Hem first presentation
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Hem first presentation

on

  • 171 views

 

Statistics

Views

Total Views
171
Views on SlideShare
171
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • INTRODUCTIONPURPOSEPLATFORMSURVEYTIMEPLANRESULTSSUGGESTIONS
  • “What You Know” Knowledge“What You Have” Hard/Soft piece“What You Are" Biometric"What You Can " Intelligence"What You Recall" Recognition
  • Transition effect for timeline, slide 1(Basic)Tip: This transition works well for graphics that horizontally span more than one slide. To reproduce the shape effects on this slide, do the following:On the Home tab, in the Slides group, click Layout, and then click Blank.On the Home tab, in the Drawing group, click Shapes, and then under Block Arrows,clickChevron (second row, eighth option from the left). On the slide, drag to draw a long, horizontal chevron shape.Select the chevron. Under DrawingTools, on the Format tab, in the Size group, do the following:In the Shape Height box, enter 0.7”.In the Shape Width box, enter 9.48”.Drag the chevron so that the right end is beyond the right edge of the slide, and the left end of the chevron is approximately one inch to the right of the left edge of the slide.Select the chevron. Under DrawingTools, on the Format tab, in the ShapeStyles group, click the arrow next to ShapeFill, point to Gradient, and then click MoreGradients.In the Format Shape dialog box, click Fill in the left pane, select Gradientfill in the Fill pane, and then do the following:In the Type list, select Linear.Click the button next to Direction, and then click Linear Up (second row, second option from the left).Under Gradient stops, click Add gradient stop or Remove gradient stop until a total of four gradient stops appear in the slider.Also under Gradient stops, customize the gradient stops as follows:Select the first stop in the slider, and then do the following:In the Position box, enter 0%.Click the button next to Color, and then under Theme ColorsclickWhite, Background 1 (first row, first option from the left)Select the next stop in the slider, and then do the following:In the Position box, enter 36%.Click the button next to Color, click More Colors, and then in the Colors dialog box, on the Custom tab, enter values for Red: 213, Green: 219, Blue: 221. Select the next stop in the slider, and then do the following:In the Position box, enter 73%.Click the button next to Color, click More Colors, and then in the Colors dialog box, on the Custom tab, enter values for Red: 178, Green: 190, Blue: 194. Select the last stop in the slider, and then do the following:In the Positionbox, enter 100%.Click the button next to Color, click More Colors, and then in the Colors dialog box, on the Custom tab, enter values for Red: 213, Green: 219, Blue: 221. Also in the Format Shape dialog box, click LineColor in the left pane, and then select No line in the LineColor pane.Also in the Format Shape dialog box, click Shadow in the left pane, and then do the following in the Shadow pane: Click the button next to Presets, and then under Outer click OffsetBottom (first row, second option from the left).In the Transparency box, enter 60%.In the Size box, enter 100%.In the Blur box, enter 4 pt.In the Angle box, enter 90°.In the Distance box, enter 3 pt. Also in the Format Shape dialog box, click 3-DFormat in the left pane. In the 3-D Format pane, under Bevel,click the button next to Top, and then under Bevel click Circle (first row, first option from the left). Next to Top, in the Width box, enter 4 pt, and in the Height box, enter 4 pt.On the Insert tab, in the Text group, click Text Box, and then on the slide, drag to draw the text box.Enter text in the text box, select the text, and then on the Home tab, in the Font group, select Gill Sans MT Condensedfrom the Font list, enter 26 in the Font Size box, click Bold, click the arrow next to Font Color, and then under Theme Colors click White, Background 1, Darker 50% (sixth row, first option from the left).On the Home tab, in the Paragraph group, click Center to center the text in the text box.Select the text box. On the Home tab, in the Clipboard group, click the arrow to the right of Copy, and then click Duplicate. Repeat this process to create a total of three text boxes.Click in each of the two duplicate text boxes, and then edit the text.Drag the text boxes onto the chevron shape to form a row. Press CTRL+A to select all the objects on the slide. On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:Click Align to Slide.ClickAlignMiddle.Press and hold SHIFT, and then select all three text boxes. On the Home tab, in the Drawing group, click Arrange, and under PositionObjects, point to Align, and then do the following:Click Align to Slide.ClickDistributeHorizontally.To reproduce the animation effects on this slide, do the following:On the Transitions tab, in the TransitiontoThisSlide group, click More, and then under Subtle clickPush.Also on the Transitions tab, in the Transitions to This Slide group, click Effect Options and then click From Right.Also on the Transitions tab, in the Timing group, in the Duration box, enter 1.00.
  • Transition effect for timeline, slide 2(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 1”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the left sizing handle to the left so that the chevron shape extends past the left edge of the slide.
  • Transition effect for timeline, slide 3(Basic)Tip: This slide is the second slide in a three-slide sequence.To reproduce the effects on this slide, do the following:In the Slides and Outline pane, right-click the previous slide (“Transition effect for timeline, slide 2”) and click Duplicate Slide.Select each of the three text boxes on the slide and change the text.Select the chevron shape on the slide. Drag the right sizing handle to the left so that the right edge of the chevron shape is 0.5” from the right edge of the slide.

Hem first presentation Presentation Transcript

  • 1. INTROIntroductionPROJECT AGENDAExplanationabout project with sub projectsas well assub modules with theirinteraction & interconnectionswith each other forcomputing & managing
  • 2. PURPOSEPurpose of a ProjectPROJECT AGENDAProvide High Securityto user by usingmultilayer authentication systemin local , Network & CloudSystems OnGPU enabled Devices
  • 3. PLATFORMPlatform & EnvironmentPROJECT AGENDAPlatform as computer systemwith HPC capability with help ofGPUsNeed of Smart I/O Devices ,Smart Devices for Interaction
  • 4. SURVEYSurvey of Research MaterialPROJECT AGENDAResearch PapersResearch WebsitesTechnical ConferencesTechnical ForumsInternational JournalsProject GuidePersonal ExperienceImagination & Hypothesis
  • 5. Timeline & Grant ChartPROJECT AGENDAProject Work flowthroughout 1st & 2nd semesterWith Process modules& planning ofpublishing research Papersas well asday by day projectprogress trackingTIMELINE
  • 6. Results & ChartsPROJECT AGENDAObtaining results• Security• Optimization• User Interface• Usability• Compare Past AuthenticationRESULTS
  • 7. Any SuggestionsPROJECT AGENDAWaiting For• Suggestions• Guidance• Questions• QueriesAny else …!!ANY
  • 8. “What You Know” Knowledge“What You Have” Hard/Soft“What You Are" Biometric"What You Can " Intelligence"What You Recognize" RecognitionHUMANAUTHTECHNIQUES
  • 9. * PASSWORD ** GESTURE ** PATH ** CHALLENGE RESPONSE ** TOKENS ** PASS PHRASE ** PIN *
  • 10. * WRIST BAND ** ID CARD ** SECURITY TOKEN ** CHALLENGE RESPONSE ** CELL PHONE ** PHONE ** SMART DEVICES *
  • 11. * BODY PRINT ** RETINAL PATTERN ** DNA SEQUENCE ** FACE** VOICE ** EYE ** PALM & THUMB *
  • 12. * ARTIFICIAL INTELLIGENCE ANSWERS ** MEMORY INTELIGENCE ** COMPLEX SOLUTIONS ** CHALLENGE RESPONSE ** CALL UP ** THINK BACK SYSTEM WORKING*
  • 13. * OBJECT ** IMAGE** PATTERN ** PATH / WAY ** SOUND / AUDEO ** ANIMATION / VIDEO ** SYSTEM *
  • 14. Computer SecurityPrevention and Detection of unauthorized actions by usersFor What..??* Confidentiality ** Availability ** Non-repudiation ** Authentication ** Access Controls ** Accountability ** Security systems *
  • 15. The Platforms for which Security will provideMostly Systems Which Includes GPU systemsAS* Smart Portable Devices ** Computer Systems ** High End Workstations ** Cloud Virtual Systems ** Server Systems** Super Computers *
  • 16. * Mobile Phones ** Tablets ** Netbooks ** Palmtops ** Laptops ** Gaming Consoles ** Mali GPU 400/T678 ** Tegra 2/3/4 ** NVIDIA GF GTX M ** AMD Radeon HD ** NVIDIA GF GT M ** RSX NVIDIA G70*
  • 17. * Computers ** Workstations ** Research Systems ** NVIDIA GF GTX ** AMD Radeon HD ** NVIDIA GF GT M ** NVIDIA Quadro 6000** Quadro Plex 7000** AMD FirePro** NVIDIA Quadro 6000*
  • 18. * Server Systems ** Virtual Systems ** Super Computers ** NVIDIA GF GTX ** AMD FireStream™ 9250** NVIDIA TESLA K10** NVIDIA TESLA M2090** AMD FirePro*
  • 19. Survey for MSPUAS requires differentsurvey MaterialAS* Research Papers & Websites ** Technical Conferences & Forums** International Journals ** Project Guide** Personal Experience ** Imagination & Hypothesis *
  • 20. * A Novel 3D Graphical Password Schema* Technical Conferences & Forums** Authentication for Distributed Systems** Designing Authentication Systems with Challenge Questions** Building Robust Authentication Systems With Activity-Based Personal Questions** Three-Dimensional Password for More Secure Authentication** Artificial Intelligence Based Mutual Authentication Technique with Four Entities ** Artificial Intelligence Based Authentication Scheme for Mobile Adhoc Networks** An Improvement on a Three-party Password-based Key Exchange Protocol** Novel Artificial Intelligent Based Message Authentication Technique in Mobile* Robust security system based On dynamic signature Authenticated peer group key Exchange* Enhancing security and privacy in biometrics-based authentication systems** A High Performance Image Authentication Algorithm on GPU with CUDA** User Authentication using Rhythm Click Characteristics for Non-Keyboard Devices** New Directions in Cryptography*
  • 21. ProjectWebsitehardsoft.teamlab.com
  • 22. GPUSCIENCE
  • 23. NVIDIABLOG
  • 24. SEARCHSECURITY
  • 25. HEMBLOG
  • 26. Project GuideDr. R. C. ThoolPersonal ExperienceCrawling Through Web/Papers/Books/GuideImagination & HypothesisIncrease in secureness in user authentication system with highperformance & User friendly
  • 27. September OctoberAugustWorking ForProjectPlatform1stPresentationCollections &survey ofresearch papersFinalize projectbase papersPlanning tofuture steps
  • 28. December JanuaryNovember FebruaryTrial & error forPaper designPlanning FordifferentConferencesTrackingOptimizeresults TestingPlanning forGTC 2013Result Mergingof all SystemsPublish / reeditPaperComparePapers & results
  • 29. MayAprilMarch JuneFuturePlanningFinalTransactionwith paperCombinedResultFINALPresentationFinalize resultswithOptimization
  • 30. The Ideas Creation about user authenticating SchemesAS* Merging of different authentication Schemes** Overlapping authentication systems ** Use of GPU to improve performance as GPGPU** Creation of Scheme Environment using Parallelism** Achieve parallelism using CUDA/OpenCL** Optimize use of available Hardwares*
  • 31. Sub Research Papers by me to help final paperAS* Building AI Systems for Person Authentication Accelerate UsingGPU** Virtual environment for use authentication Accelerate Using GPU ** GPU Accelerated Multicrypto encryption on data fragment** Creation of Scheme Environment using Parallelism** Multifactor Biometric authentication by GPU computing** System crawling for future authentication Queries*
  • 32. Waiting ForSuggestions …!!Guidance …!!Questions …!!Queries …!!Any else …!!