OMM Software Innovation Pvt Ltd.

"OMM" Reflection of absolute reality....

OMM Software Innovation Pvt Ltd

"OMM" Reflection of absolute reality....

OMM Software Innovation Pvt Ltd

"OMM" Reflection of absolute reality....

OMM Software Innovation Pvt Ltd

"OMM" Reflection of absolute reality....

OMM Software Innovation Pvt Ltd

"OMM" Reflection of absolute reality....

Wednesday 19 November 2014

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS”

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS” INTRODUCTION Wireless communication and MEMS - the two technologies which have revolutionalized the way we live have also resulted in the development of wireless sensor networks. These comprise of relatively inexpensive sensor nodes capable of collecting, processing, storing and transferring information from one node to another. These nodes are able to autonomously form a network through which sensor readings can be propagated. Since the sensor nodes have some intelligence, data can be processed as it flows through the network. The latter is being done wirelessly these days using networking principles. The flexibility of installation and configuration has greatly improved resulting in a flurry of research activities commencing in the field of sensor networks owing to their ready acceptance in various industries such as security, telecommunications and automobile to name a few. By early next century, sensor integration, coupled with unceasing electronic miniaturization, will make it possible to produce extremely inexpensive sensing devices. These devices will be able to monitor a wide variety of ambient conditions: temperature, pressure, humidity, soil makeup, vehicular movement, noise levels, lighting conditions, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects and so on. These devices will also be equipped with significant processing, memory and wireless communication capabilities. Emerging low-level and low-power wireless communication protocols will enable us to network these sensors. This capability will add a new dimension to the capabilities of sensors: Sensors will be able to coordinate amongst themselves on a higher-level sensing task (e.g., reporting, with greater accuracy than possible with a single sensor, the exact speed, direction, size, and other characteristics of an approaching vehicle). OBJECTIVE The problem being tackled here relates to the problem of target tracking in wireless sensor networks. It is a specific problem in localization. Localization primarily refers to the detection of spatial coordinates of a node or an object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its movements. METHODOLOGY A location Tracking Protocol in which the tracking is done by the coordination of sensors. A network of sensors in a 2D plane is considered. A triangular network is considered i.e. the sensors are placed in a triangular fashion. Typically, the network is considered as a hexagonal mesh. Each sensor is aware of its physical location and that of its neighboring sensors. All the sensors have a processor, a memory and required hardware to support sensing, information gathering and communication capabilities. Each sensor has a sensing radius, r which is equal to the length of the side of the triangle. Three sensors are used to determine the location of the object. The methodology used in this case is the triangulation technique of detecting the spatial coordinates. The sensors in this case are assumed to have different sensing radii. POSSIBLE FINDINGS Applications of target tracking and/or data fusion are found in diverse civilian and military fields. Civilian applications include air traffic control, navigation, fault tolerant systems and decision problems. In the military field, applications include surveillance, target identification, command and control, sensor management and weapon guidance. The target tracking problem is widely researched due to its increasing applications in security industry due to heightened concerns about the safety of men and material in present day world. In order to keep a check on movements of suspicious people and their activities, we have to employ video monitoring and surveillance and tracking systems.

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS”

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS” INTRODUCTION Wireless communication and MEMS - the two technologies which have revolutionalized the way we live have also resulted in the development of wireless sensor networks. These comprise of relatively inexpensive sensor nodes capable of collecting, processing, storing and transferring information from one node to another. These nodes are able to autonomously form a network through which sensor readings can be propagated. Since the sensor nodes have some intelligence, data can be processed as it flows through the network. The latter is being done wirelessly these days using networking principles. The flexibility of installation and configuration has greatly improved resulting in a flurry of research activities commencing in the field of sensor networks owing to their ready acceptance in various industries such as security, telecommunications and automobile to name a few. By early next century, sensor integration, coupled with unceasing electronic miniaturization, will make it possible to produce extremely inexpensive sensing devices. These devices will be able to monitor a wide variety of ambient conditions: temperature, pressure, humidity, soil makeup, vehicular movement, noise levels, lighting conditions, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects and so on. These devices will also be equipped with significant processing, memory and wireless communication capabilities. Emerging low-level and low-power wireless communication protocols will enable us to network these sensors. This capability will add a new dimension to the capabilities of sensors: Sensors will be able to coordinate amongst themselves on a higher-level sensing task (e.g., reporting, with greater accuracy than possible with a single sensor, the exact speed, direction, size, and other characteristics of an approaching vehicle). OBJECTIVE The problem being tackled here relates to the problem of target tracking in wireless sensor networks. It is a specific problem in localization. Localization primarily refers to the detection of spatial coordinates of a node or an object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its movements. METHODOLOGY A location Tracking Protocol in which the tracking is done by the coordination of sensors. A network of sensors in a 2D plane is considered. A triangular network is considered i.e. the sensors are placed in a triangular fashion. Typically, the network is considered as a hexagonal mesh. Each sensor is aware of its physical location and that of its neighboring sensors. All the sensors have a processor, a memory and required hardware to support sensing, information gathering and communication capabilities. Each sensor has a sensing radius, r which is equal to the length of the side of the triangle. Three sensors are used to determine the location of the object. The methodology used in this case is the triangulation technique of detecting the spatial coordinates. The sensors in this case are assumed to have different sensing radii. POSSIBLE FINDINGS Applications of target tracking and/or data fusion are found in diverse civilian and military fields. Civilian applications include air traffic control, navigation, fault tolerant systems and decision problems. In the military field, applications include surveillance, target identification, command and control, sensor management and weapon guidance. The target tracking problem is widely researched due to its increasing applications in security industry due to heightened concerns about the safety of men and material in present day world. In order to keep a check on movements of suspicious people and their activities, we have to employ video monitoring and surveillance and tracking systems.

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS”

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS” INTRODUCTION Wireless communication and MEMS - the two technologies which have revolutionalized the way we live have also resulted in the development of wireless sensor networks. These comprise of relatively inexpensive sensor nodes capable of collecting, processing, storing and transferring information from one node to another. These nodes are able to autonomously form a network through which sensor readings can be propagated. Since the sensor nodes have some intelligence, data can be processed as it flows through the network. The latter is being done wirelessly these days using networking principles. The flexibility of installation and configuration has greatly improved resulting in a flurry of research activities commencing in the field of sensor networks owing to their ready acceptance in various industries such as security, telecommunications and automobile to name a few. By early next century, sensor integration, coupled with unceasing electronic miniaturization, will make it possible to produce extremely inexpensive sensing devices. These devices will be able to monitor a wide variety of ambient conditions: temperature, pressure, humidity, soil makeup, vehicular movement, noise levels, lighting conditions, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects and so on. These devices will also be equipped with significant processing, memory and wireless communication capabilities. Emerging low-level and low-power wireless communication protocols will enable us to network these sensors. This capability will add a new dimension to the capabilities of sensors: Sensors will be able to coordinate amongst themselves on a higher-level sensing task (e.g., reporting, with greater accuracy than possible with a single sensor, the exact speed, direction, size, and other characteristics of an approaching vehicle). OBJECTIVE The problem being tackled here relates to the problem of target tracking in wireless sensor networks. It is a specific problem in localization. Localization primarily refers to the detection of spatial coordinates of a node or an object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its movements. METHODOLOGY A location Tracking Protocol in which the tracking is done by the coordination of sensors. A network of sensors in a 2D plane is considered. A triangular network is considered i.e. the sensors are placed in a triangular fashion. Typically, the network is considered as a hexagonal mesh. Each sensor is aware of its physical location and that of its neighboring sensors. All the sensors have a processor, a memory and required hardware to support sensing, information gathering and communication capabilities. Each sensor has a sensing radius, r which is equal to the length of the side of the triangle. Three sensors are used to determine the location of the object. The methodology used in this case is the triangulation technique of detecting the spatial coordinates. The sensors in this case are assumed to have different sensing radii. POSSIBLE FINDINGS Applications of target tracking and/or data fusion are found in diverse civilian and military fields. Civilian applications include air traffic control, navigation, fault tolerant systems and decision problems. In the military field, applications include surveillance, target identification, command and control, sensor management and weapon guidance. The target tracking problem is widely researched due to its increasing applications in security industry due to heightened concerns about the safety of men and material in present day world. In order to keep a check on movements of suspicious people and their activities, we have to employ video monitoring and surveillance and tracking systems.

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS”

TITLE –“ TARGET TRACKING IN WIRELESS SENSOR NETWORKS” INTRODUCTION Wireless communication and MEMS - the two technologies which have revolutionalized the way we live have also resulted in the development of wireless sensor networks. These comprise of relatively inexpensive sensor nodes capable of collecting, processing, storing and transferring information from one node to another. These nodes are able to autonomously form a network through which sensor readings can be propagated. Since the sensor nodes have some intelligence, data can be processed as it flows through the network. The latter is being done wirelessly these days using networking principles. The flexibility of installation and configuration has greatly improved resulting in a flurry of research activities commencing in the field of sensor networks owing to their ready acceptance in various industries such as security, telecommunications and automobile to name a few. By early next century, sensor integration, coupled with unceasing electronic miniaturization, will make it possible to produce extremely inexpensive sensing devices. These devices will be able to monitor a wide variety of ambient conditions: temperature, pressure, humidity, soil makeup, vehicular movement, noise levels, lighting conditions, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects and so on. These devices will also be equipped with significant processing, memory and wireless communication capabilities. Emerging low-level and low-power wireless communication protocols will enable us to network these sensors. This capability will add a new dimension to the capabilities of sensors: Sensors will be able to coordinate amongst themselves on a higher-level sensing task (e.g., reporting, with greater accuracy than possible with a single sensor, the exact speed, direction, size, and other characteristics of an approaching vehicle). OBJECTIVE The problem being tackled here relates to the problem of target tracking in wireless sensor networks. It is a specific problem in localization. Localization primarily refers to the detection of spatial coordinates of a node or an object. Target tracking deals with finding spatial coordinates of a moving object and being able to track its movements. METHODOLOGY A location Tracking Protocol in which the tracking is done by the coordination of sensors. A network of sensors in a 2D plane is considered. A triangular network is considered i.e. the sensors are placed in a triangular fashion. Typically, the network is considered as a hexagonal mesh. Each sensor is aware of its physical location and that of its neighboring sensors. All the sensors have a processor, a memory and required hardware to support sensing, information gathering and communication capabilities. Each sensor has a sensing radius, r which is equal to the length of the side of the triangle. Three sensors are used to determine the location of the object. The methodology used in this case is the triangulation technique of detecting the spatial coordinates. The sensors in this case are assumed to have different sensing radii. POSSIBLE FINDINGS Applications of target tracking and/or data fusion are found in diverse civilian and military fields. Civilian applications include air traffic control, navigation, fault tolerant systems and decision problems. In the military field, applications include surveillance, target identification, command and control, sensor management and weapon guidance. The target tracking problem is widely researched due to its increasing applications in security industry due to heightened concerns about the safety of men and material in present day world. In order to keep a check on movements of suspicious people and their activities, we have to employ video monitoring and surveillance and tracking systems.

Saturday 25 October 2014

BASICS OF WEB SERVICES

Web services is a software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format (specifically WSDL). Other systems interact with the Web service in a manner prescribed by its description using SOAP messages, typically conveyed using HTTP with an XML serialization in conjunction with other Web-related standards. Web services are classified into two types SOAP and RESTful. SOAP is Simple Object Access Protocol which has its own pre-defiened structure envelope and header REST is Representational State Transfer it does not have any pre defined structure

INTRODUCTION TO EMBEDDED SYSTEM

Emerging trends in embedded systems and applications The embedded systems industry was born with the invention of microcontrollers and since then it has evolved into various forms, from primarily being designed for machine control applications to various other new verticals with the convergence of communications. Various classes of embedded systems such as home media systems, portable players, smart phones, embedded medical devices and sensors, automotive embedded systems have surrounded us and with continued convergence of communications and computing functions within these devices, embedded systems are transforming themselves into really complex systems, thus creating newer opportunities and challenges to develop and market more powerful, energy efficient processors, peripherals and other accessories. An embedded system is more than the electronics as most people perceive it. It has electronics – both digital and analog, special purpose sensors and actuators, software, mechanical items etc., and with design challenges of space, weight, cost and power consumption. Its important characteristics are low-power, real-time responsiveness, low thermal dissipation, small physical form factor/footprint, low radiation/emission, ruggedness in design and impervious to external radiations etc. In order to achieve key requirements, generally embedded systems are restricted to limited resources in terms of computing, memory, display size etc. With continued convergence of other technologies a lot more functionalities are being pushed into embedded devices which were once part of traditional computing platforms. This further adds a major “decision challenge” for architects and product managers on selection of processors, operating systems, standards of usage etc., as demands on functionality increase with time to market decreases. Patterns insight from the applications of embedded systems in real life Embedded systems are more than part of human life. For instance, one cannot imagine life without mobile phones for personal communication. Its presence is virtually unavoidable in almost all facets of human endeavor. While we search on patterns in each of these application spaces, we can clearly identify the trend as to where the future of embedded systems is heading. Multicore in embedded With a lot functionalities being added, the need for high performance in embedded systems has become inevitable and so developers are increasingly leaning towards multicore processors in their systems design decision. While this range of new applications also demands low thermals in small form factor setting, the mechanicals and packaging is also becoming a sub specialization of its own. Conventionally, chip manufacturers developed faster single core processors to meet the ever increasing performance requirements but soon they realized that increasing frequency, though offered certain benefits had drawbacks too such as: • It drove to higher power consumption and so the higher thermals; • Overall cost increased as the peripherals surrounding also needed to operate at matching speed, which was truly not practical in all cases, there by driving the costs. This paradigm is a serious drawback for embedded computing requirements, so semiconductor manufacturers have recognized that the way forward is to build processors that run at lower frequency and voltages but include parallel cores onto single chip. The overall performance increases because multicores can perform more than one task at given point of time. Today most of the gaming consoles are multicore and so are smartphones, which are indeed getting 'smarter'. While this multicore paradigm offers benefits, there is also ample opportunity for the engineers to realign/relearn on this new design space – on architecture, design, programming, debugging and testing so that they are well informed and are aware about the optimal use of new power that a multicore offers. If the benefits are not harnessed by developers then the purpose gets defeated. The eco-system for usage of multicore is still emerging and it depends on how fast or rapidly designers are opting for change and standardization. IDE companies have already taken lead in this regard by making necessary changes and adding support for the new multicores and this will clearly be one of the key factors of success of usage of multicores in embedded systems. Another recent development is that the chip suppliers are now making and marketing new chips aiming at specific markets. For instance, Intel launched an embedded processor aiming at the Point of sale terminal and other retail computing applications. Intel's Celeron CPU is extensively being applied to new IP STB designs. Intel is also developing chips for home media systems and portable media players. Companies like Transmeta, Philips semiconductor, Netsilicon etc., are all aiming at embedded apps. Philips is all set to introduce its LPC2000 series MCU based on ARM7 kernel, which has flash memory, RAM, ADC, CAN and PWM channel and can be applied to automotive electronics, industry control and medical equipment, Netsilicon as another example has NET+ARM series processors, among which NS9775 is a 32bit, 200MHz microprocessor including four independent video channels, TI too, is planning new in its most successful OMAP architecture series. Transmeta has Crusoe TM5700 and TM9500 and both offers better performance and form factor is halved compared to its last generation products. Although the demand for processing is ever increasing for new embedded applications, traditional applications are still in mainstream and they are now offering ultra low cost and power requirements and increased onchip memory (both RAM and Flash) with new interfaces are key differentiators companies like Atmel Corp., Microchip Technology Inc., Infineon Technologies AG, RDC Semiconductor Co. Ltd, Epson and other companies are featuring their respective MCU products in these space. Embedded operating systems Traditionally embedded systems did away with an operating system (OS), it had lightweight control program/monitor to offer limited I/O and memory services, however, as the systems became complex, it was inevitable to have OS which offered low latency real-time response, low foot print both in time and space and give all traditional functionality such as memory protection, error checking/report and transparent interprocess communication, which can be applied to communications, consumer electronics, industry controls, automotive electronics and aerospace/national defense. Emerging multicore also needs multimission, multithread, multiprocess, multiprocessor, multiboard debugging and has to operate on open source tool chains such as eclipse etc., most of the new designs today are moving away from proprietary OS and tool chains and are more and more opting for opensource platforms both of development and deployment as the key market differentiator for them is cost. Royalty free licensing deployment is the key for reducing the end user costs so OS like Linux embedded and new OS such as Android are making inroads into places where traditionally Windows CE/Vxworks etc., used to play. Today many new handhelds and smart phones are embracing Andriod. Even Wind River (acquired by Intel has embraced Linux and now offers it in its portfolio of products. Eclipse, the open source project for building development platforms offers an environment that crosses over RTOS boundaries. It comprises extensible frameworks, tools and runtimes for building, deploying and managing software throughout its lifecycle. Embedded digital security and surveillance In the ever increasing interconnected world, Digital embedded security is no more an option but a necessity as it is very critical for more transactions happening over embedded devices as front ends. Due to constrained resources on systems, embedded systems have challenges in implementation on full fledged security systems therefore the concept of 'embedded security' offers a new differentiator for embedded product marketing. Digital security and surveillance is currently in the host of new applications in the embedded arena which is benefiting from multicore phenomenon. Older systems needed more human intervention, but new systems offer intelligent systems to operate multisite, integrated and net centric systems that optimizes the resources needed to complete the job. The applications based on computer vision and tracking offers multiple benefits in capturing, post processing and identification and alerting of security video in realtime. Convergence embedded systems and applications The retail segment is one of the fastest growing segments in emerging markets and the trend in retail markets is moving towards improving the user experience, which is most certainly setting trend towards increased performance, connectivity and rich graphics. A point-of-sale terminal (PoS) is a great example of this - the latest PoS devices incorporate dual-display for advertising, complex accounting applications and are increasingly connected to a central server for remote management. Back end integration with web/online stores from these embedded devices offers to bring in latest offers onto their connected mobiles instantly if they are planning to buy certain item. The location based marketing applications and convergence of Bluetooth based retail communication marketing space is offering new paradigms of sales and marketing which is beneficial for both sellers and buyers. Healthcare Electronic medical device and other technological innovations with the convergence of biotech, nanotech, manufacturing tech, communication tech and device, sensor technologies are making breathtaking transformations in healthcare delivery and creating new health care paradigms. Bio med devices tech is being applied into wide variety of analytical problems including medicine, surgery and drug discovery, these devices are portable diagnostic imaging and home monitoring such as cholesterol monitors, blood glucose meters and with recent innovations paving way for miniaturization of devices, replacement organs and tissues, earlier use of more accurate diagnostics, and advances in information technology, became available thru Silicon Chip revolution. The fastest growing markets within medical for semiconductors are home monitoring and diagnostic devices, telemetry, and diagnostic imaging applications. Interestingly the convergence of wireless communication with the sensors created the BAN – body area network which is today used to monitor, heart – ECG, pulse rate, temperature, oxygen, blood pressure etc., sleep disorders can also be monitored using a clip device fixed to head band. For instance, Corventis develops wireless cardiovascular solutions that offer unprecedented visibility into a patient’s health status – anytime, anywhere across the world. It has developed complete systems – sensors to monitor various critical health parameters – network to communicate between sensors and gateway, gateway application on an iphone and backend clinical application that can store, analyse and help clinical professionals to have unprecedented access to their patients critical system parameters. All these happened because of advancement of sensor, computing, communication technologies. Automotive With drive across the world to improve on emission controls and bring in efficiency in usage of fossil fuels, the automotive segment is challenged by various factors and embedded systems are clearly the ways and means of achieving multiple objectives in this segment taking it from infotainment systems, engine control unit, Car-area-network, fuel management, safety systems all need embedded to be in it. Traffic management and prediction systems are being developed for large cities across the world today and the critical systems that has to support this is M2M or V2V communication networks that, form adhoc networks, seamlessly gather information from multiple sources, fuse and make decision that not only help the car users but also city traffic managers. The realtime management of this is possible only by having embedded computing and communication systems that are part of the vehicle and the network. The usage of vehicle tracking and fleet tracking has already been beneficial for the operators by reducing their opex and downtime which has enhanced the customer satisfaction. This apart, media oriented systems transport (MOST) is one of the technologies being deployed by OEMs for multimedia and infotainment networking. This technology is designed to provide an efficient and cost-effective fabric to transmit audio, video, data and control information between devices attached even to the harsh environment of an automobile. Entertainment While we have seen mobiles, handhelds, ipods etc., have changed the landscape of the personal entertainment in the world in the recent past, the emerging trend is adding more intelligence in the personal entertainment, communication devices by converging the social networks, city information, location based services and choices and profile of the users. All these are going to be delivered through the continuous gathering of intelligence, choices and users and recent transactions. The devices are becoming multimodal, iPod and other new androids offer gesture recognition and also the new devices are offering augmented reality applications that are going to be future killer applications for smart phones – integration of real physical world with the virtual computing world – this drives the camera, display, MEMS based position and other tracking device technology to advance in the smart phone/tablets. Localization and internationalization For all these devices to be sold in world-wide markets, they need to be supported both locally and internationally. The access to global markets can happen only with localization/personalization of features in the device with multi-language support and also backend support offices that offer customized localized services. The usage of different font technologies & adapting newer ones are the key for embedded systems that are human centric to survive and thrive in the market so more and more device manufacturers are working with local partners to ensure that their embedded devices and support systems are localized and offer multi-language local culture flavor in definitive terms. - Lastly, the future of embedded lies in how faster people adapt to the changes offered by convergence – communications, nano, manufacturing and develop “super” applications that advance the society and human needs, let’s hope that our future is also embedded into it.

Recorder Magic Pen

Hello Friends !!! Recorder is this magic pen that converts your written notes into electronic files and then transfers it to your phone and computer via "Bluetooth". I think it’s a great idea and can actually encourage us writers to take to the book and pen more often. I bet authors and illustrators will love it too! My only wish – it auto spell checks the files..... great invention.

INTRODUCTION OF PHP

PHP is a popular open source general purpose scripting language especially suited for web development and can be embedded into HTML. It adds to the functionality of a website, as it is capable of making all types of calculations and mathematical equations. It has huge possibilities of interacting with MySQL databases. This makes using and retrieving of database easy and convenient. It is equally easy for a new comer as well as a quite handy advanced tool for professional programmers.

Tuesday 22 July 2014

PROJECTS LIST No Project Title Tech Project Type Category .Net IEEE 1 Publishing Search Logs – A Comparative Study of Privacy Guarantees .Net Web App IEEE 2 Fuzzy Keyword Search Over Encrypted Data in Cloud Computing .Net Web App IEEE 3 Effective Personalized Privacy Preservation .Net Web App IEEE 4 Resource Overbooking: Using Aggregation profiling in large scale Resource Discovery .Net Win App IEEE 5 Integration of Sound Signature over Graphical Password Authentication System .Net Web App IEEE 6 Java IEEE 1 Geometric Approach to Improving Active Packet Loss Measurement Java Win App IEEE 2 Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks Java Win App IEEE 3 Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Java Win App IEEE 4 Location Based Spatial Query Processing In Wireless Broadcast Environments Java Win App IEEE 5 Modeling & Automated Containment of Worms Java Win App IEEE 6 Benefit Based Data Caching In Ad Hoc Networks Java Win App IEEE 7 Minimizing File Download Time in Stochastic Peer-to-Peer Networks Java Win App IEEE 8 Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing Java Win App IEEE 9 Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction Java Win App IEEE 10 QUIVER Consistent Object Sharing For Edge Services Java Win App IEEE 11 Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Java Win App IEEE 12 Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences Java Web App IEEE 13 Analysis Of Credit Card Fraud Detection Methods Java Web App IEEE 14 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. 15 Packet-Hiding Methods for Preventing Selective Jamming Attacks Java Win App IEEE 16 A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Java Win App IEEE 17 Trust modeling in social tagging of multimedia content Java Web App IEEE 18 Online Modeling of Proactive Moderation System for Auction Fraud Detection Java Web App IEEE 19 Packet Loss Control Using Tokens At The Network Edge Java Win App IEEE 20 Clustering with Multi-Viewpoint basedSimilarity Measure Java Win App IEEE 21 Ensuring Distributed Accountability for Data Sharing in the Cloud Java Web App IEEE 22 On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks Java Win App IEEE 23 Organizing User Search Histories Java Web App IEEE 24 Risk-Aware Mitigation for MANET Routing Attacks Java Win App IEEE 25 Fast Data Collection in Tree-Based Wireless Sensor Networks Java Win App IEEE 26 Efficient Fuzzy Type-Ahead Search in XML Data Java Win App IEEE 27 Footprint Detecting Sybil Attacks in Urban Vehicular Networks Java Win App IEEE 28 Modeling and Detection of Camouflaging Worm Java Win App IEEE 29 Locating Equivalent Servants over P2P Networks Java Win App IEEE 30 Data Leakage Detection Java Web App IEEE 31 Ranking Spatial Data by Quality Preferences Java Web App IEEE 32 Java Java – Non IEEE 1 E-consultancy on BUSINESS Java Web App Non-IEEE 2 Secure Crime Identification Java Web App Non-IEEE 3 Secure Crime Identification Java Web App Non-IEEE 4 Simulation of Manet Java Web App Non-IEEE 5 EDEMS Java Web App Non-IEEE 6 Telephones Management Services Java Web App Non-IEEE 7 Online shopping Java Web App Non-IEEE 8 Computerized lending System Java Web App Non-IEEE 9 Human Resource Planner Java Web App Non-IEEE 10 Colleges and Students Information System Java Web App Non-IEEE 11 Doctor Patient Tracker Java Web App Non-IEEE 12 ONLINE RECURITMENT SYSTEM Java Web App Non-IEEE 13 Country Cargo & Express Couriers Java Web App Non-IEEE 14 Interest Calculation Java Web App Non-IEEE 15 Online Course Request Java Web App Non-IEEE 16 Corporate Company's vehicle mgt Java Web App Non-IEEE 17 Property management system Java Web App Non-IEEE 18 BookShopManagementSystem Java Web App Non-IEEE 19 AMSS Java Web App Non-IEEE 20 AD WAY Multilevel marking Java Web App Non-IEEE 21 Ewheelz Java Web App Non-IEEE 22 AdXPress Java Web App Non-IEEE 23 Bug Tracking System Java Web App Non-IEEE 24 CRM for Airline Industry Java Web App Non-IEEE 25 Online crime investigation Java Web App Non-IEEE 26 Safe And Secure internet banking Java Web App Non-IEEE 27 Safe And Secure internet banking.rar Java Web App Non-IEEE 28 Inventory Analyzer Java Web App Non-IEEE 29 E-Corporate Project Planning Java Web App Non-IEEE 30 Corporate Hospital Heath Card Java Web App Non-IEEE 31 Apna Life Insurance Java Web App Non-IEEE 32 Resorts for U Java Web App Non-IEEE 33 Intranet Mailing System Java Web App Non-IEEE 34 Automated SPORTS Club Java Web App Non-IEEE 35 Just intime Courier Services Java Web App Non-IEEE 36 College Administration System Java Web App Non-IEEE 37 ImprovedRailwayTicketing Java Web App Non-IEEE 38 Patientbilling Java Web App Non-IEEE 39 TGMC VirtualClassRoom Java Web App Non-IEEE 40 Water Marking Java Web App Non-IEEE 41 APP Consult Java Web App Non-IEEE 42 customer care system Java Web App Non-IEEE 43 DHL Couriers Java Web App Non-IEEE 44 FAQ Java Web App Non-IEEE 45 Knowledge Storm Java Web App Non-IEEE 46 Vehicle DealShipmgt Java Web App Non-IEEE 47 Work Force Mngt Java Web App Non-IEEE 48 JOB MILLER Java Web App Non-IEEE 49 Test Analyst Java Web App Non-IEEE 50 ImprovedRailwayTicketing Java Web App Non-IEEE 51 Internetbankingsystem Java Web App Non-IEEE 52 MunicipalAdministrationSystem Java Web App Non-IEEE 53 PatientBilling Java Web App Non-IEEE 54 MunicipalAdministrationSystem Java Web App Non-IEEE 55 Data mining using Apriori Algo Java Web app Non-IEEE 56 Log into Android Mobile using Remote Access Java Web App Non-IEEE DOMAIN: WIRELESS NETWORK PROJECTS A Data Fusion Technique for Wireless Ranging Performance Improvement Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling Importance of Coherence Protocols with Network Applications on Multicore Processors Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks DOMAIN: MOBILE COMPUTING Capacity of Hybrid Wireless Mesh Networks with Random APs Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing Quality-Differentiated Video Multicast in Multirate Wireless Networks Evaluating Temporal Robustness of Mobile Networks SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity An Investigation on LTE Mobility Management On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks Simple Hybrid and Incremental Postpruning Techniques for Rule Induction Supporting Search-As-You-Type Using SQL in Databases Reinforced Similarity Integration in Image-Rich Information Networks Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Toward a Statistical Framework for Source Anonymity in Sensor Networks On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling Model-Based Analysis of Wireless System Architectures for Real-Time Applications Successive Interference Cancellation: Carving Out MAC Layer Opportunities Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Group-Based Medium Access Control for IEEE 802.11n Wireless LANs Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Secure Communication Based on Ambient Audio Successive Interference Cancellation: Carving Out MAC Layer Opportunities Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks Analysis of Distance-Based Location Management in Wireless Communication Networks Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks Dynamic Coverage of Mobile Sensor Networks In-Network Estimation with Delay Constraints in Wireless Sensor Networks Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks DOMAIN: NETWORK SECURITY PROJECTS Distance Bounding A Practical Security Solution for Real-Time Location Systems EAACK—A Secure Intrusion-Detection System for MANETs Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks DOMAIN: DATA MINING (Data Engineering) Ontology Matching: State of the Art and Future Challenges A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A System to Filter Unwanted Messages from OSN User Walls A Survey of XML Tree Patterns Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Distributed Web Systems Performance Forecasting Using Turning Bands Method Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework Ranking on Data Manifold with Sink Points Region-Based Foldings in Process Discovery Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence The Generalization Ability of Online Algorithms for Dependent Data Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models Large Graph Analysis in the GMine System Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia AML: Efficient Approximate Membership Localization within a Web-Based Join Framework Event Tracking for Real-Time Unaware Sensitivity Analysis Detecting Intrinsic Loops Underlying Data Manifold Clustering Large Probabilistic Graphs Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping Finding Rare Classes: Active Learning with Generative and Discriminative Models Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models DOMAIN: CLOUD COMPUTING QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds DOMAIN: PARALLEL & DISTRIBUTED COMPUTING Network Traffic Classification Using Correlation Information Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Adaptive Network Coding for Broadband Wireless Access Networks Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision Covering Points of Interest with Mobile Sensors Topology Abstraction Service for IP-VPNs Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model- Predictive Controller High Performance Resource Allocation Strategies for Computational Economies Strategies for Energy-Efficient Resource Management of Hybrid Programming Models DOMAIN: MULTIMEDIA & IMAGE PROCESSING Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes Casual Stereoscopic Photo Authoring Estimating Information from Image Colors An Application to Digital Cameras and Natural Scenes Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views Reversible Data Hiding With Optimal Value Transfer Query-Adaptive Image Search With Hash Codes Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage LDFT-Based Watermarking Resilient to Local Desynchronization Attacks Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain A Watermarking Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues Linear Distance Coding for Image Classification Robust Face Recognition for Uncontrolled Pose and Illumination Changes Hyperspectral Imagery Restoration Using Nonlocal Spectral-Spatial Structured Sparse Representation With Noise Estimation Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images Airborne Vehicle Detection in Dense Urban Areas Using HoG Features and Disparity Maps Scene Text Detection via Connected Component Clustering and Nontext Filtering Robust Hashing for Image Authentication Using Zernike Moments and Local Features Revealing the Traces of JPEG Compression Anti-Forensics Regional Spatially Adaptive Total Variation Super-Resolution With Spatial Information Filtering and Clustering Query-Adaptive Image Search With Hash Codes Log-Gabor Filters for Image-Based Vehicle Verification Intra-and-Inter-Constraint-Based Video Enhancement Based on Piecewise Tone Mapping General Framework to Histogram-Shifting-Based Reversible Data Hiding General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes 2-D Wavelet Packet Spectrum for Texture Analysis Compressive Framework for Demosaicing of Natural Images Context-Based Hierarchical Unequal Merging for SAR Image Segmentation Visually Lossless Encoding For JPEG2000 Wang-Landau Monte Carlo-Based Tracking Methods for Abrupt Motions Latent Fingerprint Matching Using Descriptor-Based Hough Transform

Project Based on MATLAB IEEE 2014

OMM SOFTWARE INNOVATION PVT LTD Company URL-www.ommsoftware.com Phone No: 09021557095 IMAGE PROCESSING IEEE 2014 Sr.NO Project Title 1.Image quality assessment: from error visibility to structural similarity 2.Image Super-Resolution Via Sparse Representation 3.Gradient Histogram Estimation and Preservation for Texture Enhanced Image Denoising 4.Region filling and object removal by exemplar-based image inpainting 5.Hyperspectral Image Classification Through Bilayer Graph-Based Learning 6.Robust Online Multiobject Tracking With Data Association and Track Management 7.Patch-Ordering-Based Wavelet Frame and Its Use in Inverse Problems 8.QR Images: Optimized Image Embedding in QR Codes 9.A Novel Local Pattern Descriptor—Local Vector Pattern in High-Order Derivative Space for Face Recognition 10.Phase-Based Binarization of Ancient Document Images: Model and Applications 11.Fast Generic Polar Harmonic Transforms 12.Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration 13.OSRI: A Rotationally Invariant Binary Descriptor 14.BRINT: Binary Rotation Invariant and Noise Tolerant Texture Classification 15.Single Image Interpolation Via Adaptive Nonlocal Sparsity-Based Modeling 16.Progressive Image Denoising 17.Rate-Constrained 3D Surface Estimation From Noise-Corrupted Multiview Depth Videos 18.LBP-Based Edge-Texture Features for Object Recognition 19.Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition 20.On Scanning Linear Barcodes From Out-of-Focus Blurred Images: A Spatial Domain Dynamic Template Matching Approach OMM SOFTWARE INNOVATION PVT LTD Company URL-www.ommsoftware.com Phone No: 09021557095 21.Abandoned Object Detection System. 22.Novel PCB defect and Damaged Component Analysis using Image Processing. 23.Image processing based Automated Guided Vehicle. 24.Analysis of transformer oil by using Image Processing. 25.Cost effective smart remote controller based on invisible IR-LED using image processing. 26.Automatic inspection of outdoor insulators using image processing and intelligent techniques. 27.Consumer electronics-based intelligent alert system for unattended elderly residents. 28.Disk Space Optimization during video recording in continuous surveillance systems. 29.Real-time intelligent alarm system of driver fatigue based on video sequences. 30.Real world automated detection of traffic violations. 31.Automatic system for determination of blood types using image processing techniques. 32.Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography. 33.Multi-sensor Image Fusion 34.Image Steganography using BPCS (Bit Plane Complexity Steg.) System 35.Image Steganography using TBPC (Tree Based Parity Check) System. 36.Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique. 37.Innovative algorithms for vision defect identification system. 38.Enhancing Light Blob Detection for Intelligent Headlight Control Using Lane Detection 39.Energy saver with localised occupancy detection based on image processing. 40.An Automated Recognition of fake or destroyed Indian Currency note in machine vision. OMM SOFTWARE INNOVATION PVT LTD Company URL-www.ommsoftware.com Phone No: 09021557095 41.Recognition of human actions using Motion History Information extracted from the compressed video. 42.A Digital Image Stabilization Method Based on the Hilbert–Huang Transform. 43.A novel detection approach using bio-inspired vision for enhanced object. 44.A novel approach of assisting the visually impaired to navigate path and avoiding obstacle collisions. 45.Video Segmentation using Dynamic Texture Linear Binary Pattern (DT-LBP). 46.Photographic Enhancement Using Multiple Exposure Images. 47.Offline Signature Verification using Grid based Feature Extraction. 48.Vehicle Classification and Measurement using Image Processing. 49.Vehicle License Plate Detection and Recognition Using VEDA algorithm. 50.Scene Text Detection via Connected Component Clustering and Nontext Filtering 51.Counting objects in an image by marker controlled watershed segmentation and thresholding. 52.Image Processing Based Traffic Control System. 53.Fire Detection using LAB colour-space. 54.Fruit Quality Management System using K-Means Clustering. 55.Detection and Classification of Apple Fruit Diseases Using Complete Local Binary Patterns. 56.Seed Quality Analysis using Image Processing. 57.Leaf Disease Recognition. 58.Digital watermarking using Discrete Wavelet Transform and Principal Component Analysis. 59.Device Control using hand gestures. 60.American Sign Language Recognition using image processing. OMM SOFTWARE INNOVATION PVT LTD Company URL-www.ommsoftware.com Phone No: 09021557095 61.Diabetes Recognition using Iridology. 62.Non-invasive Haemoglobin Detection Using image Processing. 63.Iris Recognition using Phase Based Matching. 64.Detection of abnormalities in retinal images. 65.Face Recognition based Car-Locking System. 66.User Authentication Using Keyboard and Mouse Dynamics. 67.Personal Authentication Using finger Knuckle. 68.Personal Authentication Using Finger print. 69.Malaria Parasite Detection using SVM Classifier. 70.Mouse Pointer Control using hand gestures. 71.Lung Cancer Detection using Watershed Segmentation. 72.Automatic retrival of MRI brain image using Multiqueries system. 73.Brain Tumour Detection using CT and MRI image fusion. 74.Tissue density classification in mammographic images using local features. 75.Breast Cancer Detection using SVM Classifier. 76.Change Detection in SAR images using fuzzy Clustering. 77.Image Morphing. 78.Fabric Textile Defect Detection using Wavelet Coefficients. 79.Performance evaluation of traditional and adaptive lifting based wavelets with SPIHT for lossy image compression. 80.Application of temperature compensated ultrasonic ranging for blind person and verification using MATLAB. 81.Super-pixel Classification Based Optic Disc and Optic Cup Segmentation for Glaucoma Screening. 82.Colour and texture feature-based image retrieval by using hadamard matrix in discrete wavelet transform OMM SOFTWARE INNOVATION PVT LTD Company URL-www.ommsoftware.com Phone No: 09021557095 SPEECH, SIGNAL and COMMUNICATION Sr.NO Project Title 83.Acoustic interference cancellation for a voice-driven interface in smart TVs 84.Signal detection for cognitive radar. 85.Least-Mean-Square algorithm based adaptive filters for removing power line interference from ECG signal. 86.Wavelet-based analysis for heart sound monitoring system. 87.Automated pitch-based gender recognition using an adaptive neuro-fuzzy inference system. 88.Fuzzy rule based voice emotion control for user demand speech generation of emotion robot. 89.Speech recognition based wireless automation of home loads with fault identification for physically challenged. 90.Wind Signal Forecasting Based on System Identification Toolbox of MATLAB. 91.Advanced modulation formats for free-space laser communication. 92.A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid 93.On Spatial Domain Cognitive Radio Using Single-Radio Parasitic Antenna Arrays. 94.Full-dimension MIMO (FD-MIMO) for next generation cellular technology. 95.Modelling of OFDM-ODSB-FSO Transmission System under Different Weather Conditions. 96.Accelerometer Based Digital Pen for Handwritten Digit and Gesture Recognition 97.Extraction of FECG signal using ICA (Independent Component Analysis). 98.ECG Signal Classification 99.EEG Signal Classification using PSD Features. 100.Acceleration Sensor based Mouse. 101.Device Control Using Speech Recognition. 102.Speech Emotion Recognition. 103.Drowsiness Detection Using EEG Signals. 104.Simulation of OFDM System in Matlab (BER,Multipath,PAPR) 105.Simulation Of smart Antenna using Beamforming Technique.

PROJECT NAME BASED ON "EMBEDDED SYSTEM"

PROJECT NAME BASED ON EMBEDDED SYSTEM Embedded (ARM /AVR/Wireless/GSM/GPS) 1 Advance Toll Tax Collecting Systems with RFID and GSM (SMS Systems) and Printer using ARM controller 2 Car security systems with with SMS and GPS support. 3 A Gsm-Sensor Array For Air Pollution Monitoring with Location tracking and SMS Systems 4 Advance Air Bag Systems Using Arm Controller with GSM (SMS) interface with Location tracking using GPS 5 Safe Ignition Systems (Alcohol Sensing) with Speed control with GSM and GPS support 6 Car Sensor network and Control System using ARM Controller with SMS and GPS location 7 Accelerometer based security systems with with SMS and GPS support. 8 Touch Screen Based home Automation Systems with GSM(SMS Systems) Using ARM microcontroller. 9 Touch Screen Based Industrial Management Systems with RFID Security 10 ARM based advanced soldier tracking and Monitoring Systems with SMS and GPS 11 Advance bus Tracking System using RFID with SMS Support. 12 Design & Development Of GSM & GPS Based Vehicle Theft Control System. 13 GPS/GSM Based Cargo Container Tracking & Security System. 14 RFID and Touch screen Based Petrol Filling Systems with SMS Support 15 GPS and ARM based animal locator system for forest department and animal sanctuaries 16 Museum automation system using RFID , GSM and IR sensors 17 ARM based EVM (electronic voting machine ) using thumb scanning with SMS Suppor 18 GPS based intelligent ambulance tracking with patient parameter transmission and automatic traffic clearance 19 RFID based Fully atomized petrol pump Systems with SMS (GSM) and Printer Interface 20 Smart Visitor guide and security systems using Zigbee 21 Green house Monitoring and control system with GSM and GUI (Matlab) 22 Advance Black Box Systems with over speed Indication and Accident recognition 23 Design of Remote Monitoring and Control System with Automatic Irrigation System with SMS support 24 Wireless RF /Zigbee based Electronic Menu Card Systems For Hotel for Multi Node (GUI Optional 25 Wireless Robotic Car Control using RF communication with surveillance camera and obstacle detection 26 Wireless RF /Zigbee Based 3-Axis Robotic Arm Controller Using Accelerometer (Hand Motion) 27 Wireless RF /Zigbee based advance TPMS (Tire Pressure Measurement System) using MEMS Displaying on GLCD 28 Wireless RF /Zigbee based Wireless Car parameter monitoring and control systems 29 Wireless RF /Zigbee based Wheel Chair control Systems using Hand motion with Obstacle and fire detection 30 Wireless Wheel Chair control Systems using Hand motionwith Obstacle and fire detection system with SMS 31 Wireless RF/Zigbee Based Train Collision Avoidance with RFID detection Systems. 32 Wireless RF/Zigbee Based Position Finding For Doctors And Instruments Using RFID Systems 33 Wireless RF/Zigbee Industrial Monitoring And Control Using A Smart Sensor Platform 34 Wireless Sensor Network using ZIGBEE for Crop Field Monitoring 35 Wireless Sensor Network using ZIGBEE for Crop Field Monitoring with SMS (GSM) interface 36 Wireless RF/Zigbee Based Irrigation Systems 37 Wireless RF/Zigbee based Home automation systems using Multi Node. 38 Wireless RF/Zigbee Based green house Monitor and control system. 39 Wireless RF/Zigbee Vehicle tracking Systems 40 Micro Controller Based Bus Identification System For Blind People Using RF Techniques (ZIGBEE 41 Wireless RF Based Home Automation Using Touch screen 42 Multipoint wireless billing data transfer system for Queue less billing in shopping mall 43 Wireless RF/Zigbee Electricity Meter reading Systems 44 Anti Theft system for Electricity board for Prevention for power theft using ZIGBEE with GSM 45 Wireless ZIGBEE Based Home Automation Using Touch screen 46 Wireless Automation of Unmanned Railway Crossing Gate Alert System using ZIGBEE 47 Hybrid Wireless Communication System Using ZIGBEE Technology In The Coalmine Tunnels 48 Three Axis Robotic ARM controlled using Accelerometer using Wireless RF / ZIGBEE 49 Three axis moving color identifier Robotic ARM controlled using Accelerometer using Wireless RF / ZIGBEE 50 Three axis moving pick and place Robotic ARM controlled using Accelerometer using Wireless RF / ZIGBEE 51 Video Remote Robotic Arm For Precision Handling with PC interface 52 NPK Detection Robot using Colour Sensor with SMS controlled 53 NPK Detection Robot using Colour Sensor with missed called controlled 54 Colour identification Robot with Ostacle Detection Systems with SMS support 55 DAM Automation System with SMS based Gate control 56 Driver Drunk detection system in four wheeler with SMS system with GPS Location with CAR locking system 57 Voice controlled wireless robot with audio rotating camera using ARM microcontroller 58 ARM based Wireless electronics notice board with audio playback with SMS support 59 Unmanned Train With Rail Crack Detection Using Zigbee / RF 60 Head movement based wireless wheel chair Control Paralyzed patient 61 Accelerometer (Hand motion) based robot controlled (Camera Optional 62 Touch Screen And Zigbee /RF Based Wireless Assistant For Dumb/Illiterates In Airlines 63 Safe Parcel (Courier ) systems with SMS and GPS support 64 DAM Automation System with Wireless level measurement and Gate control 65 Wireless Load measurement systems for the Vehicle with Automatic toll calculation (GSM / Printer 66 Accelerometer based earthquake detector Systems with location and SMS Aleart. 67 Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries using ARM microcontroller 68 Robotic ARM Control Using Haptic Technology using Flex Sensor 69 Sign language recognition system using Embedded system 70 Gesture Recognition Based Robotic Vehicle Control using 3–axis Accelerometer 71 Wireless Human gesture control based robotic Arm using Flex sensors 72 Zigbee based Wireless Anti-theft system for forest department for preventing trees theft 73 Voice Controlled Wheel chair for physically challenged persons with Fire detection 74 Voice Operated Three Axis Robotics control system 75 Android Mobile based electrical appliances control using Bluetooth 76 Android based bike safety systems (Phone receiving avoidance during driving) using Bluetooth 77 Android Mobile based smart life using Bluetooth 78 Bluetooth based robot controlled 79 Wireless Hand using Flex Sensor for Medical Application / bomb Diffusion 80 GSM based automated gas booking using missed call 81 GSM based automatic line failure reporting system 82 Wireless based baby crying indicator using speech recognition 83 Traffic Rules (Alcohol, Vehicle on Zebra crossing) breaking systems for vehicles using GSM 84 Construction of smart phone with driving mode selection to avoid accident 85 Rfid Based Mobile Payment Systems With Pc Interface With Gsm COMUNICATION (CAN): 86 CAN based Tire Pressure Monitoring and Control (TPMS) 87 CAN communication based advance industrial motor control systems 88 CAN based Home Automation for Fire detection and Indoor Air quality Monitoring 89 CAN Based Smart Sensor Network for Indoor Air Quality Monitoring 90 Can Based Airbag Systems 91 3 node CAN communication for temperature and Airbag monitoring and control system 92 3 node CAN communication for temperature monitoring and control with Left and Right 93 Vehicle to vehicle communication system 94 CAN communication based Engine temperature and Alcohol monitoring and Control systems 95 CAN communication based Airbag systems with password protected control systems 96 CAN based pollution monitoring and control systems. COMUNICATION (LIN): 97 LIN based Tire Pressure Monitoring and Control (TPMS) 98 LIN communication based advance industrial motor control systems 99 LIN based Home Automation for Fire detection and Indoor Air quality Monitoring 100 LIN Based Smart Sensor Network for Indoor Air Quality Monitoring 101 LIN Based Airbag Systems 102 3 node LIN communication for temperature and Airbag monitoring and control system 103 3 node LIN communication for temperature monitoring and control with Left and Right Indicator 104 LIN communication based Engine temperature and Alcohol monitoring and Contro 105 systems using PIC microcontroller 106 LIN communication based Airbag systems with password protected control systems 107 LIN based pollution monitoring and control systems. MATLAB 108 Advanced data compression technique using fractals. 109 Cancer cell detection in hestro pathological. 110 Adapter contrast enhancement techniques. 111 Advanced data compression technique using chaos theory. 112 Face recognition technique using PCA (Principle Component Analysis) 113 Pattern recognition using artificial neural networks. 114 Spatiotemporal gesture recognition. 115 Iris recognition using wavelets. 116 Image segmentation graph cut algorithm. 117 Space project pattern recognition. 118 Matching of dental X-ray images for human identification 119 Human Activity Recognition Using Limb Component Extraction. 120 Symmetrical Structure Transient Limiter for Suppression of Capacitor Switching Transients 121 Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-QAM. 122 Visual Rank: Applying Page Rank to Large-Scale Image Search 123 A Leaf Recognition Algorithm for Plant Classification Using Probabilistic Neural Network 124 Speech Emotion Recognition Based On HMM And SVM 125 Fast Query Point Movement Techniques for Large CBIR Systems 126 A Lossless Compression Scheme for Bayer Color Filter Array Images 127 Color Image Segmentation Based on Mean Shift and Normalized Cuts 128 Calibration of Confidence Measures in Speech Recognition 129 A Precise Estimation of Vocal Tract Parameters for High Quality Voice Morphing 130 Restoration of digital images 131 TCSC(Thyrister Controlled Series Capacitors TCSC) 132 A Precise Estimation of Vocal Tract Parameters for High Quality Voice Morphing 133 Speech Emotion Recognition System Using SVM AND LIBSVM 134 Meticulous Classification Using Support Vector Machine for Brain Images Retrieva 135 A High Quality Text to Speech Synthesizer 136 Codebook Optimization in Vector Quantization using Genetic Algorithm 137 Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Android + Embedded 138 Wireless (Bluetooth) Oscilloscope Powered by Android 139 Wireless (Bluetooth) bike driving safty systems powered by Android 140 Android based smart life 141 Wireless (Bluetooth) based robot controlled using mobile accelerometer using Android 142 Android Mobile based green house monitoring and controlled system 143 Android Mobile based Notice board with Voice playback 144 Bluetooth based Bank Locker system using Android mobile 145 Bluetooth based 2axis robotic Arm using Android mobile 146 Bluetooth based car sensor parameter monitoring systems using Android mobile 147 Driver Drunk detection system for traffic police using Android mobile 148 Pollution detection system for traffic police using Android mobile 149 Patient monitoring system using Android mobile 150 Electric Meter reading systems using Android Mobile 151 Traffic control system for ambulance systems using Android mobile 152 Bluetooth Based Wireless Remote Device Controlling and Data Acquisition using Android Mobile 153 Android mobile controlled robot for coal mine 154 Car PUC / License / Document real time checking system for Traffic police using Android Mobil 155 Android based wheather monitoring system 156 Android Mobile based Electronic Menu Car using wireless Bluetooth 157 Android Mobile based ignition system and seat lid opening for bike/car Matlab + Embedded 158 Fruit Quality Management System using Image processing using matlab 159 Accelerometer-Based wireless Digital Pen for Handwritten Digit and Gesture Recognition 160 Color identification robot for object sorting using image processing (Matlab) 161 Speech and Command Recognition for Voice Controlled Devices using Matlab 162 Number Plate Scanning using Matlab 163 Number Plate Scanning with SMS aleart 164 Voice based Robotic car controller using wireless technologies for coal mine 165 Number Plate Scanning with SMS alert 166 Matlab based wireless 2 Axis robotic ARM controller 167 Matlab based wireless Surveillance robot 168 Voice based wireless data collector robot using matlab 169 Matlab based green house monitoring and controlled system 170 Voice Controlled Wheel chair for physically challenged persons using speech recognition in matlab 171 NPK Detection Robot using Color Sensor with GUI analysis (Matlab) 172 Voice Enabled Smart Home using Matlab 173 Voice based Robotic ARM controller using wireless technologies VLSI (VHDL / Verilog / FPGA/ CPLD )Technology 174 Design of I2C bus 175 Design and implementation of Advanced encryption standard(AES) for 128 bit key 176 Design of AES for 128,192 and 256 key 177 Design Of finite impulse response filter 178 Design of infinite impulse response filter 179 UART receiver 180 UART transmitter 181 Direct memory access controller using VHDL bit microprocessor 182 Students attendance list using VHDL 183 Design of AXI bus 184 Design of SPI bus 185 Design of TCP/IP protocol using VHDL

Intoduction to CLOUD COMPUTING

Cloud Computing – Chief Security Officers (CSO) Concerns If you do a Google search on ‘Cloud Computing Security’ you will get about 13,600,000 results and that’s too much of information for anyone to start. So let’s try to summarize the information keeping in mind of CSO’s concerns on cloud computing. What is Cloud Computing? In simple words, ‘Cloud Computing' is a collection of Internet or private-network based services, providing users and devices with scalable & economical (pay-as-you-go) information technology capabilities. The services offered by the cloud can be email hosting, email security, software development platforms, CRM, virtualized servers and storage, etc

Thursday 12 June 2014

Introduction to a "Magic Pen"


Recorder is this magic pen that converts your written notes into electronic files and then transfers it to your phone and computer via "Bluetooth". I think it’s a great idea and can actually encourage us writers to take to the book and pen more often. I bet authors and illustrators will love it too! My only wish – it auto spell checks the files..... great invention..

Introduction To "Java Programming"


Introduction To Java Programming : JOptionPane : showConfirmDialog with ImageIcon

INTRODUCTION TO "JAVA PROGRAMMING"


Introduction To Java Programming : Classes and Objects : private access specifiers http://www.ommsoftwareinnovation.blogspot.in/

INTRODUCTION TO "RASPBERRY PI"


INTRODUCTION TO "RASPBERRY" Name - ->"Raspberry Pi".... Introduction: The Raspberry Pi is a credit-card sized computer that plugs into your TV and a keyboard, which can be used for many of the things that your average desktop does - and it also plays high-definition video. • The Raspberry Pi charitable foundation wants to see the device being used by kids all over the world to learn programming and electronics. Operating System • ->Linux on a bootable SD card • Fedora • Debian • ArchLinux Other pre-rolled projects exist like XMBC Media Center Programming • ->By default, supporting Python as the educational language. • Any language which will compile for ARMv6 can be used with the Raspberry Pi, though; so you’re not limited to using Python. Tinkering • ->GPIO pins if you’re after an interesting electronics project. • Gertboard - A GPIO expansion board from the foundation for electronics projects • USB Devices / Ethernet / Hubs / AV out • Can be powered by 4 x AA batteries ... After Raspberry Pi is released for a few hours, its 10,000 initial stocks are completely sold out. The invention of small size personal computers has raised a new revolution in the IT industry, which started a new competition. Advantages : 1.Although Raspberry Pi is as small as the size of a credit card, it works as if a normal computer at a relatively low price. it is possible to work as a low-cost server to handle light internal or web traffic. Grouping a set of Raspberry Pi to work as a server is more cost-effective than a normal server. If all light traffic servers are changed into Raspberry Pi, it can certainly minimize an enterprise’s budget. Disadvantages: 1.Even though Raspberry Pi can perform different tasks, there are some limitations due to its hardware. Because of its processor, it cannot run X86 operating systems. Some common ones like Windows and Linux distros are not compatible. In addition, some applications which require high demands on CPU processing are off-limits. “Model B took 107 ms to complete one calculation of the purely synthetic prime number test; a mid-range desktop Core 2 Duo E8400 took only 0.85ms.” (Collins, 2012) Users must not use normal computer standards to judge Raspberry Pi. It can work as a personal computer, but cannot replace it.

Monday 9 June 2014

Define "RADAR'


RADAR : Radar is an object detection system which uses radio waves to determine the range, altitude, direction, or speed of objects. It can be used to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, weather formations, and terrain. The radar dish or antenna transmits pulses of radio waves or microwaves which bounce off any object in their path. The object returns a tiny part of the wave's energy to a dish or antenna which is usually located at the same site as the transmitter. Radar was secretly developed by several nations before and during World War II. The term RADAR was coined in 1940 by the United States Navy as an acronym for RAdio Detection And Ranging.[1] The term radar has since entered English and other languages as the common noun radar, losing all capitalization. The modern uses of radar are highly diverse, including air traffic control, radar astronomy, air-defense systems, antimissile systems; marine radars to locate landmarks and other ships;. High tech radar systems are associated with digital signal processing and are capable of extracting useful information from very high noise levels. Other systems similar to radar make use of other parts of the electromagnetic spectrum. One example is "lidar", which uses visible light from lasers rather than radio waves. [Image:A long-range radar antenna, known as ALTAIR, used to detect and track space objects in conjunction with ABM testing at the Ronald Reagan Test Site on Kwajalein Atoll.]

What is a LM7805 Voltage Regulator?


What is a LM7805 Voltage Regulator? A LM7805 Voltage Regulator is a voltage regulator that outputs +5 volts. An easy way to remember the voltage output by a LM78XX series of voltage regulators is the last two digits of the number. A LM7805 ends with "05"; thus, it outputs 5 volts. The "78" part is just the convention that the chip makers use to denote the series of regulators that output positive voltage. The other series of regulators, the LM79XX, is the series that outputs negative voltage. So: LM78XX: Voltage regulators that output positive voltage, "XX"=voltage output. LM79XX: Voltage regulators that output negative voltage, "XX"=voltage output The LM7805, like most other regulators, is a three-pin IC. Pin 1 (Input Pin): The Input pin is the pin that accepts the incoming DC voltage, which the voltage regulator will eventually regulate down to 5 volts. Pin 2 (Ground): Ground pin establishes the ground for the regulator. Pin 3 (Output Pin): The Output pin is the regulated 5 volts DC. Be advised, though, that though this voltage regulator can accept an input voltage of 36 volts, it is recommended to limit the voltage to 2-3 volts higher than the output regulated voltage. For a 5-volt regulator, no more than 8 volts should be applied as the input voltage. The difference between the input and output voltage appears as heat. The greater the difference between the input and output voltage, the more heat is generated. If too much heat is generated, through high input voltage, the regulator can overheat. If the regulator does not have a heat sink to dissipate this heat, it can be destroyed and malfunction. So the two options are, design your circuit so that the input voltage going into the regulator is limited to 2-3 volts above the output regulated voltage or place a heat sink in your circuit to dissipate the created heat.

*DIFFERENCE BETWEEN DIODE AND RECTIFIER**


*DIFFERENCE BETWEEN DIODE AND RECTIFIER** Ans->>*A diode is a device that allows flow of current in one direction only. A rectifier is a diode that is able to convert the current from AC to DC. *The rectifier is placed in one of the AC lines before the load. The diode has a small leaked current whenever it is working. *The rectifier is used to purify the circuit. A diode can be reverse biased or forward biased. A forward biased diode is placed in the current’s direction and a reversed biased diode is placed against the flow of current. The depletion region in a forward biased diode is small while the depletion region in a reverse biased diode is big ..

Web services is a software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format (specifically WSDL). Other systems interact with the Web service in a manner prescribed by its description using SOAP messages, typically conveyed using HTTP with an XML serialization in conjunction with other Web-related standards. Web services are classified into two types SOAP and RESTful. SOAP is Simple Object Access Protocol which has its own pre-defiened structure envelope and header REST is Representational State Transfer it does not have any pre defined structure

Final Year Project under OMM Software Innovation Pvt Ltd for CS / IT / MCA .... This Project is successfully completed by our team on dotnet platform. INTRODUCTION - The title of the project is “MediRetailer Software”. This software is constructed for Medical and General store. It is a desktop application for reduce the manual work of medical stores and General stores. Earlier in each and every medical store and General store the work had to be done manually so that had to be taken much time and effort, so to reduce the time and effort of shopkeepers this software is developed. This is not only reducing the time and effort but also do the accurate calculations and storage of medicines in the store. A perfect management such as medicine management, supplier management, and batch number management of each and every medicine can be done by using this software and make easy working for retailers and shopkeepers. For each and every medical shop there are number of suppliers who supplies medicines from the medicine companies to the medical and General stores, so the list of suppliers was maintained manually but by using this software it is become easy to store and manage list of suppliers. Each and every medicine has their batch number, that batch number is stored in this software application and when a shopkeeper find the price or any detail of any medicine they uses these batch numbers for retrieving the whole information of medicine. It becomes easy to generate a purchase bill and sells bill, which is very useful for any shopkeepers to know the yearly or monthly or weekly expenses and earning. OBJECTIVES This project is based on ASP.NET technology and build using .NET framework 4.0. The main objective of this project is to provide easy and attractive software for medical and general stores. In other words I can say that my project has the following objectives:- • TO PROVIDE EASY TO ACCESS SOFTWARE. • IT IS BASICALLY FOR RETAILERS AND SHOPKEEPERS • TO PROVIDE SUCH KIND OF APPLICATION TO REDUCE THE MANUAL WORK. • SHOPKEEPERS CAN MANAGE WHOLE STORE BY MAKING EACH AND EVERYTHING COMPUTERIZED. • AND THEY CAN EVEN FIND LIST OF SUPPLIER FROM IT. • BATCH WISE LIST OF MEDICINE. • MIN AND MAX QUANTITY. (IT CONTAINS MIN AND MAX QUANTITY OF MEDICINE IN PARTICULAR RACKS NUMBER). • STOCK LIST OF MEDICINE WITH BATCH WISE. • EXPIRY REPORT. IT SHOWS EXPIRY DATE OF MEDICINE IN PARTICULAR MONTH OF YEAR. • STOCK MATCHING REPORT. • STOCK TRANSFER REPORT. (IT TRANSFERS STOCK FROM ONE BATCH TO OTHER BATCH.) • SELLS REPORT (PARTICULAR DATE WISE, BETWEEN TWO DATES, MONTH, YEAR, COMPLETE.) BENIFITS: In earlier days, the buyers and suppliers of India were dealing with the limited market only i.e., the suppliers can only able to trade and sell their products to the limited market only, so trade market is limited. But our website provides such kind of facility to reach in the global marketplace, in which a buyer is provided with a list of products and suppliers with complete details from all over the world which help them to trade with a bigger market which were not possible in earlier days, similarly a list of different buyers are also provided to a supplier for the selling of products. The supplier only needs to just upload the images and complete description of the product which he wants to supply to the market, the list of different buyers are provided through our site as well as by the Email to that particular supplier.
Hello Friends !!! Recorder is this magic pen that converts your written notes into electronic files and then transfers it to your phone and computer via "Bluetooth". I think it’s a great idea and can actually encourage us writers to take to the book and pen more often. I bet authors and illustrators will love it too! My only wish – it auto spell checks the files..... great invention..

Friday 17 January 2014

Important features of LPC - 2129

Important features of LPC - 2129:
1. Comes in 64 pin package with 46 GPIO port pins.
2. 16KB of On-chip Static RAM to store Code &/or Data.
3. 256KB of flash memory.
4. External 8, 16, or 32 bit BUS.
5. ARM supports 1½ port concept.
6. On chip crystal oscillator 1 to 30MHz.
7. 60MHz max CPU clock available from programmable on chip PLL.
8. Supports ISP& IAP via boot loader.
9. Embedded ICE for real time debugging using break points and watch points.
10. Embedded Trace Macro cell ( Support of JTAG interface to debug the
program on the hardware level)
11. 2 CAN Controllers with Acceptance Filters.
12. 4 Channel 10 Bit ADC with conversion time of 2.44micro sec.
13. Two, 32 Bit Timers (4 capture and 4 compare channels).
14. PWM with 6 outputs.
15. RTC
16. 1 Watch Dog Timer.
17. Two UART’s.
18. Two SPI Interface.
19. Fast I2C at 400kbps.
20. Two low power modes IDLE and Power-Down mode.
21. CPU operating voltage +1.8V (1.65 to 1.95)
Peripherals operate at +3.3V (3.00 to 3.60)
I/O pins operate at +5V.
22. Supports ARM and THUMB mode.
23. Programming the flash memory can be done in the following ways.
1. Using serial JTAG interface
2. Using ISP & UART0.
3. Using IAP.
24. Supports 3 stage pipeline.
25. By default this supports LITTLE ENDIAN, but van be configured as BIG
ENDIAN.

Sunday 12 January 2014

INTELLIGENT AMBULANCE FOR CITY TRAFFIC POLICE (ECE/EEE Project)

FOR FINAL YEAR STUDENTS PROJECT

INTELLIGENT AMBULANCE FOR CITY TRAFFIC POLICE

                        
INTRODUCTION

This project is based on VTU syllabus. The proposed system is based on ATMEL 89S52 µcontroller which is in our syllabus.
For doing this project we use some of the software like
v  Embedded C for programming the application software to the microcontroller.
v  Protel schematic software is used for designing the circuit diagram for this project.
v  Express PCB software is used for designing the PCB for this project.
(Since PCB making is a big process and involves lot of machineries which are expensive, we are going to outsource this to the manufacturer.)


ABSTRACT:

The main aim of this project is develop an intelligent ambulance which will reach the hospitals without any problem in heavy traffics.

This particular project is designed for the cities with heavy traffic .Eg: In Bangalore the roads are full jammed every time. Most of the time the traffic will at least for 100meters .In this distance the traffics police can’t hear the siren form the ambulance .so he ignores this .Then the ambulance has to wait till the traffic is left. Some times to leave the traffic it takes at least 30 minutes .So by this time any thing can happen to the patient .So this project avoid these disadvantages.

According to this project if any ambulance comes near when the ambulance at emergency comes to any traffic post the traffic signals automatically stop the signals and give green signal for this ambulance.

COMPONENTS USED:

v  Power Supply 5v DC                             -           LM 7805
v  Micro controller                                     -           AT89S52-Atmel (www.Atmel.Com)
v  Siren (12Vdc)
v  Memory                                                -          Atmel (2Kbytes)
v  Real Time Clock                                    -          (RTC – DS1307)
v  Light Emitting Diode (LED)
v  IR transmitter & receiver
SOFTWARES USED:
v  Embedded C

WORKING PRINCIPLE:

When the ambulance at emergency comes to any traffic post the traffic signals automatically stop the signals and give green signal for this ambulance.         

The ambulance carries an infrared transmitter and every traffic post will have an infrared receiver. So whenever the ambulance comes near the traffic, the ambulance will transmit a code say “emergency” the receiver will receive this signal and check in the database of the micro controller. Then it immediately switch off the other signals that is it make all the signals red and later make this particular direction signal green. So by doing this the ambulance can go without any problem.