Search This Blog

Monday, April 14, 2014

PREDICTING EARTHQUAKES THROUGH DATA MINING




ABSTRACT:


Data mining consists of evolving set of techniques that can be used to extract valuable information and knowledge from massive volumes of data. Data mining research &tools have focused on commercial sector applications. Only a fewer data mining research have focused on scientific data. This paper aims at further data mining study on scientific data. This paper highlights the data mining techniques applied to mine for surface changes over time (e.g. Earthquake rupture). The data mining techniques help researchers to predict the changes in the intensity of volcano’s. This paper uses predictive statistical models that can be applied to areas such as seismic activity, the spreading of fire. The basic problem in this class of systems is unobservable dynamics with respect to earthquakes. The space-time patterns associated with time, location and magnitude of the sudden events from the force threshold are observable. This paper highlights the observable space time earthquake patterns from unobservable dynamics using data mining techniques, pattern recognition and ensemble forecasting.  Thus this paper gives insight on how data mining can be applied in finding the consequences of earthquakes and hence alerting the public


  

DATA WAREHOUSING NEW CONCEPT






ABSTRACT:
Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate of data capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time.
The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".

         Our paper focuses on the need for information repositories and discovery of knowledge and thence the overview of, the so hyped, Data Warehousing and Data Mining.

DATA MANNING AND WAREHOUSING


ABSTRACT
The concept of Data Mining is becoming increasingly popular as a business information management tool where it is expected to reveal knowledge structures that can guide decisions in conditions of limited certainty.
                  Data Mining is more oriented towards applications than the basic nature of the underlying phenomena. For example, uncovering the nature of the underlying functions or the specific types of interactive, multivariate dependencies between variables are not the main goal of Data Mining. Instead,


the focus is on producing a solution that can generate useful prediction Therefore, Data Mining accepts among others a "black box" approach to data exploration or knowledge discovery and uses not only the traditional Exploratory Data Analysis (EDA) techniques, but also such techniques as Neural Networks which can generate valid predictions but are not capable of identifying the specific nature of the interrelations between the variables on which the predictions are based. 

Future polling system using cloud computing in support with smart client technology



Abstract :
The cloud computing has become more popular these days. Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections, software and services that can be accessed over internet. This paper proposes the usage of cloud computing in E-polling. The main aim of this project is to avoid fake votes in polling by having a cloud database about the voters. Thumb impression of candidates is used for authentication. A candidate can vote at any place irrespective of his polling booth, and can vote through mobile phones. We have used the min- min average algorithm to increase the communication workflow in cloud. The cloud computing relies on the internet. When the internet connection fails it does not work with mobile phone. Our system is implemented using cloud computing and biometrics. Cloud computing is a paradigm in which virtualized resource are provided as a service over the internet to the cloud user. Users need not have knowledge of, expertise in or over technologies infrastructure in the “cloud” that supports them. Biometric identification refers to identifying an individual based on his/her distinguishing physiological and or behavioral characteristics. Our system uses thumb print as distinguishable factor. Cloud computing refers to the next evolution of the Internet. Instead of buying software, installing it on your computer, upgrading it periodically and storing all your data on your hard drive, with cloud computing you use software applications online, as a service. All you need is your computing device and an Internet connection. The cloud computing thus can be used in polling system. We have introduced the smart client technology to overcome this difficulty in mobile phones
Keywords - Cloud Computing, Smart Client, E-polling, Biometrics.




COLOR IMAGE SEGMENTATION TECHNIQUE USING MINIMUM SPANNING TREE BASED NATURAL GROUPING OF PIXELS WITH AUTOMATED SEED SELECTION


Abstract

This paper focuses on the problem Image Segmentation which aims at subdividing a given image into its constituent objects. Here an unsupervised method for color image segmentation is proposed where we first perform a Minimum Spanning Tree (MST) based “natural grouping” of the image pixels to find out the clusters of the pixels having RGB values within a certain range present in the image. Then the pixels nearest to the centers of those clusters are found out and marked as the seeds. They are then used for region growing based image segmentation purpose. After that a region merging based segmentation method having a suitable threshold is performed to eliminate the effect of over segmentation that may still persist after the region growing method. This proposed method is unsupervised as it does not require any prior informationabout the number of regions present in a given image. The experimental results show that the proposed method can find homogeneous regions present in a given image efficiently.
 Keywords: Segmentation, Region Growing, Natural Grouping.

ZIGBEE TECHNOLOGY




ABSTRACT:

                        ZigBee is designed for wireless controls and sensors.  It could be built into just about anything you have around your home or office, including lights, switches, doors and appliances.  These devices can then interact without wires, and you can control them all . . . from a remote control or even your mobile phone

                        Although ZigBee's underlying radio-communication technology isn't revolutionary, it goes well beyond single-purpose wireless devices, such as garage door openers and "The Clapper" that turns light on and off.  It allows wireless two-way communications between lights and switches, thermostats and furnaces, hotel-room air-conditioners and the front desk, and central command posts.

                       It travels across greater distances and handles many sensors that can be linked to perform different tasks.   Figure 1 below gives a great example of how ZigBee can be applied.



VOICE OVER INTERNET PROTOCOL (SECURITY)




ABSTRACT


What is VOIP?

Voice over Internet Protocol (Voice over IP, VoIP) is any of a family of methodologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

As VoIP becomes more popular, VoIP security continues to be stressed as a key to advancement of this technology, especially since it will thrive in the realm of the World Wide Web. There are, however, advances in VoIP security that have been utilized by VoIP providers in order to ensure protection of customer's personal information.

space mouse



Abstract:

Space mouse opens a new age for man-machine communication. This device is based on the technology used to control the first robot in space and has been adapted for a wide range of tasks including mechanical design, real time video animation and visual simulation. It has become a standard input device for interactive motion control of three-dimensional graphic objects in up to six degrees of freedom. Space mouse works with standard serial mouse interface without an additional power supply. The ergonomic design allows the human hand to rest on it without fatigue. Thus flying an object in six degrees of freedom is done without any strain.

NEURAL NETWORK ARCHITECTURE FOR RECOGNITION OF RUNNING HANDWRITING




ABSTRACT

Handwriting recognition has been a problem that computers are not efficient at. This is obviously due to the varying writing styles that exist. Today, efficient handwriting recognition is limited to ones, using hardware like light pens wherein the strokes are directly detected and the character is recognized.  But if you want to convert a handwritten document to digital text, we have to extract the characters and then recognize the extracted character. But the problem with this approach is that there are not many algorithms that could efficiently extract characters from a sentence. Therefore character recognition using software is still not as efficient as it could be.

NETWORK SECURITY - QUANTUM CRYPTOGRAPHY



ABSTRACT


     Why do we need a Network Security? Because in networked systems, the major security risks occur while conducting business on the Net; The following are some of the security risks occur: unauthorized access, Eavesdropping, Password sniffing, spoofing-spoofing, Denial of Service, virus attack, System modification, Data modification, Repudiation, E-mail bombing. One of the Methods to secure the information is Cryptography. Controls to protect data transmitted over the telecommunication lines, is mainly through appropriate Encryption techniques. The subject Cryptography deals with the encryption and decryption procedures. Encryption is the process of scrambling information so that it becomes unintelligible and can be unscrambled (reversed) only by using keys. Encryption is the achieved using a Symmetric Encryption or Asymmetric Encryption. In Symmetric Encryption (Single-key Cryptography), a single key is used encrypt as well as to decrypt. In Asymmetric Encryption (Public-key cryptography), two keys namely public and private key are used for encryption and decryption. The paper presentation is on the Network security-Quantum cryptography. Quantum cryptography is a new method, which is efficient and fastest of all methods to secure the information. In this Quantum cryptography, main concept is Quantum theory of light, polarization, the foundation of Quantum cryptography lies in the Heidelberg’s uncertainty principle which states that certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value of other. Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. 

Security Aspects in Mobile Ad Hoc Network

Security Aspects in Mobile Ad Hoc Network
         


ABSTRACT:

Mobile  Ad  hoc  networks  (MANETs)  are  a  new  paradigm  of  wireless  network,  offering   unrestricted  mobility  without  any  underlying  infrastructure  such  as  base  station  or  mobile switching  centers.  Basically  ad  hoc  network  is  a  collection  of   nodes  communicating  with  each  other  by  forming  a  multi-hop  network. In a mobile ad hoc network, it is much more vulnerable to  attacks  than  a  wired  network  due  to  its  limited  physical  security,  dynamically  changing  network  topology,  energy  constrained  operations  and  lack  of  centralized  administration. Since  all  the  nodes  in  the  network  collaborate  to  forward  the  data,  the wireless channel  is prone  to active and passive attacks by  malicious  nodes,  such  as  Denial  of  Service  (DoS), eavesdropping,  spoofing,  etc.  The  intent  of  this  paper  is  to investigate  the  security  goal,  security  challenges  and  different types of active and passive attacks on MANETs.

MOBILE COMPUTING


                 


ABSTRACT


Mobile computing refers to the use of any kind of computer in a moving environment. The motion may be of the device itself, as in laptops, palmtops, wearable computers, and mobile phones; or it may refer to the dynamics of the computing process, as in digital cameras, pod casters and MP3 players. Mobile computing devices generally use wireless technologies such as LAN, Wi-Fi, GPRS and the more recently introduced MAN. The rise of Windows Mobile corresponds with a rising demand for open, device-neutral mobile platforms that deliver always-available capability, access to corporate networks and databases, easy synchronization between mobile devices and servers, improved data integrity and security, and rapid workflow.

GPS AND GPRS BASED AUTOMATED ATTENDANCE SYSTEM


                                                                                   
                                                                                                     


ABSTRACT

 The main aim of this paper is to develop an accurate, fast and very efficient automatic attendance system using GPS and GPRS technique. In this paper we have tried to explain a new type of attendance system which overcomes the present RFID as well as FINGERPRINT technology. We propose a system in which fingerprint and location verification of the person(s) is done .The system that automates the whole process of taking attendance, Manually which is a laborious and troublesome work and waste a lot of time, with its managing and maintaining the records for a period of time is also a burdensome task. The experimental result shows that the proposed system is highly efficient in verification of user finger print and their location.

DATA WAREHOUSING & MINING



Abstract

This paper examines the possibility of using data warehousing technique in the construction industry to integrate various functional and operational databases which are usually scattered across multiple, dispersed and fragmented departments, units or project sites. The concept of data warehousing is explained with the help of several examples and an insight is provided to the reference architecture of a generic data warehouse. At the end, an example on the design of a data warehouse for building developers is provided Organizations getting larger and amassing ever increasing amounts of data. Data warehousing concept is mainly used to develop decision support systems (DSS ) data warehousing is a collection of decision support technologies, aimed at enabling the knowledge worker (executive, manager, and analyst) to make better and faster decisions. Many organizations are committing considerable human, technical, and financial resources to building and using data warehouses. However, data scattered across multiple sources, in multiple formats. Data warehousing has emerged as an effective mechanism for converting data into useful information. It is an improved approach to integrate data from multiple, often very large, distributed, heterogeneous databases and other information sources. Data warehousing is one of the most important recent developments in the filed of information system. Data warehousing technologies have already been successfully deployed in many industries.

“BRAINGATE SYSTEM”




ABSTRACT:
The mind-to-movement system that allows a quadriplegic man to control a computer using only his thoughts is a scientific milestone. It was reached, in large part, through the brain gate system. This system has become a boon to the paralyzed. The Brain Gate System is based on Cyber kinetics platform technology to sense, transmit, analyze and apply the language of neurons. The principle of operation behind the Brain Gate System is that with intact brain function, brain signals are generated even though they are not sent to the arms, hands and legs.The signals are interpreted and translated into cursor movements, offering the user an alternate Brain Gate pathway to control a computer with thought,just as individuals who have the ability to move their hands use a mouse.



"BIONIC EYE”




ABSTRACT
     Here, we present a description of a block scheme, specific features of design
and results of testing for a prototype of a bionic eye, types of them and its applications. The bionic eye is intended to provide vision, partially to the visually impaired by use of the modern day electronics devices like CCD cameras. The comprises a computer chip that sits in the back of the individual's eye, linked up to a mini video camera built into glasses that they wear. Images captured by the camera are beamed to the chip, which translates them into impulses that the brain can interpret. Although the images produced by the artificial eye were far from perfect, they could be clear enough to allow someone who is otherwise blind to recognize faces. The paper discusses the differences working methodologies used in each . During the tests and the clinical trails, this device made six blind people to regain their vision partially. The potential advantage of using bionic eye is to be able remove the blindness completely by making the advances in the present research and improving manufacturing technologies. This break through is likely to benefit approximately one core world population who suffer from the most common causes of blindness, Retinitis Pimentos, Macular Degeneration. The implant bypasses the  diseased cells in the retina and stimulates the remaining viable cells. This is a piece of technology and really has the potential to change people's lives. But we need to be aware it is still some way in the future.

A METHOD FOR TRUST MANAGEMENT USING DATA COLORING BY DATA


  

ABSTRACT:

With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing covers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users0 embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.

4G TECHNOLOGY


ABSTRACT

 The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation) systems and to provide a wide variety of new services, from high-quality voice to high-definition video to high-data-rate wireless channels. The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms used to describe 4G is MAGIC—Mobile multimedia, Anytime anywhere, Global mobility support, Integrated wireless solution, and Customized personal service. As a promise for the future, 4G systems, that is, cellular broadband wireless access systems, have been attracting much interest in the mobile communication arena. The 4G systems not only will support the next generation of mobile service, but also will support the fixed wireless networks.

3D password for more secure authentication



ABSTRACT
Current authentication systems suffer from many weaknesses.  Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this paper, we present and evaluate our contribution, i.e., the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space. 


BIOMETRICS



ABSTRACT:
Biometrics refers to the automatic identification of a person based on his/her physiological/behavioral characteristics i.e we all have unique personal attributes that can be used for distinctive identification purposes including Face, Iris, Retina pattern, Fingerprint, Handprint, DNA, Gaits, Keystrokes, Voice, Thermograms, Skin Reflectance etc. Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and can also potentially prevent unauthorized access to or fraudulent use of ATMs, Cellular phones, Smart cards, PCs, Workstations and Computer networks. Although biometrics is still in its infancy, biometric systems will play a critical role in the future of security.

A Biometric-Based Authentication System for Web Services Mobile User





ABSTRACT
Web Services are improving rapidly and intended to provide exchanging of information between systems over the network. Many services are introduced to users as web services; therefore, high security solution is needed to protect users’ privacy and confidentiality. The need for strong security systems increases in case of mobile web services, since mobile users are more exposed to security threats. In this paper, we introduce and propose a biometric encryption to mobile web services authentication based on iris. The user iris will be used to regenerate the user’s encryption key on-the-fly on each time the user needs to be authenticated. This key is stronger than passwords and shorter than biometric data, which balances between security and performance.



BIOCHIPS


                         
                  1.ABSTRACT

“A single electronic card may replace everything in your wallet including. . .
. . . your cash
. . . your credit cards
. . . your ATM card
. . . your ID cards
. . . your insurance
. . . and your life
FUTURE One card, or one chip, with your life on it.”

Biochips”-The most exciting future technology is an outcome of the fields of Computer science, Electronics & Biology. Its a new type of bio-security device to accurately track information regarding what a person is doing, and who is to accurately track information regarding what he is doing, and who is actually doing it. It’s no more required with biochips the good old idea of remembering  pesky PINs, Passwords, & Social security numbers .No more matters of carrying medical records to a hospital, No more cash/credit card carrying to the market place; everything goes embedded in the chip…. Every thing goes digitalized. No more hawker tricks on the internet….! Biochip has a variety technique for secured E-money transactions on the net. The power of biochips exists in capability of locating lost children, downed soldiers, and wandering Alzheimer patients.

Our contributions to this paper lie in the aspects of
                                                                        “Implementation of Glucose detector in  Biochips”
                                                                        “Implementation of Oxygen sensor in Biochips”
                                                                        “Implementation of Blood pressure sensor in Biochips”
                                                                  “Proposal of Solution for the typical theft problem faced by the   
    Biochips”

The four contributions have been discussed in detail with the proposed principles for implementation of the concepts.



GREEN COMPUTING

              

ABSTRACT:

                    Introduction on green computing,origins,government support for green computing,industry,product longevity,goals of green computing,software and development optimization for green computing,resource allocation,virtualization,how the terminal server used in green computing,power management,data center power,operating system support,power supply,material recycling,telecomputing,education and certification for green computing,where does the green computing fits in,need for green computing,applications in green computing,conclusion.


                                                                             

Future polling system using cloud computing in support with smart client technology



Abstract :

The cloud computing has become more popular these days. Cloud computing is a computing paradigm in which tasks are assigned to a combination of connections, software and services that can be accessed over internet. This paper proposes the usage of cloud computing in E-polling. The main aim of this project is to avoid fake votes in polling by having a cloud database about the voters. Thumb impression of candidates is used for authentication. A candidate can vote at any place irrespective of his polling booth, and can vote through mobile phones. We have used the min- min average algorithm to increase the communication workflow in cloud. The cloud computing relies on the internet. When the internet connection fails it does not work with mobile phone. Our system is implemented using cloud computing and biometrics. Cloud computing is a paradigm in which virtualized resource are provided as a service over the internet to the cloud user. Users need not have knowledge of, expertise in or over technologies infrastructure in the “cloud” that supports them. Biometric identification refers to identifying an individual based on his/her distinguishing physiological and or behavioral characteristics. Our system uses thumb print as distinguishable factor. Cloud computing refers to the next evolution of the Internet. Instead of buying software, installing it on your computer, upgrading it periodically and storing all your data on your hard drive, with cloud computing you use software applications online, as a service. All you need is your computing device and an Internet connection. The cloud computing thus can be used in polling system. We have introduced the smart client technology to overcome this difficulty in mobile phones

Keywords - Cloud Computing, Smart Client, E-polling, Biometrics.

AN EFFICIENT ARTIFICIAL INTELLIGENT SYSTEM FOR CONSERVATION OF MILK IN RURAL AREAS USING WIRELESS SENSOR NETWORKS


Abstract:
                In developing countries like India, the conservation of milk is of major concern due to the lack of supply at many household in rural and Industrial areas. The milk which posses high adulteration, bacterial content, less quantity of saturated fat, freshness gets spoiled easily and hence immediate refrigeration of milk will prevent it from spoiling. In existing system a collection vehicle is assigned for each group of areas. If the vehicle fails to arrive at a particular destination at correct time the milk gets spoiled and becomes useless. Our method eliminates this drawback by sensing the quality of milk using pH meter and directs the vehicle to the appropriate places so that collection of milk may be fastened up which leads to its ultimate conservation. The good milk should have the pH value 6.7. The milk which has greater or lower value is considered to as less quality milk. We propose an effective system utilizing wireless sensor networks with induced artificial intelligence. This system consists of a sensor unit along with a master node which monitors the quality of milk. The sensor unit observes the quality of milk using the pH meter and reports it to the master node. At each collection point the sensor will be used to determine the quality and is reported to the master node. The application module with induced artificial intelligence analyses the current input data received from various sites and detects the collection point where the milk will get degrade quickly. Then it redirects the vehicle to appropriate places by sending the instructions through automated Short message service (SMS) and fastens up the process. If an alert is generated from a large number of sites instructing that the milk is prone to deterioration, then an effective routing algorithm (Open Shortest path Algorithm) can be 

implemented so that the vehicle reaches the collecting point and the milk is conserved to the maximum possible extent.

LATEST TECHNOLOGY IN ANDROID



Abstract:
The unveiling of the Android platform on was announced with the founding of the Open Handset Alliance, a consortium of 48 hardware, software, and telecom companies devoted to advancing open standards for mobile devices. Google has made most of the Android platform available under the Apache free-software and open source license. Android is a freely downloadable open source software stack for mobile devices that includes an operating system, middleware and key applications based on Linux and Java. Google developed Android collaboratively as part of the Open Handset Alliance, a group of more than 30 mobile and technology companies working to open up the mobile handset environment. Android's development kit supports many of the standard packages used by Jetty, and so, due to that fact and Jetty's modularity and lightweight footprint, it was possible to port Jetty to it so that it will be able to run on the Android platform. This paper on Android deals with the history of the Android, the early prototypes, basic building blocks of an android application and the features of the android.


CANCER TREATMENT USING SWARM INTELLIGENCE



 Abstract
In this paper we present an estimation of distribution particle swarm optimization algorithm that borrows ideas from recent developments in bee colony optimization which can be considered estimation of distribution algorithm. In the classical particle swarm optimization algorithm, particles exploit their individual memory to explore the search space. However, the swarm as a whole has no means to exploit its collective memory to guide its search. This causes a re-exploration of already known bad regions of the search space, wasting costly function evaluations. In our approach, we concentrate on Palliation type of solution in which we are identifying the cancer affected part of particle.  we use estimation of distribution particle swarm optimization algorithm to find the particles and particles’ movement towards the estimated regions in the search space mainly which cause the cancer. Our approach is able to find similar or better solutions than the existing system.
Index Terms— Cancer, Chemotherapy, EDPSO, Palliation, PSO

SIXTHSENSE TECHNOLOGY



ABSTRACT

Sixth Sense Technology is a mini-projector coupled with a camera and a Cell phone which acts as the computer and connected to the Cloud, all the Information stored on the web. Sixth Sense can also obey hand gestures. The Camera recognizes objects around a person instantly, with the micro-projector Overlaying the information on any surface, including the object itself or hand. Also can access or manipulate the information using fingers. Make a call by Extend hand on front of the projector and numbers will appear for to click. Know the time by Draw a circle on wrist and a watch will appear. Take a photo By Just make a square with fingers, highlighting what want to frame, and the System will make the photo which can later organize with the others using Own hands over the air and the device has a huge number of applications, it is portable and easily to carry as can wear it in neck. The camera also helps user to take picture of the scene is viewing and later can arrange them on any surface. Some of the more practical uses are reading a newspaper. Reading a newspaper and viewing videos instead of the photos in the paper or live sports updates while reading the newspaper. The device can also tell arrival, departure or delay time of air plane on Ticket. For book lovers it is nothing less than a blessing. Open any book and Find the Amazon ratings of the book. To add to it, pick any page and the device
Gives additional information on the text, comments and lot more.




SIXTH SENSE TECHNOLOGY



ABSTRACT
The sixth sense technology is revolutionizing the World. The idea behind this technology is to simplify day-to-day tasks and integrate them with the virtual world. This technology was born with the simple modification of a ball mouse into a motion sensing device. Users control Sixth Sense with simple hand gestures; sixth sense device has various features that are related to our day life. For example, Do you want to take a photo?...without any camera rolls and flash lights by Just putting your fingers and thumbs together to create a picture frame tells the camera to snap a photo and imagine while drawing an @ symbol in the air allows you to check your e-mail on any surfaces it may be a wall or paper. Like that it has enormous applications to shrink our life in to our hand. It is also designed automatically to recognize objects and retrieve relevant information. It always connects us with internet to give a information related to our situation. Thereby this “sixth sense device” brings world on our neck.

      Hence, this paper is tells about basic idea of “sixth sense technology” and figure out’s technique behind this and more…

“ARTIFICIAL INTELLIGENCE”

  
ABSTRACT:
Blindness is more feared by the public than any other ailment. Artificial vision for the blind was once the stuff of science fiction. But now, a limited form of artificial vision is a reality .Now we are at the beginning of the end of blindness with this type of technology. In an effort to illuminate the perpetually dark world of the blind, researchers are turning to technology. They are investigating several electronic-based strategies designed to bypass various defects or missing links along the brain's image processing pathway and provide some form of artificial sight.

This paper is about curing blindness. Linking electronics and biotechnology, the scientists has made the commitment to the development of technology that will provide or restore vision for the visually impaired around the world. This paper describes the development of artificial vision system, which cures blindness to some extent. This paper explains the process involved in it and explains the concepts of artificial silicon retina, cortical implants etc. The roadblocks that are created are also explained clearly. Finally the advancements made in this system and scope of this in the future is also presented clearly.

LIP READING USING NEURAL NETWORKS





ABSTRACT


          Neural networks, with their remarkable ability to derive meaning from complicated or imprecise data, can be used to extract patterns and detect trends that are too complex to be noticed by either humans or other computer techniques. A trained neural network can be thought of as an expert in the category of information it has been given to analyze. Neural network is applied in LIP READING, one of the easiest ways to recognize the speech. It is one of the latest techniques widely preferred for speech recognition. We describe a lip reading system that uses both, shape information from the lip contours and intensity information from the mouth area.  Shape  information  is  obtained  by  tracking  and parameterising  the  inner  and  outer  lip  boundary  in  an  image sequence.  Intensity information is extracted from a grey level model, based on principal component analysis. In comparison to other  approaches, the intensity area deforms with the shape model to ensure that similar object features are represented after non-rigid deformation of the lips.  We describe speaker independent recognition experiments based on these features. Preliminary results suggest that similar performance can be achieved by using either shape or intensity information and slightly higher performance by their combined use.

THE FUTURE OF DNA COMPUTING


        


ABSTRACT:
There is a powerful computer hidden inside our body it is not our brain it’s our DNA.The main idea behind DNA computing is to adopt a biological technique as an efficient computing vehicle where data’s are represented using strands of DNA. DNA computing is a form of computing which uses DNA biochemistry and molecular biology instead of tradition silicon based computer technique. DNA can be applied to various fields including nanotechnology, combinational optimization, dual circuit development and of particular relevance to the present section, scheduling need of 

DNA computing in future generation. Application- Security, DNA Cryptography, DNA Steganography, DNA nano mechanics. Latest development. End of natural evolution. Will future computer be made of DNA? Conclusion. 

“BRAINGATE SYSTEM” (Application of human computer interaction)




ABSTRACT:

The mind-to-movement system that allows a quadriplegic man to control a computer using only his thoughts is a scientific milestone. It was reached, in large part, through the brain gate system. This system has become a boon to the paralyzed. The Brain Gate System is based on Cyber kinetics platform technology to sense, transmit, analyze and apply the language of neurons. The principle of operation behind the Brain Gate System is that with intact brain function, brain signals are generated even though they are not sent to the arms, hands and legs.The signals are interpreted and translated into cursor movements, offering the user an alternate Brain Gate pathway to control a computer with thought,just as individuals who have the ability to move their hands use a mouse.

BRAIN CONTROLLED ARTIFICIAL LEGS




Abstract:
This paper describes a brain controlled robotic leg which is designed to perform the normal operations of a human leg. After implanting this leg in a human, the leg can be controlled with the help of user’s brain signals alone. This leg behaves similar to a normal human leg and it can perform operation like walking, running, climbing stairs etc. The entire system is controlled with the help of advanced microcontrollers and digital signal processors. The signals are taken out from the human brain with the help of electroencephalography technique. The person can perform operations like walking, running etc just by their thought. This system will be very much suitable for those who lost their legs in accidents and the proposed system is hundred percent feasible in the real time environment with the currently available technology.

The Brain Controlled Artificial Legs are very much cost effective when compared to the normal Artificial legs which is available in the market. The reduction in cost of the proposed system is found to be above 80% when compared to the existing system. Moreover, the user can have full control over the artificial legs which is not possible in the existing system. 

ARTIFICIAL INTELLIGENCE


Abstract:
At the beginning of the Stone Age, when people started taking shelters in caves, they made attempts to immortalize themselves by painting their images  on rocks. With the gradual progress in civilization, they felt  interested to see themselves in different forms. So, they started constructing
models of human being with sand, clay and stones. The size, shape, constituents and style of the model humans continued evolving but the man was not happy with the models that only looked like him. He had a strong desire to make the model ‘intelligent’, so that it could act and think as he did.

This, however, was a much more complex task than what he had done before.So, he took millions of years to construct an ‘analytical engine’ that could perform a little arithmetic mechanically. Babbage’s analytical engine was thefirst significant success in the modern era of computing. Computers of the first generation, which were realized following this revolutionary success,were made of thermo-ionic valves. They could perform the so-called ‘number crunching’ operations. The second-generation computers came up shortly after the invention of transistors and were more miniaturized in size. They were mainly used for commercial data processing and payroll creation. After morethan a decade or so, when the semiconductor industries started producing integrated circuits (IC) in bulk, the third generation computers were launched in business houses. These machines had an immense capability to performmassive computations in real time. Many electromechanical robots were also designed with these computers. Then after another decade, the fourth generation computers came up with the high-speed VLSI engines. Many electronic robots that can see through cameras to locate objects for placementat the desired locations were realized during this period. During the period of 1981-1990 the Japanese Government started to produce the fifth generation computing machines that, besides having all the capabilities of the fourth generation machines, could also be able to process intelligence. The computers of the current (fifth) generation can process natural languages, play games, recognize images of objects and prove mathematical theorems, all of which lie in the domain of Artificial Intelligence (AI). But what exactly is AI?

SYMPOSIUMS FOR ENGINEERS