Research Paper on Virtual keyboard

Introduction to Virtual keyboard:

They are not the electronic device they are just the set of lights that look likes the keyboard and works like a keyboard. In this technique we use a device that produces the LASER light on the flat surface this LASER light produced is the keyboard. It creates detectable surface on which user don’t need to press the key like normal keyboard, we just need to move our finger to the respective key and device detects the motion of the fingers. As in today’s generation everything is getting smaller and smaller whether it’s the computer or mouse but one thing remained same that’s the keyboard. They always remain the same whether it is desktop or laptop.

This is very advanced technology that gives the new definition to the keyboard. This keyboard don’t have the disadvantage of button mal function, we can type with any speed even best for the gaming. This keyboard is just like the projector, we just need to touch the light and the output is displayed on the screen. Handheld is the device that is used to project the keyboard.

It emits the red light on the flat surface. They use short range Bluetooth connection for the transmission of the input to the computer. This technology allows the user to have full keyboard for their mobiles devices or wearable computer. Some provides the feature of the air means keyboard can be in air and we can access the key by moving hand to the keyboard.

ADVANTAGES: this keyboard is portable we can setup anywhere and very accurate and it overcomes the main problem of typing and button mal function. We just need a flat surface, that’s not the tough task.We can also change the layout of the keyboard with the help of software.

Download  Research Paper on Virtual keyboard .

Term Paper on Cloud Computing

Introduction to Term Paper on Cloud Computing:

It is the IT based new technology made for the applications that have software and require database for operations. They are constructed in the HTML and Java with the help of Java scripts and Java server. For back end any data base can be used like SQL, Oracle. Database is connected with the application with the JDBC. To run this application your system meets minimum requirements. You have at least P3 processor; hard disk 20GB, input output devices, RAM 256 MB and windows operating system 95.

Basically cloud computing is concern with the storage of the data on the internet on some servers like Google. They provide us feature to store data in their servers and can be accessed whenever required example Google drive. These servers provide user to store their data which they never want to loss. User needs to register to them and they provide space to the user. They provide limited space to free users and unlimited space to the premium users. Default space for free users has 5 GB.

These cloud computing have some problems also. They have the problem of safety. Data might not be safe there. It can be illegally used by the servers and they might misuse it. If in case they close their service then there is no chance of back up and we can’t blame them for that. These don’t give the promise of the data security, means they can’t be trusted; they might be multinational company or any other. They just provide interface to us for storage.

They divide their application in the three modules: first, for the administration purpose. Second for the authorization of the user and third for the user who save their data to the cloud. 

Download  Term Paper on Cloud Computing .

Technical Seminar on Virtual Keyboard

Introduction to Technical Seminar on Virtual Keyboard:

This is the new technology that is used in the computer systems.  Normal keyboard have physical buttons, complicated circuitry, processors. General keyboard have around 104 keys. They can be made up of many things like rubber, foam, metal or plastic etc. they have the problem that their keys may get damaged or stop working.

Virtual keyboard is the new technology that overcomes all the limitations of normal keyboards. They work on the sensors. It means they are not physical they can be generated anywhere with the help of sensors and light. It uses device that emits light on the plane surface that generated keyboard and it can be used same as like normal keyboard.

 For such keyboard we require device and the related software. It can be displayed anywhere on the flat surface means they are portable and sensors is used to detect the motion of our fingers on the keyboard. It is best suited for any type of persons who type fast or slow no matter how much you stroke the key. It just like USB plugs and play. They are little costly and they require little practice to use them. They are mostly used in the gaming, word files and hi-tech sectors. We can set the size of the keyboard by doing changes in the software.  The light of the room must not be very bright; it may not allow the keyboard to be projected and visible clearly.

In these keyboard the light emitted in kept low as to prevent the eye damage. Now they are also implemented in the cell phones. Example: Kitty. It is a type of virtual keyboard that is independent of the system and it only require touching of the buttons. Infocus are also the virtual keyboards they don’t use Laser for projection. 

Download  Technical Seminar on Virtual Keyboard .

Download Seminar Report on Virtual keyboard

Introduction to Seminar Topic on Virtual keyboard:

This is the new feature added to the computer systems. As today’s computers are going small and small. They are keep on decreasing the size if their devices. But one thing that is the same from the past time. Keyboard always remain the same as from past time. It has 104 keys as it used to be in earlier time. Nothing changed except the look. Keyboards comprise the lots of arrangements of switches and gates. They have pins that are used for input and output process.

General keyboards have microprocessors that control the whole keyboard. But to overcome this entire problem we have developed the new keyboards that are based on the light.  For that we have to use special device that will project the combination of some lights that will create keyboard on the flat surface. For that we need surface so that keyboard is visible properly and work correctly. In this we don’t have buttons to press them, we just need them to touch the light and the sensors will detect the motion and print the word on the screen.

We need a software for that device that and then device need to be connected with computer or mobile. Then the device will project the keyboard on the screen. Layout of the keyboard can be set as per requirement by doing changes in the software. Example canasta is the keyboard that has the capability to project the keyboard.

Other technology is the sense board. In this user have to wear the device and then move the fingers for the word. They connected with the help of the Bluetooth. Here no projection is used. This can be like bracelet. Example kitty, it is the wearable computer, keyboard independent. Sensors in this device just rack the motion of the fingers.

Download  Download Seminar Report on Virtual keyboard .

Virtual Instrumentation Paper Presentation

Introduction to Virtual Instrumentation Paper Presentation:

It means that using customized software and hardware to develop the systems for the user according to his requirement. Some hardware’s instrumentation is already configured like oscilloscopes, and they are specifically coded to some task and they are limited to use. To overcome this problem we can use software to replace the hardware data.

Lab VIEW: it is the environment developed for programming language that is especially designed for the graphic or visuals. It is used so that processing and measurement of the equipment are done in the laboratory automatically. For that we use programming language “G “. This language is basically developed for the Apple Corporation later it is used by Microsoft, UNIX, Linux etc. operating systems platforms. This graphical language is used at many places like Robotics, controls, Mechatronics etc.

Control: it is the main element in the robotics and mechatronics for controlling different parts. It is used to develop the mathematical design of the systems. In this process it requires software.

In Robotics: it is used in the robotics field to develop efficient and robust robots that is advanced and efficient. Robotics required intelligent machines and smart software that can be implemented in the robotics.

Mechatronics: it deals with the applications like electronics, controlling, intelligence.  It is used to improve the interaction between the user and the machines like Robots. They need simulation of their machines and electronic systems and to improve the machine development.

They are also used in the other field like virtual processing. They are also used for measuring the sensors and their connectivity. Used in embedded systems that is based on the single platform and requires high performance and they are programmed in high level language. They have increased the machine productivity and understand the requirement of the customers.

Download  Virtual Instrumentation Paper Presentation .

Seminar Topic on Virtualization

Introduction to Seminar Topic on Virtualization:

It means that providing abstraction to system operation. Insystem only one operating system can be installed on only one hardware.  Server is composed of many hardware but it can have only one operating system to particular hardware. To overcome this problem we do virtualization of the hardware. After virtualization many hardware can be installed on the same hardware. This removes the dependency of operating system from the hardware.

How it works: first we have the system architecture and then we place the virtualization layer above the hardware of the system. After the virtualization layer we installed operating system. Now this operating system is independent from the hardware and data base or server. Now other applications are installed on the operating system. Sometimes we also called it Para virtualization.

Many hosing industries also use virtualization at the operating system level other that Para virtualization. This method allows many user to create instances. It shows that only one kernel of specific OS is installed on the server that allows to create containers. We use this method in open VZ engine and Xen engine uses Para virtualization.

Xen uses only one OS for controlling the hardware and mostly they use UNIX. They are edited so that they can give the maximum performance for the hardware.  Example: NetBSD, OpenBSD etc. they are used on the proprietary systems.

Open VZ is the open source virtualization that uses IA64 processors. They are built on the Linux.  They also have single OS based hardware but they run multiple application at the same time and all are isolated from each other. They are used in mass management process. They are single kernel based model. They have the capability to support 64CPUs and have memory up to 64 GB of RAM.

Download  Seminar Topic on Virtualization .

Project Abstract on User Input Pattern Based Authentication Method to Prevent Mobile E-Financial Incidents

Introduction to User Input Pattern Based Authentication Method to Prevent Mobile E-Financial Incidents Project:

Android is a new age software recently being used in the market. It is mobile based software, applications or operating system developed with the help of Google Corporation. Android used SDK to develop its applications that can run on android devices. Android provides better security than any other mobile operating systems.

It has very famous application used for security is pattern matching techniques. In this application use set its own pattern in the device and when he need to log on the screen of the device he need to draw the same pattern which had set earlier. This application prevents the spam user to use the device.

To create this application we require at least java 6,android SDK, eclipse that have supporting OS of at least version 2.0, 2.1, 2.3 and my SQL for data base. And it also depends on which system we are developing the application. Our system must have 1GB RAM and P4 processor and 80GB RAM and internet connectivity when required.

Development of such application is based on the several modules. First we need to check whether user logged for the first time is authenticated or not, he need to enter the password and that will be stored in the data base. Secondly he needs to draw the pattern that will be stored in data base. Third we need to check the new pattern with the pattern that is stored in the data base.

If the pattern did not match then he will be asked to answer the security question and if he fails again then the device will not allow him to access the system and if it used again and again then device might get lock and it will produce alert to the original user.

Download  Project Abstract on User Input Pattern Based Authentication Method to Prevent Mobile E-Financial Incidents .

Technical Seminar Report on Cloud Computing

Introduction to Technical Seminar Topic on Cloud Computing:

It refers to computer resources and the applications linked with it. It means use of an application through the internet and the web services. Anyone can use cloud application if he has internet connection and web browsers. Same applications can be accessed by many clients or users. Cloud application can be designed as per our requirement. It increases the utilization of hardware and software. They are very effective because they are much cost less and deliver the information effectively this is turn reduces the complexity of the IT system and response are very better as it works in real time.

Cloud computing are also used in the social network, business, innovations etc. we just need to made the request through internet and the administrator process our request and display the web bases interface for user. They use the data center like IBM Tivoli, DB2 etc. they are the backend for the data server that provides the facility to the user.

It also allows the innovator to change or delete servers. They have the right to delete servers or add new software and change the memory management. Clouds can have number of servers and as the number of server increases the monitoring of these servers becomes difficult.

In cloud computing workers are said to collect information and then these information are added to the data bases. And mostly the work are done in open source software so that they are platform independent like Xen, it is virtual machine. Cloud computing uses Google file system techniques for its storage management which allows the user to use very large data with the help of network. Today these computing are used for innovation purpose by big companies like IBM. They use them to make services better.

Download  Technical Seminar Report on Cloud Computing .

Seminar Report on Wireless Underwater Communications

Introduction to Seminar Topic on Wireless Underwater Communications :

In today’s generation wireless technology is becoming common among us. It is used in the every part of the world and everywhere whether is it land or hill or water. As we all know that our earth consists of 70 % of water. We have to develop such wireless network that can also work under water. For that we have developed new wireless network that work on electromagnetic waves instead of radio waves.

Electromagnetic waves are very fast than radio waves and they can travel long distance inside water. Electromagnetic waves works better in water. We use special acoustic modem for creating such network, they are based on two different modulation: frequency shift is used for detecting non coherent and phase shift is used for detecting coherent. They all are based on the autonomous network. They connect by creating network topology.

There are many base stations build inside the water that are interconnected to each other with help of radio links.

Applications: These networks are used by petrol grid that is built in the sea. They are also used by fish catcher; they connect their ship with this network for regular update related to weather. Submarine works purely on the connection of these networks. Defense like navy also used this network for protecting country border. Theses network are used for weather fore casting, pollution control, guarding sea animals, research related to the sea animals, finding new species etc.

But they have few disadvantages also: they have limited battery power, and we cannot charge battery. We cannot solar power also. Bandwidth provided is limited and cannot be extended.  Sometimes error generate is difficult to handle, they have high rate of error and we also face the problem of multipath links.

Download  Seminar Report on Wireless Underwater Communications  .

Seminar Report on Speech Application Language Tag

Introduction to Seminar Topic on Speech Application Language Tag:

Speech recognition technique has allowed us to talk to the computer, instruct computer by our voice. We can also listen to the computer. This all is possible with the new developed algorithms designed. Speech recognition is the software build especially for giving instruction to the computer. In today’s generations mobiles and PCs are getting smaller and smaller and the input devices they use are getting also smaller, so it difficult to operate such devices for the people who healthy as they have big fingers or hand or for those who are paralyzed.

But if we have speech recognition technique than we don’t need to depend on input devices we can speak and give instruction to the devices. If in case you are driving car you need to make then you have to stop the car, but if you have this technique then just speak and work is done. This is also termed as SALT.

SALT was first used in the October 2001. They support many languages designed according to the region. They are used in the many places like web servers that contain embedded for HTML and speech servers where speech is converted in the text. They are also used in the telephony servers where they connect the IP network and telephone together.

They are used in the telephony applications where we speak and the values are added to the text boxes. SALT is based on the procedural language. If we have the knowledge of writing HTML language then we write the SALT language. They are not programming language they are markup language. They writing process is just HTML but they also JavaScript with HTML. These applications are coded like that it can identify the grammatical mistake and the pronunciation of the user.

Download  Seminar Report on Speech Application Language Tag .