Sixth Sense Technology

ABSTRACT

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand. Also can access or manipulate the information using fingers make a call by Extend hand on front of the projector and numbers will appear for to click know the time by Draw a circle on wrist and a watch will appear. take a photo by Just make a square with fingers, highlighting what want to frame, and the system will make the photo which can later organize with the others using own hands over the air.

The device has a huge number of applications, it is portable and easily to carry as can wear it in neck. The drawing application lets user draw on any surface by observing the movement of index finger. Mapping can also be done anywhere with the features of zooming in or zooming out. The camera also helps user to take pictures of the scene is viewing and later can arrange them on any surface. Some of the more practical uses are reading a newspaper reading a newspaper and viewing videos instead of the photos in the paper. Or live sports updates while reading the newspaper. The device can also tell arrival, departure or delay time of air plane on tickets. For book lovers it is nothing less than a blessing. Open any book and find the Amazon ratings of the book. To add to it, pick any page and the device gives additional information on the text, comments and lot more add on feature.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

Nokia Morph Technology

ABSTRACT

In business a product could have a shorter life if it can’t win the hearts of people and showcase new technology, so Nokia is coming up with the Nokia Morph flexible mobile phone which the company claims include nanotechnology and would immensely benefit its end-users. The main benefit of Nanotechnology is that its components are flexible, transparent and extremely strong. The company believes this latest technology would be a distinctive phone by 2015, but a few technical glitches remain to be solved, like the use of new battery materials etc.

Nokia morph is a joint technology concept, developed by Nokia Research Center (NRC) and the University of Cambridge (UK). The morph demonstrate how future mobile device might be stretchable and flexible, allowing the user to transform their mobile devices into radically different shaped. It demonstrates the ultimately that nanotechnology might be capable of delivering: flexible material, transparent electronics and self-cleaning surface. Fibril proteins are woven into three dimensional meshes that reinforce thin elastic structures. Using the same principle behind spider silk, this elasticity enables the device to literally changes shapes and configure itself to adapt to the task at hand.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Confidential Data Storage and Deletion

ABSTRACT

With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions.

This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Skinput

ABSTRACT

Skinput is an input technology that uses bio-acoustics sensing to localize finger taps on the skin. When augmented with a pico projector, the device can provide a direct manipulation, graphical user interface on the body. The technology was developed by Chris Harrison, Desney Tan and Dan Morris at Microsoft Research’s Computational User experience Group.

Skinput represents one way to decouple input from electronic devices with the aim of allowing devices to become smaller without simultaneously shrinking the surface area on which input can be performed. While other systems, like Sixth sense have attempted this with computer vision, Skinput employs acoustics, which take the advantage of the human body’s natural sound conductive properties. This allows the body to be annexed as an input surface without the need for the skin to be invasively instrumented with sensors, tracking, markers, or other items.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Femtocells Technology

ABSTRACT

      Femtocells, a technology little-known outside the wireless world, promise better indoor cellular service. In telecommunication, a Femtocell is a small cellular base station, typically designed for use in a home or small business. It connects to the service provider’s network via broadband. Current designs typically support 2 to 4 active mobile phones in a residential setting, and 8 to 16 active mobile phones in enterprise settings. A Femtocell allows service providers to extend service coverage indoors, especially where access would otherwise be limited or unavailable. For a mobile operator, the attractions of a Femtocell are improvements to both coverage and capacity, especially indoors. This can reduce both capital expenditure and operating expense.

      A Femtocell is typically the size of a residential gateway or smaller, and connects into the end-user’s broadband line. Once plugged in, the Femtocell connects to the MNO’s mobile network, and provides extra coverage in a range of typically 30 to 50 meters for residential Femtocells.

      The end-user must declare which mobile phone numbers are allowed to connect to his/her Femtocell, usually via a web interface provided by the MNO. When these mobile phones arrive under coverage of the Femtocell, they switch over from the Macrocell (outdoor) to the Femtocell automatically. Most MNOs provide means for the end-user to know this has happened, for example by having a different network name appear on the mobile phone. All communications will then automatically go through the Femtocell. When the end-user leaves the Femtocell coverage (whether in a call or not), his phone hands over seamlessly to the macro network.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

APPLE – A Novel Approach for Direct Energy Weapon Control

ABSTRACT

Adaptive photonic based phase locked elements (APPLE) is Raytheon’s DARPA development initiative. The initiative is for development of a directed energy weapon that utilizes a beam combining technique for the achievement of high power. It will integrate the laser enabled weapon applications into unmanned aerial vehicles. The APPLE program is to enable all electronic combining of high-power laser engraver beams within an agile, conformal aperture-a practical approach to synthesizing high-power weapon laser engravers from low-power modules for applications such as laser radar, laser target designation, laser communications, and weapons grade lasers. The idea is to provide electro-optical systems with the same mission flexibility and performance that microwave phased arrays provide for RF applications such as radar and electronic warfare systems.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Embedded OS for Real-Time Applications

ABSTRACT

The advent of microprocessors has opened up several product opportunities that simply did not exist earlier. These intelligent processors have invaded and embedded themselves into all fields of our lives be it the kitchen (food processors, microwave ovens), the living rooms (televisions, air conditioners) or the work places (fax machines, pagers, laser printer, credit card readers) …etc.

As the complexities in the embedded applications increase, use of an operating system brings in lot of advantages. Most embedded systems also have real-time requirements demanding the use of Real time Operating Systems (RTOS) capable of meeting the embedded system requirements. Real-time Operating System allows realtime applications to be designed and expanded easily. The use of an RTOS simplifies the design process by splitting the application code into separate tasks. An RTOS allows one to make better use of the system recourses by providing with valuable services such as semaphores, mailboxes, queues, time delays, time outs…etc.

This report looks at the basic concepts of embedded systems, operating systems and specifically at Real Time Operating Systems in order to identify the features one has to look for in an RTOS before it is used in a real-time embedded application. Some of the popular RTOS have been discussed in brief, giving their salient features, which make them suitable for different applications.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Zone Based Ant Colony Routing In MANET

ABSTRACT

Ant colony optimization (ACO) is a stochastic approach for solving combinatorial optimization problems like routing in computer networks. The idea of this optimization is based on the food accumulation methodology of the ant community. Position based routing algorithms (POSANT) had some significant loopholes to find route like it never guarantees the route would be the shortest one, in cases while it is able to find it. The routing algorithms which are based on ant colony optimization find routing paths that are close in length to the shortest paths. The drawback of these algorithms is the large number of control messages that needs to be sent or the long delay before the routes are established from a source to a destination.This paper presents a new routing algorithm for mobile ad hoc network by combining the concept of Ant Colony approach and Zone based routing approach using clustering to get shortest path with small number of control messages to minimize the overhead. Also this shows that zone based ant colony routing algorithm using cluster is more efficient than POSANT routing algorithm by comparative Overhead study of POSANT and Zone based Ant using clustering concept with respect to varying Node Number, Zone Size and Mobility.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony

ABSTRACT

SPam over Internet Telephony (SPIT) is a potential source of future annoyance in Voice over IP (VoIP) systems. A typical way to launch a SPIT attack is the use of an automated procedure (i.e., bot), which generates calls and produces unsolicited audio messages. A known way to protect against SPAM is a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). In this paper, we evaluate existing audio CAPTCHA, as this type of format is more suitable for VoIP systems, to help them fight bots. To do so, we first suggest specific attributes-requirements that an audio CAPTCHA should meet in order to be effective. Then, we evaluate this set of popular audio CAPTCHA, and demonstrate that there is no existing implementation suit-able enough for VoIP environments. Next, we develop and implement a new audio CAPTCHA, which is suitable for SIP-based VoIP telephony. Finally, the new CAPTCHA is tested against users and bots and demonstrated to be efficient.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Trends in Optical Switching Techniques

ABSTRACT

We are currently witnessing a strong worldwide push toward bringing fiber closer to individual homes and businesses. The emerging FTTX access networks will move the bandwidth bottleneck from the first/last mile toward metropolitan and wide area networks, creating a need for efficient optical-switching mechanisms. In this article, we review the current trends in optical switching that help to improve the bandwidth efficiency, as well as to decrease the cost and power consumption of next-generation optical networks. Our review provides an overview of the optical switching domain and facilitates the understanding of newly emerging switching techniques and their interpretation as derivatives of the presented main optical switching trends.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,313 other followers