SlideShare a Scribd company logo
GUIDED BY:
BY
J.SUDARSHANREDDY-117Y1A0425
A1 GLOBAL INSTITUTE OF ENGINEERING &TECHNOLOGY
MARKAPUR
K.CH.MALLAREDDY SIR
M.TECH,.
DEPARTMENT OF ELECTRONICS&COMMUNICATION ENGINEERING
CONTENTS:-
 PURPOSE
 THEME OF PROJECT
 BLOCK DIAGRAM
 ADVANTAGES
 APPLICATIONS
 CONCLUSION
 HARDWARE TOOLS
 SOFTWARE TOOLS
THEME OF PROJECT:-
 The aim of our project to reduce the amount
thefting & hacking through ATMs.
 Now a days there is no secure for money.
 Here already they have introduced ATM centers
for the protection purpose they are maximum
protect in a security way.
PURPOSE:-
 The purpose of this project is to send the
information of the mobile by using GSM
Technology.
 In this project we are including GSM technology
to pass the information for the secure purpose.
Micro
controller
PS
GSM
LCD
RFID
cards
BLOCK DIAGRAM:
HARDWARE COMPONENTS:-
 POWER SUPPLY
 GSM
 ARM-7
 RFID
 LCD
GSM
 cGlobal system monitoring for mobile communication
that is widely used in all part of the world.
 The gsm technology was first launched in 1991..


It operate at either 900mhz or
1800mhz frequency band
The gsm technology was first launched
in finland in 1991
LCD
ARM7
 The full form of ARM7 IS ADVANCED RISC MACHINE.
 For the ARM7 controller needs power supply is3.3v.
 It’s shape of quad.
 In this ARM7 has only two ports i.e. P0andP1.
SOFTWARE TOOLS
PROTEUS
 KEIL SOFTWARE
EMBEDDED C
APPLICATIONS
Our project is used at,
 ATM’s,
 Industries,
 Schools,
 Colleges,
 Offices,
 Personnel cabins etc.
ADVANTAGES:
 This project implementation is used for securing purpose to
amount.nothing but anti thefting.
 Protecting to our banking.
 saves money.
 Freedomful from our fear about security.
FEAUTURE SCOPES
 We’ll GPS technology is also use.
 With this GPS technology we are
knowing about theaf.By using digital
camera.
 And get detail about where he is
using to our smart card
ANY QUERIES
THANK YOU

More Related Content

What's hot

Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
Akshay Govekar
 
Digital signal processing
Digital signal processingDigital signal processing
Digital signal processing
Living Online
 
Smart Traffic Light Controller
Smart Traffic Light ControllerSmart Traffic Light Controller
Smart Traffic Light Controller
Himanshi_Sharma
 
Temperature Based Fan Controller
Temperature Based Fan Controller Temperature Based Fan Controller
Temperature Based Fan Controller
richa1910n
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
swarnapatil
 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
Melaku Bayih Demessie
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
Durairaja
 
Home Security System using Arduino & GSM
Home Security System using Arduino & GSM Home Security System using Arduino & GSM
Home Security System using Arduino & GSM
Aditya Nag
 
Mini Projects for Electronics and Communication Engineering.pdf
Mini Projects for Electronics and Communication Engineering.pdfMini Projects for Electronics and Communication Engineering.pdf
Mini Projects for Electronics and Communication Engineering.pdf
jagan477830
 
Communication Based Projects Ideas for Engineering Students
Communication Based Projects Ideas for Engineering StudentsCommunication Based Projects Ideas for Engineering Students
Communication Based Projects Ideas for Engineering Students
elprocus
 
Home automation using dtmf
Home automation using dtmfHome automation using dtmf
Home automation using dtmf
Pratik Gupta
 
automation of railway gate using verilog, Documentation
automation of railway gate using verilog, Documentation  automation of railway gate using verilog, Documentation
automation of railway gate using verilog, Documentation
chendrashekar pabbaraju
 
password based door locking system using 8051
password based door locking system using 8051password based door locking system using 8051
password based door locking system using 8051
Mangleshwar Prajapati
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
Suvendu Kumar Dash
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
rajkanakaraj007
 
Simple Railway gate automation
Simple Railway gate automationSimple Railway gate automation
Simple Railway gate automation
UJJWAL SHEKHAR
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
HEMANTA SAHU
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Project smart notice board ppt
Project smart notice board pptProject smart notice board ppt
Project smart notice board ppt
Rahul Shaw
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Dr. Sanjay M. Gulhane
 

What's hot (20)

Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Digital signal processing
Digital signal processingDigital signal processing
Digital signal processing
 
Smart Traffic Light Controller
Smart Traffic Light ControllerSmart Traffic Light Controller
Smart Traffic Light Controller
 
Temperature Based Fan Controller
Temperature Based Fan Controller Temperature Based Fan Controller
Temperature Based Fan Controller
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 
Home Security System using Arduino & GSM
Home Security System using Arduino & GSM Home Security System using Arduino & GSM
Home Security System using Arduino & GSM
 
Mini Projects for Electronics and Communication Engineering.pdf
Mini Projects for Electronics and Communication Engineering.pdfMini Projects for Electronics and Communication Engineering.pdf
Mini Projects for Electronics and Communication Engineering.pdf
 
Communication Based Projects Ideas for Engineering Students
Communication Based Projects Ideas for Engineering StudentsCommunication Based Projects Ideas for Engineering Students
Communication Based Projects Ideas for Engineering Students
 
Home automation using dtmf
Home automation using dtmfHome automation using dtmf
Home automation using dtmf
 
automation of railway gate using verilog, Documentation
automation of railway gate using verilog, Documentation  automation of railway gate using verilog, Documentation
automation of railway gate using verilog, Documentation
 
password based door locking system using 8051
password based door locking system using 8051password based door locking system using 8051
password based door locking system using 8051
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Simple Railway gate automation
Simple Railway gate automationSimple Railway gate automation
Simple Railway gate automation
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Project smart notice board ppt
Project smart notice board pptProject smart notice board ppt
Project smart notice board ppt
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 

Viewers also liked

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
balu008
 
Gsm Technology
Gsm Technology Gsm Technology
Gsm Technology
Shopnomoy Prantor
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
Paras Garg
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMS
Jithin Prasad
 
Atm security
Atm securityAtm security
Atm security
Likan Patra
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
mahesh_rman
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
George
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
International Journal of Engineering Inventions www.ijeijournal.com
 
Fin ring - A gesture controlled thumb ring
Fin ring - A gesture controlled thumb ringFin ring - A gesture controlled thumb ring
Fin ring - A gesture controlled thumb ring
Anand Tyagi
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
Md. Al-Amin Khandaker Nipu
 
Socket programing
Socket programingSocket programing
Socket programing
Pankil Agrawal
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
Omkar Salunke
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
Aboul Ella Hassanien
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
ggrajan46
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
Somanchi Aditya
 

Viewers also liked (20)

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Gsm Technology
Gsm Technology Gsm Technology
Gsm Technology
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMS
 
Atm security
Atm securityAtm security
Atm security
 
Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...Automatic vehicle accident detection and messaging system using gsm and gps m...
Automatic vehicle accident detection and messaging system using gsm and gps m...
 
Free Download Powerpoint Slides
Free Download Powerpoint SlidesFree Download Powerpoint Slides
Free Download Powerpoint Slides
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
Fin ring - A gesture controlled thumb ring
Fin ring - A gesture controlled thumb ringFin ring - A gesture controlled thumb ring
Fin ring - A gesture controlled thumb ring
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
 
Socket programing
Socket programingSocket programing
Socket programing
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
 

Similar to ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY

MOBILE MONITORNG SYSTEM FOR SMART HOMES
MOBILE  MONITORNG  SYSTEM FOR SMART HOMES MOBILE  MONITORNG  SYSTEM FOR SMART HOMES
MOBILE MONITORNG SYSTEM FOR SMART HOMES
JOLLUSUDARSHANREDDY
 
SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...
SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...
SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...
JOLLUSUDARSHANREDDY
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
Khadarbaba Shaik
 
Automated system for fault analysis in industries using
Automated system for fault analysis  in industries usingAutomated system for fault analysis  in industries using
Automated system for fault analysis in industries using
JOLLUSUDARSHANREDDY
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
bharath naidu
 
ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...
ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...
ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...
JOLLUSUDARSHANREDDY
 
multiple input control by sms using GSM technology
multiple input control by sms using GSM technologymultiple input control by sms using GSM technology
multiple input control by sms using GSM technology
Sachin Singh
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
Logitek Solutions
 
land rover robot control using GSM technology
land rover robot control using GSM technologyland rover robot control using GSM technology
land rover robot control using GSM technology
JOLLUSUDARSHANREDDY
 
accident detection tech seminar ppt.pptx
accident detection tech seminar ppt.pptxaccident detection tech seminar ppt.pptx
accident detection tech seminar ppt.pptx
RakeshRockey4
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
RakibulHassan77
 
Mini p gsm based display
Mini p gsm based displayMini p gsm based display
Mini p gsm based display
Ashu0711
 
Remote notice board implementation using gsm communication
Remote notice board implementation using gsm communicationRemote notice board implementation using gsm communication
Remote notice board implementation using gsm communication
Khadarbaba Shaik
 
gsm based security system
gsm based security systemgsm based security system
gsm based security system
nayandey
 
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGEELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
muhammed jassim k
 
Dgs datasheet nova-cell-tech-7-1
Dgs datasheet nova-cell-tech-7-1Dgs datasheet nova-cell-tech-7-1
Dgs datasheet nova-cell-tech-7-1
Mike Maziarka
 
pavanic12.pptx
pavanic12.pptxpavanic12.pptx
pavanic12.pptx
20269vinay
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of Things
IRJET Journal
 
Final ppt
Final pptFinal ppt
Final ppt
MUKUL BICHKAR
 
GSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEMGSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEM
FAIZAN SHAFI
 

Similar to ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY (20)

MOBILE MONITORNG SYSTEM FOR SMART HOMES
MOBILE  MONITORNG  SYSTEM FOR SMART HOMES MOBILE  MONITORNG  SYSTEM FOR SMART HOMES
MOBILE MONITORNG SYSTEM FOR SMART HOMES
 
SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...
SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...
SECURED WIRELESS COMMUNICATION FOR INDUSTRIAL AUTOMATION AND CONTROL BY USING...
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
 
Automated system for fault analysis in industries using
Automated system for fault analysis  in industries usingAutomated system for fault analysis  in industries using
Automated system for fault analysis in industries using
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...
ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...
ACCIDENTAL PROTECTION BY AUTOMATIC BREAKS AND RELEASE OF AIRBAG USING GPS,GSM...
 
multiple input control by sms using GSM technology
multiple input control by sms using GSM technologymultiple input control by sms using GSM technology
multiple input control by sms using GSM technology
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
land rover robot control using GSM technology
land rover robot control using GSM technologyland rover robot control using GSM technology
land rover robot control using GSM technology
 
accident detection tech seminar ppt.pptx
accident detection tech seminar ppt.pptxaccident detection tech seminar ppt.pptx
accident detection tech seminar ppt.pptx
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
 
Mini p gsm based display
Mini p gsm based displayMini p gsm based display
Mini p gsm based display
 
Remote notice board implementation using gsm communication
Remote notice board implementation using gsm communicationRemote notice board implementation using gsm communication
Remote notice board implementation using gsm communication
 
gsm based security system
gsm based security systemgsm based security system
gsm based security system
 
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGEELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
 
Dgs datasheet nova-cell-tech-7-1
Dgs datasheet nova-cell-tech-7-1Dgs datasheet nova-cell-tech-7-1
Dgs datasheet nova-cell-tech-7-1
 
pavanic12.pptx
pavanic12.pptxpavanic12.pptx
pavanic12.pptx
 
Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of Things
 
Final ppt
Final pptFinal ppt
Final ppt
 
GSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEMGSM BASED THEFT DETECTED ALERT SYSTEM
GSM BASED THEFT DETECTED ALERT SYSTEM
 

More from JOLLUSUDARSHANREDDY

RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
JOLLUSUDARSHANREDDY
 
MEMORY MANAGEMENT
MEMORY MANAGEMENTMEMORY MANAGEMENT
MEMORY MANAGEMENT
JOLLUSUDARSHANREDDY
 
Os security issues
Os security issuesOs security issues
Os security issues
JOLLUSUDARSHANREDDY
 
Basic functions & types of RTOS ES
Basic functions & types of  RTOS ESBasic functions & types of  RTOS ES
Basic functions & types of RTOS ES
JOLLUSUDARSHANREDDY
 
RTOS LINUX2.6.X & LINUX2.6.24
 RTOS    LINUX2.6.X & LINUX2.6.24 RTOS    LINUX2.6.X & LINUX2.6.24
RTOS LINUX2.6.X & LINUX2.6.24
JOLLUSUDARSHANREDDY
 
OSEK / VDX
OSEK / VDXOSEK / VDX
OSEK / VDX
JOLLUSUDARSHANREDDY
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
JOLLUSUDARSHANREDDY
 
INTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASKINTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASK
JOLLUSUDARSHANREDDY
 
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLSINTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
JOLLUSUDARSHANREDDY
 
Rt linux-lab1
Rt linux-lab1Rt linux-lab1
Rt linux-lab1
JOLLUSUDARSHANREDDY
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
JOLLUSUDARSHANREDDY
 
WINDOWS-CE
WINDOWS-CEWINDOWS-CE
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
JOLLUSUDARSHANREDDY
 
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
JOLLUSUDARSHANREDDY
 
Zigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDRZigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDR
JOLLUSUDARSHANREDDY
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
JOLLUSUDARSHANREDDY
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
JOLLUSUDARSHANREDDY
 
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFIDSTUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
JOLLUSUDARSHANREDDY
 
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREASSOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
JOLLUSUDARSHANREDDY
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
JOLLUSUDARSHANREDDY
 

More from JOLLUSUDARSHANREDDY (20)

RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
 
MEMORY MANAGEMENT
MEMORY MANAGEMENTMEMORY MANAGEMENT
MEMORY MANAGEMENT
 
Os security issues
Os security issuesOs security issues
Os security issues
 
Basic functions & types of RTOS ES
Basic functions & types of  RTOS ESBasic functions & types of  RTOS ES
Basic functions & types of RTOS ES
 
RTOS LINUX2.6.X & LINUX2.6.24
 RTOS    LINUX2.6.X & LINUX2.6.24 RTOS    LINUX2.6.X & LINUX2.6.24
RTOS LINUX2.6.X & LINUX2.6.24
 
OSEK / VDX
OSEK / VDXOSEK / VDX
OSEK / VDX
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
 
INTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASKINTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASK
 
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLSINTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
 
Rt linux-lab1
Rt linux-lab1Rt linux-lab1
Rt linux-lab1
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
 
WINDOWS-CE
WINDOWS-CEWINDOWS-CE
WINDOWS-CE
 
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
 
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 
Zigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDRZigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDR
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
 
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFIDSTUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
 
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREASSOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
 

Recently uploaded

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 

ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY