33 Pages
|
3,501 Words
Construction of a potable electric operated motor vehicle for long Volvo Bus. In this project involves the knowledge of mechanical engineering workshop technology and engineering material science and strength. This was exactly what we were taught. We contracted the electric car with the actual dimension of long Volvo bus(Ml-) got from the catalogue and we enlarged the scale by 1: 8mm. aluminum cord was used in the construction of the v […]
71 Pages
|
8,311 Words
This project report is a thesis written specifically to cover the design analysis construction, test and packaging of a multipurpose security system from electric component that can be easily be obtainable from the market. The report discusses the various unit and stages of the alarm system, thesis include:- a) Clock generation and frequency division unit. b) The control and section unit, comprising of a one shot 555 timer multiplexer, […]
46 Pages
|
6,975 Words
INTRODUCTION 1.1 BACKGROUND OF THE STUDY A mobile phone jammer or signal blocker is an instrument used to prevent cellular phones from receiving signals from base stations. The process of blocking the receiver to receive a transmitted signal is called Jamming of the signal. The jammer effectively disallows cellular phone signal when activated. These devices can be used in practically any location, but are found primarily in places wher […]
64 Pages
|
10,002 Words
1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY The need for having home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during […]
95 Pages
|
13,313 Words
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (S […]
56 Pages
|
7,447 Words
Sensitive Touch Alarm system is an electronic device that can be used as a security device. It is an electronic watch dog, because when installed to a door, and somebody touches the door, it sounds an alarm. The unit is built from discrete semi conductor device. It is relatively simple in both its operation and analysis. One particular feature of this project circuit (the door alarm system) is its versatility. The circuit can be adapte […]
42 Pages
|
5,726 Words
Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There is a number of biometrics and different applications need diff […]