Brain is the master organ in every living being. It co-ordinates every action. The way we speak, walk, talk and eat all depends on the lead that brain gives. Nothing is outside the action of the administration of the brain. Hence brain keeps a tight rein on every part of the body. The interfacing gadget is placed beneath the skin and above the muscle. The conducting band is wrapped around the synapses. The electrical signal from the synapses passes through the band and energizes the copper coil connected to it. The copper coil is preferred because it is a good conductor and also it produces current when energized and also it is very cheap.For the first time the signal received may be considered as the reference. Hence the first signal is recorded under the human guidance, designated for a particular work. When a similar thought is made the similar signal appears at computer end. Now the computer compares it with the reference. If the signals match, the designated work is done or else it will be recorded.
Showing posts with label Pervasive Computing. Show all posts
Showing posts with label Pervasive Computing. Show all posts
Friday, February 4, 2011
Uses of Interface Device Tools For Trapping Signals
The interfacing device or gadget is a tool used for trapping the signals and transmitting them to the externally connected control system. Interfacing device has PCB encased inside a glass tube. The power supply to the tube is an electrical signal from our body. The nerve impulses are the source for these electrical signals.The gadget has a PCB, copper coil, amplifier, connecting wires and a conducting band. The band is wrapped around the synapses which produces electrical signal. The band conducts the electrical signal to the copper coil thereby energizing the copper coil. The coil now produces electric current. The PCB's connected at the other end of the copper coil is activated. This PCB now produces voltage according to the impulse received. Voltage can be produced using a microelectrode or a micropipette. The voltage range of the brain impulse is 2 – 200 microvolt. This is given to the transmitter device.
Labels:
Computer,
Education,
Logical Questions,
Pervasive Computing,
TCP,
Tutorials
Cybernetics Machines Profile
Cybernetics is nothing but linking of human thoughts with that of cybernetic machine. Thus we are controlling the machine just through thoughts. Cybernetics is thus the commingling of the most difficult work of thinking to the most effective tool to execute it, the machine. In a nutshell it may be stated that just by thinking we could make a machine work.Brain is source of all thoughts. This principle organ produces impulses that are of constant amplitude and that are a pulse modulated wave. These impulse passes through the nerves. The nerve acts like a transmission line and does not alter the impulse. But the synapses, a fiber like structure present at nerve end converts it to other form like integrated, amplified signal etc.,.Our aim is to use these synapses for tapping the signal en route. The synapses are a fine hair like structure. A sensor placed at this juncture can receive the signal from the synapses. From the synapses these sensors take control of the entire process. these sensors command the externally placed computer to act according to the signal received. Then the computer may take control over any system. For instance, if I would like to switch on a light from the next room, without any switches or gadgets in between then being a cybernetic human I may think to switch on the light. The thought signals will activate the sensor in turn controlling the computer to do the desired job.
Labels:
Computer,
Interview,
Mahindra,
Network,
Pervasive Computing,
Placement Questions,
Project
Thursday, February 3, 2011
Latest Fundamentals of Pervasive Computing Syllabus 2011
CS9153 Fundamentals of Pervasive Computing 3 0 0 3
1. Pervasive Architecture
Local Area Networks – Wireless LANs - Relationship of Wireless, Internet and Ubiquitous Computing – Pervasive Computing and Ubiquitous Computing - Ambient Computing – Pervasive Web application Architecture – Requirements of computational infrastructure - failure management – security – performance – dependability.
2. Mobile Device Technologies
Mobile Computing devices characteristics - Adaptation – Data dissemination and Management - Heterogeneity – Interoperability - – Context awareness - Language localization issues - User Interface design issues – Difference between UI design for mobile devices and conventional systems - Mobile Agents - Mobile Device technology overview - Windows CE – Symbian – J2ME – Pocket PC – BREW.
3. Sensor Networks and RFIDs
Introduction to Sensor networks - Sensor Node Architecture – Sensor Network Architecture - Types of sensor networks – Platforms for Wireless sensor networks – Applications of Wireless Sensor networks - Introduction to RFID – transponder and reader architecture - Types of tags and readers - Frequencies of operation – Application of RFID Technologies.
4. Local Area and Wide Area Wireless Technologies
IEEE 802.11 technologies - Infrared technologies - Bluetooth networks (OBEX Protocol) - Personal Area Networks – Mobility Management - Mobile IP - Establishing Wide area wireless networks - Concept and structure of ”cell” - Call establishment and maintenance - Channel management - Frequency Assignment techniques.
5. Protocols and Applications
Networking protocols - Packet switched protocols - Routing Protocols for Sensor Networks - Data Centric Protocols - Hierarchical Protocols - Location-based protocols - Multimedia Messaging Service (MMS) Protocols - Wireless Application Protocol (WAP) – Applications of Pervasive Computing – Retail – Healthcare - Sales force automation – Tracking applications.
Total = 45
References
1. Burkhardt, Henn, Hepper, Rintdorff, Schaeck. “Pervasive Computing”, Addison Wesley, 2002.
2. F. Adelstein, S.K.S. Gupta, “Fundamentals of Mobile and Pervasive Computing” Tata McGraw-Hill, 2005.
3. Ashoke Talukdar and Roopa Yavagal, “Mobile Computing”, Tata McGraw Hill,
2005
Web articles
M. Weiser, The Computer for the Twenty-First Century, Scientific American, pp. 94-10, September 1991
M. Weiser, "Some computer science issues in ubiquitous computing." Communications of the ACM, July 1993. Pages 75-84
Wesier, Mark. "The World is not a Desktop." ACM Interactions. http://www.ubiq.com/hypertext/weiser/ACMInteractions2 (November 1993)
M. Satyanarayanan, Pervasive Computing: Vision and Challenges, IEEE Personal Communications , August 2001
D. Saha, A. Mukherjee, Pervasive Computing: A Paradigm for the 21st Century, IEEE Computer, IEEE Computer Society Press, pp. 25-31, March 2003
Vijay Gugnani, Karunesh Arora, V N Shukla, Issues & Challenges in Developing Multilingual Applications for Mobile: Indic Languages Perspective, www.w3.org/2006/07/MWI-EC/PC/cdac_Mobilepaper.pdf
1. Pervasive Architecture
Local Area Networks – Wireless LANs - Relationship of Wireless, Internet and Ubiquitous Computing – Pervasive Computing and Ubiquitous Computing - Ambient Computing – Pervasive Web application Architecture – Requirements of computational infrastructure - failure management – security – performance – dependability.
2. Mobile Device Technologies
Mobile Computing devices characteristics - Adaptation – Data dissemination and Management - Heterogeneity – Interoperability - – Context awareness - Language localization issues - User Interface design issues – Difference between UI design for mobile devices and conventional systems - Mobile Agents - Mobile Device technology overview - Windows CE – Symbian – J2ME – Pocket PC – BREW.
3. Sensor Networks and RFIDs
Introduction to Sensor networks - Sensor Node Architecture – Sensor Network Architecture - Types of sensor networks – Platforms for Wireless sensor networks – Applications of Wireless Sensor networks - Introduction to RFID – transponder and reader architecture - Types of tags and readers - Frequencies of operation – Application of RFID Technologies.
4. Local Area and Wide Area Wireless Technologies
IEEE 802.11 technologies - Infrared technologies - Bluetooth networks (OBEX Protocol) - Personal Area Networks – Mobility Management - Mobile IP - Establishing Wide area wireless networks - Concept and structure of ”cell” - Call establishment and maintenance - Channel management - Frequency Assignment techniques.
5. Protocols and Applications
Networking protocols - Packet switched protocols - Routing Protocols for Sensor Networks - Data Centric Protocols - Hierarchical Protocols - Location-based protocols - Multimedia Messaging Service (MMS) Protocols - Wireless Application Protocol (WAP) – Applications of Pervasive Computing – Retail – Healthcare - Sales force automation – Tracking applications.
Total = 45
References
1. Burkhardt, Henn, Hepper, Rintdorff, Schaeck. “Pervasive Computing”, Addison Wesley, 2002.
2. F. Adelstein, S.K.S. Gupta, “Fundamentals of Mobile and Pervasive Computing” Tata McGraw-Hill, 2005.
3. Ashoke Talukdar and Roopa Yavagal, “Mobile Computing”, Tata McGraw Hill,
2005
Web articles
M. Weiser, The Computer for the Twenty-First Century, Scientific American, pp. 94-10, September 1991
M. Weiser, "Some computer science issues in ubiquitous computing." Communications of the ACM, July 1993. Pages 75-84
Wesier, Mark. "The World is not a Desktop." ACM Interactions. http://www.ubiq.com/hypertext/weiser/ACMInteractions2 (November 1993)
M. Satyanarayanan, Pervasive Computing: Vision and Challenges, IEEE Personal Communications , August 2001
D. Saha, A. Mukherjee, Pervasive Computing: A Paradigm for the 21st Century, IEEE Computer, IEEE Computer Society Press, pp. 25-31, March 2003
Vijay Gugnani, Karunesh Arora, V N Shukla, Issues & Challenges in Developing Multilingual Applications for Mobile: Indic Languages Perspective, www.w3.org/2006/07/MWI-EC/PC/cdac_Mobilepaper.pdf
Labels:
B.Com,
C++,
JAVA,
Pervasive Computing,
Syllabus
Subscribe to:
Comments (Atom)