SlideShare a Scribd company logo
1 of 4
DIP1401 
HCL LEARNING LTD 
Automation based Projects 
APPLICATION OF ZIGBEE LOCATION TRACING 
MONITORING SYSTEM FOR ATM DEVICE THEFT 
USING 
EMBEDDED 
IEEE 2014 
ABSTRACT EMB1401 
More Info 
Call @ 
9382207007, 
9443558751. 
ABSTRACT 
As the society has been computerized and automated, the crime for 
the ATM device is increased due to the wide distribution of ATM device, 
even the banking is easy. The theft is shown over 90% the very high 
proportion among the financial accident crime. With the social situation, 
the study is going to suggest the method to react rapidly and minimize 
the loss of damage by realizing the real time location; we want to 
implement an accurate location tracking mechanism using Zigbee along 
with GPS as a rapid reaction to the theft for external ATM equipment. 
H C L C D C , N O : 5 2 , V E L A C H E R Y M A I N R O A D , V E L A C H E R Y , C H E N N A I - 4 2 .
HCL LEARNING LTD 
Automation based Projects 
Vision-based Multimodel Human-Computer 
Interaction using Hand and Head Gestures 
USING 
EMBEDDED 
IEEE 2014 
ABSTRACT EMB1402 
More Info 
Call @ 
9382207007, 
9443558751. 
Abstract: 
Human–computer interaction (HCI) involves the study, planning, and 
design of the interaction between people (users) and computers. In this 
project, a real-time Human-Computer Interaction based on the hand 
data glove for gesture recognition is proposed. One of the important 
parts of our body is our hand which is most frequently used for the 
interaction in Digital Environment and thus complexity and flexibility of 
motion of hands are the research topics. To recognize these hand 
gestures, more accurately and successfully, data glove is used. 
H C L C D C , N O : 5 2 , V E L A C H E R Y M A I N R O A D , V E L A C H E R Y , C H E N N A I - 4 2 .
HCL LEARNING LTD 
Automation based Projects 
Location-Aware and Safer Cards: Enhancing 
RFID Security and Privacy via Location 
USING 
EMBEDDED 
Sensing 
IEEE 2014 
ABSTRACT EMB1403 
More Info 
Call @ 
9382207007, 
9443558751. 
Abstract— 
In this paper, we report on a new approach for enhancing security and 
privacy in certain RFID applications whereby location or location-related 
information (such as speed) can serve as a legitimate access context. 
Examples of these applications include access cards, toll cards, credit 
cards, and other payment tokens. We show that location awareness can 
be used by both tags and back-end servers for defending against 
unauthorized reading and relay attacks on RFID systems. On the tag side, 
we design a location-aware selective unlocking mechanism using which 
tags can selectively respond to reader interrogations rather than doing 
so promiscuously. 
H C L C D C , N O : 5 2 , V E L A C H E R Y M A I N R O A D , V E L A C H E R Y , C H E N N A I - 4 2 .
We Hope that you are aware of the programs conducted by HCL. 
Programs highlights: 
In-Plant training (Which gives you an industrial exposure with latest technologies) 
Workshop (Hands on practical) 
Project Internship (Gives you a work experience with the industrial personalities) 
If you are interested means Send your details to 
embedded@hclvelachery.in 
Student Name : 
College Name : 
Department : 
Interested on IPT/Workshop/Project: 
Mobile Number: 
For further info & Registration contact the undersigned. 
With warm regards, 
Mr.Senthilvel- 9443558751, 9382207007.

More Related Content

Viewers also liked

137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsSomanchi Aditya
 
Atm frauds
Atm fraudsAtm frauds
Atm fraudsGPERI
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAHEMANTA SAHU
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 

Viewers also liked (11)

137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
 
Atm frauds
Atm fraudsAtm frauds
Atm frauds
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
 
Atm security
Atm securityAtm security
Atm security
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Atm System
Atm SystemAtm System
Atm System
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 

Similar to ECE Projects 2014

IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET Journal
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET Journal
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 
Hand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic MediapipeHand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic MediapipeIRJET Journal
 
Literature Review 3 (2).docx
Literature Review 3 (2).docxLiterature Review 3 (2).docx
Literature Review 3 (2).docxShouryajain13
 
NYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh SuttonNYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh SuttonMaryam Farooq
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification systemSameer Telikicherla
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Artificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxArtificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxSriLakshmi643165
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Hand Gesture Identification
Hand Gesture IdentificationHand Gesture Identification
Hand Gesture IdentificationIRJET Journal
 
CC report format..pdf
CC report format..pdfCC report format..pdf
CC report format..pdfwazidahsan1
 
IoT Smart keychain finder project
IoT Smart keychain finder project IoT Smart keychain finder project
IoT Smart keychain finder project RShkShrm
 
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...Publicis Sapient
 
Introduction to Metaverse (2).pptx
Introduction to Metaverse (2).pptxIntroduction to Metaverse (2).pptx
Introduction to Metaverse (2).pptxUTRao2
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 

Similar to ECE Projects 2014 (20)

IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
Hand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic MediapipeHand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic Mediapipe
 
Literature Review 3 (2).docx
Literature Review 3 (2).docxLiterature Review 3 (2).docx
Literature Review 3 (2).docx
 
NYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh SuttonNYAI #13: "AI and Business Transformation" - Josh Sutton
NYAI #13: "AI and Business Transformation" - Josh Sutton
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Artificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxArtificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptx
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Hand Gesture Identification
Hand Gesture IdentificationHand Gesture Identification
Hand Gesture Identification
 
CC report format..pdf
CC report format..pdfCC report format..pdf
CC report format..pdf
 
IoT Smart keychain finder project
IoT Smart keychain finder project IoT Smart keychain finder project
IoT Smart keychain finder project
 
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
Building a Cognitive Business – Josh Sutton, SapientRazorfish Data & Artifici...
 
Introduction to Metaverse (2).pptx
Introduction to Metaverse (2).pptxIntroduction to Metaverse (2).pptx
Introduction to Metaverse (2).pptx
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 

More from HCL CDC Velachery

More from HCL CDC Velachery (10)

embedded projects for ECE
embedded projects for ECEembedded projects for ECE
embedded projects for ECE
 
Emb
EmbEmb
Emb
 
embedded projects for ECE
embedded projects for ECE embedded projects for ECE
embedded projects for ECE
 
Embedded projects and VLSI projects
Embedded projects and VLSI projectsEmbedded projects and VLSI projects
Embedded projects and VLSI projects
 
IPT for Enginerring students
IPT for Enginerring studentsIPT for Enginerring students
IPT for Enginerring students
 
IPT 2014 at HCL velachery
IPT 2014 at HCL velacheryIPT 2014 at HCL velachery
IPT 2014 at HCL velachery
 
inplant training for B.E/B.Tech students
inplant training for B.E/B.Tech studentsinplant training for B.E/B.Tech students
inplant training for B.E/B.Tech students
 
inplant training details
inplant training detailsinplant training details
inplant training details
 
Workshop in hcl learning
Workshop in hcl learning Workshop in hcl learning
Workshop in hcl learning
 
Android based project titles
Android based project titlesAndroid based project titles
Android based project titles
 

ECE Projects 2014

  • 1. DIP1401 HCL LEARNING LTD Automation based Projects APPLICATION OF ZIGBEE LOCATION TRACING MONITORING SYSTEM FOR ATM DEVICE THEFT USING EMBEDDED IEEE 2014 ABSTRACT EMB1401 More Info Call @ 9382207007, 9443558751. ABSTRACT As the society has been computerized and automated, the crime for the ATM device is increased due to the wide distribution of ATM device, even the banking is easy. The theft is shown over 90% the very high proportion among the financial accident crime. With the social situation, the study is going to suggest the method to react rapidly and minimize the loss of damage by realizing the real time location; we want to implement an accurate location tracking mechanism using Zigbee along with GPS as a rapid reaction to the theft for external ATM equipment. H C L C D C , N O : 5 2 , V E L A C H E R Y M A I N R O A D , V E L A C H E R Y , C H E N N A I - 4 2 .
  • 2. HCL LEARNING LTD Automation based Projects Vision-based Multimodel Human-Computer Interaction using Hand and Head Gestures USING EMBEDDED IEEE 2014 ABSTRACT EMB1402 More Info Call @ 9382207007, 9443558751. Abstract: Human–computer interaction (HCI) involves the study, planning, and design of the interaction between people (users) and computers. In this project, a real-time Human-Computer Interaction based on the hand data glove for gesture recognition is proposed. One of the important parts of our body is our hand which is most frequently used for the interaction in Digital Environment and thus complexity and flexibility of motion of hands are the research topics. To recognize these hand gestures, more accurately and successfully, data glove is used. H C L C D C , N O : 5 2 , V E L A C H E R Y M A I N R O A D , V E L A C H E R Y , C H E N N A I - 4 2 .
  • 3. HCL LEARNING LTD Automation based Projects Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location USING EMBEDDED Sensing IEEE 2014 ABSTRACT EMB1403 More Info Call @ 9382207007, 9443558751. Abstract— In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location awareness can be used by both tags and back-end servers for defending against unauthorized reading and relay attacks on RFID systems. On the tag side, we design a location-aware selective unlocking mechanism using which tags can selectively respond to reader interrogations rather than doing so promiscuously. H C L C D C , N O : 5 2 , V E L A C H E R Y M A I N R O A D , V E L A C H E R Y , C H E N N A I - 4 2 .
  • 4. We Hope that you are aware of the programs conducted by HCL. Programs highlights: In-Plant training (Which gives you an industrial exposure with latest technologies) Workshop (Hands on practical) Project Internship (Gives you a work experience with the industrial personalities) If you are interested means Send your details to embedded@hclvelachery.in Student Name : College Name : Department : Interested on IPT/Workshop/Project: Mobile Number: For further info & Registration contact the undersigned. With warm regards, Mr.Senthilvel- 9443558751, 9382207007.