Biometrics PPT Presentation Download

Introduction to Biometrics PPT Presentation:

Today security has become an important concern for the organization. Organizations need this security so keep track of their daily operation and their information..To implement this security many options are available in market one of which is biometrics this document includes detailed study about biometrics.

Let is learn the meaning of biometrics. Bio means related to biology. Metrics indicated – The science of measurements. Fundamental operations in biometrics are as follows.

a.)    Capture

b.)    Extraction

c.)     Comparison

d.)    Match/Non Match

History of Biometrics

Biometrics was been founded by Francis Galton in 1892. In 1968 biometrics was. After 1960 it actually came to be used as it had many advancements and simplicity is became popular.   

Phases of Biometrics

a.)    Input

b.)    Process

c.)     Output

Now let us take a look at types of biometrics identifications.

a.)    Voice Print

Voice print identification first record the voice print of the person whose voice is to be identified. The sample voice print is checked for many factors so that it matches with that sample voice print with machine. The factor that mainly counts on voice print is vocal activities and the characteristics of the vocal cord.

b.)    Finger Print

Finger print takes the print or image of the structure of fingers and then scans them.

c.)     Iris Print

In this type of identification iris which is located behind the cornea. Iris identification has almost 266 patterns of iris.

d.)    Face Print

This type of identification uses various kinds of features of the face to recognize the users face.      

e.)    Hand Geometry

Hand geometry uses the shape of the user’s hand. Hand scanners are used to recognize the user’s hand.

f.)     Retina Scan

Retina Scan the blood vessels which are located in our eyes

g.)    Keystroke Dynamics

In this type of identification the user is made to type on keyboard and the time difference between their typing keystroke is counted and them the user is identified.

h.)    Facial Recognition

Facial Recognition is one of the recent developments and this includes Facial Metrics and Eigen Faces.

i.)      Signature Recognition

In this type of recognition the user is identified from the way he signs and the strokes the pressure throughout the signature is being noted.

Biometrics is being widely used for security purpose and there are many new advancements coming up in market for biometrics.

Search Engines PPT Presentation

Introduction to Search Engines PPT Presentation:

The document is being named shastra and it contains in detail study about search engines. In our day to day life we use search engines for retrieving the information on various topics. A search engine provides us in detail information on any topic we need it for and it also allows us to edit that information. Types of search engines are.

a.)    Google

Google is a pragmatic type of search engine. Google provides Wikipedia. It allow you to look for the information and provides you with n number of options to search on particular topic and get information from various websites.

b.)    Yahoo

Yahoo is a index search engine. Yahoo is integrated with Microsoft.

c.)     Msn

MSN is owned by Microsoft and provides

d.)    Hog Search

Hog id new fun search engine.

According a survey conducted it has been observed that most of the people prefer to use Google as search engine due to its ease of use. Let us now learn something more about search engines. There are two types of logic for search engines.

a.)    Boolean Logic

b.)    Pseudo – Boolean Logic

Let us now have a look at how search engines work. Working of search engine evolve three steps.

a.)    Proprietary Algorithm

b.)    Sending Out a Spider

c.)     Creating Indexes

Now let us learn something more about the Advantages and Disadvantage of search engines.

a.)    Today the search engines are standardized and provide wide information to users.

b.)    Search engines are computer robot programs.          

c.)     There is large number of options available for search engines and many search engines are available.

Different types of search engines available on World Wide Web are

a.)    Google

b.)    Netscape

c.)     MSN

d.)    Altavista

e.)    AOL

f.)     Overture

g.)    Excite

h.)    Ask jeeves

i.)      Yahoo

Search engines prove very important to search information on web and increase our knowledge through referring various articles and web sites.

 Download  Search Engines PPT Presentation.

Future Internet Architecture Seminar PPT Presentation

Introduction to Future Internet Architecture PPT Presentation:

This presentation contains in details discussion on Future Internet Architecture Seminar. We use end to end communication network. Using end to end communication provides a very simple way to transfer the data packets in the network. But this cannot help to overcome or full the upcoming needs and drawbacks. The emerging requirements by the market are the transfer in the end to end communication is not reliable; more applications are in demand by the market and people, differentiation in ISP services, and lower number sophisticated users.

Let us take a look at the new emerging requirements from the users. New requirements listed in today’s communication for control and protection are users use the communication network but they don’t trust it for the data transfer, end user do not trust. There is a issue between end v/s third party rights.

There is also threat caused in multi way communication. There is need of set off principle to interpolate with each other some principles which are built on end to end models. Need of some principles based on new model of centered network function. To make the usability and ease of the network we need some new set of principles, but while designing these principles we need to consider some important factors which are that the set principles should be so designed that it can be correctly implemented at end to end points. When an end to end argument isn’t at right at the first a place, this means that the implementing inside the network to accomplish the requirement.

Different forms of end to end arguments are as follows.

a.)    Modify the node

b.)    Adding functions to the core

c.)     Design issue (Adding mechanism to the core)

d.)    Labels on Information

e.)    Design Of Application (The end to end arguments at a higher level)

f.)     More complex application parties.

This concludes that the enormous use of internet has lead to many issues like trust of user in data transfer. Users ask for more complex application for users.  

 Download  Future Internet Architecture Seminar PPT Presentation.

ARM Architecture PPT Presentation

Introduction to ARM Architecture PPT Presentation:

ARM is the architecture for the digital world. The document helps us to understand in detail about ARM. The topics we will go through are.

a.)    Introduction to ARM

b.)    Programmers Model

c.)     Instruction Set

d.)    System Design

e.)    Development Tools

We will study in details about ARM.

A.)   INTRODUCTION TO ARM

ARM was established in the year 1990 in the month of November. ARM design the cores of RISC processors of ARM. Fabrication of silicon is not done by ARM itself. The partners of ARM get the design of core ARM semiconductors from licensed. It also assists in the development of software tools, boards, debug hardware, application software, bus architectures, and peripherals.  

B.)    PROGRAMMERS MODEL

ARM uses 32 bit architecture. In relation ARM it uses 8 bit byte, 16 bits half word, 32 bit word. The instruction set implemented by ARM are 32-bit ARM architecture. Java byte code can be executed by Jazelle core. There are seven basic operating modes being used by ARM and they are user, FIQ, IRQ, supervisor, abort, undef, and system. ARM has 37 registers which are 32 bit long.

C.)    INSTRUCTION SET

Lets us learn the instruction set being used for ARM. Instruction can be executed with by post fixing this instruction with appropriate condition code field. Flags can be set optionally by using “S” and this flags are not being affected by the condition code. The condition code for ARM are equal (EQ), unsigned higher or same (CC/BS), unsigned lower (CC/LO), and many more.

D.)   SYSTEM DESIGN

The system design of ARM consists of external ROM, external RAM, external bus interface, decoder, on-chip RAM, timer, interrupt controller. AMBA (Advanced Microcontroller Architecture), ACT (AMBA Compliance Testbench), ADK (Complete AMBA Design Kit), and Prime Cell (ARM’s AMBA compliant peripheral).

E.)    DEVELOPMENT TOOLS

Compilation – tool used for ARM are ARM development Suite, Linker and Utilities.

Debug Tools – Real View Debugger, Real View ICE, Real View Trace.

Platforms – ARMulator, and RealView ARMulator ISS (RVISS).

 Download  ARM Architecture PPT Presentation.

SPINS Security Protocol for Sensor Networks PPT Presentation

Introduction to Security Protocol for Sensor Networks PPT Presentation:

The aim of this document is to study in detail the security protocol for sensor networks. We will go through the following topics while studying security protocol for sensor networks security for sensor networks, proposed techniques, application, related work, discussion. Today sensor network are being widely used in many applications such as real-time traffic monitoring, military applications, emergency and critical system.

Let us have a look at how security for sensor network is maintained.

a.)    Data Authentication

b.)    Data Confidentiality

c.)     Data Integrity

d.)    Data Freshness

There are some challenges faced in security protocol for sensor networks. The is faced in resource constraints. Resources are been limited in terms of energy, computation, memory, code size, communication, energy consuming communication. Now let us understand how SPINS contributes in building protocols.

a.)    SNEP

SNEP is sensor network protocol and it provides sensor network encryption protocol and secure point to point communication. SNEP has some important factors data confidentiality, data authentication, replay protection, weak protection, weak freshness, low communication overhead.

b.)    µTESLA

µTESLA is micro timed efficient stream loss-tolerant Authentication. It provides broadcast authentication. Problems with µTESLA is digital signatures for initial packet authentication, limited overhead 24bytes per packet, passing one way key chain is too big the key is passed from base station to all the nodes through network. 

                Let is now study the factors essential for system.

a.)    Communication Pattern

Communication in the sensor networks takes place from node to base station, from base station to node, base station to all nodes.

b.)    Base Station

A base station is a component or factor which has sufficient memory and power, and shares secret key with each node while communication.

c.)     Node

Node in a network is a component which has limited resource and limited trust.

Drawbacks in the above stated is in µTESLA there is need of initial key for each node which will probably lead to intensive communication. Spins uses source routing so it is not vulnerable for analyzing traffic.

Concluding this document we there is need od strong security protocol with low security over head and need of base protocol for more sophisticated security services.

 Download  Security Protocol for Sensor Networks PPT Presentation.

Distributed System PPT Presentation

Introduction to Distributed System PPT Presentation:

Few years ago databases was located centrally. Which would eventually causes loss of data and concurrency. This needs a solution so that loss of data can be avoided.  Distributed system provided a solution and implementing distributed database requires network connection spread over a long distance. Network hub provides feasibility to keep the data over number of machines. Let us study in detail about distributed database.

Why do we need network for distributed database?

We need network in distributed databases so that it provides us more flexibility in sharing data and increasing its interactivity. It allows accessing the data from remote machines and with ease and flexibility.

Problem Is Designing Distributed Software.

Designing distributed database involves some difficulties which are as follows which operating system to choose so that it can handle distribution. What kind of network to select so that it can avoid loss of data and provides continues network connectivity.

Building And Classifying Distributed System

Classifying and building distributed system contains following topics.

a.)    Flynn’s Taxonomy (1972)

b.)    Sub-Classifying MIMD

c.)     Bus-Based Multiprocessor

d.)    Working with a cache

e.)    Write-through cache

f.)     Snoopy cache

g.)    Switched Multiprocessor

h.)    Cross-Bars Alternative

i.)      NUMA

j.)      Bus-Based Multi-Computers

k.)      Switched Computers

l.)      Software

m.)  Coupling

n.)    Design Issues – Transparency. 

Let us have look at Service Models.

a.)    Centralized Models

b.)    Client Server Model

c.)     Peer to Peer Model

d.)    Processor Pool Model

e.)    Grid Computing

Multi-Tier Client Server Architectures

Let us learn something about multi-tier client server architecture and its types in detail. Multi-tier client architecture contains connectivity between client and server ant various levels.

a.)    Two-tier Architecture.

Two-tier architecture is commonly used since mid of early 1980’s and 1990’s. Two- tier architecture mainly contains only operations between User Interface and Server.

b.)    Three-tier Architecture

Three-tier architecture contains the linking between client, middle ware which performs some necessary operation on data before it is being sent to server and vice versa, and the third component is server.

c.)     Beyond Three Tier Architecture

Almost all architectures are multi tiered architecture and contain many components in between firewall, java based application and many more.

 Download  Distributed System PPT Presentation.

Artificial Intelligence and Neural Networks PPT

Introduction to Artificial Intelligence and Neural Networks PPT Presentation:

This document contains details about Artificial Intelligence and Neural Networks. Artificial intelligence is about acting humanly, thinking humanly, thinking rationally, and acting rational. Artificial intelligence is basically about designing machines which would act and think like human being. Artificial intelligence is basically classified in to four main categories reasoning, behavior, human, and rationality. Let us now consider the categories of artificial intelligence.

a.)    Acting Humanly

In this category of artificial intelligence it is actually being thought how human minds actually act and in the same way the machine code or algorithm is being designed to make machines act like human minds.               

b.)    Thinking Humanly

In this category of artificial intelligence it is actually being thought how human minds actually act and in same way the machine is being coded or algorithm is being designed to make machines think like human minds.

c.)     Acting Rationally

Acting rationally is working towards preparing a module based on acting rationality. Here we concentrate more on general principles of rational agents.

d.)    Thinking Rationally

Thinking rationally means obtaining mathematics approach. There are two main problem in rational thinking are all knowledge cannot be formally be represented. There is problem is solving problem in practical.

Advantages of Artificial Intelligence

a.)    Artificial intelligence is more general than the “law of though” approach.

b.)    There are some particular ways of acting rationally but this cannot be related to correct inference.

c.)     Artificial intelligence is more amenable to scientific development than the approach based on human thought.

Goals of Artificial Intelligence

a.)    Artificial Intelligence aims at solving real world problem.

b.)    To understand and explain intelligence.

Let us have a look at real world examples of artificial intelligence.

a.)    Artificial intelligence is used in Biometric identification for security system.

b.)    In consumer marketing artificial intelligence is used for data mining.

 Download  Artificial Intelligence and Neural Networks PPT.

Semantic Web PPT Presentation

Introduction to Semantic Web PPT Presentation:

We all are aware about WWW World Wide Web. We all need web for browsing, surfing, gaming and many more uses.

HISTORY OF WWW

Web 1.0 had only provided features to users for browsing and reading information focus of web 1.0 was just to make user information available. After the release of web 2.0 it provided more facilities to user for storing information. Some more features provided by second release of web was to that users were able to communicate with each other with help of web pages, they were able to convert it to document, and user were able to spread the use of computer through network and it was not restricted to one machine only.

SEMANTIC WEB

The word semantic means data on the web can be processed through user directly and indirectly. Semantic web is all about the properties of web. Technologies used in web are Hyper Text Markup Language it user IRI – International Resource Identifier and XML – Extension Markup Language for representation of data and it linking. Standard semantic web technologies are.

a.)    RDF – Resource Description Framework.

b.)    OWL – Web Ontology Language.

c.)     SPARQL

Now let us discuss this above stated technologies in detail.

RESOURCE DESCRIPTION FRAMEWORK

Resource description framework is language used to describe the information present on the web. With the help of the information present in the RDF files web spiders can access the information present in this files.

WEB ONTOLOGY LANGUAGE

Ontology is presenting the data or the knowledge as a set of concepts and relation      between them. It is in general used for knowledge representation.

SPARQL

It is a query language used to retrieve information from web.

Apart from this there are also some unrealized web technologies.

a.)    Rule interchange format (RIF)

b.)    Cryptography

c.)     Trust

d.)    User Interface

There are also opportunities available in semantic web and they are to develop semantic based search engines. To develop semantic based web technologies and semantic based web services.

Download  Semantic Web PPT Presentation.

Mobile Agents PPT Presentation

Introduction to Mobile Agents PPT Presentation:

This paper describes us Mobile Agents and Agents in detailed. Mobile agents are computer programs. Let us take overview of the topics we will go through in this document characterization on mobility, system components, language and design, applications, challenges, survey of mobile agents system. Let us understand what software agents are. Software Agents are computer programs which have autonomous behavior and communicate with the help of high level agents and communication language.  

MOBILE AGENTS

Mobile agents are software agents which move from one place to another either directly or autonomous.                Characteristics of mobility are there are mainly three capabilities mobile code, mobile communication, and mobile state.

a.)    Mobile Code

Mobile code helps the executable code to move from one place to other. It use push or pull method for sending this code. The code which is to be pulled or pushed may be source code or binary code.

b.)    Mobile Computation

Mobile computation allows running computation on a remote system. Remote computation can be RPC, RSH, RMI, Servlets, Stored Procedures, and CORBA.

c.)     Mobile State

Mobile state may vary according to machine or may not vary. Mobile state allows execution state of mobile to be captured. State may contain state of a single thread or code.

ADVANTAGES OF MOBILE AGENTS

Mobile agents provide a good network facility for bandwidth. In case of disconnected bandwidth and provides support to smaller mobile units. Lower-latency interactions. Mobile agents provide flexibility in downloading new capabilities and services. The structure system used for mobile code is universal server, Open Services Gateway Initiative (OSGI).

AGENT PROGRAMMING PARADIGMS

Mobile agents use itinerant agents. Mobility of agents is dictated by ltinerant agents. Uses reactive even based approach. Agent’s minion these are the small agent’s spawned by another larger agents.

 SYSTEM C COMPONENTS

The components for the system of mobile agents are administrative tools, visualization tools, global directory services, global logging service, other frameworks, execution environment, agent transfer protocol, agent messaging protocol, the execution environment contains authentication encryption, policy manger, logging service, directory service, persistent service, messaging service, interpreter.

LANGUAGES USED FOR MOBILE AGENTS

Languages used for mobile agents are java as a numerous system, TCL as D’Agents, SMIA, C or C++ as omniware, telescript, lisp, scheme, and custom.

AUTHENTICATION ISSUE

The authentication issues which occur in mobile agent are Agent anonymity and multiple hops.

 APPLICATIONS

Applications of mobile agents are information retrieval, monitoring, remote control dynamic systems, active mail.

CHALLENGING ISSUES

Challenging issues while designing mobile agents system are security issues, administration and management through the system, allowing access to mobile resources, deployment, interoperability, and debugging.

Download  Mobile Agents PPT Presentation.

Computer Viruses PPT Presentation

Introduction to Computer Viruses PPT Presentation:

The document contains detailed description about computer viruses. Here we will study about the basic definition about virus, its subtypes, how they were recognized and more things about viruses.

                ABOUT VIRUSES

                Basically in bio-logical terms a virus is a non-living thing which cannot produce itself. Similarly computer viruses also cannot produce themselves. Computer viruses is a capable of replicating itself, but the important thing about them is that it can replicate themselves on the same machine without connecting to other machine in the network.

                DISCOVERY OF VIRUS

Virus was first discovered by Farooq Alvi brothers from Pakistan, which was named as dubbed brain. Dubbed brain was called a boot sector virus. Lets us have a look at hoe the virus affect machines. Every virus goes through following phases.

a.)    Dormant Phase:

In this phase virus is activated by when some event is caused on it or caused in machine containing.

b.)    Propagation Phase:

In this phase viruses create an identical copy of themselves and place it in some areas of disk.

c.)     Triggering Phase:

In this phase of virus, viruses actually start working for the purpose yhey are being introduced in the system.

d.)    Execution Phase:

This is the phase where virus damages machine.

Let us have a look at types of viruses.

a.)    Parasitic Virus.

b.)    Memory-Residential Virus.

c.)     Boot-sector Virus.

d.)    Stealth Virus.

e.)    Polymorphic Virus.

Above stated are the types of viruses. Now let us state the classification of viruses.

a.)    Boot Virus.

b.)    DOS Virus.

c.)     Windows Virus.

d.)    Macro Virus.

e.)    Script Virus.

f.)     Java Virus.

g.)    Palm Virus.

SPREADING OF VIRUS

Virus starts execution when a program executes. This loads virus in the memory. Virus finds any other program in the memory and alters and changes the virus program. In this way virus launches the real program. In this way virus affect the two files. Some popular viruses are.

a.)    W32 Viruses.

b.)    Melisa.

c.)     Bubble Boy. 

Download  Computer Viruses PPT Presentation.