Friday, January 28, 2011

Remote Frame Buffer (RFB) Protocol

Remote Desktop Softwares are those softwares which provide Remote Access. Remote Access means the ability of a user to log onto a remote computer or network from a distant location. This usually comprises of computers, a Network, and some remote access software to connect to the network. Since this involves clients and servers connected across a network,a protocol is essential for efficient communication between them. RFB protocol is one of such protocols which is used by the client and servers for communicating with each other and thereby making Remote Access possible. The purpose of this Paper is to give a general idea as to how this Protocol actually works. This paper also gives a broad idea about the various messages of this protocol and how these messages are send and interpreted by the client and server modules. This Paper also includes a Simple implementation of the Protocol which shows the various messages and methods and how this protocol is practically used for gaining remote access.

RFB (remote framebuffer) is a simple and efficient protocol which provide remote access to graphical user interfaces.As its Name Suggests it works at the framebuffer level and thus it is applicable to all windowing systems and applications. Eg. X11, Windows and Macintosh. It should also be noted that there are other Protocols available and RFB is the protocol which is used in Virtual Network Computing (VNC) and its various forms. Due to increase in number of Software products and Services such protocols play a very important role nowadays.

  Download :     Full Report (.pdf)
read more...

Friday, January 21, 2011

Pill Camera

The aim of technology is to make products in a large scale for cheaper prices and increased quality. The current technologies have attained a part of it, but the manufacturing technology is at macro level. The future lies in manufacturing product right from the molecular level. Research in this direction started way back in eighties. At that time manufacturing at molecular and atomic level was laughed about. But due to advent of nanotecnlogy we have realized it to a certain level. One such product manufactured is PILL CAMERA, which is used for the treatment of cancer, ulcer and anemia. It has made revolution in the field of medicine. This tiny capsule can pass through our body, without causing any harm.

It takes pictures of our intestine and transmits the same to the receiver of the Computer analysis of our digestive system. This process can help in tracking any kind of disease related to digestive system. Also we have discussed the drawbacks of PILL CAMERA and how these drawbacks can be overcome using Grain sized motor and bi-directional wireless telemetry capsule .Besides this we have reviewed the process of manufacturing products using nanotechnology.Some other important applications are also discussed along with their potential
impacts on various fields.

We have made great progress in manufacturing products. Looking back from where we stand now, we started from flint knives and stone tools and reached the stage where we make such tools with more precision than ever. The leap in technology is great but it is not going to stop here. With our present technology we manufacture products by casting, milling, grinding, chipping and the likes. With these technologies we have made more things at a lower cost and greater precision than ever before. In the manufacture of these products we have been arranging atoms in great thundering statistical herds. All of us know manufactured products are made from atoms. The properties of those products depend on how those atoms are arranged. If we rearrange atoms in dirt, water and air we get grass. The next step in manufacturing technology is to manufacture products at molecular level. The technology used to achieve manufacturing at molecular level is “NANOTECHNOLOGY”. Nanotechnology is the creation of useful materials, devices and system through manipulation of such miniscule matter (nanometer).Nanotechnology deals with objects measured in nanometers. Nanometer can be visualized as billionth of a meter or millionth of a millimeter or it is 1/80000 width of human hair.

  Download :     Full Report (.docx)
read more...

Transparent Electronics

                           Transparent electronics is an emerging science and technology field focused on producing ‘invisible’ electronic circuitry and opto-electronic devices. Applications include consumer electronics, new energy sources, and transportation; for example, automobile windshields could transmit visual information to the driver. Glass in almost any setting could also double as an electronic device, possibly improving security systems or offering transparent displays. In a similar vein, windows could be used to produce electrical power. Other civilian and military applications in this research field include realtime wearable displays.

As for conventional Si/III–V-based electronics, the basic device structure is based on semiconductor junctions and transistors. However, the device building block materials, the semiconductor, the electric contacts, and the dielectric/passivation layers, must now be transparent in the visible –a true challenge! Therefore, the first scientific goal of this technology must be to discover, understand, and implement transparent high-performance electronic materials. The second goal is their implementation and evaluation in transistor and circuit structures. The third goal relates to achieving application-specific properties since transistor performance and materials property requirements vary, depending on the final product device specifications. Consequently, to enable this revolutionary technology requires bringing together expertise from various pure and applied sciences, including materials science, chemistry, physics, electrical/electronic/circuit engineering, and display science.

  Download :     Full Report (.docx)
read more...

3D Password

                           Normally the authentication scheme the user undergoes is particularly very lenient or very strict. Throughout the years authentication has been a very interesting approach. With all the means of technology developing, it can be very easy for 'others' to fabricate or to steal identity or to hack someone’s password. Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key. The algorithms are such based to pick a random number in the range of 10^6 and therefore the possibilities of the sane number coming is rare.

Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc .Mostly textual passwords follow an encryption algorithm as mentioned above. Biometric scanning is your "natural" signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas(Biometric scanning).Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play.

Therefore we present our idea, the 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human memory. Generally simple passwords are set so as to quickly recall them. The human memory, in our scheme has to undergo the facts of Recognition, Recalling, Biometrics or Token based authentication. Once implemented and you log in to a secure site, the 3D password GUI opens up. This is an additional textual password which the user can simply put. Once he goes through the first authentication, a 3D virtual room will open on the screen. In our case, let’s say a virtual garage. Now in a day to day garage one will find all sorts of tools, equipments, etc.each of them having unique properties. The user will then interact with these properties accordingly. Each object in the 3D space, can be moved around in an (x,y,z) plane. That’s the moving attribute of each object. This property is common to all the objects in the space. Suppose a user logs in and enters the garage. He sees and picks a screw-driver (initial position in xyz coordinates (5, 5, 5)) and moves it 5 places to his right (in XY plane i.e. (10, 5, 5).That can be identified as an authentication. Only the true user understands and recognizes the object which he has to choose among many. This is the Recall and Recognition part of human memory coming into play. Interestingly, a password can be set as approaching a radio and setting its frequency to number only the user knows. Security can be enhanced by the fact of including Cards and Biometric scanner as input. There can be levels of authentication a user can undergo.

  Download :     Full Report (.doc)
read more...

Friday, January 7, 2011

Artificial Turf

                           Artificial turf is a surface manufactured from synthetic fibres made to look like natural grass. It is most often used in arenas for sports that were originally or are normally played on grass. The main reason is maintenance — artificial turf resists heavy use, such as in sports, better, and requires no irrigation or trimming. Domed, covered, and partially covered stadiums may require artificial turf because of the difficulty of getting grass enough sunlight to stay healthy.
A common misconception is that the new synthetic grass is similar to the household carpet. In fact this intricate system involves properly constructing a porous sub base, and using turf with holes in the back, then the product is filled with sand/rubber granule mix which we call infill.

Artificial turf, also known as synthetic turf, has found a prominent place in sports today. Manufactured from synthetic materials, this man-made surface looks like natural grass. With the international sports associations and governing bodies approving the use of artificial surfaces, sports like football and hockey, which were originally played on natural grass, have moved to these artificial sports pitches. So, next time, you find players playing on an artificial hockey pitch, do not be surprised.

Artificial turf has been manufactured since the early 1960s, and was originally produced by Chemstrand Company (later renamed Monsanto Textiles Company). It is produced using manufacturing processes similar to those used in the carpet industry. Since the 1960s, the product has been improved through new designs and better materials. The newest synthetic turf products have been chemically treated to be resistant to ultraviolet rays, and the materials have been improved to be more wear-resistant, less abrasive, and, for some applications, more similar to natural grass.

  Download :     Full Report (.doc)
read more...

MOBILE PHONE CLONING

                           Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication.
Some of the features of mobile communication make it an alluring target for criminals. It is a relatively new invention, so not all people are quite familiar with its possibilities, in good or in bad. Its newness also means intense competition among mobile phone service providers as they are attracting customers. The major threat to mobile phone is from cloning.

Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone.Usually this is done for the purpose of making fraudulent telephone calls. The bills for the calls go to the legitimate subscriber. The cloner is also able to make effectively anonymous calls, which attracts another group of interested users.
Cloning is the process of taking the programmed information that is stored in a legitimate mobile phone and illegally programming the identical information into another mobile phone. The result is that the "cloned" phone can make and receive calls and the charges for those calls are billed to the legitimate subscriber. The service provider network does not have a way to differentiate between the legitimate phone and the "cloned" phone.

  Download :     Full Report (.doc)
read more...

Nanomachines

                          Nanotechnology is the manipulation of matter on the nanoscale. A nanometer is a very small measure of length-it is one billionth of a meter, a length so small that only three or four atoms lined up in a row would be a nanometer. So, nanotechnology involves designing and building materials and devices where the basic structure of the material or device is specified on the scale of one or a few nanometers. Ultimately, nanotechnology will mean materials and devices in which every atom is assigned a place, and having every atom in the right place will be essential for the functioning of the device.

The kinds of product that could be built will range from microscopic, very powerful computers to super strong materials ten times as strong as steel, but much lighter too, food to other biological tissues. All these products would be very inexpensive because the molecular machines that built them will basically take atoms from garbage or dirt, and energy from sunshine, and rearrange those atoms into useful products, just like trees and crops take dirt, water and sunshine and rearrange the atoms into wood and food.

Nanotechnology cannot be defined as a definite branch of science but different from the conventional ones that we have as of now. It is set to encompass all the technological aspects that we have today and is nothing but the extension of scientific applications to a microscopic scale and thereby reaching closer to perfection if not right there.

  Download :     Full Report (.doc)      Presentation (.ppt)
read more...

AIR CAR

                           The Air car is a car currently being developed and, eventually, manufactured by Moteur Developpement International (MDI), founded by the French inventor Guy Nègre. It will be sold by this company too, as well as by ZevCat, a US company, based in California.The air car is powered by an air engine, specifically tailored for the car. The used air engine is being manufactured by CQFD Air solution, a company closely linked to MDI.The engine is powered by compressed air, stored in a glass or carbon-fibre tank at 4500 psi. The engine has injection similar to normal engines, but uses special crankshafts and pistons, which remain at top dead center for about 70% of the engine's cycle; this allows more power to be developed in the engine.

Though some consider the car to be pollution-free, it must be taken into account that the tanks are recharged using electric (or gasoline) compressors, resulting in some pollution, if the electricity used to operate the compressors comes from polluting power plants (such as gas-, or coal-power plants). Solar power could possibly be used to power the compressors at fuel station.

  Download :     Full Report (.doc)      Presentation (.ppt)
read more...

FLUID AMPLIFIERS

                           When one stream of fluid is permitted to impinge on another, direction of flow changes and the tendency of a fluid to strike the wall also changes. This concept gives rise to a new engineering system known as ‘fluidics. The term fluidics is the contraction of the words fluid and logic. Tremendous progress has been made in last twenty years in design and application of fluidic devices.

The current interest in fluidics for logic and control function was launched by the U.S Army’sHarry Diamond Laboratories. In March 1960 this laboratories invented the first fluid amplifier. This work was later expanded through a series of research and development contracts and the work reported in this section was sponsored by the U.S Airforce.The environmental capability of fluidic devices permits direct measurement of required control parameters within the engine.
These devices are more economical, faster and smaller than hydraulic control elements employing moving parts such as valves etc. Fluid devices have no moving parts hence they are more reliable and have long life. Fluidics is now offering an alternative to some other devices being operated with the help of electronics. It can operate where electronic devices are unsatisfactory, such as high temperature, humidity, in presence of severe vibrations, in high fire risk or where ionizing radiations are presents.

  Download :     Full Report (.doc)
read more...

Methanol Fueled Marine Diesel Engine

                          Nowadays concerns about methanol have increased from the viewpoints of environmental protection and versatility of fuels at a global scale. Energetic research on methanol-fueled automobile engines has been forwarded from the viewpoints of low environmental pollution and the use of alternate fuel since the oil crisis, and they are now being tested on vehicles in various countries in the world. Desire for saving of maintenance cost and labour prevails as well as the environmental problems in the field of marine engines. From these motives scientists have carried out research and development of a methanol fueled marine diesel engine which is quite different from automobile engines in the size, main particulars, working condition and durability.

Although scientists have made a great use of invaluable knowledge from automotive technology, some special studies were necessary due to these differences. Ignition method is a typical one. Dual fuel injection system was tried for trouble-free ignition of methanol fuel. This system is thought to be the most favourable ignition method for marine diesel engines which have to withstand quick load change and accept no misfiring. 

  Download :     Full Report (.doc)
read more...

Mine Detection Using Radar Bullets

                          Now a day in places like Afghanistan and Iraq we know that land mines are causing serious threat to the lives of civilians. The mines that are implanted during the wartime may remain undetected for several decades and may suddenly be activated after that. Also during wartime mines implanted by our enemy countries are to be detected and diffused properly in order to save the lives of our soldiers. So we should say that detecting landmines is important for every country today.

Land mines are a case of serious threats to the life of civilians, especially in mine-affected countries like Afghanistan and Iraq .The mines which are implanted during the war time may remain undetected for several decades and may suddenly be activated after that. There are several methods for detection of land mines, such as metal detection and explosive detection. These ways of detection are dangerous because they are done very close to the mine.

A safe method for detecting land mines is “mine detection using radar bullets”. As the name suggests detection is done using Radar Bullets and hence can be done further away from the mine. Detection is usually done from helicopters. Researchers are being conducted to overcome certain inefficiencies of this method.

  Download :     Full Report (.doc)
read more...

Overall Equipment Effectiveness (OEE)

                          In today's economy, you're expected to continuously improve your Return on Total Capital. And as capital to build new, more efficient plants becomes more difficult to obtain, you often have to meet growing production demands with current equipment and facilities — while continuing to cut costs.

There are several ways you can optimize your processes to improve profitability. But it can be difficult to understand the overall effectiveness of a complex operation so you can decide where to make improvements. That's especially true when the process involves multiple pieces of equipment that affect each other's effectiveness.

One metric that can help you meet this challenge is Overall Equipment Effectiveness, or OEE. OEE measures the health and reliability of a process relative to the desired operating level. It can show you how well you're utilizing resources, including equipment and labor, to satisfy customers by matching product quality and supply requirements.

Overall Equipment Effectiveness (OEE) measures total performance by relating the availability of a process to its productivity and output quality.

OEE addresses all losses caused by the equipment, including
• Not being available when needed because of breakdowns or set-up and adjustment losses
• Not running at the optimum rate because of reduced speed or idling and minor stoppage losses
• Not producing first-pass A1 quality output because of defects and rework or start-up losses.

OEE was first used by Seiichi Nakajima, the founder of total productive maintenance (TPM), in describing a fundamental measure for tracking production performance. He challenged the complacent view of effectiveness by focusing not simply on keeping equipment running smoothly, but on creating a sense of joint responsibility between operators and maintenance workers to extend and optimize overall equipment performance.

First applied in discrete manufacturing, OEE is now used throughout process, batch, and discrete production plants.

  Download :     Full Report (.doc)
read more...
Related Posts with Thumbnails