FACE RECOGNITION TECHNOLOGY.ppt free download


Face recognition is an attractive biometric for use in security applications. Face  recognition is non-intrusive, it can be performed without the subject’s knowing. This become particularly important in modern times because demand for enhanced  security  is in public interest.
q      Facial recognition is a form ofcomputer vision that uses faces to attempt to identify a person or verify a person’s claimed identity.  Regardless of specific method used.            
    To identify any person we generally look at face and eyes in particular seem to tell a story how the person feels.
  Face recognition is a kind of electronic unmasking.
  To identify any person we generally look at face and eyes in particular seem to tell a story how the person feels.
  Face recognition is a kind of electronic unmasking.
  It is a unique measurable characteristics of a human being
  Used to automatically recognize an individual’s identity
  Two types 1.physiological &
                   2. behavioral characteristics
 A “biometric system” refers to integrated hardware and software used to conduct biometric identification

 


Migration From GSM Network To GPRS Seminar Topic .pp free Download

— Migration From GSM Network To GPRS is  Global System for Mobile (GSM) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation. 

Developed by Group Spéciale Mobile (founded 1982) which was an    initiative of CEPT ( Conference of European Post and Telecommunication )
Aim : to replace the incompatible analog system
Presently the responsibility of GSM standardization resides with special mobile group under ETSI ( European telecommunication Standards Institute )
Full set of specifications phase-I became available in 1990
Under ETSI, GSM is named as “ Global System for Mobile communication “
Today many providers all over the world use GSM (more than 135
Countries in Asia, Africa, Europe, Australia, America)
More than 1300 million subscribers in world and  45 million subscriber in India.
              Download .ppt


Mobile TV Seminar Topic .ppt Free Download


Definition of Mobile TV
Mobile TV is the wireless transmission and reception of television content - video and voice - to platforms that are either moving or capable of moving.  Mobile TV allows viewers to enjoy personalized, interactive television with content specifically adapted to the mobile medium. The features of mobility and personalized consumption distinguish mobile TV from traditional television services.  The experience of viewing TV over mobile platforms differs in a variety of ways from traditional television viewing, most notably in the size of the viewing screen.
The technologies used to provide mobile TV services are digitally based,the terms unicast and multicast are used in the same way they are used for IPTV.  That is, unicasting is transmission to a single subscriber, while multicasting sends content to multiple users.  These definitions also correspond to those given for similar Internet-based applications. For network operators, the challenge has become: 'How can large-scale delivery of high-quality multimedia to wireless devices be implemented profitably?' Although delivery of this type of content is technically feasible over today's existing unicast networks such as 3G, these networks cannot support the volume and type of traffic required for a fully realized multimedia delivery service (many channels delivered on a mass market scale). Offloading multicast (one-to-many) multimedia traffic to a dedicated broadcast network is more efficient and less costly than deploying similar services over 3G networks



               Download .ppt




XML ENCRYPTION .ppt Seminar Free Download

}As XML becomes a predominant means of linking blocks of information together, there is a requirement to secure specific information. That is to allow authorized entities access to specific information and prevent access to that specific information from unauthorized entities. Current methods on the Internet include password protection, smart card, PKI, tokens and a variety of other schemes. These typically solve the problem of accessing the site from unauthorized users, but do not provide mechanisms for the protection of specific information from all those who have authorized access to the site.


}Now that XML is being used to provide searchable and organized information there is a sense of urgency to provide a standard to protect certain parts or elements from unauthorized access. The objective of XML encryption is to provide a standard methodology that prevents unauthorized access to specific information within an XML 
XML Encryption provides end-to-end security for applications that require secure exchange of structured data

Sending documents over a network, storage in a database and exchange between applications in encrypted form can be useful as part of other security measures.
          Download .ppt


PALM VEIN TECHNOLOGY SEMINAR .PPT FREE DOWNLOAD

qPalm vein technology is one of upcoming technology.
qIt is the world’s first contact less personal identification system that uses the vein patterns in human palms to confirm a person’s identify.
q It is highly secure and accurate.
qThe contact less feature gives it a hygienic advantage over other biometric authentication technologies
It is easy and natural to use, fast and Highly accurate.
It consist of a small palm vein scanner.

A vein picture is taken an palm pattern is store in scanner display register.
                                    DOWNLOAD.PPT


Java database connectivity seminar .ppt free download


outline
JDBC Driver
About JDBC URLs
    .How to Make the Connection
The Statement Object
How to Query the Database
The ResultSet Object
Mapping Database Types to Java Types
How to Close the Connection
Using Statement
Using Transactions
    .JDBC 2 – Scrollable Result Set
JDBC 2 – Updateable ResultSet
SQLJ   
JDBC is a standard interface for connecting to relational databases from Java.
The JDBC classes and interfaces are in the java.sql package.

JDBC 1.22 is part of JDK 1.1; JDBC 2.0 is part of Java 2



                                                        Download.ppt


DYNAMIC DOMAIN NAME SERVICE SEMINAR .PPT FREE DOWNLOAD

Dynamic Doman Name Service (DNS) providers offer a free and paid service which allows the aliasing of dynamic (DHCP) IP addresses to static host names and the provision of Uniform Resource Indicator (URI) redirection services etc.
DNS  is a service that  maps a local name to an IP address and conversely an address to a name.
How it Workè DNS works by dividing the inter network into a set of domains or networks that can be further subdivided into sub domains.
               Download.ppt file




Artificial Intelligence Seminar Topic Free download

Artificial Intelligence is a lot of different things to a lot of different people. Let's go through a few things that AI is thought to be and situate them within the broader picture of AI.
qArtificial intelligence (AI): Computers with the ability to mimic or duplicate the functions of the human brain
qArtificial intelligence systems: The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate the characteristics of intelligence
Computational models of human behavior:
One thing it could be is "Making computational models of human behavior". Since we believe that humans are intelligent, therefore models of intelligent behavior must be AI. There's a great paper by Turing who really set up this idea of AI as making models of human behavior (link). In this way of thinking of AI, how would you proceed as an AI scientist? One way, which would be a kind of cognitive science, is to do experiments on humans, see how they behave in certain situations and see if you could make computers behave in that same way.
                      Donload Seminar