Showing posts with label SEMINARS. Show all posts
Showing posts with label SEMINARS. Show all posts

Face recognition

A facial recognition system is a computer application
for automatically identifying or verifying a person from a digital
image or a video frame from a video source. One of the way is to
do this is by comparing selected facial features from the image
and a facial database.It is typically used in security systems and
can be compared to other biometrics such as fingerprint or eye
iris recognition systems.
In this paper we focus on 3-D facial recognition system and
biometric facial recognision system. We do critics on facial
recognision system giving effectiveness and weaknesses. This
paper also introduces scope of recognision system in India
DOWNLOAD

smart board

        SMART Technologies is the parent company that created the SMART Board.  SMART Technologies was founded in 1987 by David Martin and Nancy Knowlton as a Canadian company that was a distributor for 3M  projectors.  The SMART Board was introduced 18 years ago in 1991!  According the SMART Technologies website, "It was the first interactive whiteboard to provide touch control of computer applications and annotation over standard Microsoft Windows applications" (SMART Technologies ULC).  The company struggled in the early years, but put all of its profits into research development of the SMART Board.  Because nobody knew about the product, SMART had to really work at marketing their product.  As a results, some educators began using the SMART Board and also a partnership with Intel was a key factor that provided the company with needed equity and confidence.  The rest is history!  As SMART Technologies grows as a company, they continue to be cutting edge with both their hardware and software offering educational, corporate, and government solutions.

data warehousing and mining


Organisations are today suffering from a malaise of data overflow.Data mining. The extraction of hidden predictive information from large databases is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions
.Data warehousing and data mining can address a technology that enables the decision-maker to process huge amount of data in a reasonable amount of time and to extract intelligence/knowledge in a near real time. Data mining is only one step in the knowledge discovery process. Other steps include identifying the problem to be solved, collecting and preparing the right data, interpreting and deploying models, and monitoring the results. The real key to success, however, is to have a thorough understanding of your data and of your business. Algorithms can provide meaningful results only when sensibly directed.
DOWNLOAD full document

semantic web



             The problem with majority of data on the web is that it is difficult to use on a large scale, because there is no global system for publishing data in such a way as it can be easily processed by anyone. Everyone using the WWW has the problem that who can you trust to send you e-mails; how can I know s u r e if a transaction really occurred. So the semantic web can be seen as a huge engineering solution… but it is more than that.
             The Semantic Web is a mesh of information linked up in such a way as to be easily procesable by machines, on a global scale. The Semantic Web provides a common framework that allows data to be shared and reused across application. It is a collaborat- ive effort led by W3C. The Semantic Web is about common formats for integration and combination of data drawn from diverse sources, where the original Web mainly concentrates on the interchange of documents.
             The Semantic Web approach instead develops languages for expressing information in a machine processable form. This development of Semantic Web is occurring in atleast two areas: from the infrastructural, all-embracing, position as espoused by the W3C/MIT and other academically -focused organizations.
DOWNLOAD  full document

Claytronics

Claytronics is mainly linked with nanotechnology along with robotics. Gone were the days when we admire the “voice transmission technology”.Days were going when we are thinking of video transmission. And these are the days when we can easily transmit 3-dimensional objects from one place to another place without any medium!!!   
             Yes!!! Medium less transmission of an object is possible through a technology named “CLAYTRONICS”. We can, not only send an object from place to another but also can change the size, shape, color, and all physical properties just by a single instruction using this programmable matter. So by this a white car can be converted to a red car, and then to grey without any effort. The claytronic matter made up of small tiny spherical particles called “catoms”.
DOWNLOD DOCUMENT

IPV6

Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3G networks into all IP networks has made mobile IPv6 an ideal choice to support this kind of handover. However if soft handover is not employed, the latency posed by mobile IPv6 makes it undesirable for providing seamless mobility. This paper presents handover between wireless LAN systems and third generation universal mobile telecommunications system (UMTS) networks using fast mobile IPv6 protocol with preauthentication. The handover is optimized by link-layer triggers based on an efficient handover decision algorithm. Proposed
handover scheme minimizes the power consumption of the mobile devices by reducing the duration for which the two interfaces of the device will be active Download full document

Palm vein technologies

                 Palm vein technologies are one of the upcoming technologies which is highly secure. It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. It is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. Moreover, its contact less feature gives it a hygienic advantage over other biometric authentication technologies.
 The palm secure works by capturing a person’s vein pattern image while radiating it with near-infrared rays. The PalmSecure detects the structure of the pattern of veins on the palm of the human hand with the utmost precision. The sensor emits a near-infrared beam towards the palm of the hand and the blood flowing through these back to the heart with reduced oxygen absorbs this radiation, causing the veins to appear as a black pattern. Download full document

Mobile Computing

Computing has been undergoing a bit of renaissance lately. A Few years ago it was
a simple matter of finding a data compatible mobile phone, a PC card modem, and a matching cable and installing it as modem. Then people started to use PDA’s as well. Cell phones started to come with infrared ports to allow communication with laptops. Then cell phones started to come with modems built in. The connecting methods of mobile computing, its introduction, connection types, factors affecting connections, mobile applications and its limitations are explained
Download full document

3-G Technology

      Third Generation (3G) mobile devices and services will transform wireless communications in to on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand. The first generation of mobile phones consisted of the analog models that emerged in the early 1980s. The second generation of digital mobile phones appeared about ten years later along with the first digital mobile networks. During the second generation, the mobile telecommunications industry experienced exponential growth both in terms of subscribers as well as new types of value-added services. Mobile phones are rapidly becoming the preferred means of personal communication, creating the world's largest consumer electronics industry.

Download full document

3D WATERMARKING ROBUST TO ACCESSIBLE ATTACKS

In this paper we propose a new watermarking approach for 3D polygonal meshes. In the field of multimedia watermarking, mesh watermarking is less advanced than image or video. The main difficulty is due to the irregular structure of  3D meshes that makes them more vulnerable to attacks. To address this issue, we introduce a new criterion –accessibility in the common 3D graphics software-for selecting attacks and propose a list of common attacks based on this criterion. Consequently, in this paper, we consider attacks like cut, change of the format, affine transformation, subdivision and small scale deformation that are usually found in the graphical software. We present several schemes to achieve robustness against these attacks. Watermark embedding is done by perturbing the vertices in their tangent space that provides us invisibility of the watermark. Hiding capacity in this method is as big as the number of the vertices of the
mesh that is usually big enough for expensive 3D meshes Download full document

Nano Technology

To lead a healthy human life, barriers to it are minimized by miracle thinking. This is the special and interesting concept of “inserting a chip into human body” for monitoring and controlling the biological activities of body.
for this purpose,3 chips are placed in the human body.chip1 back ups the data from brain,chip2 monitors the blood vessels and chip3 monitors endocrine glands’ secretions. These chips are controlled and operated externally through control centre.
        download full document