Saturday 1 November 2014

IIT #Techfest International Student #Conference #IJSRD

conferenceTechfest International Student Conference is an initiative to bring together the student community and professors with a common research background. TISC marks a step further in our endeavor to promote science and technology among the students by facilitating the exchange of knowledge between academia and industry.
Featured imageTechfest International Student Conference presents a unique opportunity for students to present their work in front of fellow students, senior professors from top universities, industrialists and policy-makers. It aims at giving recognition to students for their research at a relatively young age. An enriching experience to research oriented minds, TISC will give young scientists an insight into the topic, learn new ideas and build networks beneficial for the future.
The theme for the conference is Renewable Energy Systems, potentially the most important aspect of human life in forthcoming decades. TISC is being hosted by IIT Bombay, one of the premier institutes of science and technology in India known for its path-breaking research and quality education.

Tuesday 7 October 2014

A Glimpse into the 3-D brain | #IJSRD

People who wish to know how memory works are forced to take a glimpse into the brain. They can now do so without bloodshed: Ruhr Univ. Bochum (RUB) researchers have developed a new method for creating 3-D models of memory-relevant brain structures. They published their results in the trade journal Frontiers in Neuroanatomy.
3-D image of the hippocampus of a rat. Image
Lets Research !!! DO IT >>>> IJSRD
Information become memories
In future, this method may help us understand how animals, for example, combine various information to form memories within the hippocampus, in order to memorise food sources or dangers and to remember them in certain situations.
main source: click here
For more information: Click here. . .

Tuesday 19 August 2014

#IJSRD Digital Watermarking Methods in Spatial Domain and Transform Domain

#IJSRD
Digital Watermarking Methods in  Spatial Domain and Transform Domain
Abstract--- The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia i.e. text, image, video, audio enables protection mechanism in decrypted contents. In a way that protects from attacks several common image processing techniques are used in Spatial Domain and Transform Domain. In Spatial Domain Least Significant Bit(LSB) is used and in Transform domain Discrete Cosine Transform(DCT) & Discrete Wavelet Transform(DWT) are used. Among these DWT is best method due because of using embedded zero tree wavelet image compression scheme and high frequency sub bands.  

For More Details 
Click on Below Links :



Friday 15 August 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday 13 August 2014

#IJSRD Cost effective and innovative housing technology


The current paper describes how quaternions are used successfully and effectively in simulations of unmanned aerial vehicles (UAVs) and satellite motion through definition of the UAV airframe or satellite body as a rigid body. By such means the authors try to raise interest among students and scientists in the mathematical formalism of quaternions that was very popular more than 100 years ago, but was replaced by vectors and matrices. Nevertheless, quaternions benefits make them valuable in numerous tasks, among others the numerical integration of rigid body motion dynamics equations.Simulations, part of the current project, can be viewed on http://ialms.net/sim/ web address.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

Monday 11 August 2014

#IJSRD PICTURE REGISTRATION ON FPGA PLATFORMS


Picture selection may be a computationally focused procurement inside the remedial imaging space that places stringent needs on execution and memory organization capability. This paper makes frameworks for mapping the picture selection orders on the configurable gear underneath time of time execution requests. Developing the arrangement of homogenized parameterized dataflow, that gives a profitable formal model of style and examination of supplies and workstation code for marker methodology procurements, we have a tendency to make novel procedures for identifying with and examining the fittings style house when mapping picture enlistment computations on the configurable gear. Our systems end in Associate in nursing calm framework for business off execution and configurable supplies stake use maintained the commitments of a given order. Maintained inclinations that we've got chose when applying these methods, we have a tendency to conjointly favoring a completely extraordinary development displaying that allows quickly-reconfigurable picture selection. 
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com