Pages

Monday, December 28, 2009

National Level Technical Symposium (VIDYOTAN 2010) 23rd January 2010

National Level Technical Symposium (VIDYOTAN 2010) 23rd January 2010

Sipna's College of Engineering and Technology,
Amravati(M.S.)

Schedule

Important Dates:

    A) Last date for full paper submission 10th  Jan, 2010 by Email only

    B) Intimation for acceptance 12th jan,2010

    C) Last date for registration with D.D. 19th Jan,2010

  Email: vidyotan2010@gmail.com

EVENTS


PAPER PRESENTATION

Themes :

· Computer Science & Engineering & Information Technology. (Click here for topics).
· Electronics & Telecommunication Engineering. (Click here for topics)
· Instrumentation Engineering. (Click here for topics)
· MBA  (Click here for topics)

Guidelines:


· Maximum Two Authors per paper.

· Paper received after the last date will not be considered

· A4 size (one side only) with 2.5 cms left & right margin.

· Font Size 12 in MSWORD-98/2000/XP with Single Line spacing

· Title should be Bold

·  Font Type Times New Roman

· Length of the paper not more than six pages including Abstract. The Abstract (100 to 150 words) .

Registration Details:

* Registration fees Rs. 250/- per  author
* Registration form can be downloaded... from Here
* D.D. should be drawn in the favor of " Principal, Sipna’s college of Engineering & Technology, Amravati.”

Important Dates :

· Last Date for full paper submission by Email. vidyotan2010@gmail.com :             10 Jan. 2010.

· Intimation for acceptance up to :      12th Jan 2010.

· Last date for registration with D.D.:  19th Jan 2010.

( Click here  for registration form)
   
ON SPOT C PROGRAMMING

Rules:

· One student per system
· Maximum 10 minutes will be given to each student per round
· Zero or minimum error programmer, with minimum time taken for program execution, will be eligible for next round
· Blank page, mobile and pen are not allowed
· Only one student will be selected from each round.

Guidelines:

· On-spot registration
· Registration fee: Rs.50 /- per candidate
· While program execution System monitor will be switched off (C, C++ editor remain open)
· Program will be provided on time.

event organized for National level technical paper presentation and Robotics competition on 23rd January 2010 in collaboration with 'Institute of Electronics Telecommunications and Engineers'IETE forum established on 24th July 2004

LAN GAMING

Rules:CrossFire  : A Lan Gaming

* COUNTER STRIKE :- CONDITION ZERO GAME

· Three students per Team.
· Team registration : Rs.50 per member.
·  Hacks cannot be allowed if any one does he will be terminated from the game.

Need For Speed : A Hot Pursuit  [Most Wanted]

· Three students per Team.
. Every round has 1 map.
·  Hacks cannot be allowed if any one does he will be terminated from the game.

ROBO-EXUBERANT


Events:
1)      Extricate- Robo Task .. click here
2)      Extrude – Juggernaut.. click here

Rules:

Max. 3 members per team.
Registration Fees Rs.500/- per team.
Payment Mode: D.D./ Cash

Last Date for Registration 05th January 2010
Acceptance & Notification : Up to 12th  January 2010
Download Registration Form : click here

POSTER DOWNLOADS....Click Here

Contact us
Chief Co-ordinators:

Prof. V.T.Gaikwad (9730918910)
Prof. N.N.Kasat     (9766309111)

Event Co-ordinators:

Paper Presentation

Prof. G. P. Dhok      (9766320053)
Ms. Nayana Kalhane( 9665733108)

Robotics Competition
  
Prof. Hardik B. Nadiyana(9890750803)
Rushikesh Gaydhani (9960615050)

Cross Fire: LAN Gaming

Prof. D. M. Dakhane (9223274972)
Rohit Narkhede (9423459694)

On spot C programming

Prof. G. S. Thakare(9890916669)
Sachin Gabhane (9975056754)

Monday, December 21, 2009

Workshop on E-Learning, Trends and Technologies, January 22-23, 2010

Workshop on E-Learning, Trends and Technologies, January 22-23, 2010

Organised by

Department of Computer Applications,
National Institute Of Technology,
Tiruchirappalli - 620 015.

E-Learning

E-Learning is the use of technology to enable people to learn anytime and anywhere, which can include training, the delivery of just-in-time information and guidance from experts.The major advantages are : learning is done at the learner’s pace, rich content can be created and delivered, levels of accessibility can be in any suitable form etc. E-learning will certainly become a great tool to enhance qualifications in the job market.

The biggest challenge faced by many industries is the rapid change of technologies and the need to use them in their product development. The changes are due to the result of changes in requirements, technology evolution,changes in market trends etc. To cope up with the changes, it becomes mandatory for the organizations to equip their manpower with sufficient knowledge levels or mastery in various skills. Interestingly, many companies have started defining e-classes.

Reports say that one of the top 10 positions of the future companies will be that of an online learning designer.It is not companies alone that look at different ways of using technology to facilitate the learning and content delivery process, but also several academic sectors such as universities, institutions and schools.

About Workshop

This two day workshop is for those who are interested in knowing about various trends and technologies associated with e-Learning in terms of architectures, software and hardware components, design and implementation strategies.

Highlights

    * What is E - Learning?
    * Components
    * Content Development
    * Multimedia Technologies
    * Models & Products
    * Research Directions

Eligibility

The teachers and research scholars of academic institutions and participants interested in implementing the e-Learning systems for their domains are eligible to attend. The participants will be provided with working lunch. No TA/DA will be given. The number of participants is limited to 40.

Registration Details

Application for participation in the workshop shall be sent to the coordinators as given in the attached format along with the registration fee of Rs.750/- by D.D. drawn in favor of The Director, NIT, Tiruchirappalli-620015 payable at SBI, NIT Branch (Code - 1617). Selection for the workshop and accommodation are based on first come first served basis.

Registration Form

Address for correspondence

S.R.Balasundaram
Dept. of Computer Applications
NIT Trichy-15
blsundar@nitt.edu  (9994291420)

For more information visit us at : http://www.rssbol.com

AICTE/MHRD sponsored Staff Development Programme On “COMPUTER CONTROL OF PROCESSES (CCP-2010)” 4th -9th January, 2010

AICTE/MHRD sponsored Staff Development Programme On “COMPUTER CONTROL OF PROCESSES (CCP-2010)” 4th -9th January, 2010

Organised by

NATIONAL INSTITUTE OF TECHNOLOGY
TIRUCHIRAPPALLI - 620 015
TAMILNADU

COURSE OBJECTIVES:

The objective of course is to provide knowledge of the fundamental and advanced concepts in Control Engineering and related software. The course aims to explain the theory underlying the concepts and provides experience of implementation using MATLAB, LABVIEW and interfacing the real time setup with software. This workshop will focus on the latest developments in the field of Control Engineering.

COURSE COVERAGE

The topics proposed to be covered are as follows:
Overview of Courses:
• Introduction and overview of Computer Control of Process.
• System Identification, Non-Linear state estimation techniques and Adaptive controller design.
• Fixed order PID, Fractional order PID nonlinear PID and IMC controller design.
• Multivariable Control system.
• Other Popular discrete controller design
• Overview of PLC, SCADA, DCS, FIELDBUS and HART BUS protocols.
• Real time Demos and hands on sessions.
• Research presentation in the area of Control Engineering.

REGISTRATION


Faculty from Academic Institutions: Nil
Participants from Industries : Rs 2,000
The registration fee must be paid by DD in favour of “The Director, NIT, Tiruchirappalli-620015” and payable at SBI, NIT, Tiruchirappalli.
ACCOMMODATION AND TRAVEL

All the participants will be provided with free boarding and lodging facilities. TA will be reimbursed as per the AICTE/NIT norms.

ELIGIBILITY

The programme is open to the Engineering faculty of AICTE approved Engineering colleges. For candidate from Industry and R&D Institutions: Rs. 2,000/- per Participants.

RESOURCE PERSONS

The course faculty members from NIT and other reputed universities, R&D organizations/Industry person.

REGISTRATION FORM

IMPORTANT DATES
Last date for Receipt of application: 23-12-2009
Acceptance Notification : 24-12-2009
Application and Sponsorship certificate is neatly typed & dully filled and send to
Dr. K. Srinivasan
Co-ordinator - CCP 2010
Department of Instrumentation and Control Engineering
National Institute of Technology
Tiruchirappalli - 620 015
Tamil Nadu, India
Email: srinikkn@nitt.edu
narayanan@nitt.edu, nsknitt@gmail.com.
Phone: 0431-2503361/62/63/64
Mobile No.:09486001176


For more information visit us at : http://www.rssbol.com

ROBOTICS FOR PERFORMING SURGICAL OPERATIONS

ROBOTICS FOR PERFORMING SURGICAL OPERATIONS

ABSTRACT

Over the years robots have been widely used in manufacturing industries for material handling, welding, assembly, etc. so robots are designed as helping hand. They help us in difficult, unsafe task. Machines that can be programmed to perform a variety of jobs, and they can range from simple machines too highly complex, computer controlled intelligent system. Robots are used in industries, warehouse, laboratories, etc. Technocrats and Medical surgeon all over the world have joint hands for developing specialized robotic devices for performing surgical operations too.
 This paper presents a robotic system for precise needle insertion under radiological guidance for surgical interventions. It is compatible with portable X-ray units and computer tomography scanners. The system presents modular structure comprising global positioning, miniature robotic and radiolucent needle driver modules. The system may be operated stand alone under joystick control making it adaptable to operating rooms, or under full image guided computer control.
This paper will also proved brief classification, operation and practical application in medical science. The R-T Friction transmission with axial loading for needle insertion gives the idea which where used in “ancient year”. Also this robot is control by the GPS system, which is far away from the operation room


For more information visit us at : http://www.rssbol.com

AUTOMATION USING PLC

AUTOMATION USING PLC

ABSTRACT

In today’s world of automation, you now have many cost effective control solutions that allow for advanced computer control. With these advanced control solutions come the gigabytes of process data that can be utilized for quality control, process optimization and maximizing equipment capacity. Each type of system has different costs associated with their implementation.
Many of these costs are associated with proprietary, semi-open control solutions. With advances in PLCs, personal computers and operating systems, end users now have the ability to install cost competitive control solutions while maintaining the quality of control and data availability. The base process to be used in the control solution comparison is a vacuum washer line with knotting and screening. The three systems solutions for the comparison will be a traditional DCS, mini-DCS and PLC/PC (SCADA control).
Introduction to automation defines it, technology associated with it, the application of mechanical, electrical, and computer-based systems to operate and control production, its requirement in industry. The benefits of automation such as Automatic data recording and preparation, greater accuracy and reproducibility of results, reducing costs are also included.
Recently, however, the very existence of SCADA based systems has come into question as they are increasingly seen as extremely vulnerable to cyberwarfare/cyberterrorism attacks. Given the mission critical nature of a large number of SCADA systems, such attacks could, in a worse case scenario, cause massive financial losses through loss of data or actual physical destruction, misuse or theft, even loss of life, either directly or indirectly

For more information visit us at : http://www.rssbol.com

A FORCE-CONTROLLED MICROGRIPPER FOR ASSEMBLING BIOMEDICAL MICRODEVICES

A FORCE-CONTROLLED MICROGRIPPER FOR ASSEMBLING BIOMEDICAL MICRODEVICES

Abstract

This paper presents recent results on the development and control of a microgripper based on flexure joints, fabricated by LIGA and instrumented with semiconductor strain-gauge force sensors. The microgripper is the end-effectors of a workstation developed to grasp and manipulate tiny objects such as the components of a typical biomedical micro device.
The development of the force control in the microgripper is of fundamental importance
In order to achieve the dexterity and sensing capabilities required performing assembly tasks for biomedical micro devices. As a step towards the definition of the force control strategy, system identification techniques have been used to model the microgripper. Results indicate that a proportional integral (PI) controller could be used to assure, at the same time, closed-loop stability of the system, and a bandwidth suitable for the intended applications. The force control is based on strain-gauge sensors, which have been integrated in the microgripper and experimentally characterized. Sensor response in the idling condition and during grasp showed that they can provide useful information for force control of the microgripper.

For more information visit us at : http://www.rssbol.com

Home Automation Systems with Different Network Technologies and Remote-Control

Home Automation Systems with Different Network Technologies and Remote-Control

Abstract:

This paper describes an investigation into the potential for remote controlled operation of home automation systems. It considers problems with their implementation, discusses possible solutions through various network technologies and indicates how to optimize the use of such systems. The home is an eternal, heterogeneous, distributed computing environment which certainly requires careful study before developing any suitable Home Automation System (HAS)
that will accomplish its requirements. Nevertheless the latest attempts at introducing Home Automation Systems in actual homes for all kinds of users are starting to be successful due to the continuous standardization process that is lowering the prices and making devices more useful and easier to use for the end user. Even so several important issues are always to be handled strictly before developing and installing a Home Automation System; factors like security,
reliability, usefulness, robustness and price are critical to determine if the final product will accomplish the expected requirements.


http://www.rssbol.com

A Revolution in Braking System

A Revolution in Braking System

ABSTRACT

It’s a new language of automobiles. At the heart of this boom in vehicle design and functionality is "Mechatronics." Short and sweet, Mechatronics can be defined as the intersection of mechanics, electronics, computers and controls. According to the American Society of Mechanical Engineers, the term was coined 35 years ago by Japan's Yaskawa Electric Co. where it was first used in terms of the computer control of electric motors to make a mechanical device smarter. Modern mechatronics can be applied to make mechanisms smarter, via improved efficiencies, speed and control and system interaction. Consider noise and vibration, which in the past have been chronic sources of inefficiencies in the automotive industry. Today and in the future, using sensors to monitor the noise and vibrations levels, components also can incorporate adaptive actuators to counteract those levels, effectively enabling behavior to be an integral and useful function.  EBS utilizes electronics for the control side of the vehicle's braking system. An electronic signal replaces the air signal sent by the brake pedal to activate the brakes, improving stopping distances and braking system performance. And EBS will provide the platform for the advanced safety systems of the future.

http://www.rssbol.com

AQUATIC ROBOT

AQUATIC ROBOT

Abstract

This paper aims to provide a relevant approach in the field of robotics (how robots are built) and give a new dimension to man’s ability and nature’s challenge to create a design that could walk on water. In general terms the picture of robot gives a common man an idea of a big, heavy machine built of heavily cast metal and wires around that make it run. But due to advancement in fields like nanotechnology, chip designing, polymers and plastic etc, building a robot that could float and as well as walk on water seems like a dream that will soon come true. The concept and idea behind this dream, i.e. Aquatic Robot is that of water insects such as water skaters.
Water striders are almost float and walk on water, but being creatures they provide a window into the fascinating and complex world of an aquatic life. Aquatic insects are invertebrates. Unlike fish, people and birds, invertebrates lack a backbone. Some insects not only float and walk on water but also are even capable of jumping of several centimeters on the water surface. These insects are able to hold themselves on water because they are not heavy enough to break the surface tension of the water.

http://www.rssbol.com

AUTONOMOUS ROVERS FOR MARS EXPLORATION

AUTONOMOUS ROVERS FOR MARS EXPLORATION

ABSTRACT:

            The Pathfinder mission demonstrated the potential for robotic Mars exploration but at the same time indicated the need for more robust rover autonomy. Decision support systems (DSS), Data warehousing, an integral part of artificial intelligence provides an infrastructure that    enables future planned missions call for long traverses over unknown terrain, robust navigation and instrument placement, and reliable operations for extended periods of time.
                Ultimately, missions may visit multiple science sites in a single day and perform opportunistic science data collection, as well as complex scouting, construction and maintenance tasks in preparation for an eventual human presence. Significant advances in robust autonomous operations are needed to enable these types of missions. Majority of a firm's intellectual assets exist as knowledge in the minds of its employees. What is needed is a new generation of knowledge-enabled systems that provides the infrastructure needed to capture, cleanse, store, organize, leverage and disseminate not only data and information but also the knowledge of the firm.
                  The basic purpose of a data warehouse is to empower the rovers (knowledge workers) with information that allows them to make decisions based on a solid foundation of fact. Thus, the purpose of DSS is knowledge improvement. This expanded purpose of DSS also suggests that the effectiveness of a DSS will, in future be measured based on how well it promotes and enhances knowledge, how well it improves the mental models and understanding of the decision makers and thereby how well it improves its decision making.
                   Towards this end, we have designed an onboard executive architecture that incorporates robust flexible operation, resource utilization and failure recovery.
            In addition, we have designed ground tools to produce and refine contingent schedules that take advantage of the onboard architectures flexible execution characteristics.

http://www.rssbol.com

Range Measurement using Optical Method for Mobile Robots

Range Measurement using Optical Method for Mobile Robots

ABSTRACT

In application of Mobile robotics, environmental interaction is very important. Actuation of Mobile Robotics by various techniques depending on its immediate surroundings for reliable extraction of information is also of great importance. Review of various sensing methods in robotics is described. Various sensing techniques like coaxial sensor and normal sensors arranged in coaxial manner gives certain advantages.
Optical sensors where control light source in terms of signal where amplitude, power and frequency are major constraints. Dependency on the applicability to mobile robotics.
This paper reviews a light detection and ranging system for range measurement in mobile robotics. In any LIDAR system, physics of reflection of light from various surfaces and sources is highlighted. Ability of measuring of range by the sensor is depending upon the specular and or defused reflection of light, which has a great importance in measurement.
The various parameters like type of reflection, dynamic range of the received signal strength, cross talks and power are having relations with the measurement techniques and highlighted in various popular LIDAR measurement techniques.
Review of another i.e., sound navigation and ranging (SONAR) is presented for Mobile Robot. Its processing algorithms for correct interpretation of ultrasonic data recorded in indoor environment is demonstrated. Model of reflection mechanism provided by the ultrasonic sensors is going to be highlighted. Ultrasonic wave reflection is generally dominated by specular reflections. Various techniques in SONAR for range estimation and correct target classification is highlighted.
Actuation of Mobile Robot by sensors range estimation through various techniques is highlighted for the review here.

http://www.rssbol.com

Automation a solution to competition

Automation a solution to competition

ABSTRACT

                        Automation is system integration for well co ordinated and guided combination of Material, Energy, Operation and process with minimum user defined intervention. Automation is broadly classified as Office automation, Service automation, and industrial automation. Human body and its functioning is the most advanced automated system consisting of sensors (eye, ears etc), actuators (hands, legs etc), PLC (brain). This paper is basically divided into three major segments. First segment highlights the features of automation and also introduces you to automation along with the reasons behind automization. Second segment comprising of eight topics, discuses the various bright aspects of automation with their advancements and benefits. It also contains a case study with pre-automation and post-automation and the trends adopted. Fourth segment is our conclusion that explains the total zest that we experienced while preparing the paper presentation over automation.

http://www.rssbol.com

Saturday, December 19, 2009

Wireless Security and An Introduction to Packet Voice Networking in the Wide Area Network

Wireless Security and An Introduction to Packet Voice Networking in the Wide Area Network


ABSTRACT      

        Wireless possibilities are infinite. Wireless communication is a vast area, with numerous fields in which research and development are underway. This paper makes an earnest effort, in shedding light on the latest in cutting-edge wireless communication trends and technology.
             Today’s 802.11 wireless technology promises to open up exciting new
possibilities. The wireless vision contemplates continuous, trusted connectivity for a wide range of client devices including PCs, PDAs (Personal Digital Assistants), phones, printers and more, with seamless hand-offs between LANs and WANs The market value of WLANs is forecast to approach to almost $5 billion by 2005 . With this enormous usefulness and value at stake, it is vital that WLAN communications be adequately protected from security threats, both today and in the future.

A robust and scalable security solution is available by using Virtual Private Network (VPN) technologies. This paper examines current wireless security methods and also looks at the use of VPN to augment wireless security.
              
                The public telephone network of today is in many ways unchanged from the networks of the early 1980s. During this period, there have been great advances in data network technology that have both improved network economics and improved control over network quality of service. It is those advances that have spawned today's increasing deployment of packet voice.
              
               Packet voice transport using advanced compression algorithms like G.729 can transport as much as 5 times the voice traffic per unit of network bandwidth as the PCM-based networks used in public telephony. Users with existing data networks can often interleave their voice traffic with data at little or no additional transport cost and little or no impact on application performance. Users with circuit-switched T1/E1/J1 voice networks can, with packet voice transmission, often free up enough bandwidth from existing voice trunks to carry their entire data load.


http://www.rssbol.com

Use of Cryptography in data security over a network and Role and versatility of Hash function

Use of  Cryptography in data security over a network  and Role and versatility of Hash function

Abstract:

The increased use of computer & communication systems by industry has increased the theft of  proprietary information. Although these threats may require a variety of counter measures, encryption is a primary method protecting valuable electronic information. Cryptography is probably the most important aspect of communication and network security.
Today's cryptography is more than encryption and decryption. Authentication is as fundamentally a part of our lives as privacy. We use authentication throughout our everyday lives - when we sign our name to some document for instance - and, as we move to a world where our decisions and agreements are communicated electronically, we need to have electronic techniques for providing authentication.
Cryptography provides mechanisms for such procedures. A digital signature binds a document to the possessor of a particular key, while a digital timestamp  binds a document to its creation at a particular time. These cryptographic mechanisms can be used to control access to a shared disk drive, a high security installation, or a pay-per-view TV channel.
While modern cryptography is growing increasingly diverse, cryptography is fundamentally based on problems that are difficult to solve. A problem may be difficult because its solution requires some secret knowledge, such as decrypting an encrypted message or signing some digital document. The problem may also be hard because it is intrinsically difficult to complete, such as finding a message that produces a given hash value. As we can see that designing the hash functions such that the key generation and key management becomes more effective, efficient and dynamic. Day by day the problem of having secured transactions on network is becoming critical. It’s a challenging job to define more versatile hash functions in front of the designers. Our paper discusses the status-co and improvements in hash functions so as to make them more compatible in this world of threats and attacks.

http://www.rssbol.com

Quantum Cryptography Introduced

Quantum Cryptography Introduced

Abstract:

Today, several applications demand the need of secure transmission of data. This led to the art of cryptography. The messages were now encrypted in such a manner that only using a key could access them. The key was sufficiently long to be guessed or based on the fact that several mathematical operations take lot of time to be performed. But with the arrival of next-gen quantum computers, the fact became a myth. Necessity for secure transmission gave birth to quantum cryptography.

It is based on Heisenberg’s uncertainty principle. Proposed by Wiesner, this method uses polarized light for transmission. The key is generated by sending bits that can be either interpreted as 0 or 1 at receiving end. Then both sender and receiver agree upon which bits are to be used as the key. This is done to avoid any eavesdropper from accessing the key. The message is now locked using the key and transmitted.

So, now the key is long enough to be guessed and the key is securely transmitted. And any attempt of eavesdropping will damage the message. Now we have prevented any eavesdropper from accessing the information and any attempts of attack are detected. More are the attacks; more is the probability of detection.

Thus, this method is highly secure and any attempts to eavesdropping are easily detected.

The only drawback of this method is that it couldn’t be used for long distance transmission, at least today.

So we can easily conclude that the ‘digital fortress’ is here. The dream of the unbreakable code has turned into reality.

http://www.rssbol.com

IP SPOOFING

IP SPOOFING

Abstract

    In this age of universal electronic connectivity , of viruses and hackers , of electronic eaves-dropping and electronic fraud , there is indeed no time at which security does not matter .

Security is the Science and study of protecting software (by means of n/w security mechanisms: Firewalls , Intrusion Detection Systems , System providing access control to devices and mechanisms to ameliorate denial of service and distributed denial of service attacks) against  spoofing (unauthorized access) , modification ,  analysis or exploitation. Security remains a major hurdle to the universal acceptance of  the  web for many kinds of transactions .

    The explosive growth in computer systems and their inter connections via networks has increased the dependence of both organizations and individuals on the information stored and communicated on these systems. This , in , turn has led to a heightened awareness of the need to protect data and resources from disclosure , to guarantee the authenticity of data and messages , and to protect systems from network based attacks.

As the disciplines of cryptography and network security have matured , there is a need to the development of practical and readily available applications to enforce network security. Every one has a different view about security and hence different security procedures have come up. But before adopting any of these it is essential to understand  what actually network security is  , the type of attack ,and the security procedures .
   
Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It is not a surprise then, that criminals who conduct their nefarious activities on networks and computers  employ such techniques. IP spoofing is one of the most common forms of on-line camouflage.
In this paper , we present  IP – Spoofing  :  the attack in brief and the possible ways of  securing the network against spoofing .

http://www.rssbol.com

FLASH MEMORY

FLASH MEMORY

ABSTRACT

 Flash memory is a non-volatile memory similar to EEPROM differing in the principle of in-circuit wiring used to erase the entire chip or blocks of defined size in it. Flash memory stores charge (information) in the array of floating gate transistors called ‘cells’ storing one bit of information. Presence of charge determines whether channel will conduct or not. In NOR During read cycle a ‘1’ at output corresponds to channel being in ON state. Control gate is used to charge gate capacitance during ‘write’ cycle using Fowler- Nordheim tunneling. NAND flash uses tunnel injection for writing and tunnel release for erasing. Only NOR flash memory offers execute in place (XIP) capability for read operation. Common flash interface commands are defined for write/erase operations by block handling. In NAND virtual memory strategies are used for read/write/erase operations. Factors for considering NAND/NOR reliability are Bit flipping, Bad block handling, Life span (Number of Erase/Write cycles). EDC/ECC algorithms need to be used while using NAND type flash. NAND also needs to be scanned for bad blocks and mapping them all out. NOR offers 10 times the number of erase/write cycles than NOR. The improvements that took place in conventional flash memory design are MLC (Multi level cell) NAND, Raw NAND, NAND with external controller, NAND with Chipset controller, Mirror bit flash technology. The advantages of Flash memory are Improved Data protection, Security, Capacity, Highest chip density, Fabrication compatible with CMOS process. Flash memory has an edge over other emerging non-volatile memories with DiskonchipG3 and Mirror Bit Flash technology the most promising technologies today.

http://www.rssbol.com

Fingerprint verification using Embedded Systems

Fingerprint verification using Embedded Systems

ABSTRACT
           
           Embedded system plays the most vital part in today’s communication world.  Security is becoming the primary need of every individual. Existing security measures rely on knowledge-based approaches like passwords or token based approaches such as swipe cards and passports to control access to physical and virtual spaces. Though ubiquitous, such methods are not very secure. Embedded system can be satisfactorily used to identify biometrics such as fingerprint, voice & ultimately for security purposes.
           Fingerprints are one of the first forms of biometric authentication to be used for law enforcement and civilian applications. Contrary to popular belief and despite decades of research in fingerprints, reliable fingerprint recognition is still an open problem. In this paper, we present specific contribution to advance the state of the art in this field
           Fingerprint sensors are getting small enough to be included in mobile devices to enable fingerprint verification be employed as an authentication tool when using the mobile devices for secure transactions. Fingerprint verification, however, is a computing intensive technology that requires a lot of floating-point computation. In this paper, we present the implementation of a fingerprint verification process in an embedded system environment based the StrongArm processor and the embedded Linux operating system.
           In this paper, we will focus on different methodologies for implementing fingerprint authentication in embedded systems, namely the DSP and SoC (System-on-Chip) approaches for Wireless Applications. The success of the implementation relies on the use of a fixed-point arithmetic only. The fingerprint verification component, the fixed-point component as well as the technique employed to pair up the two components are described in details.

http://www.rssbol.com

Low-Power Color TFT LCD Display for Hand-Held Embedded Systems

Low-Power Color TFT LCD Display for Hand-Held Embedded Systems

ABSTRACT

An LCD (Liquid Crystal Display) is a standard display device for hand-held embedded systems. Today, color TFT (Thin-Film Transistor) LCDs is common even in cost-effective equipments. An LCD display system is composed of an LCD panel, a frame buffer memory, an LCD and frame buffer controller, and a backlight inverter and lamp. All of them are heavy power consumers, and their portion becomes much more dominant when running interactive applications. This is because interactive applications are often triggered by human inputs and thus result in a lot of slack time in the CPU and memory system, which can be effectively used for dynamic power management.
In this paper, we introduce low-power LCD display schemes as a system-level approach. We accurately characterize the energy consumption at the component level and minimize energy consumption of each component without appreciable display quality degradation. We develop several techniques such as variable-duty-ratio refresh, dynamic-color-depth control and backlight luminance dimming with brightness compensation or contrast enhancement. Each method exhibits power reduction of 260mW, 250mW and 480mW, respectively. The aggregate energy reduction ratio is 28% out of total energy consumption including the CPU and the main memory system when we execute a document viewer. We also demonstrate that we can extend the battery life about 38% and 20% for a text editor and an MPEG4 player, respectively.

http://www.rssbol.com

EMERGING TRENDS IN VLSI AND EMBEDDED SYSTEM

EMERGING TRENDS IN VLSI AND EMBEDDED SYSTEM

ABSTRACT

VLSI – the term stands for “very large scale integration” which literally means packing more and more logical devices in smaller and smaller areas. The electronics industry has achieved a phenomenal growth over the last two decades, mainly due to the rapid advances in integration technologies, large-scale systems design - in short, due to the advent of VLSI.

The number of applications of integrated circuits in high-performance computing, telecommunications, and consumer electronics has been rising steadily, and at a very fast pace. Typically, the required computational power or intelligence of these applications is the driving force for the fast development of this field. 

 VLSI has been around for a long time, there is nothing new about it ... but as a side effect of advances in the world of computers, there has been a dramatic proliferation of tools that can be used to design VLSI circuits. Alongside, the capability of an IC has increased exponentially over the years, in terms of computation power, utilization of available area, yield.

The combined effect of these two advances is that people can now put diverse functionality into the IC's, opening up new frontiers, of which development of the “embedded systems” could be stated as the most remarkable achievement! 

These are very  intelligent devices are put inside everyday objects, and ubiquitous computing where small computing devices proliferate to such an extent that even the shoes you wear may actually do something useful like monitoring your heartbeats!
These two fields are kind of related, and getting into their description can easily lead to another article.             

http://www.rsssbol.com

EMBEDDED INTERNET JAVA

EMBEDDED INTERNET JAVA

ABSTRACT 

 Today  , Embedded systems have been applied to a variety of industrial and consumer products, including disk drivers in computers, airbag controls and antilock brakes in automobiles, automated teller machines at banks, and space-borne imaging systems on the space Embedded systems are cheaper and more reliable than today's software used in PCs shuttles. We introduce the concept of embedded internet java because most of the Embedded system are dedicated for controlling and sensing application also problems related to universal connectivity for embedded devices The solution is use of TCP/IP std for universal connectivity also providing a good GUI. Like browser.

http://www.rssbol.com

DISTRIBUTED LOW POWER EMBEDDED SYSTEM

DISTRIBUTED LOW POWER EMBEDDED SYSTEM

Abstract

Dynamic voltage scaling (DVS) is one of the most studied topics in low-power embedded systems. Based on CMOS characteristics, the power consumption is proportional to V2; while the supply voltage V is linearly proportional to the clock frequency. To fully exploit such quadratic power vs. voltage scaling effects, previous studies have extensively explored DVS with real-time and non-real-time scheduling techniques. As DVS reaches its limit on a single processor, researchers turn to multiple processors to create additional opportunities for DVS. Multiple processors can potentially achieve higher energy savings than a single processor. By partitioning the workload onto multiple processors, each processor is now responsible for only a fraction of the workload and can operate at a lower voltage/frquency level with quadratic power saving. Meanwhile, the lost performance can be compensated by the increased parallelism. Another advantage with a distributed scheme is that heterogeneous hardware such as DSP and other accelerators can further improve power effi- ciency of various stages of the computation through specialization. Although a tightly-coupled, shared-memory multiprocessor architecture may have more power/performance advantages, they are not as scalable as distributed, messagepassing schemes. While distributed systems have many attractive properties, they pay a higher price for message-passing communications. Each node now must handle not only I/O with the external world, but also I/O on the internal network. Programming for distributed systems is also inherently more difficult than for single processors. Although higher-level abstractions have been proposed to facilitate distributed programming, these abstraction layers generate even more inter-processor communication traffic behind the scenes. While this may be appropriate for high-performance cluster computers with multi-tier, multi-gigabit switches like Myrinet or Gigabit Ethernet, such high-speed, high-power communication media are not realistic for battery-powered embedded systems. Instead, the low-power requirement have constrained the communication interfaces to much slower, often serial interfaces such as I2C and CAN. As a result, even if the actual data workload is not large on an absolute scale, it appears expensive relatively to the computation performance that can be delivered by today’s lowpower embedded microprocessors. The effect of I/O on embedded systems has not been well studied in existing DVS works. Many existing DVS techniques have shown impressive power savings on a single processor. However, few results have been fully qualified in the context of an entire system. Even fewer have been validated on actual hardware. One common simplifying  assumption is to ignore I/O.

http://www.rssbol.com

Thursday, December 17, 2009

Application of Embedded System for Smart Card

Application of Embedded System for Smart Card

Abstract

          An Embedded System is one that has computer hardware with software embedded in it as one of its most important component. It is a dedicated computer based system for an application or product. An Embedded computing system is any device that includes a programmable computer but it not itself intended to be a general purpose computer. It is controlled by a computer embedded in it. The word embedded implies that it lies inside the overall system, hidden from view, forming an integral part of greater whole. This paper explores the basic meaning of embedded system & present application.

http://www.rssbol.com

Validation And Implementation Of Spiht For Image Compression(Set Partitioning In Hierarchical Trees )

Validation And Implementation Of Spiht For Image Compression(Set Partitioning In Hierarchical Trees )

Abstract:

Embedded zerotree wavelet coding introduced by J.M.Shapiro[1] is a very effective and computationally simple technique for image compression and is the basic of all image compression techniques.SPIHT is a new and different image compression technique whose implementation is based on set partitioning in hierarchical trees which provides better performance than previously reported EZW and suppress the performance of the original EZW and offers fast execution. In addition, coding and decoding procedures are extremely fast ad they can be made even faster, with only small loss in performance.

 Need of compression: In many different fields, digitized images are replacing conventional analog images as photographs or X-rays .The volume of data required to describe such images greatly slow transmission and make storage prohibitively costly.  A fundamental goal of data compression is to reduce the bit rate for transmission or storage while maintaining acceptable image quality. Compression can be achieved by transforming the data by using a suitable transform  (mainly wavelet transform ) [2]  and then encoding this transformed data.

http://www.rssbol.com

DIGITAL SIGNAL PROCESSING IN BIOMEDICAL ENGINEERING

DIGITAL SIGNAL PROCESSING IN BIOMEDICAL ENGINEERING                                      

ABSTRACT

Digital Signal Processing, a field which has its root in the 17th & 18th century mathematics has become an important modern tool in a multitude diverse field of science & technology. The techniques & applications of this field are as old as Newton & Gauss & as new as digital computers & integrated circuits.
digital Signal Processing means processing signals in digital domain, which includes
# Modifying signal characteristics
# Multiplying two signals ( Modulation, Correlation)
# Filtering
# Averaging
DSP can extract one signal from another. The purpose of such processing may be to estimate characteristic parameter of a signal into a form which is in some sense more desirable. DSP can analyze ECG or EEG to extract some characteristic parameter.

http://www.rssbol.com

How The Moving Images are the Moving Product (HOLOGRAPHIC TECHNOLOGY)

HOLOGRAPHIC TECHNOLOGY
How The Moving Images are the Moving Product


ABSTRACT

Holographic Storage is an optical technology that allows 1 million bits of data to be written and read out in single flashes of light. Thousands of Holograms can be stored in the same location throughout the entire depth of the medium. Unlike other technologies that record one data bit at a time, holography allows a million bits of data to be written and read in parallel with a single flash of light. This enables transfer rates significantly higher than current optical storage devices. This technology is used in various fields such as Data Storage, Holographic Images, anti counterfeit security systems etc. Further High storage densities, rapid read rates, High fidelity data recovery, High fidelity imaging of data pages, Low levels of noise in data recovery and long life create many new and exciting application areas for remote Holographic Technology. Combining high storage densities, fast transfer rates, with durable, reliable, low cost media, make holography poised to become a compelling choice for next-generation storage and content distribution needs.

http://www.rssbol.com

WATERMARKING PROTECTING ONE'S WORK FROM BEING HIJACKED

WATERMARKING PROTECTING ONE'S WORK FROM BEING HIJACKED

ABSTRACT

    The recent growth of internet usage and networking multimedia systems has necessitated the need for the protection of digital media. This is especially critical for the protection and enforcement of intellectual property rights. Copyright protection involves the authentication of object (text/image/video) ownership, and the identification of illegal copies of a (possibly forged/fake) object. Techniques are needed to prevent the copying, forgery and unauthorized distribution of images and video sequences on a public network puts them at risk of theft and alteration.
    This paper presents the characteristics, implementation methods and various applications of Watermark.It also deals with various types of Watermark attacks. It emphasizes the need for watermarking to protect one’s work from being hijacked. The need for watermarking emanates from the following: A designer has created an image and wants to make it available on the network. When unauthorized copies or forgeries of the image appear elsewhere on the network, the designer needs to prove his ownership of the image. One also needs to determine if and by how much the image has been changed from the original. This way the person can prove ownership by illustrating the difference between the forged image and the original.

http://www.rssbol.com

Image Enhancement Techniques ....

Image Enhancement Techniques ....

ABSTRACT

Image enhancement techniques are used to emphasize and sharpen image features for display and analysis. Image enhancement is the process of applying these techniques to facilitate the development of a solution to a computer imaging problem. Consequently, the enhancement methods are application specific and are often developed empirically.

The type of techniques includes point operations, where each pixel is modified according to a particular equation that is not dependent on other pixel values; mask operations, where each pixel is modified according to the values of the pixel's neighbors (using convolution masks); or global operations, where all the pixel values in the image (or sub image) are taken into consideration. Spatial domain processing methods include all three types, but frequency domain operations, by nature of the frequency (and sequence) transforms, are global operations. Of course, frequency domain operations can become "mask operations," based only on a local neighborhood, by performing the transform on small image blocks instead of the entire image

Enhancement is used as a preprocessing step in some computer vision applications to ease the vision task, for example, to enhance the edges of an object to facilitate guidance of a robotic gripper. Enhancement is also used as a preprocessing step in applications where human viewing of an image is required before further processing. Image enhancement is used for post processing to generate a visually desirable image. Overall, image enhancement methods are used to make images look better. so
“Image Enhancement Is As Much An Art As It Is A Science. ”

http://www.rssbol.com

Image Processing In Automotive Safety

Image Processing  In  Automotive Safety

ABSTRACT

Dozens of processors control every performance aspect of today’s automobiles, and not a single feature of the “vehicle experience” remains untouched by technology. Whether its climate control, engine control, or entertainment, there has been constant evolution of capabilities in manufacturer offerings over the last decade.
 Since Electronics is making its road in the automotive sectors. With hand in advance electronics technologies automotive sector if fully lightened. Several processors and sensors are continuing their services in automation, control and in safety without alteration of basics. Here this paper focuses light on video in automobile in areas like airbag deployment. Collision avoidance. With Image processing technique lane departure is explained with example  
Information processing capabilities of imaging processing presently lack the robustness and rich complexity found in biological systems. Endowing artificial systems with the ability to adapt to changing conditions requires algorithms that can rapidly learn from examples. We demonstrate the application of one such learning algorithm on an inexpensive process constructed to perform critical tasks in automotive industry sensor. The image processor learns to track a particular object by discovering the salient visual and auditory cues unique to that object. The system uses a convolution neural network to combine color, luminance, motion, and auditory information. The weights of the networks are adjusted using feedback from a teacher to reflect the reliability of the various input channels in the surrounding environment.

http://www.rssbol.com

IMAGE PROCESSING FACE RECOGNITION USING EIGENFACES

IMAGE PROCESSING FACE RECOGNITION USING  EIGENFACES

ABSTRACT

        Images containing faces are essential to intelligent vision-based human computer interaction, and research efforts in face processing include face recognition, face tracking, pose estimation, and expression recognition. However, many reported methods assume that the faces in an image or an image sequence have been identified and localized. To build fully automated systems that analyze the information contained in face images, robust and efficient face detection algorithms are required. Given a single image, the goal of face detection is to identify all image regions which contain a face regardless of its three-dimensional position, orientation, and lighting conditions.
       It is a near-real-time computer system that can identify an unknown subject’s face and then recognize the person by comparing characteristics of the face to those of known individuals. The computational approach taken in this system is motivated by both physiology and information theory, as well as by the practical requirements of near-real-time performance and accuracy.
       The system functions by projecting face images onto a feature space that spans the significant variations among known face images. The significant features are known as Eigenfaces because they are the eigenvectors of the set of faces. The projection operation characterizes an individual face by a weighted sum of the eigenface features, and so to recognize a particular face it is necessary only to compare these weights to those of known individuals. Some particular advantages of our approach are that it provides for the ability to learn and later recognize new faces in an unsupervised manner.   

http://www.rssbol.com

EMBEDDED SYSTEMS A DEBATE ISSUE

EMBEDDED SYSTEMS A DEBATE ISSUE

Abstract

There are different ways of defining an Embedded system. Most microcomputers are used within Embedded systems that perform some specific function.
The term embedded system is nebulous one that encompasses just about everything except desktop PC`s.
An Embedded system is one that is preprogrammed to perform a dedicated or narrow range of functions as part of larger system, usually with minimal end user or operator intervention. Many techniques are embedded in one system i.e. Embedded System
In this paper we discussed the present day embedded system terminology and giving the actual significance of each. It covers the embedded system classification and various computing techniques. Further it is a hand in hand working of hardware and its own software.

http://www.rssbol.com

Wednesday, December 16, 2009

One Week ISTE STTP on EMBEDDED SYSTEMS & REAL TIME APPLICATIONS (JANUARY 04 08, 2010)

One Week ISTE STTP on EMBEDDED SYSTEMS & REAL TIME APPLICATIONS (JANUARY 04 08, 2010)

ORGANIZED BY

DEPARTMENT OF ELECTRONICS ENGINEERING
Fr.Conceicao Rodrigues College of Engineering,
(Affiliated to the University of Mumbai)
Fr. Agnel Ashram, Bandstand,
Bandra(W), Mumbai400050.
Phone : (022) 26423841/42
Fax: (022) 26516831
Visit us at www.fragnel.ac.in

COURSE COVERAGE:

● Overview of Embedded Systems
● H/W Selection
● Memory Organization
● Peripheral Interfacing
● RTOS
● Task Management
● Development Tools
● Case Studies

Venue:

Fr. Conceicao Rodrigues College of Engineering,
Fr. Agnel Ashram, Bandstand,
Bandra (W), Mumbai50.
From Bandra station (W), take bus no. 211 to
reach Fr. Agnel Ashram.

TARGET AUDIENCE

● Faculty of Engineering colleges
● Faculty/Industry personnel with research interests in related areas

COURSE FEES:

Since the course is organized on a self sponsored basis, each participant will be charged Rs. 1500/as course fee.

IMPORTANT DATES:

Last date for receipt of application in prescribed form through proper channel: 25thth December, 2009

REGISTRATION FORM

ADDRESS FOR CORRESPONDENCE :

Dr. Srija Unnikrishnan,
HOD, Department of Electronics
Fr. Conceicao Rodrigues College Of Engineering, Fr. Agnel Ashram,
Bandstand, Bandra (W), Mumbai – 50
Tel. No. 912226423841

http://www.rssbol.com

Tuesday, December 15, 2009

FOOD AUTOMATION

FOOD AUTOMATION

Abstract

                  The quality of food is of primary importance to the food industry and the consumers. Consumers want food that are good, nutritious and safe. High quality food products can boost the profitability of the food supply chain from farming, processing and production to sale, thus, strengthening the entire enterprise. A food company needs to have adequate quality assurance systems and active quality system to keep its products competative in the market. Hence, Food Automation plays an important role in food industry.                
 Advances in the microelectronics and computer in the last decade have been enhanced the incentives for automation of food manufacturing processes. The methods of providing automation at a plant level are well developed. Moreover, the computer integrated manufacturing system is well developing and is vital for the effective management of the food industry. This article gives a elementary introduction on the needs, implement problems, and solution of computerized automation of food factory. Finally the overall benefits of using CIMS in the food factories are described.
                  A food plant uses various unit operations in a systematic, rational manner. These unit operations are run at controlled process conditions. The process conditions should be controlled at the optimum levels for minimum operating cost, maximum profit, and desired properties of the product. Process control technology has advanced with the availability of low-cost microprocessors and their accessories. Presently, a computer-based process control system is an essential tool of any industry.



http://www.rssbol.com

Image Guided Robotic Radiosurgery

Image Guided Robotic Radiosurgery

ABSTRACT

Radiosurgery is the precise application of a high (tumor destructing) dose of radiation in a precisely defined target volume protecting the surrounding healthy tissue. During radiosurgery many radiation beams from different directions intersect in the tumor region where they accumulate to a total dose. Surrounding healthy tissue only receives a small fragment of the total dose.
Stereotactic radiosurgery (SRS) has been used for more than 30 years to treat benign and malignant tumors and blood vessel malformations. A noninvasive operation, SRS is a medical procedure that uses large, or “killing,” doses of very accurately targeted photon radiation. Until recent technology was developed, SRS treatment had been restricted to the region within the skull. To date, more than 100,000 people with brain lesions have been treated worldwide with SRS.
uncomfortable process severely limited the ability to deliver the radiation in divided, potentially safer doses because of difficulties associated with repeated head frame placement, patient immobilization, and target accuracy.
Thus to overcome revolutionary development of the Cyberknife radiosurgery combining integrated image guided robotic technology lead to a paradigm shift in radiosurgery . Cyberknife technology is based on radiosurgical principles which are in clinical practice since 30 years.
Thus providing future radiosurgery…….

http://www.rssbol.com

MPEG-4 The Moving Picture Expert Group

MPEG-4 The Moving Picture Expert Group

ABSTRACT

MPEG-4 (ISO14496) is an ISO/IEC standard developed by MPEG (Moving  Picture Experts Group). The first version of the MPEG-4 standard was finalized in October  ‘98 and became an international standard at the beginning of 1999.  Although defined as one standard, MPEG-4 is actually a set of compression/decompression formats and streaming
technologies that address the need for distributing rich interactive media over narrow and broadband networks.

The audio and video data are integral part of any application. The basic format of audio file is “.wav”. Other formats of audio file are .wma, .mp3 etc. The .wav file is of 16 bit that means for each pixel or frame 16 bits are allocated, so by means of these we are able to store only 10-12 audio files in a CD.

 In the due course of time, there aroused a need of a format which could compress the files. But there are many constraints in compressing audio data. MPEG-4(Moving Picture Expert Group) is the solution to this problem, that keeps the quality of audio file unaffected. MPEG-4 Audio provides tools for coding of both natural and synthetic audio objects. It permits to represent natural sounds (such as speech and music) and to synthesize sounds based on structured descriptions.

The representation for synthesized sound can be derived from text data or so-called instrument descriptions and by coding parameters to provide effects, such as reverberation and spatialization. The representations provide compression and other functionalities, such as scalability or play-back at different speeds.

http://www.rssbol.com

REMOTE PROCESS CONTROL USING SMS

REMOTE  PROCESS CONTROL USING SMS

ABSTRACT


     In today’s fast paced world, one seldom has time for his day-to-day chores. Life has become so luxurious to the present man that he has all the comforts right at his fingertips. The new advents in science and technology have revolutionized the very lifestyle of man. Man wants to control everything without moving an inch from his place in other words REMOTE CONTROLLING appliances.  Many decades ago an artist named Samuel Morse was the first man to use electricity to send messages from one place to another. Time has seen man grow in stature and now we don’t even require a wire to communicate. Wireless communication has announced its arrival on the big stage and the world is going mobile.  Embedded System has made its way into almost every electronic device in use today.  Right from our watches to Cellular phones they form an integral part of the circuit. Each of these Systems is unique, and the hardware is highly specialized to the application domain. Embedded System in Communication is an emergent field and with the ever increasing mobile bandwagon that day is not far when even a common man could afford this technology and enter into the spiraling moss of Embedded System.  This paper discusses the study of Embedded System in Communication namely – “REMOTE PROCESS CONTROL USING SMS” . Here we have given a brief overview of how a simple SMS from a mobile can be used to control a remote appliance. Further the hardware requirements, compatible software and potential applications have also been touched upon.

http://www.rssbol.com

SoC’s MAKING LIFE EASIER IN THE EMBEDDED ARENA

SoC’s MAKING LIFE EASIER IN THE EMBEDDED ARENA
                                     
Abstract   

The ability to have many functional blocks on-chip is a requirement for designers today. When looking at all the new technologies and emerging design tools available, one knows that these tools have made it easier to architect systems with these new solutions. New leading-edge applications ranging from games to networking infrastructure equipment are driving the need to include large-capacity and high-speed memory on-chip rather than separately as a discrete device.
This paper discusses the need of SoC in the embedded technology, there by focusing the attention on the reduced power consumption of the devices and looking forward to the integration of the hardware and the software applications on a single chip without affecting the functionality of the output with SoC solutions. Over the past decade, one of the more interesting advancements in embedded technology has been the move toward system-on-a-chip (SoC) implementations. The migration of discrete components into a single-chip footprint enables designers to take advantage of the cost, power, and speed that just aren’t available in other equivalent multi-chip systems. This paper also gives brief review over the Advances in System-on-Chip (SoC) technology which makes it possible to utilize customizable embedded processor cores, together with a variety of novel on-chip/off-chip memory hierarchies, allowing customization of SoC architectures for specific embedded applications and tasks.

http://www.rssbol.com

SPINTRONICS

SPINTRONICS

ABSTRACT

Spintronics (short for spin-based-electronics) is new emerging field of basic and applied research in commercial electronics and engineering where "neglected" magnetic degree of freedom of an electron—its spin—is envisaged to be exploited for classical and quantum information processing. It is based on controlling the spin of electrons within tiny structures made of ultra-thin layers. The advantages are due to the fact that all spintronic devices are based on sensing the magnetic field produced by spin rather than movement of electron. The difference in the number of densities of states of spin-up and spin-down electrons can result in computers that store more data in less space, process data faster, and consume less power. ‘Magnetic RAM’ based on ‘Magnetic Tunnel Junction’ can retain their state even when the power is turned off. Similarly, in a spintronic FET flipping of an electron's spin takes much less energy and can be done much faster than pushing an electron out of the channel. Spin Bipolar Transistor can also be used as magnetic field sensor by bonding the MBT(Metal Base Transistor . In this paper, we have suggested two proposals -(1)Concept of high current gain spin based HBT(Hybrid Bipolar Transistor) (2)Multi level data storage and processing which will decrease the total system cost and power consumption, and increase the system speed. In the future, spin accumulation can be used to create magnetic fields needed to store data on next generation hard disk drives, which will increase the total capacities indefinitely.

http://www.rssbol.com

THE ELECTRIC TRAIN CONTROL SYSTEM

THE ELECTRIC TRAIN CONTROL SYSTEM

Abstract

   Today railways network has almost reached to every nook & corner of our country. That’s the foremost reason why safety should be the topmost priority. Can you believe that trains are driven “trusting God more than anything else!” It has been so for more than 150 years ever since the system came into existence in the country.
    It is really painful to see loss of life, damage to railways property, financial loss incurred due to dislocation of traffic and for payment to traveling public in care of death or injury. Train accidents that are technologically challenge are basically due to following reasons:-
1)    Trains colliding with each other in the circumstances that occurred in the recent part nearly, “Gaisal” (head of collision) tragedies.
2)    Parting of a train causing loss of precious roman life due to real end collision of the parted portion with the train in rare.
That’s why to us it appears the introduction of ANTICOUISION DEVICE seems to be the only solution. The driver has ton drive blindly with nothing except the optical signals of red and green light to depend upon. The driver has to drive, strusting that those involved in maintenance off track and signals have done their job property. For the first time a new gauged ANTICOUISION DEVICE has been designed essentially as an aid to the driver to prevent high speed need on and rear end  collision. The transmission of the information and commands generated by the ACD own commands and control unit and those received from the others, helps in the deciding whether there is a dangerous situation warranting the stoppage of the train or allow normal movement.
The ACD has the facility to apply automatic breaks in the train, in the event of something unusual being detected on the track, without even any references to the driver. ACD exchange data & commands with each other when they are within their ‘radio range’ of influences & accept specific manual input, in ‘emergencies’. Based on the ‘relevant’ train working rules programmed inside the ACD’s take decisions automatically.

http://www.rssbol.com

Monday, December 14, 2009

MIMO technology: Future of wireless communication

MIMO  technology: Future  of  wireless  communication

ABSTRACT

    Last few years have seen rapid changes in the wireless technologies. The stage is set for third generation (3G) technology and R&D is aiming at fourth generation (4G) technology.
    The future communication aims at becoming all wireless and mobile supporting any communication, any where, any time and for anybody with a single unique identification number of a person world over for all communication.
    It’s defined as personal communication services (PCS) and may be supported by personal communication network- a global wireless and mobile networks.
This paper briefs out the consequences of multipath fading, the reason of poor quality of services. This paper also put light on the concept of MIMO technology and gives reason why it’s preferable over present day technology.

http://www.rssbol.com

SMART IP Enabling IP Applications On Wireless Networks

SMART IP  Enabling IP Applications On Wireless Networks

 ABSTRACT

We know that applications such as browsers, e-mail and others utilize the TCP/IP transport protocol to communicate over the internet, intranets or LANs (and now, wireless networks). However, these applications tend to be “chatty.” Also, since TCP/IP was designed for an always connected, high-speed, wired environment, it is overhead laden, making it difficult to run in a wireless environment.

The basic theme of this paper is Smart IP which is wireless middleware that can drastically improve the performance of web-based and other IP applications, resulting in reduced communication costs, improved battery life, improved user experience and reduced development effort.

Nettech Systems, a leading supplier of wireless middleware, has recently introduced Smart IP, a product designed to overcome these obstacles. Smart IP allows TCP/IP based applications to run efficiently over wireless networks without modification.

Here we describe that, Smart IP optimizes the wireless data communication on two levels. First, it substitutes the TCP/IP transport protocol with Nettech’s optimized wireless transport layer. Next, it allows developers or corporations to create Intelligent Protocol Agents, which are used to streamline the application’s transactions and optimize high-level protocols.

In this paper we are focusing on how this optimization of data, which we are sending over the wireless network, takes place. We are also discussing about how Smart IP works, how the transportation problem is solved & other benefits of using Smart IP. 

http://www.rssbol.com

WIRELESS APPROACH FOR TSUNAMI & EARTHQUAKE ALERT SYSTEM

WIRELESS APPROACH FOR TSUNAMI & EARTHQUAKE ALERT SYSTEM

ABSTRACT

The term wireless covers a very vast field when the technology is concerned This very paper details about the communication between various sensors wirelessly The concept of wireless communication has been nicely implemented here for Tsunami-the very devastating danger that we had faced during Dec-2004.

This paper details about GSM based alert system. In addition to that this paper explains the use of accelerometer and BPR (bottom pressure recorder),to sense primary and secondary waves related to the seismic activities .When an earthquake occurs it releases  energy in the form of waves, that radiates from the earthquake sources in all directions. These energy waves are sent to the network manager via satellite communication unit. Then network manager sends alert message to different   ports.

This system can be configured with the available resources in India. Here only concepts are described. Detailed simulation, feasibility, study and experimentation are required to optimize the system and reduce the possibilities of false alarm.


http://www.rssbol.com

ZIGBEE, AN EMERGING TREND IN WIRELESS TECHNOLOGY

ZIGBEE, AN EMERGING TREND IN WIRELESS TECHNOLOGY

ABSTRACT


Wireless technology has shrinked the “WORLD IN OUR HAND”.
Today wireless technology forms the basis of almost every industry including Home Automation, Industrial Automation, Remote Metering, Automotive Networks, Interactive Toys, Active RFID or asset tracking and Medical as well. There are multitudes of standards like Bluetooth and Wi-Fi that provide high data transfer rates for voice, PC LANs, video, etc. However, until now there hasn’t been a wireless network standard that meets the unique needs of sensors and control devices. Sensors and control don’t need high bandwidth but they do need low latency and least energy consumption for long battery lives and for large number of devices.
ZigBee is the only wireless standards-based technology that addresses the unique needs of remote monitoring & control, and sensory network applications. ZigBee offers unique advantages for wireless applications, including low-cost radios, mesh networking, a basis in standards, low power consumption, reliability and security.
This paper provides an introduction to ZigBee, presenting key aspects of ZigBee’s architecture and operation as they relate to implementation options including example application for office lighting. It gives an insight into the strengths and challenges of this emerging technology, comparing it with the other wireless standards that will help the reader to decide which path is best suited to specific application and needs.


http://www.rssbol.com

Constructed Wetlands An economical and eco-friendly Wastewater Treatment Technology

Constructed Wetlands An economical and eco-friendly Wastewater Treatment Technology

Abstract

Air, water and soil are parts of the eco-system in which nutrients get recycled and pollutants accumulate, resulting in global effects. So it is necessary to have holistic approach to environmental problems.To choose between different waste water treatments, simple natural systems need to be given fresh considerations especially in developing countries like India. The wetlands are "areas of marsh, fen, peat land or water, whether natural or artificial, permanent or temporary, with water that is static or flowing, fresh, brackish or salty representating transitional position between terrestrial and aquatic ecosystems.
Constructed Wetland Systems (CWS) are artificially engineered wetlands specifically constructed for wastewater treatment at selected site utilizing particular combinations of plants,soil,bacteria to optimize the physical,chemical and microbiological processes present within root-zone of plants. Principle of CWS is activating powerful microbial processes stimulating natural breakdown of polluting compounds, possible due to special characteristics of wetland plants which transfers substantial amounts of atmospheric oxygen through to their root systems encouraging extraordinary quantity and special diversity.
This paper contains detailed case study of mahendragiri (tirunelveli district, Tamilnadu) where CW has been established successfully to treat 85 KLD wastewater meeting effluent standards prescribed by PCB with high BOD and Nitrogen removal efficiency. Case study also includes comparison of capital cost, operation-maintanance cost of EASand CWS, both provided at Mahendragiri.18500 Rs/month as against 8000 Rs/month for CWS which is self explanatory as why CWS are beneficial than conventional Wastewater treatment methods. CWS would be an ideal Technology in India as they are long lasting with low operation maintainance cost and ecofriendly with no By-products. With rising cost of electrical power,mechanical equipments,there is increasing interest in CWS requiring no electrical energy for the functioning and maximizes environments intrinsic ability to purify wastewater.

http://www.rssbol.com

Geosystems

Geosystems

Abstract

From ocean bed to rock bed, from foundations on soils to land slides control, from waste disposal site to water reservoir, geosysthetics have an important place for themselves in the engineering and construction projects. In words of Prof. ROBERT M. KOERNER (1986)"an exciting new concept in engineered materials has emerged for the civil engineering community and the rapidity at which the related products are being developed and used is nothing short of amazing. The geosynthetics have risen from a relatively minor and specialty product status to a world wide billion dollar industry".
Geosystems are geotextile-encapsulated soils that may be used to replace rock as conventional binding blocks in marine and hydraulic engg structure. These geosystems have application in field of environmental engineering and marine engineering. In this paper we are going to study the applications of geosystems in environmental engineering and marine engineering.. With respect to these e applications this paper describes case histories, problems, solutions with their advantages and disadvantages. A shoreline continuously changes because of incessant natural phenomenon such as winds, waves, currents, cyclones and recently experienced' TSUNAMI' change in shore line, involving excessive situation at a port, call for an increased dredging and erosion links to sourcing of neighboring structure. As the structure is subjected to more severe force than those on the land, constant maintenance is often called for, because of which geotubes now days become essential. The paper also discusses why shoreline protection is needed? How using geosystems can protect shore.

http://www.rssbol.com

Desalinization of sea water

Desalinization of sea water

Abstract

Water Desalinization Technique Flash evaporation is the most widely used method of water desalinization. The seawater is heated and then pumped into a low pressure tank where it is vaporized. The steam formed is then condensed and removed as pure water. To remove the water efficiently this process is repeated many times (only three stages are shown). The remaining liquid, called brine, contains a large amount of salt and is removed and often processed for minerals.

In recent years a great deal of interest has been shown in the conversion of seawater to fresh water. Several different processes, including distillation, electrodialysis, reverse osmosis, and direct-freeze evaporation, have been developed for this purpose. Some of these processes have been used in large facilities. Distillation units, for example, are being used in Freeport, the Bahamas, Saint Thomas, U.S. Virgin Islands, and in Texas. A reverse-osmosis system is used for the city of Bessie, Oklahoma, and an electrodialysis system is used for Port Mansfield, Texas. Although these processes are successful, the cost of treating seawater is much higher than that for treating fresh water.

http://www.rssbol.com

EIA METHADOLOGOES, EVALUATION, PREDICTIVE TECHNIQUES AND MANAGEMENT OF WATER RESOURCE PROJECTS

EIA METHADOLOGOES, EVALUATION, PREDICTIVE TECHNIQUES AND MANAGEMENT OF WATER RESOURCE PROJECTS

ABSTRACT

Water Resource Development (WRD) has become a lifeline progress and property for India. WRD projects are indispensable as they are inexorably linked to the Indian economy, besides their need for the welfare of the growing masses. The main difficulty in the present situation arises from the fact that most of the people associated with environmental activism and press overstressing one or two environmental aspects of the problem in isolation of complex problems associated with water resource projects. This technical article aims to cover crucial aspects of Environmental Impact Assessment methodologies and presents the procedure for evaluation and environmental impacts and to manage environmental aspects in concern with water resource developmental projects. Water resource developmental projects ensure the requirement of sustainable development/ environment and limit the stress/load within to ‘carrying capacity’ if and only if preceded by a comprehensive EIA study.
Beneficial environmental impacts of water resource project is done to improve public health due to ample domestic water supplies, recreational facilities, micro climate in vicinity of project area, develop wildlife sanctuaries, fisheries etc., While the adverse impacts include rehabilitation and resettlement of people, loss of forest and agricultural lands, reservoirs are subject to silting, reservoirs induced seismicity (RIS) increases the susceptibility of earthquakes, post – project effects like salinity, water-logging etc., Methodologies for impact assessment have been developed to present the result of an assessment, few are Adhoc method, Checklist method, Network approach, matrix approach, Overlay method etc., The predictive technologies include mathematical models, physical models and experimental models. The development and management of water resources should contribute to amelioration of the basic problems of human beings while avoiding serious damage to ecological populations and environmental quality.

http://www.rssbol.com

Concrete Cube Testing - A Neural Network Approach, Using MATLAB 6.0

Concrete Cube Testing - A Neural Network Approach, Using MATLAB 6.0

Abstract

This paper is an introduction to Artificial Neural Networks. The various types of neural networks are explained and demonstrated, applications of neural networks like ANNs in ‘concrete cube test’ is described, and a detailed historical background is provided. The connection between the artificial and the real thing is also investigated and explained. Finally, the mathematical models involved are presented and demonstrated.

An Artificial Neural Network (ANN) is an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. The key element of this paradigm is the novel structure of the information processing system. It is composed of a large number of highly interconnected processing elements (neurons) working in unison to solve specific problems. ANNs, like people, learn by example. An ANN is configured for a specific application, such as pattern recognition or data classification, through a learning process. Learning in biological systems involves adjustments to the synaptic connections that exist between the neurons. This is true of ANNs as well.

Neural network simulations appear to be a recent development. However, this field was established before the advent of computers, and has survived at least one major setback and several eras. Many important advances have been boosted by the use of inexpensive computer emulations. Following an initial period of enthusiasm, the field survived a period of frustration and disrepute. During this period when funding and professional support was minimal, important advances were made by relatively few researchers. These pioneers were able to develop convincing technology which surpassed the limitations identified by Minsky and Papert. Minsky and Papert, published a book (in 1969) in which they summed up a general feeling of frustration (against neural networks) among researchers, and was thus accepted by most without further analysis. Currently, the neural network field enjoys a resurgence of interest and a corresponding increase in funding. The first artificial neuron was produced in 1943 by the neurophysiologist Warren McCulloch and the logician Walter Pits. But the technology available at that time did not allow them to do too much.

Friday, December 11, 2009

National Conference on Sustainable Water Resources Management – SWaRM 2010 7th – 9th January 2010.

National Conference on Sustainable Water Resources Management – SWaRM 2010 7th – 9th January 2010.
 
Organized by

Department of Applied Mechanics and Hydraulics
National Institute of Technology Karnataka, Surathkal

Overview

Development and management of fresh water for human use taking into account constraints imposed by environment/ecology is necessary for India’s sustained growth in the future. Average per capita availability of fresh water in the country has reduced drastically from 5000 m3/year in 1950 to 1500 m3/year in 2006 and it continuous to keep reducing Coping with water stress and ensuring equitable allocation of scarce water resources for drinking, domestic, irrigation, industrial and environmental needs requires innovative application of state-of-art technologies and approaches. Pollution and contamination of fresh water resources due to anthropogenic activities is a cause for concern. Mapping available surface water and groundwater resources at scales ranging from regional to watershed using RS/GIS, optimizing irrigation water use, maximizing benefits from water resources projects, designing effective urban storm water drainage systems, formulation of coastal zone management plans and development of new instruments for hydrologic/hydraulic measurements are some of the key areas requiring attention of researchers and practitioners. In addition, the impacts of climate change and the uncertainties introduced on the hydrological cycle and water use systems may require significantly different management policies in the future.
Sustainable Water Resources Management is a process which promotes the coordinated development and management of water, land and related resources, in order to maximize the resultant economic and social welfare in an equitable manner without compromising the sustainability of vital ecosystems. The need for such an integrated approach to solve water related problems has been recognized in several countries. India too needs to adopt such a holistic approach to ensure the availability of fresh water resources for future generations.
SWaRM 2010 is being organized with the objective of identifying plans, policies and methodologies necessary for sustainable water resources development and management in the Indian context. The conference is being organized by the Department of Applied Mechanics & Hydraulics, NITK, Surathkal
SWaRM 2010 is designed to provide a forum for exchange of ideas and interactions between academicians, researchers and practitioners engaged in activities related to water resources development and management. The conference will provide a platform for delegates from across the country to meet and discuss future policies for managing India’s water resources in diverse hydroclimatic regimes. The presence of experts and delegates from other countries will give SWaRM 2010 an international flavour.

Proposed Themes

* Surface and Groundwater water hydrology
* Water Resource Planning
* Irrigation & drainage
* Water conveyance & storage
* Coastal hydraulics
* Socioeconomic aspects of WR projects
* Environmental hydraulics
* Ecology & Environment
* Integrated river basin development
* Climate change and hydrologic cycle
* Urban Hydrology
* New materials and methods
* Instrumentation & measurements
* RS & GIS Applications
* Harbour planning and management
* Coastal infrastructural facility
Spot registration is allowed on 7th & 8th January 2010

Contact Details

Prof. M.K.Nagaraj
Organising Secretary, SWaRM 2010
Department of Applied Mechanics & Hydraulics
National Institute of Technology Karnataka, Surathkal, Srinivasnagar – 575 025, INDIA
Tel : + 91-0824-2474000 / 3303
Fax.: +91-0824-2474033
Email : swarm2010@gmail.com
This e-mail address is being protected from spam bots, you need JavaScript enabled to view it
URL : http://appmech.nitk.ac.in

http://www.rssbol.com

International Conference on Frontiers in Mechanical Engineering FIME2010 20th -22nd May 2010

International Conference on Frontiers in Mechanical Engineering FIME2010 20th -22nd May 2010

Organized by

Department of Mechanical Engineering
National Institute of Technology Karnataka Surathkal

Preamable

Research and Development activities are the essential components of higher education because of their vital role in creating new knowledge and imparting excellence and dynamism. The general research progresses in the field of Mechanical Engineering are to be brought to lime light for deliberation, discussion and updating. The main aim of the conference is to create an opportunity for delegates to discuss developments in the fields of Manufacturing, Design, Engineering Analysis, Mechatronics and Thermal Engineering to review the challenges being faced by the community in the 21st Century. The conference provides a platform for Researchers, Academicians, Engineers, Scientists and Industrialists to come up with original contributions in the vast field of Mechanical Engineering.

CONFERENCE THEMES

Mechatronics and Machine Design

Robotics, Mechatronics, Computer Aided Design, Finite Element Method, Experimental Stress Analysis, MEMS and Nano Technology, Tribology, Smart Materials and Composites, Vibration Analysis, Design Engineering, Mechanisms, Fracture Mechanics, Design for Manufacturing, Automation, Structural and Bio-Composites, Fluid Power Engineering.

Thermal Engineering

Automobile Engineering, Future Fuels, Computer Aided Thermal Analysis, Heat and Mass Transfer, IC Engines and Combustion, Energy and Environment, Renewable Energy Sources, Refrigeration and Air Conditioning, Computational Fluid Dynamics, Nano-heat Transfer, Power Plant Engineering, Turbo Machinery.

Materials & Manufacturing Engineering
Agile Manufacturing, Artificial Intelligence, Manufacturing Systems, Cellular Manufacturing, E-Manufacturing, Rapid Prototyping, Reverse Engineering, Materials Science and Engineering, Machining Science, Metal Forming, Computer Aided Manufacturing, Welding, Casting, Machine Tool Engineering, Tool design and Condition Monitoring, Non-Traditional Machining Processes, Green Manufacturing, Reconfigurable Manufacturing Systems.

Delegate Registration Fee:

Foreign delegate : US$ 750
Indian delegate : INR 2000
Industry delegate : INR 5000
Students Delegate: INR 1000

Accompanying person


Outside India :US $ 300
India : INR 1000
Student delegates should attach necessary proof from the concerned authority

Important Dates

Date of the Conference 20-22 May, 2010
Submission of Extended Abstract 22nd December, 2009
Date of acceptance 15th January, 2010
Submission of full paper 15th February, 2010
Last Date for registration 22nd March 2010

Downloads

Formats
Sample Front Page
Registration Form
Copyright Form
All Form
Information Brochure

All correspondance Should be addressed to

Dr. Appukuttan K K
Organizing Secretary, FIME2010
OR
Dr. Narendranath S
Joint Secretary, FIME 2010
Department of Mechanical Engineering
National Institute of Technology Karnataka, Surathkal
Srinivasnagar-575025,Mangalore
KARNATAKA, INDIA
Phone:+91 - 0824 - 2474000 Ext-3650
Fax :+91 - 0824 - 2474033
Cell :+91 99862 27341 / +91 94487 93833
Email : snnath88@yahoo.co.in
FIME2010@nitk.ac.in
web : http://FIME2010.nitk.ac.in

http://www.rssbol.com

Post Graduate Diploma in Power Plant Engineering

Post Graduate Diploma in Power Plant Engineering

Organised by

M S RAMAIAH INSTITUTE OF TECHNOLOGY
Bangalore-560 054, Karnataka

Course Overview

In view of the ever increasing demand for energy due to the massive industrial, commercial and domestic growth in the country, Govt. of India plans to almost double the installed power generation capacity by the end of 12th plan. Such an ambitious plan requires massive capacity addition in the public sector and the private sector with a corresponding requirement of trained power professionals. In this scenario, a clear supply-demand gap is seen with respect to skilled and competent manpower available for the power industry in the country. PG Diploma in Power Plant Engineering has been conceptualized by JSW Energy Centre of Excellence (JSWECE) and M. S. Ramaiah Institute of Technology (MSRIT) to fill the gap and create highly competent & employable manpower for the power sector. A Memorandum of Understanding has been signed between JSWECE and MSRIT to conduct the course at JSWECE premises developed by JSWEL. The course will be conducted under the autonomous status MSRIT affiliated to Visveswaraya Technological University (VTU), Belgaum, Karnataka with faculty assistance from Department of Mechanical Engineering at MSRIT. The course certification will be jointly done by JSWECE and MSRIT. JSWECE conducts the course at its premises situated in the sprawling O.P. Jindal Centre located adjacent to the reputed JSW industrial complex consisting of the 7 MTPA JSW Steel Ltd., JSW Energy Ltd., Jindal Praxair Oxygen Company Ltd., JSW Cement, JSW Building Systems Ltd., etc. at Toranagallu in Bellary in Karnataka. The course is developed to enhance the employability of engineering graduates by providing the required power plant focussed modules and advanced topics which will provide them a strong foundation in the modern concepts in this specialization. Placement assistance will be provided by JSWECE at the end of the course either at its power projects or with other power generating companies in India and abroad. The course covers the mandatory requirements under Indian Electricity Amendment Rules, 1981 and certifies the certificate holder to operate a generating station of capacity 100 MW and above.

Information to Candidates

Eligibility

First Class B.E./B.Tech or equivalent in Mechanical/ Electrical/ Controls & Instrumentation/ Electronics Engineering discipline.

Application Procedure

Download the application form provided at the website (http://www.jswel.net/jswece.html or http://www.msrit.edu.in/pgdcppe.html) and send the completed application form along with marks sheets and relevant certificates to the address mentioned at the end of the application form.
Application fee of Rs. 500/- should be paid by DD in the favour of “JSW Energy Ltd.” payable at Bangalore. Attach all requisite certificates along with the application fee and send it to the address mentioned in the form.

Selection Criteria

For Non Sponsored Candidates:

Written Test and University/Institute awarded %age. 50% weightage is given to the written test marks and 50% weightage is given to %age of candidates in their qualifying degree. The candidate who is selected for the course is allotted a seat after he pays the stipulated 1st instalment fee mentioned in the fee payment schedule.

For Sponsored Candidates:

25% of the seats are reserved for candidates sponsored from power utilities having more than one year experience. Selection is based on written test marks and merit of the candidates applied in this category.
Note: MSRIT and JSWECE will have the final authority on modifying the selection criteria depending on the no. of applications received and other requirements.

Selection Intimation

List of shortlisted candidates will be uploaded on the JSWECE website (http://www.jswel.net/jswece.html) on the dates mentioned. List of wait-listed candidates and subsequent selection list in case of failure of selected candidates to register will also be uploaded on the website on the said dates.

Age Limit
30 years of age for non sponsored candidates and No age limit for sponsored candidates.

Total Seats
No. of seats is limited to 60. However, decision over no. of seats rests with JSWECE and MSRIT to increase or decrease the no. of seats.

Course Fees

For non-sponsored candidates: Rs. 1, 00,000/- (paid in 3 instalments; 1st instalment – Rs. 50,000/-, 2nd Instalment – Rs. 25,000/-, 3rd Instalment – 25,000/-)
For sponsored candidates: Rs. 1, 30,000/- (paid in full during admission)
For foreign nationals: US$ 6,000/- (paid in full during admission)

Important Dates

1. Last Date for receipt of completed application forms: 19th December 2009
2. Date of Written Test at MSRIT: 17th January 2010
3. Announcement of selection list on website: 1st February 2010
4. Admission to the course at JSWECE: 8th Feb – 20th Feb 2010
5. Commencement of Course: 22nd February 2010

Payment Schedule

1. Payment of 2nd Instalment of course fee: 31st May 2010
2. Payment of 3rd Instalment of course fee: 31st August 2010

About M. S. Ramaiah Institute of Technology

M.S. Ramaiah Institute of Technology is a premier engineering institution imparting global quality technical education ever since its inception in the year 1962. The Institution is unique of its kind in securing ISO 9000:2000 Certification and approved by AICTE. MSRIT is one of the few technical institutes in India to receive World Bank Funding through Net Work Institutions under TEQUIP, Government of India.
The Institute offers 13 undergraduate and 8 post graduate degree programs. As many as 8 different departments of the Institute have been recognized by Visvesvaray Technological University as Post Graduate Research Centers. Considering the Institute’s overall performance and excellence it has been awarded as an AUTONOMUS INSTITUTE under VTU. The Institute attracts students from all over the country besides few foreign students. The students of the institute have an excellent track record for their extra curricular activities and sports.

About JSW Energy Centre of Excellence (JSWECE)

JSW Energy Ltd., the energy vertical of the JSW Group is poised to achieve a generation capacity of over 4000 MW in the next couple of years and has a vision of developing 15,000 MW installed capacity in the country by the year 2015. Having an organizational mission of playing an active role in nation building and with a vision of creating and enhancing intellectual capital of Indian Power Sector, JSW Energy Ltd. has established JSWECE to cater to competent and skilled manpower requirements of the power generating companies as well as creating employability for graduate and diploma engineers in the Power Industry.
JSWECE has an established mission to become world class training & research centre in power generation and energy technologies and to attain global best practices in technology based training interventions to reach millions of engineering professionals across the country. With recognition and certification from Central Electricity Authority (CEA), Govt. of India, JSWECE is destined to build a team of competent, Skilled and professional managers who would lead our country’s thrust in developing the power sector to fuel the country’s growth.

JSWECE operates from O.P. Jindal Centre adjoining JSW Steel Ltd. and JSW Energy Ltd. at Toranagallu, Karnataka. With its world class training facilities, JSWECE adapts a Blended Learning Model, which is a unique blend of self learning, class room learning and on-site learning to ensure superior knowledge retention among its trainees. Along with excellent training facilities, JSWECE is lead by a team of highly qualified and experienced faculty members along with core support faculty from JSW Energy Ltd. With 4×300 MW coal fired power plant, 2×130 MW coal/corex gas fired power plant, 2 captive power plants with gas fired and waste heat recovery boilers in close vicinity and direct support, JSWECE makes an ideal place for Power Plant Training.

Training Facilities at JSWECE

Operator Training Simulator: JSWECE has developed a state of the art, high fidelity, dynamic PC-based 300 MW power plant simulator which is the replica of the 300 MW power plant of JSW Energy Ltd. Along with routine plant start up/shut down operations, handling plant emergencies and engineering analysis on the power plant model is possible with the simulator. Computer Based Training Packages: JSWECE houses about 100 computer based training packages on various power plant topics which are rich with voice, video and media thereby giving a rich learning experience to the users.
Miniature Engineering Models: JSWECE has developed miniature power plant equipment models for a detailed understanding of the plant components.
Library and Information Centre: JSWECE houses a library with over 100 titles on power plant and related topics and subscription to national and international magazines. The information centre is equipped with computers for the use of students.

Need for the Course

India is witnessing an exponential growth in the Power Sector with the opening up of power generation, transmission & distribution by the Govt. of India through power sector reforms. The working group on power for the 11th plan has estimated a capacity addition of close to 80,000 MW and indicates a tremendous requirement of skilled manpower of about 8.6 lakh personnel for capacity addition and about 1.40 lakh personnel for accelerating construction activities. According to National Electricity Plan of the Govt. of India, it is envisaged that by the end of 12th Plan, an installed generation capacity of over 2, 68,150 MW would be achieved through Thermal, Hydro and Nuclear power generation. The additional total manpower requirement during 12th plan alone will be in the order of 2.93 lakhs. So, the total manpower requirement at the end of 12th plan has been estimated as 13.22 lakhs for the total installed capacity of 2, 68,150 MW.
Due to the ever increasing technological advancements in the power industry, the expected skill and knowledge level of the workforce is also increasing. Also, the supply-demand gap with respect to trained and skilled manpower for the industry is also increasing. In this backdrop, with a motive to create greater value for the student community and the industry, MSRIT and JSWECE have conceptualized and designed the Post Graduate Diploma in Power Plant Engineering enabling the certificate holders to be eligible for direct induction into the public, govt. and private power sector utilities. The course fulfils the mandatory requirements under Indian Electricity (Amendment) Rules, 1981, which stipulates “No person shall be authorised to operate or undertake maintenance of any part or whole of generating station of capacity 100 MW and above together with the associated sub-station unless he is adequately qualified and has undergone the specified training at a recognized institute” With recognition from Central Electricity Authority, Govt. of India as per the provisions of the Indian Electricity (Amendment) Rules 1981 and with faculty assistance from MSRIT including the experienced full time and plant faculty at JSW Energy Ltd., JSWECE is conducting this course at its premises located adjacent to JSWEL power plants of different capacities and using varied technologies.

Course Conduction

Post Graduate Diploma in Power Plant Engineering is a joint certification course of MSRIT and JSWECE. Department of Mechanical Engineering is the participating department of MSRIT. Faculty from other premier Institutes and professional bodies will be taking classes on some selected courses. The course will be conducted at JSWECE under joint administration with MSRIT. The course will be monitored jointly by MSRIT and JSWECE. Full time faculty of JSWECE and plant faculty will conduct most of the course curriculum. Course assessments will be done as per academic requirements & regulations of autonomous status of MSRIT under VTU.

About the Course
Post Graduate Diploma in Power Plant Engineering is a one year full time course. The course will be conducted at JSW Energy Centre of Excellence at the premises of JSW Energy Ltd. and would be completed in two semesters. The course is modular type which covers 14 modules and 30 submodules which would be conducted through theory classes, plant visits, and practical and on job training at the power plants of JSW Energy Ltd. The modules and sub-modules are designed in such a way to create competencies in analytical skills, thermal power plant aspects including O&M, project management and quality aspects. The course ensures the development of a modern power engineer with the requisite managerial and technical skills. The entire program is structured for 25 credits each semester and 50 credits in total. It is a residential program.

Lecture and Interactive Sessions from MSRIT faculty

The onsite faculty from Department of Mechanical Engineering of MSRIT will take lecture sessions apart from coordinating other practical and in-plant training programs. The student projects will be guided jointly by faculty at JSWECE and onsite faculty of MSRIT. The presentations, seminars and assessments will be conducted by onsite faculty of MSRIT in coordination with faculty at JSWECE.

Lecture and Plant Sessions from JSWECE and Plant faculty

Core faculty at JSWECE will conduct all the power plant related lectures and plant visits. On job training at power plants would be conducted under the supervision of experienced power plant experts. Besides this, power plant experts from across the project locations of JSW Energy Ltd. at Barmer in Rajasthan, Ratnagiri in Maharashtra as well as from its Corporate Office at Mumbai would frequently take lecture sessions on advanced topics through Virtual Classroom facility. In addition, visiting faculty from other power plants and reputed institutes would be sharing their experience with the students. Special emphasis on developing soft skills of the students through visiting faculty and e-learning will be the highlight of this course.

Highlights of the Course

Simulator Training: The course includes a module on power plant operations training on a 300 MW state of the art PC-based operator training simulator facility, which is a replica of the 300 MW power plant of JSW Energy Ltd. at Vijayanagar and Ratnagiri. Training on power plant simulator gives an opportunity for the students to get hands-on training on routine power plant operations and handling emergencies.

On the Job Training: Students would get a wide exposure to operation & maintenance as well as erection & commissioning activities at various power plants of JSW Energy with heat recovery boilers, gas fired boilers, and coal fired boilers including exposure to circulating fluidized bed boilers at various power plant locations.

Specialized Modules: The course includes specialized modules such as Project Management and Six Sigma including training on the software tools used for project management and six sigma which would enable the students to get additional certifications in project management and six sigma. These specialized modules would be conducted by professional agencies.

Why you should join this Course?

The objective of the course is to develop highly skilled and competent manpower for the power sector available readily for recruitment at state, central, public and private power utilities and related industries. The course aims at creating an intellectual capital for the power sector and also satisfies the mandatory requirements of Indian Electricity (Amendment) Rules, 1981. The certificates are issued jointly by JSWECE and MSRIT, a premier technical institute of high reputation, thereby creating the highest value for the certificate holders in both Indian and International power industry. The unique synergy between the academics and industry through this jointly conducted course by MSRIT and JSWECE will create the quality power professionals of the highest order. Direct interaction with MSRIT faculty and plant experts for enhanced inputs, the state of the art facilities at JSWECE, exposure at varied kinds of power plants, interaction with power plant experts and other professional agencies will have a greater value addition thereby creating a higher employment opportunity and a win-win situation for the student community and the industry.

Placement Services

Career opportunities will be provided to the successful candidates after the completion of the course at power plant locations of JSW Energy Ltd. depending on the manpower requirements and availability of openings. JSWECE/MSRIT will provide placement assistance to the PG Diploma holders by maintaining very close ties with other private, public, state and central govt. power generating companies. A special placement announcement will also be made at MSRIT placement cell for the information and knowledge of the recruiters about the course.

Course Certification

Certificates will be issued jointly by MSRIT and JSWECE under the Autonomous Institute status of
MSRIT affiliated to Visvesvaraya Technological Univeristy (VTU), Belgaum, Karnataka.

Course Objectives

The participants after completing the course will acquire extensive basic and advanced knowledge of thermal power plants, safety requirements in a power plant, plant equipment details and operation & maintenance of a thermal power plant as well as power plant project management. They will learn to understand the process flow, mechanical-electrical-instrumentation aspects of power plants, power plant schemes and power plant operation. The simulator training will give hands on experience of operating a 300 MW power plant at different plant conditions.

Course Conduction Methodology: Blended Learning Model
• Extensive Classroom Sessions from MSRIT faculty, JSWECE faculty and Power Plant Experts
• Power Plant Visits during each sub-module for practical exposure
• Scheme Tracing in Coal/Gas Fired Thermal Power Plant
• On-Job Training at JSW Energy Power Plants
• Self Learning Sessions on CBTs and other self study material
• Knowledge Sharing Sessions among Trainees
• Study Projects, Seminars and Report Submissions
• Programs on developing soft skills, and other relevant topics

Overview of Course Curriculum

Semester I
Module 1: Industrial Safety, Energy Resources and Environment Management, Concepts of Thermal Power Stations
Module 2: Boilers, Turbines and their Auxiliaries
Module 3: Fuel & Ash Handling and Plant Auxiliaries
Module 4: Generators, Plant Electrical Systems and Power Plant Controls & Instrumentation
Module 5: Power Plant Chemistry, Pollution and Control

Specialized Power Plant Training I
Module 6: Scheme briefing and Scheme Tracing
Module 7: Power Plant Operation, Protection and Simulator Training on a 300 MW Dynamic High-Fidelity Operator Training Simulator

Course Curriculum

Semester II
Module 8: NDT & Welding, Metallurgy
Module 9: Project Management Fundamentals and Plant Commissioning
Module 10: Maintenance Planning & Cost Control, Maintenance Practice & Inspection
Module 11: Other Power Plant Technologies, Plant Performance and Monitoring
Module 12: Student Projects, Seminars, Visits to Manufacturer’s Works

Specialized Power Plant Training II
Module 13: On Job Training – Power Plant Operations
Module 14: On Job Training – Power Plant Maintenance

Additional Topics to be covered in the course

• Project Management Tools (from external agency)
• Six Sigma – Fundamentals and use of Six Sigma Software Tools (from external agency)
• Visits to Plant Equipment Manufacturing plants
• Managerial development program (from external agencies)
• Advanced topics on Power Plant Engineering are related fields
• Project Work and Seminars (Jointly by MSRIT and JSWECE)

Assessments

Assessments and Evaluation will be conducted as per the academic regulations of MSRIT. Project work, seminars and presentations will be evaluated.

Hostel Accommodation

Bachelor accommodation is available on shared basis. Hostels are located at JSW Township. Hostel rent is to be paid by the candidate separately. The rooms are furnished.

Hostel Rent: Hostel rent is paid in full in advance for one year at the time of admission if hostel is preferred. Rs. 20,000/- per candidate per year is charged towards hostel rent.

Boarding: The hostel charges do not include boarding charges. Canteens, hotels and restaurants are available at the Institute, plant area and the township.

Security Deposit

An amount of Rs. 2000/- as security deposit which is refundable has to be deposited by the student at the time of admission.

Internet Facility

Computer facility with internet access is available at the institute at no extra charges.

Refund

Fee once deposited will not be refunded. In case a selected candidate wishes to withdraw from the course for any reason, no part of course fee will be refunded except the security deposit.

Placement Charges


Placement charges @ Rs. 5,000/- will be charged for the non-sponsored candidates being placed other than JSW group companies by placement assistance cell.

Other Expenses

The candidates have to bear charges against uniforms, safety shoes, safety helmets, training manuals and bus facility. Lecture notes will be provided free of charge. The exact amount to be paid will be displayed along with the selection list after short-listing of the candidates for the program.

Address for all Communications

JSW Energy Centre of Excellence
JSW Energy Limited
Post Box. No. 9, Toranagallu P.O. PIN – 583 123
Bellary District, Karnataka, INDIA
Ph: 08395-250222, 242365, 242248, 242229, 252124
Fax: 08395-250757, 250222
e-mail: jswece@jsw.in
website: http://www.jswel.net/jswece.html