You are on page 1of 17

Bluetooth Hotspot Medical Reference System jPod Units JPEG2000 CCU SIMULATOR Electricity Theft Monitoring System Electric

Bikes eBadge Using RFID With Biometrics Bluetooth Home Automation Automation of Employment Exchange Alarm Annunciator with Real Time Event Recorder Network Monitoring System Communication Micro Controller based Power Theft Identifier Electronic Mail Server Data Centralization over Networks Micro Controller based Burner Automation Enterprise Level System Information Management Device Controlling using TAPI Online Examination Microcontroller Based Cellular Voting Machine VHDL Modeling of Glue Logic of 1553b Interface Board Pharmacy Management System Sudoku Efficient Coding Technique for Aerospace Telecommand Syst em Centrally Controlled Multichannel Token Display Access Control System Digital Stopwatch Card Based Security System Advertisement Management System Bug Tracking System Document Management System Authn Chat Server Highway Alert Lamp Payroll & Accounting Variable Power Supply Local PCO Meter Integrated Circuit Tester Honeypots Micro Controller based Security System using Sonar Protocol Sequencer and Subsystem Interface Secure Instant Messengers Microcontroller Based Barcode Decoder

Telephone Triggered Switches Automatic Over Speed Detector Design of Manchester Encoder decoder in VHDL Multiplier Accumulator Component VHDL Implementation Object Counter Multidimensional Visualisation System Telephone Answering Machine Integrated Photonic Microwave Band Pass Filter Hospital Administration System Software Bidding Secure Mobile Code Framework RTOS based Control and Safety Monitoring System TENS Unit Lab Management System Frequency Counter Voting Machine Speed Sensor Packet Analyzer Office Automation System Defence Matrix Analyser Railway Switches and Signals Micro Controller Based Dissolving Process Controller Customer Relationship Management Electronic Number Lock Interactive Entertainment Network System VHDL Modelling of a Bit Slice Arithmetic Logic Unit Telephone Router Traffic Light Control System Service Channel Terminating Unit for 2GHz Digital Microwave System Analog To Digital Converter SPEEDES Qheap Payroll System Homeopathic Management System Float cum Boost Charger Microwave Bandpass Filter TeleRemote Keyword Interfaced Moving Message Display Multi-Channel Infra Red Remote Control Towers of Hanoi Clinic Management System Graphics Editor Radar Data Acquisition System Magic Lights

Microcontroller - based electronic Locking System Module Bi-directional Visitors Counter Digital Storage Oscilloscope Microcontrollers Personal Entertainment Network Systems Online ATM Banking Home Automation System Energy Consumption Indicators Function Generator with Frequency Counter Virtual Class Rooms Policy Management System Cookie Authentication SPECS Audio Manager Loan Automation System Nove DA Myword Online Device Controller Microprocessor 8085 Trainer Kit Efficient Coding Technique for Aerospace Telecommand system Centrally Controlled Multichannel Token Display Card Based Security System Digital Stopwatch Web based Applications for Insurance Services Pharmacy Management System Microcontroller Based Cellular Voting Machine Inventory Management System Manual Eprom Programmer Cum Verifier Parent Record Keeping and Billing Appliances Security Controller using Power Line

All rights reserved Copyright V2computers 2007 through 2013

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Honeypots
Abstract A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. This paper presents Honeyd, a framework for virtual honeypots that simulates virtual computer systems at the network level. The simulated computer systems appear to run on unallocated network addres ses. To deceive networkfingerprinting tools, Honeyd simulates the networking stack of different operating systems and can provide arbitrary routing topologies and services for an arbitrary number of virtual systems. e.g. detecting and disabling worms, dis tracting adversaries,or preventing the spread of Spam email.

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Magic lights
Introduction Light emitting diodes (LED) are commonly used for indication. Light emitting diodes are used to make mufti segment arrays, dancing lights etc.. LED's are of different types. Single colour, bi colour, tri colour LED, infrared LED etc. They can produce different consecutive colours with respect to its raw materials. Here the `magic lights' represented by bi colour triple leg LED which emits amber l ight. With the constructional capability of certain IC's (timer, counter and decoder) we get a magical dancing effect. Bi colour LED consists of three legs which one is common cathode and when positive voltage applied to another two terminals, different colour patterns are produced. The project is found to be very useful for decorative purposes. The variation of emitting different colours was linear throughout the whole range. For a perfect magical dancing light affects the value of capacitors was changed which results a very good magical dancing effects. The semiconductor IC's with their high power handling capability was very convenient to use for a long time.

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Microco
Int o u tion

roll r B s d Cellular Vo ing Machine

I this modern world people are forced to use electronic devices in their daily life. Now day's electronic voting machines are used for election. Here we introduced a cellular voting machine based on micro controller. In this system there are two units, a master unit and a voting unit. The voting unit is placed anywhere and the master unit is placed in a control room. The voting unit contains a DTMF coyer, which generates a DTMF tone and is transmitted to the master unit through the FM transmitter. The master contains a FM receiver, DTMF decoder, Micro controller and Display units. The tone from the voting unit is received by the receiver and is decoded and specific functions are carried out by micro controller and then it is displayed.

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Man al EPROM Programmer cum Verifier


The project named "Manual EPROM programmer cum VERIFIER is a useful device to program a Erasable programmable, Read only memory (which is previously erased). The data is the EPROM Via 8 switches which is provided with 50ms pulse as clock for address selection using CD4040. The main importance is that we can implement this type of project in our homes, offices with minimal installation for providing a aid to program micro controller Ics.This circuit uses E -prom Ics 2764 ,timer IC555, CD4040 (12 bit binary counter). Programming is done in hexadecimal form. The E-prom IC2764 is erasable programmable Ic of 8KB memory capacity. A 7805 positive voltage regulator IC is used to provide an uninterrupted power supply with steady output for programming and running of EPROM programmer and Display module. They produce 5V respectively. The output of the d ata bus and address bus are driven by 7segment LED through 7448 decoder IC. The moving message display is used to run the message in the defined manner choosey by the programmer. Character displays are in dot matrix form using 5x7 matrix arrangement of leds for displaying the message. The SIPO (Serial in Parallel out) shift register is used to shift data to the next column. The manual EPROM programmer is used not only used for programming the EPROM Ic's but also for decoding and activating the display module. The alphabets are displayed in 5x7 matrix format. W e can display alphabets, numerals and certain characters.

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Card Based Security Syste

This is a microprocessor based security system capable of identifying cardholders with references to name. Further the access to any given point is controlled by individual passwords for individual cardholders. In case of entry of wrong password the system will give audio alert. This is highly secure and cost effective project, which can be, implemented at various security zones.

 

A st

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Software Bidding

The aim of the project is to develop a website to ma e bidding on software auctions more convenient and less time-consuming for users. It is developed using ASP and SQL, server. idding is the process of buying and selling the products through bargaining. There are two types of bidding. They are low cost bidding and high cost bidding. In low cost bidding, seller fixing an amount for a product. The buyer is proposing. So after the bargaining. the seller will be disposing of the product for a feasible amount. In this case, a minimum profit is guaranteed for the seller. High cost bidding intended for upper class people. In high cost bidding. Auctioneer fixes certain amount for the product. Those who want to purchase will be offering high amount.. The highest bidder will be get the product. Auctioneer can fix the bid rate. (eg:Suppose the auctioneer can decide at least Rs.l000 more than the amount fixed for the auction of Rs.1,00,000).ln high cost bidding very rare commodities are also placed for bidding. Through Internet high cost bidding has so many advantages. So we can buy so many rare products through Internet. In this online software bidding tool is designed to use as more friendliness in three way user guided manual system. a).Admin b).Auctioneer c). idder Admin is a full privilege authorized user, who can keep track over all activities of seller and buyer, including all over site administration of online bidding. Auction is the process of selling the software online through the process of bidding. The Auctioneer can add software details to sell the software and the Bidder can view the software details and bid an amount to it. [n case of any need, the Users can send mails to the administrator or between themselves. An option is provided to send feedback to the administrator. A registration is required for all users. All Auctioneers and Buyers have to pay a certain amount as registration fees. For registration username and passwords are to be given. After the registration the seller is adding the details. So as the features of the software, pictorial representation, warranty, and minimum amount which is the Auctioneer expects etc.. A buyer can bid the amount of the software product that he intends to buy. Before closing hid date, the bidders can bid their own amount. The highest bidder can bought the product. If one person happen to register, the product will be bought for the amount he has paged. The auctioneer has all the responsibilities in sending the products to bidder through courier service. The Auctioneer through the credit card system will receive the money.

  

A st

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Authn
A out the p oje t In a conventional approach, a timekeeper will be doing the job of recording all entry and exit time of each employee. In various organizations security is provided by means of desktop PC's via LAN. By using traditional method for checking authentication of persons, this may cause many problems for the company and employee. In this project we try to implement a new means of security through compact devices. Author is a network-based project. This project is intended for Companies / Organizations, having branches distributed over multiple geographic locations and facing difficulties implementing authentication. The main components are Master Controller (server), Access Controller (client) and a Central Database.A Master controller is designed to interconnect with Access controller through socket programming and with a central database via Internet. The Access Controller provides facility for employees to logic a logos using employee nd ID. In this application Access Controller lies in a compact device. Access Controller can communicate with the Master Controller through service. A Central Database at the head holds the information about all employees working under company. A Master Controller can connect to the Central Database through a Web server and Internet. The protocol used for data transfer is HTTP and the language used to define data is XML.There are different modules used in the Project "The Automatic Attendance and Scheduling System" The Different modules are used for different purposes . The modules are:1.Master Controller Module: 2.Department Add\Search 3.Employee Add\Search 4.Photo view 5.Access Controller Module 6.Database designing module 7.Employee Table 8.Emp_Image Table 9.Department Table 10.service Module

"

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

Chat erver
The package "CHAT SERVER" using JAVA and MS ACCESS aims at developing a new chat server that could be easy for users and which could teach a new user how to involve in fluent chat and get well equipped with Chat server.The main goal of our package is communication. It allows all the registered users to establish good relations with all types of people involved in the internet. The users can develop their communication skills. It also helps in gathering information's about different peoples. It also helps in understanding the culture of different peoples involved in the Internet The other attraction of our site is that you could easily change the look and appearance of the site according to the users taste. This package is not restricted to any one any one wh o has registered as a valid user could access this package and it is absolutely free. Even though the site is very much secured after fulfilling the security criteria one would find it very interesting and easy.The entire package is developed by JDK 1.3.1, JAVA SWINGS, SOCKETS and MICROSOFT ACCESS for Database users The whole package works in WINDOWS 98 or any platform using client server technology. Overview of Pro ects The project titled "CHAT SERVER" deals with mail communication with peoples involved in the internet searching the site and chatting.The main aim of the project has been to develop web enabled model software to computerize the life style of peoples. our site named "CHAT SERVER" generates environment for communication. Usually it is a long boring task of waiting in front of the computer searching for users who have entered the server. Our program Eliminates this It is also seen that certain systems get disconnected from the internet so often, this is also deleted from our site.Moreover we had developed the site keeping in mind of this package getting used by users of any level. It could be a Computer engineer or a small boy or even one who has freshly learned Internet.By this site it is possible fro the users to communicate with other side of t he world. user can make appointment with some professionals, persons and so on. Through the searching option we can search

for different matters.

<< back

All rights reserved Copyright V2computers 2007 through 2010

Projecttopics.info

Home

Seminars

Sitemap

Notes

Contact us

BLU T

TH H TSP T

Wifi hotspots are very common now days. Laptops and PDAs use these hotspots to access the internet as these devices have Wifi facility built into it. But mobile phones do not have Wifi facility in them. Nokia is releasing some models with Wifi, but still those models are costly. But lower end models also come with Bluetooth now. So its a better idea to create a Bluetooth hotspot where Bluetooth mobiles can access the internet. With this technology mobile phones need not have a GPRS connection or even a SIM card in it to access the internet. This project has two parts. A client application and a server application. T server he application runs in a normal PC with Bluetooth dongle. This PC acts as the gateway to the internet for the mobile. The mobile will host the client application which will connect to the server application in a hotspot environment and provide the mobile with internet access.
Formatted: Font: (Default) Times New Roman, 12 pt, Font color: Blue

OVERVIEW
Here we are using Bluetooth enabled Smart phone supporting windows application .This Smart phone incorporates a device discoverer which lists all the nearby Bluetooth enabled devices, out of which we can select any of the device to which the key depression data is to be transmitted. At the client side with the help of a newly defined protocol we generate the text message to be sent the application program in this side converts the text message to the corr esponding ASCII codes. The ASCII codes are given to the Bluetooth of the mobile which converts into the Bluetooth frequency signal.

The ASCII code from the client side to the server side is transmitted by means of Bluetooth .At the server side we implement Bluetooth on system by means of a device called a Dongle, which is inserted to a USB port. This dongle contains a firmware (embedded software) which accepts the Bluetooth signal send to the system. And converts this signal to the USB data format. Through the universal serial bus (USB) which is accepted by the firmware of the dongle is passed to the system. In this system we generate application software which gets data from USB port as input. In application software we implement a Parser which works according to the defined protocol and parses the incoming data and identify the corresponding command function of the ASCII code received. This application software executes the command in order to perform the specific operation.

All rights reserved Copyright V2computers 2007 through 2010

21

To Downlo

0)( '

A st

Full Repo t Cli k He e

<< back

&

&

&& %

You might also like