It's powered by www.schoolseva.com

Brain Chip Seminar



Brain chips are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes. It is likely that implantable computer chips acting as sensors, or actuators, may soon assist not only failing memory, but even bestow fluency in a new language, or enable "recognition" of previously unmet individuals. The progress already made in therapeutic devices, in prosthetics and in computer science indicates that it may well be feasible to develop direct interfaces between the brain and computers. This technology is only under developmental phase, although many implants have already been made on the human brain for experimental purposes
BENEFITS OF IMPLANTABLE CHIPS
The future may well involve the reality of science fiction's cyborg, persons who have developed some intimate and occasionally necessary relationship with a machine. It is likely that implantable computer chips acting as sensors, or actuators, may soon assist not only failing memory, but even bestow fluency in a new language, or enable "recognition" of previously unmet individuals. The progress already made in therapeutic devices, in prosthetics and in computer science indicates that it may well be feasible to develop direct interfaces between the brain and computers.
Computer scientists predict that within the next twenty years neural interfaces will be designed that will not only increase the dynamic range of senses, but will also enhance memory and enable "cyberthink" — invisible communication with others. This technology will facilitate consistent and constant access to information when and where it is needed.
The linkage of smaller, lighter, and more powerful computer systems with radio technologies will enable users to access information and communicate anywhere or anytime. Through miniaturization of components, systems have been generated that are wearable and nearly invisible, so that individuals, supported by a personal information structure, can move about and interact freely, as well as, through networking, share experiences with others. The wearable computer project envisions users accessing the Remembrance Agent of a large communally based data source.
As intelligence or sensory "amplifiers", the implantable chip will generate at least four benefits:
•  It will increase the dynamic range of senses, enabling, for example, seeing IR, UV, and chemical spectra;
•  It will enhance memory;
•  It will enable "cyberthink" — invisible communication with others when making decisions, and
•  It will enable consistent and constant access to information where and when it is needed.
For many these enhancements will produce major improvements in the quality of life, or their survivability, or their performance in a job. The first prototype devices for these improvements in human functioning should be available in five years, with the military prototypes starting within ten years, and information workers using prototypes within fifteen years; general adoption will take roughly twenty to thirty years. The brain chip will probably function as a prosthetic cortical implant. The user's visual cortex will receive stimulation from a computer based either on what a camera sees or based on an artificial "window" interface.
The evolution and development of mankind began thousands and thousands of years before. And today our intelligence, our brain is a resultant of this long developmental phase.
Technology also has been on the path of development since when man appeared. It is man that gave technology its present form. But today, technology is entering a phase where it will out wit man in intelligence as well as efficiency.
Man has now to find a way in which he can keep in pace with technology, and one of the recent developments in this regard, is the brain chip implants.

Brain chips are made with a view to enhance the memory of human beings, to help paralyzed patients, and are also intended to serve military purposes. It is likely that implantable computer chips acting as sensors, or actuators, may soon assist not only failing memory, but even bestow fluency in a new language, or enable "recognition" of previously unmet individuals. The progress already made in therapeutic devices, in prosthetics and in computer science indicates that it may well be feasible to develop direct interfaces between the brain and computers.
This technology is only under developmental phase, although many implants have already been made on the human brain for experimental purposes. Let’s take a look at this developing technology.
\

Download your Presentation Papers from the following Links.


[Read More...]


Virtual Network Computing



Have you ever found yourself away from home, wishing you had your desktop machine with you? Have you ever wished you could show someone, remotely, how to do something instead of talking them through it over the phone? These things and much more can be done with a nifty little freeware utility called Virtual Network Computing, or VNC.
What VNC does is this: it enables a remote user (who knows the password) to take control of your machine via the internet. They can view files, run programs, delete stuff, etc. -- in other words, they can use your computer exactly as if they were sitting in front of it, although a bit slower. This might sound a little frightening, and it is, except that you have a good deal of control over the situation. You set the password, you can kick them out if they abuse it, and you have to be online already & have VNC Server running for anyone to access your machine. In reality, you’ll usually be setting up sessions specifically, or acting as the remote user yourself.
Another nifty thing you can do with VNC is letting someone else watch your screen, but disabling their control over your computer. This is great for showing your newbie friends how to do things -- get them logged on, and do it while they watch. It’s a lot easier than explaining it over the phone. The best part about this is that they don’t need anything special -- just a Java-capable web browser.


Download your Presentation Papers from the following Links.


[Read More...]


Antisleep Alarm for Students



While actually giving in to our body’s natural wants such as sleep, we’re keeping the balance beam in an upright and neutral position — generally a good thing to do. But life comes and calls quite often, many times forcing us to put hunger, drowsiness, and other basic human needs on the back burner in order to seal the deal and get the job done.
So here’s the scenario, you’re sitting in your car getting ready for a big meeting that if completed will net your company nice little multi-billion dollar deal. You’re supposed to be going over your notes and preparing yourself for this staple achievement. But instead, you find yourself doing the whole bobble head thing, getting dangerously to the steering wheel with each and every bob. If only there were something to keep you awake…
This circuit saves both time and electricity for students. It helps to prevent them from dozing off while studying, by sounding a beep at a fixed time interval, say, 30 minutes.
If the student is awake during the beep, he can reset the circuit to beep in the next 30 minutes. If the timer is not reset during this time, it means the student is in deep sleep or not in the room, and the circuit switches off the light and fan in the room, thus preventing the wastage of electricity.
Students: Maybe they forgot the exam was tomorrow, maybe they were out partying, or maybe they just waited until the last minute. In any case, college students always have the need to burn the midnight oil. The problem is that it is extremely easy to fall asleep in the midst of studying and before you know it, morning has come and the exam is already over or you still haven't learned the material. If you don't want that to happen, then keep this reliable anti sleep alarm at your side.
 The anti-sleep driving alarm for people doing all night drives as well as security guards and others we have to sit in one place for long periods of time without any stimulating interaction. The newest high tech way to stay awake is a good purchase for you whether you ever have to drive back home after an exhausting day at work or just need to get something done and sleep is not an option. This trusty sleep alarm will keep you at full alert and is always ready to help if your head dozes off.
This has the potential to save lives on the road. Long distance lorry drivers can fall asleep by driving too long hours due to the pressures put on them to get the goods to their destination at certain times. This item has the potential to keep them awake or at least to tell them when they are over tired and need to stop driving!
All-night Drivers: accidents due to drivers falling asleep at the wheel are quite common. Maybe a long and tiring day at the office has drained your energy and all you want to do is return home and sleep. Some drivers tend not to pay attention on long stretches of a boring road they know too well and without knowing it they doze off. Protect yourself and your passengers with this anti sleep alarm.
Security Guards: This anti sleep alarm will make sure your eyes are kept wide open and on the target.
Students: Maybe they forgot the exam was tomorrow, maybe they were out partying, or maybe they just waited until the last minute. In any case, college students always have the need to burn the midnight oil. The problem is that it is extremely easy to fall asleep in the midst of studying and before you know it, morning has come and the exam is already over or you still haven't learned the material. If you don't want that to happen, then keep this reliable anti sleep alarm at your side.
In Summary:
•           Reliable and comfortable anti sleep alarm.
•           Great for drivers, students, office workers, security guards.
•           Powerful and heavy vibrating when you doze off, turn it off when not needed
Replaceable button cell battery will last for half a year (used every day for 3 hours).
This circuit saves both time and electricity for students. It helps to prevent them from dozing off while studying, by sounding a beep at a fixed time interval, say, 30 minutes.


Download your Presentation Papers from the following Links.




[Read More...]


GSM Based Vehicle Theft Control System



Security is a prime concern in our day-today life. IR based security system is a low cost so that the concept is implemented by using an MCS 51 series micro controller.
The system is fully controlled by the 8 bit microcontroller p89S51 which has a 4Kbytes of ROM for the program memory. The system has a IR transmitter and IR receiver. These IR transmitter and receiver are connected at the Car/Bus/Van door. When any object is entering into the vehicle, Microcontroller P89s51 continuously monitor the infrared receivers ,when any object pass through the IR receiver’s then the IR rays falling on the receiver’s are obstructed, this obstruction is sensed by the microcontroller. Otherwise IR receiver receives the rays continuously from the transmitter, then automatically vehicle door is closed.  Mainly the system is used for automatica door closing purpose.
The implementation is made simpler by using IR sensor to detect the person. The system include the IR sensor, microcontroller, LED and a  5V  power is supplied to run the system.
The system uses a compact circuitry built around 8051 microcontroller Programs are developed in Embedded C. Flash magic is used for loading programs into Microcontroller.


Download your Presentation Papers from the following Links.


 
[Read More...]


Voice Portal



In its most generic sense a voice portal can be defined as “speech enabled access to Web based information”. In other words, a voice portal provides telephone users with a natural language interface to access and retrieve Web content. An Internet browser can provide Web access from a computer but not from a telephone. A voice portal is a way to do that.
Overview
The voice portal market is exploding with enormous opportunities for service providers to grow business and revenues. Voice based internet access uses rapidly advancing speech recognition technology to give users any time, anywhere communication and access-the Human Voice- over an office, wireless, or home phone. Here we would describe the various technology factors that are making voice portal the next big opportunity on the web, as well as the various approaches service providers and developers of voice portal solutions can follow to maximize this exciting new market opportunity.

The voice portal market is exploding with enormous opportunities for service providers to grow business and revenues. Voice-based Internet access uses rapidly advancing speech recognition technology to give users anytime, anywhere access to Web-based information. And it uses that most universal form of communication and access: The
human voice over an office, cellular or home phone. The potential of voice portals is as big as the reach of the telephone, which today number 1.3 billion around the world. Compare that to the 250 million computers with Internet
access and it is easy to understand why analysts believe voice-enabled Web access will take off. Frost & Sullivan* estimates a 54% growth rate for the voice portal market segment over the next six years. The Kelsey Group* predicts $5 billion in voice portal service revenues by 2005, including advertising, subscriber bounties, and location-
specific commerce, with an additional $7 billion incremental revenue to infrastructure providers that serve those companies. By 2005, they predict, 45 million users of wireless phones in North America will regularly use voice portals to perform "their everyday cyberchores."




Download your Presentation Papers from the following Links.


 
[Read More...]


Global Wireless E-Voting



ABSTRACT:
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that any body can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting “. In this the machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The overall concept of “Global Wireless E-Voting “is explained.

INTRODUCTION:

In India election has supreme weight age. So to make it secured and efficient in the vision of modern technology we are “Global Wireless E-Voting”.
Why we are looking for it?
PRESENT SYSTEM:
• Since now days voting system is replaced by electronic machine to carry out voting.
• Now in a present system each and every section is given a electronic machine which stores the votes of the people how have voted for the particular candidate.
• Control of present system is given to the in charge officer. He only check for the eligibility of the candidates and allow for the voting.
• Finally we collect all the voting machine at a place and go for counting.


Download your Presentation Papers from the following Links.


[Read More...]


Extreme Programming (XP)



Extreme Programming (XP) is actually a deliberate and disciplined approach to software development. About six years old, it has already been proven at many companies of all different sizes and industries worldwide. XP is successful because it stresses customer satisfaction. The methodology is designed to deliver the software your customer needs when it is needed. XP empowers software developers to confidently respond to changing customer requirements, even late in the life cycle. This methodology also emphasizes teamwork. Managers, customers, and developers are all part of a team dedicated to delivering quality software. XP implements a simple, yet effective way to enable groupware style development.
XP improves a software project in four essential ways; communication, simplicity feedback, and courage. XP programmers communicate with their customers and fellow programmers. They keep their design simple and clean. They get feedback by testing their software starting on day one. They deliver the system to the customers as early as possible and implement changes as suggested. With this foundation XP programmers are able to courageously respond to changing requirements and technology. XP is different. It is a lot like a jig saw puzzle. There are many small pieces. Individually the pieces make no sense, but when combined together a complete picture can be seen. This is a significant departure from traditional software development methods and ushers in a change in the way we program.

Download your Presentation Papers from the following Links.


 

[Read More...]


Speed Protocol



The use of internet become increased and the speed become reduced, and the transmission gap increased so in order to increase the speed special network processors are used for example TRIPOD register structure is being implemented here, it consists of three registers the first is used by the IP header, and the other two are used for loading and storing. The protocol processing is oblivious and the transparency originates in a simple mechanism that changes the working of the register file. It uses RF-index register files and they are numbered identically and they have the same IP address.
          They are multiplexed at the end of the processor at the end of the processor core. The TRIPOD register structure is mainly implemented in RISC processor and they will have high performance.


Download your Presentation Papers from the following Links.





[Read More...]


Cellular Positioning



Location related products are the next major class of value added services that mobile network operators can offer their customers. Not only will operators be able to offer entirely new services to customer s, but they will also be able to offer improvements on current services such as location-based prepaid or information services. The deployment of location based se rvices is being spurred by several factors:
Competition : The need to find new revenue enhancing and differentiating value added services has been increasing and will continue to increase over time.

Regulation : The Federal Communications Commission (FCC) of the USA adopted a ruling in June 1996 (Docket no. 94-102) that requires all mobile network operators to provide location information on all calls to “911”, the emergency services. The FCC mandated that by 1 st October 2001, all wireless 911 calls must be pinpointed within125 meters, 67% of the time. On December 24 1998, the FCC amended its ruling to allow terminal based solutions as well as network based ones (CC Docket No. 94-102, Waivers for Handset-Based Approaches).
There are a number of regulations that location based services must comply with, not least of all to protect the privacy of the user. Mobile Streams believes that it is essential to comply with all such regulations fully. However, such regulations are only the starting point for such services- there are possibilities for a high degree of innovation in this new market that should not be overlooked.
Technology : There have been continuous improvements in handset, network and positioning technologies. For example, in 1999, Benefon, a Finnish GSM and NMT terminal vendor launched the ESC! GSM/ GPS mapping phone.

Download your Presentation Papers from the following Links.


[Read More...]


Service Oriented Architecture



"Things should be made as simple as possible, but no simpler." -- Albert Einstein

Introduction

Einstein made that famous statement many decades ago, and it's still relevant today for building superior software systems. Unfortunately, as anyone who has been in the IT industry for long can point out, far too many software systems have failed Einstein's test. Some are made too simple to carry out the duties they are supposed to perform. Others are made too complex, and the costs of building and maintaining them have rocketed, not to mention the nearly impossible tasks of integrating different systems together. It seems that reaching the right level of simplicity is more like a dream than reality. Where have we gone wrong?
Service Oriented Architecture (SOA) defines how to integrate widely disparate applications for a world that is web based and uses multiple implementation platforms. Hereby is proposed an e-learning management system with Web service oriented framework. The system will be an open source application with client-scripting facility. It also supports the cross browser and it is fully integrated with different databases; MS SQL Server, MS Access, Oracle, and LDAP.  The key values of Interoperability
durability, compatibility, manageability, dynamic reusability, and accessibility in the proposed architecture enhance the future elearning systems to communicate more efficiently and share data more easily.
Service based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable, and  secure manner, easy and reliable internet-based method to create and access learning.
Web Service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered on the top of standard transfer protocols for transmitting messages that currently, the most common ones are the XML-based specification SOAP (Simple Object Access Protocol), UDDI (Universal Description, Discovery and Integration), and WSDL (Web Service Description Language) [5] [12].E-learning is a general term used to refer to a form of learning in which the instructor and student are separated by space or time where the gap between the two is bridged through the use of online technologies. 
Many technologies can be, and are, used in e-learning, including:   
  • Blogs and Wikis.   
  • Collaborative software.   
  • Computer aided assessment.   
  • Discussion boards.   
  • Electronic performance support sys  
  • Learning management systems.   
  • Virtual classrooms.   
  • Web-based teaching materials.   
  • Web-based component services.

When beginning to create e-learning content, the students’ profiles and courses have to be stored in the system database and presented using web application to facilitate the
functionality of building an e-learning management system. 
The proposed system is an advanced, 3-tier, database-driven using Microsoft ASP.NET 3.5 with VB.NET. The system is divided into several phases; each phase describes a
number of actions. The model used in building the system is the “Evolutionary Model”, because it is easy to use, it allows small systems to be developed rapidly, and it allows user engagement with the application.


Download your Presentation Papers from the following Links.


 
 
Service Oriented Design Architecture.pdf
Service Oriented Architecture.pdf
Service Oriented Architecture.pdf
Simple Benefits of Service Oriented Architecture.pdf
[Read More...]


Digital jewellery



Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewelry adorns the body, and has very little practical purpose. However, researchers are looking to change the way we think about the beads and bobbles we wear. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence.
It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper discusses about a new Java-based, computerized ring that will automatically unlock doors and log on to computers.
The latest computer craze has been to be able to wear wireless computers. The Computer Fashion Wave, "Digital Jewelry" looks to be the next sizzling fashion trend of the technological wave. The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence. Today’s, manufacturers place millions of transistors on a microchip, which can be used to make small devices that store tons of digital data.. The whole concept behind this is to be able to communicate to others by means of wireless appliances. The other key factor of this concept market is to stay fashionable at the same time.

Download your Presentation Papers from the following Links.


[Read More...]


Clockless chip Seminar.



How fast is your personal computer? When people ask this question, they are typically
referring to the frequency of a minuscule clock inside the computer, a crystal oscillator that sets the basic rhythm used throughout the machine. In a computer with a speed of one gigahertz, for example, the crystal "ticks" a billion times a second. Every action of the
computer takes place in tiny steps, each a billionth of a second long.
A simple transfer of data may take only one step; complex calculations may take many steps. All operations, however, must begin and end according to the clock's timing signals. The use of a central clock also creates problems. As speeds have increased, distributing the timing signals has become more and more difficult.
Present day transistors can process data so quickly that they can accomplish several steps in the time that it takes a wire to carry a signal from one side of the chip to the other. Keeping the rhythm identical in all parts of a large chip requires careful design and a great deal of electric al power. Wouldn't it be nice to have an alternative? Clockless approach, which uses a technique known as asynchronous logic, differs from conventional computer circuit design in that the switching on and off of digital circuits is controlled individually by specific pieces of data rather than by a tyrannical clock that forces all of the millions of the circuits on a chip to march in unison. It overcomes all the disadvantages of a clocked circuit such as slow speed, high power consumption, high electromagnetic noise etc.
For these reasons the clockless technology is considered as the technology which is going to drive majority of electronic chips in the coming years.

Download your Presentation Papers from the following Links.


 
 
[Read More...]


XML Encryption



As XML becomes a predominant means of linking blocks of information together, there is a requirement to secure specific information. That is to allow authorized entities access to specific information and prevent access to that specific information from unauthorized entities. Current methods on the Internet include password protection, smart card, PKI, tokens and a variety of other schemes. These typically solve the problem of accessing the site from unauthorized users, but do not provide mechanisms for the protection of specific information from all those who have authorized access to the site.
Now that XML is being used to provide searchable and organized information there is a sense of urgency to provide a standard to protect certain parts or elements from unauthorized access. The objective of XML encryption is to provide a standard methodology that prevents unauthorized access to specific information within an XML document.

Download your Presentation Papers from the following Links.



[Read More...]


Supercavitation Seminar Report



Supercavitation is the state of the art technology that may revolutionize underwater propulsion systems. Cavitation is a problem for most of the engineering application where as supercavitation is the booming scientific discovery for underwater automobiles, torpedo and propellers.
Cavitation is the process of formation of vapour bubbles of flowing fluid in a region where the pressure of the liquid falls below its vapour pressure and the sudden collapsing of these vapour bubbles in region of high pressure. At first small vapour filled bubbles are formed that gradually increase in size. As the pressure of the surrounding liquid increases, the cavity suddenly collapses-a centimeter sized cavity collapses in milliseconds. These Cavities implode violently and create shock waves that dig pits in exposed metal surfaces thus causing damage to the material.
 “Water limits even nature's strategies, and the fastest bird moves twice as quickly as the fastest fish”.
 The phenomenon holding back the fish is the tremendous resistance that water offers to a moving object, called drag. The same drag acts on the bird as well, but the magnitude is considerably less owing to the lesser density of air. The human being has crossed the sound barrier in air and land, what about underwater.
 Water is the most challenging environment for an Engineer. Being 1000 times denser than air, it offers resistance roughly 1000 times as high as that in air. Supersonic under Water Travel is the dream of scientists working on a bizarre technology called SUPERCAVITATION.
 Supercavitation is the state of the art technology that may revolutionize underwater propulsion systems.

Download your Presentation Papers from the following Links.


 
[Read More...]


Solid State Drive



ABSTRACT
Digital evidence is increasingly relied upon in computer forensic examinations a nd legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnet ic hard drives to solid-state drives inside modern computers has so far attracted very little attention from the research community.
Here we show that it is imprudent and potentially reckless to rely on existing evidence collection processes and procedures, and we demonstrate that conventional assumptions about the behaviour of storage media are no longer valid. In particular, we demonstrate that modern storage devices can operate under their own volition in the absence of computer instructions. Such operations are highly destructive of traditionally recoverable data. This can contaminate evidence; can obfuscate and make validation of digital eviden ce reports difficult; can complicate the process of live and dead analysis recovery; and can complicate and frustrate the post recovery forensic analysis.
Our experimental findings demonstrate that solid-state drives (SSDs) have the capacity to destroy evidence catastrophically under their own volition, in the absence of specific in structions to do so from a computer. Keywords: digital evidence, digital forensic analysis, self -contamination, solid-state drive, SSD, garbage collection, write-blocker

Download your Presentation Papers from the following Links.


[Read More...]


Transparent electronics



Transparent electronics is an emerging science and technology field focused on producing ‘invisible’ electronic circuitry and opto-electronic devices. Applications include consumer electronics, new energy sources, and transportation; for example, automobile windshields could transmit visual information to the driver. Glass in almost any setting could also double as an electronic device, possibly improving security systems or offering transparent displays. In a similar vein, windows could be used to produce electrical power. Other civilian and military applications in this research field include realtime wearable displays.
As for conventional Si/III–V-based electronics, the basic device structure is based on semiconductor junctions and transistors. However, the device building block materials, the semiconductor, the electric contacts, and the dielectric/passivation layers, must now be transparent in the visible –a true challenge! Therefore, the first scientific goal of this technology must be to discover, understand, and implement transparent high-performance electronic materials. The second goal is their implementation and evaluation in transistor and circuit structures.


Download your Presentation Papers from the following Links.


[Read More...]


Plastic Welding



Introduction to Plastic Welding
Plastic welding and spot welding - both are almost similar to each other. There is a difference noted. In plastic welding, heat is supplied through convection of the pincher tips, instead of conduction. The two plastic pieces are brought together. At the time of welding, a jet of hot air is liberated. This melts the parts to be joined along with the plastic filler rod. As the rod starts melting, it is forced into the joint and causes the fusion of the parts.
Plastic identification is the first point to be noted in order to choose a suitable plastic welding rod. A plastic welding rod or thermoplastic welding rod is of a constant cross-section shape. Using this, two plastic pieces can be joined. It may have a circular or triangular cross-section. Porosity of the plastic welding rod is an important factor. Air bubbles in the rod will be created due to its high porosity. This is responsible for decreasing the quality of the welding. So, the rods used must maintain zero porosity. Otherwise, they should be void less. Products like chemical tanks, water tanks, heat exchangers and plumbing fittings are manufactured by using the technique of plastic welding. By adopting this technique, money can be saved.
Using plastic welding, two plastics can be welded together. This type of weld is performed on children's toys, lawn furniture, auto parts and other plastic equipments which are used daily - both for domestic and commercial purposes. In order to join the thermoplastics, when they are heated an under a particular pressure, this type of welding is employed. In normal practice, using filler material, the pieces are joined together. There are certain occasions wherein filler material can be avoided. Generally, plastic is not durable and has a shorter life span. Natural elements like cold weather, ultraviolet radiation from the sun or continuous exposure to chemicals causing contamination, will create damage to plastic products. Plastic can be subjected to damage if it is hit on a hard surface. But, as the price of new parts is high, it is preferred to repair the existing products.


Download your Presentation Papers from the following Links.


 
[Read More...]


Blade Server



A blade server is a stripped down server computer with a modular design optimized to minimize the use of physical space and energy. Whereas a standard rack-mount server can function with (at least) a power cord and network cable, blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. A blade enclosure, which can hold multiple blade servers, provides services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form the blade system. (Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system altogether.)
In a standard server-rack configuration, 1U (one rack unit, 19" [48 cm] wide and 1.75" [4.45 cm] tall) defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation; As of 2009, densities of up to 128 discrete servers per rack are achievable with blade systems.


Download your Presentation Papers from the following Links.


[Read More...]


Near Field Communication



NFC is one of the latest wireless communication technologies. As a short-range wireless connectivity technology, NFC offers safe — yet simple and intuitive — communication between electronic devices. Users of NFC-enabled devices can simply point or touch their devices to other NFC-enabled elements in the environment to communicate with them, making application and data usage easy and convenient.
         With NFC technology, communication occurs when an NFC-compatible device is brought within a few centimeters of another NFC device or an NFC tag. The big advantage of the short transmission range is that it inhibits eavesdropping on NFC-enabled transactions. NFC technology opens up exciting new usage scenarios for mobile devices.
                                     INTRODUCTION
        Near Field Communication (NFC) is a technology for contactless short-range communication. Based on the Radio Frequency Identification (RFID), it uses magnetic field induction to enable communication between electronic devices. The number of short-range applications for NFC technology is growing continuously, appearing in all areas of life. Especially the use in conjunction with mobile phones offers great opportunities.
One of the main goals of NFC technology has been to make the benefits of short-range contactless communications available to consumers globally. The existing radio frequency (RF) technology base has so far been driven by various business needs, such as logistics and item tracking. While the technology behind NFC is found in existing applications, there has been a shift in focus — most notably, in how the technology is used and what it offers to consumers.
With just a point or a touch, NFC enables effortless use of the devices and gadgets we use daily. Here are some examples of what a user can do with an NFC mobile phone in an NFC-enabled environment:
  • Download music or video from a smart poster.
  • Exchange business cards with another phone.
  • Pay bus or train fare.
  • Print an image on a printer.
  • Use a point-of-sale terminal to pay for a purchase, the same way as with a standard contactless credit card.
  • Pair two Bluetooth devices.
   
An NFC-enabled phone functions much like standard contactless smart cards that are used worldwide in credit cards and in tickets for public transit systems. Once an application, such as a credit card application, has been securely provisioned to the NFC-enabled phone, the customer can pay by simply waving the phone at a point-of-sale reader. The NFC phone also offers enhanced security, enabling the user to protect the secure applications through the phone's user interface features.


Download your Presentation Papers from the following Links.


[Read More...]


Wearable sensors and systems



Wearable sensors and systems have evolved to the point that they can be considered ready for clinical application. The use of wearable monitoring devices that allow continuous or intermittent monitoring of physiological signals is critical for the advancement of both the diagnosis as well as treatment of diseases. Wearable systems are totally non-obtrusive devices that allow physicians to overcome the limitations of ambulatory technology and provide a response to the need for monitoring individuals over weeks or months. They typically rely on wireless miniature sensors enclosed in patches or bandages or in items that can be worn, such as ring or shirt. The data sets recorded using these systems are then processed to detect events predictive of possible worsening of the patient’s clinical situations or they are explored to access the impact of clinical interventions.

Download your Presentation Papers from the following Links.


[Read More...]


 

Recent Posts

Popular Posts

Total Pageviews

Return to top of page Copyright © 2011 | Kuppam Engineering College Converted into Blogger Template by Mohan Murthy