|
Tuesday 2024-12-24 11:50 PM |
CHAT | |
Statistics |
Total online: 6 Guests: 6 Users: 0 |
VISITORS | A HEARTY WELCOME TO MA VISITORS 4R ENTERIN MA BLOG
THNX 4R VISITIN MA BLOG |
|
|
Welcome Guest | RSS
Main | Registration | Login |
STUDENTS QUEST |
Entries in category: 5 Shown entries: 1-5 |
|
Sort by:
Date ·
Name ·
Rating ·
Comments ·
Downloads ·
Views
| Embedded Systems | Abstract: Computers have evolved from few, huge mainframes shared by many people, and mini computersthat were smaller but still shared to today’s PCs—millions in number, miniscule in size compared to the mainframes, and used by only one person at a time. The next generation could be invisible, with billions being around and each of us using more than one at a time. Welcome to the world ofembedded systems, of computers that will not look like computers and won’t function like anything we’re familiar with. |
ABSTRACT
"HAPTICS”-- a technology that adds the sense of touch to virtual environment
.Haptic interfaces allow the user to
feel as well as to see virtual objects on a computer, and so we can give an
illusion of touching surfaces, shaping virtual clay or moving objects around.
The sensation of touch is the
brain’s most effective learning mechanism --more effective than seeing or
hearing—which is why the new technology holds so much promise as a teaching
tool.
Haptic technology is like
exploring the virtual world with a stick. If you push the stick into a virtual balloon
push back .The computer communicates sensations through a haptic interface
–a stick, scalpel, racket or pen that is
connected to a force-exerting motors.
With this
technology we can now sit down at a computer terminal and touch objects that
exist only in the "mind" of the computer.By using special
input/output devices (joysticks, data gloves, or other devices), users can
receive feedback from computer applications in the form of felt sensations in
the hand or other parts of the body. In combination with a visual display,
haptics technology can be used to train people for tasks requiring hand-eye
coordination, such as surgery and space ship maneuvers.
In this paper we explicate how
sensors and actuators are used for tracking the position and movement of the
haptic device moved by the operator. We mention the different types of force
rendering algorithms. Then, we move on to a few applications of Haptic Technology.
Finally we conclude by mentioning a few future developments. |
INTRODUCTION :
The Internet has made large amount of information available to the average
computer user at home, in business and education. For many people, having
access to this information is no longer just an advantage, it is essential.
By connecting a private network to the Internet can expose critical or
confidential data to malicious attack from anywhere in the world. The intruders
could gain access to your sites private information or interfere with your use
of your own systems. Users who connect their computers to the Internet must be
aware of these dangers, their implications and how to protect their data and
their critical systems.
Therefore, security of network is the main criteria here and firewalls
provide this security. The Internet firewalls keep the flames of Internet hell
out of your network or, to keep the members of your LAN pure by denying them
access the all the evil Internet temptations. |
Biometrics (ancient
Greek: bios life, metron measure) refers to two very
different fields of study and application. The first, which is the older and is
used in biological studies, is the collection, synthesis,
analysis and management of data in biology. Biometrics in reference to biological sciences,
or biostatistics,
has been studied since the early twentieth century.[1]
Biometrics is the science and technology of measuring and analyzing biological
data. In information technology, biometrics refers to technologies that measure
and analyze human body characteristics, such as fingerprints, eye retinas and
irises, voice patterns, facial patterns and hand measurements, for
authentication purposes.
Biometric characteristics can be
divided in two main classes, as represented in figure on the right:
PLEASE LOGIN AND DOWNLAOD FROM SERVER |
ABSTRACT IN DA present day world, online shopping using wap enables mobile phone has widely come in to use.credit cards serve as a currency during e-shopping and e- business. as technology has developed in negative side also like hacking and spoofers misuse credit card no. even though the network has made secure.in this paper we have made a biometric model (integrative voice, finger printing and facial scanning) that can be embedded in a mobile phone, this making e-transaction more secure.the model is very cost and effective as we have tried hard to use the hardware already used in phone. this paper use for image processing or facial recognization and finger print. we have also simulated a few graphs for voice recognition and facial verification using MATLAB 6.0 |
|
|