One-day system authentication could be widely achieved through brainwaves. One doesn’t need to remember that 8 or more character long strange password. Simply thinking of certain things, such as a person face, or a rotating displayed cube, or line of song would be enough to unlock a device. Electro-encephalography (EEC) sensors are behind the technique. That is where electrical activity in certain parts of the brain is recorded. These sensors are used to generate the graphical lines on charts created from wired electrodes placed on the scalp, as seen in hospitals and TV shows. They are used in hospital to diagnose epilepsy, among other things. In this case, though, one wouldn’t need to be fitted with wired electrodes —or even a headset, which is used already in some current non-muscular EEC computer controls. An ear bud will collect the signals (mental gesture) and perform secure authentication. This research could provide hands-free and wireless interaction, authentication, and user experience, all in the form-factor of a typical ear bud.
contact for further details. +92334019692
Pakistan continues to grow through the crippling energy crisis and increasing remittances over time which has not only slowed the economy but also made the lives of its citizens hard. Our IoT-based Smart Grid System allows consumers to keep track of their total consumed electrical units along with real-time bill calculation through our Smart Energy Meter. It is designed to collect and monitor the consumption of electrical energy remotely and wirelessly communicate it to the consumer and supplier through a mobile app that we designed. Moreover, our system detects any type of power theft and enables bidirectional communication between consumer and supplier. It turns off the smart energy meter remotely in case of meter tampering and sends an alert to both parties as soon as power theft is detected. Thereby, the power system becomes more accurate and reliable by integrating IoT-based Smart Grid System.
Contact for more info. +923340196962
Gain advanced knowledge about BAN (Body Area Networks)
Topics to be covered in BAN :-
* What is BAN?
* Concept of BAN
* BAN is growing silently!!!
* Advantages of BAN
* Why BAN operates at very low power and Why it is secure?
* Types of data transmission techniques used in BAN
* Focusing on electric-field communication for BAN applications
* Disadvantages of these both over Electric-field communication
* Propagating digital signals between sites on the skin
* Principle of electric-field communication
* Steps to Propagate digital signals between sites on the skin
* Requirements of WBAN
* What is Access Point, Gateway & Actuator?
* A three-tier architecture for WBANs
* Applications of BAN
* Challenges of Radio Technologies in BANs
* What is Duty Cycle & Miniaturization
* WBAN(or BAN) Standards and Technologies
* IEEE 802.15.6 WBAN
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)3scale.net
The talk gave an insight into characteristics and challenges in software engineering of mobile apps from a more industrial perspective. A model for mobile software engineering was discussed and various best-practices proposed. Essential mobile software engineering techniques, such as experience prototyping, in-context requirement gathering (and testing), or UI/UIX design were explained using examples, case studies from real-world projects, and tools.
contact for further details. +92334019692
Pakistan continues to grow through the crippling energy crisis and increasing remittances over time which has not only slowed the economy but also made the lives of its citizens hard. Our IoT-based Smart Grid System allows consumers to keep track of their total consumed electrical units along with real-time bill calculation through our Smart Energy Meter. It is designed to collect and monitor the consumption of electrical energy remotely and wirelessly communicate it to the consumer and supplier through a mobile app that we designed. Moreover, our system detects any type of power theft and enables bidirectional communication between consumer and supplier. It turns off the smart energy meter remotely in case of meter tampering and sends an alert to both parties as soon as power theft is detected. Thereby, the power system becomes more accurate and reliable by integrating IoT-based Smart Grid System.
Contact for more info. +923340196962
Gain advanced knowledge about BAN (Body Area Networks)
Topics to be covered in BAN :-
* What is BAN?
* Concept of BAN
* BAN is growing silently!!!
* Advantages of BAN
* Why BAN operates at very low power and Why it is secure?
* Types of data transmission techniques used in BAN
* Focusing on electric-field communication for BAN applications
* Disadvantages of these both over Electric-field communication
* Propagating digital signals between sites on the skin
* Principle of electric-field communication
* Steps to Propagate digital signals between sites on the skin
* Requirements of WBAN
* What is Access Point, Gateway & Actuator?
* A three-tier architecture for WBANs
* Applications of BAN
* Challenges of Radio Technologies in BANs
* What is Duty Cycle & Miniaturization
* WBAN(or BAN) Standards and Technologies
* IEEE 802.15.6 WBAN
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)3scale.net
The talk gave an insight into characteristics and challenges in software engineering of mobile apps from a more industrial perspective. A model for mobile software engineering was discussed and various best-practices proposed. Essential mobile software engineering techniques, such as experience prototyping, in-context requirement gathering (and testing), or UI/UIX design were explained using examples, case studies from real-world projects, and tools.
Heart-Rate Monitor and Pulse Oximeter Sensor in LED Reflective Solution in the Samsung Galaxy S7
Maxim Integrated is a respected supplier for Samsung’s mobile phone flagships. From the 5th generation Galaxy S5 to the latest Galaxy S7, Maxim’s heart-rate sensor has always been found in the back of the smartphone. The Galaxy S7 uses the latest version of the heart-rate sensor, designed for both smartphone and wearables but very different to previous versions: the MAX30102.
The Samsung Galaxy S7 heart-rate sensor is located on the main board of the smartphone under the camera. The sensor is an optical heart-rate module and a pulse oximeter sensor in an LED reflective solution.
The main die features a photodiode area and an analysis part, with an integrated ambient light cancellation system comprising a photodetector and a wavelength cut-off filter based on Maxim’s proprietary technology. The component features two LEDs: one infra-red (IR) and one red. The LEDs are bonded on silicon substrates, the IR led is manufactured from AlInGaP material and the red LED from GaAs material.
The component is assembled with multiple devices in the package. Compared to the previous generation the design footprint and packaging are totally different. This has made the component more reliable.
Thanks to all these innovations, the MAX30102 is very cost effective, enforcing Maxim’s leadership in this domain.
Complete chip fabrication processes and cost estimation are presented in the report. It also includes comparison with the previous generation of the sensor that can be found in the Samsung Galaxy S6, highlighting and measuring all the differences.
More information on that report at http://www.i-micronews.com/reports.html
Human Computer Interaction, Gesture provides a way for computers to understand human body language, Deals with the goal of interpreting hand gestures via mathematical algorithms, Enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices
Heart-Rate Monitor and Pulse Oximeter Sensor in LED Reflective Solution in the Samsung Galaxy S7
Maxim Integrated is a respected supplier for Samsung’s mobile phone flagships. From the 5th generation Galaxy S5 to the latest Galaxy S7, Maxim’s heart-rate sensor has always been found in the back of the smartphone. The Galaxy S7 uses the latest version of the heart-rate sensor, designed for both smartphone and wearables but very different to previous versions: the MAX30102.
The Samsung Galaxy S7 heart-rate sensor is located on the main board of the smartphone under the camera. The sensor is an optical heart-rate module and a pulse oximeter sensor in an LED reflective solution.
The main die features a photodiode area and an analysis part, with an integrated ambient light cancellation system comprising a photodetector and a wavelength cut-off filter based on Maxim’s proprietary technology. The component features two LEDs: one infra-red (IR) and one red. The LEDs are bonded on silicon substrates, the IR led is manufactured from AlInGaP material and the red LED from GaAs material.
The component is assembled with multiple devices in the package. Compared to the previous generation the design footprint and packaging are totally different. This has made the component more reliable.
Thanks to all these innovations, the MAX30102 is very cost effective, enforcing Maxim’s leadership in this domain.
Complete chip fabrication processes and cost estimation are presented in the report. It also includes comparison with the previous generation of the sensor that can be found in the Samsung Galaxy S6, highlighting and measuring all the differences.
More information on that report at http://www.i-micronews.com/reports.html
Human Computer Interaction, Gesture provides a way for computers to understand human body language, Deals with the goal of interpreting hand gestures via mathematical algorithms, Enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices
Brain computer interface based smart keyboard using neurosky mindwave headsetTELKOMNIKA JOURNAL
In the last decade, numerous researches in the field of electro-encephalo-graphy (EEG) and brain-computer-interface (BCI) have been accomplished. BCI has been developed to aid disabled/partially disabled people to efficiently communicate with the community. This paper presents a control tool using the Neurosky Mindwave headset, which detects brainwaves (voluntary blinks and attention) to form a brain-computer interface (BCI) by receiving the system signals from the frontal lobe. This paper proposed an alternative computer input device for those disabled people (who are physically challenged) rather than the conventional one. The work suggested to use two virtual keyboard designs. The conducted experiment revealed a significant result in developing user printing skills on PCs. Encouraging results (1.55-1.8 word per minute (WPM)) were obtained in this research in comparison to other studies.
A Brain computer interface is the direct communication pathway between wired brain and external device.
Brainware University
https://www.brainwareuniversity.ac.in/
Neurohacking is the colloquial term for (usually personal or 'DIY') neuroengineering. It is a form of biohacking (qv) focusing on the brain and CNS. Strictly speaking it is any method of manipulating or interfering with the structure and/or function of neurons for improvement or repair.
Presentation on Brain Computer Interface. It describes how our brain is used as a signaling mechanism for computer. different types of BCIs and its applications.
Brain Computer Interface (BCI) aims at providing an alternate means of communication and control to people with severe cognitive or sensory-motor disabilities. These systems are based on the single trial recognition of different mental states or tasks from the brain activity. This paper discusses the major components involved in developing a Brain Computer Interface system which includes the modality to obtain brain signals and its related processing methods.
The mind-to-movement system that allows a quadriplegic man to control a computer using only his thoughts is a scientific milestone. It was reached, in large part, through the brain gate system. This system has become a boon to the paralyzed. The Brain Gate System is based on Cyber kinetics platform technology to sense, transmit, analyze and apply the language of neurons. The principle of operation behind the Brain Gate System is that with intact brain function, brain signals are generated even though they are not sent to the arms, hands and legs.The signals are interpreted and translated into cursor movements, offering the user an alternate Brain Gate pathway to control a computer with thought,just as individuals who have the ability to move their hands use a mouse. The 'Brain Gate' contains tiny spikes that will extend down about one millimetre into the brain after being implanted beneath the skull,monitoring the activity from a small group of neurons.It will now be possible for a patient with spinal cord injury to produce brain signals that relay the intention of moving the paralyzed limbs,as signals to an implanted sensor,which is then output as electronic impulses. These impulses enable the user to operate mechanical devices with the help of a computer cursor. Matthew Nagle,a 25-year-old Massachusetts man with a severe spinal cord injury,has been paralyzed from the neck down since 2001.After taking part in a clinical trial of this system,he has opened e-mail,switched TV channels,turned on lights
This presentation shows the detail knowledge about EEG. It contains slides with animation. You can build your own concept to explain the slide.
Best view in 16:9 ratio.
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This paper is explaining that how only leadership is responsible for sustainable improvement and
growth and only it can lead the organization towards improvement and overall development. Leadership and its
effectiveness are discussed in this research work and also how leadership is a different way of the success of the
organization and different from the traditional management to create true work-culture and good-will of the
organization in the social scene. Leadership is only responsible in bringing positive and negative change in the
organization; if the leadership doesn’t have the concern in the organization, the organization will not be able to
lead in the right direction towards improvement and development.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
n today’s society, we stand before a change in energy scarcity. As our civilization grows, many
countries in thedeveloping world seek to have the standard of living that has been exclusive to a few nations, so
their arises a need in thedevelopment of technology that is compatible enough with the resources provided by
nature in order to have sustainabledevelopment to all class of the society. In order to overcomethe prevailing
challenges of huge energy crises in near future, there is an urgent need for the development of electrical
vehiclesor hybrid electrical vehicles with low CO2 emissions using renewable energy sources. In view of the
above, electrochemicalcapacitors can fulfil the requirements to some extent.Preparation of nano composite
polymer gel electrolyte is the best optional product to overcome these problems. When fillers are added or
dispersed to the polymer gel electrolyte, amorphous or porous nature of electrolyte increases which enhances
the liquid absorbing quality of polymer and helps in removing the drawbacks of polymer gel electrolytes such as
leakage, poor mechanical and thermal stability etc. In this work dispersion of SiO2 nano filler is done in the
[PVdF (HFP)-PC-Mg (ClO4)2] for the synthesis of nano composite PGE [PVdF (HFP)-PC-MgClO4- SiO2].
Optimization and characterization was carried out by using various techniques.
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
1. 1
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
Password System That are Mind Control
Divyakant Shewale1,
Neha Lodhe2
1
(Department of MCA, VIVA SCHOOL OF MCA/University of Mumbai, India)
2
(Department of MCA, VIVA SCHOOL OF MCA/University of Mumbai, India)
Abstract-- One-day system authentication could be widely achieved through brainwaves. One doesn’t need toremember that 8
or more character long strange password. Simply thinking of certain things, such as a personface, or a rotating displayed cube,
or line of song would be enough to unlock a device. Electro-encephalography(EEC) sensors are behind the technique. That is
where electrical activity in certain parts of the brain is recorded.These sensors are used to generate the graphical lines on charts
created from wired electrodes placed on the scalp,as seen in hospitals and TV shows. They are used in hospital to diagnose
epilepsy, among other things. In this case,though, one wouldn’t need to be fitted with wired electrodes —or even a headset,
which is used already in somecurrent non-muscular EEC computer controls. An ear bud will collect the signals (mental gesture)
and performsecure authentication. This research could provide hands-free and wireless interaction, authentication, and user
experience, all in the form-factor of a typical ear bud.
Keywords: Ear bud, Electro-encephalography (EEC), hands-free and wireless interaction, mental gesture, secureauthentication.
I. INTRODUCTION
Our brain is composed of neurons. The number of neurons is approximately billion in number[1]. These number of
neurons are interconnected each other via trillions of synapses. Neurons communicate using electrical signals called
neurotransmitters that either stimulate or inhibit the activity of a responding neuron[2]. These electrical signals are possible to
record using a monitoring method which is known as Electroencephalography (EEG). Today, with the help of neurosciences
and computer technology, it has become possible to create a communication between a human brain and a computer. This
process is known as Brain Computer Interface(BCI). By using BCI (Brain Computer Interface), we developed a system, which
can help to control password security. this paper represents mind controlled password system, which is based on Brain-computer,
interfaces (BCI). BCIs are systems that provide direct communication and control between the human brain and physical
devices.System worked by translating different patterns of brain activity into commands in real time. The brain wave sensor will
sense brain signals and it will convert data into packets and transmit through Bluetooth. Then the control command will have
transmitted to the relay circuit.
II. FROM PASSWORDS TO PASSTHOUGHTS
A password or a fingerprint or an iris scan—these are the ways to verify that we are who we say we are, allowing us to
log in to our devices or enter a high security area. But if we want to move beyond touch screens and keyboards, our methods of
authentication will have to change too. That has pushed an idea to find new ways to verify our identities, and to do it directly
from the source: the brain.
When we perform mental tasks like picturing a shape or singing a song in our heads, our brains generate the unique neuronal
electrical signals. A billion people could mentally hum the same song and no two brain-wave patterns generated by that task
would be alike.
An electroencephalograph (EEG) will read those brain waves using non-invasive electrodes that record the signals. This
unique patterns can be used like a password or biometric identification. Base on theidea some have developed devices that they
say are 100 percent accurate. But those efforts have involved placing electrodes on the forehead or conspicuously across the
scalp.
2. 2
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
Some have also developed in-ear EEG sensors that read brain waves for the purposes of controlling a computer or monitoring
sleep. But til recently, those groups hadn’t tried to optimize in-ear EEGs for use as passthought readers.John Chuang and his
colleagues at the University of California at Berkeley develop a passthought reader integrated into an everyday set of earbuds.
His group built the device using a consumer-grade single-electrode EEG headset called the NeuroSkyMindwave, which sells for
about US $100 online. The electrodes are intended to be placed on the forehead. his group simply took it out of its casing and
fitted it for the ear. They then ran a small study to see how reliably it will read brain waves.
The rudimentary device was surprisingly accurate. Twelve volunteers performed two sets of five mental tasks; the
earpiece correctly confirmed their identities 72 to 80 percent time. These results suggest that a single electrode integrated into set
of earbuds could be used as method of authentication. No hands required. His team had previously done authentication testing
with the NeuroSky electrode placed where its designers intended—on the forehead—and found that it was accurate more than 99
percent of the time. So they knew it worked. Getting it to work in the ear may be a matter of finding optimal location or fitting it
appropriately in ear.That’s the next logical step to making a practical, real-world device. Clearly a lot more work needs to be
done for this to be effective and useful in the real world.
Another challenge is making a device that is accurate even when the wearer’s physiological and mental states
change. You could hum same tune you’ve hummed a thousand times, but stress, mood, alcohol, caffeine, medicine,
and mental fatigue could change electrical signals that are generated.Chuang and his 16-year-old son, Gabriel Chuang, found that
to be true in a study of exercise and passthoughts. As a science project for school, the father-son pair tested passthoughts system
on 10 volunteers by giving them each a mental task before and after exercise. They found that it took up to 60 seconds for brain
signals to return to normal after just 1 minute of jumping jacks.
The signals right after exercise are completely different from baseline[4].
III. METHODOLOGY
To analyze EEG signals, we use a device named as Neurosky Mind Wave mobile. It has two dry sensors which helpsin
detecting and filtering the EEG signals. one sensor is placed on forehead which is FP1. This sensor picks up ambient noise which
is generated by human muscle. The second sensor, ear clip which is used ground and reference. This sensor allows the thinker
chip to filter the electrical noise. This is recorded electrical activities of brain and transmitted through Bluetooth. The device
measures the raw signal, power spectrum (alpha, beta, gamma, theta), on head detection, attention level, mediation level and
blink detection[3]. Neurosky Mind Wave mobile has pre-built algorithms which are attention, meditation, Blink Detection etc. In
this paper, we used attention level and on head detection. This attention level indicates the intensity of mental “focus” or
“attention.” Its value ranges from 0 to 100. The attention level increases when user focus on a single thought or an external object
and decreases when distracted. FP1 position of scalp A brain computer interface (BCI) is a direct communication pathway
between the brain and an external device. It is also called mind-machine interface (MMI), direct neural interface (DNI), or
brainmachine interface(BMI). It is a communication system for controlling a device, e.g. computer, wheelchair or neuro-
prosthesis, by human intensions, which does not depend on brain’s normal output pathways of peripheral nerves and muscles but
relies on detectable signals representing responsive or intentional brain activities[5].
3. 3
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
IV. WORKING PROCEDURE
V. Transmission section
Neurosky mind wave simultaneously sends data to the microcontroller. Microcontroller analyzes the raw data to
determine user attention level and On-head detection. From the level of user attention, microcontroller gives a signal to relay
circuit. After receiving signal from the microcontroller, the relay circuit controls its connected equipment.
b.Neurosky Mind Wave Headset
TheNeurosky Mind Wave is a device, which is used for monitoring electrical signals generated by neural activity in the
brain[6]. For measuring the EEG signal of brain, this device is worn on head and consists of headband, an earclip, and a sensor
arm containing EEG electrode which rests on forehead above the eye. Neurosky Mind Wave has a Bluetooth communication
system. So, it can send its raw data to another Bluetooth controlled device. The measurement of the Mind Wave is raw signal,
EEG power spectrum, meters for Attention and Meditation, Blink Detection & On-head detection. Here EEG power spectrum
4. 4
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
which provides information on a user’s brainwave like Delta, Theta, Alpha, Beta and Gamma and meters for Attention and
Meditation which determines how effectively the user is engaging Attention or Meditation. We get this value by decoding the
electrical signal and applying algorithms to provide readings on a scale of 0 to 100. Table.1 contains the values of those brain
signals[7].
The Attention meter which indicates intensity of a user’s level of mental ‘focus’ or ‘attention’ to determine levels of
concentration and meditation meter which intensity of a user’s level of mental ‘calmness’ or ‘relaxation’. However, Distractions,
wandering thoughts, lack of focus, or anxiety may lower the Attention meter level and anxiety, agitation, and sensory stimuli may
lower the Meditation meter levels. In this project, we use attention meter and On-head detection[8].
VI. CONCLUSION
This paper presents the design and implementation of noninvasive type of Brain-Computer Interface Brain-
Computer Interface technique to control the home appliances using EEG based brain signals. This design is cost
effective and easy to build. This paper works on the brain signal for controlling the physical devices and the
Protective password system. Therefore, the paralyzed and the physically disabled people can independently do
their work like switching on and off the lights and fans by their own and the security system can be enriched using
this design. In most of the existing systems had to use a computer but in this model use a microcontroller design is
easily upgradable to multiple loads with same number of processing units. In future, it can be used in Automobile
applications, Industrial application, Monitoring device applications and Remote control applications.
Start
Bluetooth Receiving
Collecting
Row Data
Analyse raw data
Give signal to
relay circuit
Controlling password
5. 5
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
VII. ACKNOWLEDGEMENTS
I am thankful to my college for giving us opportunity to make this project a success. I give my special thanks and
sincere gratitude towards Prof. Neha Lodhefor encouraging me to complete this research paper, guiding me and helping me
through all the obstacles in the research.
Without her assistance, my research paper would have been impossible. Also I present my obligation towards all our
past years teachers who have bestowed deep understanding and knowledge in us, over the past years. We are obliged to our
parents and family members who always supported me greatly and encouraged me in each and every step.
VIII. REFERENCES
[1] https://en.wikipedia.org/wiki/Human_brain
[2] https://science.education.nih.gov/supplements/nih2/addiction/guid e/lesson2-1.html
[3] R. Robbins and M. Stonehill, “Investigating the NeuroSkyMindWave™ EEG Headset”
[4] https://spectrum.ieee.org/the-human-os/biomedical/devices/logging-into-your-devices-with-your-mind
[5] Wolpow JR, Birbaumer N, McFarland DJ, et al. Brain-computer interface for communication and control, Clinical Neurophysiology, 2002, 113:767-791
[6] R. Robbins and M. Stonehill, “Investigating the NeuroSkyMindWave™ EEG Headset”
[7] https://www.networkworld.com/article/3094825/using-brain-signals-instead-of-passwords-to-unlock-computers.html
[8] https://www.researchgate.net/profile/Wenyao_Xu2/publication/326238517_Brain_Password_A_Secure_and_Truly_Cancelable_Brain_Biometrics_for_Sma
rt_Headwear/links/5c75fd5d92851c695043bcce/Brain-Password-A-Secure-and-Truly-Cancelable-Brain-Biometrics-for-Smart-Headwear.pdf
[9] https://blogs.scientificamerican.com/observations/mind-reading-and-mind-control-technologies-are-coming/
[10] http://neurosky.com/biosensors/eeg-sensor/ultimate-guide-to-eeg/
[11] http://thorpe.hrl.uoit.ca/publication/thorpePDFS/Passthoughts_NSPW05.pdf