Digital Spectacles byDigital Spectacles by
usingusing
cloud Computing.cloud Computing.
Third Year Of Computer EngineeringThird Year Of Computer Engineering..
Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.
Submitted by...Submitted by...
Mr. Mandar pathrikar.Mr. Mandar pathrikar.
Digital spectaclesDigital spectacles
 Digital spectacles is the newDigital spectacles is the new
invention in the science ,this isinvention in the science ,this is
beneficial for all cops.beneficial for all cops.
 A small camera fitted to theA small camera fitted to the
glasses can capture 400 facialglasses can capture 400 facial
images per second and sendimages per second and send
them to a central computerthem to a central computer
database storing up to 13database storing up to 13
million faces.million faces.
 The system can compareThe system can compare
biometric data at 46,000 pointsbiometric data at 46,000 points
on a face and will immediatelyon a face and will immediately
signal any matches to knownsignal any matches to known
criminals or people wanted bycriminals or people wanted by
Criminal Information
present at Different
location
Encryption of data
Cloud
Decryption of data
Mobile
What is Cloud ComputingWhat is Cloud Computing
 ““Cloud” is a collective term forCloud” is a collective term for
a large number of developmentsa large number of developments
and possibilities. It is not anand possibilities. It is not an
invention, but more of ainvention, but more of a
“practical innovation”.“practical innovation”.
 Dynamically scalable sharedDynamically scalable shared
resourcesresources
 accessed over a networkaccessed over a network
 Only pay for what you useOnly pay for what you use
 Shared internally or with otherShared internally or with other
customerscustomers
 Resources = Storage,Resources = Storage,
computing, services, etc.computing, services, etc.
 Internal network or InternetInternal network or Internet
5
ArchitectureArchitecture
Deployment ModelsDeployment Models
 ••PublicPublic
Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general
publicpublic, owned by org selling cloud services, owned by org selling cloud services
 ••PrivatePrivate
Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be
managed by the org or a 3managed by the org or a 3rdrd
party, on or offparty, on or off
premisepremise
How Can I Create personal CloudHow Can I Create personal Cloud
 Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates
your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor
Center storage devices, personal computers andCenter storage devices, personal computers and
handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect,
share, copy and protect your files within your network.share, copy and protect your files within your network.
 Installing this software in our devices and connectingInstalling this software in our devices and connecting
through internet ,we can create our own cloud.through internet ,we can create our own cloud.
Working of cloud spectsWorking of cloud spects
Lumus LOE technologyLumus LOE technology
Lumus LOE technologyLumus LOE technology
 Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light-
guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses
are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media
source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video
image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of
the eyeglasses.the eyeglasses.
 The image travels through the lens by way of TotalThe image travels through the lens by way of Total
Internal Reflection (TIR).Internal Reflection (TIR).
 TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light
strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the
refractive index is lower on the other side of therefractive index is lower on the other side of the
boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting
all of the light.all of the light.
Head-Mounted display-:Head-Mounted display-:
((Sight of death)Sight of death)
 This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting
their targets.their targets.
 The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by
simply looking at it .simply looking at it .
 You want the image to be large, the device has to beYou want the image to be large, the device has to be
large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will
be small.be small.
Security of CloudSecurity of Cloud
Security of cloudSecurity of cloud
 Security of cloud is the main feature of thisSecurity of cloud is the main feature of this
technology. Data which contain in the cloud istechnology. Data which contain in the cloud is
very precocious that's why we have to use it invery precocious that's why we have to use it in
encryption form.encryption form.
 ““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the
technology which is used in the Multi nationaltechnology which is used in the Multi national
companies for sending data from one place tocompanies for sending data from one place to
another .Data is totally in encryption form soanother .Data is totally in encryption form so
that it is most secure in form.that it is most secure in form.
Nessus vulnerability scannerNessus vulnerability scanner
Nessus vulnerability scannerNessus vulnerability scanner
 This is the most secure technology which isThis is the most secure technology which is
mostly used in the Multinational companies formostly used in the Multinational companies for
sending data from one state to another .sending data from one state to another .
 Nessus scanner when send the data it is in theNessus scanner when send the data it is in the
encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if
any one try to do that then whole algorithmany one try to do that then whole algorithm
change within 5min. And data sending againchange within 5min. And data sending again
started.started.
Radar PageRadar Page
Radar PageRadar Page
 The Radar Page was designed and built to caterThe Radar Page was designed and built to cater
for the demands of Government and Militaryfor the demands of Government and Military
networks requiring near real time information onnetworks requiring near real time information on
new and emerging cyber threats.new and emerging cyber threats.
 The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing
information from multiple sources.information from multiple sources.
 If any threats or illegal access is found than theIf any threats or illegal access is found than the
scanner note down the IP Address and put itscanner note down the IP Address and put it
into list and appropriate action we can easilyinto list and appropriate action we can easily
take.take.
ConclusionConclusion
 Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of
security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using
it.it.
 Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.
 Cloud security is very up coming future technology.Cloud security is very up coming future technology.
 With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we
can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing
personal.personal.
 Increases business responsiveness.Increases business responsiveness.
 Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system
utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.
Digital spectacle by using cloud computing

Digital spectacle by using cloud computing

  • 1.
    Digital Spectacles byDigitalSpectacles by usingusing cloud Computing.cloud Computing. Third Year Of Computer EngineeringThird Year Of Computer Engineering.. Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207. Submitted by...Submitted by... Mr. Mandar pathrikar.Mr. Mandar pathrikar.
  • 2.
    Digital spectaclesDigital spectacles Digital spectacles is the newDigital spectacles is the new invention in the science ,this isinvention in the science ,this is beneficial for all cops.beneficial for all cops.  A small camera fitted to theA small camera fitted to the glasses can capture 400 facialglasses can capture 400 facial images per second and sendimages per second and send them to a central computerthem to a central computer database storing up to 13database storing up to 13 million faces.million faces.  The system can compareThe system can compare biometric data at 46,000 pointsbiometric data at 46,000 points on a face and will immediatelyon a face and will immediately signal any matches to knownsignal any matches to known criminals or people wanted bycriminals or people wanted by
  • 3.
    Criminal Information present atDifferent location Encryption of data Cloud Decryption of data Mobile
  • 4.
    What is CloudComputingWhat is Cloud Computing  ““Cloud” is a collective term forCloud” is a collective term for a large number of developmentsa large number of developments and possibilities. It is not anand possibilities. It is not an invention, but more of ainvention, but more of a “practical innovation”.“practical innovation”.  Dynamically scalable sharedDynamically scalable shared resourcesresources  accessed over a networkaccessed over a network  Only pay for what you useOnly pay for what you use  Shared internally or with otherShared internally or with other customerscustomers  Resources = Storage,Resources = Storage, computing, services, etc.computing, services, etc.  Internal network or InternetInternal network or Internet
  • 5.
  • 6.
    Deployment ModelsDeployment Models ••PublicPublic Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general publicpublic, owned by org selling cloud services, owned by org selling cloud services  ••PrivatePrivate Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be managed by the org or a 3managed by the org or a 3rdrd party, on or offparty, on or off premisepremise
  • 7.
    How Can ICreate personal CloudHow Can I Create personal Cloud  Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor Center storage devices, personal computers andCenter storage devices, personal computers and handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect, share, copy and protect your files within your network.share, copy and protect your files within your network.  Installing this software in our devices and connectingInstalling this software in our devices and connecting through internet ,we can create our own cloud.through internet ,we can create our own cloud.
  • 8.
    Working of cloudspectsWorking of cloud spects
  • 9.
  • 10.
    Lumus LOE technologyLumusLOE technology  Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light- guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of the eyeglasses.the eyeglasses.  The image travels through the lens by way of TotalThe image travels through the lens by way of Total Internal Reflection (TIR).Internal Reflection (TIR).  TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the refractive index is lower on the other side of therefractive index is lower on the other side of the boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting all of the light.all of the light.
  • 11.
    Head-Mounted display-:Head-Mounted display-: ((Sightof death)Sight of death)  This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting their targets.their targets.  The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by simply looking at it .simply looking at it .  You want the image to be large, the device has to beYou want the image to be large, the device has to be large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will be small.be small.
  • 12.
  • 13.
    Security of cloudSecurityof cloud  Security of cloud is the main feature of thisSecurity of cloud is the main feature of this technology. Data which contain in the cloud istechnology. Data which contain in the cloud is very precocious that's why we have to use it invery precocious that's why we have to use it in encryption form.encryption form.  ““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the technology which is used in the Multi nationaltechnology which is used in the Multi national companies for sending data from one place tocompanies for sending data from one place to another .Data is totally in encryption form soanother .Data is totally in encryption form so that it is most secure in form.that it is most secure in form.
  • 14.
  • 15.
    Nessus vulnerability scannerNessusvulnerability scanner  This is the most secure technology which isThis is the most secure technology which is mostly used in the Multinational companies formostly used in the Multinational companies for sending data from one state to another .sending data from one state to another .  Nessus scanner when send the data it is in theNessus scanner when send the data it is in the encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if any one try to do that then whole algorithmany one try to do that then whole algorithm change within 5min. And data sending againchange within 5min. And data sending again started.started.
  • 16.
  • 17.
    Radar PageRadar Page The Radar Page was designed and built to caterThe Radar Page was designed and built to cater for the demands of Government and Militaryfor the demands of Government and Military networks requiring near real time information onnetworks requiring near real time information on new and emerging cyber threats.new and emerging cyber threats.  The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing information from multiple sources.information from multiple sources.  If any threats or illegal access is found than theIf any threats or illegal access is found than the scanner note down the IP Address and put itscanner note down the IP Address and put it into list and appropriate action we can easilyinto list and appropriate action we can easily take.take.
  • 18.
    ConclusionConclusion  Digital spectaclesare the latest technology in case ofDigital spectacles are the latest technology in case of security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using it.it.  Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.  Cloud security is very up coming future technology.Cloud security is very up coming future technology.  With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing personal.personal.  Increases business responsiveness.Increases business responsiveness.  Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.