Skinpress Rss

Thursday 1 November 2012

ANNA UNIVERSITY EXAM SCHEDULE FOR CSE 3RD SEM, 5TH SEM, 7TH SEMESTER

0




ANNA UNIVERSITY EXAM SCHEDULE FOR CSE 3RD SEM, 5TH SEM, 7TH SEMESTER



Branch Name B.E-Computer Science and Engg. Semester Subject Name Subject Exam Date Day Sessio
Code n
02 Mathematics II MA2161 19-DEC-12 Wednesday AN
02 Engineering Physics II PH2161 20-DEC-12 Thursday AN
02 Technical English II HS2161 22-DEC-12 Saturday AN
02 Engineering Chemistry II CY2161 27-DEC-12 Thursday AN
02 Electric Circuits and Electron Devices EC2151 28-DEC-12 Friday AN
02 Basic Civil and Mechanical Engineering GE2152 29-DEC-12 Saturday AN
 03 Analog and Digital Communication CS2204 22-NOV-12 Thursday FN
03 Environmental Science and Engineering GE2021 26-NOV-12 Monday AN
03 Object Oriented Programming CS2203 29-NOV-12 Thursday FN
 03 Data Structures CS2201 04-DEC-12 Tuesday FN
03 Transforms and Partial Differential Equations MA2211 07-DEC-12 Friday FN
03 Digital Principles and Systems Design CS2202 11-DEC-12 Tuesday FN
 04 Design and Analysis of Algorithms CS2251 19-DEC-12 Wednesday FN
04 Database Management Systems CS2255 20-DEC-12 Thursday FN
 04 Microprocessors and Microcontrollers CS2252 21-DEC-12 Friday FN
 04 Probability and Queueing Theory MA2262 22-DEC-12 Saturday FN
04 Operating Systems CS2254 27-DEC-12 Thursday FN
 04 Computer Organization and Architecture CS2253 28-DEC-12 Friday FN
05 Software Engineering CS2301 17-NOV-12 Saturday FN
 05 System Software CS2304 21-NOV-12 Wednesday FN
 05 Discrete Mathematics MA2265 28-NOV-12 Wednesday FN
 05 Computer Networks CS2302 03-DEC-12 Monday FN
 05 Theory of Computation CS2303 06-DEC-12 Thursday FN
05 Programming Paradigms CS2305 10-DEC-12 Monday FN
06 Principles of Compiler Design CS2352 05-DEC-12 Wednesday AN
06 Advanced Computer Architecture CS2354 06-DEC-12 Thursday AN
06 Artificial Intelligence CS2351 07-DEC-12 Friday AN
06 Object Oriented Analysis and Design CS2353 08-DEC-12 Saturday AN
06 Advanced Database Technology CS2029 10-DEC-12 Monday AN
06 Knowledge Management IT2043 11-DEC-12 Tuesday AN
06 Numerical Methods MA2264 13-DEC-12 Thursday FN
06 Visual Programming CS2022 14-DEC-12 Friday AN
06 Advanced JAVA Programming CS2023 15-DEC-12 Saturday AN
06 Web Technology IT2353 15-DEC-12 Saturday AN
 06 Embedded Systems IT2354 17-DEC-12 Monday AN
06 UNIX Internals CS2028 18-DEC-12 Tuesday AN
07 Computer Graphics CS2401 16-NOV-12 Friday FN
07 Cryptography and Network Security IT2352 20-NOV-12 Tuesday FN
07 Digital Signal Processing CS2403 24-NOV-12 Saturday FN
 07 Engineering Economics and Financial Accounting MG2452 27-NOV-12 Tuesday FN
 07 Service Oriented Architecture IT2401 30-NOV-12 Friday FN
07 Wireless Networks CS2045 05-DEC-12 Wednesday FN
07 Network Programming and Management IT2351 05-DEC-12 Wednesday FN
07 Mobile and Pervasive Computing CS2402 08-DEC-12 Saturday FN
 07 Total Quality Management GE2022 14-DEC-12 Friday FN
Branch Name
B.E-Computer Science and Engg.
Semester Subject Name Subject Exam Date Day Sessio
Code n
07 Software Testing IT2032 15-DEC-12 Saturday FN
07 C# and .NET Framework CS2041 17-DEC-12 Monday FN
07 Data Warehousing and Data Mining CS2032 18-DEC-12 Tuesday FN
07 Real Time Systems CS2033 18-DEC-12 Tuesday FN
07 User Interface Design IT2024 18-DEC-12 Tuesday FN
07 TCP/IP Design and Implementation CS2034 18-DEC-12 Tuesday FN
08 Knowledge Based Decision Support Systems CS2057 16-NOV-12 Friday AN
08 Software Quality Assurance CS2055 16-NOV-12 Friday AN
08 Graph Theory CS2051 16-NOV-12 Friday AN
08 Distributed Systems CS2056 16-NOV-12 Friday AN
08 Indian Constitution and Society GE2072 17-NOV-12 Saturday AN
08 High Speed Networks CS2060 19-NOV-12 Monday AN
08 Grid Computing CS2063 21-NOV-12 Wednesday AN
08 Digital Image Processing IT2023 22-NOV-12 Thursday AN
08 Information Security IT2042 28-NOV-12 Wednesday AN
08 Software Project Management IT2403 03-DEC-12 Monday AN
08 Professional Ethics in Engineering GE2025 12-DEC-12 Wednesday FN


ANTI-THEFT SAFETY SYSTEM IN AUTOMOBILES USING GSM COMMUNICATION VIA SMS

0




ANTI-THEFT SAFETY SYSTEM IN AUTOMOBILES USING GSM COMMUNICATION VIA SMS

INTRODUCTION:

GSM system based vehicle anti-theft uses microcontroller to prevent the car from theft by text conversation between the car’s GSM mobile phone and the owner’s one. It is necessary for a system in cars to prevent the thefts. GPS system is quite costly. User cannot interact with the car using GPS system. Also user requires a computer with internet connection for tracing cars. This paper is an economic, interactive, global access theft preventing system for automobiles. Embedded systems are special purpose computer systems that include wide range of application.





PAPERS CONCEPTUAL EXPLANATION:
The paper deals with embedded system and it uses the network of the GSM service providers for communication between mobile phone present in vehicle and the mobile handset unit (cell phone). Microcontroller is used in the automation process.

IF U NEED FULL PAPER SEND A REQUEST TO


CREANOVA [CREATIVE & INNOVATIVE ENGINEERS]


CONCLUSION:
This system therefore prevents all kinds of vehicle thefts. This provides a comprehensive security system and the fact that this can be controlled from any part of the world adds to its credibility. This system is difficult to hack and taper so it proves to be the safest option.






4G- A NEW ERA IN WIRELESS TELECOMMUNICATION

0


4G- A NEW ERA IN WIRELESS TELECOMMUNICATION
                                                           



ABSTRACT
4G connect anytime, anywhere, anyhowpromising ubiquitous network access at high speed to the end users, has been a topic of great interest especially for the wireless telecom industry. 4G seems to be the solution for the growing user requirements of wireless broadband access and the limitations of the existing wireless communication system. The purpose of this paper is to provide an overview of the different aspects of 4G which includes its features, its proposed architecture and key technological enablers. It also elaborates on the roadblocks in its implementations. A special consideration has been given to the security concerns of 4G by discussing a security threat analysis model   proposed   by   International   Telecommunication Union (ITU). By applying this model, a detailed analysis of threats to 4G and the corresponding measures to counter them can be performed.
.  INTRODUCTION

Wireless telecommunication history can be classified into different generations of network. Each generation has been a giant stride which revolutionized the field of mobile communication. As discussed in paper , era of telecommunication started with 1G in 1980 where all the systems where based on analog radio signal technology. Voice was considered to be the main traffic. Various 1G standards defined were Advance Mobile Phone System (AMPS), Nordic Mobile Telephone (NMT), Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA). In 1990, 1G was replaced by 2G which provided rich set of services such as high voice quality and global   mobility   based   on   the   digital   radio   signal technology.  Here also voice was considered to be the main traffic. 2G includes standards such as Global System For Mobile Communications (GSM), General Packet Radio System (GPRS). Both 1G and  2G are  based  on  circuit- switched technology for data communication at low speed.
2G was a huge success.
2G was followed by 2.5G which is an intermitent between 2G and 3G. It is based on both circuit switched and packet switched technologies providing high data rate with low power consumption. It uses the infrastructure of Global  System  for  Mobile  communications  (GSM)  and Code division multiple access (CDMA) to provide its services.
In the present generation, 2.5G is replaced by 3G which includes standards from 2.5G and also some other technologies such as Wi-MAX (Worldwide Interoperability for Microwave Access). It is totally based on the packet switching technology providing broad range of high quality services to the end user to meet the demand of high data rate  and  increasing  rate  of  network  users.  But  3G  was unable to repeat the success story of 2G as it provided only few new features over 2G.
Before 3G was deployed all over the world, the idea of technology beyond 3G started evolving. This idea was beyond the imagination of ordinary mobile user promising connect anytime, anyhow, anywhere. This ubiquitous network access will be achieved by seamlessly integrating the available and new networks using a core IP based network layer. This vision is called as the 4th generation of Communication (4G).
The   paper   introduces   the   idea   behind   4G providing a brief overview about its features, architecture and challenges faced in its implementation. Security being a primary concern in any implementation; it motivates the discussion about threat analysis model. Section 2 cites an example of how an ideal wireless communication network should provide service to the end user. Motivation behind 4G and  its  features  are  covered  in  Section  3.   Proposed  architecture for 4G and key technologies enabling 4G are discussed in Section 4 and 5 respectively. Section 6 covers the challenges in the migration to 4G while section 7 elucidates the threat analysis model which can be used as a base for the future research work in 4G security. Current developments and future work to be done in 4G are covered in Section 8.   Section 9 briefs up the conclusion of the paper and Section 10 enlist all the references of the research papers.
     

IF U NEED FULL PAPER SEND A REQUEST TO


CREANOVA [CREATIVE & INNOVATIVE ENGINEERS]

E-mail: creanovaengineerz@gmail.com


CONCLUSION

The advent of 4G is sure to revolutionize the field of telecommunication domain bringing the wireless experience to a  completely new level. It  would provide wealth of features and services making the world a smaller place to live. Thus, 4G seems to have the capability to realize the scenario discussed in Section 2. But 4G should also take lesson from the 3Gs failure to capture the imagination of the end-users. Technology should not be developed for technology’s sake rather it should target the end user. Thus, user-centric approach towards 4Gs development is the key to its success. Common consensus on the standards and the technologies for 4G needs to be reached to fasten 4G’s deployment which would be a gradual process. Lot of research work is required to investigate the open issues like design for SDR, QoS parameters   and   so   forth.   The   threat   analysis   model provided by ITU is very apt for the complete analysis and planning for security of 4G. It can be used as a reference framework for future research. But still comprehensive research work is required in the field of network security to tackle potential security threats because a ubiquitous secured heterogeneous network will appeal more to the today’s consumers.








Links

Comments

Featured Post 6

Sponsors

Text

A Bit About Me

My Photo
In this site we are introducing creating new products and updating the current status about the engineers. We are trying to make new universe…

Follow this Blog