http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'human body'

Page  1 1

Updates found with 'human body'

CFD (Computational fluid dynamics) TITLES1. Flow control over airfoils using different shaped dimples2. Analysis of flow field across blunt fin with dimples –experimentation3. Aerodynamic characteristic and flow pattern on dimples structure of a sphere4. Numerical flow simulation for aircraft5. Analysis of surface augmentation of airfoil sections via flow visualization techniques6. Experimental and numerical investigations of a high performance co-flow jet airfoil7. Modelling & implementation of aerodynamic zero-lift drag into adapdt8. Cfd analysis on the main-rotor blade of a scale helicopter model using overset meshing9. Investigation of different airfoils on outer sections of large rotor blades10. Analysis of foils and wings operating at low reynolds numbers11. A computational study of the clap and fling aerodynamic mechanism12. Aeroelastic analysis of aircraft with control surfaces using cfd effects of winglets on a first-generation jet transport wing13. Aerodynamic analysis of the use of multi-winglets in light aircrafts14. Drag analysis of an aircraft wing model with and without bird feather like winglet15. Aerodynamic analysis of a blended-wing-body aircraft configuration16. Drag reduction in aircraft model using elliptical winglet17. Experimental investigation on the effect of multi-winglets18. Aerodynamic analysis of multi-winglets for low speed aircraft19. Aerodynamic efficiency study of modern spiroid winglets near-field tip vortex behind a swept wing model20. Analytic and experimental investigation of three-winglets21. Aerodynamics of wingtip sails22. Performance analysis of a wing with multiple winglets23. Cfd analysis of winglets at low subsonic flow24. The design of winglets for low-speed aircraft25. Design of multiple winglets to improve turning and soaring characteristics of angelo d’arrigo’s hangglider26. Numerical study of wingtip shed vorticity reduction by wing boundary layer control27. Numerical simulation of missile28. Heat transfer studies on blunt body at hypersonic speeds29. Simulation of flow over a wedge30. Design and develop a vortex generator based on boundary layer theory31. Designing and simulating flow across axisymmetric inlet32. Flow inside a vortex tube 33. Horizontal tail analysis (2-seat amphibious airplane)34. Analysis of the z-wing configuration35. Numerical analysis of injectors in rocket propellant36. Design and analysis of ramjet engine37. Cfd analysis of thrust vector control in nozzle38. Numerical investigation of aero spike nozzle39. Aerodynamic design study of ground vehicles40. Cfd analyses of ship hull forms41. Cfd prediction of loads on marine structures42. Design and analysis of a radial turbine with back swept blaring43. Evaluation of cfd sub-models for the intake manifold port flow analysis44. A vehicle body drags analysis using computational fluid dynamics45. Cfd calculation of convective heat transfer coefficients and validation46. A study of computational fluid dynamics applied to room air flow47. Cfd analysis of airflow and temperature distribution in buildings48. Assessment of turbulence modeling for cfd 49. Cfd analysis of diffuser50. Cfd analysis of engine valve 51. Nozzle design optimization for to reduce noise for turbo jet engine.52. Air and fuel flow interaction in combustion chamber for various injector locations53. Cfd investigation of airflow on a santro zing car by using fluent54. Cfd analysis of rocket nozzle55. Cfd analysis of supersonic exhaust in a scramjet engine56. aerodynamic design for bus/car vehicle57. Cfd analysis of exhaust manifold58. Cfd analysis of centrifugal fan59. Cfd analysis of intake manifold in si engines60. Cfd modeling of the automobile catalytic converter61. Cfd analysis of fluid flow and heat transfer in a single tube-fin arrangement of an automotive radiator62. Computational flow field analysis of a vertical axis wind turbine63. Cfd analysis of mixed flow pump impeller64. Cfd analysis of flow through venture meter to determine the coefficient of discharge65. Design improvements on mixed flow pumps by means of computational fluid dynamics66. Turbulent flow simulation in kaplan draft tube67. Flow analysis of marine propeller68. Design and analysis of globe valve as control valve using cfd software69. Numerical analysis of wax melting70. Conjugate heat transfer analysis in electronics devices
Send Enquiry
Read More
Mechanical Design Project Titles Mechanical Design project titles1. Design & analysis of connecting rod using aluminum silicon carbide 2. Design, animation & analysis of agricultural chipper 3. Design, animation & analysis of hybrid air engine 4. Design & analysis of support platform for small form factor pc in ruggedness testing environment 5. Analysis of noise reduction in rotor blade by using composite material 6. Modeling and analysis of screw engine 7. Stress analysis of washing machine drum 8. 3d thermal analysis of liquid propellant rocket with bell nozzle 9. Modeling & structural analysis of piston by using mg-sic 10. Modeling, analysis of tri axial tipper (different angle) 11. Design & analysis of poppet valve using composite 12. Failure analysis and optimization of planner machine horizontal mechanism 13. Design and analysis of industrial pneumatic trolley 14. Design and analysis of aluminum & copper connecting rod 15. Modeling & analysis of suspension steering system 16. Design and analysis of piston by composite materials 17. Design, animation & analysis of shredding, chipping and murching 18. Tribological analysis on disc brake pad 19. Dynamic balancing of rotor 20. Design & analysis of piston by using composite materials aluminum & magnesium 21. Modeling & analysis of motorized screw jack 22. Wear rate analysis of nano coated cutting tools 23. Design & analysis of composite leaf spring 24. Design & analysis of vacuum assisted wall climber 25. Design & analysis of splines elimination of starter motor shaft 26. Multipurpose agricultural machinery dynamic analysis for shaft 27. Modeling & analysis of leaf spring under dynamic load condition for tata sumo 28. Design & analysis of supercharging an engine using vehicle suspension 29. Analysis of failure mechanism of 90? Pipe elbow with in-plane and out-of plane loading 30. Analysis of cam shaft using composite material 31. Design and analysis of composite helical gear 32. Productivity improvement by automatic lifting 33. Modeling and structural analysis on flight wing by using ansys 34. Design and analysis of a hydraulic die ejector for a powder metallurgy component 35. Structural analysis of heavy vehicle chassis using honey comb structure 36. Study of wear behavior of aluminum based composite fabricated by stir casting technique 37. Design and stress analysis of four-post rollover protective structure of agricultural-wheeled tractor 38. Design and analysis of scissor jack 39. 3d modeling and analysis of micro gas turbine compressor blade 40. Design, animation & analysis of suspension steering system 41. Design & analysis of piston by using composite materials aluminum & magnesium 42. Design & analysis of stirling engine 43. Design and analysis of electromagnetic engine 44. Design and analysis of the windmill by the composite material 45. Design & analysis of hybrid magnetic bearing 46. Design & analysis of vacuum assisted wall climber 47. Redesign of bead extruder head assembly (analysis) 48. Design & analysis of screw engine 49. Design & analysis of composite gear wheel 50. Analysis of impeller using aluminum composite 51. Design & analysis of auto tilting mechanism in car 52. Design, modeling and analysis of a 3 stage epicyclic planetary reduction gear unit of a flight vehicle 53. Finite element analysis of normal and vented disc brake rotor 54. Design and analysis of rocker arm using composite material 55. Design and analysis of composite over bridge coupling 56. Modeling and analysis of drum brake 57. Analysis of adhesively bonded single lap riveted joint using ansys 58. Finite element analysis and natural frequency optimization of engine bracket 59. Analysis of helical coil compression spring for three wheeler automotive front suspension 60. Fatigue analysis of aluminum alloy wheel under radial load 61. Design and analysis of dumped body 62. Design and analysis of connecting rod using aluminum alloy 7068 t6, t6511 63. Finite element analysis and optimization of piston using cae tools 64. Design and analysis of three axis hydraulic modern trailer 65. Design and analysis of helical spring with shock absorber 66. Modeling and analysis of automobile chassis brackets 67. Design and analysis of disappearing car door 68. Design and analysis of wind car 69. Modeling and analysis of bicycle frame 70. Studies on friction stir welding aa2024 & aa6061 71. Stress analysis of mechanisms for trolley-cum-wheelchair 72. Stress analysis of seat backrest of car 73. Modeling and squeal analysis of brake disc rotor using ansys 74. Design and analysis of composite brake pedal: an ergonomic approach 75. Thermal analysis on composite materials 76. Modeling & analysis solar assisted air dryer 77. Analysis of electricity production mechanical system 78. Structural analysis of rivet joint 79. Design & analysis of special purpose lifting equipment 80. Finite element analysis of bus body structure 81. Static and vibration analyzing shock absorber power generation using piezo electric 82. Design & analysis of mechanical locking system for fuel flap 83. Design & analysis of coil spring with different materials 84. Analysis of frp composite cylinders 85. Modeling and analysis of a motorcycle wheel rim 86. Design and analysis of jet wind turbine blades 87. Comparative analysis of tractors trolley axle by using fea(by considering change in materials existing shape and size) 88. Design and analysis of electromagnetic suspension system 89. Design and analysis of crane hook assembly 90. Vibration analysis of leaf spring 91. Design and analysis of composite helical gear 92. Analysis of windmill blade by using composite material 93. Analysis of triangular air compressor with common combustion chamber 94. Transient analysis of disk brake by using ansys software 95. Impact analysis on front sub frame system using composite material 96. Design and analysis of automobile frame 97. Finite element analysis of the classic bicycle wheel 98. Design & analysis of quick lifting jack with gear arrangement 99. Study and analysis of aircraft fuselage body structure by using composite material
Send Enquiry
Read More
IEEE 2016 -2017 Embedded System Projects TitlesS.No Project Title Code1. Coexistence of ZigBee-Based WBAN and Wi-Fi for Health Telemonitoring Systems Wireless2. A Novel Wireless Multifunctional Electronic Current Transformer based on ZigBee-based Communication Wireless3. Configurable ZigBee-based control system for people with multiple disabilities in smart homes Wireless4. ZigBee network system for observing operating activities of work vehicles Wireless5. Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure Wireless6. A Mobile ZigBee Module in a Traffic Control System ` Wireless7. Energy Efficient Outdoor Light Monitoring and Control Architecture Using Embedded System Wireless8. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Wireless9. Energy-Efficient Intelligent Street Lighting System Using Traffic-Adaptive Control Wireless10. Development of a distributed disaster data and human life sign probe system Wireless11. Design and implementation of a home automation system for smart grid applications Wireless12. Milk products monitoring system with arm processor for early detection of microbial activity ARM13. Micro grid demonstration gateway for players communication and load monitoring and management Wireless14. WiFACT -- Wireless Fingerprinting Automated Continuous Training Wireless15. Lightweight Mashup Middleware for Coal Mine Safety Monitoring and Control Automation Wireless16. A smart wearable system for sudden infant death syndrome monitoring General17. Exoskeleton robots for upper-limb rehabilitation Robotics18. Wearable Camera- and Accelerometer-Based Fall Detection on Portable Devices GSM & GPS19. Innovation in Underwater Robots: Biologically Inspired Swimming Snake Robots Robotics20. GPS based autonomous vehicle navigation and control system GSM & GPS21. Real-Time Driving Monitor System: Combined Cloud Database with GPS IoT22. AgriSys: A smart and ubiquitous controlled-environment agriculture system IoT23. Building Smart Cities Applications using IoT andCloud-based Architectures IoT24. An IoT-based system for collision detection on guardrails IoT25. A vision-based teleoperation method for a robotic arm with 4 degrees of freedom Robotics26. Gesture control of drone using a motion controller Robotics27. Development of the Mobile Robot with a Robot Arm Robotics28. Milk products monitoring system with arm processor for early detection of microbial activity ARM29. Controller Area Network Assisted Grid Synchronization of a Microgrid With Renewable Energy Sources and Storage Electrical30. A Real-Time Embedded System for Monitoring of Cargo Vehicles, Using Controller Area Network (CAN) CAN31. Wireless biosensing network for drivers' health monitoring Biomedical32. Android4Auto: A proposal for integration of Android in vehicle infotainment systems Android33. A pulse measurement and data management system based on Arduino platform and Android device Android34. Remote control and instrumentation of Android devices Android35. “AUTOBOOK” The Messaging Machines (Using GSM and Arduino) Arduino36. Tracking and Theft Prevention System for Two Wheeler Using GSM and GPS GSM & GPS37. Bank Locker Security System Using RFID and GSM Technology GSM38. Design of Entrapment Escalation using GSM for Elevators GSM39. Distribution Line Fault Detection & GSM Module Based Fault Signaling System Electrical40. GSM & PIR Based Advanced Antitheft Security System Security 41. LPG Gas Weight and Leakage Detection System Using GSM GSM42. Android Based Women Tracking System Using GPS and GSM GSM & GPS43. Trespass Prevention System Using IOT IoT44. Automatic Vehicle Accident Detection and Rescue System GSM & GPS45. Design and Implementation of Integrated Mobile Operated Remote Vehicle IoT46. A Wearable Device for Continuous Detection and Screening of Epilepsy during Daily Life IoT47. Review of Automatic Detection and control of Disease for Grape Field Gen48. Environmental Condition Monitoring System for the Industries Gen49. Security Management Access Control System Gen50. Design and Development of Embedded based System for Monitoring Industrial and Environmental Parameters for Analyzing the Health of Human beings Gen51. Visual Surveillance Using Absolute Difference Motion Detection System Raspberry pi52. Automatic Irrigation System Using Internet of Things IoT53. Design of Embedded Irrigation System by Using WSN Wireless54. Vehicle Accident Prevention Using Assistant Braking System Gen55. Smart Transport Database Management System Gen56. Accident Alert Using ZIGBEE and GPS Wireless57. Controlling the Home Appliances Remotely Through Web Application Using ZIGBEE Wireless58. An optimized solar traffic control and alert system using wireless sensor networks Wireless59. Biometric Recognition Technique for ATM System Security60. Light Weight Access Control System for Constrained IOT Devices IoT61. Design of Prototype Model for Home Automation Using Wireless Sensor Networks Wireless62. Automated Sensor Network For Monitoring and Detection of Impurity In Drinking Water System General63. Automated Smart Trolley with Smart Billing Using Arduino Gene64. Embedded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor ARM65. Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor ARM66. Implementation of Embedded Web Server Using TCP/IP Protocol with Raspberry PI Raspberry PI67. Designing of Cleaning Robot Robot68. An Analysis of Network-Based Control System Using Controller Area Network (CAN) Protocol CAN69. Identify the Deterioration in Pipe by Using Wheel Operated Robot Robot70. RFID -G Based Navigation System For Visually Impaired To Work at Industry Gen71. New Generation ATM Terminal Services NFC72. A Wireless Sensor Interface for the Quantification of Tremor Using Off the Shelf Components Wireless73. Design and Implementation of Low-Cost SMS Based Monitoring System of Distribution Transformers GSM74. An Integrated Cloud-Based Smart Home Management System with Community Hierarchy Automation75. Home Outlet and LED Array Lamp Controlled by a Smartphone with a Hand Gesture Recognition Gesture76. Low-power wearable ECG monitoring system for multiple-patient remote monitoring Bio-medical77. Smart Real-Time Healthcare Monitoring and Tracking System using GSM/GPS Technologies Bio-medical78. The Design of Building Fire Monitoring System Based on ZigBee-WiFi Networks Wireless
Send Enquiry
Read More
JAVA PROJECTS ABSTRACT 2016-2017 A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT:Abstract :Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as ”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We also implemented a PassMatrix prototype on Android and carried out real user experiments to evaluate its memorability and usability. From the experimental result, the proposed system achieves better resistance to shoulder surfing attacks while maintaining usability. Existing Systems: In order to be more secure than the existing Android pattern password with entropy 18:57 bits against brute force attacks, users have to set two pass-images and use the graphical method to obtain the one-time login indicators. Like most of other graphical password authentication systems, PassMatrix is vulnerable to random guess attacks based on hot-spot analyzing. TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of numbers and upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. According to an article in Computer world, a security team at a large company ran a network password cracker and surprisingly cracked approximately 80% of the employees’ passwords within 30 seconds [3]. Textual passwords are often insecure due to the difficulty of maintaining strong ones.Proposed Systems: This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the entire scope of pass-images, PassMatrix offers no hint for attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. a lot of research on password authentication has been done in the literature. Among all of these proposed schemes, this paper focuses mainly on the graphical-based authentication systems. To keep this paper concise, we will give a brief review of the most related schemes that were mentioned in the previous section. The accuracy perspective focuses on the successful login rates in both sessions, including the practice logins. The usability perspective is measured by the amount of time users spent in each PassMatrix phase.Advantage:Two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. The habitual movements and the preference of users that the attacker may take advantage of to figure out the potential passwords. 1) Any communication between the client device and the server is protected by SSL so that packets or information will not be eavesdropped or intercepted by attackers during transmission. 2) The server and the client devices in our authentication system are trustworthy. 3) The keyboard and the entire screen of mobile devices are difficult to protect, but a small area (around 1:5 cm2) is easy to be protected from malicious people who might shoulder surf passwords. 4) Users are able to register an account in a place that is safe from observers with bad intention or surveillance cameras that are not under proper management.SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Network : LAN Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGAConclusion:With the increasing trend of web services and apps, users are able to access these applications anytime and anywhere with various devices. In order to protect users’ digital property, authentication is required every time they try to access their personal account and data. However, conducting theauthentication process in public might result in potential shoulder surfing attacks. Even a complicated password can be cracked easily through shoulder surfing. Using traditional textual passwords or PIN method, users need totype their passwords to authenticate themselves and thus these passwords can be revealed easily if someone peeks over shoulder or uses video recording devices such as cell phones.
Send Enquiry
Read More
JAVA PROJECTS ABSTRACT 2016-2017PASSBYOP: BRING YOUR OWN PICTURE FOR SECURING GRAPHICAL PASSWORDSABSTRACT: PassBYOP is a new graphical password scheme for public terminals that replaces the static digital images typically used in graphical password systems with personalized physical tokens, herein in the form of digital pictures displayed on a physical user-owned device such as a mobile phone. Users present these images to a system camera and then enter their password as a sequence of selections on live video of the token. Highly distinctive optical features are extracted from these selections and used as the password. We present three feasibility studies of PassBYOP examining its reliability, usability, and security against observation. The reliability study shows that image-feature based passwords are viable and suggests appropriate system thresholds—password items should contain a minimum of seven features, 40% of which must geometrically match originals stored on an authentication server in order to be judged equivalent. The usability study measures taskcompletion times and error rates, revealing these to be 7.5 s and 9%, broadly comparable with prior graphical password systems that use static digital images. Finally, the security study highlights PassBYOP’s resistance to observation attack—three attackers are unable to compromise a password using shoulder surfing, camera based observation, or malware. These results indicate that Pass- BYOP shows promise for security while maintaining the usability of current graphical password schemes.Existing System:TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force attacks. However, a strong textual password is hard to memorize and recollect. Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.. Proposed System: Various graphical password authentication schemes were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically. ConclusionWith the increasing trend of web services and apps, users are able to access these applications anytime and anywhere with various devices. In order to protect users’ digital property, authentication is required every time they try to access their personal account and data. However, conducting theauthentication process in public might result in potential shoulder surfing attacks. Even a complicated password can be cracked easily through shoulder surfing. Using traditional textual passwords or PIN method, users need totype their passwords to authenticate themselves and thus these passwords can be revealed easily if someone peeks over shoulder or uses video recording devices such as cell phones.
Send Enquiry
Read More
JAVA /DOT NET PROJECTS ABSTRACT 2016-2017 INVERTED LINEAR QUADTREE: EFFICIENT TOP K SPATIAL KEYWORD SEARCH ABSTRACT: In this paper, With advances in geo-positioning technologies and geo-location services, there are a rapidly growing amount of spatiotextual objects collected in many applications such as location based services and social networks, in which an object is described by its spatial location and a set of keywords (terms). Consequently, the study of spatial keyword search which explores both location and textual description of the objects has attracted great attention from the commercial organizations and research communities. In the paper, we study two fundamental problems in the spatial keyword queries: top k spatial keyword search (TOPK-SK), and batch top k spatial keyword search (BTOPK-SK). Given a set of spatio-textual objects, a query location and a set of query keywords, the TOPK-SK retrieves the closest k objects each of which contains all keywords in the query. BTOPK-SK is the batch processing of sets of TOPK-SK queries. Based on the inverted index and the linear quadtree, we propose a novel index structure, called inverted linear quadtree (IL- Quadtree), which is carefully designed to exploit both spatial and keyword based pruning techniques to effectively reduce the search space. An efficient algorithm is then developed to tackle top k spatial keyword search. To further enhance the filtering capability of the signature of linear quadtree, we propose a partition based method. In addition, to deal with BTOPK-SK, we design a new computing paradigm which partition the queries into groups based on both spatial proximity and the textual relevance between queries. We show that the IL-Quad tree technique can also efficiently support BTOPK-SK. Comprehensive experiments on real and synthetic data clearly demonstrate the efficiency of our methods.EXISTING SYSTEMS: The Existing Techniques for the problem of TOPK-SK query as well as some other variants of top k spatial keyword search. Then other spatial keyword related queries are introduced. Considering the indexing scheme used in existing works, we classify the indexes into two categories, namely Keyword First Index and Spatial First Index. we describe the shortcomings of the existing indexing approaches. the system throughout is poor if a large number of queries are processed one by one. Motivated by this, a large body of existing work have been devoted to investigate how to improve the system throughout with the batch query processing techniques such that a large number of queries in the queue can be processed with a reasonable delay.PROPOSED SYSTEMS: we propose a novel index structure, called inverted linear quadtree (IL- Quadtree), which is carefully designed to exploit both spatial and keyword based pruning techniques to effectively reduce the search space. An efficient algorithm is then developed to tackle top k spatial keyword search. the spatial keyword rank- ing query is proposed to rank objects based on a scoring function which considers the distance to the query location as well as the textual relevance to the query keywords. In the paper, we adopt the linear quadtree structure because the quadtree is more flexible in the sense that the index is adaptive to the distribution of the objects and we may prune the objects at high levels of the quadtree. Clearly, the new structure proposed satisfies the above-mentioned three important criteria of the spatial keyword indexing method.Advantages:An efficient algorithm is developed to support the top k spatial keyword search by taking advantage of the IL-Quadtree. We further propose a partition based method to enhance the effectiveness of the signature of linear quadtree.The main difference is that the construction of WIBR-tree takes advantage of the term frequencies of the keywords to facilitate the joint TOPK-SK queries.Disadvantages: In the GPS navigation system, a POI (point of interest) is a geographically anchored pushpin that someone may find useful or interesting, which is usually annotated with texture information (e.g., descriptions and users’ reviews). Moreover, in many social network services (e.g., Facebook, Flickr), a huge number of geo-tagged photographs are accu- mulated everyday, which can be geo-tagged by users, GPS- enabled smartphones or cameras with a built-in GPS receiver . These uploaded pho- tographs are usually associated with multiple text labels. As a result, in recent years various spatial keyword query models and techniquesHARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz RAM - 1GB Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGASOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5 Conclusion: The problem of top k spatial keyword search is important due to the increasing amount of spatio-textual objects collected in a wide spectrum of applications. In the paper, we propose a novel index structure, namely IL-Quadtree, to organize the spatio-textual objects. An efficient algorithm is developed to support the top k spatial keyword search by taking advantage of the IL-Quadtree. We further propose a partition based method to enhance the effectiveness of the signature of linear quadtree. To facilitate a large amount of spatial keyword queries, we propose a BTOPK-SK algorithm as well as a query group algorithm to enhance the performance of the system. Our comprehensive experiments convincingly demonstrate the efficiency of our techniques.
Send Enquiry
Read More
JAVA/ DOT NET PROJECT ABSTRACT 2016-2017 SBVLC: SECURE BARCODE-BASED VISIBLE LIGHT COMMUNICATION FOR SMART PHONES ABSTRACT:ABSTRACT: As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.EXISTING SYSTEM: Short-range communication technologies including near field communication (NFC) and 2D barcodes have enabled many popular smart phone applications such as contactless payments, mobile advertisements, and device pairing. Evolved from the RFID technology, NFC can enable reliable low-power communication between RF tags and readers. However, NFC requires additional hardware and has been supported by only a few smart phone platforms on the market. Recent studies have shown that NFC is subject to security vulnerabilities such as eavesdropping and jamming. Moreover, most existing barcode applications are based on a single barcode exchange, which is insufficient for establishing a secure communication channel. Whenever a user types in her password in a bank’s sign in box, the key logger intercepts the password. The threat of such key loggers is pervasive and can be present both in personal computers and public kiosks; there are always cases where it is necessary to perform financial transactions using a public computer although the biggest concern is that a user’s password is likely to be stolen in these computers. Even worse, key loggers, often root kitted, are hard to detect since they will not show up in the task manager process list.PROPOSED SYSTEM: Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption – almost every camera-enabled smart phone can read and process 2D barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. For instance, PayPal recently rolled out a barcode-based payment service for retail customers. As one of the most anticipated new features of I Phone 5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes. Proposes an iterative Increment Constrained Least Squares filter method for certain 2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the L-shaped finder pattern of their codes to estimate the standard deviation of the Gaussian PSF, and then restore the image by successively implementing a bi-level constraint, our approach to solving the problem is to introduce an intermediate device that bridges a human user and a terminal. Then, instead of the user directly invoking the regular authentication protocol, she invokes a more sophisticated but user-friendly protocol via the intermediate helping device. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. The goal is to keep user-experience the same as in legacy authentication methods as much as possible, while preventing key logging attacks.ADVANTAGE:• Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications.• As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification.• Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code.• Preventing key logging attacks.HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 14’ Colour Monitor. Mouse : Optical Mouse. Ram : 512 Mb.SOFTWARE REQUIREMENTS: Operating system : Windows 7 Ultimate. Coding Language : Java. Front-End : Eclipse. Data Base : SQLite Manger.CONCLUSION: As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration rate in mobile applications. As an alternative to NFC, 2D barcodes have been increasingly used for security-sensitive applications including mobile payments and personal identification. Every interaction between the user and an intermediate helping device is visualized using a Quick Response (QR) code. Preventing key logging attacks. Thus in our project password hacking, key logging and eavesdropping issues will be overcome.
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016-2017 INPUT-BASED DYNAMIC RECONFIGURATION OF APPROXIMATE ARITHMETIC UNITS FOR VIDEO ENCODING ABSTRACT: The field of approximate computing has received significant attention from the research community in the past few years, especially in the context of various signal processing applications. Image and video compression algorithms, such as JPEG, MPEG, and so on, are particularly attractive candidates for approximate computing, since they are tolerant of computing imprecision due to human imperceptibility, which can be exploited to realize highly power-efficient implementations of these algorithms. However, existing approximate architectures typically fix the level of hardware approximation statically and are not adaptive to input data. For example, if a fixed approximate hardware configuration is used for an MPEG encoder (i.e., a fixed level of approximation), the output quality varies greatly for different input videos. This paper addresses this issue by proposing a reconfigurable approximate architecture for MPEG encoders that optimizes power consumption with the goal of maintaining a particular Peak Signal-to-Noise Ratio (PSNR) threshold for any video. We propose two heuristics for automatically tuning the approximation degree of the RABs in these two modules during runtime based on the characteristics of each individual video. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2. EXISTING SYSTEM: MPEG has for long been the most preferred video compression scheme in modern video applications and devices. Using the MPEG-2/MPEG-4 standards, videos can be squeezed to very small sizes. MPEG uses both interframe and intraframe encoding for video compression. Intraframe encoding involves encoding the entire frame of data, while interframe encoding utilizes predictive and interpolative coding techniques as means of achieving compression. The interframe version exploits the high temporal redundancy between adjacent frames and only encodes the differences in information between the frames, thus resulting in greater compression ratios. In addition, motion compensated interpolative coding scales down the data further through the use of bidirectional prediction. In this case, the encoding takes place based upon the differences between the current frame and the previous and next frames in the video sequence. PROPOSED SYSTEM: Dynamic variation of the DA can be done when each of the adder/subtractor blocks is equipped with one or more of its approximate copies and it is able to switch between them as per requirement. This reconfigurable architecture can include any approximate version of the adders/subtractors. ADVANTAGES:• Optimize the power consumption DISADVANTAGES:• Power consumption is high SOFTWARE IMPLEMENTATION:• Modelsim• Xilinx ISE
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016-2017 LOW-POWER SYSTEM FOR DETECTION OF SYMPTOMATIC PATTERNS IN AUDIO BIOLOGICAL SIGNALS ABSTRACT:In this paper, we present a low-power, efficacious, and scalable system for the detection of symptomatic patterns in biological audio signals. The digital audio recordings of various symptoms, such as cough, sneeze, and so on, are spectrally analyzed using a discrete wavelet transform. Subsequently, we use simple mathematical metrics, such as energy, quasi-average, and coastline parameter for various wavelet coefficients of interest depending on the type of pattern to be detected. Furthermore, a multi-frequency spectrum-based analysis is applied to distinguish between signals, such as cough and sneeze, which have a similar frequency response and, hence, occur in common wavelet coefficients. Algorithm-circuit codesign methodology is utilized in order to optimize the system at algorithm and circuit levels of design abstraction. This helps in implementing a low-power system as well as maintaining the efficacy of detection. The system is scalable in terms of user specificity as well as the type of signal to be analyzed for an audio symptomatic pattern. We utilize multiplierless implementation circuit strategies and the algorithmic modification of multi spectrum computation to implement low power system in the 65-nm bulk Si technology. It is observed that the pattern detection system achieves about 90% correct classification of five types of audio health symptoms. We also scale the supply voltage due to lower frequency of operation and report a total power consumption of ∼184 µW at 700 mV supply. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2. EXISTING SYSTEM: In the past decade, rapid advancements in the development of low-power design methodologies have resulted in feasible designs for various wearable and implantable medical systems. Numerous wearable health monitoring systems have been proposed in order to deliver early warning of an impending health condition. These systems monitor various internal as well as external parameters related to the human health, such as temperature, heart rate, and so on. Apart from these parameters, it is well known that acoustic symptoms, such as cough, sneeze, belching, and so on, are early markers of serious health issues, such as influenza, diarrhea, and whooping cough, especially among children. If repetitive occurrence of these symptoms is detected in advance, it is possible for the patient or the healthcare personnel to commence remedial action prior to aggravation of the problem. In the literature, most of the developed systems detect a single acoustic symptom (cough or sneeze). The Kids Health Monitoring System (KiMS) proposed in uses wearable sensors and acoustic signal processing in order to provide health monitoring in children. Using the neural network-based processing, the KiMS classifies various symptoms and activities and, subsequently, transmits the record to a parent or doctor for further analysis.PROPOSED SYSTEM: We describe the proposed algorithm and the methodology used to modify the various computational tools in order to make it implementable into low-power hardware. In Section II, we had described the basics and justified the basis for selecting specific computational techniques used in developing this algorithm. The application of these computations is dependent on the characteristic property of the symptom to be detected. The algorithm methodology is shown in Fig. 1. We also describe the details along with the mapping of algorithm to specific signals as follows. ADVANTAGES:• efficient low-power health monitoring system DISADVANTAGES• High power for monitoring system.SOFTWARE IMPLEMENTATION:• Modelsim• Xilinx ISE
Send Enquiry
Read More
DOT NET PROJECTS ABSTRACT 2016-2017 AUTOMATIC DESIGN OF COLOR FILTER ARRAYS IN THE FREQUENCY DOMAIN ABSTRACT: In digital color imaging, the raw image is typically obtained via a single sensor covered by a color filter array(CFA), which allows only one color component to be me a surged at each pixel. The procedure to reconstruct a full color image from the raw image is known as DE mosaicking. Since the CFA may cause irreversible visual artifacts, the CFA as well as the DE mosaicking algorithm is crucial to the quality of DE mosaicked images. Fortunately, the design of CFAs in the frequency domain provides a theoretical approach to handling this issue. However, almost all the existing design methods in the frequency domain involve considerable human effort. In this paper, we present a new method to automatically design CFAs in the frequency domain. Our method is based on the frequency structure representation of mosaicked images. We utilize a multi-objective optimization approach to propose frequency structure candidates, in which the overlap among the frequency components of images mosaicked with the CFA is minimized. Then we optimize parameters for each candidate, which is formulated as a constrained optimization problem. We use the alternating direction method (ADM) to solve it. Our parameter optimization method is applicable to arbitrary frequency structures, including those with conjugate replicas of dominance components. Experiments on benchmark images confirm the advantage of the proposed method.
Send Enquiry
Read More
Page 1 1