hello readers ,This website will be helpful for the people who like to participate in paper presentations and project competitions, we are planning to add placement papers in this blog further...plz make use of this blog.

Friday, November 19, 2010

Mechanical papers

These papers are especially for Mechanical Engineering students.....download them and please use them for reference purpose only....please kindly mention if there any broken links exists... contact us at papers4all@gmail.com

Download Mechanical papers here : mech papers
read more...

GROUND IMPROVEMENT TECHNIQUES(CIVIL)

                   Ground improvement is the most imaginative field of geotechnical engineering. It is a field in which the engineer forces the ground to adopt the project's requirements, by altering the natural state of the soil, instead of having to alter the design in response to the ground's natural limitations. The results usually include saving in construction cost and reduction of implementation time.
                   There are number of techniques available for improving the mechanical and engineering properties of the soil. However, each technique has some limitations and suit abilities to get maximum improvement in the soil conditions with minimum effort. Some of the important techniques are discussed in this paper.
                   To improve the strength of the soils, especially in case of granular type of soils, COMPACTION METHODES are found as best methods among all type of techniques. Based on the mechanism applied for compacting the soil, it is sub divided into different methods like dynamic compaction, blasting, vibro techniques ...etc.These are briefly discussed in this paper. 
                    When there are some limitations encountered for applying the above technique, grouting techniques, stabilization of soil using different admixtures can be adopted effectively which can bring variations in the soil conditions. The various types of above techniques are briefly discussed in this paper.
                     Finally, recent advancements in ground improving techniques using GEOTEXTILES, ELECTRIC TREATMENT METHODES are also briefly discussed in this paper. These techniques are widely used in these days.  

Download full paper : GROUND IMPROVEMENT
  This paper is for reference only...!!!
read more...

Future mechanics (Mech)

All engineering components and structures contain geometrical discontinuities – threaded connections, windows in aircraft fuselages, keyways in shaft, teeth of gear wheels, etc. The size and shape of these features are important since they determine the strength of the artifact. Conventionally, the strength of components or structures containing defects is assessed by evaluating the stress concentration caused by the discontinuity features. However, such a conventional approach would give erroneous answers if the geometrical discontinuity features have very sharp radii.

Download full paper : Futuremechanics

 This paper is for reference only...!!!

read more...

Monday, November 15, 2010

What a BOSS!!!!

Dear all, this post is not about technology or about education. But still I want to share since it was about the person who loves education and students, Please have a look at it

WHAT A BOSS !!!

There were about 70 scientists working on a very hectic project. All of Them were really frustrated due to the Pressure of work and the demands of their boss , but everyone was loyal to him and did not think of quitting the Job.

One day, one scientist came to his boss and told him - Sir, I have promised my children that I will take them to the Exhibition going on in our Township. So I want to leave the office at 5 30 PM.

His boss replied "OK, You're permitted to leave the office early today"

The Scientist started working. He continued his work after lunch. As usual He got involved to such an extent that he Looked at his watch when he felt He was close to completion. The time was 8.30 PM. Suddenly he remembered the promise he had given to his children.

He looked for his boss, He was not there. Having told him in the morning Itself, he closed everything and left for home.

Deep within himself, he was feeling guilty for having disappointed his Children.

He reached home. Children were not there. His wife alone was sitting in the hall,and reading magazines.

The situation was explosive, any talk would boomerang on him.

His wife Asked him "Would you like to have coffee or shall I straight away serve Dinner, if you are hungry.

The man replied "If you would like to have coffee, I too will have ; but what about our Children ??"

Wife replied "You don't know ?? Your manager came here at 5.15 PM And has taken the children to the exhibition "

What had really happened was ...

The boss who granted him permission was Observing him working seriously at 5.00 PM.

He thought to himself, this Person will not leave the work, But if he has promised his children, they should enjoy the visit to the exhibition.

So he took the lead in taking them to exhibition

The boss does not have to do it every time.

But once it is done, loyalty is Established.

That is why all the scientists at Thumba continued to work under their boss Even though the stress was tremendous.

By the way , can you hazard a guess as to who the boss was..?

.*

*

*

*

*

*

*

*

*

*

*

*

*

*

*

*

*

*

*

*

He was none other than Dr. APJ Abdul Kalam, Ex-President of India ....

read more...

Huge Database of paper presentations--1

hello readers,
            Thank you for your great response.....we received huge database of white papers from users and they are ready to download......we appreciate your contribution for this blog and once again we want to remind you that these papers are for reference only.....please mention author names and their contact details on papers that you are going to submit.....

Here is the link for white papers :
Database1





contact us :   papers4all@gmail.com

read more...

Design and implementation of brain controlled wheelchair

Traditionally the brain has been under constant research and the source of numerous technologies. One such
technology, brain machine interface, is the extraction of brain signals and their use in real time applications. The brain consists of three main regions of which the cerebellum is focused on by this technology. This technology uses electrodes to extract signals from corresponding regions of the brain and use these signals to operate devices.
                                              This paper does progressive work and continues in the lines of research done
presently in this field and their applications. The concentration is given to a wheelchair that has been designed to work on the extracted brain signals. Extraction of brain signals from various regions of the brain using both invasive and noninvasive techniques and the use of this signal in real time applications has been shown in this paper with the development of brain controlled wheel (BCW) chair, a device
for persons with total neural failure and other degenerative neural disorders. The model for BCW has been simulated with necessary algorithms and programs. Finally the unbound applications of this technology in
futuristic applications have been shown in this paper.

Download whole paper :

This paper is for reference only...!!!

read more...

TSUNAMI AND EARTHQUAKE ALERT SYSTEM

                             Earthquakes and Tsunamis strike without warning. The resulting damage can be minimized and lives can be saved if the people living in the earth quake-prone area are already prepared to survive the strike. This requires a warning before the strong ground motion from the earthquake arrives. Such a warning system is possible because the energy wave released at the epicenter travels slower (at 3.5 to 8km/s) than light, which is the principle behind developing this application.
                          The warning signal from the earthquake or tsunami epicenter can be transmitted to different places using the satellite communication network, fiber-optics network, pager service, cellphone service or a combination of these. The satellite based wireless network such as ISS is idle if system has to cover a large continent like ASIA.
                                                   The credential part of the paper lies in the applications part where the applications of ISS as an alert system for “EARTHQUAKE and TSUNAMI” like natural disasters with which the casualties can be reduced drastically. For EARTHQUAKE, TSUNAMI-prone countries like Indonesia, Japan seismic alert system using the ISS network spread throughout the earth is proposed here.
           This paper unleashes the system facts such as the network architecture and coverage, satellite constellation, Frequency plan and modulation of ISS system and its operation along with its advantages and applications. Last but not least, the innovative application of ISS as TSUNAMI, EARTHQUAKE alert system is explained in brief.
Download  whole paper : 
This paper is for reference only...!!!
read more...

Friday, November 12, 2010

PALM VEIN TECHNOLOGY

With the increase in technology threat to personal data and national security had also increased .The methods that were developed to secure important information from outside intervention were not up to safe mark .There was a need to introduce a technology that secures our data more efficiently from unlawful intervention .
 Fujitsu has developed a palm vein pattern authentication technology that uses vescular patterns as personal identification data .Vein recognition technology is secure because the authentication data exists inside the body and is therefore very difficult to forge. It is highly accurate.  This technology can be used in various fields like banking, hospitals, government offices, in passport issuing etc. Business growth will be achieved with these solutions by reducing the size of the palm vein sensor and shortening the authentication time. This paper is about the palm vein technology, its applications, how this technology is applied in real time applications and the advantages of using this technology.

Download full paper :
PALM VEIN TECHNOLOGY
    This paper is for reference only...!!!

read more...

Thursday, November 11, 2010

"Ethernet based security system using Wiznet W5100"

Dear readers and contributors,

 Ethernet based security system using wiznet W5100 have been uploaded. Please check the link and get benefited. Also a request for you all. We are receiving more and more request for many papers. Hence, we need your help too. Please contribute with advanced papers that you have. Without you we can't move. Help us to help u...

Ethernet Based Security System usin WIZNET W5100


 This paper is for reference only...!!!
read more...

E-MINE: A NOVEL WEB MINING APPROACH

 In recent years government agencies and industrial enterprises are using the web as the medium of publication. Hence, a large collection of documents, images, text files and  other forms of data in structured, semi structured and unstructured forms are available on the web. It has become increasingly difficult to identify relevant pieces of information  since the pages are often cluttered with irrelevant content like advertisements, copyright notices, etc surrounding the main content. Thus, we propose a technique that mines the relevant data regions from a web page. This technique is based on three important observations about data regions on the web. Extracting the regularly structured data records from web pages is an important problem. So far, several   attempts have been made to deal with the problem. The main disadvantage with the existing automatic approaches is their assumption that the relevant information of a data record is contained in a contiguous segment of HTML code, which is not always true. Thus, we propose a more effective method to  mine the data region in a web page. The algorithm, eMine, finds the data regions formed by all types of tags using visual cues.  

Download Full paper:
 This paper is for reference only...!!!
read more...

AIRBORNE INTERNET

The word on just about every Internet user's lips these days is "broadband." We have so much more data to send and download today, including audio files, video files and photos, that it's clogging our wimpy modems. Many Internet users are switching to cable modems and digital subscriber lines (DSLs) to increase their bandwidth. There's also a new type of service being developed that will take broadband into the air. In this paper, we'll learn about the future of the Airborne Internet. We'll take a look at the networks in development, the aircraft and how consumers may use this technology. Land-based lines are limited physically in how much data they can deliver because of the diameter of the cable or phone line. In an airborne Internet, there is no such physical limitation, enabling a broader capacity.
The airborne Internet will function much like satellite-based Internet access, but without the time delay. The airborne Internet will actually be used to compliment the satellite and ground-based networks, not replace them. These airborne networks will overcome the last-mile barriers facing conventional Internet access options.This paper addresses some of the trends and issues involved in developing an Airborne Internet capable of achieving this goal. Understanding relationships between these trends and issues and the objectives and functional requirements of the program will allow various participants in this complex program to keep activities in proper perspective. The all-round development  and improvement are the key areas of research work performed in this paper.
Download Full paper :
 This paper is for reference only...!!!
read more...

Cell Phone Jammers -- trends in IT

Cell phones are everywhere these days. According to the Cellular Telecommunications and Internet Association, almost 169 million people in the United States had cell-phone service in January 2004. And cell phones are even more ubiquitous in Europe.
It's great to be able to call anyone at anytime. Unfortunately, restaurants, movie theaters, concerts, shopping malls and churches all suffer from the spread of cell phones because not all cell-phone users know when to stop talking. Who hasn't seethed through one side of a conversation about an incredibly personal situation as the talker shares intimate details with his friend as well as everyone else in the area? While most of us just grumble and move on, some people are actually going to extremes to retaliate. Cell phones are basically handheld two-way radios. And like any radio, the signal can be disrupted, or jammed.Jamming devices overpower the cell phone by transmitting a signal on the same frequency and at a high enough power that the two signals collide and cancel each other out. Cell phones are designed to add power if they experience low-level interference, so the jammer must recognize and match the power increase from the phone.Cell phones are full-duplex devices, which means they use two separate frequencies, one for talking and one for listening simultaneously. Some jammers block only one of the frequencies used by cell phones, which has the effect of blocking both. The phone is tricked into thinking there is no service because it can receive only one of the frequencies.
Download full paper : 
 This paper is for reference only...!!!






read more...

Sunday, November 7, 2010

STAVIES

 A System for Information Extraction from unknown Web Data Sources through Automatic Web Wrapper Generation Using Clustering Techniques :
In this paper a fully automated wrapper for information extraction from Web pages is presented. The motivation behind such systems lies in the emerging need for going beyond the concept of "human browsing.” The World Wide Web is today the main "all kind of information” repository and has been so far very successful in disseminating information to humans. By automating the process of information retrieval, further utilization by targeted applications is enabled. This novel presents a fully automated scheme for creating generic wrappers for structures web data sources. The key idea in this novel system is to exploit the format of the Web pages to discover the underlying structure in order to finally infer and extract pieces of information from the Web page. This system first identifies the section of the Web page that contains the information to be extracted and then extracts it by using clustering techniques and other tools of statistical origin. STAVIES can operate without human intervention and does not require any training. The main innovation and contribution of the proposed system consists of introducing a signal-wise treatment of the tag structural hierarchy and using hierarchical clustering techniques to segment the Web pages. The importance of such a treatment is significant since it permits abstracting away from the raw tag-manipulating approach. The system performance is evaluated in real-life scenarios by comparing it with two state-of-the-art existing systems, OMINI and MDR.

Download whole paper : Stavies
 This paper is for reference only...!!!



read more...

SpyWare

                            Millions of computer users are being watched, not just by employers and Organizations, but by the software that they use frequently without their knowledge. This spyware has become the center for collecting of the private data and threatens the corporate secured data. Even  it can change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs.
  In an attempt to increase the understanding of spyware,we have to understand the “What exactly is spyware? How does it work? What is its impact on users and the businesses that employ them?How to prevent them?are discuss. Spyware is software designed to collect information from computer system users without their knowledge. Typically, spyware can be classifiedas a type of trojan horse, which is a type of technology-based security incident, allowing for information security policy violation. It can be termed also as computer software that  is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.


Download whole paper : spyware
 This paper is for reference only...!!!
read more...

Wednesday, November 3, 2010

The Brain Fingerprinting Technology

        Brain Fingerprinting is a new computer-based technology to identify the perpetrator of a crime accurately and scientifically by measuring brain-wave responses to crime-relevant words or pictures presented on a computer screen. Brain Fingerprinting has proven 100% accurate in over 120 tests, including tests on FBI agents, tests for a US intelligence agency and for the US Navy, and tests on real-life situations including felony crimes.Brain Fingerprinting is based on the principle that the brain is central to all human acts. In a criminal act, there may or may not be many kinds of peripheral evidence, but the brain is always there, planning, executing, and recording the crime. The fundamental difference between a perpetrator and a falsely accused, innocent person is that the perpetrator, having committed the crime, has the details of the crime stored in his brain, and the innocent suspect does not. This is what Brain Fingerprinting detects scientifically.
Download whole paper: 
brainFingering


 For reference only...!!!





read more...