SlideShare a Scribd company logo
1 of 17
A
PRESENTATION ON
SPARSH
TECHNOLOGY
BY
TAUFIK TAMBOLI
MECHANICAL ENGINEERING DEPARTMENT
RAJARAMBAPU INSTITUTE OF TECHNOLOGY,
ISLAMPUR
SPARSH TECHNOLOGY
 Transfer of data from one digital
device to another digital device by a
single touch.
 Touch whatever you want to copy.
Now it is saved conceptually in you.
Next, touch the device you want to
paste/pass the saved content.
 In Sparsh actual transfer of data
occurs using the internet, intranet
network or any other type of data
Servers that’s the device are
connected to.
WORKING OF SPARSH TECHNOLOGY
Enabling SPARSH
 When user enable the Sparsh mode, an icon appears on the
status bar of the screen showing the status (if a user has
signed in).
 If not user can touch this icon to login or change users using
different authentication methods like: Enter user name and
password, Drawing a secret sign or pattern, Face recognition,
Picture selection and Fingerprint detection after a user has
signed in successfully
Copy Data
 For Identifying a copy event in Sparsh uses a long press on
copy able data item (keeping finger on a data item more than
1.5 sec.) indicates to copy that data item.
 Whenever user to Touch any copy able data a touch listener
program start counting the time and when time exceeds the
threshold (1.5 sec.) a message appears indicating that the
data item is being copied and gets copied to the user’s unique
space in the data cloud.
 The copy Data to the data cloud also done by alternative ways
(instead of long-press for 1.5 seconds). For example, double
tap on data item or draw a circle around the data item to
initiate copy.
Paste/ Pass Data
 Similar to copy event Sparsh uses the listener program to identify
a paste or copy attempt.
 If the user long-press or double click on any data time copy event
is initiated & if the user long-press an empty space (paste able
area) on touch screen listener Program initiate the Paste event.
 When pasting action/event is established Sparsh look for content
in the cloud space assigned (folder with a unique ID) to a specific
user.
DATA TRANSFER TECHNOLOGIES
Touch-Based Interactions
 Touch screen sensor: This sensor is made from a
glass plate that has touch responsive surface.
 Controller: This is made from a small PC card. This simple
device connects the touch screen sensor and the personal
computer.
 Software Driver: This driver is very useful to allow the
connection between touch screen and personal computer.
This system allows these two separate items to work together.
Gesture Recognition
 Interface with computers using
gestures of the human body, typically
hand movements.
 In gesture recognition technology,
reads the movements of the human
body and communicates the data to
a computer that uses the gestures as
input to control device or
applications.
Data Transfer Technology
 Wired Communication-SPARSH Technology sends data throw
wired. When device is the touch enable device which is
connected to Broad band connection. Ex: PC, Display Boards.
 Wireless Communication-SPARSH also sends data throw
wireless. When device is the touch enable device which is
connected to Wireless Internet connection. EX: Mobile, PDA.
 Backbone of Sparsh is data cloud by which the data transfer
from one digital device to another Digital Device.
CLOUD COMPUTING
 Cloud computing is the delivery of computing services over
the Internet.
 Examples of cloud services include online file storage, social
networking sites, webmail, and online business applications.
 The cloud computing model allows access to information and
computer resources from anywhere that a network connection
is available.
 Cloud computing provides a shared pool of resources,
including data storage space, networks, computer processing
power, and specialized corporate and user applications.
Client
 It is a part of client server architecture which is used to send
the request to the server through the internet in the network
field.
 Here client send request to the server at first to setup
connection by the acknowledgement which would be sent by
server as a respond.
Sparsh Authentication
 As soon as connection get setup between client and server
than the user uses their thumb for scanning by using thumb
device that is thumb scanner.
Server
 It is also the part of client server architecture which works in the listen
mode as soon as client sends the request through the internet than server
goes into the listen mode to give the response to the corresponding client.
 Data encryption
Data gets encrypted when the user send the data on the cloud. By using
encryption of the data we provide high level of protecting the data security
so that information cannot be leak out in any circumstances.
 Data fragmentation
Encrypted data is fragmented using the data fragmentation algorithm.
 Data decryption
Whenever user request for their file,the file is retrieved from the cloud.
Algorithm
1. Start
2. User enter the username and password to connect
with the server through internet
3. User authenticate by thumb scanning to either
upload or download the data
4. If upload
a. Select the data from database.
b. Send data with bit pattern of the thumb.
c. Data converted into encrypted form.
d. Perform data fragmentation.
e. Give acknowledgment to the user.

5. If download
I. Compare the bit pattern of the image get with the
preloaded bit pattern.
II. If it matched then do

a. Segment the fragment data.
b. Decrypt the data.
c. Download the data in client device.
d. Give the acknowledgement to the user.
III.Otherwise
a. Reject the download process.
6. End.
SPARSH INTERACTIONS
Scenario A
 If you received a text message with address,
you touch the address and it gets
conceptually copied in you. Now you pass
that address to the search bar of Google
Maps in a web browser of your computer by
simply touching it
Scenario B
 You want to contact a person whose contact
information was found while browsing, you
touch the phone number on the screen, you
can simply touch your mobile phone dial pad
SPARSH INTERACTIONS
Scenario C
 Touch the pictures you want to copy and
when you are home, you can paste the
photos to your tablet computer by
touching its screen
Scenario D
 If you want to watch the on a larger screen,
touch the link, and pass it to a larger screen
by touching and enjoy the video
MERITS OF SPARSH
 Sparsh invention reduces the physical device dependency,
physical transformation time and cost.
 With the help of this invention fast sharing of documents,
videos, address, phone numbers and much more over large
geographical area easily.
 Sparsh provide a highly secure data transformation medium
by using advance encryption technique use in cloud
computing.
 It also reduces the data loss and corruption at the time of data
transmission.
 By using this technology Users are also able to access the
data on their data cloud without SPARSH Mode.
CONCLUSIONS
 SPARSH explores a novel interaction method to seamlessly
transfer data between digital devices.
 It this user conceptually copy the data in their body from one
device and then paste that data to the other device using
natural single touch interaction.
 In future the SPARSH technology widely used for transferring
the data using a single touch gesture between different digital
device also with different platforms (Windows and Android).
REFERENCES
 Mistry, P., Nanayakkara, S., & Maes, P. (2011, March). SPARSH:
touch the cloud. In Proceedings of the ACM 2011 conference on
Computer supported cooperative work (pp. 585-586). ACM.
 P. Mistry, S. Nanayakkara, P. Maes. SPARSH: Passing Data using
the Body as a Medium. In the proc. of CSCW2011. Interactive
Paper. Hangzhou, China. 2011
 P. Mistry, S. Nanayakkara, P. Maes. SPARSH – Touch the Cloud. In
the proc. of CSCW2011. Video. Hangzhou, China. 2011
 http://www.pranavmistry.com/projects/sparsh/

More Related Content

What's hot

IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET Journal
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

What's hot (15)

Fog doc
Fog doc Fog doc
Fog doc
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
 
I42024349
I42024349I42024349
I42024349
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 

Similar to Sparsh 22 oct

5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000Van Pham
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesHTS Hosting
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingKumar Goud
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd Iaetsd
 
Cloud computing
Cloud computingCloud computing
Cloud computingsuman2010
 

Similar to Sparsh 22 oct (20)

Sparsh
SparshSparsh
Sparsh
 
cloud computing
cloud computingcloud computing
cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
SYNCHRONIZATION
SYNCHRONIZATIONSYNCHRONIZATION
SYNCHRONIZATION
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
172506 633746925739945000
172506 633746925739945000172506 633746925739945000
172506 633746925739945000
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
El35782786
El35782786El35782786
El35782786
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
IGCSE ICT Theory
IGCSE ICT Theory IGCSE ICT Theory
IGCSE ICT Theory
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Sparsh 22 oct

  • 1. A PRESENTATION ON SPARSH TECHNOLOGY BY TAUFIK TAMBOLI MECHANICAL ENGINEERING DEPARTMENT RAJARAMBAPU INSTITUTE OF TECHNOLOGY, ISLAMPUR
  • 2. SPARSH TECHNOLOGY  Transfer of data from one digital device to another digital device by a single touch.  Touch whatever you want to copy. Now it is saved conceptually in you. Next, touch the device you want to paste/pass the saved content.  In Sparsh actual transfer of data occurs using the internet, intranet network or any other type of data Servers that’s the device are connected to.
  • 3. WORKING OF SPARSH TECHNOLOGY Enabling SPARSH  When user enable the Sparsh mode, an icon appears on the status bar of the screen showing the status (if a user has signed in).  If not user can touch this icon to login or change users using different authentication methods like: Enter user name and password, Drawing a secret sign or pattern, Face recognition, Picture selection and Fingerprint detection after a user has signed in successfully
  • 4. Copy Data  For Identifying a copy event in Sparsh uses a long press on copy able data item (keeping finger on a data item more than 1.5 sec.) indicates to copy that data item.  Whenever user to Touch any copy able data a touch listener program start counting the time and when time exceeds the threshold (1.5 sec.) a message appears indicating that the data item is being copied and gets copied to the user’s unique space in the data cloud.  The copy Data to the data cloud also done by alternative ways (instead of long-press for 1.5 seconds). For example, double tap on data item or draw a circle around the data item to initiate copy.
  • 5. Paste/ Pass Data  Similar to copy event Sparsh uses the listener program to identify a paste or copy attempt.  If the user long-press or double click on any data time copy event is initiated & if the user long-press an empty space (paste able area) on touch screen listener Program initiate the Paste event.  When pasting action/event is established Sparsh look for content in the cloud space assigned (folder with a unique ID) to a specific user.
  • 6. DATA TRANSFER TECHNOLOGIES Touch-Based Interactions  Touch screen sensor: This sensor is made from a glass plate that has touch responsive surface.  Controller: This is made from a small PC card. This simple device connects the touch screen sensor and the personal computer.  Software Driver: This driver is very useful to allow the connection between touch screen and personal computer. This system allows these two separate items to work together.
  • 7. Gesture Recognition  Interface with computers using gestures of the human body, typically hand movements.  In gesture recognition technology, reads the movements of the human body and communicates the data to a computer that uses the gestures as input to control device or applications.
  • 8. Data Transfer Technology  Wired Communication-SPARSH Technology sends data throw wired. When device is the touch enable device which is connected to Broad band connection. Ex: PC, Display Boards.  Wireless Communication-SPARSH also sends data throw wireless. When device is the touch enable device which is connected to Wireless Internet connection. EX: Mobile, PDA.  Backbone of Sparsh is data cloud by which the data transfer from one digital device to another Digital Device.
  • 9. CLOUD COMPUTING  Cloud computing is the delivery of computing services over the Internet.  Examples of cloud services include online file storage, social networking sites, webmail, and online business applications.  The cloud computing model allows access to information and computer resources from anywhere that a network connection is available.  Cloud computing provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications.
  • 10. Client  It is a part of client server architecture which is used to send the request to the server through the internet in the network field.  Here client send request to the server at first to setup connection by the acknowledgement which would be sent by server as a respond. Sparsh Authentication  As soon as connection get setup between client and server than the user uses their thumb for scanning by using thumb device that is thumb scanner.
  • 11. Server  It is also the part of client server architecture which works in the listen mode as soon as client sends the request through the internet than server goes into the listen mode to give the response to the corresponding client.  Data encryption Data gets encrypted when the user send the data on the cloud. By using encryption of the data we provide high level of protecting the data security so that information cannot be leak out in any circumstances.  Data fragmentation Encrypted data is fragmented using the data fragmentation algorithm.  Data decryption Whenever user request for their file,the file is retrieved from the cloud.
  • 12. Algorithm 1. Start 2. User enter the username and password to connect with the server through internet 3. User authenticate by thumb scanning to either upload or download the data 4. If upload a. Select the data from database. b. Send data with bit pattern of the thumb. c. Data converted into encrypted form. d. Perform data fragmentation. e. Give acknowledgment to the user.  5. If download I. Compare the bit pattern of the image get with the preloaded bit pattern. II. If it matched then do  a. Segment the fragment data. b. Decrypt the data. c. Download the data in client device. d. Give the acknowledgement to the user. III.Otherwise a. Reject the download process. 6. End.
  • 13. SPARSH INTERACTIONS Scenario A  If you received a text message with address, you touch the address and it gets conceptually copied in you. Now you pass that address to the search bar of Google Maps in a web browser of your computer by simply touching it Scenario B  You want to contact a person whose contact information was found while browsing, you touch the phone number on the screen, you can simply touch your mobile phone dial pad
  • 14. SPARSH INTERACTIONS Scenario C  Touch the pictures you want to copy and when you are home, you can paste the photos to your tablet computer by touching its screen Scenario D  If you want to watch the on a larger screen, touch the link, and pass it to a larger screen by touching and enjoy the video
  • 15. MERITS OF SPARSH  Sparsh invention reduces the physical device dependency, physical transformation time and cost.  With the help of this invention fast sharing of documents, videos, address, phone numbers and much more over large geographical area easily.  Sparsh provide a highly secure data transformation medium by using advance encryption technique use in cloud computing.  It also reduces the data loss and corruption at the time of data transmission.  By using this technology Users are also able to access the data on their data cloud without SPARSH Mode.
  • 16. CONCLUSIONS  SPARSH explores a novel interaction method to seamlessly transfer data between digital devices.  It this user conceptually copy the data in their body from one device and then paste that data to the other device using natural single touch interaction.  In future the SPARSH technology widely used for transferring the data using a single touch gesture between different digital device also with different platforms (Windows and Android).
  • 17. REFERENCES  Mistry, P., Nanayakkara, S., & Maes, P. (2011, March). SPARSH: touch the cloud. In Proceedings of the ACM 2011 conference on Computer supported cooperative work (pp. 585-586). ACM.  P. Mistry, S. Nanayakkara, P. Maes. SPARSH: Passing Data using the Body as a Medium. In the proc. of CSCW2011. Interactive Paper. Hangzhou, China. 2011  P. Mistry, S. Nanayakkara, P. Maes. SPARSH – Touch the Cloud. In the proc. of CSCW2011. Video. Hangzhou, China. 2011  http://www.pranavmistry.com/projects/sparsh/