Sixth Sense Technology

ABSTRACT

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand. Also can access or manipulate the information using fingers make a call by Extend hand on front of the projector and numbers will appear for to click know the time by Draw a circle on wrist and a watch will appear. take a photo by Just make a square with fingers, highlighting what want to frame, and the system will make the photo which can later organize with the others using own hands over the air.

The device has a huge number of applications, it is portable and easily to carry as can wear it in neck. The drawing application lets user draw on any surface by observing the movement of index finger. Mapping can also be done anywhere with the features of zooming in or zooming out. The camera also helps user to take pictures of the scene is viewing and later can arrange them on any surface. Some of the more practical uses are reading a newspaper reading a newspaper and viewing videos instead of the photos in the paper. Or live sports updates while reading the newspaper. The device can also tell arrival, departure or delay time of air plane on tickets. For book lovers it is nothing less than a blessing. Open any book and find the Amazon ratings of the book. To add to it, pick any page and the device gives additional information on the text, comments and lot more add on feature.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

Nokia Morph Technology

ABSTRACT

In business a product could have a shorter life if it can’t win the hearts of people and showcase new technology, so Nokia is coming up with the Nokia Morph flexible mobile phone which the company claims include nanotechnology and would immensely benefit its end-users. The main benefit of Nanotechnology is that its components are flexible, transparent and extremely strong. The company believes this latest technology would be a distinctive phone by 2015, but a few technical glitches remain to be solved, like the use of new battery materials etc.

Nokia morph is a joint technology concept, developed by Nokia Research Center (NRC) and the University of Cambridge (UK). The morph demonstrate how future mobile device might be stretchable and flexible, allowing the user to transform their mobile devices into radically different shaped. It demonstrates the ultimately that nanotechnology might be capable of delivering: flexible material, transparent electronics and self-cleaning surface. Fibril proteins are woven into three dimensional meshes that reinforce thin elastic structures. Using the same principle behind spider silk, this elasticity enables the device to literally changes shapes and configure itself to adapt to the task at hand.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Confidential Data Storage and Deletion

ABSTRACT

With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions.

This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Skinput

ABSTRACT

Skinput is an input technology that uses bio-acoustics sensing to localize finger taps on the skin. When augmented with a pico projector, the device can provide a direct manipulation, graphical user interface on the body. The technology was developed by Chris Harrison, Desney Tan and Dan Morris at Microsoft Research’s Computational User experience Group.

Skinput represents one way to decouple input from electronic devices with the aim of allowing devices to become smaller without simultaneously shrinking the surface area on which input can be performed. While other systems, like Sixth sense have attempted this with computer vision, Skinput employs acoustics, which take the advantage of the human body’s natural sound conductive properties. This allows the body to be annexed as an input surface without the need for the skin to be invasively instrumented with sensors, tracking, markers, or other items.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Femtocells Technology

ABSTRACT

      Femtocells, a technology little-known outside the wireless world, promise better indoor cellular service. In telecommunication, a Femtocell is a small cellular base station, typically designed for use in a home or small business. It connects to the service provider’s network via broadband. Current designs typically support 2 to 4 active mobile phones in a residential setting, and 8 to 16 active mobile phones in enterprise settings. A Femtocell allows service providers to extend service coverage indoors, especially where access would otherwise be limited or unavailable. For a mobile operator, the attractions of a Femtocell are improvements to both coverage and capacity, especially indoors. This can reduce both capital expenditure and operating expense.

      A Femtocell is typically the size of a residential gateway or smaller, and connects into the end-user’s broadband line. Once plugged in, the Femtocell connects to the MNO’s mobile network, and provides extra coverage in a range of typically 30 to 50 meters for residential Femtocells.

      The end-user must declare which mobile phone numbers are allowed to connect to his/her Femtocell, usually via a web interface provided by the MNO. When these mobile phones arrive under coverage of the Femtocell, they switch over from the Macrocell (outdoor) to the Femtocell automatically. Most MNOs provide means for the end-user to know this has happened, for example by having a different network name appear on the mobile phone. All communications will then automatically go through the Femtocell. When the end-user leaves the Femtocell coverage (whether in a call or not), his phone hands over seamlessly to the macro network.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

APPLE – A Novel Approach for Direct Energy Weapon Control

ABSTRACT

Adaptive photonic based phase locked elements (APPLE) is Raytheon’s DARPA development initiative. The initiative is for development of a directed energy weapon that utilizes a beam combining technique for the achievement of high power. It will integrate the laser enabled weapon applications into unmanned aerial vehicles. The APPLE program is to enable all electronic combining of high-power laser engraver beams within an agile, conformal aperture-a practical approach to synthesizing high-power weapon laser engravers from low-power modules for applications such as laser radar, laser target designation, laser communications, and weapons grade lasers. The idea is to provide electro-optical systems with the same mission flexibility and performance that microwave phased arrays provide for RF applications such as radar and electronic warfare systems.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Embedded OS for Real-Time Applications

ABSTRACT

The advent of microprocessors has opened up several product opportunities that simply did not exist earlier. These intelligent processors have invaded and embedded themselves into all fields of our lives be it the kitchen (food processors, microwave ovens), the living rooms (televisions, air conditioners) or the work places (fax machines, pagers, laser printer, credit card readers) …etc.

As the complexities in the embedded applications increase, use of an operating system brings in lot of advantages. Most embedded systems also have real-time requirements demanding the use of Real time Operating Systems (RTOS) capable of meeting the embedded system requirements. Real-time Operating System allows realtime applications to be designed and expanded easily. The use of an RTOS simplifies the design process by splitting the application code into separate tasks. An RTOS allows one to make better use of the system recourses by providing with valuable services such as semaphores, mailboxes, queues, time delays, time outs…etc.

This report looks at the basic concepts of embedded systems, operating systems and specifically at Real Time Operating Systems in order to identify the features one has to look for in an RTOS before it is used in a real-time embedded application. Some of the popular RTOS have been discussed in brief, giving their salient features, which make them suitable for different applications.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,361 other followers