Sunday, April 25, 2010

TIDAL POWER THE FUTURE WAVE OF POWER GENERATION

ABSTRACT

Renewable energy can be used to decrease global dependence on natural resources, and tidal power can be the primary form of renewable power utilized. Built upon steam turbine knowledge, tidal turbines draw on innovative technology and design to operate on both the inflow and outflow of water through them. Two case studies, Annapolis Royal and La Rance, prove that tidal power plants are capable of producing reliable and efficient power. Problems, such as initial cost and power transportation hinder future implementation of tidal power plants. This paper emphasizes the possibilities of utilizing the power of the oceans by pollution free, tidal Power generation. Tidal power utilizes twice the daily variation in sea level caused primarily by the gravitational effect of the Moon and, to a lesser extent by the Sun on the world's oceans. The Earth's rotation is also a factor in the production of tides.


TELE-IMMERSION

ABSTRACT:

Tele-immersion is an advanced form of virtual reality that will allow users in different places to interact in real time in a shared simulated environment. This technology causes users to feel as if they were in the same room. The tele-immersion technology uses a "tele-cubicle" which is equipped with large screens, scanners, sensors, and cameras. The tele-cubicles are linked together in real-time so that they form one larger cubicle. Through the virtual environment, participants are able to interact with other group members. Also, virtual objects and data can be passed through the walls between participants, and placed on the shared table in the middle for viewing. Tele-immersion has the potential to significantly

impact educational, scientific, manufacturing, and many other fields.
• Interactive Scientific Visualization
• Molecular Engineering
• Virtual nuclear test.
• Education and Training
• Virtual classroom.
• Army training.
• Art and Entertainment.
• Virtual game
• Industrial Design,
• Architectural Review and Evaluation
• Remote design collaboration
All of these researchers use Internet 2.Internet 2 is the successor to the "commodity Internet", as the existing Internet is now known. Internet 2 is a collaborative project, overseen by the University Corporation for Advanced Internet Development, and worked on by 130 US universities and a number of government agencies and corporate sponsors.


Super worms and Crypto virology: a Deadly Combination

Abstract

Understanding the possible extent of the future attacks is the key to successfully protecting against them. Designers of protection mechanisms need to keep in mind the potential ferocity and sophistication of viruses that are just around the corner. That is why we think that the potential destructive capabilities of fast spreading worms like the Warhol worm, Flash worm and Curious Yellow need to be explored to the maximum extent possible. While re-visiting some techniques of viruses from the past, we can come across some that utilize cryptographic tools in their malicious activity. That alarming property, combined with the speed of the so-called “super worms”, is explored in the present work. Suggestions for countermeasures and future work are given.


STEGANOGRAPHY

ABSTRACT

Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.

This paper introduces steganography by explaining what it is, providing a brief history with illustrations of some methods for implementing steganography. Though the forms are many, the focus of the software evaluation in this paper is on the use of images in steganography. We have even discussed various secret communication methods used, its comparison with Cryptography and Digital Watermarking. Finally, future projections on this perfect file encryption technique are made, along with few explanations using our own software and programs.


SPYWARE

ABSTRACT

Millions of computer users are being watched, not just by employers and Organizations, but by the software that they use frequently without their knowledge. This spyware has become the center for collecting of the private data and threatens the corporate secured data. Even it can change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs.

In an attempt to increase the understanding of spyware,we have to understand the “What exactly is spyware? How does it work? What is its impact on users and the businesses that employ them?How to prevent them?are discussed.


Speech Recognition

Abstract:

Language is man's most important means of communication and speech its primary medium. Speech provides an international forum for communication among researchers in the disciplines that contribute to our understanding of the production, perception, processing, learning and use. Spoken interaction both between human interlocutors and between humans and machines is inescapably embedded in the laws and conditions of Communication, which comprise the encoding and decoding of meaning as well as the mere transmission of messages over an acoustical channel. Here we deal with this interaction between the man and machine through synthesis and recognition applications.
The paper dwells on the speech technology and conversion of speech into analog and digital waveforms which is understood by the machines

Speech recognition, or speech-to-text, involves capturing and digitizing the sound waves, converting them to basic language units or phonemes, constructing words from phonemes, and contextually analyzing the words to ensure correct spelling for words that sound alike. Speech Recognition is the ability of a computer to recognize general, naturally flowing utterances from a wide variety of users. It recognizes the caller's answers to move along the flow of the call.

We have emphasized on the modeling of speech units and grammar on the basis of Hidden Markov Model. Speech Recognition allows you to provide input to an application with your voice. The applications and limitations on this subject has enlightened us upon the impact of speech processing in our modern technical field.

While there is still much room for improvement, current speech recognition systems have remarkable performance. We are only humans, but as we develop this technology and build remarkable changes we attain certain achievements. Rather than asking what is still deficient, we ask instead what should be done to make it efficient….


x

SOS TRANSMISSION
Through Cellular phones to save Accident Victims
-Boon for the cellular phone users
(MOBILE COMMUNICATION)
Abstract:
This paper describes an ORIGINAL IDEA to help cellular phone users caught in an accident. The idea has been developed keeping in mind the considerations of cost and compatibility with existing system. The Short Message Service or SMS as it is popularly referred to, is made use of for this purpose.

The solution offered is the Force-Transducer method. The victim is assumed to be unconscious and the accident is detected automatically. Detailed simulation results at a scaled down level are provided for this solution. The threshold level is set based on data collected from the experiments.

One major problem in such design is the technique to find the victim’s position. The Global Positioning System (GPS) is found to be costly. So, an unorthodox design using Radio Direction Finders (RDF) and beacon signals is described. The Goniometer or Crossed Loop Antenna is used for this purpose. This reduces cost effectively when compared with the GPS system.

The paper proceeds to suggest an abstract view of the software robot required to perform the Save Our Souls (SOS) message routing task. It uses a special hierarchical message dispatch system wherein people nearby and more likely to help are contacted. The robot also acts as a proxy to the victim and monitors responses for him.

This paper as a whole gives a cost-effective, high performance system which can be introduced in the market if any of the cellular companies are willing to encourage it.