Thursday, October 4, 2007

SEMINAR ABSTRACT LIST 2

New topics will be updated shortly,
For more Topics go to these pages

  1. seminarabstracts
  2. seminarabstracts1
  3. seminarabstracts3
  4. Mechanical

For more details Contact Praveen...........Ph :- 9847882302(SMS ONLY)
Email : praveenv101@gmail.com
EACH REPORT COSTS Rs - 300 Only

The list of topics in this page are :-


51#IMAGE PROCESSING APPLICATION AVI MEDICAL IMAGE CONTROL

52#EVOLUTION OF EMBEDDED SYSTEMS


53#RTOS --- VxWorks


54#ULTRASONIC TRAPPING IN CAPILLARIES FOR TRACE-AMOUNT BIOMEDICAL
ANALALY


55#OPTICAL BURST SWITCHING


56#EMERGING TRENDS IN ROBOTICS


57#OPTICAL NETWORKING AND DENSE WAVELENGTH DIVISION Multiplexing


59#WISENET


60#AN EFFICIENT ALGORITHM FOR IRIS PATTERN RECOGNITION


61#SPIN VALVE TRANSISTOR


62#GSM SECURITY AND ENCRIPTION


68#TRANSIENT STABILITY ASSESSMENT USING NEURAL NETWORKS


72#NANOTECHNOLOGY - ASSEMBLER DESIGN & NANO COMMUNICATION


74#REAL TIME IMAGE PROCESSING APPLIED TO TRAFFIC QUEUE DETECTION
ALGORITHM


75#MIMO WIRELESS CHANNELS CAPACITY & PERFORMANCE PREDICTION

78#BLUETOOTH BASED SMART SENSOR NETWORKS


81#DESIGN OF 2D FILTERS USING A PARALLEL PROCESSOR ARCHITECT

82#ROBOTICS


83#MICROCONTROLLER BASED POWER THEFT IDENTIFICATION


84#MODERN IRRIGATION SYSTEMS TOWARDS FUZZY


85#INFORMATION SECURITY USING STEGANOGRAPHY


87#IMAGE PROCESSING & COMPRESSION TECHNIQUES

88# m -VOTING


91#FUZZY LOGIC


93#FUZZY BASED WASHING MACHINE


94#ARTIFICIAL INTELLIGENCE SUBSTATION CONTROLLER


96#FACILITY LAYOUT DESIGN USING GENITIC ALGORITHM

97#INDUSTRIAL APPLICATION USING NEURAL NETWORKS


98#WIRELESS COMMUNICATION WITH Wi-Fi


99#ACTIVE BLIND NOISE SUPPRESSION IN SOME SPEECH PROCESSING

100#FAST CONVERGENCE ALGORITHMS FOR ACTIVE NOISE CONTROL


100#FAST CONVERGENCE ALGORITHMS FOR ACTIVE NOISE CONTROL



ABSTRACT

When reference signal for the FxLMS algorithm is taken from an acoustic sensor convergence can be very slow due to great eigen value spread. Using a non acoustic sensor, Such as a tachometer, cancellation of narrow band noise in the sensed fundamental frequency and harmonically related ones can be achieved very fast, although other periodic noises and underline broad band noise will remain.

Backward prediction errors resulting at the various stages of an adaptive lattice predictor(ALP) represent a a time-domain orthogonalization of the input signal.An ALP structure, with the acoustic reference has input signal, before a FxLMS makes up the FxGAL algorithm. Due to the orthogonalization, FxGAL can be significantly faster compared to FxLMS with reference from a microphone. When compared to FxLMS with tachometer signal, it is not faster but it can cancel every periodic noise, independently of the harmonical relation between them, as well as the underlined broad band noise. Comparative results between FxLMS (with acoustic and nonacoustic reference) and FxGAL are presented.

99#ACTIVE BLIND NOISE SUPPRESSION IN SOME SPEECH PROCESSING



Abstract

In many applications of speech processing the noise reveals some specific features. Although the noise could be quite broadband, there are a limited number of dominant frequencies, which carry the most of its energy. This fact implies the usage of narrow-band notch filters that must be adaptive in order to track the changes in noise characteristics. In present contribution, a method and a system for noise suppression are developed. The method uses adaptive notch filters based on second-order Gray-Markel lattice structure. The main advantages of the proposed system are that it has very low computational complexity, is stable in the process of adaptation, and has a short time of adaptation. Under comparable SNR improvement, the proposed method adjusts only 3 coefficients against 250-450 for the conventional adaptive noise cancellation systems. A framework for a speech recognition system that uses the proposed method is suggested.

98#WIRELESS COMMUNICATION WITH Wi-Fi




Abstract




WiFiThink of it as an eighteen-wheeler screaming down the pike, carrying the future of computing with it. The driver is friendly. You can stick out your thumb and hitch a ride, or be left in the dust. WIFI, in the broadest sense is a term used for a specific protocol to network your computer to another computer or network.

It allows you to connect to the Internet from your couch at home, a bed in a hotel room or a conference room at work without wires with a speed several times faster than the fastest cable connection. We have attempted to review all the major aspects of wireless networking and the 802.11x protocol corresponding to Wi-Fi .The paper deals with the basic concepts of wireless networking and goes into the in-depth of 802.11x protocol which forms the backbone of the upcoming technology, Wi-Fi. Seamless networking is neither a compromise anymore nor a showpiece of high end business markets. The wave of the future is already sweeping through.

97#INDUSTRIAL APPLICATION USING NEURAL NETWORKS





ABSTRACT


This paper summarizes an industrial necessities and study of the application of neural networks in the area of process monitoring and control. Descriptions of the major activities undertaken in this programmed, which included the application of neural networks for fault detection in a nitrification process and the model based predictive control of a gasoline engine are provided.

The paper also describes some of the practical difficulties that were experienced while applying neural networks and lists the important lessons that were learned through the completion of this project. The main conclusion from the work was that neural networks are capable of improving industrial process monitoring and control systems. However the level of improvement must be analyzed on a problem specific basis and in many applications the use of neural networks is essential.

96#FACILITY LAYOUT DESIGN USING GENITIC ALGORITHM




Abstract

Any major industry’s success depends invariably on the location of its bases, production centers and warehouses. Thus locating the sites before establishing these units is done by facility location and planning unit of the industry. For greater profits the facilities should be located at an optimum distance from the market , raw material procurement sites utilities like water , sand etc. For these problems involving layout a number of algorithms are in use like ALDEP,CORELAP, CRAFT etc. But since the location of facilities have become very complex due to greater constraints these days a determined search of a good algorithm begins. This can be achieved by using GENETIC ALGORITHMS. This type of evolutionary algorithms have made the computational effort fast and accurate.

94#ARTIFICIAL INTELLIGENCE SUBSTATION CONTROLLER



ABSTRACT

Controlling a substation by a fuzzy controller speeds up response time diminishes up the possibility of risks normally related to human operations. The automation of electric substation is an area under constant development Our research has focused on, the Selection of the magnitude to be controlled, Definition and implementation of the soft techniques, Elaboration of a programming tool to execute the control operations. it is possible to control the desired status while supervising some important magnitudes as the voltage, power factor, and harmonic distortion, as well as the present status. The status of the circuit breakers can be control by using a knowledge base that relates some of the operation magnitudes, mixing status variables with time variables and fuzzy sets .The number of necessary magnitudes to a supervise and to control a substation can be very high in the present research work, many magnitudes were not included .To avoid the extensive number of required rules nevertheless , controlling a substation by a fuzzy controller has the advantage that it can speed up the response time and diminish the possibility of risks normally related to human operations.

93#FUZZY BASED WASHING MACHINE



ABSTRACT


Fuzzy Logic has played a pivotal part in this age of rapid technological development .In this paper we have elaborated on the automation process used in a washing machine. This paper has focused on the two subsystems of the washing machine namely the sensor mechanism and the controller unit. It also discuss on the use of singletons for fuzzy sets. This paper also highlights the use of a fuzzy controller to give the correct wash time. The use of fuzzy controller has the advantage of managing time, increasing equipment effiency and diagnosing malfunctions.

91#FUZZY LOGIC



ABSTRACT


Fuzzy logic is an outcome of merging the techniques of traditional rule based expert system, set theory and control theory, which is essentially based on mathematical models of the controlled process.

The concept of this paper is to control the illumination of a light source by using the fuzzy logic.

Here the error and error rate are input parameters and the voltage is the output. Theses are all normalized in the form of intersecting triangular membership functions with seven linguals each. The rules are formed by the knowledge.

At a time four rules are fired, and the maximum of their output is taken. The value is defuzzified by the method named center of the area or center of gravity.

The defuzzified voltage is denormalised and made as a pulse to be given to a power control circuit using phase control method.

The pulse produced proportionally to give the power to the circuit, the illumination is again sensed and given to the controlling unit

88# m-VOTING



Abstract

My voting goes mobile ….

Newton did see an apple falling down.. Of what?? For what?? Why??

It is falling…

We do visualize the drop of success in the Election System of India…

Of what?? For what?? Why?? It is so …

Yes it is the patriotistic, socialistic, humanistic, economistic, thinking of us that lead to visualize & analyze the election system (voting process) and project a viable solution of voting through (Mobile) CELLULAR PHONES guarded by Finger print sensors by the new mobile language of SMS. YAHOOO! Crazy … might be … but it isn’t.

Motion is the basic physical property of anything in this hi-tech info era. Time is a precious thing and correct information is the most precious thing. Merging all these together we look in for easier, cost effective, time managing way of casting my vote thro’ my Cell Phone with a finger print sensor.

Why looking in for a finger print sensor in a Mobile phone?? Of course it is the security that we add to all the confidential communications which goes natural and highly secured. A finger print guarded cell phone can afford a lot in the forthcoming technocrats like M-commerce, M-governance, M-voting, and M-security.

Thus, by our concept of Finger print guarded cell phones can serve better in all corners of communication especially for voting process.

87#IMAGE PROCESSING & COMPRESSION TECHNIQUES



ABSTRACT


An image defined in the "real world" is considered to be a function of two real variables say x,y.

Before going to processing an image, it is converted into a digital form. Digitization includes sampling of image and quantization of sampled values.

After converting the image into bit information, processing is performed.

This processing technique may be,

* Image enhancement

* Image reconstruction

* Image compression

Image enhancement refers to accentuation, or sharpening, of image features such as boundaries.

Image restoration is concerned with filtering the observed image to minimize the effect of degradations.

Image compression is concerned with minimizing the no of bits required to represent an image.

Text compression – CCITT GROUP3 & GROUP4

Still image compression – JPEG

Video image compression -MPEG

85#INFORMATION SECURITY USING STEGANOGRAPHY



ABSTRACT

We propose a new method for strengthening the security of information through a combination of signal processing, cryptography and steganography. Cryptography provides the security by concealing the contents and steganography provides security by concealing existence of information being communicated. Signal processing adds additional security by compressing and transforming the information. The proposed method, viz. Steganography Based Information Protection Method (SBIPM), consists of scanning, coding, encryption, reshaping, cover processing and embedding steps.

Scanning, coding, encryption steps make the information unintelligible sothat one cannot extract plain message. Embedding make the message invisible so that one cannot detect it. Reshaping spreads the message so that embedded message can be detected from distorted steganos by authorized receivers. Cover processing makes detection of embedded message more difficult since the distortion is either due to noise addition or due to message embedding. Simulation and steganlysis results show the method provides high security and the information is safe from various attacks.

84#MODERN IRRIGATION SYSTEMS TOWARDS FUZZY




ABSTRACT

This paper proposes a new irrigation system using fuzzy logic technique by mapping the knowledge and experience of a traditional farmer. Fuzzy logic control, which is similar to the human way of thinking, has emerged as the most active tool in automatic control. The purpose of fuzzy logic controller is to automatically achieve and maintain some desired state of a system and process by monitoring system variables as well as taking appropriate control action.

The aim of this work is to develop an intelligent control using fuzzy logic approach for irrigation of agricultural field, which simulates or emulates the human being’s intelligence. The status of any agricultural field, in terms of evapotranspiration and error may be assumed as input parameters and the decision is made to determine the amount of water required for the area to be irrigated, well in advance. This leads to use effective utilization of various resources like water and electricity and hence becomes a cost effective system for the expected yield.

83#MICROCONTROLLER BASED POWER THEFT IDENTIFICATION




ABSTRACT


Science and technology with all its miraculous advancements has fascinated human life to a great extent that imagining a world without these innovations is hardly possible. While technology is on the raising slope, we should also note the increasing immoral activities. With a technical view, “Power Theft” is a non-ignorable crime that is highly prevalent, and at the same time it directly affects the economy of a nation. Data collected over Tirunelveli District, Bhel Trichy proves the necessity of this project.

Detecting and eradicating such crimes with the assistance of the developing scientific field is the “Need of the Hour”. With these views was this paper conceived and designed. Our paper provides a complete and comprehensive tool to prevent power theft which is very simple to understand and easy to implement(Accepted by T.N.E.B officials). It includes four sections – transmitting, receiving, counter display and processing sections.

DESCRIPTION OF OUR IMPLEMENTATION IDEAS:

The disc revolutions are sensed into pulses by optical slot sensor. These pulses are shaped and given as control signal to the CMOS switch which bypasses carrier wave generated by PLL provides as input to receiving section where transmitted signal is selected by the Intermediate frequency transformer. For each lock a pulse is sent out. The counter section is designed to send out pulse for every six input pulse from the receiver section. This count is parallely distributed in a 7-segmentdisplay and then to µc for further processing. µc performs the function of indication and identification. Pindetails, features, connections and software employed for µc89c51 are described in detail.

We believe our implementation ideas is a boon to the electricity board offering them a chance to detect accurately the location and amount of power theft.

82#ROBOTICS



Abstract


ROBOT---Mechatronic device consists of Brain (computer) and sensors

and mechanical parts. There are four laws to be followed for Robo implimentation

Robots predict like Human by applying ARRTIFICIAL INTELLIGENCE concept to them.

Then they can think like Humans that is they acquire SIXTH SENSE.

RISE OF MACHINES that is ROBOT has undergone four types of step by step Generation.

Robot is a combination of many systems such as Controller, Mobility, Sensor etc…

The robot Hands are moved using the MATRIX Transformation techniques.

Robots have advantage over many fields such as medical, space, agriculture etc…

There are some dangerous things may happen by robots when they do dangerous jobs.

Robot –The TERMINATOR which can terminate the given job without failure.

81#DESIGN OF 2D FILTERS USING A PARALLEL PROCESSOR ARCHITECT



ABSTRACT:

Two-dimensional filters are usually part of the implementation of digital image processing applications. These filters process recursive sets of instructions and require high computational speed. Optimized implementations of these filters depend on the use of Application Specific Integrated Circuits (ASICs). A system with multiple parallel processing units is a feasible design option able to achieve the required computational performance. In this paper, a loop transformation algorithm, which allows the efficient utilization of a parallel multiprocessor system, is presented. Uniform nested loops representing the image filters and the available processors are modeled as multi-dimensional data flow graphs. A new loop structure is generated so that an arbitrary number of processors available in the system can run in parallel. An example and a description of the algorithm are presented in the paper.

78#BLUETOOTH BASED SMART SENSOR NETWORKS



ABSTRACT

“Dragging the world towards wireless galaxy”

Various sensors are already in a broad use today as part of different devices or as standalone devices connected to a network usually to monitor industrial processes, equipments or installations.

The advancements in technology, wireless communications have enhanced development of small, low power and low cost devices. Such devices when organized into a network, present a powerful platform that can be used in many interesting applications.

Bluetooth is a low cost, short-range, wireless technology with small footprint, low power consumption and reasonable throughput.

Bluetooth wireless technology has become global technology specification for “always on” wireless communication not just as a point-to-point but was a network technology as well.

The kernel of this paper, deals about an implementation of

bluetooth based sensor networks.

75#MIMO WIRELESS CHANNELS CAPACITY & PERFORMANCE PREDICTION



Abstract

We present a new model for multiple input multiple-output (MIMO) out door wireless fading channels which is more general and realistic than the usual i.i.d. model. We investigate the channel capacity as a function of parameters such as the local scattering radius at the transmitter and the receiver, the distance between the transmit (TX) and receive (RX) arrays, and the antenna beamwidth sand spacing. We point out the existence of “pinhole" channels which exhibit low fading correlation between antennas but still have poor rank properties and hence low capacity. Finally we show that even at long ranges high channel rank can easily be obtained under mild scattering conditions.

74#REAL TIME IMAGE PROCESSING APPLIED TO TRAFFIC QUEUE DETECTION ALGORITHM



ABSTRACT

This paper primarily aims at the new technique of video image processing used to solve problems associated with the real-time road traffic control systems. There is a growing demand for road traffic data of all kinds. Increasing congestion problems and problems associated with existing detectors spawned an interest in such new vehicle detection technologies. But the systems have difficulties with congestion, shadows and lighting transitions.

Problem concerning any practical image processing application to road traffic is the fact that real world images are to be processed in real time. Various algorithms, mainly based on back ground techniques, have been developed for this purposes since back ground based algorithms are very sensitive to ambient lighting conditions, they have not yielded the expected results. So a real-time image tracking approach using edged detection techniques was developed for detecting vehicles under these trouble-posing conditions.

This paper will give a general overview of the image processing technique used in analysis of video images, problems associated with it, methods of vehicle detection and tracking, pre-processing techniques and the paper also presents the real-time image processing technique used to measure traffic queue parameters.

Finally, general comments will be made regarding the extensibility of the method and the scope of the new queue detection algorithm will be discussed.

68#TRANSIENT STABILITY ASSESSMENT USING NEURAL NETWORKS



ABSTRACT

This paper deals with the application of artificial neural network to the transient stability assessment of a power system. The backpropagation technique is used to train the neural networks. The use of artificial neural network for computing critical clearing time and transient energy margin for a machine infinite bus system has been illustrated. In our enthusiastic investigations we found the ideas here proposed for a single machine will be the pioneer for extension of the same to the assessment of multi machine stability.

62#GSM SECURITY AND ENCRIPTION



ABSTRACT


The motivations for security in cellular telecommunications systems are to secure conversations and signaling data from interception as well as to prevent cellular telephone fraud. With the older analog-based cellular telephone systems such as the Advanced Mobile Phone System (AMPS) and the Total Access Communication System (TACS), it is a relatively simple matter for the radio hobbyist to intercept cellular telephone conversations with a police scanner. A well-publicized case involved a potentially embarrassing cellular telephone conversation with a member of the British royal family being recorded and released to the media. Another security consideration with cellular telecommunications systems involves identification credentials such as the Electronic Serial Number (ESN), which are transmitted "in the clear" in analog systems. With more complicated equipment, it is possible to receive the ESN and use it to commit cellular telephone fraud by "cloning" another cellular phone and placing calls with it. Estimates for cellular fraud in the U.S. in 1993 are as high as $500 million. The procedure wherein the Mobile Station (MS) registers its location with the system is also vulnerable to interception and permits the subscriber’s location to be monitored even when a call is not in progress, as evidenced by the recent highly-publicized police pursuit of a famous U.S. athlete.

The security and authentication mechanisms incorporated in GSM make it the most secure mobile communication standard currently available, particularly in comparison to the analog systems described above. Part of the enhanced security of GSM is due to the fact that it is a digital system utilizing a speech coding algorithm, Gaussian Minimum Shift Keying (GMSK) digital modulation, slow frequency hopping, and Time Division Multiple Access (TDMA) time slot architecture. To intercept and reconstruct this signal would require more highly specialized and expensive equipment than a police scanner to perform the reception, synchronization, and decoding of the signal. In addition, the authentication and encryption capabilities discussed in this paper ensure the security of GSM cellular telephone conversations and subscriber identification credentials against even the determined eavesdropper.

61#SPIN VALVE TRANSISTOR



ABSTRACT

In a world of ubiquitous presence of electrons can you imagine any other field displacing it? It may seem peculiar, even absurd, but with the advent of spintronics it is turning into reality.

In our conventional electronic devices we use semi conducting materials for logical operation and magnetic materials for storage, but spintronics uses magnetic materials for both purposes. These spintronic devices are more versatile and faster than the present one. One such device is spin valve transistor.

Spin valve transistor is different from conventional transistor. In this for conduction we use spin polarization of electrons. Only electrons with correct spin polarization can travel successfully through the device. These transistors are used in data storage, signal processing, automation and robotics with less power consumption and results in less heat. This also finds its application in Quantum computing, in which we use Qubits instead of bits.

60#AN EFFICIENT ALGORITHM FOR IRIS PATTERN RECOGNITION



ABSTRACT:

Wavelet analysis have received significant attention because their multi-resolution decomposition allows efficient image analysis. It is widely used for varied applications such as noise reduction, and data compression, etc. In this paper we have introduced and applied the concept of 2 dimensional Gabor wavelet transform to Biometric Iris recognition system. The application of this transform in encoding the iris image for pattern recognition proves to achieve increased accuracy and processing speed compared to other methods. With a strong scientific approach and mathematical background we have developed an algorithm to facilitate the implementation of this method under the platforms of MATLAB.

59#WISENET


ABSTRACT

WISENET is a wireless sensor network that monitors the

environmental conditions such as light, temperature, and humidity. This network is comprised of nodes called “motes” that form an ad-hoc network to transmit this data to a computer that function as a server. The server stores the data in a database where it can later be retrieved and analyzed via a web-based interface. The network works successfully with an implementation of one sensor mote.

57#OPTICAL NETWORKING AND DENSE WAVELENGTH DIVISION Multiplexing



Abstract

This paper deals with the twin concepts of optical networking and dense wavelength division multiplexing. The paper talks about the various optical network architectures and the various components of an all-optical network like Optical Amplifiers, Optical Add/Drop Multiplexers, Optical Splitters etc. Important optical networking concepts like wavelength routing and wavelength conversion are explained in detail. Finally this paper deals with industry related issues like the gap between research and the industry, current and projected market for optical networking & DWDM equipment and future direction of research in this field.

56#EMERGING TRENDS IN ROBOTICS



ABSTRACT



One of the main goals of the study of robotics today is to understand not only the control systems used to stabilize the position, motion, and other forces of the robot, but also to allow robots to effectively work via sensors and actuators in dynamic environments.

The field of robotics has its origin in science fiction, the term ROBOT was derived from the English translation of a fantasy play written in Czecholosolvakia around 1920. It took another 40 years before the modern technology of industrial ROBOTS began. Today robots are highly automated mechanical manipulators controlled by computers.

First, let's decide what a 'robot' is. To be a robot, it should have the ability to think - make decisions. This may sound hard

IF FRONT LEFT WHISKER SENSOR IS ON THEN

STOP, GO BACKWARDS 2 FEET, TURN RIGHT, CONTINUE.

This is a very common 'IF-THEN' statement.

A machine that can perform this instruction is truly a robot. So, the conclusion is that to be called a robot; you really need an on-board brain and a way to program it.

55#OPTICAL BURST SWITCHING



ABSTRACT:

Optical burst switching is a promising solution for all optical WDM networks It combines the benefits of optical packet switching and wavelength routing while taking into account the limitations of current all optical technology In OBS the user data is collected at the edge of the network, sorted based on destination address,and grouped into variable sized bursts Prior to transmitting a burst, a control packet is created and immediately send toward the destination in order to setup a buffer less optical path for its corresponding burst After an offset delay time, the data burst itself is transmitted without waiting for positive acknowledgement from the destination node the OBS framework has been widely studied in the past few years because it achieves high traffic throughput and high resource utilization .In this paper we present in a systematic way the main objectives of OBS design parameters and the solutions that have been proposed

54#ULTRASONIC TRAPPING IN CAPILLARIES FOR TRACE-AMOUNT BIOMEDICAL ANALALY



INTRODUCTION


Nonintrusive manipulation by standing-wave acoustics

has been widely used for levitation and trapping of macroscopic

objects.1 The standing-wave field creates an acoustic

radiation force on the object that depends on its size and

acoustic parameters.2 In the present article we demonstrate

size-selective separation and retention of latex spheres inside

a small-diameter flow-through capillary by use of an ultrasonic

radiation trap. The work aims at rapid in-flow detection

and separation of specific molecules via antibody-coated latex

spheres.

Acoustic radiation forces have been used for nonintrusive

manipulation of macroscopic as well as microscopic objects.

Basically, objects with higher acoustic impedance than

the surrounding medium are trapped in the velocity antinodes

of the standing-wave acoustic field. The theory of

acoustic levitation and trapping is well understood.2,3 In

aqueous solutions the method has been applied for studies of

mechanical properties of mm- to mm-sized liquid droplets

and biological cells.4,5 These experiments typically operate at

low frequencies ~kHz up to a few 100 kHz! using a closed

cylinder levitation vial. Similar systems have been used for

cell concentration,6 cell filtering,7 and for enhanced rate and

sensitivity of latex agglutination tests by increasing particle

collision rates.8 Here few-mm-diam tubes or chambers are

combined with a transverse acoustic field ~propagation perpendicular

to the length of the tube!, resulting in a higher cell

concentration in several velocity antinodes parallel with the

tube. In-flow separation and fractionation of suspended particles

are performed on the basis of size and/or acoustic properties

with a liquid flow in combination with flow

splitters.9,10 Electric fields have been employed in a similar

arrangement to transversely separate charged particles by exploiting

the competition between acoustic radiation forces

and electrostatic forces.11 At higher ultrasonic frequencies

~.10 MHz! acoustic traps based on a standing-wave confocal

ultrasonic cavity have demonstrated that longitudinal

forces of similar magnitude or higher than those of optical

traps can be achieved.12 Finally, it should be noted that lowfrequency

airborne acoustic traps have been used for improved

biomedical analysis.13

In biomedical analysis, great effort is made to develop

detection techniques of trace amounts of specific proteins

and other biomolecules. Very small sample volumes (pl-nl)

may be analyzed with narrow-bore sub-100 mm capillaries in

combination with electrophoresis, capillary electrophoresis

~CE!, or capillary electrochromatography ~CEC!.14 CE/CEC

separates analytes according to charge, size, and chemical

characteristic with high selectivity and high throughput.

Typically, the limit of detection using fluorescent analytes is

femtomols, which may be improved by several orders of

magnitude in special cases.15,16 The use of antibody-coated

microspheres in CE/CEC may improve the selectivity and

the detection limit of specific macromolecules.17

In the present article we introduce the combination of

flow-through small-diameter capillaries and a high-frequency

longitudinal ultrasonic trap, which allows microspheres to be

separated according to size with high selectivity inside the

capillary. This capillary ultrasonic trap utilizes the competition

between acoustic radiation forces and viscous drag

forces. Inside the capillary, these forces act in opposite directions

on the spheres, resulting in size-selective trapping

and in-flow separation. In the present article the separation

efficiency of the system is theoretically analyzed. Furthermore,

in a first proof-of-principle experiment the capillary

ultrasonic trap is applied on differently sized fluorescent la-

a!Electronic

mail: Martin.Wiklund@biox.kth.se

tex spheres suspended in water inside 20–75 mm quartz capillaries.

The experiment demonstrates the size-selective trapping

and verifies the applicability of the theory inside the

capillary.

Longitudinal acoustic trapping has previously been combined

with liquid flow in large-diameter tubes for fluid–

particle separation and selection in, e.g., slurries.18 The use

of small-diameter capillaries allows smaller sample volumes

and higher sensitivity, which is of importance for biomedical

applications. The long-term goal of the present article is to

improve the limit of detection of specific proteins or other

sample molecules compared to current CE/CEC technology.

Here two different monoclonal antibodies against two different

antigenic sites on the analyte molecule will be covalently

bound to different latex spheres. When the sample molecules

are mixed with the two different latex spheres, a sandwich

assay ~latex-sample-latex complex! is formed with high

specificity.19 The size difference between the sandwich assay

and single latex spheres may then be employed for separation

and enrichment with the capillary longitudinal

ultrasonic-trap system, allowing detection of minute concentrations

of the target molecule. Compared to laser-optical

trapping for similar purposes,20 a longitudinal ultrasonic trap

has the potential to provide a much more compact arrangement,

and to produce a more uniform trapping field in

smaller-diameter capillaries, which is important for high selectivity

and sensitivity.

53#RTOS --- VxWorks



Abstract


The VxWorks is the high performance real time operating system. Most widely used RTOS is the VxWorks. The operating system, which performs the proceeding in the real time instead of latter time with storing it in some memory. Development environment for this OS is Tornado, Wind River Systems Inc, US. This is scalable Operating system in which kernel, I/O system, network layer and all are in component nature and which are being used whenever required to add to Kernel. Modularity of this feature is one of the main advantage in development of real time applications.

52#EVOLUTION OF EMBEDDED SYSTEMS



Abstract

If the accuracy of the work done by any gadget is precision, then the cost of manufacturing the gadget becomes directly proportional to it. This in turn decreases the end users affordability or adoptability to it.

In the coming decades, the quality of work will play the role in all the fields. Too considering the Medical field, the accuracy, time, precision, adoptability, user-friendly are all to be considered.

This parameters plays the most important to develop a gadget in Medical field. So these parameters measure the cost of the gadget developed. This directly increases the cost of usage to the end user.

As far as the embedded is in action, all the above noted parameters are brought into a single chip, too a tiny gadget which reduces the cost of manufacture, user friendly, adoptability, precision etc.

As the gadget is reduced in its size but maintaining the end result with most advantages then a machine, it makes the end users to use them at cheaper costs.

51#IMAGE PROCESSING APPLICATION AVI MEDICAL IMAGE CONTROL




ABSTRACT


The various Medical images acquired directly from various instruments are in the AVI format, which reduces the easy control of image display without conversion to medical image standard, that is the DICOM format. The purpose of this project is to develop software to handle online data acquisition from medical equipments like Ultra Sound machine, control the display rate, convert the AVI image acquired from the Medical equipment directly to DICOM image with patient’s detail’s got from the user, freeze the AVI image frame of interest, convert the freezed AVI frame to Bitmap image, convert this Bitmap image to DICOM image with patient’s details. This software is highly reliable, efficiently handles memory and very user friendly.

Medical equipments like Ultra Sound, CT etc… have images at their output in the AVI file format, which are acquired with the respective probes. These AVI images acquired are stored. The software captures this AVI image, displays them frame-by-frame in succession and converts them to DICOM image with required patient’s details obtained from the Specialist during conversion. The frame of interest can be freezed and converted to Bitmap image, which can also be viewed on a separate window with options to brighten, darken, change the color combination, invert the image and restore the image. The converted DICOM image can be viewed on any Standard DICOM viewer. Mostly all the DICOM viewer will have provision to view the patient’s details entered during conversion.