4G Technology -Seminar Report
Currently 2G Technology (GSM), or second generation technology, is widely used worldwide for cell phone networks. The problem with 2G technology is that the data rates are limited. This makes it inefficient for data transfer applications such as video conferencing, music or video downloads. To increase the speed, various new technologies have been in development. One of these, 4G technology, is mainly made up of high-speed wireless networks designed to carry data, rather than voice or a mixture of the two. 4G transfers data to and from mobile devices at broadband speeds – up to100 Mbps moving and 1Gbps while the phone is stationary. In addition to
high speeds, the technology is more robust against interference and tapping guaranteeing higher security. This innovative technology functions with the aid of VoIP, IPv6, and Orthogonal frequency division multiplexing (OFDM). To cater the growing needs of 4G, mobile data communication providerswill deploy multiple antennas at transmitters to increase the data rate. Unlike the 3G networks, which are a mix of circuit switched and packet switched networks, 4G will be based on packet switching only (TCP/IP). This will
allow low-latency data transmission. Furthermore, the use of IP to transfer information will require IPv6 to facilitate the use of more cell phone devices.
DOWNLOAD: CLICK HERE
Fourier transform for approximating the discrete Fourier transform, which is one of the most fundamental operations in digital signal processing, is introduced.
Unlike fixed- point fast Fourier transform, the new transform has the properties that it is an integer-to-integer mapping, is power adaptable and is reversible. In this paper, a concept of integer fast Fourier transform for approximating the discrete Fourier transform is introduced .
The transform can be implemented by using only bit shifts and additions and no multiplication. A method for minimizing the no of additions required is presented. While preserving the reversibility, the integer FFT is shown experimentally to yield same accuracy as the fixed-point FFT when their coefficients are quantised to a certain number of bits. Complexity of the integer FFT is shown to be much lower than that of fixed point FFT in terms of the no of additions and shifts. Finally, the are applied to noise reduction applications, where the integer FFT provides significantly improvement over the fixed-point FFT at low power and maintains similar results at high power
Download Now : Click Here
Unlike fixed- point fast Fourier transform, the new transform has the properties that it is an integer-to-integer mapping, is power adaptable and is reversible. In this paper, a concept of integer fast Fourier transform for approximating the discrete Fourier transform is introduced .
The transform can be implemented by using only bit shifts and additions and no multiplication. A method for minimizing the no of additions required is presented. While preserving the reversibility, the integer FFT is shown experimentally to yield same accuracy as the fixed-point FFT when their coefficients are quantised to a certain number of bits. Complexity of the integer FFT is shown to be much lower than that of fixed point FFT in terms of the no of additions and shifts. Finally, the are applied to noise reduction applications, where the integer FFT provides significantly improvement over the fixed-point FFT at low power and maintains similar results at high power
Download Now : Click Here
Introduction
Within the MEG, a set of input coils and a set of output coils extend around portions of the transformer-type magnetic core. A pair of input and output coils are on the right and left of the transformer frame. A permanent magnet is positioned in middle of the magnetic core. A permanent magnet furnishes magnetic flux lines moving from the north pole outward into the core material, resulting in a right and a left magnetic path. These paths extend externally between the north and south magnetic poles. A driving electrical current through each of the input coils reduces a level of magnetic flux from the permanent magnet within the magnet path around which the input coil extends. A moving magnetic field induces a charge in a coil. When a magnet is placed in between two metal plates, the flux is placed evenly. The permanent magnet is used as a flux battery, making this machine's operation possible. When a current flows through one of the input coils, all the magnetic flux goes to one metal plate, making the total magnetic flux change .5 . Stopping the current through that input coil and the field goes back to normal, and thus the magnetic flux change is .5 which pulses another current through the opposite input coil. The magnetic flux change is .5. Continued operation results in power used that is only half of the power created.
The MEG's magnetic core is composed of a magnetic alloy (of crystalline grains (or crystallite) of a few nanometers). These are used because of the material's rapid switching of magnetic flux characteristics. Each crystallite is a single-domain particle in magnetic terms. One of the magnetic materials preferred is the alloy of cobalt-niobium-boron; this alloy has a near-zero magnetostriction and relatively strong magnetization. This alloy also has a relatively high mechanical strength and corrosion resistance. Other magnetic materials acceptable to be used can be iron-rich amorphous and nanocrystalline alloys. These materials exhibit a greater magnetization than the cobalt based alloys. An example of this alloy material would be iron-boron-silicon-niobium-copper. Though the permeability of this alloy is limited by its relatively large levels of magnetostriction, the formation of a nanocrystalline material dramatically reduces this level of magnetostriction and favors easy magnetization Initially, a sensing and switching circuit connects the switching and control circuit to an external power source. External power sources can include, but are not limited to, a battery. The "switching and control circuit" is connected to an oscillator driver that is the clock input of a flip-flop circuit. The alternate outputs (Q and Q') of the flip-flop are connected through independent driver circuits; such circuits can include a darlington pair or a one-shot circuit. The FETs alternately drive the input 'choking' coils. After being started, a "sensing and switching circuit" detects if there is a predetermined level of voltage available from a regulator circuit. Once this condition is met, the power input to the switching and control circuit is switched from the external power source to the output of the regulator circuit. After this switching event, the electromagnetic generator operates without an application of external power.It is notable that, according to the patent, during operation of the MEG the input coils are never driven to the point that the core material becomes saturated. If the core material is saturated, subsequent increases in input current that do occur have no corresponding effect in the magnetic flux and input power is wasted. In the MEG, the switching of current flow within the input coils does not need to be sufficient to stop the flow of flux in one of the magnetic paths while promoting the flow of magnetic flux in the other magnetic path. The electromagnetic generator works by changing the flux pattern; it does not need to be completely switched from one side to another.
Download Now :Click Here
Dynamically Reconfigurable Computing | Download Seminars PPT Report
Dynamically Reconfigurable Computing is the computing that uses Dynamically Reconfigurable Logic. The latter is the logic that can be altered at run-time. Since both their names are rather long, we will call them DRC and DRL from now on.Though DRC uses DRL, anything that use DRL is not DRC. To be called a DRC, many more components must be there, the most important among them being proper software that can drive the logic. Without the software, a common man will be left with a non-reconfigurable hardware that is both larger and somewhat slower than its traditional counterpart (if even that – most of the time he will be left with just a piece of non-usable hardware which he regrets).
And obviously, application software must be there. A Dynamically Reconfigurable System without application software is like a PC without a single piece of software in it – both are wasted resources. Thus the hardware part and the software part combine to make a DR Computing system.
Now we will see why take all the trouble to make and combine hardware and software that nobody is actually comfortable with. And then we will see what are the “all the trouble”.
Download Now :Click Here
Blue Eyes | Download Seminars PPT Report
|Imagine yourself in a world where humans interact with computers. You are sitting in front of your personal computer that can listen, talk, or even scream aloud. It has the ability to gather information about you and interact with you through special techniques like facial recognition, speech recognition, etc. It can even understand your emotions at the touch of the mouse. It verifies your identity, feels your presents, and starts interacting with you .You ask the computer to dial to your friend at his office. It realizes the urgency of the situation through the mouse, dials your friend at his office, and establishes a connection.
Human cognition depends primarily on the ability to perceive, interpret, and integrate audio-visuals and sensoring information. Adding extraordinary perceptual abilities to computers would enable computers to work together with human beings as intimate partners. Researchers are attempting to add more capabilities to computers that will allow them to interact like humans, recognize human presents, talk, listen, or even guess their feelings.
The BLUE EYES technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. It uses non-obtrusige sensing method, employing most modern video cameras and microphones to identifies the users actions through the use of imparted sensory abilities . The machine can understand what a user wants, where he is looking at, and even realize his physical or emotional states.
Download Now :Click Here
IP Spoofing
IP Spoofing
The concept of IP spoofing was initially discussed in academic circles
in the 1980's. In the April 1989 article entitled: “Security Problems in
the TCP/IP Protocol Suite”, author S. M Bellovin of AT & T Bell
labs was among the first to identify IP spoofing as a real risk to
computer networks. Bellovin describes how Robert Morris, creator of the
now infamous Internet Worm, figured out how TCP created sequence numbers
and forged a TCP packet sequence. This TCP packet included the
destination address of his “victim” and using an IP spoofing attack
Morris was able to obtain root access to his targeted system without a
User ID or password. Another infamous attack, Kevin Mitnick's Christmas
Day crack of Tsutomu Shimomura's machine, employed the IP spoofing and
TCP sequence prediction techniques. While the popularity of such cracks
has decreased due to the demise of the services they exploited, spoofing
can still be used and needs to be addressed by all security
administrators. A common misconception is that "IP spoofing" can be used
to hide your IP address while surfing the Internet, chatting on-line,
sending e-mail, and so forth. This is generally not true. Forging the
source IP address causes the responses to be misdirected, meaning you
cannot create a normal network connection. However, IP spoofing is an
integral part of many network attacks that do not need to see responses
(blind spoofing).
Criminals
have long employed the tactic of masking their true identity, from
disguises to aliases to caller-id blocking. It should come as no
surprise then, that criminals who conduct their nefarious activities on
networks and computers should employ such techniques. IP spoofing is one
of the most common forms of on-line camouflage. In IP spoofing, an
attacker gains unauthorized access to a computer or a network by making
it appear that a malicious message has come from a trusted machine by
“spoofing” the IP address of that machine. In the subsequent pages of
this report, we will examine the concepts of IP spoofing: why it is
possible, how it works, what it is used for and how to defend against
it.
have long employed the tactic of masking their true identity, from
disguises to aliases to caller-id blocking. It should come as no
surprise then, that criminals who conduct their nefarious activities on
networks and computers should employ such techniques. IP spoofing is one
of the most common forms of on-line camouflage. In IP spoofing, an
attacker gains unauthorized access to a computer or a network by making
it appear that a malicious message has come from a trusted machine by
“spoofing” the IP address of that machine. In the subsequent pages of
this report, we will examine the concepts of IP spoofing: why it is
possible, how it works, what it is used for and how to defend against
it.
Brief History of IP Spoofing
The concept of IP spoofing was initially discussed in academic circles
in the 1980's. In the April 1989 article entitled: “Security Problems in
the TCP/IP Protocol Suite”, author S. M Bellovin of AT & T Bell
labs was among the first to identify IP spoofing as a real risk to
computer networks. Bellovin describes how Robert Morris, creator of the
now infamous Internet Worm, figured out how TCP created sequence numbers
and forged a TCP packet sequence. This TCP packet included the
destination address of his “victim” and using an IP spoofing attack
Morris was able to obtain root access to his targeted system without a
User ID or password. Another infamous attack, Kevin Mitnick's Christmas
Day crack of Tsutomu Shimomura's machine, employed the IP spoofing and
TCP sequence prediction techniques. While the popularity of such cracks
has decreased due to the demise of the services they exploited, spoofing
can still be used and needs to be addressed by all security
administrators. A common misconception is that "IP spoofing" can be used
to hide your IP address while surfing the Internet, chatting on-line,
sending e-mail, and so forth. This is generally not true. Forging the
source IP address causes the responses to be misdirected, meaning you
cannot create a normal network connection. However, IP spoofing is an
integral part of many network attacks that do not need to see responses
(blind spoofing).
GMPLS
The
emergence of optical transport systems has dramatically increased the
raw capacity of optical networks and has enabled new sophisticated
applications. For example, network-based storage, bandwidth leasing,
data mirroring, add/drop multiplexing [ADM], dense wavelength division
multiplexing [DWDM], optical cross-connect [OXC], photonic cross-connect
[PXC], and multiservice switching platforms are some of the devices
that may make up an optical network and are expected to be the main
carriers for the growth in data traffic.
emergence of optical transport systems has dramatically increased the
raw capacity of optical networks and has enabled new sophisticated
applications. For example, network-based storage, bandwidth leasing,
data mirroring, add/drop multiplexing [ADM], dense wavelength division
multiplexing [DWDM], optical cross-connect [OXC], photonic cross-connect
[PXC], and multiservice switching platforms are some of the devices
that may make up an optical network and are expected to be the main
carriers for the growth in data traffic.
Multiple Types of Switching and Forwarding Hierarchies
Generalized
MPLS (GMPLS) differs from traditional MPLS in that it supports multiple
types of switching, i.e. the addition of support for TDM, lambda, and
fiber (port) switching. The support for the additional types of
switching has driven GMPLS to extend certain base functions of
traditional MPLS and, in some cases, to add functionality. These
changes and additions impact basic LSP properties, how labels are
requested and communicated, the unidirectional nature of LSPs, how
errors are propagated, and information provided for synchronizing the
ingress and egress LSRs.
MPLS (GMPLS) differs from traditional MPLS in that it supports multiple
types of switching, i.e. the addition of support for TDM, lambda, and
fiber (port) switching. The support for the additional types of
switching has driven GMPLS to extend certain base functions of
traditional MPLS and, in some cases, to add functionality. These
changes and additions impact basic LSP properties, how labels are
requested and communicated, the unidirectional nature of LSPs, how
errors are propagated, and information provided for synchronizing the
ingress and egress LSRs.
1. Packet Switch Capable (PSC) interfaces:
Interfaces
that recognize packet boundaries and can forward data based on the
content of the packet header. Examples include interfaces on routers
that forward data based on the content of the IP header and interfaces
on routers that forward data based on the content of the MPLS "shim"
header.
that recognize packet boundaries and can forward data based on the
content of the packet header. Examples include interfaces on routers
that forward data based on the content of the IP header and interfaces
on routers that forward data based on the content of the MPLS "shim"
header.
2 . Time-Division Multiplex Capable (TDM) interfaces:
Interfaces
that forward data based on the data's time slot in a repeating cycle.
An example of such an interface is that of a SDH/SONET Cross-Connect
(XC), Terminal Multiplexer (TM), or Add-Drop Multiplexer (ADM).
that forward data based on the data's time slot in a repeating cycle.
An example of such an interface is that of a SDH/SONET Cross-Connect
(XC), Terminal Multiplexer (TM), or Add-Drop Multiplexer (ADM).
Download: CLICK HERE
IVRS- INTERACTIVE VOICE RESPONSE SYSTEM
IVRS
is an important development in the field of interactive communication
which makes use of the most modern technology available today. IVRS is a
unique blend of both the communication field and the software field,
incorporating the best features of both these streams of technology.
IVRS is an electronic device through which information is available
related to any topic about a particular organization with the help of
telephone lines anywhere in the world.
IVRS provides a friendly and faster self service alternative to is an important development in the field of interactive communication
which makes use of the most modern technology available today. IVRS is a
unique blend of both the communication field and the software field,
incorporating the best features of both these streams of technology.
IVRS is an electronic device through which information is available
related to any topic about a particular organization with the help of
telephone lines anywhere in the world.
speaking with customer service agents. It finds a large scale use in
enquiry systems of railways, banks, universities, tourism, industry etc.
It is the easiest and most flexible mode of interactive communication
because pressing a few numbers on the telephone set provides the user
with a wide range of information on the topic desired. IVRS reduces the
cost of servicing customers.
enquiry systems of railways, banks, universities, tourism, industry etc.
It is the easiest and most flexible mode of interactive communication
because pressing a few numbers on the telephone set provides the user
with a wide range of information on the topic desired. IVRS reduces the
cost of servicing customers.
IVRS Block Diagram
IVRS- INTERACTIVE VOICE RESPONSE SYSTEM
The IVRS on the whole consists of the user telephone, the telephone
connection between the user and the IVRS and the personal computer which
stores the data base. The interactive voice response system consists of
the following parts.
connection between the user and the IVRS and the personal computer which
stores the data base. The interactive voice response system consists of
the following parts.
Download: CLICK HERE