Train Scheduling and Simulation

The aspects of the Train Scheduling and Simulation are discussed in this project. In the existing system, we can schedule the trains only on sections which are having two lines. In this project, we will discuss about the algorithm which is used to schedule the trains on sections in two-lines. To simulate the train scheduling on three-line section which changes we need to make in the algorithm are discussed in this project. It also describes the advantage of third line in scheduling of the trains. The handling of test cases in train scheduling are also discussed in this report. The changes in the algorithm plays an important role in extending the sections having any number of lines.

Read more about Train Scheduling and Simulation

Hiding Of Host Image Using Cover Image

Hiding Of Host Image Using Cover Image

Now digital Medias are becoming very popular among peoples all over the world through World Wide Web sites. The intellectual property of data needs prevention of non-legal copy by unauthorized persons, verification of content integrity and protection of owner’s copyright. The requirements of robustness, security of the hidden data, imperceptibility, data hiding rate, capacity should be satisfied by the newly proposed Data hiding technique. The best and secured way to send and share the host image in a confidential manner is to hiding a host image in a cover image. By this technique we can send important host image efficiently and prevent its unauthorized access by the hackers.


For sending or sharing the image over WWW or via any secured communication over the electronic media the proposed technique i.e. hiding host image using cover image is very efficient and useful technique because we can share host image easily without bothering about loss or gained access by unauthorized users. The authorized user can decode host image only by using designed decoder, so host image is much secured. The host image can be embedded with cover image by using this technique.

Read more about Hiding Of Host Image Using Cover Image
SMS Controlled Industrial Controller

SMS Controlled Industrial Controller

SMS Controlled Industrial Controller

A project which is developed to control the process in the industry and to check the status of the each process the proposed project i.e. SMS Controlled Industrial Controller is developed. Here we implemented this project using the LAB VIEW. Using this project we can monitor any number of process parameters in the industry. In the existing system it is very difficult for the user to monitor all the process in the industry because he has to be present all   the time and maintain system manually. If user is not present, entire system will get damaged.  To solve all these drawbacks and disadvantages of existing system proposed, new system is developed. The hardware requirements of the process are fulfilled by the hardware unit of this system.

Read more about SMS Controlled Industrial Controller
Cold Boot Attack

Cold Boot Attack

Most of peoples believe that, in situations like during power failure in modern computers, at room temperature and even when DRAM is removed from its motherboard, DRAMs will retain their contents for few seconds. But DRAMs are not so reliable because hackers can retrieve usable full-system memory images and important contents of DRAMs when DRAMs are not immediately erased/when they are not refreshed. Surprisingly, researches made by the Researchers of Princeton University have clearly shown that the contents of RAM in modern computers remain undamaged after the system BIOS or boot code has finished running, and these can be exploited. To explain this, at the beginning we need to switch off the system and then we will try to capture and analyze the memory of DRAMs.

Read more about Cold Boot Attack
error: Content is protected !!