Sei sulla pagina 1di 9

HAPTIC TECHNOLOGY IN SURGICAL SIMULATION MEDICAL TRAINING.

A.N.V.G.PAVAN KUMAR SRI SAI ADITYA INSTITUTE OF SCIENCE & TECHNOLOGY

AND

D.V.J.MAHESH ADITYA ENGINEERING COLLEGE

Engineering as it finds its wide range of application in every field not an exception even the medical field. One of the technologies which aid the surgeons to perform even the most complicated surgeries successfully is Virtual Reality. Even though virtual reality is employed to carry out operations the surgeons attention is one of the most important parameter. If he commits any mistakes it may lead to a dangerous end. So, one may think of a technology that reduces the burdens of a surgeon by providing an efficient interaction to the surgeon than VR. Now our dream came to reality by means of a technology called HAPTIC TECHNOLOGY. Haptic is the science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and contact detection were discussed. We mainly focus on Application of Haptic Technology in Surgical Simulation and Medical Training. Further we explained the storage and retrieval of haptic data while working with haptic devices. Also the necessity of haptic data compression is illustrated.

DIGITAL JEWELLERY(MADE POSSIBLE USING WIRELESS COMMUNICATIONS)


A.SRAVANI KIET
Mobile computing is beginning to break the chains that tie us to our desks,but many of todays mobile devices can still be a bit awkward to carry around.In the next age of computing,there will be an explosion of computer parts across our bodies,rather than across our desktops.Basically jewellery adorns the body,and has very little practical purpose.The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence i.e., Digital

V.L.S.PAULINE

jewellery.Digital jewellery can best be defined as wireless,wearable computers that allow you To communicate by ways of e-mail,voicemail, and voice communication.this paper enlightens on how various computerized jewellery (like ear-rings,necklace,ring,bracelet,etc.,) Will work with mobile embedded intelligence. Even the devices we use are protected by passwords.It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program.This paper discusses about a new java-based,computerized ring that will automatically unlock doors and log on to computers.

FACIAL RECOGNITION USING THEORY OF BIOMETRICS


SRKR COLLEGE OF ENGINEERING Presented by: P.T.N Sai Kiran K.A.P.S Prakash

While humans have had the innate ability to recognize and distinguish different faces for millions of years, computers are just now catching up. In this paper, we'll learn how computers are turning your face into computer code so it can be compared to thousands, if not millions, of other faces. We'll also look at how facial recognition software is being used in elections, criminal investigations and to secure your personal computer. Facial recognition software falls into a larger group of technologies known as biometrics. Biometrics uses biological information to verify identity. The basic idea behind biometrics is that our bodies contain unique properties that can be used to distinguish us from others. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. A Software company called Visionics developed Facial Recognition software called Faceit. The heart of this facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database. Potential applications even include ATM and check-cashing security, Security Law Enforcement & Security Surveillance and voter database for duplicates. This biometrics technology could also be used to secure your computer files. By mounting a Webcam to your computer and installing the facial recognition software, your face can become the password you use to get into your computer. By implementing this technology and the

normal password security you are getting double security to your valuable data.

MOBILE IRIS RECOGNITION


GMR Institute of Technology Y.B.Rajesh K.Yaswanth

Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and in some cases, it is desired that communication be made secret. Consequently, the security of information has become a fundamental issue. The use of authentication processes has been increasing for providing security. As the technology for information transfer is advancing, providing security has become a challenging task. The use of mobiles as a means of communication has become very common. Mobile hacking has also been increasing. Iris recognition technique, to support security in mobile terminals is presented as a model in this paper. Users will now be able to utilize their mobile terminals with security. Because each iris pattern is unique, the eye acts as a pin number for authentication for a mobile phone.

Data mining:understanding data and disease Modeling


kolla.Hari Priyanka, Pavan Kumar.kolla, Sri mittapalli college of engneering,
Analyzing large data sets requires proper understanding of the data in advance. This would help domain experts to influence the data mining process and to properly evaluate the results of a data mining application. In this paper, we introduce an algorithm to identify anomalies in the data. We also propose an approach to include the results of data characteristics checking in a data mining application. The application, reported in this paper, involves developing a disease model from gene expression data using machine learning techniques. We demonstrate how: (i) simple models can be generated from a large set of attributes and (ii) the structure of the models change, when potentially anomalous cases are removed.

Keywords :Data mining, functional genomics, disease modeling, and bioinformatics.

Free space optics[FSO]


U.K.KARTHIK D.KIRAN KUMAR S.V.H.E.C.

This paper deals with communication through optics using one of the latest technologies called the free space optics (FSO). FSO may sound new and experimental but in fact it predates optical fiber and has its roots in wartime efforts to develop secure communication systems that did not require cable and could withstand radio jamming. As a commercial communications technology, FSO has been around for more than a decade, but it is only recently that interest in this technology has started to grow. It was only recently developed for use in metropolitan area networks. The technology has its roots in military applications that reach back as far as the 1940s. It was not until the 1960s, however, that the first significant FSO technology advancements began to occur in the United States, Europe and Middle East, where military researchers, engineers and technicians applied the use of infrared lasers in communications devices with the aim of providing secure data and voice transmission that would not be susceptible to jamming of radio frequency-based communications systems. These early FSO systems were capable of transmitting merely a handful of kilobits over the air, but the advent of the Internet and its impact on telecommunications was decades away. In fact, European researchers of FSO systems in the 1960s experimented with ways to send FSO signals through both underground and underwater pipes, seeking to bend the invisible light beams with mirrors where a straight line-of-site could not be established.

Information Security of Remote FileTransfers with Mobile Devices


SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN N.sravani B.Sravika
Recent evolution of mobile technologies has opened new use possibilities for mobile devices. At the same time information security

problems related tomobile devices have gotten more serious.This study investigated a possibility of remotely and securely transferring files between the mobile device and home computer via the Internet, and theinformation security threats related to this. We constructed a setup for secure remote file management. Security of our construction was evaluated with threat analysis and the file server wastested with security testing tools.Based on the evaluation and testing,thesystemconstruction was considered to be secure when properly used. However, new software vulnerabilitiesare discovered daily also for mobile devices. Therefore, the security of the setup weakens if notupdated frequently. Also, changes made to configuration files by the user, poor management of login information and careless use of devices are problems, which cause information security threats.

Bio Cybernics
Deepu Kumar Vuyyuru Santhosh Sri Vasavi College of Engineering Tadepalligudem
Man always wanted to scale new heights of technology in order to make his life better than the best. His thirst for sophisticated life has never come to an end. He always demanded more power, more comfort. In this quest we present you the world of bionics which examines the ways in which technology is inexorably driving us to a new and different level of humanity, Tran humanism. As scientists draw on nanotechnology, molecular biology, artificial intelligence, and innovative bio-materials science, they are routinely using sophisticated surgical techniques to implant computer chips and drug-dispensing devices into our bodies, designing fully functional man-made body parts, and linking human brains with computers to make people healthier, smarter, and stronger. In short, we are going beyond what was once only science fiction to create bionic people with fully integrated artificial components and it will not be long before we reach the ultimate goal of constructing a completely synthetic human-like being. The central idea of bionics is learning from nature, Hence by the bio-mimetic approach we can improve the quality of living. For example an ant can lift a mass i.e. 51 times more than its body weight. Bionics is an interdisciplinary field dealing with BIO-logy and Tech-NICS and is an official science since the sixties approximately. The central idea of bionics can be summarized as learning from nature. Bionics also called Tran humanism in human perspective.

Jakka

Network Security Through Biometrics


A.PUSHPA LATHA VISHAL KUMAR

GAYATRI VIDYA PARISHAD COLLEGE OF ENGINEERING VISAKHAPATNAM


Network Security is Protection of networks and their services from unauthorized modification, destruction, or disclosure. It provides assurance to the network which performs its critical functions correctly and there are no harmful side-effects. This term is used to describe all aspects of securing your computer or computers from unauthorized access. This includes blocking outsiders from getting into the network at all, as well as password protecting your computers and ensuring that only authorized users can view sensitive data. Network Security now takes a giant loop as biometrics, a form of authentication using unique physical traits of the user, enhances it towards the better. Biometrics -- Technology that identifies you based on your physical or behavioral traits -- for added security. Biometrics is used to describe all aspects of securing your computer or computers from unauthorized access. This includes blocking outsiders from getting into the network at all, as well as password protecting your computers and ensuring that only authorized users can view sensitive data. Unlike a password, a hacker cannot guess your fingerprint or retinal scan pattern. Biometrics is a relatively new term used to refer to fingerprinting, retinal scans, voice wave patterns and various other unique biological traits used to authenticate users. In this growing world the need for unique identification is very important and this can be ensured only by biometrics. The need for Biometrics in the present world is that the modern rapid advancements in networking, communication and mobility increased the need of reliable ways to verify the identity of any person.

NETWORK SECURITY
P.ARUN KUMAR CH.V.RAGHAVENDRA PRAGATI ENGINEERING COLLEGE
Cryptography and Network Security Does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.

There are many aspects to security and many applications, Ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for Secure communications is that of cryptography. Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

HALO NETWORK
(HIGH ALTITUDE LONG OPERATION NETWORKS)
S.R.K.R ENGINEERING COLLEGE P.ESWAR M.KOTESWARA RAO

Broadband wireless millimeter wavelength services provided from a High Altitude Long Operation (HALO) Aircraft are now feasible. Our paper will emphasize the conceptual design of a "bandwidth-on-demand" wireless network whose data rates to and from the subscriber will measure in the multi-megabit per second range. The High Altitude Long Operation Network is a broadband wireless metropolitan area network, with a star topology, whose solitary hub is located in the atmosphere above the service area at an altitude higher than commercial airline traffic. A variety of spectrum bands licensed by the FCC for commercial wireless services could provide the needed millimeter wavelength carrier bandwidth. An attractive choice for the subscriber links is the LMDS (Local MultiBit Data Service)band. The airplane's fuselage can house switching circuitry and fast digital network functions. An MMW (millimeter wavelength) antenna array and its related components will be located in a pod suspended below the aircraft fuselage.. For each isolated city to be served, a fleet of three aircraft will be operated in shifts to achieve around-the-clock service. In deployments where multiple cities will be served from a common primary flight base, the fleet will be sized for allocating, on average, two aircraft per city to be served. Flight operational tactics will be steadily evolved and refined to achieve continuous presence of the node above each city. Many services will be provided, including but not limited to T1 access, ISDN access, Web browsing, high-resolution Video conferencing, large file transfers and Ethernet LAN bridging..

In our paper we present conceptual system architecture of the halo networks. A corresponding reference model is proposed. We discuss the services provided by HALO networks. The advantages of HALO networks are described compared to that of terrestrial networks, and then followed with conclusion remarks.

DATA WAREHOUSE &DATA CH.BHARGAVI

MINING CH.NARMADA

MADHIRA INSTITUTIONS OF TECHNOLOGIES AND SCIENCES


We live in the age of information. Data is the most valuable resource of an enterprise. In todays competitive global business environment, understanding and managing enterprise wide information is crucial for making timely decisions and responding to changing business conditions. Many companies are realizing a business advantage by leveraging one of their key assets business Data. There is a tremendous amount of data generated by day-to-day business operational applications. In addition there is valuable data available from external sources such as market research organizations, independent surveys and quality testing labs. Studies indicate that the amount of data in a given organization doubles every 5 years. Data warehousing has emerged as an increasingly popular and powerful concept of applying information technology to turn these huge islands of data into meaningful information for better business. Data mining, the extraction of hidden predictive information from large databases is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This paper describes the practicalities and the constraints in Data mining and Data warehousing and its advancements from the earlier technologies.

Potrebbero piacerti anche