Search PPTs

Friday, July 23, 2010

PowerPoint Presentation On DNS

PPT On DNS

Download

DNS Presentation Transcript:
1. The Domain Name System
Overview What is DNS?? DNS HIERARCHY TYPES OF NAME SERVERS How to Access a Web Page?? TYPES OF DNS QUERIES DNS CACHING Why not Centralize DNS??

2. The domain name system is usually used to translate a host name into an IP address. Domain names comprise a hierarchy so that names are unique, yet easy to remember.

3. An address is how you get to an endpoint Often hierarchical, which helps with scaling 950 Charter Street, Redwood City CA, 94063 +1.650.381.6003 204.152.187.11 A name is how an endpoint is referenced Often with no structurally significant hierarchy “David”, “Tokyo”, “studygalaxy.com”,”google.com”. Names are more people-friendly.

4. Devices on the telephone network all have a number People have a hard time remembering numbers, but… The network needs the numbers to connect endpoints So a directory provides association of names people know with the numbers where they can be reached Computers on the Internet all have a number The DNS takes names people can relate to and converts them into the numbers computers need to interact. This analogy has a crucial flaw: The DNS is not a directory service. There is no way to search the data.

5. ROOT NAME SERVERS
TOP-LEVEL DOMAIN(TLD) NAME SERVERS AUTHORITATIVE NAME SERVERS LOCAL NAME SERVERS

 6. contacted by local name server that can not resolve name root name server: contacts authoritative name server if name mapping not known gets mapping returns mapping to local name server

7. Top-level domain (TLD) servers:
responsible for com, org, net, edu, etc, and all top-level country domains uk, fr, ca, jp. Network solutions maintains servers for com TLD Educause for edu TLD Authoritative DNS servers: organization’s DNS servers, providing authoritative hostname to IP mappings for organization’s servers (e.g., Web and mail). Can be maintained by organization or service provider

8. Each ISP (residential ISP, company, university) has one. Also called “default name server” When a host makes a DNS query, query is sent to its local DNS server Acts as a proxy, forwards query into hierarchy. Reduces lookup latency for commonly searched hostnames

9. When You type http://www.studygalaxy.com into your web browser and hit enter. What happens now?

10. For more please refer our PPT. Thanks.

Related Project Report:

DNS Report

PowerPoint Presentation On Meta Search Engines

PPT On Meta Search Engines

Download

Meta Search Engines Presentation Transcript:
1. CONTENTS
Working of search engine. Meta search engine. Need of meta search engine ? Working of Meta search engines Meta search engine activities Advantage and Disadvantages Meta search Algorithm Fitness Function for Web-Search

2. Working of search engine
Traditional search engines return relevant results based on complex algorithms. Their “knowledge” of the web is based on its use of Internet spiders.

3. Working of search engine
Internet spiders are programs that request a web page, parse its contents, and return the results to the search engine. As part of the parsing process, the spider identifies hyperlinks on the page. It chooses one of these hyperlinks to decide which page to parse next.

4. Examples of Search Engines
A few popular traditional search engines are: Google ( www.google.com) Ask Jeeves! ( www.ask.com) MSN Search ( www.msn.com) Lycos ( www.lycos.com)

5. Meta Search Engines
While meta-search engines do use page-ranking algorithms, they do not use spiders to gather web content. Instead, meta search engines query multiple traditional search engines and rank the hits returned from all of them. The results may be listed by the engine that returned them while others may eliminate data about which engine returned each hit altogether.

6. Meta Search Engines
Completeness of the index is not the only factor in the quality of search results. "Junk results" often wash out any results that a user is interested in. we want our notion of "relevant" to only include the very best documents since there may be tens of thousands of slightly relevant documents.

7. Meta Search Engines
Meta-search engines do not own a database of Web pages; they create a virtual database. They do not compile a physical database or catalogue of the web. Instead, they take a user's request, pass it to several other heterogeneous databases and then compile the results in a homogeneous manner based on a specific algorithm.

8. Main Metasearch Engine Activities
Source selection Which search engines to search. Employs profiles of each search engine to make decision Query dispatching. Translating a query to a local format.

9. Main Metasearch Engine Activities
Result selection. Picking from the multiple result sets. Some results lists might be pruned if they come from less relevant search engines. Result merging. Unifying/ranking the selected results. Rankings from individual lists.

10. For more please refer our PPT. Thanks.

Related Project Report:

Meta Search Engine

PowerPoint Presentation On Sixth Sense Technology

PPT On Sixth Sense Technology
Download

Presentation On Sixth Sense Technology


Sixth Sense Technology PPT
Download

PowerPoint Presentation On 3D Time Of Flight Camera

 PPT On 3D Time Of Flight Camera

Download

3D Time Of Flight Camera Presentation Transcript:
1. The 3D-Time-of-Flight camera
(ToF) is a new concept for image and video capturing - captures not only two, but three dimensions in one step by measuring the distance from each pixel of the camera chip to the object. This way a large number of coordinates is determined for each exposure – a so called frame. The systems cover ranges of a few meters up to about 60 m. The distance resolution is about 1 cm. The biggest advantage of the cameras may be that they provide up to 100 images per second.

2. Illumination unit:
It illuminates the scene. Normally LEDs and Laser diodes are feasible. The illumination normally uses infrared light to make the illumination unobtrusive. Image sensor: This is the heart of the TOF camera. Each pixel measures the time the light has taken to travel from the illumination unit to the object and back.. Optics: A lens gathers the reflected light and images the environment onto the image sensor. An optical band pass filter only passes the light with the same wavelength as the illumination unit. This helps suppress background light.

3. Driver electronics:
Both the illumination unit and the image sensor have to be controlled by high speed signals. These signals have to be very accurate to obtain a high resolution. Computation/Interface: The distance is calculated directly in the camera. To obtain good performance, some calibration data is also used. The camera then provides a distance image over a USB or Ethernet interface.

4. A Time of flight camera (TOFcamera) is a camera system that creates distance data with help of the following principle : Time of Flight Principle(TOF) describes a variety of methods that measure the time that it takes for an object, particle or acoustic, electromagnetic or other wave to travel a distance through a medium. This measurement can be used for a time standard, as a way to measure velocity or path length through a given medium, or as a way to learn about the particle or medium . The traveling object may be detected directly or indirectly

5. The 3D Time-Of-Flight (ToF) camera, simultaneously delivers gray-level images and 3D information of the scene. Illumination source is in the form of matrix of LEDs. On the basis of reflected ray: Distance Image (D(i, j)) is computed based on the phase shift between the emitted and reflected signals Amplitude Image (A(i, j)) is estimated based on the amplitude of the reflected signal at every pixel location

6. A ToF camera actively illuminates a scene with an incoherent light signal. The signal is modulated by a cosine-shaped signal of frequency f. Usually, the emitted light is part of the non-visible area of the spectrum in the near infrared spectral range (780 nm). Traveling with the constant speed of light in the surrounding medium, the light signal is reflected by the surface of the patient. By estimating the phase-shift f (in rad) between both, the emitted and reflected light signal, the distance D(i,j) can be computed as follows: d=1/2(n*wavelength + phase)

7. the amplitude image A(i, j) is estimated based on the amplitude of the reflected signal at every pixel location. For emitted ray: D (t0) = Acos wt(0). For reflected ray: d(t) = k + a cos (wt + ). Use of depth information in addition to amplitude may be a key factor for finding workable solutions to a number of applications of interest,e.g., face detection, video surveillance etc. TOF-can generate a depth map of what is being seen through the camera at a short range, and use this data to approximate a 3d representation of what is being seen.? These can be effective for detection of hand gestures due to their short range capabilities.

8. Pulsed light source with digital time counters These devices produce depth values for each pixel on every frame. Typical image sizes are 128 x 128 pixels. RF-modulated light sources with phase detectors Photonic Mixer Devices (PMD) and the Swiss Ranger are eg. These are compact & short range devices. Range gated imagers This is the most promising technology. The phase detector is the gate or shutter in the camera. The gate allows collection of portions and of the received light pulse. The Z-cam and Canesta 3D cameras.

9. Simplicity Efficient Distance Algorithm Speed

10. For more please refer our PPT. Thanks.

Related Project Report:

3D Time Of Flight Camera

PowerPoint Presentation On Chameleon Chip

PPT On Chameleon Chips

Download

Chameleon Chip Presentation Transcript:
1. Chameleon Chip

2. INTRODUCTION
A reconfigurable processor is a microprocessor with erasable hardware that can rewire itself dynamically. This allows the chip to adapt effectively to the programming tasks demanded by the particular software they are interfacing with at any given time.
Reconfigurable processor chip usually contains several parallel processing computational units known as functional blocks.

3. CONTD..
When a particular software is loaded the present hardware design is erased and a new hardware design is generated by making a particular number of connections active while making others idle.

4. CONTD..
It is possible to get ten times better performance, with ten times lower energy consumption at the same time, according to Heysters. He did his research at the Centre for Telematics and Information Technology of the University of Twente in The Netherlands.

5. WHAT IS RECONFIGURABLE PROCESSOR??
A reconfigurable processor is a microprocessor with erasable hardware that can rewire itself dynamically.

6. CONTD..
For example, a single device could serve as both a camera and a tape recorder (among numerous other possibilities): you would simply download the desired software and the processor would reconfigure itself to optimize performance for that function.

7. CONTD..
• ASIC provide ultimate performance but fail in time-to-market and unable to satisfy the need of flexibility.
• Reconfiguration versus Dedicated Hardware - higher performance, lower cost and lower power consumption.

8. ADVANTAGES
can create customized communications signal processors increased performance and channel count can more quickly adapt to new requirements and standards lower development costs and reduce risk. Reducing power Reducing manufacturing cost.

9. DISADVANTAGES
Inertia – Engineers slow to change Inertia is the worst problem facing reconfigurable computing  RCP designs requires comprehensive set of tools 'Learning curve' for designers unfamiliar with reconfigurable logic

10. For More Please Refer Our PPT. Thank You.

Related Project Report:

Chameleon Chips

PowerPoint Presentation On Multi Core Technology

 PPT On Multi Core Technology

Download

Multi Core Technology  Presentation Transcript:
1. In this technology, multiple cores of processors are packaged on a single die. Multi Core Technology is researched more nowadays because it is realized that it is better to focus on real multiprogramming, multithreading instead of focusing on increase in clock speed, performance of single core of processor.

2. Dual core technology is multiple core technology in which two core of CPUs are connected on a single die. Eg. Include pentium dual core, intel core duo, intel core2 duo, AMD athlon X2 etc.

3. This brand refers to mainstream x86 architecture microprocessors from Intel. They are based on both 32 bit and 64 bit. In terms of features, price and performance at given clock speed, Pentium dual core comes above Celeron but below Intel core duo and core 2 duo.

4. Yonah: It has 32 bit Pentium M derived core and resembles to core duo architecture. 1 MB L2 cache instead of 2MB L2 cache in core duo. 533 MHz FSB. Allendale: Support Intel 64 extension. Based on core architecture. Resembles with core 2 duo but have 1 MB L2 cache. 800 MHz FSB.

5. Wolfdale: 2 MB L2 cache. 1066 MHz FSB. 2.5 GHz clock speed. Comparison to Pentium D: Pentium dual core is based on core technology while Pentium D is not. Pentium Dual Core consumes 65W peak power where Pentium D consumes 130W peak power. Maximum 2MB L2 cache for PDC while 4MB L2 cache for Pentium D. Despite this PDC is much faster than Pentium D under variety of CPU intensive applications.

6. Core brand refers to Intel’s 32 bit mobile dual core x86 CPU, derived from Pentium M branded processors. It used more advanced version of Intel P6 microarchitecture. It was a precursor of 64-bit Core microarchitecture of core 2 branded CPU. It contains two branches: Duo Solo

7. Intel Core Duo: It was launched by the release of the 32 bit Yonah CPU. Its dual core layout closely resembles two interconnected Pentium M branded CPU packaged as a single die silicon chip(IC). It had more in common with Pentium M branded CPU rather than 64 bit core microarchitecture of core 2 branded CPUs. It is the first Intel processor to be ever used in Apple Macintosh computers. Shared 2 MB L2 cache. An arbiter that controls both L2 cache and FSB access. 151 million transistors and each execution core contains a 12 stage pipeline.

8. Intel Core Solo: Uses the same two core die as core duo but features only one active. This is used to sell processors which have defect on one core but not on another.

9. This brand refers to Intel’s consumer 64 bit x86-64 single, dual, quad core CPUs based on the Intel Core microarchitecture. The single and dual core model are single die whereas quad core is two die, each containing two cores. It reunified desktop and laptop lines. Provides efficient decoding stages, execution units, caches reducing the power consumption and increasing the processing capacity. The Core 2 brand comprises of solo, duo, quad and extreme.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Haptics

PPT On Haptics

Download

Presentation On Haptics

Download

Haptics Presentation

Download

Related Project Report:

Haptics Report

PowerPoint Presentation On Reliable Array Of Independent Nodes

 PPT On Reliable Array Of Independent Nodes

Download

Reliable Array Of Independent Nodes Presentation Transcript:
1. INTRODUCTION
RAIN technology was able to offer the solution by minimizing the number of nodes in the chain connecting the client and server By RAIN tecnology making the existing nodes more robust and independent of each other RAIN technology provides the novel feature of replacing a faulty node by a healthy one there by avoiding the break in information flow

2. In effect with the aid of RAIN connection between a client and server can be maintained despite all the existing problems. To increase reliability and performance, one should look for ways to reduce the number of links in the chain and make each remaining link more robust.

3. Two assumptions reflect the differentiations between RAIN and a number of existing solutions both in the industry and in academia: 1. The most general share-nothing model is assumed. 2. The distributed application is not an isolated system.

4. RAIN Technology
created RAIN software, which has three components: A component that stores data across distributed processors and retrieves it even if some of the processors fail. A communications component that creates a redundant network between multiple processors and supports a single, uniform way of connecting to any of the processors. A computing component that automatically recovers and restarts applications if a processor fails.

5. Development of API’s for using the various building blocks. The implementation of a real distributed file system using the partitioning scheme developed here. The Group Communication Protocols are being extended to address more challenging scenarios.

6. Thanks.

PowerPoint Presentation On Blue Eye Technology

 PPT On Blue Eye Technology

Download

Blue Eye Technology Presentation Transcript:
1. INTRODUCTION
1.Blue eye seeks attentive computation by integrating perceptual abilities to computers wherein non-obtrusive sensing technology, such as video cameras and microphones, are used to identify and observe your action. 2.Blue Eyes aims at giving the computers the ability to sense, recognize and respond to the human communication of emotion (such as frustration, confusion, interest, distress, anger and joy).

2. Aims at creating computational machines that have perceptual and sensory abilities like those of human-beings. The basic idea behind this technology is to give computer human power. For example, we can understand human’s emotional state by his facial expressions. If we add these perceptual abilities to computer, we would enable to work together with human beings as intimate partners.

3. It provides them technical means for monitoring and recording human-operator’s physiological condition. The scope of project is to create a better working environment where the user is more productive. It is a versatile system which can be modified to cater to the working environment. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.

4. Applications
1.Blue Eyes system can be applied in every working environment requiring permanent operator's attention. 2.At power plant control rooms. 3.At captain bridges. 4.At flight control centers. 5.Operating theatres- Anesthesiologists

5. What is Blue Eyes not?
Doesn’t predict nor interfere with operator’s thoughts. Cannot force directly the operator to work. How was the term blue-eyes coined? Blue in this term stands for Bluetooth, which enables reliable wireless communication and the Eyes because the eye movement enables us to obtain a lot of interesting and important information.

6. How are blue and eyes related?The idea is to monitor and record operator’s basic physiological parameters, the most important physiological activity is the movement of eyes. For a computer to sense the eye movement, wiring between operator and the system is required. But, this is a serious limitation of the operator’s mobility and disables his operations in large control rooms.

7. Need for blue eyes Human error is still one of the most frequent causes of catastrophes (calamity) and ecological disasters, because human contribution to the overall performance of the system is left unsupervised. The control instruments within the machine have automated it to large extent, thus Human operator becomes a passive observer of the supervised system, resulting in weariness and vigilance drop, but the user needs to active.

8. Uses of blue eyes technologyIt has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, gesture recognition, eye tracking etc. It can even understand your emotions at the touch of the mouse. This mouse is named as ‘emotion mouse’. It can verify your identity, feel your presence, and start interacting with you.

9. The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states. It realizes the urgency of the situation through the mouse. For instance if you ask the computer to dial to your friend at his office, it understands the situation and establishes a connection. It can reconstruct the course of operator’s work.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Technology In Sports

 PPT On Technology In Sports

Download

Technology In Sports Presentation Transcript:
1. Role Of Technology
Technology has gone a long way in proving its mettle in sports.It has created a niche for itself in every major sport on the planet.Be it the outdoor sports like soccer,tennis or cricket or their indoor counterparts like snooker,badminton or basketball,technology is used in each one of them.

2. Hawk-Eye
Hawk-Eye is a computer system used in cricket, tennis and other sports to visually track the path of the ball and display a record of its most statistically likely path as a moving image It is also used in some instances to predict the future path of a ball in cricket

3. Time-Line
It was developed by engineers at Roke Manor Research Limited of Romsey, Hampshire in the UK, in 2001. A UK patent was submitted by Dr Paul Hawkins and David Sherry. Later, the technology was spun off into a separate company, Hawk-Eye Innovations Ltd., as a joint venture with television production company Sunset + Vine.

4. Mechanism
All Hawk-Eye systems are based on the principles of triangulation using the visual images and timing data provided by at least four high-speed video cameras located at different locations and angles around the area of play.

5. Triangulation
It is the process of determining the location of a point by measuring angles to it from known points at either end of a fixed baseline, rather than measuring distances to the point directly. The point can then be fixed as the third point of a triangle with one known side and two known angles.

6. The system rapidly processes the video feeds by a high-speed video processor and ball tracker. A data store contains a predefined model of the playing area and includes data on the rules of the game.

7. In each frame sent from each camera, the system identifies the group of pixels which corresponds to the image of the ball. It then calculates for each frame the 3D position of the ball by comparing its position on at least two of the physically separate cameras at the same instant in time

8. A succession of frames builds up a record of the path along which the ball has travelled. It also "predicts" the future flight path of the ball and where it will interact with any of the playing area features already programmed into the database. The system can also interpret these interactions to decide infringements of the rules of the game.

9. Hot-Spot
Hot Spot is an infra-red imaging system used in cricket to determine whether the ball has struck the batsman, bat or pad. Hot Spot is new technology that requires two infrared cameras on opposite sides of the ground above the field of play that are continuously recording an image.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Digital Watermarking

PPT On Digital Watermarking

Download 

Digital Watermarking Presentation Transcript:
1. Information Hiding…..
started with Steganography (art of hidden writing): The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret.

2. Histaeus used his slaves (information tattooed on a slave’s shaved head )

3. What is a watermark ?
A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)

4. Digital Watermarking:
Application of Information hiding (Hiding Watermarks in digital Media, such as images) Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images) Visibility is application dependent Invisible watermarks are preferred ?

5. Copyright Protecton:
To prove the ownership of digital media

6. Tamper proofing:
To find out if data was tampered.

7. Quality Assessment:
Degradation of Visual Quality

8. Watermarking Vs Cryptography
Watermark D Hide information in D Encrypt D Change form of D

9. Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W (e.g. find the linear correlation and compare it to a threshold) Q. How do we make this system secure ? A. K is secret (Use cryptography to make information hidden more secure)

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Brain Computer Interfaces

PPT On Brain Computer Interfaces

Download

Presentation On Brain Computer Interface

Download

PowerPoint Presentation On Hadoop

PPT On Hadoop

Download

Hadoop Presentation Transcript:
1. What is Hadoop?
Hadoop was created by Douglas Reed Cutting, who named haddop after his child’s stuffed elephant to support Lucene and Nutch search engine projects. Open-source project administered by Apache Software Foundation. Hadoop consists of two key services: a. Reliable data storage using the Hadoop Distributed File System (HDFS). b. High-performance parallel data processing using a technique called MapReduce. Hadoop is large-scale, high-performance processing jobs — in spite of system changes or failures.

2. Hadoop, Why?
Need to process 100TB datasets On 1 node: – scanning @ 50MB/s = 23 days On 1000 node cluster: – scanning @ 50MB/s = 33 min Need Efficient, Reliable and Usable framework

3. Where and When Hadoop
Batch data processing, not real-time / user facing (e.g. Document Analysis and Indexing, Web Graphs and Crawling) Highly parallel data intensive distributed applications Very large production deployments (GRID) Process lots of unstructured data When your processing can easily be made parallel Running batch jobs is acceptable When you have access to lots of cheap hardware

4. Benefits of Hadoop
Hadoop is designed to run on cheap commodity hardware It automatically handles data replication and node failure It does the hard work – you can focus on processing data Cost Saving and efficient and reliable data processing

5. How Hadoop Works
Hadoop implements a computational paradigm named Map/Reduce, where the application is divided into many small fragments of work, each of which may be executed or re-executed on any node in the cluster. In addition, it provides a distributed file system (HDFS) that stores data on the compute nodes, providing very high aggregate bandwidth across the cluster. Both Map/Reduce and the distributed file system are designed so that node failures are automatically handled by the framework.

6. Hdoop Architecture
The Apache Hadoop project develops open-source software for reliable, scalable, distributed computing Hadoop Consists:: Hadoop Common*: The common utilities that support the other Hadoop subprojects. HDFS*: A distributed file system that provides high throughput access to application data. MapReduce*: A software framework for distributed processing of large data sets on compute clusters. Hadoop is made up of a number of elements. Hadoop consists of the Hadoop Common, At the bottom is the Hadoop Distributed File System (HDFS), which stores files across storage nodes in a Hadoop cluster. Above the HDFS is the MapReduce engine, which consists of JobTrackers and TaskTrackers. * This presentation is primarily focus on Hadoop architecture and related sub project

7. Data Flow
This is the architecture of our backend data warehouing system. This system provides important information on the usage of our website, including but not limited to the number page views of each page, the number of active users in each country, etc. We generate 3TB of compressed log data every day. All these data are stored and processed by the hadoop cluster which consists of over 600 machines. The summary of the log data is then copied to Oracle and MySQL databases, to make sure it is easy for people to access.

8. Hadoop Common
Hadoop Common is a set of utilities that support the other Hadoop subprojects. Hadoop Common includes FileSystem, RPC, and serialization libraries.

9. HDFS
Hadoop Distributed File System (HDFS) is the primary storage system used by Hadoop applications. HDFS creates multiple replicas of data blocks and distributes them on compute nodes throughout a cluster to enable reliable, extremely rapid computations. Replication and locality

10. For more please refer our PPT. Thanks.

Related Project Report:

Hadoop Report

PowerPoint Presentation On Location Based Services

 PPT On Location Based Services

Download

Location Based Services Presentation Transcript:
1. What is the location based service? →
A service that depends on the network knowing your location It allow consumers to receive services and advertising based on their geographic location. Eg: businesses can provide information about traffic, restaurants, retail stores, travel arrangements, or automatic teller machines based on the consumer’s location at a particular moment in time. Such services can be provided in response to a consumer’s manual input of his or her location information into the handset or by using so-called “auto-location” technology to track the location of the consumer automatically.

2. EXAMPLES:
Emergency 911 Navigation Vehicle Assistance (OnStar) Child Finder Advertising Local Search Traffic applications Automotive Vehicle Location (Fleet tracking) Asset Tracking Personnel Tracking Social Mapping Self Guided Tours Finding elderly or individuals with Alzheimers

3. LOCATION BASED COMPONENTS :
1.Mobile Devices 2.Positioning 3.Service and content provider 4.Communication Network

4. Applications Traffic Monitoring
How many cars are in the downtown area? Send an alert if a non-friendly vehicle enters a restricted region Report any congestion in the road network Once an accident is discovered, immediately send alarm to the nearest police and ambulance cars Make sure that there are no two aircrafts with nearby paths

5. Applications (Cont.)
Location-based Store Finder / Advertisement Where is my nearest Gas station? What are the fast food restaurants within 3 miles from my location? Let me know if I am near to a restaurant while any of my friends are there Send E-coupons to all customers within 3 miles of my stores Get me the list of all customers that I am considered their nearest restaurant

 6. POSITIONING RELATED TO CELL TOWERS
Whenever any device is in contact with a cell tower, it’s possible to determine which tower and, therefore, the approximate location within a general radius. When it can receive data from two towers, the fix is more accurate but still approximate. Three or more towers provides a reasonably accurate fix. Positioning Techniques 1.GPS 2.Assisted GPS 3.Positoning Principles in Mobiles Cell-ID EOTD

7. GLOBAL POSITIONING SYSTEM (GPS)
The Global Positioning System (GPS) is actually a constellation of 27 Earth-orbiting satellites (24 in operation and three extras in case one fails). Satellites circle the globe at about 19300 km making two complete rotation everyday. The orbits are arranged so that at anytime, anywhere on Earth, there are atleast four Satellites are "visible" in the sky. A GPS receiver's job is to locate four or more of these satellites, figure out the distance to each, and use this information.

 8. GPS (Global Positioning System)
24 satellites in orbit. Typically 5 to 8 are visible from any one place Device gets fix by triangulating position of satellites. Distance calculated by time it takes for signal to travel from satellite to receiver. Calculating the time it takes from 4 satellites provides an accurate fix.

9. AGPS
GPS has a slow time to fix unless it is permanently tracking satellites Assisted GPS is based upon providing GPS satellite information to the handset, via the cellular network Assisted GPS gives improvements in Time to First Fix Sensitivity,Cost Assistance Data Satellite Position Time information Visible GPS List

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Multimedia Technology

 PPT On Multimedia Technology

Download

Multimedia Technology Presentation Transcript:
1. WHAT IS MULTIMEDIA
Multimedia is media and content that uses a combination of different content forms. This includes text, graphics, audio, video, etc. Multimedia is usually recorded and played, displayed or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance

2. TYPES OF MULTIMEDIA
Linear :Linear active content progresses without any navigational control for the viewer such as a cinema presentation. Non-linear :Non-linear content offers user interactivity to control progress as used with a computer game or used in self-paced computer based training. Hypermedia is an example of non-linear content.

3. WHAT IS INTERACTIVE MULTIMEDIA
An interactive multimedia technology is any technology that accepts user input, presents information conditionally and non-linearly in response, and is capable of presenting combinations of text, sounds, pictures, animations, and/or full motion video. An essential feature of interactivity is that it is mutual: user and machine each take a more or less active role

4. BUMPTOP- INTRODUCTION
It was created at the University of Toronto By: Mr. Anand Agarawala. BumpTop is a desktop environment, designed to enhance traditional computer desktop functionality by more closely supporting the normal behavior of a real-world desk. It is aimed at stylus interaction, making it more suitable for tablet PCs and palmtops. The 1.0 version was released on April 8, 2009 It is cross platform.

5. BUMPTOP- OVERVIEW
Documents are described by three-dimensional boxes lying on a virtual desk. Extensive use of physics effects like bumping and tossing is applied to documents when they interact, for a more realistic experience. Boxes can be stacked with well-defined gestures. Multiple selection is performed by means of a LassoMenu, which fluidly combines into a single stroke the act of lasso selection and action invocation via pie menus

6. BUMPTOP-FEATURES
Being More Productive Get organized instantly Not All Files are Created Equal Toss to print ,e-mail or USB Luscious Thumbnail Previews

7. SILVERLIGHT- OVERVIEW
Silverlight applications can be written in any .NET programming language. Any development tools which can be used with .NET languages can work with Silverlight, provided they can target the Silverlight CoreCLR for hosting the application, instead of the .NET Framework CLR.

8. SILVERLIGHT - FEATURES
IIS Smooth Streaming Out of Browser Sketch Flow Deep Zoom Pivot Media Format Extensibility Perspective 3D Graphics Skinning and Styling

9. FLASH V/S SILVERLIGHT
Animation. File Size. Scripting. Video and Audio. Sound Processing. Accessibility.

10. For more please refer our PPT. Thanks.

PowerPoint Presentation On Web OS

 PPT On Web OS

Download

Web OS Presentation Transcript:
1. What is Operating system?????.....
Operating System: provide common services to applications: IO, communication, storage. With multiprogramming: include abstracting shared resource. Local Area Network: birth of Network OS to provide access to network resources. We need similar services for Wide Area Network distributed applications.

2. WebOS
“A software platform that interacts with the user through a web browser and does not depend on any particular local operating system.” Based on cloud Computing Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like a public utility. “When It’s Smarter to rent than Buy”.

3. Photo editing tool:
the availability of a tool that allows the user to edit images. (.bmp, .png, .jpg, .jpeg, .gif, .tiff) will be opened with the eyeOS Image Viewer. E-mail client: the presence of an email client. Instant Messaging: the availability of an integrated instant messenger. Calendar: the existence of a calendar. Collaboration - Conferencing tools: the presence of online collaboration tools (such as VoIP, web conferencing tools, etc.)

4. Mini-Browser:
the integration of a web browser File storage: the amount of space – if available – to store files online File sharing support: the support for file sharing with other users. Desktop Search: the presence of a desktop search engine within the WebOS Games: the availability of games within the WebOS

5. AstraNOS BeDesk cmyOS Desktoptwo DoxBoard GCOE X eyeOs Glide G.ho.st goowy jooce, Free Live OS Zoo , Nivio.

6. Empowering non-PC owners -
While some of us take having a laptop for granted, there are others whose main point of access is through Internet cafes or public libraries. For these people, having to 'start from scratch' every time can prove very tiresome. With a web-mobilized operating system, this ceases to be an issue Integrating services - Through effective partnerships with existing service providers, which G.ho.st has been very proactive about forming - it is possible to introduce such benefits as a single sign-on process, taking the pain out of logging in and out of multiple accounts every time you go online. Effective file management - Rather than having your data scattered about the web with a vast range of services, the web OS promises to make it easy to store, sort and access all of your files wherever you go from a single networked tool

7. Downsides of a WebOS
Works at the mercy of the network and the server load. While the many enabling capabilities of network-based storage architectures are of substantial value - issues of authentication, access control, and security/privacy of the stored data remain. Are you going to let someone else handle your data? The privacy, control, reliability and performance issues prevent the WebOS from being an alternative to the ever-more-affordable and easy-to-use desktop.

8. (Contt..)
WebOS requires a fast and reliable connection to work correctly. Inability to operate peripheral devices. Web applications rely on open source infrastructure and an array of technologies and formats - and these are constantly changing, often with no regard for being backward compatible.

9. Thanks.
Related Posts Plugin for WordPress, Blogger...

Blog Archive