Saturday, July 3, 2010

Universal Mobile Telecommunications System (UMTS)

                          The Universal Mobile Telecommunications System (UMTS) is a third generation (3G) mobile communications system that provides a range of broadband services to the world of wireless and mobile communications. This chapter presents an overview of the UMTS
architecture specified by the Third Generation Partnership Project (3GPP), focusing on the
network elements relevant to the study presented here. The evolution towards an All-IP network, within the 3GPP, is occurring in several steps, known as releases [6, 7]. Earlier UMTS specifications, with a relatively strong retention of the current 2nd generation networks, were still switch centric. However, the introduction of a new IP platform, when fully specified, will provide the UMTS system with multiple wireless access options and full IP packet support.

The first version of the UMTS Specification, 3GPP Release 99, defines a system which
adopts much of the functionalities of the GSM/GPRS core network and introduces a new
wireless access technology, namely wideband code division multiple access (WCDMA).
This access technology increases the 2G systems capacity to higher data rates enabling the
support of advanced services. 3GPP Release 4, further optimizes the air interface, although
the major changes are targeted at the core network circuit switched domain, still present in
order to maintain full coverage for second-generation services. These changes result in the
separation of user data flows and their control systems into different physical entities, the
Mobile-services Switching Centre (MSC) and the Media Gateway (MGW) respectively.
Finally Release 5/6 provides a migration from conventional Circuit-Switched speech
services served by CS domain to enhanced IP-based services using a Packet-Switched domain.

  Download :     Full Report (.pdf)     Presentation (.ppt)
read more...

Wireless Energy Transfer using Magnetic Resonance

In 1899, Nikola Tesla, who had devised a type of resonant transformer called the Tesla coil, achieved a major breakthrough in his work by transmitting 100 million volts of electric power wirelessly over a distance of 26 miles to light up a bank of 200 light bulbs and run one electric motor. Tesla claimed to have achieved 95% efficiency, but the technology had
to be shelved because the effects of transmitting such high voltages in electric arcs would have been disastrous to humans and electrical equipment in the vicinity. This technology has been languishing in obscurity for a number of years, but the advent of portable devices such as mobiles, laptops, smartphones, MP3 players, etc warrants another look at the technology.
We propose the use of a new technology, based on strongly coupled magnetic resonance. It
consists of a transmitter, a current carrying copper coil, which acts as an electromagnetic resonator and a receiver, another copper coil of similar dimensions to which the device to be powered is attached. The transmitter emits a non-radiative magnetic field resonating at MHz frequencies, and the receiving unit resonates in that field. The resonant nature of the
process ensures a strong interaction between the sending and receiving unit, while interaction with rest of the environment is weak.

  Download :     Full Report (.pdf)
read more...

DIGITAL JEWELERY

Mobile computing is beginning to break the chains that tie us to our desks, but many of today's mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewelry adorns the body, and has very little practical purpose. However, researchers are looking to change the way we think about the beads and bobbles we wear. The combination of microcomputer devices and increasing computer power has allowed several companies to begin producing fashion jewelry with embedded intelligence i.e., Digital jewelry. Digital jewelry can best be defined as wireless, wearable computers that allow you to communicate by ways of e-mail, voicemail, and voice communication. This paper enlightens on how various computerized jewelry (like ear-rings, necklace, ring, bracelet, etc.,) will work with mobile embedded intelligence.
It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. This paper discusses about a new Java-based, computerized ring that will automatically unlock doors and log on to computers.

  Download :     Full Report (.doc)
read more...

Paper Battery

A paper battery is a flexible, ultra-thin energy storage and production device formed by combining carbon nanotube s with a conventional sheet of cellulose-based paper. A paper battery acts as both a high-energy battery and supercapacitor , combining two components that are separate in traditional electronics . This combination allows the battery to provide both long-term, steady power production and bursts of energy. Non-toxic, flexible paper batteries have the potential to power the next generation of electronics, medical devices and hybrid vehicles, allowing for radical new designs and medical technologies.
Paper batteries may be folded, cut or otherwise shaped for different applications without any loss of integrity or efficiency . Cutting one in half halves its energy production. Stacking them multiplies power output. Early prototypes of the device are able to produce 2.5 volt s of electricity from a sample the size of a postage stamp.
The devices are formed by combining cellulose with an infusion of aligned carbon nanotubes that are each approximately one millionth of a centimeter thick. The carbon is what gives the batteries their black color. These tiny filaments act like the electrode s found in a traditional battery, conducting electricity when the paper comes into contact with an ionic liquid solution. Ionic liquids contain no water, which means that there is nothing to freeze or evaporate in extreme environmental conditions. As a result, paper batteries can function between -75 and 150 degrees Celsius.

  Download :     Full Report (.doc)
read more...

STARFAST: a Wireless Wearable EEG Biometric System based on the ENOBIO Sensor

Starfast is a wearable, wireless biometry system based on the new ENOBIO 4- channel electrophysiology recording device developed at Star lab. Features extracted from electroencephalogram (EEG) and electrocardiogram (ECG) recordings have proven to be unique enough between subjects for biometric applications. We show here that biometry based on these recordings offers a novel way to robustly authenticate or identify subjects. In this paper, we present a rapid and unobtrusive authentication method that only uses 2 frontal electrodes and a wrist worn electrode referenced to another one placed at the ear lobe. Moreover, the system makes use of a multistage fusion architecture, which demonstrates to improved system performance. The performance analysis of the system presented in this paper stems from an experiment with 416 test trials, where an Equal Error Rate (EER) of 0% is obtained after the EEG and ECG modalities fusion and using a complex boundary decision. If a lineal boundary decision is used we obtain a True Acceptance Rate (TAR) of 97.9% and a False Acceptance Rate (FAR) of 0.82%. The obtained performance measures improve the results of similar systems presented in earlier work.

  Download :     Full Report (.doc)
read more...

REAL TIME IMAGE PROCESSING APPLIED TO TRAFFIC – QUEUE DETECTION ALGORITHM

This paper primarily aims at the new technique of video image processing used to solve problems associated with the real-time road traffic control systems. There is a growing demand for road traffic data of all kinds. Increasing congestion problems and problems associated with existing detectors spawned an interest in such new vehicle detection technologies. But the systems have difficulties with congestion, shadows and lighting transitions.

Problem concerning any practical image processing application to road traffic is the fact that real world images are to be processed in real time. Various algorithms, mainly based on back ground techniques, have been developed for this purposes since back ground based algorithms are very sensitive to ambient lighting conditions, they have not yielded the expected results. So a real-time image tracking approach using edged detection techniques was developed for detecting vehicles under these trouble-posing conditions.

This paper will give a general overview of the image processing technique used in analysis of video images, problems associated with it, methods of vehicle detection and tracking, pre-processing techniques and the paper also presents the real-time image processing technique used to measure traffic queue parameters.

  Download :     Full Report (.doc)
read more...

Organic light emitting diodes (OLED)

                          Organic light emitting diodes (OLEDs) are optoelectronic devices based on small molecules or polymers that emit light when an electric current flows through them. simple OLED consists of a fluorescent organic layer sandwiched between two metal electrodes.Under application of an electric field, electrons and holes are injected from the two electrodes into the organic layer, where they meet and recombine to produce light. They have been developed for applications in flat panel displays that provide visual imagery that is easy to read, vibrant in colors and less consuming of power.

OLEDs are light weight, durable, power efficient and ideal for portable applications. OLEDs have fewer process steps and also use both fewer and low-cost materials than LCD displays. OLEDs can replace the current technology in many applications due to following performance advantages over LCDs.
  • Greater brightness
  • Faster response time for full motion video
  • Fuller viewing angles
  • Lighter weight
  • Greater environmental durability
  • More power efficiency
  • Broader operating temperature ranges
  • Greater cost-effectivenes
  Download :     Full Report (.doc)
read more...

ORAN - Open RAN

                           The vision of the OpenRAN architecture is to design radio access network architecture with the following characteristics:
  • Open,
  • Flexible,
  • Distributed,
  • Scalable.
Such architecture would be open because it defines open, standardized interfaces at key points that in past architectures were closed and proprietary. It would be flexible because it admits of several implementations, depending on the wired network resources available in the deployment situation. It would be distributed because monolithic network elements in architectures would have been broken down into their respective functional entities, and the functional entities would have been grouped into network elements that can be realized as a distributed system. The architecture would define an interface with the core network that allows the core network to be designed independently from the RAN, preserving access network independence in the core. Finally, the architecture would not require changes in radio link protocols; in particular, a radio link protocol based on IP would not be necessary. This document presents the first steps in developing the OpenRAN vision. In its first phase, the subject of this document, the OpenRAN architecture is purely concerned with distributing RAN functions to facilitate achieving open interfaces and flexible deployment. The transport substrate for implementing the architecture is assumed to be IP but no attempts is made to optimize the use of IP protocols, nor are specific interfaces designated as open. The architecture could as well be implemented on top of existing functional architectures that maintain a strict isolation between the transport layer and radio network layer, by splitting an existing radio network layer into control and bearer parts.

  Download :     Full Report (.doc)
read more...

NEAR FIELD COMMUNICATION

 NFC is one of the latest wireless communication technologies. As a short-range wireless connectivity technology, NFC offers safe — yet simple and intuitive — communication between electronic devices. Users of NFC-enabled devices can simply point or touch their devices to other NFC-enabled elements in the environment to communicate with them, making application and data usage easy and convenient.

With NFC technology, communication occurs when an NFC-compatible device is brought within a few centimeters of another NFC device or an NFC tag. The big advantage of the short transmission range is that it inhibits eavesdropping on NFC-enabled transactions. NFC technology opens up exciting new usage scenarios for mobile devices.

One of the main goals of NFC technology has been to make the benefits of short-range contactless communications available to consumers globally. The existing radio frequency (RF) technology base has so far been driven by various business needs, such as logistics and item tracking. While the technology behind NFC is found in existing applications, there has been a shift in focus — most notably, in how the technology is used and what it offers to consumers.

  Download :     Full Report (.doc)
read more...

MEMRISTERS

                           Generally when most people think about electronics, they may initially think of products such as cell phones, radios, laptop computers, etc. others, having some engineering background, may think of resistors, capacitors, etc. which are the basic components necessary for electronics to function. Such basic components are fairly limited in number and each having their own characteristic function.

Memristor theory was formulated and named by Leon Chua in a 1971 paper. Chua strongly believed that a fourth device existed to provide conceptual symmetry with the resistor, inductor, and capacitor. This symmetry follows from the description of basic passive circuit elements as defined by a relation between two of the four fundamental circuit variables. A device linking charge and flux (themselves defined as time integrals of current and voltage), which would be the memristor, was still hypothetical at the time. However, it would not be until thirty-seven years later, on April 30, 2008, that a team at HP Labs led by the scientist R. Stanley Williams would announce the discovery of a switching memristor. Based on a thin film of titanium dioxide, it has been presented as an approximately ideal device.
The reason that the memristor is radically different from the other fundamental circuit elements is that, unlike them, it carries a memory of its past. When you turn off the voltage to the circuit, the memristor still remembers how much was applied before and for how long. That's an effect that can't be duplicated by any circuit combination of resistors, capacitors, and inductors, which is why the memristor qualifies as a fundamental circuit element.
The arrangement of these few fundamental circuit components form the basis of almost all of the electronic devices we use in our everyday life. Thus the discovery of a brand new fundamental circuit element is something not to be taken lightly and has the potential to open the door to a brand new type of electronics. HP already has plans to implement memristors in a new type of non-volatile memory which could eventually replace flash and other memory systems.

  Download :     Full Report (.doc)    Presentation (.ppt)
read more...

Line-Reflect-Reflect Technique

                          LRR- LINE REFLECT REFLECT is a new self-calibration procedure for the calibration of vector network analyzers (VNA). VNA measure the complex transmission and reflection characteristics of microwave devices. The analyzers have to be calibrated in order to eliminate systematic errors from the measurement results.

The LRR calibration circuits consist of partly unknown standards, where L symbolizes a line element and R represents a symmetrical reflection standard. The calibration circuits are all of equal mechanical length. The obstacle, a symmetrical-reciprocal network is placed at three consecutive positions. The network consists of reflections, which might show a transmission. The calibration structures can be realized very easily as etched structures in microstrip technology.

During the calibration [G], [H], which represents the systematic errors of the VNA is eliminated in order to determine the unknown line and obstacle parameters.

  Download :     Full Report (.doc)
read more...

UNDER WATER COMMUNICATION

                          The future tactical ocean environment will be increasingly complicated. In addition to traditional communication links there will be a proliferation of unmanned vehicles in space, in the air, on the surface, and underwater. Above the air/water interface wireless radio frequency communications will continue to provide the majority of communication channels.Underwater, where radio waves do not propagate, acoustic methods will continue to be used.However, while there have been substantial advances in acoustic underwater communications, acoustics will be hard pressed to provide sufficient bandwidth to multiple platforms at the same time. Acoustic methods will also continue to have difficulty penetrating the water/air interface. This suggests that high bandwidth, short range underwater optical communications have high potential to augment acoustic communication methods.

The variations in the optical properties of ocean water lead to interesting problems when considering the feasibility and reliability of underwater optical links. Radio waves do not propagate underwater, however with the proliferation of unmanned autonomous vehicles the need to communicate large amounts of data is quickly increasing. Making physical connections underwater to transfer data is often impractical operationally or technically hard to do. Traditionally most underwater communication systems have been acoustic and relatively low bandwidth. However, the development of high brightness blue/green LED sources, and laser diodes suggest that high speed optical links can be viable for short range applications. Underwater systems also have severe power, and size constraints compared to land or air
based systems. Underwater vehicles also encounter a wide range of optical environments. In shallow water the effects of absorption by organic matter and scattering by inorganic particulates can be severe compared to deep ocean water.

  Download :     Full Report (.pdf)   Presentation (.ppt)
read more...

Friday, July 2, 2010

Design Technique for Voice Browsers

                          Browser technology is changing very fast these days and we are moving from the visual paradigm to the voice paradigm. Voice browser is the technology to enter this paradigm. A voice browser is a “device which interprets a (voice) markup language and is capable of generating voice output and/or interpreting voice input, and possibly other input/output modalities. "This paper describes the requirements for two forms of character-set grammar, as a matter of preference or implementation, one is more easily read by (most) humans, while the other is geared toward machine generation.

A voice browser is a “device which interprets a (voice) markup language and is capable of generating voice output and/or interpreting voice input, and possibly other input/output modalities." The definition of a voice browser, above, is a broad one. The fact that the system deals with speech is obvious given the first word of the name, but what makes a software system that interacts with the user via speech a "browser"? The information that the system uses (for either domain data or dialog flow) is dynamic and comes somewhere from the Internet. From an end-user's perspective, the impetus is to provide a service similar to what graphical browsers of HTML and related technologies do today, but on devices that are not equipped with full-browsers or even the screens to support them. This situation is only exacerbated by the fact that much of today's content depends on the ability to run scripting languages and 3rd-party plug-ins to work correctly.

Much of the efforts concentrate on using the telephone as the first voice browsing device. This is not to say that it is the preferred embodiment for a voice browser, only that the number of access devices is huge, and because it is at the opposite end of the graphical-browser continuum, which high lights the requirements that make a speech interface viable. By the first meeting it was clear that this scope-limiting was also needed in order to make progress, given that there are significant challenges in designing a system that uses or integrates with existing content, or that automatically scales to the features of various access devices.

  Download :     Full Report (.doc)
read more...

E-CRM

                          The Internet, the Web, and E-Commerce have changed the very nature of business. Even if your company doesn't do all its business over the Internet, customers want to contact you now by e-mail and the Web. And if Web-based E-Commerce is your business, live intervention at the right moment can dramatically reduce abandoned transactions and make the E-Commerce model more profitable.Traditional businesses and dot-coms alike win by combining eCommerce and the contact center. Giving offline customers more ways to get in touch increases business and customer loyalty. And giving online customers live service and guidance can make them buy more, and buy more often.

The Fulfillment Direct Customer Relationship Portal gives you a solid foundation for a complete E-Business system. How? It integrates front-office, back-office, E-Commerce, and media applications, and lets youmanage them from one central point. The results? Success in the E-Business ageSo a whole new science has sufared aimed at helping businesses to hang on to their customers. Only, it is a very old truth which was instinctively practiced in an earlier more honest age a truth which can be encapsulated in three word: respect the customer but this is the era of fancy jargon: so it is known as Electronic Customer Relations Management(eCRM). 

  Download :     Full Report (.doc)
read more...

CYBERECONOMY: INFORMATION TECHNOLOGY AND ECONOMY

                          It would be an understatement to say that the Information Technology (IT) is having an enormous influence on today’s global economy. It would be more appropriate to say that IT is now close to becoming the most important driver of the global economy. The competitiveness of a country’s economy and well being is getting closely aligned to its ability to innovate and participate in the IT industry.While the industrial revolution was initiated in the labor-intensive manufacturing industry by automotive pioneers like Ford, it is clear that the third revolution is driven by the knowledge-based services sector.In the last decade we have begun to see a new revolution- the information revolution.Today, and in the future, it is "brain" and not "brawn" that is the key to sustainable economic growth. Consequently, the level of development of the services sector,particularly the knowledge-intensive segments, has become a key determinant of national competitiveness for economies around the world. 

The use of money enabled the goods made by unknown people in remote places to be bought by others. Money enabled trade to cross immediate geographical boundaries and replaced barter. The information revolution is now enabling the emergence of a new type of barter system on electronic network. People can exchange goods without having to exchange money. This has led to the emergence of virtual markets. Electronic business with replace going to shops. Same is the case with electronic banking system.The impact of IT on economy has accelerated with the development of satellite communication, increasingly powerful and smaller memory chips and developments in software programming. This has had a fundamental effect impact on organizational structures and human resource management. Intermediate middle management levels have been thinned down and intellectual capital has become a key resource.The article deals with the IT and its impact on economy in general with special examples of Indian economy. The first section throws light on why IT is useful to us, followed by Business transformation needed to compete with the electronic world. The next two sections illustrate the impact of economy on IT and vice versa with India as reference. Lastly we have the problems regarding implementation of web-enabled business 

  Download :     Full Report (.doc)
read more...

Extensible Markup Language Parsing Techniques

                           XML is the language used to develop web applications. XML is a set of rules for designing structured data in a text format as opposed to binary format, which is useful for man, and machine both. A parser is used for syntactical and lexical analysis. XML parser extract the information from the XML document which is very much needed in all Web applications Simple object access protocol is a protocol that lets the program to send XML over HTTP to invoke methods on remote objects. An XML parser can serve as an engine for implementing this or a comparable protocol. XML parser can also be used to send data messages formatted as XML over HTTP. By adding XML and HTTP capabilities to application, software developers can begin to offer alternatives to traditional browsers that have significant value to their customers. This paper presents an XML parser that implements a subset of the XML specification. This is useful to all developers and users for checking the welformedness and validation of an XML documents.

  Download :     Full Report (.doc)
read more...

WAVELENGTH ROUTING IN OPTICAL NETWORKS

                          Optical networks are high-capacity telecommunications networks based on optical technologies and component that provide routing, grooming, and restoration at the wavelength level as well as wavelength-based services. This paper deals with the twin concepts of wavelength routing and wavelength conversion in optical networks. The paper talks about the various categories of wavelength switches, routing algorithms, wavelength conversion and categories of wavelength conversion. Finally this paper deals with industry related issues like the gap between research and the industry, current and projected market for optical networking & DWDM equipment and future direction of research in this field.

An optical network consists of wavelength routers and end nodes that are connected by links in pairs. The wavelength-routing switches or routing nodes are interconnected by optical fibers. Although each link can support many signals, it is required that the signals be of distinct wavelengths. Routers transmit signals on the same wavelength on which they are received. An All-Optical wavelength routed network is that wavelength-routed network that carries data across from one access station to another without any O/E (Optical/Electronic) conversions.

  Download :     Full Report (.doc)
read more...

Secured Data Transmission using Cryptographic and Steganographic Techniques

                           ‘The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.’
- The art of war, Sun Tzu

As we enter the age of universal electronic connectivity, electronic eavesdropping and electronic fraud threaten the prosperity of corporations and individuals. Thus, the role of digital security has become increasingly important. The security requirements within an organization have undergone major changes in the last few decades. Before the widespread use of data processing equipment, data and information valuable to an organization were made invulnerable primarily by physical and administrative means. With the advent of computer networks and the internet however, the design of automated tools which ensure security and privacy of information transferred across networks was inevitable. Though there are several security techniques in use, two of the most prominent ones are steganography and cryptography. In this paper , we discuss these two techniques and how their combination can result in an efficient and secure data transfer software.

  Download :     Full Report (.doc)
read more...

RSA : An Insight

                          This paper describes in general the design and working of the Rivest-Shamir-Adleman algorithm commonly known by the name RSA algorithm. It is a public key cryptosystem that makes use of a pair of keys, namely the public and the private key.
Public key cryptosystems were invented in the late 1970's, with some help from the development of complexity theory around that time. It was observed that based on a problem so difficult that it would need thousands of years to solve, and with some luck, a cryptosystem could be developed which would have two keys, a secret key and a public key. With the public key one could encrypt messages, and decrypt them with the private key. Thus the owner of the private key would be the only one who could decrypt the messages, but anyone knowing the public key could send them in privacy.
The RSA cryptosystem, named after its inventors R. Rivest, A. Shamir, and L. Adleman, is the most widely used public-key cryptosystem. It may be used to provide both secrecy and digital signatures and its security is based on the intractability of the integer factorization problem.
This paper presents an insight into RSA and explorers its intricacies and its characteristics, which make it the most sought after asymmetric key algorithm till date.

  Download :     Full Report (.doc)
read more...

Ping of Death - Seminar on Denial Of Service

                        
A ping of death (abbreviated "POD") is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A ping is normally 56 bytes in size (or 84 bytes when IP header is considered); historically, many computer systems could not handle a ping packet larger than the maximum IP packet size, which is 65,535 bytes. Sending a ping of this size could crash the target computer.

The Ping of Death uses a ping system utility to create an IP packet that exceeds the maximum 65,536 bytes of data allowed by the IP specification. The oversize packet is then sent to an unsuspecting system. Systems may crash, hang, or reboot when they receive such a maliciously crafted packet. This attack is not new, and all OS vendors have fixes in place to handle the oversize packets.

  Download :     Full Report (.doc)
read more...

OPTICAL NETWORK ARCHITECTURE

 One of the major issues in the networking industry today is tremendous demand for more and more bandwidth. However, with the development of optical networks and the use of Dense Wavelength Division Multiplexing (DWDM) technology, a new and probably, a very crucial milestone is being reached in network evolution. The existing SONET/SDH network architecture is best suited for voice traffic rather than today’s high-speed data traffic. To upgrade the system to handle this kind of traffic is very expensive and hence the need for the development of an intelligent all-optical network. Such a network will bring intelligence and scalability to the optical domain by combining the intelligence and functional capability of SONET/SDH, the tremendous bandwidth of DWDM and innovative networking software to spawn a variety of optical transport, switching and management related products. This paper deals with optical network architecture and explains virtual topology along with optical layer and higher layer interface. 

  Download :     Full Report (.doc)
read more...
Related Posts with Thumbnails