Saturday 1 November 2014

IIT #Techfest International Student #Conference #IJSRD

conferenceTechfest International Student Conference is an initiative to bring together the student community and professors with a common research background. TISC marks a step further in our endeavor to promote science and technology among the students by facilitating the exchange of knowledge between academia and industry.
Featured imageTechfest International Student Conference presents a unique opportunity for students to present their work in front of fellow students, senior professors from top universities, industrialists and policy-makers. It aims at giving recognition to students for their research at a relatively young age. An enriching experience to research oriented minds, TISC will give young scientists an insight into the topic, learn new ideas and build networks beneficial for the future.
The theme for the conference is Renewable Energy Systems, potentially the most important aspect of human life in forthcoming decades. TISC is being hosted by IIT Bombay, one of the premier institutes of science and technology in India known for its path-breaking research and quality education.

Tuesday 7 October 2014

A Glimpse into the 3-D brain | #IJSRD

People who wish to know how memory works are forced to take a glimpse into the brain. They can now do so without bloodshed: Ruhr Univ. Bochum (RUB) researchers have developed a new method for creating 3-D models of memory-relevant brain structures. They published their results in the trade journal Frontiers in Neuroanatomy.
3-D image of the hippocampus of a rat. Image
Lets Research !!! DO IT >>>> IJSRD
Seahorse gave the hippocampus the name
The way neurons are interconnected in the brain is very complicated. This holds especially true for the cells of the hippocampus. It is one of the oldest brain regions and its form resembles a seahorse (hippocampus in Latin). The hippocampus enables us to navigate space securely and to form personal memories. So far, the anatomic knowledge of the networks inside the hippocampus and its connection to the rest of the brain has left scientists guessing which information arrived where and when.
Signals spread through the brain
Accordingly, Dr. Martin Pyka and his colleagues from the Mercator Research Group at RUB have developed a method which facilitates the reconstruction of the brain's anatomic data as a 3-D model on the computer. This approach is quite unique, because it enables automatic calculation of the neural interconnection on the basis of their position inside the space and their projection directions. Biologically feasible network structures can thus be generated more easily than it used to be the case with the method available to date. Deploying 3-D models, the researchers use this technique to monitor the way neural signals spread throughout the network time-wise. They have, for example, found evidence that the hippocampus’ form and size could explain why neurons in those networks fire in certain frequencies.
Information become memories
In future, this method may help us understand how animals, for example, combine various information to form memories within the hippocampus, in order to memorise food sources or dangers and to remember them in certain situations.
main source: click here
For more information: Click here. . .

Tuesday 19 August 2014

#IJSRD Digital Watermarking Methods in Spatial Domain and Transform Domain

#IJSRD
Digital Watermarking Methods in  Spatial Domain and Transform Domain
Abstract--- The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia i.e. text, image, video, audio enables protection mechanism in decrypted contents. In a way that protects from attacks several common image processing techniques are used in Spatial Domain and Transform Domain. In Spatial Domain Least Significant Bit(LSB) is used and in Transform domain Discrete Cosine Transform(DCT) & Discrete Wavelet Transform(DWT) are used. Among these DWT is best method due because of using embedded zero tree wavelet image compression scheme and high frequency sub bands.  

For More Details 
Click on Below Links :



Friday 15 August 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday 13 August 2014

#IJSRD Cost effective and innovative housing technology


The current paper describes how quaternions are used successfully and effectively in simulations of unmanned aerial vehicles (UAVs) and satellite motion through definition of the UAV airframe or satellite body as a rigid body. By such means the authors try to raise interest among students and scientists in the mathematical formalism of quaternions that was very popular more than 100 years ago, but was replaced by vectors and matrices. Nevertheless, quaternions benefits make them valuable in numerous tasks, among others the numerical integration of rigid body motion dynamics equations.Simulations, part of the current project, can be viewed on http://ialms.net/sim/ web address.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD Cost effective and innovative housing technology


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com