The main aim of the Tongue Motion Controlled Wheel Chair project is to provide a Tongue Drive System (TDS) with effective computer access to the people who are suffering from physical disabilities. TDS translates the intentions of user into control commands by finding and classifying their voluntary tongue motion with the help of a small permanent magnet placed on the tongue and an array of magnetic sensors mounted on an orthodontic brace inside or a headset outside the mouth. It is a tongue-operated unobtrusive assistive technology. With the help of an external TDS prototype, we developed a customized interface circuitry and implemented four control strategies to run a Powered Wheel Chair (PWC).
Category: Electronics Projects
Automatic Light Dim Dip Controller
The proposed project will mainly focus on the opposite vehicle light or any light source intensity in accordance with the correct head light lighting power. With the help of Dim Dip Controller, we can control the intensity of the Head light automatically by using this Automatic Dim and Dipper System. The brightness of the head light varies with the light intensity value of the opposite vehicle. The proposed system is user-friendly, reliable, works very efficiently and accurately. Read more about Automatic Light Dim Dip Controller …
Tracking and Positioning System
The main aim of the project Tracking and positioning System is to control the positions of security personal within the secured area. It is a important part of Security and Surveillance system. Generally, security is also called as the safety. But as a technical term “security” can be defined as something is not just secure but also it has been secured. Security and Surveillance system is developed to give best, all-round security to a restricted area such as a research laboratory. It also prevents a possible security breach by maintaining the good security to that area.
Robot Navigation Using Optical Odometry
The ability of autonomous mobile Robots to navigate safely and reliably within their environments is their main important issues.
• What is the current location?
• How are the objects around me placed?
• How do I get to the destination?
– The autonomous navigation of the robot should be able to answer the above questions.
Automated Step Climber Robot

The human brain will control all activities of the human body like its motion, balance, co-ordination and reflex. It makes these activities to take place in the right co-ordination. Now we humans created many beautiful and useful creations using new technologies in science. Robot is one of such useful human creation. We developed the robot to minimize our work and to save our time. Robots will work based on our commands given to it and completes given task efficiently. Also now we are developing an electro-mechanical autonomous robotic vehicle which can run automatically on various routes and user can provide route direction to it. It is very useful for us to run a vehicle safely, by using multiple degrees of freedom it can move to various places efficiently. Also this vehicle reaches the destination place in less interval of time.
Hiding Of Host Image Using Cover Image

Now digital Medias are becoming very popular among peoples all over the world through World Wide Web sites. The intellectual property of data needs prevention of non-legal copy by unauthorized persons, verification of content integrity and protection of owner’s copyright. The requirements of robustness, security of the hidden data, imperceptibility, data hiding rate, capacity should be satisfied by the newly proposed Data hiding technique. The best and secured way to send and share the host image in a confidential manner is to hiding a host image in a cover image. By this technique we can send important host image efficiently and prevent its unauthorized access by the hackers.
For sending or sharing the image over WWW or via any secured communication over the electronic media the proposed technique i.e. hiding host image using cover image is very efficient and useful technique because we can share host image easily without bothering about loss or gained access by unauthorized users. The authorized user can decode host image only by using designed decoder, so host image is much secured. The host image can be embedded with cover image by using this technique.
