Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
AND
Engineering as it finds its wide range of application in every field not an exception even the medical field. One of the technologies which aid the surgeons to perform even the most complicated surgeries successfully is Virtual Reality. Even though virtual reality is employed to carry out operations the surgeons attention is one of the most important parameter. If he commits any mistakes it may lead to a dangerous end. So, one may think of a technology that reduces the burdens of a surgeon by providing an efficient interaction to the surgeon than VR. Now our dream came to reality by means of a technology called HAPTIC TECHNOLOGY. Haptic is the science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and contact detection were discussed. We mainly focus on Application of Haptic Technology in Surgical Simulation and Medical Training. Further we explained the storage and retrieval of haptic data while working with haptic devices. Also the necessity of haptic data compression is illustrated.
V.L.S.PAULINE
jewellery.Digital jewellery can best be defined as wireless,wearable computers that allow you To communicate by ways of e-mail,voicemail, and voice communication.this paper enlightens on how various computerized jewellery (like ear-rings,necklace,ring,bracelet,etc.,) Will work with mobile embedded intelligence. Even the devices we use are protected by passwords.It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program.This paper discusses about a new java-based,computerized ring that will automatically unlock doors and log on to computers.
While humans have had the innate ability to recognize and distinguish different faces for millions of years, computers are just now catching up. In this paper, we'll learn how computers are turning your face into computer code so it can be compared to thousands, if not millions, of other faces. We'll also look at how facial recognition software is being used in elections, criminal investigations and to secure your personal computer. Facial recognition software falls into a larger group of technologies known as biometrics. Biometrics uses biological information to verify identity. The basic idea behind biometrics is that our bodies contain unique properties that can be used to distinguish us from others. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. A Software company called Visionics developed Facial Recognition software called Faceit. The heart of this facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database. Potential applications even include ATM and check-cashing security, Security Law Enforcement & Security Surveillance and voter database for duplicates. This biometrics technology could also be used to secure your computer files. By mounting a Webcam to your computer and installing the facial recognition software, your face can become the password you use to get into your computer. By implementing this technology and the
normal password security you are getting double security to your valuable data.
Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and in some cases, it is desired that communication be made secret. Consequently, the security of information has become a fundamental issue. The use of authentication processes has been increasing for providing security. As the technology for information transfer is advancing, providing security has become a challenging task. The use of mobiles as a means of communication has become very common. Mobile hacking has also been increasing. Iris recognition technique, to support security in mobile terminals is presented as a model in this paper. Users will now be able to utilize their mobile terminals with security. Because each iris pattern is unique, the eye acts as a pin number for authentication for a mobile phone.
This paper deals with communication through optics using one of the latest technologies called the free space optics (FSO). FSO may sound new and experimental but in fact it predates optical fiber and has its roots in wartime efforts to develop secure communication systems that did not require cable and could withstand radio jamming. As a commercial communications technology, FSO has been around for more than a decade, but it is only recently that interest in this technology has started to grow. It was only recently developed for use in metropolitan area networks. The technology has its roots in military applications that reach back as far as the 1940s. It was not until the 1960s, however, that the first significant FSO technology advancements began to occur in the United States, Europe and Middle East, where military researchers, engineers and technicians applied the use of infrared lasers in communications devices with the aim of providing secure data and voice transmission that would not be susceptible to jamming of radio frequency-based communications systems. These early FSO systems were capable of transmitting merely a handful of kilobits over the air, but the advent of the Internet and its impact on telecommunications was decades away. In fact, European researchers of FSO systems in the 1960s experimented with ways to send FSO signals through both underground and underwater pipes, seeking to bend the invisible light beams with mirrors where a straight line-of-site could not be established.
problems related tomobile devices have gotten more serious.This study investigated a possibility of remotely and securely transferring files between the mobile device and home computer via the Internet, and theinformation security threats related to this. We constructed a setup for secure remote file management. Security of our construction was evaluated with threat analysis and the file server wastested with security testing tools.Based on the evaluation and testing,thesystemconstruction was considered to be secure when properly used. However, new software vulnerabilitiesare discovered daily also for mobile devices. Therefore, the security of the setup weakens if notupdated frequently. Also, changes made to configuration files by the user, poor management of login information and careless use of devices are problems, which cause information security threats.
Bio Cybernics
Deepu Kumar Vuyyuru Santhosh Sri Vasavi College of Engineering Tadepalligudem
Man always wanted to scale new heights of technology in order to make his life better than the best. His thirst for sophisticated life has never come to an end. He always demanded more power, more comfort. In this quest we present you the world of bionics which examines the ways in which technology is inexorably driving us to a new and different level of humanity, Tran humanism. As scientists draw on nanotechnology, molecular biology, artificial intelligence, and innovative bio-materials science, they are routinely using sophisticated surgical techniques to implant computer chips and drug-dispensing devices into our bodies, designing fully functional man-made body parts, and linking human brains with computers to make people healthier, smarter, and stronger. In short, we are going beyond what was once only science fiction to create bionic people with fully integrated artificial components and it will not be long before we reach the ultimate goal of constructing a completely synthetic human-like being. The central idea of bionics is learning from nature, Hence by the bio-mimetic approach we can improve the quality of living. For example an ant can lift a mass i.e. 51 times more than its body weight. Bionics is an interdisciplinary field dealing with BIO-logy and Tech-NICS and is an official science since the sixties approximately. The central idea of bionics can be summarized as learning from nature. Bionics also called Tran humanism in human perspective.
Jakka
NETWORK SECURITY
P.ARUN KUMAR CH.V.RAGHAVENDRA PRAGATI ENGINEERING COLLEGE
Cryptography and Network Security Does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.
There are many aspects to security and many applications, Ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for Secure communications is that of cryptography. Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
HALO NETWORK
(HIGH ALTITUDE LONG OPERATION NETWORKS)
S.R.K.R ENGINEERING COLLEGE P.ESWAR M.KOTESWARA RAO
Broadband wireless millimeter wavelength services provided from a High Altitude Long Operation (HALO) Aircraft are now feasible. Our paper will emphasize the conceptual design of a "bandwidth-on-demand" wireless network whose data rates to and from the subscriber will measure in the multi-megabit per second range. The High Altitude Long Operation Network is a broadband wireless metropolitan area network, with a star topology, whose solitary hub is located in the atmosphere above the service area at an altitude higher than commercial airline traffic. A variety of spectrum bands licensed by the FCC for commercial wireless services could provide the needed millimeter wavelength carrier bandwidth. An attractive choice for the subscriber links is the LMDS (Local MultiBit Data Service)band. The airplane's fuselage can house switching circuitry and fast digital network functions. An MMW (millimeter wavelength) antenna array and its related components will be located in a pod suspended below the aircraft fuselage.. For each isolated city to be served, a fleet of three aircraft will be operated in shifts to achieve around-the-clock service. In deployments where multiple cities will be served from a common primary flight base, the fleet will be sized for allocating, on average, two aircraft per city to be served. Flight operational tactics will be steadily evolved and refined to achieve continuous presence of the node above each city. Many services will be provided, including but not limited to T1 access, ISDN access, Web browsing, high-resolution Video conferencing, large file transfers and Ethernet LAN bridging..
In our paper we present conceptual system architecture of the halo networks. A corresponding reference model is proposed. We discuss the services provided by HALO networks. The advantages of HALO networks are described compared to that of terrestrial networks, and then followed with conclusion remarks.
MINING CH.NARMADA