Embedded System Project in Trichy

Siddhi Soft Solutions a single stop provider of software and hardware solutions on Embedded system in Trichy.We focus on delivering embedded solutions that enhance students performance and power of latest technologies. We take up new thrilling challenges given by students and we guide them by resolving their challenges. Our objective on embedded system is to provide Unique, Powerful cost effective embedded training. Embedded system provide a very large proportion of advanced products and design in world.Siddhi Soft Solutions an leading IT research and development form offers excellent and hand on knowledge about micro controller such as PIC, AVR. Integration of micro controller with Robotics, Wireless, Android and more latest innovative technologies.

We guide ieee projects for ece Students to develop knowledge and it very usefull in during their academic projects. Currently we are doing projects based on microcontrollers integrated with latest technologies on IEEE standared for final year students.

Embedded System Projects 2014 Titles

An embedded system is a special-purpose computer system designed to perform a dedicated function. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded system comprises of both hardware and software. Embedded system is fast growing technology in various fields like industrial automation, home appliances, automobiles, aeronautics etc. In this project have three sections are present. Every bus stop section having the RF transmitter is with unique code for identification. The RF receiver will fix in the every buses. Whenever the bus comes to the near bus stop automatically voice board will play the bus stop information also displayed in the LCD display.
Society is becoming increasingly dependent on embedded computing and sensor technology to enable complex networks of autonomous systems, such as robots, unmanned aerial vehicles (UAVs), self-driving cars, and unmanned underwater vehicles (UUVs). In fact, several recent developments highlight the realization of advanced autonomous systems that were deemed science fiction just a few decades ago. One example is UAVs being extensively deployed in missions around the world to perform numerous operations, including reconnaissance and intelligence gathering, war fighting, and scientific. The necessary component is a communication system, which relays information to and receives information from a command center as well as information shared by other autonomous systems that form part of the network. Embedded processors in these complex autonomous systems often do not act alone, but rather in concert with each other. Consequently, information sharing between embedded processors within the same autonomous system or between two different systems is crucial for many operations. Main scope of the project is to develop high security system for hybrid vehicle. In this project we design the autonomous and manual vehicle system using the embedded with wireless communication. In this system we provide high security by using the communication like automatic for RF and manual for RFID. Using the RF system we can control the vehicle remote via and using obstacle sensor we can find obstacle in the path. RFID is allowed the authority people only access the vehicle. For navigation purpose we use the GPS and GSM technologies with remote monitoring application. Sensor implement for the parameter monitor like engine temperature and cooling system in the vehicle. Obstacle sensor will be used for the collusion prevention technology. Any abnormal occur means voice board play the recorded voice through the speaker.
The increasing aging population is one of the major social problems in 21st century worldwide. Among many other problems caused by aging, each year, approximately one third of adults over 65 years old fall, and the likelihood of falling increases substantially with advancing age. Nearly half are recurrent falls, and nearly 10% of falls result in serious injuries. As the world aging process quickened, falls in the elderly have become a significant financial burden to Family and society. Besides the extent of injury, the medication outcome of a fall may also largely depend upon the response and rescue time. Hence, reliable fall prevention and detection are essential in independent living facilities: predict then prevent the heavy collision of a fall, or fall event detection followed by immediate notification to caregivers, and researches showed that the risk of hospitalization can be reduced by 26% and death by over 80% First, acquire tri-axial acceleration at human upper trunk from fall processes and other daily life activities. Second, extract features that describe the movements during a series of short time periods by turns to make up ATS, which characterize motion processes. Then, study the features of ATS from the course that before the collision of body with lower subjects in fall processes, whose outputs express the marching degree of input ATS, thus it can be applied to evaluate the risks to fall. Finally, we set thresholds by compiling statistics of the outputs from different motion processes to detect and predict fall events. The experiment results show that these methods can predict falls in 200-400 ms before the impact and can also distinguish fall events from other daily life activities accurately.
This paper addresses the data search problem in large-scale highly mobile and dense wireless networks. Current wireless network data search systems are not suitable for large-scale highly mobile and dense wireless networks. This paper presents a scalable and mobility-resilient Locality-based distributed Data search system (LORD) for large-scale wireless networks with high mobility and density. Taking advantage of the high density, rather than mapping data to a location point, LORD maps file metadata to a geographical region and stores it in multiple nodes in the region, thus enhancing mobility-resilience. LORD has a novel region-based geographic data routing protocol that does not rely on flooding or GPSs for data publishing and querying, and a coloring-based partial replication algorithm to reduce data replicas in a region while maintaining the querying efficiency. LORD also works for unbalanced wireless networks with sparse regions. Simulation results show the superior performance of LORD compared to representative data search systems in terms of scalability, overhead, and mobility resilience in a highly dense and mobile network. The results also show the high scalability and mobility-resilience of LORD in an unbalanced wireless network with sparse regions, and the effectiveness of its coloring-based partial replication algorithm.
Buildings can progressively accumulate damage during their operational lifetime, due to seismic events, unforeseen foundation settlement, material aging, design error, etc. Periodic monitoring of the structure for such damage is therefore a key step in rationally planning the maintenance needed to guarantee an adequate level of safety and serviceability. However, in order for the installation of a permanently installed sensing system in buildings to be economically viable, the sensor modules must be wireless to reduce installation costs, must operate with a low power consumption to reduce servicing costs of replacing batteries, and use low cost sensors that can be mass produced such as MEMS sensors. The capability of MEMS and wireless networking for monitoring civil structures is well documented.
This paper describes a research on The Flexible Bus Systems (FBS) using SMAC as a communication medium. The Flexible Bus System is a demand responsive transit (DRT) but it is more efficient and convenient in a sense that it entertains passenger’s demands and gives bus locations in real time. The real time synchronization of The Flexible Bus System makes it information rich and unique as compared to other DRTs. The Flexible Bus Systems is a system that can replace the Traditional Bus Systems with its flexibility and efficiency. This paper discusses the use of wireless technologies in The Flexible Bus Systems and how to make it more reliable using short range wireless technology SMAC protocol.
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy.
Small sized ground robotic vehicles have great potential to be deployed in situations that are either uncomfortable for humans or simply too tedious. For example, a robot may become part of industrial operations, or become part of a senior citizen’s life, or become a tour guide for an exhibition center. The robot is kept as small as possible to allow access through narrow passageways such as a tunnel. To fulfill these missions, the robotic vehicle often has to obtain its accurate localization in real time. Considering the difficulty or impossibility in frequent calibration or the management of external facilities, it is desirable to have a self-contained positioning system for the robot: ideally, the localization system should be completely integrated onto the robot instead of requiring external facilities to obtain the position; the system should work indoors and outdoors without any human involvement such as manual calibration or management. Meanwhile, the cost is expected to be as low as possible.
Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a device’s free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for storing hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms.