Speed Vehicle Sensing project is used to prevent the vehicle accidents in the check posts, restricted roads. It uses communication technologies to control the vehicles. Main aim of this project is to help the people to ride their vehicles safely.
Read more about Speed Vehicle Sensing …Latest Student Projects
Train Scheduling and Simulation
The aspects of the Train Scheduling and Simulation are discussed in this project. In the existing system, we can schedule the trains only on sections which are having two lines. In this project, we will discuss about the algorithm which is used to schedule the trains on sections in two-lines. To simulate the train scheduling on three-line section which changes we need to make in the algorithm are discussed in this project. It also describes the advantage of third line in scheduling of the trains. The handling of test cases in train scheduling are also discussed in this report. The changes in the algorithm plays an important role in extending the sections having any number of lines.
Read more about Train Scheduling and Simulation …Hiding Of Host Image Using Cover Image

Now digital Medias are becoming very popular among peoples all over the world through World Wide Web sites. The intellectual property of data needs prevention of non-legal copy by unauthorized persons, verification of content integrity and protection of owner’s copyright. The requirements of robustness, security of the hidden data, imperceptibility, data hiding rate, capacity should be satisfied by the newly proposed Data hiding technique. The best and secured way to send and share the host image in a confidential manner is to hiding a host image in a cover image. By this technique we can send important host image efficiently and prevent its unauthorized access by the hackers.
For sending or sharing the image over WWW or via any secured communication over the electronic media the proposed technique i.e. hiding host image using cover image is very efficient and useful technique because we can share host image easily without bothering about loss or gained access by unauthorized users. The authorized user can decode host image only by using designed decoder, so host image is much secured. The host image can be embedded with cover image by using this technique.
8 Bit PICCO Processor
The 8 Bit PICCO Processor and it has separate instruction and data memories. Instruction memory: The size of the instruction memory is 4K. Data memory: The size of the data memory is 256 bytes.
Read more about 8 Bit PICCO Processor …SMS Controlled Industrial Controller

A project which is developed to control the process in the industry and to check the status of the each process the proposed project i.e. SMS Controlled Industrial Controller is developed. Here we implemented this project using the LAB VIEW. Using this project we can monitor any number of process parameters in the industry. In the existing system it is very difficult for the user to monitor all the process in the industry because he has to be present all the time and maintain system manually. If user is not present, entire system will get damaged. To solve all these drawbacks and disadvantages of existing system proposed, new system is developed. The hardware requirements of the process are fulfilled by the hardware unit of this system.
Read more about SMS Controlled Industrial Controller …Cold Boot Attack
Most of peoples believe that, in situations like during power failure in modern computers, at room temperature and even when DRAM is removed from its motherboard, DRAMs will retain their contents for few seconds. But DRAMs are not so reliable because hackers can retrieve usable full-system memory images and important contents of DRAMs when DRAMs are not immediately erased/when they are not refreshed. Surprisingly, researches made by the Researchers of Princeton University have clearly shown that the contents of RAM in modern computers remain undamaged after the system BIOS or boot code has finished running, and these can be exploited. To explain this, at the beginning we need to switch off the system and then we will try to capture and analyze the memory of DRAMs.
Read more about Cold Boot Attack …