Video over Variable Bandwidth Links

Video over Variable Bandwidth Links

Presently most of people are using internet all over the world. It is a better network with time-varying bandwidth characteristics. A system which multicast the video through Internet must fulfill the various requirements and capabilities of the receiver. For this we need to use adaptive mechanisms. A mechanism which places a number of constraints on the network is called Real-time multimedia traffic. The problem of varying bandwidth in multimedia multicast application can be solved by using conventionally multi-layered transmission of data. Now, most of data flows are burst in nature and consumes more bandwidth.

Read more about Video over Variable Bandwidth Links

Energy Management with Zigbee

Energy Management with Zigbee

To decrease the global warming process we need to aim at reducing the emission of CO2. The CO2 emission can be reduced efficiently by decreasing the energy consumption.

PURPOSE:

The main aim of this Energy Management project is to control the energy consumption by using Zigbee router module.  The proposed system is based on wireless sensor network technology, it should be developed in very less cost and work efficiently.

Read more about Energy Management with Zigbee

Train Scheduling and Simulation

The aspects of the Train Scheduling and Simulation are discussed in this project. In the existing system, we can schedule the trains only on sections which are having two lines. In this project, we will discuss about the algorithm which is used to schedule the trains on sections in two-lines. To simulate the train scheduling on three-line section which changes we need to make in the algorithm are discussed in this project. It also describes the advantage of third line in scheduling of the trains. The handling of test cases in train scheduling are also discussed in this report. The changes in the algorithm plays an important role in extending the sections having any number of lines.

Read more about Train Scheduling and Simulation

Hiding Of Host Image Using Cover Image

Hiding Of Host Image Using Cover Image

Now digital Medias are becoming very popular among peoples all over the world through World Wide Web sites. The intellectual property of data needs prevention of non-legal copy by unauthorized persons, verification of content integrity and protection of owner’s copyright. The requirements of robustness, security of the hidden data, imperceptibility, data hiding rate, capacity should be satisfied by the newly proposed Data hiding technique. The best and secured way to send and share the host image in a confidential manner is to hiding a host image in a cover image. By this technique we can send important host image efficiently and prevent its unauthorized access by the hackers.


For sending or sharing the image over WWW or via any secured communication over the electronic media the proposed technique i.e. hiding host image using cover image is very efficient and useful technique because we can share host image easily without bothering about loss or gained access by unauthorized users. The authorized user can decode host image only by using designed decoder, so host image is much secured. The host image can be embedded with cover image by using this technique.

Read more about Hiding Of Host Image Using Cover Image