2. SPARSH TECHNOLOGY
Transfer of data from one digital
device to another digital device by a
single touch.
Touch whatever you want to copy.
Now it is saved conceptually in you.
Next, touch the device you want to
paste/pass the saved content.
In Sparsh actual transfer of data
occurs using the internet, intranet
network or any other type of data
Servers that’s the device are
connected to.
3. WORKING OF SPARSH TECHNOLOGY
Enabling SPARSH
When user enable the Sparsh mode, an icon appears on the
status bar of the screen showing the status (if a user has
signed in).
If not user can touch this icon to login or change users using
different authentication methods like: Enter user name and
password, Drawing a secret sign or pattern, Face recognition,
Picture selection and Fingerprint detection after a user has
signed in successfully
4. Copy Data
For Identifying a copy event in Sparsh uses a long press on
copy able data item (keeping finger on a data item more than
1.5 sec.) indicates to copy that data item.
Whenever user to Touch any copy able data a touch listener
program start counting the time and when time exceeds the
threshold (1.5 sec.) a message appears indicating that the
data item is being copied and gets copied to the user’s unique
space in the data cloud.
The copy Data to the data cloud also done by alternative ways
(instead of long-press for 1.5 seconds). For example, double
tap on data item or draw a circle around the data item to
initiate copy.
5. Paste/ Pass Data
Similar to copy event Sparsh uses the listener program to identify
a paste or copy attempt.
If the user long-press or double click on any data time copy event
is initiated & if the user long-press an empty space (paste able
area) on touch screen listener Program initiate the Paste event.
When pasting action/event is established Sparsh look for content
in the cloud space assigned (folder with a unique ID) to a specific
user.
6. DATA TRANSFER TECHNOLOGIES
Touch-Based Interactions
Touch screen sensor: This sensor is made from a
glass plate that has touch responsive surface.
Controller: This is made from a small PC card. This simple
device connects the touch screen sensor and the personal
computer.
Software Driver: This driver is very useful to allow the
connection between touch screen and personal computer.
This system allows these two separate items to work together.
7. Gesture Recognition
Interface with computers using
gestures of the human body, typically
hand movements.
In gesture recognition technology,
reads the movements of the human
body and communicates the data to
a computer that uses the gestures as
input to control device or
applications.
8. Data Transfer Technology
Wired Communication-SPARSH Technology sends data throw
wired. When device is the touch enable device which is
connected to Broad band connection. Ex: PC, Display Boards.
Wireless Communication-SPARSH also sends data throw
wireless. When device is the touch enable device which is
connected to Wireless Internet connection. EX: Mobile, PDA.
Backbone of Sparsh is data cloud by which the data transfer
from one digital device to another Digital Device.
9. CLOUD COMPUTING
Cloud computing is the delivery of computing services over
the Internet.
Examples of cloud services include online file storage, social
networking sites, webmail, and online business applications.
The cloud computing model allows access to information and
computer resources from anywhere that a network connection
is available.
Cloud computing provides a shared pool of resources,
including data storage space, networks, computer processing
power, and specialized corporate and user applications.
10. Client
It is a part of client server architecture which is used to send
the request to the server through the internet in the network
field.
Here client send request to the server at first to setup
connection by the acknowledgement which would be sent by
server as a respond.
Sparsh Authentication
As soon as connection get setup between client and server
than the user uses their thumb for scanning by using thumb
device that is thumb scanner.
11. Server
It is also the part of client server architecture which works in the listen
mode as soon as client sends the request through the internet than server
goes into the listen mode to give the response to the corresponding client.
Data encryption
Data gets encrypted when the user send the data on the cloud. By using
encryption of the data we provide high level of protecting the data security
so that information cannot be leak out in any circumstances.
Data fragmentation
Encrypted data is fragmented using the data fragmentation algorithm.
Data decryption
Whenever user request for their file,the file is retrieved from the cloud.
12. Algorithm
1. Start
2. User enter the username and password to connect
with the server through internet
3. User authenticate by thumb scanning to either
upload or download the data
4. If upload
a. Select the data from database.
b. Send data with bit pattern of the thumb.
c. Data converted into encrypted form.
d. Perform data fragmentation.
e. Give acknowledgment to the user.
5. If download
I. Compare the bit pattern of the image get with the
preloaded bit pattern.
II. If it matched then do
a. Segment the fragment data.
b. Decrypt the data.
c. Download the data in client device.
d. Give the acknowledgement to the user.
III.Otherwise
a. Reject the download process.
6. End.
13. SPARSH INTERACTIONS
Scenario A
If you received a text message with address,
you touch the address and it gets
conceptually copied in you. Now you pass
that address to the search bar of Google
Maps in a web browser of your computer by
simply touching it
Scenario B
You want to contact a person whose contact
information was found while browsing, you
touch the phone number on the screen, you
can simply touch your mobile phone dial pad
14. SPARSH INTERACTIONS
Scenario C
Touch the pictures you want to copy and
when you are home, you can paste the
photos to your tablet computer by
touching its screen
Scenario D
If you want to watch the on a larger screen,
touch the link, and pass it to a larger screen
by touching and enjoy the video
15. MERITS OF SPARSH
Sparsh invention reduces the physical device dependency,
physical transformation time and cost.
With the help of this invention fast sharing of documents,
videos, address, phone numbers and much more over large
geographical area easily.
Sparsh provide a highly secure data transformation medium
by using advance encryption technique use in cloud
computing.
It also reduces the data loss and corruption at the time of data
transmission.
By using this technology Users are also able to access the
data on their data cloud without SPARSH Mode.
16. CONCLUSIONS
SPARSH explores a novel interaction method to seamlessly
transfer data between digital devices.
It this user conceptually copy the data in their body from one
device and then paste that data to the other device using
natural single touch interaction.
In future the SPARSH technology widely used for transferring
the data using a single touch gesture between different digital
device also with different platforms (Windows and Android).
17. REFERENCES
Mistry, P., Nanayakkara, S., & Maes, P. (2011, March). SPARSH:
touch the cloud. In Proceedings of the ACM 2011 conference on
Computer supported cooperative work (pp. 585-586). ACM.
P. Mistry, S. Nanayakkara, P. Maes. SPARSH: Passing Data using
the Body as a Medium. In the proc. of CSCW2011. Interactive
Paper. Hangzhou, China. 2011
P. Mistry, S. Nanayakkara, P. Maes. SPARSH – Touch the Cloud. In
the proc. of CSCW2011. Video. Hangzhou, China. 2011
http://www.pranavmistry.com/projects/sparsh/