Mechanical engineering project: Waste heat recycling power plant

Title: Method and apparatus for a waste heat recycling thermal power plant
Departments: Mechanical engineering, Energy engineering.
Can be used for: Mechanical engineering projects, Mechanical engineering paper presentations, energy related study and seminars

This was very much a interesting patent by Timothy Michael kirby et al. This paper was found, when we were searching on a request from one of our readers. The request was to fetch him a paper presentation related to  "Thermal power plant". For most of the mechanical engineering students with thermal power plant is one of the favorite topic. So, this is the second post on this topic and we are planning to go with more! To describe this paper, a waste heat recycling power plant, this extracts the heat energy from the environment and concentrates that heat to produce a cfc super ambient temperature heat source. So this concentrated heat is sufficient to supply a usable heat flow to a heat engine flow circuit. And over this the paper also cover more related the heat sink and more.

Sample from this heat recycling engineering project: In accordance with the present invention a waste heat recycling thermal power plant comprises a multitude of interacting volatile working fluid(s) circuits that generate a thermal potential between itself and an employable external heat source, extracting useable heat from that heat source (to replace the heat converted to mechanical energy or otherwise lost from the system), generating a super-ambient temperature heat source and a sub-ambient temperature heat sink, whose thermal potential is capable of providing a useable heat flow to fuel its incorporated heat engine, recycling collected system thermal losses and much of the useable heat flow that is rejected by its incorporated heat engine to its super-ambient temperature heat source, and the resultant mechanical power output produced by its incorporated heat engine is employed to drive a mechanical load (e.g., gearbox, electrical generator, propeller shaft, etc.).

Download this mechanical engineering project details here: http://goo.gl/OiF2I

Engineering projects: Repeaterless fiber optics communication.

Fiber optics engineering project ideas.pngTitle: Repeater less branch powered fiber optic communication.
Departments: Communication, Electronics and electrical, Telecommunication.
Can be used for: Paper presentation and related study.

This is a project that falls under the subject of "FIber optics communication". this papers idea was invented by Lars Erik Eskildsen, Evan Lee Goldstein, Per Bang Hansen. The basics of this paper presentation can be stated in this manner. The title suggests that the engineering project in the fiber optics is to design a network with branches that is repeater less. This idea is to construct a fiber network, configured in the ring topology with number of hubs in the network and one or more branching its interconnected in that. the branching units are designed to add/drop the signals along the path of the network. The engineering projects on fiber optics is to reduce the loss and remove the repeaters still make that network effective with the optical amplifiers.

Sample of this fiber optics project: The specification relates to a repeaterless branch powered fiber optic communications system. The system comprises an optical fiber cable trunk, configured in ring topology, with one or more telecommunications hub, and one or more branching unit serially interconnected therein. Branching units are provided as convenient add/drop points along the extend to cable stations. Cable stations insert and extract telecommunications traffic from the trunk ring over the branch fiber optic cables. In addition, the branch fiber optic cables are also coupled to light emitting power sources. The branch fiber optic cables deliver the energy produced from these power sources to optical amplifiers serially embedded within the branch fiber optic cables, the branching units, or the optical fiber cable trunks. The optical amplifiers convert the energy delivered from the branch fiber optic cables into amplified telecommunications signals. Thus, remote pumping or energy delivery is achieved without the requirement of additional optical fiber cable runs and further, using solely passive repeaterless components.

Download this engineering project here: http://goo.gl/1NJZx

Mini project: Motion sensor projects for students

Title: Motion sensor for security light.
Department: Electronics, electrical.
Can be used: Mini project, pre-final year projects, education purposes. 

This is an other project that was originally hosted by EFY, ideas and design by George varkey. This is another effective electronic project that is working with the help of a PIR motion detector module. Here the project is mainly designed for two purposes, to make the corridor light work in the power saving mode and security device. This project published in the EFY was highly effective and working perfectly. We would strongly recommend to use this circuit diagram and try this for mini project and hobby projects. All the components in the circuit diagram are easily available in the market.


Download this project details here: http://goo.gl/BdMwa

Digital image processing, Engineering projects


Title: Device for performing image processing based on the image attribute.
Department: Computer science, communication engineering, image processing.
Can be used for: Educational presentation, engineering seminars, engineering projects, final year projects and more

Image processing projects is one of the hot topics for the students of the departments like computer science and communication. image processing seem so attractive to students basically because of the general nature of this subject. I fount this project on the web which was invented by Tsutomu sakaue. The overview of this project can be given like, This present engineering project on image processing proves an image processing device that evil be able to compress the information volume of attribute data by vectorizing the attribute data. The transmitting device will have a attribute separating unit that will extract the att. data from the original image, a vectorizing unit will vectorize the att. data and transmits the vectorized att. data that was already vectorized by the vectorization processing unit together with the image data .his is receive in the the other end and the data is retrieved by inverting the same process at the receiver end Thus this project works. 

Sample of this research paper on image processing: 1. Field of the Invention: The present invention relates to an image processing device and an imaging processing method for performing image processing based on attribute of an image, as well as a computer-readable medium for performing the image processing method. 2. Description of the Related Art: In recent years, along with the spread of technologies such as intranets and the Internet, it is becoming typical to use image processing devices in an office over a network. For this reason, whereas image processing devices for producing copies have been used as stand-alone devices, it has now become possible to use such devices over a network. In other words, it has become possible to produce copies using different image processing devices over a network 

Download this image processing project here: http://goo.gl/RXYSP

Mini projects: Electronic Security system

Title: Electronic security system
Departments: Electronics, Electrical, instrumentation., and more.
Can be used for: Education purpose, engineering study and projects, mini projects.


This is a latest project that i came across at EFY which is designed by K. BHARATHAN. As our team is searching of some good projects to share them among the student community, we found this "electronic security system". The working of this projects can be stated as, This project is basically a security system which can be used at houses and offices. which are having a "sense switch" that is just meant to be fixed along the doors and monitored from a mobile place. if the doors with the sense switches are opened or disturbed then the circuit is designed to ring a alarm that is attached. having a circuit with such basic electronic components which can be easily found in our common market make this projects cool. The projects could be stated as one of the best choices for the hobby tries and mini projects. 


Wireless Vehicle/Automobile security system project

Title: Interactive wireless vehicle security system.
Department: Electronics and communication, Automobile, Networking, computers, security.
Can be used for: Paper presentations, final year projects, research work for students and others.

This projects idea was an inspiration from this paper by Wang Qiahe et al. This paper by him is on the security system for the vehicles via wireless communication. This is one of the projects that most of the young engineers get attracted. This attraction is due to the various number of fields this project cover. subjects like networking, communication, embedded, automobiles and more. This is such an interesting project to work on. The simple working of this projects idea can be stated as following, This has an security system designed that detects intrusive activities in and around a vehicle and transmits the message (warning message). the speciality about this project is that, it also adds specific description of the warning in the same message through a wireless telephone network to the administrator or the owner's assigned contact. So that in response that message the admin or the contact will be able to establish a remote wireless communication with the security system and get further information.

Sample of this paper presentation / engineering project: The CPU can also be programmed to take other actions automatically, through the GSM module and/or the vehicle control interface, in response to specific intrusion indicators. For example, in response to intrusion sensors indicating vehicle vibration or movement in the vehicle's vicinity, the CPU can send a command through the vehicle control interface to lock the doors and sound the vehicle's horn or alarm siren. If one of the intrusion sensors indicates that the vehicle has been tilted, on the other hand, the CPU can be programmed to select from the message ROM the message that the vehicle is being towed away by a thief and to transmit that message through the communication interface to the GSM module, with direction that it be sent to police and emergency telephone numbers. And in response to a pressure reading from the gas pedal sensor, the CPU can be programmed to send a command through the vehicle control interface to disable the fuel pump so that fuel will stop flowing to the engine.

When the owner receives a message from the base unit specifying the type of intrusion and time of occurrence, he or she can initiate a number of responsive actions from the keypad, from a remote telephone, or, if supported by the local GSM service provider, from a computer or PDA. When the owner contacts the base unit through the GSM module, he or she can access the CPU by entering a pre-programmed password. Password authentication causes the CPU to access the menu ROM containing a series of digital voice instructions and menu prompts eliciting alternate choices. The menu prompts begin with the most general main menu level and progress to more specific sub-menus based on the owner's responses. The menu prompts are transmitted through the communication interface to the GSM module and from there to the owner.

US military drones, infected by The “nasty” computer virus


The “nasty” computer virus is an key logger, which secretly record  the action performed on the key board by saving the keystorkes in log file.  This virus infected a fleet of America’s predator and Reaper drones recently which fly the mission remotely to Afghanistan and other warzones . The use of unmanned aircrafts - u.s military drones is increased after the president obama took the office, recent  statistics says u.s military drone killed more than 20,000 suspected  militants and civilians, without risking the lives of u.s soldiers. But now, the drone here is targeted –unmanned with help of the “nasty” computer virus.  The unmanned aircrafts used by the Airforce for espionage and combat, this aircraft  is given instruction remotely using the keyboard and joy stick, with help of this advancement the infection here records the keystroke which helps the hacker to get to know what is exactly happening in the u.s military . The “nasty” computer virus infection hits the Creech Air Force station in Nevada suspected that it steals the confidential information of the u.s. military also they have no clue that, from where the infection is spread and whether its been targeted the Drones computer alone or not. Creech specialist couldn’t remove the “nasty” computer virus in their systems even after knowing what exactly had happened to the system.







Home automation security project (complete paper)


Title: Home automation security system project.
Department: Computer science, Automation, Networking, Communication.
Can be used for: To improve ideas in automation projects, develop home security projects and research papers, paper presentations.

This engineering project is an patent by Thomas J. Hackman et al. This paper will provide you with the details of the titled project. The topic of automation and security is in top notch in the research field. For those students who are interested in this topic "Automation projects" this paper will be very useful. To explain this paper in simple words, the projects is developed for home and office purposes. A computer network controlled and monitored automation system in which a residential server controls and monitors security and other computer controllable systems in the same house/office. 

Sample of this paper presentation / engineering project: A network overview of a current industry standard for Web control of a home automation system. Such prior-art home automation systems place a Web server in each of the homes that remote users can directly connect to outside of the home, such as, for example, via a laptop while traveling or via a PC while at work. To access the user's home automation system, the remote user simply 'surfs' directly to a Web server that is located in the home. This Web server is usually directly connected to the Internet and very exposed to hackers. For example, the data connections shown in FIG. 1 are all established via plain text HTTP requests (unencrypted). A primary disadvantage with this prior-art system is that a Web server directly connected to the Internet is often exposed to hackers. If proper precautions are taken, the risk to someone hacking into the home can be minimized but not eliminated. The home is an attractive target to hackers for many obvious reasons. The most common vulnerabilities to the systems that are sought after are flaws in the operating system, Web server or ancillary services. Operating system manufacturers are constantly releasing patches to repair recently discovered security flaws or to stop newly invented hacking tools. Corporations usually have someone on their IT staff actively monitoring their servers, installing all of the latest security patches, and reacting to stop intrusions. Homeowners, on the other hand, will unlikely have the technical background to perform this task, and a system initially intended to make their life easier should not place this type of burden upon them.

Download this engineering project / Paper presentation here: http://goo.gl/ndRZa

Steve Jobs - Greatest contributor to technology.

This post on the great, Steve Jobs! is an tribute to the king of modern computers..
Everybody knows Steve Jobs was a genius, but only some of them knew his actual influence on present technology, one such person is Walt Mossberg who was the editor for the technical column in “wall street journal”. Walt Mossberg shares his thoughts about Steve Jobs in his blog shortly after his death.
Steve Jobs influenced billion of lives with his technology he has been role model to many of the present corporate leaders. Many people look upon him in the range of Thomas Alva Edison or Hendry ford.
He was the ultimate CEO, he hired many minds around the world, employed them for a long period of time, took many risks, made big bets and insisted on product quality unlike others. He empowered his users and not the intermediate corporate or it directories, which made him distinct and special from others.
Steve Jobs relationship with Walt Mossberg was cordial and highly professional. Since Walt was a product reviewer Steve Jobs discussed about his products with him over the phone, there are some instances that Mossberg would like to share with us,

THE PHONE CALLS:
Initially when Steve Jobs were at Apple Walt Mossberg didn’t know him. The first meeting between both took place only during Jobs return in 1977. Right after that time Jobs began to call him regularly during Sunday nights, to discuss about his reviews on his products which Walt Mossberg didn’t recommend for his readers .The talks between the both extended even for hours together. Now Walt Mossberg started to recommend apple products to an average non technical user which was Steve Jobs target.

THE PRODUCT UNVEILING:
 Sometimes Steve Jobs showed his new products first to Walt Mossberg in his boardroom before showing it to the world. He mostly did the same with the other journalists also. He was almost like a show man casting his products to others with immense pride in his voice. When Steve showed his first iPods to Walt Mossberg, Walt was quiet astonished and had asked Steve that how could a computer company produce an mp3 player but Steve had replied that Apple was not a computer company but it was a digital products company. It was the same with iTunes, iphone and even iPod. Steve had shown his first iphone to Mossberg at his house because he was too ill to go to office at that time.

THE SLIDES:
One technical conference that Steve Jobs always attended was D:ALL THINGS DIGITAL conference of Walt Mossberg’s news paper, where there is a principle of not using slides for any presentation ironically Steve’s prime presentation tool was slides. Once in the same conference Steve had prepared several slides for his speech (knowing that slides were not allowed) and was practicing them backstage before the program was about to begin. When Walt had insisted him not to use them on stage Steve argued with him for a very long time and then accepted not to use the slides on stage, yet he made it big that day and proved that he was the favorite speaker of people.

ICE WATER IN HELL:
Everyone knows about the relationship between Bill Gates and Steve Jobs. During the 5th D: conference, both Bill Gates and Steve Jobs had accepted to do a joint stage interview with Walt Mossberg. The interview started off first with Steve Jobs so that Bill Gates could join them later, in that interview Mossberg had asked Steve Jobs that “how it is like to see many windows users making use of your iTunes players?” for that Steve had replied that it is like “giving a glass of ice water to someone in hell”. Later when Bill Gates arrived he happened to hear about this comment, he asked Steve Jobs that:”so I guess I’m the representative from hell”, Steve Jobs merely handed Gates a cold bottle of water that he was carrying. The tension created by Bill Gates was simply shattered, the interview became a triumph and the audience gave a standing ovation at the end.

OPTIMIST:
Steve jobs was very optimistic this was shown very well during the dark days of apple in 1997 and 1998 when he was forced to turn to Microsoft for help. He still had his nasty and mercurial qualities which he later expressed to vendors and dealers who wanted to connect to Apple. He was a very self motivated person who still wanted to keep going even after his illness and liver transplant. Steve jobs was a great man who almost changed the view of technology to a common man.


The Tech World's Tributes to Steve Jobs:
Death of Steve jobs has generated tributes of several admirers, peers, colleagues, rivals and many others who had adored him from afar, here is the roundup of what they had said in social networking sites like twitter and face book,

Michelle and I are saddened to learn of the passing of Steve Jobs. Steve was among the greatest of American innovators - brave enough to think differently, bold enough to believe he could change the world, and talented enough to do it.
"By building one of the planet's most successful companies from his garage, he exemplified the spirit of American ingenuity. By making computers personal and putting the internet in our pockets, he made the information revolution not only accessible, but intuitive and fun.
"And by turning his talents to storytelling, he has brought joy to millions of children and grownups alike. Steve was fond of saying that he lived every day like it was his last.
"Because he did, he transformed our lives, redefined entire industries, and achieved one of the rarest feats in human history: he changed the way each of us sees the world.
"The world has lost a visionary. And there may be no greater tribute to Steve's success than the fact that much of the world learned of his passing on a device he invented. Michelle and I send our thoughts and prayers to Steve's wife Laurene, his family, and all those who loved him."
—U.S. President Barack Obama and First Lady Michelle Obama

"Melinda and I extend our sincere condolences to Steve Jobs' family and friends. The world rarely sees someone who made such a profound impact."
—Bill Gates, Co-Founder and Chairman of Microsoft, and Melinda Gates

"Today the world lost a visionary leader, the technology industry lost an iconic legend and I lost a friend and fellow founder. The legacy of Steve Jobs will be remembered for generations to come."
—Michael Dell, CEO of Dell

"Steve Jobs was a great California innovator who demonstrated what an independent and creative mind can accomplish."
—Jerry Brown, Governor of California

"Steve lived the California Dream every day of his life and he changed the world and inspired all of us."
—Arnold Schwarzenegger, Actor and Former Governor of California

We've lost a unique tech pioneer and auteur who knew how to make amazingly great products. Steve fought a long battle against tough odds in a very brave way. He kept doing amazing things in the face of all that adversity. As someone who has had his own medical challenges, I couldn't help but be encouraged by how he persevered."
—Paul Allen, Co-Founder of Microsoft

I want to express my deepest condolences at the passing of Steve Jobs, one of the founders of our industry and a true visionary. My heart goes out to his family, everyone at Apple, and everyone who has been touched by his work."
—Steve Ballmer, CEO of Microsoft

He was a great man with incredible achievements and amazing brilliance. He always seemed to be able to say in very few words what you actually should have been thinking before you thought it. His focus on the user experience above all else has always been an inspiration to me."
—Larry Page, CEO of Google

"Steve, thank you for being a mentor and a friend. Thanks for showing that what you build can change the world. I will miss you."
—Mark Zuckerberg, Founder and CEO of Facebook

"Once in a rare while, somebody comes along who doesn't just raise the bar, they create an entirely new standard of measurement."
—Dick Costolo, CEO of Twitter


RIP Steve! You lived the most meaningful life on the earth! We'll miss you..


Learn robotics online: Complete robotics guide (from beginners to experts)


Tutorial for robot freaks: (Learn robotics online)
Robotics , Robotics and Robotics! Wow this is one common request we get from all most every reader of our blog. 4 out of 10 engineering students are found to be interested in this subject dealing with robots. Engineering students from all the majors including non electronics and non computer science too! This subject make wonder due to various reasons but the main reason might be the direct out come, the robots themselves! This robots seems to impress everyone right from a school going kid to a great PHD holder! May be we are feeling this love because of the dramas and movies we've seen in the past. Okay fine, What ever might be the background of this craze. We have tried to make a collection of good tutorials and materials for those crazy robot freaks. This is not he complete collection of the available materials, this will be constantly updated.

All these are high quality links, bookmark this page for future use.

These links will proved you answers for questions like: 
robotics online tutorials
1. What is a Robot? 
According to the Robot Institute of America (1979) a robot is:
"A reprogrammable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks".
A more inspiring definition can be found in Webster. According to Webster a robot is:
"An automatic device that performs functions normally ascribed to humans or a machine in the form of a human."

2. Robotics history?

3. How to : learn robotics? (THEORY)

4. How to : learn Robotics? (VIDEO TUTORIALS)
http://see.stanford.edu/see/lecturelist.aspx?coll=86cc8662-f6e4-43c3-a1be-b30d1d179743 (click on the youtube link, below every lecture for easy viewing)

5. How to construct my first Robot?  (Beginners Guide)

6. How to program a robot? (Programming guide)

7. How to construct a robot? (intermediate) 

8. Cheap robot ideas?

9. Good Robotics project ideas and paper presentation?

10. Hobby project ideas?
Instructables is one awesome site for all kinds of hobby projects. They also frequently update projects on robotics. Try this link if you want to try new and trending projects.

11. Book recommendations? 
These some good books recommended by us, for the beginners. You can search these books on the google books and amazon, to know more about the books. 
  • Robot Builder's Bonanza, Third Edition
  • Robot Building for Beginners
  • Build a Remote-Controlled Robot 
  • Absolute Beginner's Guide to Building Robots
  • Robots, Androids, and Animatrons : 12 Incredible Projects You Can Build
  • Robotics Demystified
  • Robot Building For Dummies

12. Updates on the robotics study?

How to use Facebook in a secure way? Tips and tricks for everyone

How to use facebook in a secured way  protecting from spam messages?!

Spam is the unsolicited message sent randomly to the users through the electronic message
also with broadcast media and digital library. Most widely used medium is electronic message spam the other similar terms used to represent this type of spam  is usenet newsgroup, wiki spam, blog spam etc.
This email spam abusive  practice is been mostly used by the spammers recent  days. The ultimate aim of the spammers is making advertisement to reach as many number of users because with less cost their expectation is met. This practice that too in social networking site like  facebook scares the user seeing the spam message.  The statistic says in 2011 there are seven trillion  spam message is spread in this short period of time. The facebook team is still under  research to provide the efficient spam blocking tool  but the spammers are a step ahead in continue sending spam message to the users.
But every time the spammers are not smart enough, there are things to prevent  their abusive action on our page. Be aware of the short links which sent by the person who is not an


active user in facebook and before agreeing install any app try to do research on it. User must be careful in  what apps authorize to post  on wall. some other technique to block the spam message to be sent to users friend list. In facebook privacy settings page click the  Apps and Websites, this will list all the Apps that was recently accessed. The user must select the suspected App and remove that from the account also delete message which is posted by the app on behalf of user to spread among the friends account. 


The facebook team have provided the option to filter all the spam messages from the spammers but at times some of the non abusive spam messages are blocked by this filter. How ever the abusive spam have no path to enter into the users page. The other agreed option is not allowing the users to post the link on their wall, this is very much preferred option to stay way from the spam messges. Also the suspected link, app can be reported to the facebook team so that they investigate to find the head.


The other common technique used to send spam messages is by making the users to click on them to agree without their knowledge. This is made possible by hiding the accept button by placing other common play button in a player or view button at the bottom of the picture, that whole content will be a fake one which attract the users to ‘just a click’ on  that icon to receive all spam app to activate. This technique is called as “clickjacking” also called “likejacking


To prevent this likejacking there are few tools available to filter and protect user from the abusive spam. The   Zscalar has developed a tool which reveals the hidden click to the user so that the user is notified about the spam. Now the user can go ahead to block and  report this to facebook team as well.

Quantum computers - Soon to replace current generation computers?

We live in a generation where we witness the procession of contraptions that make our life easier by the day. Thanks to the brains behind such fabulous inventions. These gadgets play an influential role in leading a comfortable life.
One such soon-to-be, life-changing tool is the quantum computer which is being developed in the hope of matching up to the existing counterpart with the help of quantum particles rather than the transistors that the latter uses. Though the quantum computer is under development for more than two decades, the physicists are yet to attain a remarkable result except for the latest creation of a tiny "electron superhighway" that could one day be useful for building a successful quantum computer. In a recent paper in Physical Review Letters, Rice physicists Rui-Rui Du and Ivan Knez describe a new method for making a tiny device called a "quantum spin Hall topological insulator." The device, which acts as an electron superhighway, is one of the building blocks needed to create quantum particles that store and manipulate data. Today's computers use binary bits of data that are either ones or zeros whereas the quantum computers use quantum bits, or "qubits," which can be both ones and zeros at the same time. This quirk gives quantum computers a huge edge in performing particular types of calculations, said Du, professor of physics and astronomy at Rice University,Houston. For example, intense computing tasks like code-breaking, climate modeling and biomedical simulation could be completed thousands of times faster with quantum computers. "In principle, we don't need many qubits to create a powerful computer," he said. "In terms of information density, a silicon microprocessor with 1 billion transistors would be roughly equal to a quantum processor with 30 qubits". They are confident that the information encoded into these qubits is not likely to get lost over time due to quantum fluctuations which is called as fault tolerance. Du and Knez follow "topological quantum computing". Topological designs are expected to be more fault-tolerant than other types of quantum computers.
The topological designs led to the yet-to-be-discovered Majorana fermions, a stable pair of quantum particle that have a virtually immutable shared identity. Physicists believe the particles can be made by marrying a two-dimensional topological insulator to a superconductor. if a small square of a topological insulator is attached to a superconductor, Knez said, “The elusive Majorana fermions are expected to appear precisely where the materials meet. If this proves true, the devices could potentially be used to generate qubits for quantum computing”, he said.
Knez spent more than a year refining the techniques to create Rice's topological insulator. The device is made from a commercial-grade semiconductor that's commonly used in making night-vision goggles. Du said it is the first 2-D topological insulator made from a material that physicists already know how to attach to a superconductor.
"We are well-positioned for the next step," Du said. "Meanwhile, only experiments can tell whether we can find Majorana fermions and whether they are good candidates for creating stable qubits”. This quantum computer is sure to make a mark in the field of computing. So let us keep our fingers crossed and hopefully encounter a worth-a-wait device in the years to come.

I came across this highly informative article in sciencedaily and wanted to share it to my reders to let them enjoy the information as much as I did.
Related Posts Plugin for WordPress, Blogger...