Get Latest Final Year Computer Projects in your Email

Your Email ID:
FYP.in Subs

Stairs and Doors Recognition as Natural Landmarks based on Clouds of 3D Edge-Points from RGB-D Sensors for Mobile Robot Localization

ABSTRACT

Natural landmarks are the main features in the next step of the research in localization of mobile robot platforms. The identification and recognition of these landmarks are crucial to better localize a robot. To help solving this problem, this work proposes an approach Continue reading

A Spaceborne Synthetic Aperture Radar Partial Fixed-Point Imaging System Using a Field-Programmable Gate Array—Application-Specific Integrated Circuit Hybrid Heterogeneous Parallel Acceleration Technique

ABSTRACT

With the development of satellite load technology and very large scale integrated (VLSI) circuit technology, onboard real-time synthetic aperture radar (SAR) imaging systems have become a solution for allowing rapid response to disasters. A key goal Continue reading

Robust Design of Docking Hoop for Recovery of Autonomous Underwater Vehicle with Experimental Results

ABSTRACT

Control systems prototyping is usually constrained by model complexity, embedded system configurations, and interface testing. The proposed control system prototyping of a remotely-operated vehicle (ROV) with a docking hoop (DH) to recover an Continue reading

Dependence-based Source Level Tracing and Replay for Net worked Embedded Systems

ABSTRACT

Error detection and diagnosis for networked embedded systems remain challenging and tedious due to issues such as a large number of computing entities, hardware resource constraints, and non-deterministic behaviors. The run-time checking is often Continue reading

A Probabilistic Approach to RFID-based Localization for Human-Robot Interaction in Social Robotics

ABSTRACT

This paper describes a novel strategy to Radio-Frequency Identification (RFID) tag detection for human–robot interaction (HRI) purposes. The anisotropic detection pattern of the RFID reader antenna is combined with a probabilistic algorithm to obtain Continue reading

Numerical Study of Photoacoustic Pressure for Cancer Therapy

ABSTRACT

A commonly used therapy for cancer is based on the necrosis of cells induced by heating through the illumination of nanoparticles embedded in cells. Recently, the photoacoustic pressure shock induced by the illumination pulse was proved and this points Continue reading

Design and Implementation of an IoT Access Point for Smart Home

ABSTRACT

Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart Continue reading

Estimating the Lifetime of Wireless Sensor Network Nodes through the Use of Embedded Analytical Battery Models

ABSTRACT

The operation of Wireless Sensor Networks ( WSN s) is subject to multiple constraints, among which one of the most critical is available energy. Sensor nodes are typically powered by electrochemical batteries. The stored energy in battery devices Continue reading

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks

ABSTRACT

Multi-hop wireless networks rely on node cooperation to provide unicast and multicast services. The multi-hop communication offers increased coverage for such services, but also makes them more vulnerable to insider (or Byzantine) attacks coming Continue reading

A Network-Aware Distributed Membership Protocol for Collaborative Defense

ABSTRACT

To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly increase the ability to defend against attack, this comes at the cost Continue reading

Bluetooth-base Worm Modeling And Simulation

ABSTRACT

Bluetooth is one of the most popular technologies in the world in the new century. Meanwhile it attracts attackers to develop new worm and malicious code attacking Bluetooth wireless network. So far the growth of mobile malicious code is very fast Continue reading