ABSTRACT The AVR is automatic voltage regulator and it is a device which is used to regulate or stabilize electrical power supply for electrical or electronic appliances In this project, therefore, we are interested in the construction of this all important device. Furthermore, we shall discuss the techniques, processes, switching stages and then the working principle of the automatic voltage regulator Chapter one of this project dwells on the introduction of the pr...
Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. The open-...
ABSTRACT Automatic voltage inverter is an important area in power system engineering. It is the process of using a 12v DC from the battery to achieve a 220/230V AC through the help of oscillator, drivers, power transistors and transformer. The stages are battery to oscillators, oscillators to drivers, drivers to power transistors then from power transistors to transformer which is capable of giving out 220/230V (1000w) as an output. A 1.25KVA (1000w) voltage inverter was construct...
Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communication...
ABSTRACT This project was centered on database management system for student registration system. The current process of registration is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also sugg...