Disaster Management Network by TCOE-IITM-JICA

View Online

OPTIMUM POWER SOLUTION FOR BASE STATIONS

View Online

Voice Activated Door Lock (VADOL)

p1With recent advancement in Electronics, automatic door locks with security using different technologies are successfully deployed and being in use world-wide.Swipe cards systems, finger-print systems are prominent amongst others.The biometric authentication technology has matured to level of applying it to applications requiring high security. This has opened channels for evolving voice authentication based systems. The proposed project “Door lock using voice authentication” will be a forerunner of its kind. Voice authenticated door lock are more secure than their earlier counter parts. A lowcost embedded control at the door is to be designed and fabricated. This control shall interface to the biometric system via standard telephone cable. User shall be provided with speaker and mike interface for exchange of voice with the biometric server.

Call to a biometric system is established on trigger of a button by the user. This call invokes the biometric authentication application that prompts the user to authenticate his voice. User shall be able gain access to this door only upon successful authentication of his voice. The door control de-activates the door lock on successful authentication of the user, allowing him momentary access of the door.

Download Pdf

Voice Based Mobile Banking (VOBANK)

p1

Banking is amongst other many activities that we carry out frequently if not day-in and out. It takes out significant time from our busy working hours for reaching to a near by branch and waiting with a token to get our turn for servicing our banking request by a banker. Internet banking created a break through in this tradition and has enabled registered customers to perform a wide range of bank transactions with access to the Internet.

GPRS connectivity for mobiles has promoted the Internet Banking to be extended to mobile platform. And today mobile banking is getting widespread acceptance.

In this project we propose a natural language voice interface to perform banking services from a mobile. Advances in TTS, voice recognition and biometric systems have paved way for a new generation of applications that will elevate our free life style to a new dimension. One such potential application is providing a natural language voice interface to mobile banking.

This product will make banking more natural to the well informed class in mass. It shall create even bigger impact on the rural class, where their mother tongue may be their only medium for communication and generally banks are spread out sparsely in these regions.English version of voice mobile banking prototype is planned for the first phase of the work as proof of concept. In the second phase regional language versions , specifically supporting Hindi and Tamil are planned.

Download Pdf

Mobile Interface to Enterprise Database (MINED)

p1

This application is an ideal solution for multimedia information aggregation using the mobile phone Easily configurable web interface for form creation and creating the server side scripts and database schemas. The application supports data types like form fields , Image captured by the phone camera and Voice sample recorded live by the phone itself .The data is sent by client application running on the mobile using the GPRS as the communication medium to a remote enterprise database server.

The uploaded data could be accessed from any part of the web by logging on to the administration section. Application supports multiple client logins and assignment to different forms . The searching and sorting of uploaded data is made simple by using a html custom interface. The data entries along with specific content like time , IP Address of the sender is also available. Report generation in various generic formats for processing Forms converted to Unicode/UTF8 format enables the application to be multilingual. It is a complete User friendly End to End solution, fully configurable and requiring no re-programming

Download Pdf

Mobile Authentication and Transaction System (MATS)

p1

This application is an ideal solution for multimedia information aggregation using the mobile phone Easily configurable web interface for form creation and creating the server side scripts and database schemas. The application supports data types like form fields , Image captured by the phone camera and Voice sample recorded live by the phone itself .The data is sent by client application running on the mobile using the GPRS as the communication medium to a remote enterprise database server.

The uploaded data could be accessed from any part of the web by logging on to the administration section. Application supports multiple client logins and assignment to different forms . The searching and sorting of uploaded data is made simple by using a html custom interface. The data entries along with specific content like time , IP Address of the sender is also available. Report generation in various generic formats for processing Forms converted to Unicode/UTF8 format enables the application to be multilingual. It is a complete User friendly End to End solution, fully configurable and requiring no re-programming

Download Pdf

Video Surveillance System (VSS)

p1

Mobile based video surveillance is an ideal solution for surveillance and remote monitoring. The current cameras available in the market offer primarily IP based solution to monitor and configure the camera remotely.

In our VSS system, we would be incorporating features such as surveillance video/picture analysis and transmission .It shall report unusual situations in real time, recognizing real threats, reducing false alarms without data and information overloads, saving communication bandwidth and security personnel.

Download Pdf

Physical Layer Security

Wireless connectivity for data communications is available today in almost all consumer and business electronic equipment from laptops and cell phones to refrigerators and RF identification tags. Wireless data transfer between RF tags/e-passports and their readers is very useful for increasing efficiency in business and government processes. For home and small business consumers, wireless access enables easy and cheap local area networking, connection to the Internet and hassle-free communications between different electronic devices.

Depending on the application, several levels of security is desirable for wireless data transfer. While consumers transferring images might not require high security, any compromise of a company's internal computer networking system is a serious threat to business. In a recent terrorist incident in Delhi, a domestic user's wireless LAN was hacked to send terror emails. Hence, securing wireless Internet access is of paramount importance to all members of civil society.

The main theme of this proposal is security in wireless communication systems. In this proposal, we primarily address the key distribution and key refresh problems in securing wireless data transfer. We propose a novel solution for key distribution by using "physical layer security" i.e. exploiting the random nature of the physical wireless channel. We plan to implement the solution in hardware and test the level of security provided in practical situations.

 

EVDO Enhancement

The EVDO enhancement research project, aims to make significant contributions to DO-Adv and would require only software changes in Access Network and Access Terminal. The research focuses on low cost personal relays (wireless femtos) and on interference mitigation for cell-edge users.

Physical Layer Security Primitives for Wireless Communications

The research aims to provide a novel solution for key distribution and key refresh by using "physical layer security" i.e. exploiting the random nature of the physical wireless channel. The focus is on real time implementation on a hardware to serve as proof of concept and evaluating the level of security provided in practical situations. p1

New research

BLT – Battery Life Cycle Tester

A good understanding of Battery life is key to cost-optimization of Electric Vehicle as well as decentralized solar systems. The batteries need to be analyzed for a real time performance as they behave differently for different applications. The Battery Life Cycle tester (BLT) is a customizable battery tester which can perform various tests on batteries as per our application’s requirement. This can help us determine the number of life cycles the cells can undergo before reaching its end of life. The system can test multiple cells and can log the data of each cell which is helpful in further analysis.

Li-Ion Cell to Pack Kit

The EVDO enhancement research project, aims to make significant contributions to DO-Adv and would require only software changes in Access Network and Access Terminal. The research focuses on low cost personal relays (wireless femtos) and on interference mitigation for cell-edge users.

 

 

 

 

 

 

 

Research & Development

Voice Activated Door Lock (VADOL)

Voice Based Mobile Banking (VOBANK)

Mobile Interface to Enterprise Database (MINED)

Mobile Authentication and Transaction System (MATS)

Video Surveillance System (VSS)

Physical Layer Security

EVDO Enhancement

On 15th February 2008: A tri-partite Memorandum of Understanding (MoU) signed between the Department of Telecommunication, Government of India, IIT Madras, Chennai and Reliance Communications Ltd. to bring RITCOE into existence