Sunday, February 26

Detection and Tracking Algorithms for IRST : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


Infrared search and track system is an integral part of modern weaponry. The detection and tracking algorithm forms the heart of an IRST system and their effectiveness plays an important role in determining performance of the system. This report studies various detection and tracking algorithms for multiple point targets in noisy environment resulting in very low signal to noise ratio. Target detection is carried out using spatial-temporal techniques needing multiple frames, since targets are assumed to be irresolvable in a single image frame. The tracking algorithms are classified in the basis of different approaches for data selection and model selection. Data selection and model selection is used for tracking multiple targets in dense clutter environment. An overview of the Interacting Multiple Model Expectation Maximization algorithm, and brief description of Multiple Hypothesis Tracking and Joint Probabilistic Data Association Filter algorithm is also presented.


The ever-increasing effectiveness of electronic warfare and the advent of anti-radiation missiles create the need for covert, radar silent operations. Therefore systems are required which are virtually immune to jamming, undetectable and yet capable of detecting targets at reasonable ranges. The infrared search and track system (IRST) is the most suitable choice for such scenario. IRST is a system that surveys environment by analyzing the infrared radiation, emitted by the targets compared to background. The major work of the IRST is detection and tracking of target. In a practical scenario target are not in ideal conditions, they are generally surrounded by clutter. Hence so detection and tracking is much more complication in practical scenario.

The developments of efficient clutter rejection algorithms are important to detect the targets in the modern IRST systems. In low signal to noise (SNR) situation, the target could not possibly be localized on the single frame so the successive frames are used to detect the target. If the alignment is done properly the signals of the various images would add up and a signal with suffiently large SNR are achieved, while the noise will be cancel out. This approach of detection of dim target is usually referred as target before detection (TBD) and generally used for detection of dim targets.



Read More

Android 5.0 Jelly Bean : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Google has not yet announced, much less released, the successor to the Google Nexus S (made by Samsung), but word is already starting to spread regarding the Android version to follow Android 2.4/4.0 Ice Cream Sandwich (ICS), which presumably will be debuted with a new Nexus reference device.

Due to the fact that ICS will be such a huge jump, we’ve not stopped to think about what Google will name the next Android version. If we follow the tradition, it should be a dessert starting with the letter J. We’ve heard a few assumptions, like “Jello,” but according to Thisismynext’s sources, it will be called “Jelly Bean.”

It’s still unknown what number will come attached with it. That’s not surprising, as we don’t even have confirmation that ICS will actually be Android 4.0. This continues to be a rumor, and we probably won’t know much about Android “Jelly Bean” for a while.

The same sources also mentioned that “Jelly Bean” will actually include some “game-changing stuff” that was originally meant for ICS. It is still unknown what these features will include, but we hope Ice Cream Sandwich was not stripped down too much.

Feature   Android 5.0  Jelly Bean
  1. A full Google Chrome Browser
  2. Being able to switch between Landscape mode and Portrait mode on the main home screen
  3. An integrated file manager
  4. A better keyboard without having to change between characters
  5. Mmultiple device compatibility
  6. If Android Jelly Bean would require a lot of power, a light version of it for under-powered devices
  7. Lock screen widgets
  8. A better power efficiency management
  9. Theme integrated within the UI

Read More

Saturday, February 25

Wireless Electricity : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


Witricity is nothing but the short name of Wireless Electricity. The basic concept behind this is Magnetic Resonance. Two resonant objects of the same resonant frequency tend to exchange energy efficiently, while dissipating relatively little energy in extraneous off-resonant objects. In systems of coupled resonances, there is often a general “Strongly Coupled” regime of operation. If one can operate inthat regime in a given system, the energy transfer is expected to be very efficient.

Midrange power transfer implemented in this way can be nearly omni directional and efficient, irrespective of the geometry of the surrounding space, with low interference and losses into environmental objects. The above considerations apply irrespective of the physical nature of the resonances. Magnetic resonances are particularly suitable for everyday applications because most of the common materials do not interact with Magnetic Fields, so interactions with Environmental objects are suppressed even further. We were able to identify the strongly coupled regime in the system of two coupled magnetic resonances by exploring Non-radioactive (near-field) magnetic resonant induction at Megahertz frequencies.

Wireless Electricity


Need of Witricity:

Now a days there is a Rapid development of autonomous electronics like laptops, cell-phones, house-hold robots and all the above devices typically rely on chemical energy storage(Battery) .As they are becoming daily needs to present generation, Wireless energy transfer would be useful for many applications as above and they need midrange energy.


Currently, wired electricity powers nearly everything. It travels through wires in the form of Alternating Current, and powers most of our devices in the form of Direct Current. In our present electricity generation system we waste more than half of its resources. Especially the transmission and distribution losses are the main concern of the present power technology.

The resistance of the wire used in the electrical grid distribution system causes a loss of 26-30% of the energy generated. This loss implies that our present system of electrical distribution is only 70-74% efficient. We have to think of alternate technology to transmit and distribute the electricity. The transmission of power without wires may be one noble alternative for electricity transmission.


Prof. Marin Soljacic from Massachusetts Institute of Technology (MIT), is the one who has proved that magnetic coupled resonance can be utilized in order to transfer energy without wires. What's even more interesting is how he came about this idea. Soljacic, just like any of us was fed up of his 'low battery' beeping cell phone and wondered just like any of us if there was a way to get rid of this 'charging problem'.
Read More

Infra Red Detectors : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Infrared radiations are radiations below (infra) visible spectrum. This emergent dual use technology field is fast emerging amongst the most ubiquitous ones. It spans from low-end automatic supermarket door openers to high-end space based detectors used to detect nuclear tests, missiles and intra galactic radiations. At the heart of this technology is the IR detector

Each mobile uses a separate, temporary radio channel to talk to the cell site. The cell site talks to many mobiles at once, using one channel per mobile. Channels use a pair of frequencies for communication. One for transmitting from the cell site, the forward link, and one frequency for the cell site to receive calls from the users, the reverse link. 

Communication between mobile units can be either half-duplex or full-duplex. In case of half-duplex, transmit and receive communications between the mobile units are not at the same time, i.e. talking and listening can not be done at the same time. In case of full-duplex communication, transmit and receive communication is at the same time, i.e. one can talk and listen at the same time. 

When communications between mobile units are within a cell, and if the same is half-duplex, then it shall require only one pair of frequency. If the same is full-duplex, then requirement of frequency pair shall be two.
When a mobile unit is communicating with a mobile unit outside the cell, then the requirement of frequency pair shall be one per cell for both half-duplex and full-duplex communication. Hence the system resources are utilized more if the mobile units communicate with each other in full-duplex mode.

Infrared (IR) detectors have been called the eyes of the digital battlefield. Military applications in Western countries have spearheaded and dominated the requirements in this field akin to many other emerging fields. In addition to many military applications for IR systems such as target acquisition, search and track, missile seeker guidance, there is a great potential for IR systems in the commercial market. IR systems enhance automobile and aircraft safety, medical diagnosis, and manufacturing quality and control. Industry is looking to expand into the commercial market because the military market is decreasing and concurrently becoming more specialized. Today, only about 20% of the market is commercial. After a decade the commercial market is estimated to grow by over 70% in volume and 40% in value.

The IR detectors evolved initially with theories and subsequently by improvement of materials. During the first half of nineteenth century, efforts were made to improve the speed and accuracy of only known IR detector, the thermometer. In 1829 Nobiloti made the first thermocouple. Melloni utilized this for making a thermopile capable of detecting heat emission from a human at 30 feet. During 1880 s Langly developed a sensitive bolometer that could sense a cow at a quarter of mile. Triad of these three instruments marked the development of IR detectors in nineteenth century. These detectors were sensitive to all infrared wavelengths and operated at room temperature. They had low sensitivity and slow response. Smith discovered photoconductive effect in 1873.



Read More

iDEN : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

iDEN  is a mobile telecommunications technology, developed by Motorola, which provides its users the benefits of a trunked radio and a cellular telephone. iDEN places more users in a given spectral space, compared to analog cellular and two-way radio systems, by using speech compression and time division multiple access TDMA. Notably, iDEN is designed, and licensed, to operate on individual frequencies that may not be contiguous. iDEN operates on 25kHz channels, but only occupies 20 kHz in order to provide interference protection via guard bands. By comparison, TDMA Cellular (IS-54 and IS-136) is licensed in blocks of 30 kHz channels, but each emission occupies 40 kHz,and is capable of serving the same number of subscribers per channel as iDEN. iDEN supports either three or six interconnect users (phone users) per channel, and either six or twelve dispatch users (push-to-talk users) per channel. Since there is no Analogue component of iDEN, mechanical duplexing in the handset is unnecessary, so Time Domain Duplexing is used instead, the same way that other digital-only technolgies duplex their handsets. Also, like other digital-only technologies, hybrid or cavity duplexing is used at the Base Station (Cellsite).


More Than a Wireless Phone

iDEN technology offers you more than just a wireless phone. It's a Motorola complete communications system that you hold in your hand. Combining speakerphone, voice command, phone book, voice mail, digital two-way radio, mobile Internet and e-mail, wireless modems, voice activation, and voice recordings so that you can virtually recreate your office on the road
TDMA (Time Division Multiple Access):

iDEN's digital technology divides a channel into different "slots". Each slot can carry one voice or data transmission. By deploying an iDEN system, service providers can increase capacity by as much as six times their current analog Specialized Mobile Radio (SMR) network.

This capacity increase is accomplished using a state-of-the-art technology called TDMA. TDMA utilizes Global Positioning Satellites (GPS) to reference a synchronized time, and then divides the channel into time slots. As a result, channel capacity is increased because one channel has now been converted to multiple voice or data transmission vehicles. TDMA is a proven technology in cellular systems across Europe, the US, and in Japan. iDEN utilizes TDMA for Maximum Spectrum Efficiency.
Read More

Pill Camera : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


The aim of technology is to make products in a large scale for cheaper prices and increased quality. The current technologies have attained a part of it, but the manufacturing technology is at macro level. The future lies in manufacturing product right from the molecular level. Research in this direction started way back in eighties. At that time manufacturing at molecular and atomic level was laughed about. But due to advent of nanotechnology we have realized it to a certain level. One such product manufactured is PILL CAMERA, which is used for the treatment of cancer, ulcer and anemia. It has made revolution in the field of medicine. This tiny capsule can pass through our body, without causing any harm.

Pill Camera


Description :

The device, called the given Diagnostic Imaging System, comes in capsule form and contains a camera, lights, transmitter and batteries. The capsule has a clear end that allows the camera to view the lining of the small intestine. Capsule endoscopy consists of a disposable video camera encapsulated into a pill like form that is swallowed with water. The wireless camera takes thousands of high-quality digital images within the body as it passes through the entire length of the small intestine. The latest pill camera is sized at 26*11 mm and is capable of transmitting 50,000 color images during its traversal through the digestive system of patient.

Video chip consists of the IC CMOS image sensor which is used to take pictures of intestine .The lamp is used for proper illumination in the intestine for taking photos. Micro actuator acts as memory to store the software code that is the instructions. The antenna is used to transmit the images to the receiver. For the detection of reliable and correct information, capsule should be able to designed to transmit several biomedical signals, such as pH, temp and pressure. This is achieved with the help of Soc.external reference crystal or clock. The decoder IC receives the serial stream and interprets the serial information as 4 bits of binary data. Each bit is used for channel recognition of the control signal from outside the body. Since the CMOS image sensor module consumes most of the power compared to the other components in the telemetry module, controlling the ON/OFF of the CMOS image sensor is very important. 

Moreover, since lightning LED’s also use significant amount of power, the individual ON/OFF control of each LED is equally necessary. As such the control system is divided into 4 channels in the current study. A high output current amplifier with a single supply is utilized to drive loads in capsule.


Read More

Palm Vein Technology : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. 

An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access. 

Contact less Palm Vein Authentication Device: 

The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required It also eliminates any hesitation people might have about coming into contact with something that other people have already touched.

In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge.

What happens if the registered palm gets damaged? 

There may be a chance that the palm we had registered may get damaged then we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained. When we apply this method we can maintain complete privacy . 

Read More

Humanoid Robot : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


The field of humanoids robotics, widely recognized as the current challenge for robotics research, is attracting the interest of many research groups worldwide. Important efforts have been devoted to the objective of developing humanoids and impressive results have been produced, from the technological point of view, especially for the problem of biped walking. 

In Japan , important humanoid projects, started in the last decade, have been carried on by the Waseda University and by Honda Motor Co. 

The Humanoid Project of the Waseda University, started in 1992, is a joint project of industry, government and academia, aiming at developing robots which support humans in the field of health care and industry during their life and that share with human information and behavioral space, so that particular attention have been posed to the problem of human-computer interaction. Within the Humanoid Project, the Waseda University developed three humanoid robots, as research platforms, namely Hadaly 2,Wabian and Wendy. 

Impressive results have been also obtained by Honda Motor Co. Ltd with P2 and P3, self-contained humanoid robots with two arms and two legs, able to walk, to turn while walking, to climb up and down stairs. These laboratories on their humanoid robots carry on studies on human-robot interaction, on human-like movements and behavior and on brain mechanics of human cognition and sensory-motor learning 

KINEMATIC ARCHITECTURE: 

A first analysis based on the kinematics characteristics of the human hand, during grasping tasks, led us to approach the mechanical design with a multi-DOF hand structure. Index and middle finger are equipped with active DOF respectively in the MP and in the PIP joints, while the DIP joint is actuated by one driven passive DOF. 

The thumb movements are accomplished with two active DOF in the MP joint and one driven passive DOF in the IP joint. This configuration will permit to oppose the thumb to each finger.

THE VISION SYSTEM: 

The use of MEP tracking system is made to implement the facial gesture interface. This vision system is manufactured by Fujitsu and is designed to track in real time multiple templates in frames of a NTSC video stream. It consists of two VME-bus cards, a video module and tracking module, which can track up to 100 templates simultaneously at video frame rate (30Hz for NTSC). 

The tracking of objects is based on template (8x8 or 16x16 pixels) comparison in a specified search area. The video module digitizes the video input stream and stores the digital images into dedicated video RAM. The tracking module also accesses this RAM. The tracking module compares the digitized frame with the tracking templates within the bounds of the search windows. 

To track a template of an object it is necessary to calculate the distortion not only at one point in the image but at a number of points within the search window. To track the movement of an object the tracking module finds the position in the image frame where the template matches with the lowest distortion. A vector to the origin of the lowest distortion represents the motion. By moving the search window along the axis of the motion vector objects can be easily tracked. The tracking module performs up to 256 cross correlations per template within a search window. 

Read More

E-Cash Payment System


Electronic payment systems come in many forms including digital checks, debit cards, credit cards, and stored value cards. The usual security features for such systems are privacy (protection from eavesdropping), authenticity (provides user identification and message integrity), and no repudiation (prevention of later denying having performed a transaction) . 

The type of electronic payment system focused on in this paper is electronic cash . As the name implies, electronic cash is an attempt to construct an electronic payment system modelled after our paper cash system. Paper cash has such features as being: portable (easily carried), recognizable (as legal tender) hence readily acceptable, transferable (without involvement of the financial network), untraceable (no record of where money is spent), anonymous (no record of who spent the money) and has the ability to make "change." The designers of electronic cash focused on preserving the features of untraceability and anonymity. Thus, electronic cash is defined to be an electronic payment system that provides, in addition to the above security features, the properties of user anonymity and payment untraceability 

Electronic Payment 

The term electronic commerce refers to any financial transaction involving the electronic transmission of information. The packets of information being transmitted are commonly called electronic tokens . One should not confuse the token, which is a sequence of bits, with the physical media used to store and transmit the information. 

We will refer to the storage medium as a card since it commonly takes the form of a wallet-sized card made of plastic or cardboard. (Two obvious examples are credit cards and ATM cards.) However, the "card" could also be, e.g., a computer memory. 

A particular kind of electronic commerce is that of electronic payment . An electronic payment protocol is a series of transactions, at the end of which a payment has been made, using a token issued by a third party. The most common example is that of credit cards when an electronic approval process is used. Note that our definition implies that neither payer nor payee issues the token.

Read More

Digital Jewelry : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Digital jewelry is the fashion jewelry with embedded intelligence. “Digital jewelry” can help you solve problems like forgotten passwords and security badges. “Digital jewelry” is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your driver's license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of today's wired world – the forgotten password. 

DIGITAL JEWELRY AND ITS COMPONENTS: 

Soon, cell phones will take a totally new form, appearing to have no form at all. Instead of one single device, cell phones will be broken up into their basic components and packaged as various pieces of digital jewelry. Each piece of jewelry will contain a fraction of the components found in a conventional mobile phone. Together, the digital-jewelry cell phone should work just like a conventional cell phone. 

The various components that are inside a cell phone : 

Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery . 

IBM has developed a prototype of a cell phone that consists of several pieces of digital jewelry that will work together wirelessly, possibly with Blue tooth wireless technology, to perform the functions of the above components. 



Cell phones may one day be comprised of digital accessories that 

Work together through wireless connections. 

Here are the pieces of computerized-jewelry phone and their functions: 

• Earrings - Speakers embedded into these earrings will be the phone's receiver. 

• Necklace - Users will talk into the necklace's embedded microphone . 

• Ring - Perhaps the most interesting piece of the phone, this "magic decoder ring” is equipped with light-emitting diodes (LEDs) that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call. 

• Bracelet - Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller. 

With a jewelry phone, the keypad and dialing function could be integrated into the bracelet, or else dumped altogether -- it's likely that voice-recognition software will be used to make calls, a capability that is already commonplace in many of today's cell phones. Simply say the name of the person you want to call and the phone will dial that person. IBM is also working on a miniature rechargeable battery to power these components.



The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. (Track Point is the little button embedded in the keyboard of some laptops). IBM Researchers have transferred TrackPoint technology to a ring, which looks something like a black-pearl ring. On top of the ring is a little black ball that users will swivel to move the cursor, in the same way that the TrackPoint button on a laptop is used. This Track Point ring will be very valuable when monitors shrink to the size of watch face. In the coming age of ubiquitous computing, displays will no longer be tied to desktops or wall screens. Instead, you'll wear the display like a pair of sunglasses or a bracelet. Researchers are overcoming several obstacles facing these new wearable displays, the most important of which is the readability of information displayed on these tiny devices.

TECHNICAL SPECIFICATIONS OF DIGITAL JEWELRY:

 Digital jewelry devices consist of a screen or display for information, most likely consisting of 7-16- segment, or dot matrix LEDs, LCDs, or other technologies such as electroluminescent material (EL) or others, which could become an optional display. So too, an audiovisual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind (such as a temperature driven EL display), or other informational aesthetic. The display layer sits on a face of the device, which is enclosed in some material such as plastic, metal, crystal, or other material. It has external switches and buttons on its side and a data-port for accessing the programmable electronic circuit inside. A micro controller that is a surface mounted device (SMD) on a printed circuit board (PCB) with resistors (R) and capacitors (C) are the internal 'guts' of the jewelry.

Read More

Brain Gate : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


BrainGate is a brain implant system developed by the bio-tech company Cyberkinetics in 2003 in conjunction with the Department of Neuroscience at Brown University. The device was designed to help those who have lost control of their limbs, or other bodily functions, such as patients with amyotrophic lateral sclerosis (ALS) or spinal cord injury. The computer chip, which is implanted into the brain , monitors brain activity in the patient and converts the intention of the user into computer commands. Cyberkinetics describes that "such applications may include novel communications interfaces for motor impaired patients, as well as the monitoring and treatment of certain diseases which manifest themselves in patterns of brain activity, such as epilepsy and depression." 

Brain Gate
Currently the chip uses 100 hair-thin electrodes that sense the electro-magnetic signature of neurons firing in specific areas of the brain, for example, the area that controls arm movement. The activities are translated into electrically charged signals and are then sent and decoded using a program, which can move either a robotic arm or a computer cursor. According to the Cyberkinetics' website, three patients have been implanted with the BrainGate system. The company has confirmed that one patient ( Matt Nagle ) has a spinal cord injury, while another has advanced ALS.
Brain Gate Neural Interface System 

The BrainGate Neural Interface System is currently the subject of a pilot clinical trial being conducted under an Investigational Device Exemption (IDE) from the FDA. The system is designed to restore functionality for a limited, immobile group of severely motor-impaired individuals. It is expected that people using the BrainGate System will employ a personal computer as the gateway to a range of self-directed activities. These activities may extend beyond typical computer functions (e.g., communication) to include the control of objects in the environment such as a telephone, a television and lights. 

The BrainGate System is based on Cyberkinetics' platform technology to sense, transmit, analyze and apply the language of neurons. The System consists of a sensor that is implanted on the motor cortex of the brain and a device that analyzes brain signals. The principle of operation behind the BrainGate System is that with intact brain function, brain signals are generated even though they are not sent to the arms, hands and legs. The signals are interpreted and translated into cursor movements, offering the user an alternate "BrainGate pathway" to control a computer with thought, just as individuals who have the ability to move their hands use a mouse. 

Read More

Brain Fingerprinting : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection derives from studies suggesting that persons asked to lie show different patterns of brain activity than they do when being truthful. Issues related to the use of such evidence in courts are discussed. The author concludes that neither approach is currently supported by enough data regarding its accuracy in detecting deception to warrant use in court. 

In the field of criminology, a new lie detector has been developed in the United States of America . This is called “brain fingerprinting”. This invention is supposed to be the best lie detector available as on date and is said to detect even smooth criminals who pass the polygraph test (the conventional lie detector test) with ease. The new method employs brain waves, which are useful in detecting whether the person subjected to the test, remembers finer details of the crime. Even if the person willingly suppresses the necessary information, the brain wave is sure to trap him, according to the experts, who are very excited about the new kid on the block.

What is Brain Fingerprinting? 

Brain Fingerprinting is designed to determine whether an individual recognizes specific information related to an event or activity by measuring electrical brain wave responses to words, phrases, or pictures presented on a computer screen. The technique can be applied only in situations where investigators have a sufficient amount of specific information about an event or activity that would be known only to the perpetrator and investigator. In this respect, Brain Fingerprinting is considered a type of Guilty Knowledge Test, where the "guilty" party is expected to react strongly to the relevant detail of the event of activity. 

Existing (polygraph) procedures for assessing the validity of a suspect's "guilty" knowledge rely on measurement of autonomic arousal (e.g., palm sweating and heart rate), while Brain Fingerprinting measures electrical brain activity via a fitted headband containing special sensors. Brain Fingerprinting is said to be more accurate in detecting "guilty" knowledge distinct from the false positives of traditional polygraph methods, but this is hotly disputed by specialized researchers. 

Technique: 

The person to be tested wears a special headband with electronic sensors that measure the electroencephalography from several locations on the scalp. In order to calibrate the brain fingerprinting system, the testee is presented with a series of irrelevant stimuli, words, and pictures, and a series of relevant stimuli, words, and pictures. The test subject's brain response to these two different types of stimuli allow the testor to determine if the measured brain responses to test stimuli, called probes, are more similar to the relevant or irrelevant responses. 

The technique uses the well known fact that an electrical signal known as P300 is emitted from an individual's brain approximately 300 milliseconds after it is confronted with a stimulus of special significance, e.g. a rare vs. a common stimuls or a stimulas the proband is asked to count. The novel interpretation in brain fingerprinting is to look for P300 as response to stimuli related to the crime in question e.g., a murder weapon or a victim's face. Because it is based on EEG signals, the system does not require the testee to issue verbal responses to questions or stimuli. 

Brain fingerprinting uses cognitive brain responses, brain fingerprinting does not depend on the emotions of the subject, nor is it affected by emotional responses. Brain fingerprinting is fundamentally different from the polygraph (lie-detector), which measures emotion-based physiological signals such as heart rate, sweating, and blood pressure. Also, unlike polygraph testing, it does not attempt to determine whether or not the subject is lying or telling the truth 


Read More

3D Searching : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Advances in computing power combined with interactive modeling software, which lets users create images as queries for searches, have made 3Dsearch technology possible.

Methodology used involves the following steps

" Query formulation
" Search process
" Search result


True 3D search systems offer two principal ways to formulate a query: Users can select objects from a catalog of images based on product groupings, such as gears or sofas; or they can utilize a drawing program to create a picture of the object they are looking for. or example, Princeton's 3D search engine uses an application to let users draw a 2D or 3D representation of the object they want to find.

The above picture shows the query interface of a 3D search system.

SEARCH PROCESS

The 3D-search system uses algorithms to convert the selected or drawn image-based query into a mathematical model that describes the features of the object being sought. This converts drawings and objects into a form that computers can work with. The search system then compares the mathematical description of the drawn or selected object to those of 3D objects stored in a database, looking for similarities in the described features.

The key to the way computer programs look for 3D objects is the voxel (volume pixel). A voxel is a set of graphical data-such as position, color, and density-that defines the smallest cubeshaped building block of a 3D image. Computers can display 3D images only in two dimensions. To do this, 3D rendering software takes an object and slices it into 2D cross sections. The cross sections consist of pixels (picture elements), which are single points in a 2D image. To render the 3D image on a 2D screen, the computer determines how to display the 2D cross sections stacked on top of each other, using the applicable interpixel and inter slice distances to position them properly. The computer interpolates data to fill in interslice gaps and create a solid image.


Read More

Tuesday, February 7

3D Television : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Three-dimensional TV is expected to be the next revolution in the TV history. They implemented a 3D TV prototype system with real-time acquisition transmission, & 3D display of dynamic scenes. They developed a distributed scalable architecture to manage the high computation & bandwidth demands. 3D display shows high-resolution stereoscopic color images for multiple viewpoints without special glasses. This is first real time end-to-end 3D TV system with enough views & resolution to provide a truly immersive 3D experience.Japan plans to make this futuristic television a commercial reality by 2020as part of abroad national project that will bring together researchers from the government, technology companies and academia. The targeted "virtual reality" television would allow people to view high definitionimages in 3D from any angle, in addition to being able to touch and smell the objects being projected upwards from a screen to the floor.
Keywords--- parallex,display,perception,holographic images

INTRODUCTION

Three-dimensional TV is expected to be the next revolution in the TV history. They implemented a 3D TV prototype system with real-time acquisition transmission, & 3D display of dynamic scenes. They developed a distributed scalable architecture to manage the high computation & bandwidth demands. 3D display shows high-resolution stereoscopic color images for multiple viewpoints without special glasses. This is first real time end-to-end 3D TV system with enough views & resolution to provide a truly immersive 3D experience.

 Why 3D TV

The evolution of visual media such as cinema and television is one of the major hallmarks of our modern civilization. In many ways, these visual media now define our modern life style. Many of us are curious: what is our life style going to be in a few years? What kind of films and television are we going to see? Although cinema and television both evolved over decades, there were stages, which, in fact, were once seen as revolutions:

1) at first, films were silent, then sound was added;
2) cinema and television were initially black-and-white, then color was introduced;
3) computer imaging and digital special effects have been the latest major novelty.


Read More

4G Broadband : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


XOHM is coming – providing next-generation mobile broadband across your city. With XOHM, you no longer need to find a hotspot for a broadband internet experience – the hotspot comes with you. There are no compromises here – even if it’s streaming fullscreen video. And with XOHM, you have one account and it’s always available. No long-term contracts – you can pay by the day, the month or the year.

XOHM won’t just connect WiMAX-enabled products to the internet it’ll allow them to connect across the network to each other. We expect this to open exciting new experiences beyond just getting online with the potential to change how we communicate, enjoy, and achieve - for example:

Health: a mobile health monitor could track and transmit a user’s vitals and alert a hospital or caregiver in case of an emergency.

Sports: a runner’s performance could be monitored by WiMAX-enabled chips built into her shoes to be shared with coaches, peers or spectators.

Home Entertainment: While you’re out of town, your WiMAX-enabled DVR could send a reminder to your phone that your favorite TV show is about to start - command it to record the show to watch later via your WiMAX-enabled portable video player.

Read More

Cloud Computing : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Cloud computing delivers infrastructure, platform, and software (applications) as services, which are made available to consumers as subscription-based services under the pay-as-you-go model. In industry these services are referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) respectively. A recent Berkeley report  stated “Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service”.

Clouds aim to drive the design of the next generation data centers by architecting them as networks of virtual services (hardware, database, user-interface, application logic) so that users can access and deploy applications from anywhere in the world on demand at competitive costs depending on their QoS (Quality of Service) requirements . 

Need of Cloud Computing

The need of cloud computing can be explained with the help of an example. The following graph shows the number of users who log on to the Australian Open web page.
The spikes correspond to the month of  January during which the tournament is going on.  The site remains almost dormant during the rest of the year. It would be wasteful to have servers which can cater to the maximum need,as they wont be needed during the rest of the year. The concept of cloud computing comes to the rescue at this time. During the peak period, cloud providers such as Google,Yahoo,Microsoft etc.can be approached to provide the necessary server capacity. 

Read More

Gi-Fi : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Gi-Fi will helps  to  push  wireless  communications  to  faster  drive.  For  many  years cables  ruled the  world.  Optical fibers played a dominant role for its  higher bit  rates and faster transmission. But the installation of cables caused a greater difficulty and thus  led  to  wireless  access.  The  foremost  of  this  is  Bluetooth  which  can  cover  9-10mts.  Wi-Fi  followed  it  having coverage  area of  91mts.  No  doubt,  introduction of Wi-Fi   wireless   networks   has   proved   a   revolutionary   solution   to   “last   mile” problem.However, the standard's original limitations for data exchange rate and range, number of channels, high cost of the infrastructure have not yet made it possible for Wi-Fi  to  become  a  total threat  to  cellular networks  on  the  one  hand,  and hard-wire networks,  on  the  other.  But  the  mans  continuous  quest  for  even  better  technology despite  the  substantial  advantages  of  present  technologies  led  to  the  introduction  of new, more up-to-date standards for data exchange rate i.e., Gi-Fi.
Gi-Fi or Gigabit Wireless is the world's first transceiver integrated on a single chip that operates at 60GHz on the CMOS process. It will allow wireless transfer of audio and video data  up to 5 gigabits per second, ten times the current maximum wireless transfer rate,at one-tenth of the cost,usually within a range of 10 meters.It utilizes a 5mm square chip and a 1mm wide antenna burning less than 2 watts of power to transmit data wirelessly over short distances, much like Bluetooth.

The development will enable the truly wireless office and home of the future. As the integrated transceiver is extremely small, it can be embedded into devices. The breakthrough will mean the networking of office and home equipment without wires will finally become a reality.
Read More

Global Wireless E-Voting : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


In proposed machine that is “Global Wireless E-Voting “. In this the machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process.  The overall concept of “Global Wireless E-Voting “is explained.

Working of whole system

Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine at this time the machine scans the retina. once retina scanning  properly confirmed then it sent signal to the voting machine as to accept the vote it will be powered on .then voter is made to vote. Now the whole data including the retina pattern is sent to interfacing device which convert into radio waves of mobile frequency range and these radio waves are sent to mobile tower and then to the remote server, where the authentication and voters identification is stored into a secured database. The received   data is first converted into digital format from the radio waves through the interface device kept at the server side, and then retina pattern and vote separated. Next the retina pattern is matched against the existing database .If match is found then flag is check which indicates its voting status i.e. if the voter is not voted yet then +ve ack is send to the mobile tower and then to the corresponding voting machine. This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if    –ve ack then alert alarm is made to ring.

Read More

5G Wireless System : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


     5G (5th generation mobile networks or 5th generation wireless systems) is a name used in some research papers and projects to denote the next major phase of mobile telecommunications standards beyond the upcoming 4G standards (expected to be finalized between approximately 2011 and 2013). Currently, 5G is not a term officially used for any particular specification or in any official document yet made public by telecommunication companies or standardization bodies such as 3GPP, WiMAX Forum or ITU-R. New 3GPP standard releases beyond 4G and LTE Advanced are in progress, but not considered as new mobile generations. The implementation of standards under a 5G umbrella would likely be around the year of 2020.

Keys :

1. 5G is a completed wireless communication with almost no limitation; somehow people called it REAL wireless world

2. Additional features such as Multi-Media Newspapers, also to watch T.V programs with the clarity as to that of an HD T.V.
3. We can send Data much faster that that of the previous generations

4. 5G will bring almost perfect real world wireless or called “WWWW: World Wide Wireless Web

5. Real wireless world with no more limitation with access and zone issues.

6. Wearable devices with AI capabilities.

7. Internet protocol version 6 (IPv6), where a visiting care-of mobile IP address is assigned according to location and connected network.

8. One unified global standard.

9. Pervasive networks providing ubiquitous computing: The user can simultaneously be connected to several wireless access technologies and seamlessly move between them (See Media independent handover or vertical handover, IEEE 802.21, also expected to be provided by future 4G releases). These access technologies can be a 2.5G, 3G, 4G or 5G mobile networks, Wi-Fi, PAN or any other future access technology. In 5G, the concept may be further developed into multiple concurrent data transfer paths.

10. Cognitive radio technology, also known as smart-radio: allowing different radio technologies to share the same spectrum efficiently by adaptively finding unused spectrum and adapting the transmission scheme to the requirements of the technologies currently sharing the spectrum. This dynamic radio resource management is achieved in a distributed fashion, and relies on software defined radio. See also the IEEE 802.22 standard for Wireless Regional Area Networks.

11. High altitude stratospheric platform station (HAPS) systems.
Read More

Mobile Phone Cloning


WHAT IS CELL PHONE CLONING?    

 Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users. 
Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.

WHEN DID CELL CLONING START?

The early 1990s were boom times for eavesdroppers. Any curious teenager with a £100 Tandy Scanner could listen in to nearly any analogue mobile phone call. As a result, Cabinet Ministers, company chiefs and celebrities routinely found their most intimate conversations published in the next day's tabloids  Cell phone cloning started with Motorola "bag" phones and reached its peak in the mid 90's with a commonly available modification for the Motorola "brick" phones, such as the Classic, the Ultra Classic, and the Model 8000.

HOW IS CELL CLONING DONE? 

Cloning involved modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN (Electronic serial number) via software. You would also have to change the MIN (Mobile Identification Number). When you had successfully changed the ESN/MIN pair, your phone was an effective clone of the other phone. Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several   ways:                                                                                                                             
Sniffing the cellular                                                          
Trashing cellular companies or cellular resellers 
Hacking cellular companies or cellular resellers 
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone able phones are more difficult to find and newer phones have not been successfully reverse-engineered. Cloning has been successfully demonstrated under GSM, but the process is not easy and it currently remains in the realm of serious hobbyists and researchers.

ARE OUR CELL PHONES SECURED?

Too many users treat their mobile phones as gadgets rather than as business assets covered by corporate security policy. Did you realize there's a lucrative black market in stolen and "cloned" Sim cards? This is possible because Sims are not network specific and, though tamper-proof, their security is flawed. In fact, a Sim can be cloned many times and the resulting cards used in numerous phones, each feeding illegally off the same bill. 

But there are locking mechanisms on the cellular phones that require a PIN to access the phone. This would dissuade some attackers, foil others, but might not work against a well financed and equipped attacker. An 8-digit PIN requires approximately 50,000,000 guesses, but there may be ways for sophisticated attackers to bypass it.


Read More

Sensitive Skin : Seminar Report|PPT|PDF|DOC|Presentation|Free Download


Sensitive Skin is a large-area, flexible array of sensors with data processing capabilities, which can be used to cover the entire surface of a machine or even a part of a human body. Depending on the skin electronics, it endows its carrier with an ability to sense its surroundings via the skin’s proximity, touch, pressure, temperature, chemical/biological, or other sensors. Sensitive skin devices will make possible the use of unsupervised machines operating in unstructured, unpredictable surroundings among people, among many obstacles, outdoors on a crowded street, undersea, or on faraway planets. Sensitive skin will make machines “cautious” and thus friendly to their environment. This will allow us to build machine helpers for the disabled and elderly, bring sensing to human prosthetics, and widen the scale of machines’ use in service industry. With their ability to produce and process massive data flow, sensitive skin devices will make yet another advance in the information revolution. This paper surveys the state of the art and research issues that need to be resolved in order to make sensitive skin a reality. 

- Sensitive Skin material will hold embedded sensors and related signal processing hardware. It needs to be flexible enough for attaching it to the outer surfaces of machines with moving parts and flexible joints. 
- The skin must stretch, shrink, and wrinkle the way human skin does, or to have other compensating features. Otherwise, some machine parts may become "exposed" due to the machine's moving parts, and have no associated sensing.
- Wiring must keep its integrity when Sensitive Skin is stretched or wrinkled. This requirement calls for novel wire materials, e.g. conductive elastomers or vessels carrying conductive liquid, or novel ways of wire design with traditional materials, such as helical, stretchable wires. 

Fabricating sensitive skin is based on a new process of depositing polycrystalline CdSe (1.75 eV), CdS (2.4 eV), PbS (0.4 eV) [13], PbSe (0.24 eV) and CuS (semiconductor/ metal) films on flexible substrates at temperatures close to room temperature (eV here are electron-volts). Large area surfaces can be covered. Also, ternary and quaternary compounds as well as heterostructures can be deposited. Transparent conductors on flexible substrates (such as CuS), materials for sensors, with possible combination with higher mobility polycrystalline materials (such as laser annealed polycrystalline silicon), amorphous (such as a-Si), polycrystalline (such as CdS or CdSe), and deep submicron crystalline silicon technology (for fast data processing). We will also need sensors with multiple sensing capabilities, learning, once again, from the design of human or animal skin. These are new and exciting challenges for material science and device physics. 

Read More

Mobile IPTV : Seminar Report|PPT|PDF|DOC|Presentation|Free Download

Mobile IPTV is a technology that enables users to transmit and receive multimedia traffic including television signal, video, audio, text and graphic services through IP-based the wired and wirelessnetworks with support for QoS/QoS, security, mobility, and interactive functions. Through Mobile IPTV, users can enjoy IPTV services anywhere and even while on the move.

 In fact, IPTV is composed of Internet Protocol (IP) and TV. In other words,it implies a traditionalTV services are being migrated and converged  Into Internet space. As long as we use Internet, IP is avital component and all of advantages of IP can be used for IPTV services. Everyone agrees that IP hasplayed and will play a major role in the evolution of networks and services. IP allows you to make use ofall IP based services including IPTV services anywhere on earth through Internet. The major goal of this paper is to raise theinterests and concerns of Mobile IPTV including thestatus of standard activities when deploying IPTVservices over wireless and mobile networks, and expand the value of IPTV in the structure ofeveryday life

HOW MOBILE IPTV WORKS

Before we get into the internal details of the way the IPTV network is configured to provide transmission of television signals, we see what are the various steps followed to convert the audio and video feed signals into a suitable form to be transmitted in the form of IP (Internet Protocol) packets, which forms the basis of the whole concept of IPTV and how they are received on the other side as television signals.

A key first step in providing Internet Protocol Television service is converting the analog audio voice signals into a digital form (digitization) and then compressing the digitized information into a more efficient form.Digitization is the conversion of analog signals (continually varying signals) into digital form (signals that have only two levels). To convert analog signals to digital form, the analog signal is sampled and digitized by using an analog-to-digital (pronounced A to D) co the A/D converter periodically senses (samples) the level of the analog signal and creates a binary number or series of digital pulses that represent the level of the signal.
Read More
Home About-us Computer Science Electronics Mechanical Electrical IT Civil
Copyright © 2018 www.seminartopics.org | All Rights Reserved. Design By Templateclue