth


Some differences between 4G and 5G
Right now, 5G is purely an assumption while users are experiencing 4G. There is much to experience in 4G but 5G promise us to give much better features then 4G. I am giving some differences between 4G and 5G
1. While 4G has bandwidth of 5MHz, it is supposed that 5G would have bandwidth up to 20 MHz (appx.).
2. 4G does not support multiple user while 5G will have this feature.
3. 4G offers some type of security for user but 5G would offer higher security.
4. 5G would have higher bandwidth than 4G
5. 5G would be cheaper than 4G
6. There would be high resolution in 5G than 4G.



Researches going on to be implemented in 5G
1. Researchers are working so that the user can simultaneously be connected to several wireless access technologies and can switch between them.
2. Instead of Internet Protocol version 4(IPv4) it will use IPv6.
3. It would have user centric network concept.

There are many other research going on. We hope to see them soon.
Smart phones expected to use 4G and 5G Technology

There are a few smart phones which promises to have 5G in future. In Apple iPhone5 and Nokia morph we would experience this technology. But you have to wait for them.
While if you want to experience a smart phone with 4G technology you can go any of the smart phone written below

1. Apple iPhone 4s
2. Nokia Lumia 900
3. HTC Titan 2

Sunday, 7 October 2012

L atest Paper Presentation Topics for ECE

Paper presentation is a way to express and present innovations by students in front of others and helps the students to gain the confidence of presenting it in front of the audience. In depth knowledge of the paper presentation topic is highly essential for the students while presenting papers. Choosing the correct topic plays the key role for its successful presentation. This article helps the students of ECE to find topics for their paper presentation based on the areas given below.

Friday, 5 October 2012

DIGITAL JEWELLERY paper presentation

DIGITAL JEWELLERY

MADE POSSIBLE USING WIRELESS COMMUNICATIONS

ABSTRACT

Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery adorns the body, and has very little practical purpose. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence i.e., Digital jewelry. Digital jewellery can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence.

Thursday, 4 October 2012

Embedded Systems Automation of car Paper Presentation

EMBEDDED SYSTEMS AUTOMATION OF CAR
The technical Brilliance and Developments in different fields has led to a drastic change especially in the communication field. Devices with intelligence rule the world. Imbibing intelligence to these devices is through a system called “EMBEDDED SYSTEMS”. It is the evolution or further development of the computing system. Its applications provide marvelous opportunities for ingenious use of computer technology. Almost every new system introduced is an example of Embedded System. These systems are more intelligent and autonomous.    

Bluetooth Based Smart Sensor Networks-paper presentation

ABSTRACT
“Dragging the world towards wireless galaxy”
Various sensors are already in a broad use today as part of different devices or as standalone devices connected to a network usually to monitor industrial processes, equipments or installations.
The advancements in technology, wireless communications have enhanced development of small, low power and low cost devices. Such devices when organized into a network, present a powerful platform hat can be used in many interesting applications.
Bluetooth is a low cost, short-range, wireless technology with small footprint, low power consumption and reasonable throughput. Bluetooth wireless technology has become global technology specification for “always on” wireless communication not just as a point-to-point but was a network technology as well.
The kernel of this paper, deals about an implementation of bluetooth based sensor networks.
Introduction