Search PPTs

Wednesday, July 28, 2010

PowerPoint Presentation On RTOS

PPT On RTOS

Download

RTOS Presentation Transcript:
1. Abstract RTOS Modeling for Embedded Systems

2. Outline
Introduction to SoC and OS Design Related Work Design Flow RTOS Model Task Model Scheduler Model Synchronization Model Case Study Conclusions and Future Works

3. Introduction to SoC Design
 ITRS, 70% of ASICS will be SoC in 2005; Dedicated Software complexity larger than HW in 2005; ITRS, Embedded SW represents 80% design cost for SoCs; 10 000 new SoC Designs Generic SoC platform (programmable, configurable, …) Specific SoCs with heterogeneous components (RF, Analog, MEMS, …) 100 Bn$ market; STB, Multimedia, network processors, mobile terminals, and game applications require multiprocessors and will drive the semiconductor market.

 4. Introduction to SoC Design, cont´d
SoC Components: Heterogeneous Hardware Specific hardware (DSP, IP, Memory, non digital…) Communication Network Non structured logic to links components to Network Sophisticated Software High level SW (Application/OS) Low level SW (Dedicated CPU, ASIP, DSP) Multi-disciplinary knowledge is required: Heterogeneous processors: different CPU cultures; Sophisticated communication protocols and On-Chip networks. SoC architecture design flow should enable the designer To master the design complexity; To meet the time-to-market.

5. Operating Systems Principles
HW/SW issues: Large variety of processors, difficult to program Sequential software execution, distributed and parallel functions The solution: operating system Abstraction of hardware, multitasking

6. OS Design Challenges
Current RTOS design: SoCs design: high abstraction levels; Low abstraction level (RTL); RTL OS implementation used in higher abstraction levels (negating the abstract system model principles); Validation of RTOS implementations in HW/SW simulation; Current SLDLs lack support for modeling an RTOS at higher abstraction levels Need new design methodologies and techniques to enable RTOS Design

7. Objective and Problems
Objective: fast and accurate RTOS simulation model Abstract RTOS model, higher abstraction levels (Application level) Timing simulation for the final RTOS implementation Problems How to build such a simulation model? executed on the host machine, OS simulation models Advantage/Limitation: simulation speed/lack in accuracy Timing simulation Delay annotation to the sw code (estimation/back annotation) Resources sharing, multi-task management Real-time services I/O = adapts to different I/O schemes Synchronization = interrupts management Task inter-dependence = avoids dead locks

 8. Related Work
Low level models: Kohout: specific hw for few OS operations; Wang: synthesize OS based on device drivers; O´Nil: OS library to generate device drivers; Yi: model the OS in the cosimulation backplane at RTL level (ISS); Cortadella: combine static and dynamic scheduling; Gauthier: methodology for automatic generation of application-specific OS; High level models Desmet (SoCOS): emphasis on the task concurrency issues, requires own proprietary simulation engine; Gonzales/Madsen: based on master-slave SystemC library; Gerstlauer/Gajski: OS model to extend SpecC language, hard and complex to adapt to another SLDL; Our approach: RTOS model based on SystemC (untimed system specification – Transaction level modeling);

9. RTOS Model
Build on the top of SystemC language; A RTOS model library provides the common services of a RTOS; The model supports periodic and non-periodic soft real-time tasks; SystemC lacks support to model dynamic real-time behavior; Need language extensions; Two major categories of services: OS management Task management

10. For more please refer our PPT. Thanks.

Monday, July 26, 2010

PowerPoint Presentation On Visual Basic Project

PPT On Time Table Management System Of College
Download

Presentation On Visual Basic . Net

Download

PPT On Hotel Reservation

Download

PowerPoint Presentation On Red Tacton

PPT On Red Tacton

Download

Red Tacton Presentation Transcript:
1. What is Red Tacton?
Red Tacton is a new Human Area Networking technology. Uses the surface of the human body as a safe, high speed network transmission path. It uses the minute electric field emitted on the surface of the human body.

2. Red Developed by NTT from Japan. Claims to send data over the surface of skin. Attains a speed up to 10 Mbps --- equivalent to a fast broadband connection. Uses weak electric fields on the surface of human body instead of relying on EM waves or light waves. Tacton

3. Principle
Red Tacton relies upon the principle that the optical properties of an electro-optic crystal can vary according to the changes of a weak electric field.

4. Human Safety
The transmitting and receiving electrodes of the transceiver are completely covered with insulated film. Impossible for current to flow from the transceiver to the human body. When communication occurs, displacement current is generated by the electrons in the body because body is subjected to minute electrical fields.

5. Touch
Touching, gripping, sitting, walking, stepping and other human movements can be the triggers for unlocking or locking, starting or stopping equipment, or obtaining data.

6. Any Media In addition to the human body, various conductors and dielectrics can be used as transmission media. Conductors and dielectrics may also be used in combination

7. FIRMO
Firmo Kit is used as an alternative to short-range wireless security-card entrance/exit systems. NTT claim Firmo provides a higher degree of security than other technologies.

8. Body-based networking is more secure than broadcast systems. Network congestion due to fall in transmission speed in multi user environments is avoided.

9. It has no compelling applications that aren’t already available. Too costly. Widespread marketing campaigns and education.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Real Time Operating System

PPT On Real Time Operating System

Download

Presentation On Real Time Operating System

Download

PowerPoint Presentations Of Entertainment

My Love

My Love

Download

Must See

Do You Have 10 Minute

Download

PowerPoint Presentation On Magic

PPT On Magic

Download

PPT On Four Candles

Presentation On Four Candles

Download

PPT On Four Parachutes

Four Parachutes

PPT On Journey of Life

Journey of Life

Download

God Is With You

God Is Always With You

Download

PowerPoint Presentation On Father to Son

Father to Son

Download

PowerPoint Presentation On Funny Camera

PPT On Funny Camera

Download

PowerPoint Presentation On Cute Babies

PPT On Cute Babies

Download

PowerPoint Presentation On Chinese Proverb

PPT On Chinese Proverb

Download

Sunday, July 25, 2010

PowerPoint Presentation On Host Mobility

 PPT On Host Mobility

Download

Host Mobility Presentation Transcript:
1. Mobility : outline
What is the problem at the routing layer when Internet hosts move? Ongoing connections need to be maintained as the user moves. As users move, they have to be handed over from one coverage area to another (since the coverage areas of access points are finite). Can the problem be solved?

2. Problems?
The IP address associated with a mobile host is network dependent ! When user connects to another network, IP address needs to change. Packets belonging to ongoing connections somehow need to be delivered to the mobile host.

3. Problems (Contd.)?
What are the options? Make IP address host specific instead of network specific – obvious pitfalls? Change IP address of host and start using the new IP address in the subsequent packets belonging to the connections.

 4. Wireless Networking :
Approaches Mobile IP ( Network Layer ) IP substrates changes End-to-End approach ( Higher layer ) End application changes

5. Mobile IP Basics
Same as the post-office analogy Two other entities – home agent (old post-office), foreign agent (new post-office) Mobile host registers with home agent the new location Home agent captures packets meant for mobile host, and forwards it to the foreign agent, which then delivers it to the mobile host

6. Mobile IP Problems?
Triangular routing overhead ! Registration latency and associated problems ! Infrastructure required for mobile IP support ! Significant cost, complexity, performance degradation !

7. End-to-End Approach
Internet infrastructure does not change (like in mobile IP). Changes required at both the sender and receiver. Does connection migration when mobile-host moves.

8. E2E Approach (Contd.)
Hostname used as the invariant to identify mobile host instead of home agent in Mobile IP. Mobile host uses DNS updates to change hostname to IP address mapping No consistency problem as DNS entries can be made un-cacheable (TTL = 0) If client is mobile, DNS-support not used

9. E2E Approach (Contd.)
When a mobile-host undergoes a handoff, it re-issues a SYN (with a MIGRATE option identifying the previous connection). A unique token exchanged during initial connection set-up used to identify connection. The receiver of the SYN changes its state to represent the new address of the mobile-host. Connection proceeds as a regular TCP connection from thereon.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On DSL Technology

PPT On DSL Technology

Download

DSL Technology Presentation Transcript:
1. ADVANTAGES OF DSL:
DSL IS ALWAYS ON,24 HRS A DAY NO DIAL-UP REQUIRED DATA SECURITY NO SECOND PHONE LINE REQUIRED USE THE PHONE AT THE SAME TIME YOU ARE ON-LINE NO DROPPED CONNECTIONS SUPPER FAST SPEEDS COST EFFECTIVE

2. DIAL-UP MODE OF INTERNET ACCESS

3. SIGNAL CODING USED IN DSL TECHNOLOGY      
SPECTRUM DISTRIBUTION: -

4. SOME OF THE CODING TECHNIQUE :THE 2B1Q TECHNIQUE: -

5. TYPES OF DSL TECHNOLOGY IDSL G.LITE HDSL G.SHDSL ADSL VDSL

6. APPLICATIONHDSL APPLICATION -
LEASED LINE LEASED LINE FOR INTERNET ACCESS LEASED LINE BETWEEN TWO USER PREMISES LEASED LINE BETWEEN TWO USER PREMISES USING INTERNET

7. Leased line for Internet access:

8. Leased line between two user premises

9. Leased line connection between two user offices using internet

10. Thanks.

Related Project Report:

DSL Report

Saturday, July 24, 2010

PowerPoint Presentation On Be Positive

Be Positive

Download

PPT On Attitude

Download

PowerPoint Presentation On Android

PPT On Android

Download

Android Presentation Transcript:
1. 1. Introduction (1)
What is Android? A software platform and operating system for mobile devices Based on the Linux kernel Developed by Google and later the Open Handset Alliance (OHA) Allows writing managed code in the Java language Possibility to write applications in other languages and compiling it to ARM native code (support of Google? No) Unveiling of the Android platform was announced on 5 November 2007 with the founding of OHA

2. What is the Open Handset Alliance (OHA)?
(2) Devoted to advancing open standards for mobile devices Develop technologies that will significantly lower the cost of developing and distributing mobile devices and services License Android is under version 2 of the Apache Software License (ASL)

3. 2. Platform (1)
2.1 Hardware Android is not a single piece of hardware; it's a complete, end-to-end software platform that can be adapted to work on any number of hardware configurations. Everything is there, from the bootloader all the way up to the applications.
2.2 Operating System(s) Android uses Linux for its device drivers, memory management, process management, and networking. The next level up contains the Android native libraries. They are all written in C/C++ internally, but you’ll be calling them through Java interfaces. In this layer you can find the Surface Manager, 2D and 3D graphics, Media codecs, the SQL database (SQLite), and a native web browser engine (WebKit). Dalvik Virtual Machine. Dalvik runs dex files, which are coverted at compile time from standard class and jar files.

4. 2.3 Network Connectivity 
It supports wireless communications using: GSM mobile-phone technology 3G 802.11 Wi-Fi networks

5. 2.4 Security 
Android is a multi-process system, in which each application (and parts of the system) runs in its own process. Most security between applications and the system is enforced at the process level through standard Linux facilities, such as user and group IDs that are assigned to applications. Additional finer-grained security features are provided through a "permission" mechanism that enforces restrictions on the specific operations that a particular process can perform, and per-URI permissions for granting ad-hoc access to specific pieces of data.

6. 2.6 Future possibilities Google Android Sales to Overtake iPhone in 2012 The OHA is committed to make their vision a reality: to deploy the Android platform for every mobile operator, handset manufacturers and developers to build innovative devices Intel doesn’t want to lose ownership of the netbook market, so they need to prepare for anything, including Android Fujitsu launched an initiative to offer consulting and engineering expertise to help run Android on embedded hardware, which aside from cellphones, mobile internet devices, and portable media players, could include GPS devices, thin-client computers and set-top boxes. More Android devices are coming and some will push the envelope even further

7. 3. Software development (1)
3.1 Development requirements Java Android SDK Eclipse IDE (optional)

8. 3.2 IDE and Tools
Android SDK Class Library Developer Tools dx – Dalvik Cross-Assembler aapt – Android Asset Packaging Tool adb – Android Debug Bridge ddms – Dalvik Debug Monitor Service Emulator and System Images Documentation and Sample Code Eclipse IDE + ADT (Android Development Tools) Reduces Development and Testing Time Makes User Interface-Creation easier Makes Application Description Easier

9. 3.3 Programming Language(s)
Java – officially supported C/C++ – also possible but not supported 4. Overall evaluation (1) 4.1 Advantages There are a host of advantages that Google’s Android will derive from being an open source software. Some of the advantages include: The ability for anyone to customize the Google Android platform The consumer will benefit from having a wide range of mobile applications to choose from since the monopoly will be broken by Google Android Men will be able to customize a mobile phones using Google Android platform like never before Features like weather details, opening screen, live RSS feeds and even the icons on the opening screen will be able to be customized As a result of many mobile phones carrying Google Android, companies will come up with such innovative products like the location In addition the entertainment functionalities will be taken a notch higher by Google Android being able to offer online real time multiplayer games 4.2 Limitations Bluetooth limitations Android doesn't support: Bluetooth stereo Contacts exchange Modem pairing Wireless keyboards But it'll work with Bluetooth headsets, but that's about it Firefox Mobile isn't coming to Android Apps in Android Market need to be programmed with a custom form of Java → Mozilla and the Fennec won't have that 4.3 Conclusion We can only hope that the next versions of Android have overcome the actual limitations and that the future possibilities became a reality

10. Thanks.

PowerPoint Presentation On Blu Ray Disc

 Blu Ray Disc PPT

Download

PPT On Blu Ray Disc

Download

PowerPoint Presentation On Cyber Terrorism

 PPT On Cyber Terrorism

Download

Cyber Terrorism Presentation Transcript:
1. TERMS
Cyber terrorism – The use of the Net for terrorism. Cyber crime – The use of the Net for criminal actions. Cyber Attacks – Email bombs, viruses, intentional actions. Information Warfare – Formalized governmental warfare Netwar – Conducting warfare via Networks & the Net Techno Terrorism – Use of technology by terrorist groups

2. INTRODUCTION
Contains two elements:- Cyber-Space Terrorism Premeditated Politically motivated Attack against information, computer systems, computer programs and data Result in violence

3. CYBER-TERRORISTS
Terrorist: “..one who causes intense fear; one who controls, dominates, or coerces through the use of terror in furtherance of political or social objectives”. Cyber-Terrorist: An individual that uses computer\network technology (i.e., networks, computers, Internet) to cause intense fear; one who uses computer\network technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.

4. WHY TERRORIST USE CYBER WORLD
Cheaper Action is difficult to track Personalities and Location can be hidden No Security to go through Remotely Vast Destruction can be done Big targets can be attacked

5. Forms of CYBER-TERRORISM
Privacy Violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. The violation of this attracts both civil as well as criminal consequences under the respective laws. Man has become sensitive to publicity, so that solitude and privacy have become essential to the individual. Certain acts have been categorized as offences and contraventions, which have tendency to intrude with the privacy rights of the citizens

6. Secret information appropriation and data theft:
The information technology can be misused for appropriating the valuable Government secrets and data of private individuals and the Government and its agencies. A computer network owned by the Government may contain valuable information concerning defence and other top secrets, which the Government will not wish to share otherwise. The same can be targeted by the terrorists to facilitate their activities, including destruction of property. NOTE: The definition of property is not restricted to moveable's or immoveable

7. Demolition of E-governance Base:
The aim of e-governance is to make the interaction of the citizens with the government offices hassle free and to share information in a free and transparent manner. It further makes the right to information a meaningful reality. In a democracy, people govern themselves and they cannot govern themselves properly unless they are aware of social, political, economic and other issues confronting them. To enable them to make a proper judgment on those issues, they must have the benefit of a range of opinions on those issues

8. Distributed denial of Service Attack
The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them. Once control is obtained, they can be manipulated from any locality by the terrorists. These infected computers are then made to send information or demand in such a large number that the server of the victim collapses.

9. Network Damage and Disruption:
The main aim of cyber terrorist activities is to cause networks damage and their disruptions. This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier. This process may involve a combination of computer tampering, virus attacks, hacking, etc.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Spring Framework

 PPT On Spring Framework

Download

Spring Framework Presentation Transcript:
1. What is Spring?
A Container Creates objects and makes them available to your application A Framework Provides an infrastructure of classes that make it easier to accomplish tasks

2. What does Spring provide?
Lightweight container and framework Most of your code will be unaware of the Spring framework Use only the parts you of Spring you want Manages dependencies between your objects Encourages use of interfaces Lessens “coupling” between objects Cleaner separation of responsibilities Put logic that applies to many objects in one single place Separate the class’s core responsibility from other duties Simplifies database integration Spring JDBC Hibernate iBATIS Java Persistence

3. Spring Modules –
Use What You Want

4. Example Application
Contacts – store and retrieve contacts Created using MyEclipse 7 Uses Maven 2 to manage libraries Demonstrates basic Spring capabilities Contact has a Person, collection of Email, and collection of Phone objects Can use an XML file or database as repository User interface is via the console See READ_ME file under project folder

5. Dependency Management
Manage collaboration (dependencies) between Plain Old Java Objects (POJOs) Code to interfaces Use Spring to instantiate specific interface implementations Don’t need InterfaceType anObject = new ClassThatImplementsInterfaceType() Use Spring to provide specific interface implementations to your objects

6. External Configuration
Configuration options Properties files XML configuration files Annotations XML Configuration Specify the creation of objects Specify the dependencies between objects

7. Handling Change
Change dependencies without changing code Edit the configuration file Create multiple configuration files

8. Testing Applications
Easier to test Use a test configuration file to create test objects and manage their dependencies Reuse objects across tests Test service layer objects by creating stub dependent objects See: http://static.springframework.org/spring/docs/2.5.x/reference/testing.html

9. Separation of Responsibilities Aspect-Oriented Programming (AOP) Aspect-Oriented Programming in Spring Put a concern (logic) that applies to many different objects in one single place Logging, security, performance testing, transaction management

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On JIRO Technology

 PPT On JIRO Technology

Download

JIRO Technology Presentation Transcript:
1. Problem before JIRO Introduce by Sun Micro System Managing Distributed Resource. Platform independent Web based GUI’S and Management App

2. Using JIRO Integrated and Automated Management Software. A standard extension to the Java platform, is specified by the Federated Management Architecture (FMA). Jiro goes further than just platform independence, however, and introduces Jini-connection technology for distributed management across a network.

3. Three tier architecture
The requirements for this middle tier were determined by an analysis of distributed management and the resources that need to be monitored and controlled. There may be several resources processing the data as it moves from the application to its eventual destination -- a disk drive, for example Separating the control path from the data path

4. Working Partition the Management environment private management servers can host management services that are specific to their hosts The servers (including the shared server) can be replicated to achieve higher availability. These servers form an intra domain federation for the management domain. The shared management servers can also communicate with each other.

5. Static Service known as Federated Beans base services -
- are a guaranteed part of the environment in a management domain. The base services include transaction, controller, logging, events, and scheduling. They are available for use by the clients and services belonging to a management domain, and do not depend on the dynamic services model. There is only one of each type of service available in each management domain.

6. The Transaction
service is a Jini transaction manager serving a particular management domain. The Controller service provides for the reservation of ownership within the management domain. Management software can use the Log service to log decisions and state changes, as well as to maintain audit trails. The Event service provides a set of topics to which management services can post and listen. This allows management services to react to both changing conditions in the environment and decisions that other management services have made. The Scheduling service allows a management service to perform periodic or scheduled operations, such as polling.

7. Dynamic services
The FederatedBeans dynamic services model extends Java's Remote Method Invocation (RMI) to support the higher level of abstraction appropriate for management application. Additional management capabilities (security, transaction, controller) that can be added to any Jiro-based component Transactional persistence Remote class method (procedural) invocations Remote object instantiation

8. Management Automation Example
The first set of Jiro components that need to be developed for these situations are called Management Facades. The resource vendor typically develops the Management Facades for its products that enable the products to be managed by Jiro -based software. FederatedBeans components will typically use a standard protocol, such as SNMP, to talk to the resource (in the case of a device or system) or native library (in the case of software). We'll create two FederatedBeans components for this example. The first component maintains a pool of spare disks that can be used for multiple applications and hosts in the storage network.

9. Continue….
The second FederatedBeans component will monitor file system utilization and try to predict when the file system will run out of space. It accesses usage information from the filesystem's Management Facade and tracks its usage over time. After predicting an out-of-space condition based on the history of past usage, it then calls the Storage Pool Bean to get a disk from its pool. When the Storage Pool Bean gets the request for the disk, it calls the switch's Management Facade to change the zone of the newly allocated disk to that of the host.

10. Conclusion
Jiro makes possible software that can increase availability and help reduce the cost and complexity of management The new paradigm for management software is multiple-vendor creation and reuse of these FederatedBeans components. The Storage Pool bean in our example could also be used by a component that consumes disks due to failure predictions, for example.

11. Thanks.

PowerPoint Presentation on Swarm Intelligence

PPT On Swarm Intelligence

Download

Swarm Intelligence Presentation Transcript:
1. ARTIFICIAL INTELLIGENCE
Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create such machines. The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects.

2. NEED OF AI
Environment changes dynamically and cannot be framed by calculations and algorithms. Scientists have proposed many solutions to cope up with the limitations and exception of environment. Insects and birds are successful in surviving for years and are efficient , flexible and robust. They solve many problems like finding food , building nest etc.. Hence they are self organized and optimize their path.

3. Particle swarm optimization Idea:
Used to optimize continuous functions. PSO is a population-based search algorithm and is initialized with a population of random solutions called particles. The particles have the tendency to fly towards the better and better search area over the course of search process. Function is evaluated at each time step for the agent’s current position. Each agent “remembers” personal/local best value of the function

4. ANT COLONY OPTIMIZATION
ACO is inspired by the behavior of ant colonies. Ant colonies have the ability to find the shortest path for the food. Ants leave a chemical pheromone trail . This pheromone trial enables them to find shortest path between their nest and the food sources. Ants find the shortest path via an experimental setup shown below.

5. SUMMARY OF INSECTS
The complexity and sophistication of Self-organization is carried out with no clear leader. What we learn about social insects can be applied to the field of Intelligent System Design. The modeling of social insects by means of Self-Organization can help design artificial distributed problem solving devices. This is also known as Swarm Intelligent Systems.

6. From Ants to Algorithms
Swarm intelligence information allows us to address modeling via: Problem solving Algorithms Real world applications

7. SOCIAL INSECTS
Problem solving benefits include: Flexible Robust Decentralized Self-Organized

8. ROBOTS
Collective task completion No need for overly complex algorithms Adaptable to changing environment

9. Thanks.

PowerPoint Presentation On Semantic Web

PPT On Semantic Web

Download

Semantic Web Presentation Transcript:
1. The semantic web
Mostly flat information Some databases but content very functional Little engagement or interactivity

2. Web 1.0 design elements
Some typical design elements of a Web 1.0 site include: 1.Static pages instead of dynamic user-generated content. 2.The use of framesets. 3.HTML forms sent via email. A user would fill in a form, and upon clicking submit their email client would attempt to send an email containing the form's details.

3. Greater interactivity
Growth of social media / social networking Online communities created / social capital

4. Joining up of information
Data portability Browsers and search engines become more ‘intelligent’

5. Having seen the comparision , we can proceed over the application part. Let’s get into semantics. Firstly, we’ll look at the traditional web model…

6. Let’s introduce Professor Sharma. With the traditional web model she has the following…

7. A faculty page A faculty page A research page Using code we can create relationships between websites, people and events… These can then be understood by the browser and interpreted in a helpful way.

8. So we can link Professor Sharma’s faculty page to her research.

9. And her staff listing could show some of the other academics she works with.

10. For more please refer our PPT. Thanks.

Related Project Report:

Semantic Web Report

PowerPoint Presentation On Visual Studio 2010

PPT On Visual Studio 2010

Download

Visual Studio 2010 Presentation Transcript:
1. Introduction:
Visual Studio Microsoft® Visual Studio® 2010 is an integrated environment that simplifies creating, debugging and deploying applications. The new Microsoft Visual Studio 2010 simplifies the entire development process, from design to deployment. Coding is faster than ever, since we can leverage existing code and skills to write applications targeting different platforms, including SharePoint and Windows Azure.

2. Introduction: Visual Studio (Contd…)
We’ve got ideas. We know the algorithms. The architecture’s up on the whiteboard, and we can imagine the user interface. And now, with the Visual Studio 2010, we’ve got the tools to turn our ideas into solutions.

3. Introduction: .NET Framework
The .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. The .NET Framework has two main components: The common language runtime and, The .NET Framework class library.

4. Introduction: .NET Framework
The common language runtime is the foundation of the .NET Framework. The common language runtime manages memory, thread execution, code execution, code safety verification, compilation, and other system services. The class library, is a comprehensive, object-oriented collection of reusable types that we can use to develop applications both Command line and GUI based.

5. What's new in Visual Studio 2010
Simplified appearance and new behaviors Visual enhancements Multiple monitor support Explore code more quickly Updated code editor Navigate to Call hierarchy Full power of .NET with C# and Visual Basic

6. What's new in Visual Studio 2010 (Contd…)
Windows 7 Support Visual F# development WPF and Silverlight Designer SharePoint tooling Windows Azure Support Parallel Programming

7. Top 5 features
For developers: Build innovative customizations for SharePoint Develop applications for Windows 7 Understand existing code and architecture Identify test impact from code changes Customize Visual Studio to fit your style

8. Top 5 features
For testers: Enjoy deep collaboration with the development team Fast forward through manual tests Reproduce bugs on a common virtualized environment Automatically attach context to bugs Enjoy full visibility to the test progress

 9. Top 5 features
For project managers: New dashboards keep the team in sync Agile planning templates help the estimation process Requirements traceability keeps stakeholders informed Visual Studio Team Web Access eases reporting pains New reports help enable proactive project management

10. For more please refer our PPT. Thanks.

Related Project Report:

Microsoft Visual Studio 2010

PowerPoint Presentation On Browser RAD Tools And Apple Devices

PPT On Browser RAD Tools

Download

Browser RAD Tools And Apple Devices Presentation Transcript:
1. Back in the days of Browser War
1996-1997 Netscape Navigator Internet Explorer Each browser was implementing its own Standards

2. Weren’t we supposed to talk about RAD using some safari tool? And there I go! Demonstration

3. Safari Developer Tools
Firebug like functionality in Safari Rapid Prototyping Errors Performance and profiling HTML5 Offline Database

4. Why develop for iPhone?
It’s a great device It’s innovation. It’s touch. Publish your application in AppStore Availability of very well documented SDK CocoaTouch Framework for native apps WebKit engine for web browser experience

5. Web Applications for iPhone
What are they? Difference between native apps and web applications Let’s build one application (quick demo of dashcode) Some examples of web applications

6. Bonus for jQuery fans here!

7. Thanks.

PowerPoint Presentation On Packet Tracer 5.0

 PPT On Packet Tracer 5.0

Download

Packet Tracer 5.0 Presentation Transcript:
1. Comprehensive networking technology teaching and learning software with powerful simulation, visualization, authoring, assessment, and collaboration capabilities Offers a unique combination of realistic simulation and visualization experiences, complex assessment and activity authoring capabilities, and opportunities for multiuser collaboration and competition

2. Innovative features of the PT 5.0
software will help students and teachers collaborate, solve problems, and learn concepts in an engaging and dynamic social environment. Some of the benefits of Packet Tracer 5.0 are as follows: Provides a realistic simulation and visualization learning environment that supplements classroom equipment Enables multiuser, real-time collaboration and competition for dynamic learning

3. Anyone can author, the PT Activity Wizard guides you The process is basically write instructions, build a correct answer network, specify grading, specify an initial network, save

4. Packet Tracer is a foundational teaching tool for CCNA Discovery and CCNA Exploration. Both curricula include embedded e-doing, which applies the principle that people learn best by interacting with computer-based activities. Interactive learning promotes the exploration of networking concepts and experimentation with tools such as Packet Tracer and Flash-based activities to help students develop a greater understanding of networking technologies. Packet Tracer activities are embedded in the course content.

5. Expanded platform support Windows (Widows XP, Windows 2000) Vista (Vista Basic, Vista Premium) Linux (Ubuntu, Fedora) Enhanced protocol support Expanded list of protocols to reflect current networking trends and practices in industry and government More support for teaching CCNA-level commands Deeper modeling for existing protocols Multiuser functionality Enables social learning instead of students working alone PT 5.0 is now a network-capable (peer to peer) application Supports collaboration, competition, remote instructor-student interaction, social networking, gaming

6. Protocols listed in RED on this slide are new in PT 5.0 PT supports application protocols, transport protocols, routed and routing protocols, switching and data layer protocols, and wireless

7. Menu Bar
Main Tool Bar Common Tools Bar Logical/Physical Navigation Bar Workspace Realtime/Simulation Bar Network Component Box Device-Type Selection Box User Created Packet Window

8. Thanks.

Friday, July 23, 2010

PowerPoint Presentation On DNS

PPT On DNS

Download

DNS Presentation Transcript:
1. The Domain Name System
Overview What is DNS?? DNS HIERARCHY TYPES OF NAME SERVERS How to Access a Web Page?? TYPES OF DNS QUERIES DNS CACHING Why not Centralize DNS??

2. The domain name system is usually used to translate a host name into an IP address. Domain names comprise a hierarchy so that names are unique, yet easy to remember.

3. An address is how you get to an endpoint Often hierarchical, which helps with scaling 950 Charter Street, Redwood City CA, 94063 +1.650.381.6003 204.152.187.11 A name is how an endpoint is referenced Often with no structurally significant hierarchy “David”, “Tokyo”, “studygalaxy.com”,”google.com”. Names are more people-friendly.

4. Devices on the telephone network all have a number People have a hard time remembering numbers, but… The network needs the numbers to connect endpoints So a directory provides association of names people know with the numbers where they can be reached Computers on the Internet all have a number The DNS takes names people can relate to and converts them into the numbers computers need to interact. This analogy has a crucial flaw: The DNS is not a directory service. There is no way to search the data.

5. ROOT NAME SERVERS
TOP-LEVEL DOMAIN(TLD) NAME SERVERS AUTHORITATIVE NAME SERVERS LOCAL NAME SERVERS

 6. contacted by local name server that can not resolve name root name server: contacts authoritative name server if name mapping not known gets mapping returns mapping to local name server

7. Top-level domain (TLD) servers:
responsible for com, org, net, edu, etc, and all top-level country domains uk, fr, ca, jp. Network solutions maintains servers for com TLD Educause for edu TLD Authoritative DNS servers: organization’s DNS servers, providing authoritative hostname to IP mappings for organization’s servers (e.g., Web and mail). Can be maintained by organization or service provider

8. Each ISP (residential ISP, company, university) has one. Also called “default name server” When a host makes a DNS query, query is sent to its local DNS server Acts as a proxy, forwards query into hierarchy. Reduces lookup latency for commonly searched hostnames

9. When You type http://www.studygalaxy.com into your web browser and hit enter. What happens now?

10. For more please refer our PPT. Thanks.

Related Project Report:

DNS Report

PowerPoint Presentation On Meta Search Engines

PPT On Meta Search Engines

Download

Meta Search Engines Presentation Transcript:
1. CONTENTS
Working of search engine. Meta search engine. Need of meta search engine ? Working of Meta search engines Meta search engine activities Advantage and Disadvantages Meta search Algorithm Fitness Function for Web-Search

2. Working of search engine
Traditional search engines return relevant results based on complex algorithms. Their “knowledge” of the web is based on its use of Internet spiders.

3. Working of search engine
Internet spiders are programs that request a web page, parse its contents, and return the results to the search engine. As part of the parsing process, the spider identifies hyperlinks on the page. It chooses one of these hyperlinks to decide which page to parse next.

4. Examples of Search Engines
A few popular traditional search engines are: Google ( www.google.com) Ask Jeeves! ( www.ask.com) MSN Search ( www.msn.com) Lycos ( www.lycos.com)

5. Meta Search Engines
While meta-search engines do use page-ranking algorithms, they do not use spiders to gather web content. Instead, meta search engines query multiple traditional search engines and rank the hits returned from all of them. The results may be listed by the engine that returned them while others may eliminate data about which engine returned each hit altogether.

6. Meta Search Engines
Completeness of the index is not the only factor in the quality of search results. "Junk results" often wash out any results that a user is interested in. we want our notion of "relevant" to only include the very best documents since there may be tens of thousands of slightly relevant documents.

7. Meta Search Engines
Meta-search engines do not own a database of Web pages; they create a virtual database. They do not compile a physical database or catalogue of the web. Instead, they take a user's request, pass it to several other heterogeneous databases and then compile the results in a homogeneous manner based on a specific algorithm.

8. Main Metasearch Engine Activities
Source selection Which search engines to search. Employs profiles of each search engine to make decision Query dispatching. Translating a query to a local format.

9. Main Metasearch Engine Activities
Result selection. Picking from the multiple result sets. Some results lists might be pruned if they come from less relevant search engines. Result merging. Unifying/ranking the selected results. Rankings from individual lists.

10. For more please refer our PPT. Thanks.

Related Project Report:

Meta Search Engine

PowerPoint Presentation On Sixth Sense Technology

PPT On Sixth Sense Technology
Download

Presentation On Sixth Sense Technology


Sixth Sense Technology PPT
Download

PowerPoint Presentation On 3D Time Of Flight Camera

 PPT On 3D Time Of Flight Camera

Download

3D Time Of Flight Camera Presentation Transcript:
1. The 3D-Time-of-Flight camera
(ToF) is a new concept for image and video capturing - captures not only two, but three dimensions in one step by measuring the distance from each pixel of the camera chip to the object. This way a large number of coordinates is determined for each exposure – a so called frame. The systems cover ranges of a few meters up to about 60 m. The distance resolution is about 1 cm. The biggest advantage of the cameras may be that they provide up to 100 images per second.

2. Illumination unit:
It illuminates the scene. Normally LEDs and Laser diodes are feasible. The illumination normally uses infrared light to make the illumination unobtrusive. Image sensor: This is the heart of the TOF camera. Each pixel measures the time the light has taken to travel from the illumination unit to the object and back.. Optics: A lens gathers the reflected light and images the environment onto the image sensor. An optical band pass filter only passes the light with the same wavelength as the illumination unit. This helps suppress background light.

3. Driver electronics:
Both the illumination unit and the image sensor have to be controlled by high speed signals. These signals have to be very accurate to obtain a high resolution. Computation/Interface: The distance is calculated directly in the camera. To obtain good performance, some calibration data is also used. The camera then provides a distance image over a USB or Ethernet interface.

4. A Time of flight camera (TOFcamera) is a camera system that creates distance data with help of the following principle : Time of Flight Principle(TOF) describes a variety of methods that measure the time that it takes for an object, particle or acoustic, electromagnetic or other wave to travel a distance through a medium. This measurement can be used for a time standard, as a way to measure velocity or path length through a given medium, or as a way to learn about the particle or medium . The traveling object may be detected directly or indirectly

5. The 3D Time-Of-Flight (ToF) camera, simultaneously delivers gray-level images and 3D information of the scene. Illumination source is in the form of matrix of LEDs. On the basis of reflected ray: Distance Image (D(i, j)) is computed based on the phase shift between the emitted and reflected signals Amplitude Image (A(i, j)) is estimated based on the amplitude of the reflected signal at every pixel location

6. A ToF camera actively illuminates a scene with an incoherent light signal. The signal is modulated by a cosine-shaped signal of frequency f. Usually, the emitted light is part of the non-visible area of the spectrum in the near infrared spectral range (780 nm). Traveling with the constant speed of light in the surrounding medium, the light signal is reflected by the surface of the patient. By estimating the phase-shift f (in rad) between both, the emitted and reflected light signal, the distance D(i,j) can be computed as follows: d=1/2(n*wavelength + phase)

7. the amplitude image A(i, j) is estimated based on the amplitude of the reflected signal at every pixel location. For emitted ray: D (t0) = Acos wt(0). For reflected ray: d(t) = k + a cos (wt + ). Use of depth information in addition to amplitude may be a key factor for finding workable solutions to a number of applications of interest,e.g., face detection, video surveillance etc. TOF-can generate a depth map of what is being seen through the camera at a short range, and use this data to approximate a 3d representation of what is being seen.? These can be effective for detection of hand gestures due to their short range capabilities.

8. Pulsed light source with digital time counters These devices produce depth values for each pixel on every frame. Typical image sizes are 128 x 128 pixels. RF-modulated light sources with phase detectors Photonic Mixer Devices (PMD) and the Swiss Ranger are eg. These are compact & short range devices. Range gated imagers This is the most promising technology. The phase detector is the gate or shutter in the camera. The gate allows collection of portions and of the received light pulse. The Z-cam and Canesta 3D cameras.

9. Simplicity Efficient Distance Algorithm Speed

10. For more please refer our PPT. Thanks.

Related Project Report:

3D Time Of Flight Camera

PowerPoint Presentation On Chameleon Chip

PPT On Chameleon Chips

Download

Chameleon Chip Presentation Transcript:
1. Chameleon Chip

2. INTRODUCTION
A reconfigurable processor is a microprocessor with erasable hardware that can rewire itself dynamically. This allows the chip to adapt effectively to the programming tasks demanded by the particular software they are interfacing with at any given time.
Reconfigurable processor chip usually contains several parallel processing computational units known as functional blocks.

3. CONTD..
When a particular software is loaded the present hardware design is erased and a new hardware design is generated by making a particular number of connections active while making others idle.

4. CONTD..
It is possible to get ten times better performance, with ten times lower energy consumption at the same time, according to Heysters. He did his research at the Centre for Telematics and Information Technology of the University of Twente in The Netherlands.

5. WHAT IS RECONFIGURABLE PROCESSOR??
A reconfigurable processor is a microprocessor with erasable hardware that can rewire itself dynamically.

6. CONTD..
For example, a single device could serve as both a camera and a tape recorder (among numerous other possibilities): you would simply download the desired software and the processor would reconfigure itself to optimize performance for that function.

7. CONTD..
• ASIC provide ultimate performance but fail in time-to-market and unable to satisfy the need of flexibility.
• Reconfiguration versus Dedicated Hardware - higher performance, lower cost and lower power consumption.

8. ADVANTAGES
can create customized communications signal processors increased performance and channel count can more quickly adapt to new requirements and standards lower development costs and reduce risk. Reducing power Reducing manufacturing cost.

9. DISADVANTAGES
Inertia – Engineers slow to change Inertia is the worst problem facing reconfigurable computing  RCP designs requires comprehensive set of tools 'Learning curve' for designers unfamiliar with reconfigurable logic

10. For More Please Refer Our PPT. Thank You.

Related Project Report:

Chameleon Chips

PowerPoint Presentation On Multi Core Technology

 PPT On Multi Core Technology

Download

Multi Core Technology  Presentation Transcript:
1. In this technology, multiple cores of processors are packaged on a single die. Multi Core Technology is researched more nowadays because it is realized that it is better to focus on real multiprogramming, multithreading instead of focusing on increase in clock speed, performance of single core of processor.

2. Dual core technology is multiple core technology in which two core of CPUs are connected on a single die. Eg. Include pentium dual core, intel core duo, intel core2 duo, AMD athlon X2 etc.

3. This brand refers to mainstream x86 architecture microprocessors from Intel. They are based on both 32 bit and 64 bit. In terms of features, price and performance at given clock speed, Pentium dual core comes above Celeron but below Intel core duo and core 2 duo.

4. Yonah: It has 32 bit Pentium M derived core and resembles to core duo architecture. 1 MB L2 cache instead of 2MB L2 cache in core duo. 533 MHz FSB. Allendale: Support Intel 64 extension. Based on core architecture. Resembles with core 2 duo but have 1 MB L2 cache. 800 MHz FSB.

5. Wolfdale: 2 MB L2 cache. 1066 MHz FSB. 2.5 GHz clock speed. Comparison to Pentium D: Pentium dual core is based on core technology while Pentium D is not. Pentium Dual Core consumes 65W peak power where Pentium D consumes 130W peak power. Maximum 2MB L2 cache for PDC while 4MB L2 cache for Pentium D. Despite this PDC is much faster than Pentium D under variety of CPU intensive applications.

6. Core brand refers to Intel’s 32 bit mobile dual core x86 CPU, derived from Pentium M branded processors. It used more advanced version of Intel P6 microarchitecture. It was a precursor of 64-bit Core microarchitecture of core 2 branded CPU. It contains two branches: Duo Solo

7. Intel Core Duo: It was launched by the release of the 32 bit Yonah CPU. Its dual core layout closely resembles two interconnected Pentium M branded CPU packaged as a single die silicon chip(IC). It had more in common with Pentium M branded CPU rather than 64 bit core microarchitecture of core 2 branded CPUs. It is the first Intel processor to be ever used in Apple Macintosh computers. Shared 2 MB L2 cache. An arbiter that controls both L2 cache and FSB access. 151 million transistors and each execution core contains a 12 stage pipeline.

8. Intel Core Solo: Uses the same two core die as core duo but features only one active. This is used to sell processors which have defect on one core but not on another.

9. This brand refers to Intel’s consumer 64 bit x86-64 single, dual, quad core CPUs based on the Intel Core microarchitecture. The single and dual core model are single die whereas quad core is two die, each containing two cores. It reunified desktop and laptop lines. Provides efficient decoding stages, execution units, caches reducing the power consumption and increasing the processing capacity. The Core 2 brand comprises of solo, duo, quad and extreme.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Haptics

PPT On Haptics

Download

Presentation On Haptics

Download

Haptics Presentation

Download

Related Project Report:

Haptics Report

PowerPoint Presentation On Reliable Array Of Independent Nodes

 PPT On Reliable Array Of Independent Nodes

Download

Reliable Array Of Independent Nodes Presentation Transcript:
1. INTRODUCTION
RAIN technology was able to offer the solution by minimizing the number of nodes in the chain connecting the client and server By RAIN tecnology making the existing nodes more robust and independent of each other RAIN technology provides the novel feature of replacing a faulty node by a healthy one there by avoiding the break in information flow

2. In effect with the aid of RAIN connection between a client and server can be maintained despite all the existing problems. To increase reliability and performance, one should look for ways to reduce the number of links in the chain and make each remaining link more robust.

3. Two assumptions reflect the differentiations between RAIN and a number of existing solutions both in the industry and in academia: 1. The most general share-nothing model is assumed. 2. The distributed application is not an isolated system.

4. RAIN Technology
created RAIN software, which has three components: A component that stores data across distributed processors and retrieves it even if some of the processors fail. A communications component that creates a redundant network between multiple processors and supports a single, uniform way of connecting to any of the processors. A computing component that automatically recovers and restarts applications if a processor fails.

5. Development of API’s for using the various building blocks. The implementation of a real distributed file system using the partitioning scheme developed here. The Group Communication Protocols are being extended to address more challenging scenarios.

6. Thanks.

PowerPoint Presentation On Blue Eye Technology

 PPT On Blue Eye Technology

Download

Blue Eye Technology Presentation Transcript:
1. INTRODUCTION
1.Blue eye seeks attentive computation by integrating perceptual abilities to computers wherein non-obtrusive sensing technology, such as video cameras and microphones, are used to identify and observe your action. 2.Blue Eyes aims at giving the computers the ability to sense, recognize and respond to the human communication of emotion (such as frustration, confusion, interest, distress, anger and joy).

2. Aims at creating computational machines that have perceptual and sensory abilities like those of human-beings. The basic idea behind this technology is to give computer human power. For example, we can understand human’s emotional state by his facial expressions. If we add these perceptual abilities to computer, we would enable to work together with human beings as intimate partners.

3. It provides them technical means for monitoring and recording human-operator’s physiological condition. The scope of project is to create a better working environment where the user is more productive. It is a versatile system which can be modified to cater to the working environment. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.

4. Applications
1.Blue Eyes system can be applied in every working environment requiring permanent operator's attention. 2.At power plant control rooms. 3.At captain bridges. 4.At flight control centers. 5.Operating theatres- Anesthesiologists

5. What is Blue Eyes not?
Doesn’t predict nor interfere with operator’s thoughts. Cannot force directly the operator to work. How was the term blue-eyes coined? Blue in this term stands for Bluetooth, which enables reliable wireless communication and the Eyes because the eye movement enables us to obtain a lot of interesting and important information.

6. How are blue and eyes related?The idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes. For a computer to sense the eye movement, wiring between operator and the system is required. But, this is a serious limitation of the operator’s mobility and disables his operations in large control rooms.

7. Need for blue eyes Human error is still one of the most frequent causes of catastrophes (calamity) and ecological disasters, because human contribution to the overall performance of the system is left unsupervised. The control instruments within the machine have automated it to large extent, thus Human operator becomes a passive observer of the supervised system, resulting in weariness and vigilance drop, but the user needs to active.

8. Uses of blue eyes technologyIt has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, gesture recognition, eye tracking etc. It can even understand your emotions at the touch of the mouse. This mouse is named as ‘emotion mouse’. It can verify your identity, feel your presence, and start interacting with you.

9. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. It realizes the urgency of the situation through the mouse. For instance if you ask the computer to dial to your friend at his office, it understands the situation and establishes a connection. It can reconstruct the course of operator’s work.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Technology In Sports

 PPT On Technology In Sports

Download

Technology In Sports Presentation Transcript:
1. Role Of Technology
Technology has gone a long way in proving its mettle in sports.It has created a niche for itself in every major sport on the planet.Be it the outdoor sports like soccer,tennis or cricket or their indoor counterparts like snooker,badminton or basketball,technology is used in each one of them.

2. Hawk-Eye
Hawk-Eye is a computer system used in cricket, tennis and other sports to visually track the path of the ball and display a record of its most statistically likely path as a moving image It is also used in some instances to predict the future path of a ball in cricket

3. Time-Line
It was developed by engineers at Roke Manor Research Limited of Romsey, Hampshire in the UK, in 2001. A UK patent was submitted by Dr Paul Hawkins and David Sherry. Later, the technology was spun off into a separate company, Hawk-Eye Innovations Ltd., as a joint venture with television production company Sunset + Vine.

4. Mechanism
All Hawk-Eye systems are based on the principles of triangulation using the visual images and timing data provided by at least four high-speed video cameras located at different locations and angles around the area of play.

5. Triangulation
It is the process of determining the location of a point by measuring angles to it from known points at either end of a fixed baseline, rather than measuring distances to the point directly. The point can then be fixed as the third point of a triangle with one known side and two known angles.

6. The system rapidly processes the video feeds by a high-speed video processor and ball tracker. A data store contains a predefined model of the playing area and includes data on the rules of the game.

7. In each frame sent from each camera, the system identifies the group of pixels which corresponds to the image of the ball. It then calculates for each frame the 3D position of the ball by comparing its position on at least two of the physically separate cameras at the same instant in time

8. A succession of frames builds up a record of the path along which the ball has travelled. It also "predicts" the future flight path of the ball and where it will interact with any of the playing area features already programmed into the database. The system can also interpret these interactions to decide infringements of the rules of the game.

9. Hot-Spot
Hot Spot is an infra-red imaging system used in cricket to determine whether the ball has struck the batsman, bat or pad. Hot Spot is new technology that requires two infrared cameras on opposite sides of the ground above the field of play that are continuously recording an image.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Digital Watermarking

PPT On Digital Watermarking

Download 

Digital Watermarking Presentation Transcript:
1. Information Hiding…..
started with Steganography (art of hidden writing): The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret.

2. Histaeus used his slaves (information tattooed on a slave’s shaved head )

3. What is a watermark ?
A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)

4. Digital Watermarking:
Application of Information hiding (Hiding Watermarks in digital Media, such as images) Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images) Visibility is application dependent Invisible watermarks are preferred ?

5. Copyright Protecton:
To prove the ownership of digital media

6. Tamper proofing:
To find out if data was tampered.

7. Quality Assessment:
Degradation of Visual Quality

8. Watermarking Vs Cryptography
Watermark D Hide information in D Encrypt D Change form of D

9. Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W (e.g. find the linear correlation and compare it to a threshold) Q. How do we make this system secure ? A. K is secret (Use cryptography to make information hidden more secure)

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Brain Computer Interfaces

PPT On Brain Computer Interfaces

Download

Presentation On Brain Computer Interface

Download

PowerPoint Presentation On Hadoop

PPT On Hadoop

Download

Hadoop Presentation Transcript:
1. What is Hadoop?
Hadoop was created by Douglas Reed Cutting, who named haddop after his child’s stuffed elephant to support Lucene and Nutch search engine projects. Open-source project administered by Apache Software Foundation. Hadoop consists of two key services: a. Reliable data storage using the Hadoop Distributed File System (HDFS). b. High-performance parallel data processing using a technique called MapReduce. Hadoop is large-scale, high-performance processing jobs — in spite of system changes or failures.

2. Hadoop, Why?
Need to process 100TB datasets On 1 node: – scanning @ 50MB/s = 23 days On 1000 node cluster: – scanning @ 50MB/s = 33 min Need Efficient, Reliable and Usable framework

3. Where and When Hadoop
Batch data processing, not real-time / user facing (e.g. Document Analysis and Indexing, Web Graphs and Crawling) Highly parallel data intensive distributed applications Very large production deployments (GRID) Process lots of unstructured data When your processing can easily be made parallel Running batch jobs is acceptable When you have access to lots of cheap hardware

4. Benefits of Hadoop
Hadoop is designed to run on cheap commodity hardware It automatically handles data replication and node failure It does the hard work – you can focus on processing data Cost Saving and efficient and reliable data processing

5. How Hadoop Works
Hadoop implements a computational paradigm named Map/Reduce, where the application is divided into many small fragments of work, each of which may be executed or re-executed on any node in the cluster. In addition, it provides a distributed file system (HDFS) that stores data on the compute nodes, providing very high aggregate bandwidth across the cluster. Both Map/Reduce and the distributed file system are designed so that node failures are automatically handled by the framework.

6. Hdoop Architecture
The Apache Hadoop project develops open-source software for reliable, scalable, distributed computing Hadoop Consists:: Hadoop Common*: The common utilities that support the other Hadoop subprojects. HDFS*: A distributed file system that provides high throughput access to application data. MapReduce*: A software framework for distributed processing of large data sets on compute clusters. Hadoop is made up of a number of elements. Hadoop consists of the Hadoop Common, At the bottom is the Hadoop Distributed File System (HDFS), which stores files across storage nodes in a Hadoop cluster. Above the HDFS is the MapReduce engine, which consists of JobTrackers and TaskTrackers. * This presentation is primarily focus on Hadoop architecture and related sub project

7. Data Flow
This is the architecture of our backend data warehouing system. This system provides important information on the usage of our website, including but not limited to the number page views of each page, the number of active users in each country, etc. We generate 3TB of compressed log data every day. All these data are stored and processed by the hadoop cluster which consists of over 600 machines. The summary of the log data is then copied to Oracle and MySQL databases, to make sure it is easy for people to access.

8. Hadoop Common
Hadoop Common is a set of utilities that support the other Hadoop subprojects. Hadoop Common includes FileSystem, RPC, and serialization libraries.

9. HDFS
Hadoop Distributed File System (HDFS) is the primary storage system used by Hadoop applications. HDFS creates multiple replicas of data blocks and distributes them on compute nodes throughout a cluster to enable reliable, extremely rapid computations. Replication and locality

10. For more please refer our PPT. Thanks.

Related Project Report:

Hadoop Report

PowerPoint Presentation On Location Based Services

 PPT On Location Based Services

Download

Location Based Services Presentation Transcript:
1. What is the location based service? →
A service that depends on the network knowing your location It allow consumers to receive services and advertising based on their geographic location. Eg: businesses can provide information about traffic, restaurants, retail stores, travel arrangements, or automatic teller machines based on the consumer’s location at a particular moment in time. Such services can be provided in response to a consumer’s manual input of his or her location information into the handset or by using so-called “auto-location” technology to track the location of the consumer automatically.

2. EXAMPLES:
Emergency 911 Navigation Vehicle Assistance (OnStar) Child Finder Advertising Local Search Traffic applications Automotive Vehicle Location (Fleet tracking) Asset Tracking Personnel Tracking Social Mapping Self Guided Tours Finding elderly or individuals with Alzheimers

3. LOCATION BASED COMPONENTS :
1.Mobile Devices 2.Positioning 3.Service and content provider 4.Communication Network

4. Applications Traffic Monitoring
How many cars are in the downtown area? Send an alert if a non-friendly vehicle enters a restricted region Report any congestion in the road network Once an accident is discovered, immediately send alarm to the nearest police and ambulance cars Make sure that there are no two aircrafts with nearby paths

5. Applications (Cont.)
Location-based Store Finder / Advertisement Where is my nearest Gas station? What are the fast food restaurants within 3 miles from my location? Let me know if I am near to a restaurant while any of my friends are there Send E-coupons to all customers within 3 miles of my stores Get me the list of all customers that I am considered their nearest restaurant

 6. POSITIONING RELATED TO CELL TOWERS
Whenever any device is in contact with a cell tower, it’s possible to determine which tower and, therefore, the approximate location within a general radius. When it can receive data from two towers, the fix is more accurate but still approximate. Three or more towers provides a reasonably accurate fix. Positioning Techniques 1.GPS 2.Assisted GPS 3.Positoning Principles in Mobiles Cell-ID EOTD

7. GLOBAL POSITIONING SYSTEM (GPS)
The Global Positioning System (GPS) is actually a constellation of 27 Earth-orbiting satellites (24 in operation and three extras in case one fails). Satellites circle the globe at about 19300 km making two complete rotation everyday. The orbits are arranged so that at anytime, anywhere on Earth, there are atleast four Satellites are "visible" in the sky. A GPS receiver's job is to locate four or more of these satellites, figure out the distance to each, and use this information.

 8. GPS (Global Positioning System)
24 satellites in orbit. Typically 5 to 8 are visible from any one place Device gets fix by triangulating position of satellites. Distance calculated by time it takes for signal to travel from satellite to receiver. Calculating the time it takes from 4 satellites provides an accurate fix.

9. AGPS
GPS has a slow time to fix unless it is permanently tracking satellites Assisted GPS is based upon providing GPS satellite information to the handset, via the cellular network Assisted GPS gives improvements in Time to First Fix Sensitivity,Cost Assistance Data Satellite Position Time information Visible GPS List

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Multimedia Technology

 PPT On Multimedia Technology

Download

Multimedia Technology Presentation Transcript:
1. WHAT IS MULTIMEDIA
Multimedia is media and content that uses a combination of different content forms. This includes text, graphics, audio, video, etc. Multimedia is usually recorded and played, displayed or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance

2. TYPES OF MULTIMEDIA
Linear :Linear active content progresses without any navigational control for the viewer such as a cinema presentation. Non-linear :Non-linear content offers user interactivity to control progress as used with a computer game or used in self-paced computer based training. Hypermedia is an example of non-linear content.

3. WHAT IS INTERACTIVE MULTIMEDIA
An interactive multimedia technology is any technology that accepts user input, presents information conditionally and non-linearly in response, and is capable of presenting combinations of text, sounds, pictures, animations, and/or full motion video. An essential feature of interactivity is that it is mutual: user and machine each take a more or less active role

4. BUMPTOP- INTRODUCTION
It was created at the University of Toronto By: Mr. Anand Agarawala. BumpTop is a desktop environment, designed to enhance traditional computer desktop functionality by more closely supporting the normal behavior of a real-world desk. It is aimed at stylus interaction, making it more suitable for tablet PCs and palmtops. The 1.0 version was released on April 8, 2009 It is cross platform.

5. BUMPTOP- OVERVIEW
Documents are described by three-dimensional boxes lying on a virtual desk. Extensive use of physics effects like bumping and tossing is applied to documents when they interact, for a more realistic experience. Boxes can be stacked with well-defined gestures. Multiple selection is performed by means of a LassoMenu, which fluidly combines into a single stroke the act of lasso selection and action invocation via pie menus

6. BUMPTOP-FEATURES
Being More Productive Get organized instantly Not All Files are Created Equal Toss to print ,e-mail or USB Luscious Thumbnail Previews

7. SILVERLIGHT- OVERVIEW
Silverlight applications can be written in any .NET programming language. Any development tools which can be used with .NET languages can work with Silverlight, provided they can target the Silverlight CoreCLR for hosting the application, instead of the .NET Framework CLR.

8. SILVERLIGHT - FEATURES
IIS Smooth Streaming Out of Browser Sketch Flow Deep Zoom Pivot Media Format Extensibility Perspective 3D Graphics Skinning and Styling

9. FLASH V/S SILVERLIGHT
Animation. File Size. Scripting. Video and Audio. Sound Processing. Accessibility.

10. For more please refer our PPT. Thanks.
Related Posts Plugin for WordPress, Blogger...

Blog Archive