International Journal of Students' Research in Technology & Management, Vol 1 (3) May-June 2013
1. CONTROL AND DATA ACQUISITION OF AC MOTOR WITH ZIGBEE TECHNOLOGY
Jiten Bhagat, Akhil Ahuja, Prof. Kirti Rathi
Abstract: In this project, a wireless control and monitoring system for an AC motor is realized using the Zigbee communication protocol for safe and economic data communication in industrial fields where the wired communication is either more expensive or impossible due to physical conditions. The induction motor can be started and stopped wireless due to the computer interface developed with Zigbee. It is also possible to protect of the motor against some faults such as over current, higher/lower voltage, over temperature in windings, overloading of motor. Moreover, a database is built to execute online measurements and to save the motor parameters received by radio frequency (RF) data acquisition system. Therefore, controlling, monitoring, and protection of the system are realized in real time. Since the wireless communication technology is used in this study, controlling abilities of the system are increased and also hardware and the necessities of other similar equipment for data communication are minimized.
Wireless sensor networks have been very popular research field for the couple of years. ZigBee is a newly developed technology now being deployed for wireless sensor networks. ZigBee is a low data rate wireless network standard defined by the ZigBee Alliance and based on IEEE 802.15.4. The ZigBee wireless network has some advantages compared with other wireless networks, it has the characteristics of low power, low price, highly secured and reliable, so implementing a remote control and monitoring system proves to have a good cost performance ratio. This project presents the implementation of wireless sensor actor network (point to point) to control the speed of a AC Motor from a remote location. Varying speed of AC motor by means of changing firing angle of any thyristor is very widely used method. A zero crossing detector circuit is used here to interrupt ATMEGA AVR16 after every 10 ms. After getting an interrupt ATMEGA AVR16 will fire TRIAC after some delay from 1 to 9 ms. This will cut the current supplied to motor and so the speed of motor will reduce. Thus by varying the delay after which the TRIAC is triggered one can change the speed of motor. The speed sensing could be done by sensing and providing feedback with help of Tachogenerator .This paper also provides a provision for sensing the temperature, which is a crucial parameter of the motor, by using the facility of Thermister Sensing technology.
2. SYSTEM IDENTIFICATION
Adwait Thakur, Aditya Sankhe, Ravi Prajapati, Aulibh Saha, Asst. Prof. Mugdha Salvi
Abstract: The basic objective is to construct a Transfer function of the given system. Closed loop system identification and validation are important components in dynamic system modeling. In this report a comprehensive literature survey is compiled on System Identification with a specific focus on closed loop system identification and issues of identification experiment design and model validation. This is followed by simulated experiment on a known Non-Linear system. The identified model structure can be compared with various mathematical models like ARX model, ARMAX model & OE model.
KEYWORDS: Process, disturbances, estimation, model.
3. GSM BASED LED SCROLLING DISPLAY BOARD
Hardik Gupta, Puja Shukla, Ankita Nagwekar
Abstract: Scrolling display board is a common sight today. Advertisement is going digital. The use of led scrolling display board at big shops, shopping centers, railway station, bus stands and educational institutes is becoming an effective mode of communication in providing information to the people. But these off-the-shelf units are somewhat inflexible in terms of updating the message instantly. If the user wants to change the message it needs to be done using a computer and hence the person needs to be present at the location of the display board. It means the message cannot be changed from wherever or whenever. Also the display board cannot be placed anywhere because of complex and delicate wiring. ’GSM based LED Scrolling Display Board’ is a model for displaying notices/messages at places that require real-time noticing, by sending messages in the form of SMS through mobile. It is a system wherein the display board need not be reprogrammed to display a new message because it is wireless. The project aims to develop a moving sign board which empowers the user to change the scrolling message using SMS service instantaneously unlike a desk bound device such as PC or laptop. The user can update it even from a remote distant. The SMS is deleted from the SIM each time it is read, thus making room for the next SMS.
4. HYBRID HUMAN POWERED ELECTRIC VEHICLE
AnkurWadhwa, PrateekBansal, AnkitGarg, ShubhamGarg, Sagar Gupta, Mohd. Areeb
Abstract: The Team aims towards designing, validating and fabricating a three wheeled hybrid human powered electric vehicle driven by two drivers, which has a capability to act as a good viable option for city local transportation. The vehicle would be capable of being driven electrically as well as by a single driver and alternatively by two drivers. Team designed the vehicle keeping ergonomics and value engineering in mind. The vehicle is designed to give high performance at a lower rate. The vehicle thus design is capable of carrying two riders, of 5’7” height and weighing 75 kg. Our Vehicle further is designed keeping in view the future aspect by using bio filters for rural Indian population and innovative battery charging assist for city conditions. The design is validated using six different analysis tests for driver
5. CLOUD BASED COMPILER
Sajid Abdulla, Srinivasan Iyer, Sanjay Kutty
Abstract: Compilers are used to run programs and convert them from a text format to executable format. A compiler that is to be installed manually on every system physically requires a lot of space and also configuring of it if not installed using default parameters. Also once a program is compiled it becomes platform dependent. It is also not easy to carry the same program code to multiple systems if situation doesn’t permit the usage of a single system. Another drawback is that we would need to install a different complier on each language on which we wish to work. We propose a solution to this in the form of a cloud based compiler. Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. Our project aims to create an online compiler which helps to reduce the problems of portability of storage and space by making use of the concept of cloud computing. The ability to use different compilers allows the programmer to pick up the fastest or the most convenient tool to compile the code and remove the errors. Moreover a web based application can be used remotely through any network connection which is platform independent. The errors/Output of the compiled program can be stored in a more convenient way. Also the trouble of installing a compiler on each computer is avoided. Thus these advantages make this application ideal for conducting online examinations. We would be implementing a private cloud on which the software would be hosted. The software would be provided to the end user using a SAAS cloud. The software would contain a system that has a text editor and a terminal. The user would be given an option to select the language in which he wants to compile the program. The software will compile the program and return the output to the user. Additional functionalities such as monitoring of the system, user usage, user forums, and collaborative development can be added as needed.
Keywords: Compiler, Cloud, Azure, Multiple Language Support
6. SWITCHES ON FINGERTIPS
Raunak Borwankar, Aditya Shenoy, Gaurav Pednekar, Purva Sawant
Abstract: The document gives information on controlling all electrical devices viz. Tube lights, airconditioners, computers, fans of every floor of the building from a single computer. To perform this task the main functional components are micro-controller and RS-485.This application can be accessed by the users anywhere anytime and from any device like desktop or laptop. This project is aimed at consumption of electricity by switching off the appliances. It is the future of corporate world due its various applications.
Keywords: Technology, Electricity , Micro-Controller , RS-485, Communication , Parameter
7. ADVANTAGES OF USING SIFT FOR BRAIN TUMOR DETECTION
Arijita Pani, Priyanka Shende, Mrunmayi Dhumal, Kajal Sangle , Prof. Sankirti Shiravale
Abstract: The brain is the anterior most part of the central nervous system. The cranium, a bony box in the skull protects it. Virtually every activity or thought of ours is controlled by our brain. So, it’s very dangerous when the proper functioning of the brain is hindered. Brain tumor is one such disease which if not detected early and treated accordingly, can prove fatal. Structure of the brain is quite complex and hence it is very difficult to detect the abnormalities in early stages. In our paper we will be giving an overview of the various techniques used for brain tumor detection and how SIFT overcomes their limitations. The techniques discussed include biopsy, manual segmentation, mathematical morphology & wavelet transform, artificial neural network and finally SIFT (Scale Invariant Feature Transform). Biopsy is a surgical method which needs to be performed by highly skilled professionals. The rest other methods use MRI images and thus are non-invasive. SIFT technique which we are using in our project gives good accuracy, is cost effective and most importantly is invariant to translation, scale, rotation, affine transform, change in illumination, etc.
Keywords: MRI images, SIFT, tumor, k-means, k-NN, DoG
8. UNMANNED AERIAL VEHICLE RC QUADCOPTER
9. A SERVER HARDENING FRAMEWORK
Siddharth Singh, Garima
Abstract: There have been several attempts at improving the security of servers in all the fields be it web servers like apache tomcat ,mail servers like wamp etc. Checklists have been made for different servers from time to time which contains a list of steps that have to be followed in order to improve the security of the particular server. So the user has to have all the basic knowledge about the server before he can make use of the checklist and secure the server. This is the first problem that the user has to be well versed in the basic technicalities of the server configuration before he can
secure it for use. Secondly ,till now there is no tool or framework that can bring all the different types of servers together under it so that a single framework can be used to harden or secure multiple number of servers and without any knowledge about the basic configuration of the servers. Hence, we propose to automate the server hardening process by creating a Framework which will be open source and hence new servers could be included in it by users by editing the open source code of the framework which would be in python language. A server hardening framework would help even a person with a layman understanding to secure the server which he is using. He would be able to use the framework for hardening a multiple types of servers as per his requirements. The Framework will provide an option of AUDITING as well as HARDENING. If the User chooses the AUDITING option , then the parameters of the server configuration file would be displayed along with the current values as well as it would be mentioned additionally for the parameters if a particular parameter requires hardening and again the user would be asked if he wants to harden it or not. In case of choosing hardening, the server configuration file would be replaced by hardened file and server be restarted.
Keywords: Server hardening, auditing, parameter, Framework
10. CONTROLLING IP SPOOFING THROUGH INTER DOMAIN PACKET FILTERS
Yash Suresh Paluskar, Prashant Mahesh Agarwal, Rajesh Ravsaheb Tambe, Sumit Nandkumar Agarwal
Abstract: IP Spoofing is a serious threat to the legitimate use of the Internet. By employing IP spoofing, attackers can overload the destination network thus preventing it from providing service to legitimate user. In this paper, we propose an inter domain packet filter (IDPF) architecture that can minimize the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information. IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. We show that, even with partial deployment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.
Keywords: IP spoofing, DDoS, BGP, ANT Colony Algorithm, network-level security and protection,
11. INLINE PATCH PROXY FOR XEN HYPERVISOR
Neha Rana, Pankaj Singhal Dnyanesh Kulkarni Pratik Bhangale
Abstract: Application softwares running on end user or application servers are always prone to various attacks. These attacks not only harm applications but also waste network resources. Solutions to these problems are available as patches since a long time. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unreliable and disruptive to apply. To address this problem we propose an inline patch proxy solution for Xen hypervisor. Inline solutions provided are vulnerability-specific, exploit-generic network solutions installed on end systems. The Inline patch module examines the incoming or outgoing traffic, vulnerable to applications, and removes these vulnerabilities to maintain secure traffic. The motive of the idea is to reduce the time difference between the release of a software patch and its actual deployment. Currently patching is promised by software developers, generally within hours (Varies as per the service level agreements) of occurrence of a vulnerable attack. The proposed idea is based on the reducing this time gap to a few seconds by placing the proposed module within the system. For unexposed attacks, time is needed to create new signatures which are generated in update server and pulled by the software running on host.
Keywords: Inline Patching, Vulnerability Signature, Network Filter, Generic Protocol Analyzer, Xen
Hypervisor, PF Ring