Projects | Techoons

Want to explore more and interested in doing projects with Us,Login to Techoons.

Project Name Description
Coin Based Universal Mobile Battery Charger The coin based mobile battery charger developed in this paper is providing a unique service to the rural public where grid power is not available for partial/full daytime and a source of revenue for site providers. The coin based mobile battery charger can be quickly and easily installed outside any business premises.
A Wireless Design of Low Cost Irrigation System Using Zigbee Technology In the irrigation system we generally use induction motors where the water has to be pulled out and irrigate the plant. But it is difficult to check the availability of the water in the field all the time. So here we are considering a wireless system to monitor the condition of the plant and then if there in any insufficient amount of water in the field then the network built will check the plants status and then water level and gives the required water level condition by indication the status to concern person of that field.
Wheel Chair For Disabled Person Using ROBOT This project presents a robotic wheelchair for the disabled persons. The body- supporting device for handicapped person is characterized as two sets, first set of two rigid segments, each mounted on the backrest by an articulated system which blocks the segment in a vertical orientation as armrest or horizontal orientation, and the second set has two cradle elements, adapted to be immobilized in the same horizontal plane in alignment to form open leg guards fitting over the front of the persons legs.
Analysis on Credit Card Fraud Detection Methods Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses.
Authenticated Voting System With SMS Alert To develop an authenticated Voting System to speed up the counting process and reduce the cost spent on protecting and securing the voting machines and reduce the proxy voting cases.
GSM Based House Maintaince And Security System Fot LEGLESS People The Need for security to the house when we are in and moving along to the office will be great constraints for us. The communication has brought a way to secure the properties of our home. “GSM BASED HOUSE MAINTANENCE AND SECURITY SYSTEM FOR LEGLESS PEOPLE” is a boon for legless people to easily control and monitor their houses from the place where they are right now by using their ordinary mobile phones. It serves two main objectives that is house maintenance and also offer increased security system.
Android controlled robot via Bluetooth The main aim of this project is controlling the robot using Bluetooth technology ,in this project we are using android mobile this acting like remote ,here sending commands through uart, in robot section Bluetooth device is receive the commands right, left, forward ,backward and stop .controller is take this commands and corresponding action will take place in robot.
Portable I button Data Logger Programmer The I button is a computer chip enclosed in a 16mm thick stainless steel can. Because of this unique and durable container, up-to-date information can travel with a person or object anywhere they go. The steel I button can be mounted virtually anywhere because it is rugged enough to withstand harsh environments, indoors or outdoors. It is small and portable enough to attach to a key fob, ring, watch, or other personal items, and be used daily for applications such as access control to buildings and computers, asset management, and various data logging tasks.
Fingerprint And Password Based Authenticated Door Lock System Biometrics studies commonly include fingerprint, face, iris, voice, signature, and hand geometry recognition and verification. Many other modalities are in various stages of development and assessment. Among these available biometric traits Finger Print proves to be one of the best traits providing good mismatch ratio and also reliable. The present scenario to operate a bank locker is with locks which are having keys. By this we can’t say that we are going to provide good security to our lockers. To provide perfect security and to make our work easier, we are taking the help of two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS.
Walking stick with Heart Attack Detection The Walking Stick with Heart Attack Detection is equipment that is used daily to indicate heart condition, to detect heart attack and to call for emergency help.It was designed specially to help senior citizens and patients with heart disease.It consists of three basic sub projects Ecg Circuit, Analysis Algorithm and Bluetooth Communication. The first unit is worn on the user’s wrist captures abnormal heart beat signal from the patient., and the rest two are installed in the stick..The microcontroller on the stick runs a heart attack algorithm.

Want to explore more and interested in doing projects with Us,Login to Techoons.

Project Name Description
Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-copy Case The Walking Stick with Heart Attack Detection is equipment that is used daily to indicate heart condition, to detect heart attack and to call for emergency help.It was designed specially to help senior citizens and patients with heart disease.It consists of three basic sub projects Ecg Circuit, Analysis Algorithm and Bluetooth Communication. The first unit is worn on the user’s wrist captures abnormal heart beat signal from the patient., and the rest two are installed in the stick..The microcontroller on the stick runs a heart attack algorithm.
E’ Defect Tracking System Whenever we do any Web or any Software development, No matter how good a programmer we are, it’s almost impossible to write an application that does not contain a single bug. Some bugs are caused by logic or coding errors and some are the result of a difference between the expectations of the project’s client and the programmer. Yet other bugs may not be discovered until you actually start using the application. For example, usability or performance issues are often discovered only once the end-users get hold of the web site or application. Somehow, you need to keep track of those bugs, so they can be fixed in a next release or service update.
Online Examinations Online examinations are an important method of evaluating the success potential of students. This research effort the individuals under consideration were students who would be enrolling in computer courses or Technologies Registrations. A prototype of a web-based placement examination system is described from the standpoint of the research effort, end user, and software development.
Cell Breathing Techniques For Load Balancing In Wireless LANS We are presenting a cell breathing scheme for optimal load balancing in IEEE 802.11 networks. We are providing rigorous analysis of the problem and presenting two algorithms that find network-wide deterministic optimal solutions. The first algorithm minimizes the load of most congested AP(s) in the network, and the second algorithm produces an optimal min-max (priority) load balanced solution.
BLOG Engine Undoubtedly, blogging - a contraction of web and logging - is the most popular Internet application of the past few years. Relatively new to the Internet world, blogging has now reached millions of web users, turning them into mini-publishers of news, diaries, and biographies. Blogging applications come in all sorts and sizes. There are subscription-based blog sites from commercial companies, where you need to sign up for an account. Once you have an account, you can sign in to the company’s web site to manage your blog.
Student Information System Information system projects sometimes are initiated to improve the accuracy of the processing data or ensure that a procedure prescribing how to do specific task is always followed. A computer can maintain accurate and consistent database, hence resulting is an improved performance. Student Database Information System needs to store a large amount of data about so it was necessary to develop software, which can retrieve data fast. Several forms and reports are used in day to day processing of results.
Inventory Tracking System Inventory Tracking System provides a system to track inventory of any product type.Our inventory systems are designed for any business that desires a complete control over stock levels and inventory tracking. This software can be used either as a simple inventory control system or a complete manufacturing solution.
Online Crime Reporting(E-CRIME) The objective of the project is to develop a site in which any citizen can report crimes. If anybody wants to complaint against crimes he must do it through the police. The Crime Management and Reporting System make the crime reporting easier. This project will be useful for the Police Department. The home page is the login page .Only the Administrator and the Station in-charge of different Police Stations will be able to login to their home pages. The citizen could only report crimes and knows whether the crime reported by him has been accepted.
Active Learning Methods for Interactive Image Retrieval Human interactive systems have attracted a lot of research interest in recent years, especially for content- based image retrieval systems. Contrary to the early systems, which focused on fully automatic strategies, recent approaches have introduced human-computer interaction. In this paper, we focus on the retrieval of concepts within a large image collection. We assume that a user is looking for a set of images, the query concept, within a database. The aim is to build a fast and efficient strategy to retrieve the query
Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy consumption, we introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy, minimal transmission is imperative for some military applications of WSNs where an adversary could be monitoring the wireless spectrum.

Want to have more Seminar topics and download,Login to Techoons.

Seminar Topics Name Description
Applying IP-XACT in Product Data Management Key challenge for industrial embedded system com- panies is product data management (PMD) of rapidly changing requirements, new platforms and own legacy intellectual prop- erty. This can be alleviated with IP component reuse methods, platform based design, and Model Driven Development (MDD) methodologies.
System Level Mutation Testing Mutation-testing has been considered as an important coverage metric to measure the quality of simulation-based verification and validation processes [1, 2, 3]. On the other hand, IP-XACT has evolved to the IEEE standard for IP reuse and IP- based System-on-Chip (SoC) integration, which covers both RTL and TLM. In this paper, we present our effort to enable the mutation-based simulation coverage metric for system level IP integration with IP-XACT.
MARTE Based Approach For Partially Reconfigure System-ON-Chip Dynamic Partial Reconfiguration (DPR) has been introduced in recent years as a method to increase the flexibility of FPGA designs. However, using DPR for building complex systems remains a daunting task. Recently, approaches based on MDE and UML MARTE standard have emerged which aim to simplify the design of complex SoCs. Moreover, with the recent standardization of the IP-XACT specification, there is an increasing interest to use it in MDE methodologies to ease system integration and to enable design flow automation.
Searching Extended IP-XACT Components for SoC Design Based on Requirements Similarity To counter today’s rising complexity in system-on- chip (SoC) design intellectual property (IP) components are reused. These IP components are models of system parts (e.g., CPU, memory, bus) used in SoC design. In IP libraries many different of such predesigned components are available. However, finding and selecting functionally suitable ones is difficult and laborious. Additionally, certain nonfunctional constraints need to be considered when searching for IP. However, these addi- tional constraints such as power dissipation, performance and verification status are rarely considered in currently available IP representation formats. This paper introduces our innovative approach for searching suitable components in the IP library.
Extending IP-XACT to support an MDE based approach for SoC design We are interested in the problem of improving ip- reuse in SoC design. This paper presents an MDE based approach based on a proposed IP-XACT standard extension. This approach combines the benefits of using MDE techniques in SoC design such as abstraction levels definition and model transformation for code generation, and the benefits of the IP- XACT standard such as a unique exchange format of packaged IPs (Intellectual Property) with reuse capabilities.
A UML Frontend for IP-XACT-based IP Management IP-XACT is a well accepted standard for the exchange of IP components at Electronic System and Register Transfer Level. Still, the creation and manipulation of these descriptions at the XML level can be time-consuming and error-prone. In this paper, we show that the UML can be consistently applied as an efficient and comprehensible frontend for IP-XACT-based IP description and integration. For this, we present an IP-XACT UML profile that enables UML-based descriptions covering the same information as a corresponding IP-XACT description. This enables the automated generation of IP-XACT component and design descriptions from respective UML models. In particular, it also allows the integration of existing IPs with UML. To illustrate our approach, we present an application example based on the IBM PowerPC Evaluation Kit.
Industrial IP Integration Flows based on IP-XACT TM Standards Effective integration of advanced Systems-on-Chip (SoC) requires extensive reuse of IP modules as well as automation of the IP integration process, including verification. Key enablers for this are standards to describe and package IP modules. We focus on the IP-XACT standards and demonstrate how these standards are deployed in three industrial IP integration flows. Further, we report on two future extensions to IP-XACT that are currently being explored in the SPRINT project, i.e. IP- XACT based verification software generation and IP-XACT based configuration of debug environments. We conclude that IP-XACT is enabling powerful IP integration methodologies and that future extensions can further increase the effectiveness of IP-XACT standards.
Using Spirit Cores in SonicsStudio We describe a flow for interchanging design components between different SOC design environments and SOC design tools that utilizes the SPIRIT Consortium's IP- XACT format as the exchange medium. The flow allows cores from other design environments to be imported into the SonicsStudioTm and to be assembled into a design with the Sonics SMART InterconnectTM products. The configured design and Sonics components can then be exported into other design environments.
Reusable Platform Design Methodology For SoC Integration And Verification Today System-on-a-Chip (SoC) is like a black hole which draws all the important IP/Cores in a digital system. Current SoC design methodologies are no longer adequate to meet the challenges of SoC design productivity, design quality and diminishing time-to-market window. This paper describes an innovative SoC platform integration and verification design methodology to enhance design productivity based on IP reuse and IP-XACT standard. Platform Integrator including RPTKit (Reusable Platform Toolkit) is developed to improve the efficiency and reliability in platform integration, and Platform Verifier to improve verification setup time and work efficiency. Several cases of SoC platform designs substantiate the validity and capability of the Platform Integrator and Verifier, which reduced the total SoC integration and verification time by more than 30%.
Evaluating UML2 Modeling of IP-XACT Objects for Automatic MP-SoC Integration onto FPGA IP-XACT is a standard for describing intellectual property metadata for System-on-Chip (SoC) integration. Re- cently researchers have proposed visualizing and abstracting IP-XACT objects using structural UML2 model elements and diagrams. Despite the number of proposals at conceptual level, experiences on utilizing this representation in practical SoC development environments are very limited. This paper presents how UML2 models of IP-XACT features can be utilized to efficiently design and implement a multiprocessor SoC prototype on FPGA. The main contribution of this paper is the experimental development of a multiprocessor platform on FPGA using UML2 design capture, IP-XACT compatible components, and design automation tools. In addition, modeling concepts are improved from earlier work for the utilized integration methodology.