Thursday, August 29, 2013

e-wallet


Introduction

A Digital Wallet also known as e-wallet allows users to make electronic transactions quickly and securely. A Digital Wallet functions much like a physical wallet. The digital wallet is a method of storing various forms of electronic money (e-cash), the digital wallet has also evolved into a service that provides internet users with a convenient way to store and use online shopping information.



Abstract:


Using the basic concepts of Embedded Systems, an idea for changing the future of Cards (Banking, Petro, Health, Televoice, etc.) is proposed in this paper. Requirement of a special card reader, limited lifetime, acceptance being the main disadvantages of today's traditional cards, led to the design of e-Wallet. The main objective of e-Wallet is to make paperless money transaction easier.

 The main idea behind this paper is to bring in a cheaper, more versatile and much more easily usable kind of a card. Using this e-Wallet the transaction procedure can be as simple as: the customer goes to the point of sale (POS), does the purchasing and when it comes to the payment, the customer submits his e-Wallet to vender who connects it to his terminal (PC).

The vender displays the billing information to the customer who finalizes it. The amount in the e-Wallet is updated accordingly. Later at periodic intervals, the vender intimates the bank (in case of credit cards) which transfers the amount from the customer'(s) account to his. The advantages of e-Wallet are its ease of use (doesn't require a separate card reader), ease of maintenance, flexibility, safety, being the primary ones. 

The designing of the card is similar to any other embedded card. The designing cost of the card (e-Wallet) being as low as the price of a pizza. There are ample enhancements to this application from credit cards to televoice cards. Unlike traditional cards which are application oriented, all the applications' software can be embedded into this e-Wallet which provides multi-functionality.

What Is an eWallet?

Once you have been online for a few weeks or months, you will have an online identity. You may need and use quite a few online passwords and pins, along with personalized billing and shipping information. Not only do you need to enter your personal and financial data at each site, but you also have to remember and secure that information. An e-wallet is a convenient, secure place to store data related to your online identities. Once you start using one, you will wonder how you ever managed without it.


Misconceptions

Many popular browsers, including Internet Explorer and Firefox have some basic built-in e-wallet functions. However, storing your information in a browser is not as secure as using a separate program that is specifically designed for this task. In addition, if you change browsers, you may not have access to your data. Browsers also store your passwords in a separate location from your form data. In some cases, you need an add-on to store personal data that you need for completing forms. With few exceptions, these days, you will have a separate email program where you store email addresses for your contacts.

Function

E-wallets can store your passwords, credit card numbers, email contacts and vital data like your driver's license or social security numbers. You may have your personal data recorded in several disparate locations, including your browser, spreadsheets, a PDA and on paper. Not only is it inconvenient to manage your online experience this way, but it can also be risky. Paper can get lost or waterlogged. Trying to remember and update your email contacts and credit card information can be overwhelming. An e-wallet allows you to unify and store the information that you need. You will only need to remember one password to unlock your encrypted data.

Features

A consumer e-wallet is a standalone software application that you can download and install on your computer, PDA or Smartphone. Some of the most popular e-wallet software programs also allow you to store photos and maps. You can often customize the software's data entry options to fit your needs. Many retailers also provide credit card data e-wallets to their customers. These have limited features. They mainly store billing and shipping information.

Security

A good e-wallet uses strong encryption for stored data. The user also needs to enter a password to open the stored files. Some e-wallets employ additional password security features such as a limit on failed password attempts. Once this limit is reached, the user will be locked out.

Considerations

Syncing and backup options are important. Keeping a file separate gives you peace of mind and recovery options when you lose access to the original files, or the device stops working. The option to use your e-wallet on multiple electronic devices makes the software more useful. To simplify your life, you should choose ane-wallet that you can run from a USB flash drive, along with your Smartphone and a desktop or laptop.

How to use an e-wallet

The sites where e-wallet services are available generally have the following few easy steps to get started.

What are the benefits?

The sites where e-wallet services are available generally have the following few easy steps to get started.
Ease of use without having to enter your debit/credit card details for every online transaction.
For some sites there is no minimum amount and you can deposit an amount as low as Rs 10.
You can pass on the benefits of your e-wallet to your friends and family as well.
There is no chance of a decline of payment since e-wallet is a prepaid account.

What are the risks?

Revealed passwords can lead to theft.
There is no facility of refund; the amount is only redeemable against a purchase.

Where can you use E-Wallets?

Online Grocery Stores

Big Basket.com, a Bangalorebased online food and grocery store, offers an e-wallet facility for a simple payment option. The e-wallet on this site can be filled up with any sum of money, starting from as low as Rs 10. The maximum money that can be stored on Big Basket's e-wallet is Rs 10,000.

Utility Payments

Paying the electricity bill, phone bill, mobile bill and even booking a seat at the theatre can now be done with OxiCash. Your OxiCash e-wallet can be filled and recharged using net banking, debit cards and credit cards or even cash payments at OxiCash retail outlets.

Fly prepaid

If you are planning a vacation and fear spending the saved money elsewhere you can save up with, Lusso Trip's e-wallet facility. Customers generally keep a Rs 10,000 balance on their e-wallet and save up as much as Rs 1 lakh to book tickets when they want to.

E-wallet on mobile

Airtel Money transforms the mobile phone into a convenient wallet. The digitised money can be used on several shopping sites like ebay.in, Home Shop 18, Myntra and Book My Show. All one needs to have is an Airtel connection.

Buying Online

E-commerce major Flipkart was one among the first few to start am e-wallet service in 2011. Flipkart introduced e-wallet service to its customers, in addition to their cash-on-delivery option. Consumers can create an e-wallet and fill it up to Rs 10,000 at a time.

Recharging Mobile Phones

At Munkey.in, an e-wallet service, a mobile recharge can be done automatically on an auto disconnect missed call to their number. A customer can also go for scheduled recharge option where a filled e-wallet can recharge a number or DTH connection on set times of the month.

Read more:

 http://www.ehow.com/about_5133015_ewallet.html#ixzz2dNVc3iaY
http://articles.economictimes.indiatimes.com/2013-06-14/news/39976342_1_e-wallet-facility-airtel-money-flipkart
http://en.wikipedia.org/wiki/Digital_wallet

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDEQFjAA&url=http%3A%2F%2Finfo2myfriends.blog.com%2Ffiles%2F2010%2F11%2Fe-Wallet-%25E2%2580%2593-THE-FUTURE-OF-CARDS.doc&ei=838fUs-dComO7Aat74HgCQ&usg=AFQjCNF4iC756ysF8TY8lEFRlT90_8XcgQ&sig2=u6PE8Y_zztJsdqUmMDpLNA&bvm=bv.51495398,d.ZGU



Thursday, August 8, 2013

ZIGBEE | Seminar Topic


ZIGBEE ABSTRACT

ZigBee wireless mesh technology makes wireless sensor and control network applications practical. Cost-effective, simple-touse, capable of very long product functionality from a pair of standard alkaline cells, it is meant for developers who want either to get rid of the tether that their product must use or provide a new level of functionality to their products with wireless communications. The ZigBee Specification takes advantage of the IEEE STD 802.15.4 wireless protocol as the basic communications method, and expands on this with a robust mesh network, applications profiles and device descriptions as well as interoperability and compliance testing.

Refered From :http://www.techopedia.com/definition/4390/zigbee

Definition - What does ZigBee mean?

ZigBee is an open global standard for wireless technology designed to use low-power digital radio signals for personal area networks. ZigBee operates on the IEEE 802.15.4 specification and is used to create networks that require a low data transfer rate, energy efficiency and secure networking. It is employed in a number of applications such as building automation systems, heating and cooling control and in medical devices. ZigBee is designed to be simpler and less expensive than other personal are network technologies such as Bluetooth.

Techopedia explains ZigBee

ZigBee is a cost- and energy-efficient wireless network standard. It employs mesh network topology, allowing it provide high reliability and a reasonable range.One of ZigBee's defining features is the secure communications it is able to provide. This is accomplished through the use of 128-bit cryptographic keys. This system is based on symmetric keys, which means that both the recipient and originator of a transaction need to share the same key. These keys are either pre-installed, transported by a "trust center" designated within the network or established between the trust center and a device without being transported. Security in a personal area network is most crucial when ZigBee is used in corporate or manufacturing networks.

Why choose Zigbee?

• Reliable and self healing
• Supports large number of nodes
• Easy to deploy
• Very long battery life
• Secure
• Low cost
• Can be used globally


The 802 Wireless Space



Sensors & Controls:
Home Automation
Commercial/Industrial Automation
Remote Metering
Automotive Networks
Interactive Toys
Active RFID/ asset tracking
Medical



Zigbee specification

The ZigBee Alliance is an association of companies working together to enable reliable, cost-effective, low-power, wirelessly networked, monitoring and control products based on an open global standard.

Advantages of ZigBee over proprietary solutions?


  • Product interoperability
  • Vendor independence
  • Increased product innovation as a result of industry standardization
  • A common platform is more cost effective than creating a new proprietary solution from scratch every time
  • Companies can focus their energies on finding and serving customers


If you want to download the Zigbee specifiaction please follow the link below:

https://zigbeealliance.org/



Many in the industry are calling for a wireless networking standard that can deliver device-level communications for sensing, data acquisition, and control applications. Will the ZigBee standard make this a reality?


Jon Adams, The ZigBee Alliance


The new ZigBee protocol provides an open standard for low-power wireless networking of monitoring and control devices. Working with the IEEE 802.15.4 standard—which focuses on low-rate personal area networking and defines the lower protocol layers (i.e., the physical layer, or PHY, and the medium access control layer, or MAC)—ZigBee

Figure 1.


ZigBee uses the IEEE 802.15.4 physical and MAC (medium access control) layers to provide standards-based, reliable wireless data transfer. ZigBee adds network structure, routing, and security (e.g., key management and authentication) to complete the communications suite. On top of this robust wireless engine, ZigBee profiles provide target applications with the interoperability and intercompatibility required to allow similar products from different manufacturers to work seamle defines the upper layers of the protocol stack, from network to application, including application profiles. Think of 802.15.4 as the physical radio and ZigBee as the logical network and application software (see Figure 1). ZigBee uses the license-free ISM bands, which provide unrestricted geographic use.

The new standard targets home and building control, automation, security, consumer electronics, PC peripherals, medical monitoring, and toys. These applications require a technology that offers long battery life, reliability, automatic or semiautomatic installation, the ability to easily add or remove network nodes, signals that can pass through walls and ceilings, and low system cost.

ZigBee and the underlying 802.15.4 standard offer the system designer several classes of devices: the reduced-functionality device (RFD), the full-functional device (FFD), and the network coordinator. All ZigBee networks have at least one RFD or FFD and a network coordinator. Most sensor applications fall natively into the RFD class, with extended networks making use of both FFDs and network coordinators to form bridges and links required by the network topology. ZigBee networks can form autonomously, based on connectivity and function.
Data Reliability

Reliable data delivery is critical to ZigBee applications. The underlying 802.15.4 standard provides strong reliability through several mechanisms at multiple layers. For example, it uses 27 channels in three separate frequency bands (see Figure 2).

Figure 2.


 IEEE 802.15.4 provides three frequency bands for communications. Global utility, propagation, path loss, and data rate differences let ZigBee profile developers optimize system performance.



The 2.4 GHz band is used worldwide and has 16 channels and a maximum over-the-air data rate of 250 Kbps. Lower frequency bands are also specified. The 902–928 MHz band serves the Americas and much of the Pacific Rim, with 10 channels and a burst rate of 40 Kbps. European applications use one channel in the 868–870 MHz band, which provides 20 Kbps burst rate. This rich assortment of frequencies lets applications with the appropriate hardware configuration adjust in real time to local interference and/or propagation conditions.

Once on a specific channel, the 802.15.4 radio relies on a number of mechanisms to ensure reliable data transmission. First, the PHY layer uses binary phase shift keying (BPSK) in the 868/915 MHz bands and offset quadrature phase shift keying (O-QPSK) at 2.4 GHz. Both are robust and simple forms of modulation that work well in low SNR environments.

The information is coded onto the carrier with direct sequence spread spectrum (DSSS), an inherently robust method of improving multipath performance and receiver sensitivity through signal processing gain. The receiver sensitivity and selectivity is well suited for inexpensive silicon processes, with most vendors promising to meet or beat the standard. The size of the data payload ranges from 0 to 104 bytes, more than enough to meet most sensor needs. Figure 3 shows the construction of the data frame, also called a data packet.

Figure 3.

 The data packet is one of four packet structures provided in 802.15.4/ZigBee. In the MAC protocol data unit, the data payload is appended with source and destination addresses, a sequence number to allow the receiver to recognize that all packets transmitted have been received, frame control bytes that specify the network environment and other important parameters, and finally a frame check sequence that lets the receiver verify that the packet was received uncorrupted. This MAC frame is appended to a PHY synchronization and PHY header, which provides a robust mechanism for the receiver to quickly recognize and decode the received packet.



After receiving a data packet, the receiver performs a 16-bit cyclic redundancy check (CRC) to verify that the packet was not corrupted in transmission. With a good CRC, the receiver can automatically transmit an acknowledgement packet (depending on application and network needs), allowing the transmitting station to know that the data were received in an acceptable form. If the CRC indicates the packet was corrupt, the packet is dropped and no acknowledgement is transmitted. When a developer configures the network to expect acknowledgement, the transmitting station will retransmit the original packet a specified number of times to ensure successful packet delivery. If the path between the transmitter and receiver has become less reliable or a network failure has occurred, ZigBee provides the network with self-healing capabilities when alternate paths (if physically available) can be established autono-mously.

Battery Life

In many applications, you can’t afford to make regular trips back to a sensor to change the battery. Ideally, the sensor is good for the life of the battery.

The basic 802.15.4 node is fundamentally efficient in terms of battery performance. You can expect battery lifetimes from a few months to many years as a result of a host of system power-saving modes and battery-optimized network parameters, such as a selection of beacon intervals, guaranteed time slots, and enablement/disablement options.

Consider a typical security application, such as a magnetic reed switch door sensor. The sensor itself consumes almost no electricity; it’s the radio that uses the bulk of the power. The sensor is configured to have a “heartbeat” at 1 min. intervals and to immediately send a message when an event occurs. Assuming dozens of events per day, analysis shows that the sensor can still outlast an alkaline AAA battery. The configuration allows the network to update the sensor parameters remotely, change its reporting interval, or perform other remote functions and still have (theoretical) battery longevity well beyond the shelf life.

The network configuration plays an important part in the equation; most networks are expected to be stars or cluster trees rather than true meshes (see Figure 4), allowing the individual client devices to conserve battery energy.

Figure 4.
 Star networks are the most common, basic structure with broad utility. For larger physical environments, the cluster tree is a good way to aggregate multiple basic star networks into one larger network. Some applications will make best use of the mesh structure, which provides alternate route flexibility and the capability for the network to heal itself when intermediate nodes are removed or RF paths change.



Nodes that form the hubs or coordinator routes in the cluster tree can take advantage of beacon-based operation for synchronization across a widely dispersed network with only moderate impact on their own battery life.

Cost

System, individual node, service, and battery costs are all important. ZigBee and 802.15.4 maximize utility over this multidimensional space. There is sufficient flexibility in both standards to provide the sensor system developer with an assortment of tradeoffs to optimize cost with respect to system performance. For example, battery life can be optimized at the expense of service interval, and node cost and complexity can be traded for network complexity.

First-generation silicon is only now getting to the early adopters, and the system simplicity and the underlying flexibility of 802.15.4 promise that system developers will find ZigBee-based platforms more cost effective (at the same unit volumes) than Bluetooth or proprietary bidirectional wireless solutions. While platform hardware cost is always a critical part of the overall system cost, you must also consider the less tangible costs of system maintenance, flexibility, and battery life.

Transmission Range

ZigBee relies on the basic 802.15.4 standard to establish radio performance. As a short-range wireless standard, 802.15.4 doesn’t try to compete with high-powered transmitters but instead excels in the ultra-long battery life and low transmitter power. The standard specifies transmitter output power at a nominal –3 dBm (0.5 mW), with the upper limit controlled by the regulatory agencies of the region in which the sensor is used. At –3 dBm output, single-hop ranges of 10 to more than 100 m are reasonable, depending on the environment, antenna, and operating frequency band.

Instead of pure power, ZigBee augments the basic 802.15.4 simple transmitter and protocol with an extensible, sophisticated network function that allows multi-hop and flexible routing, providing communication ranges that can exceed the basic single-hop. Indeed, depending on the data latency re-quirements, you can practically create networks that use dozens of hops, with cumulative ranges inthe hundreds to thousands of meters. Networks can have star, cluster tree, or mesh structures; each comes with its own strengths.

Data Rate

It may not be obvious why a simple temperature or intrusion sensor needs to transmit data at 250 Kbps (at 2.4 GHz) or even 20 Kbps (at 868 MHz), but the reason becomes clear when you consider the need to prolong battery life. Even when the sensor is transmitting only a few bits or bytes, the system can be more efficient if it transmits and receives the data quickly. For instance, a 0.5 mW transmitter consumes many milliwatts whether it’s transmitting 100 or 100,000 bps. For any given quantity of data, transmitting at a higher data rate allows the system to shut down the transmitter and receiver more quickly, saving significant power.

Higher data rates at a given power level mean there’s less energy per transmitted bit, which generally implies reduced range. But both 802.15.4 and ZigBee value battery life more than raw range and provide mechanisms to improve range while always concentrating on battery life.
Data Latency

Sensor systems have a broad range of data-latency requirements. If sensor data are needed within tens of milliseconds, as op-posed to dozens of seconds, the requirement places different demands on the type and extent of the intervening network. For many sensor applications, data latency is less critical than battery life or data reliability.

For simple star networks (many clients, one network coordinator), ZigBee can provide latencies as low as ~16 ms in a beacon-centric network, using guaranteed time slots to prevent interference from other sensors. You can further reduce latencies to several milliseconds if you forego the beacon environment and are willing to risk potential interference from accidental data collision with other sensors on the network.

Data latency can also affect battery life. Generally, if you relax data-latency requirements, you can assume that the battery life of the client nodes will increase. This is even truer of network hubs, which are required to coordinate and supervise the network.

Consider a simple network that has de-manding latency requirements (e.g., a wireless computer keyboard and mouse). The user expects that a keyboard stroke or mouse movement will be reflected on screen in one or two screen-refresh intervals, generally between 16 and 32 ms. For this kind of star network, you can achieve data latency that beats this requirement.
Size

As silicon processes and radio technology progress, transceiver systems shrink in physical size. Forty years ago, a simple radio transceiver was the size of a shoebox and weighed 10 kg. Today, a similar transceiver might easily fit inside a thimble. In the case of ZigBee systems, the radio transceiver has become a single piece of silicon, with a few passive components and a relatively noncritical board design.

Microcontrollers that have native ability to interface with sensors (e.g., built-in digital I/O and A/D converters) have eclipsed even the radio’s rapid reduction in size. Today, the 8-bit MCU that hosts the application may already include dozens of kilobytes of flash memory, RAM, and various hardware-based timer functions, along with the ability to interface directly to the radio transceiver IC. The MCU requires only a few external passive components to be fully functional.

With the minimal overhead added by a ZigBee transceiver, the MCU can often continue to host the application along with the ZigBee protocol. Therefore, the silicon system size of a ZigBee solution (excluding sensors or batteries) is generally smaller than the batteries themselves. This compact form factor lends itself well to innovative uses of radio technology in sensor applications. Cer-tainly, with the advances in silicon-based sensors that have been coming to market over the past five years, it’s practical to design entire systems that take up <10%–20% of the volume of current-generation batteries. In-tegration is the key here, and even higher levels of integration are planned for future ZigBee and 802.15.4 platforms.

Data Security

It’s important to provide your sensor network with adequate security to prevent the data from being compromised, stolen, or tampered with. IEEE 802.15.4 provides authentication, encryption, and integrity services for wireless systems that allow systems developers to apply security levels as required. These include no security, access control lists, and 32-bit to 128-bit AES encryption with authentication. This security suite lets the developer pick and choose the security necessary for theapplication, providing a manageable tradeoff against data volume, battery life, and system processing power requirements. The IEEE 802.15.4 standard doesn’t provide a mechanism for moving security keys around a network; this is where ZigBee comes in.

The ZigBee security toolbox consists of key management features that let you safely manage a network remotely. For those systems where data security is not critical (e.g., a set of sensors monitoring microclimates in a forest), you may decide not to implement security features but instead optimize battery life and reduce system cost. For the developer of an industrial or military perimeter security sensor system, data security—and more importantly the ability to defend against sensor masking or spoofing—may have the higher priority. In many ZigBee-approved applications, security will already be a seamless part of the overall system.

Conclusion

ZigBee and the underlying 802.15.4 communications technology could form the basis of future wireless sensors, offering data reliability, long battery life, lower system costs, and good range through flexible networking. IEEE 802.15.4 is ready for release, and the ZigBee network, security, and profile specifications are scheduled to be released latter in the year. The first products are expected in the first half of 2004. ZigBee membership is open to all.

Friday, July 19, 2013

Password Pill


Password Pill -- Seminar Topic

Introduction:

Motorola Advanced Technology and Projects Group Chief Regina Dugan disclosed over the weekend at the D11 conference that the tech firm is working on electronic tattoo or implantable chips that would make the human body the tool for identification.

"Authentication is irritating. So irritating that only about half the people do it even though there's a lot of information about you on your smart phone," said Ms Dugan, who was a former Defense Advanced Research Projects Agency head.

Motorola is working with mc10, a relatively unknown tech firm, to develop the flexible tattoo technology or epidermal electronics which is made up of various sensors and gages to track multiple directions, electrical impulses in the skeletal structure or nerves, heart activity, temperature and light.

Why Password Pill?

The most annoying part of the internet is probably the fact that you have to memorize close to a dozen passwords to get to all your bank accounts and credit cards and social media profiles. And if you're lazy and just use one, then it's the worry that if one of those accounts gets hacked, it could easily be all of them.

Motorola thinks it has a solution to the password problem. At Wall Street's annual digital technology conference D11, Motorola announced their plans to create a pill that would serve as a password for all your accounts. What does that mean? You would provide Motorola with your password information and they would create a custom pill that had a tiny electronic chip inside it. That chip would basically turn your entire body into an authentication device, and you would theoretically never have to remember another password in your life. Naturally, the pill would pass through your body in about 24 hours, so you would have to take the pill on a daily basis.

“Electronics are boxy and rigid, and humans are curvy and soft,” Dugan said. So how can a password be more accessible by becoming more like a human body? Perhaps you attach it to the skin as a tattoo, or you swallow it as a pill. And this is less science fiction than reality, at least in Motorola’s lab and on the D11 stage, where Dugan showed off both products.

Working:

MC10 is a company that makes “stretchable circuits” that can be used for skullcaps to detect concussions in sports, or baby thermometers that constantly track an infant’s vitals. In the form of a temporary tattoo, the technology can attach an antenna and sensors directly on the body.

The key MC10 insight is “islands of silicon connected by accordion-like structures to stretch up to 200 percent and still perform,” Dugan said.
IMGS7774-X2
Dugan demos the password tattoo.
Dugan said Motorola is working with MC10 on a tattoo for authentication, and she showed a prototype on her own arm.

This was not some obscure research Motorola plucked out of the air. Earlier this year, MC10 completed an $18 million Series C round from investors including Medtronic and North Bridge Venture Partners.

Dugan is also working with a company called Proteus Digital Health that already has FDA clearance for an ingestible sensor as a medical device. She wants to use it for passwords, too.

“This pill has a small chip inside of it, with a switch. It also has what amounts to an inside-out potato battery,” she said. “When you swallow it, the acids in your stomach serve as the electrolyte, and they power it up and the switch goes on and off and it creates an 18-bit ECG-like signal in your body. Essentially, your entire body becomes your authentication token.”

Once swallowed, Dugan said, “it means that my arms are like wires, my hands are like alligator clips — when I touch my phone, my computer, my door, my car, I’m authenticated in. It’s my first super power. I want that.”
IMGS7779-X2
Walt Mossberg holds the password pill.
Proteus, by the way, is also pretty far along. It said last month that it had raised $62.5 million in Series F financing from investors including Oracle, Medtronic and Novartis.

Onstage, Dugan said that it would be medically safe to ingest 30 of these pills every day for the rest of your life, and that the only thing the pill exposes about its swallower is whether or not it has been taken.

“We have demoed this working and authenticating a phone,” added Dugan’s boss, Motorola head Dennis Woodside. “This isn’t stuff that’s going to ship anytime soon, but I think having the boldness to think differently about problems that everybody has everyday is really important for Motorola now.”

Reference:



Thursday, May 30, 2013

Wireless sensor network

Wireless sensor network

Wireless Sensor Networks (WSN) are an emerging and very interesting technology applied to different applications. They are formed by small, self organized devices that cooperate to form a large scale network with thousands of nodes covering a large area. The independent operation of the devices and the self-organization feature of the network present some challenges related to security, particularly regarding the security of the processed and routed data over the network.
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. There is currently enormous research potential in the field of wireless sensor network security. Thus, familiarity with the current research in this field will benefit researchers greatly. With this in mind, we survey the major topics in wireless sensor network security, and present the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures.

Tuesday, February 19, 2013

Multi-monitor


Multi-monitor - seminar topic


Abstract:

Flight Simulator's ability to display multiple windows on more than one monitor at a time creates a more realistic cockpit environment. You can use a center monitor to display the aircraft instrument panel and the outside view ahead of the cockpit, and use another monitor to display the radio stack, throttle quadrant, GPS, or any of the other windows available in the Views menu.

Multi-monitor, also called multi-display and multi-head, is the use of multiple physical display devices, such as monitors, televisions, and projectors, in order to increase the area available forcomputer programs running on a single computer system. The use of two such displays is called dual display, dual screen or dual monitor.

dual monitor video card

A dual monitor video card is a graphical input device that allows more than one monitor to be connected to a single computer. It is typically a specialized form of video card, or graphics card, that is installed inside the computer tower to the motherboard. A dual monitor video card will typically work with a computer’s operating system (OS) and other programs to allow enhanced usage and features across multiple monitors. This often includes an expanded desktop across monitors, different windows and features across the two monitors, and interactivity between the monitors.

The basic set up of a dual monitor video card system will usually involve a single computer, with one graphics card, and two or more monitors connected to that machine. While the name tends to indicate a video card that can allow two monitors, there are also devices that can allow six or more monitors. In the past, this type of setup was often used to create a system where multiple screens would display the same image, creating “clones” of each other and often utilized for presentations and displays across different monitors. A dual monitor video card can now be used to create different images on each screen, to allow for unique features and options for users.


There are a number of different types of applications that can take advantage of a dual monitor video card, including basic OS operations and specialized software such as financial programs and programming software. When used with a computer’s OS, the video card can allow the basic desktop to be expanded across the two monitors. This means that when moving a mouse to one side of one of the monitors, it will disappear then appear at the side of the other monitor, as though they were a single screen with no separation. A user can thereby work on two monitors simultaneously, allowing two applications to run in “full screen” on each monitor.

The applications do not usually run in true full screen with a dual monitor video card setup, as the system recognizes both monitors as a single screen. The window or program would then stretch between both monitors. Instead of true full screen, the system is run with each application windowed but displayed to basically fill the screen.

This use of a dual monitor video card can allow someone to run an application on one screen while monitoring financial information on the other. A user could also write code for programming on one screen, while running debugging routines on the other. Some computer games can even allow a player to use two screens, displaying the game field on one screen, and other pertinent information such as maps, players, or virtual inventory on the other.


Monday, January 14, 2013

Blue Brain

Blue Brain

Abstract
This is a modest review of a couple of papers devoted to an examination of neural specificity and invariance among microcircuits in neocortical columns and minicolums, and the loci of experience dependent plasticity and learning within and between these microcircuits. It focuses on somatosensory cortex, but the appendix covers visual research as well on some of the early work on these issues, from Stratton, to Sperry, Hebb, Mountcastle, Hubel and Wiesel, and T. A. Woolsey and Van der Loos. It starts with a paper from Markram’s group on the invariant properties of the microcircuits, and conjectures on a segue form Hebb to Edleman’s Darwinian brain theories. Next I review Petersen’s paper on neurophysiological studies of experience dependent plasticity in these systems. Some network theory has proved essential to research in these areas, as well as some nifty technical advances in neurophysiological stimulation and recording.

Introduction
Human brain, the most valuable creation of God. The man is called intelligent because of the brain .Today we are developed because we can think, that other animals can not do .But we loss the knowledge of a brain when the body is destroyed after the death of man. That knowledge might have been used for the development of the human society. What happen if we create a brain and up load the contents of natural brain into it.
         “Blue brain” –The name of the world’s first virtual brain. That means a machine   that can function as human brain.  Today scientists are in research to create an artificial brain that can think, response, take decision, and keep anything in memory. The main aim is to upload human brain into machine. So that man can think, take decision without any effort. After the death of the body, the virtual brain will act as the man .So, even after the death of a person we will not loose the knowledge, intelligence, personalities, feelings and memories of that man that can be used for the development of the human society.  No one has ever understood the complexity of human brain. It is complex than any circuitry in the world. So, question may arise “Is it really possible to create a human brain?” The answer is “Yes”. Because what ever man has created today always he has followed the nature. When man does not have a device called computer, it was a big question for all .But today it is possible due to the technology. Technology is growing faster than every thing.  IBM is now in research to create a virtual brain. It is called “Blue brain “.If possible, this would be the first virtual brain of the world.


What is Virtual Brain?
We can say Virtual brain is an artificial brain, which does not actually the natural brain, but can act as the brain .It can think like brain, take decisions based on the past experience, and response as the natural brain can. It is possible by using a super computer, with a huge amount of storage capacity, processing power and an interface between the human brain and this artificial one .Through this interface the data stored in the natural brain can be up loaded into the computer .So the brain and the knowledge, intelligence of anyone can be kept and used for ever, even after the death of the person.


Why we need virtual brain?
Today we are developed because of our intelligence. Intelligence is the inborn quality that can not be created .Some people have this quality ,so that they can think up to such an extent where other can not reach .Human society is always need of such intelligence and such an intelligent brain to have with. But the intelligence is lost along with the body after the death. The virtual brain is a solution to it. The brain and intelligence will alive even after the death.
          We often face difficulties in remembering things such as people's names, their birthdays, and the spellings of words, proper grammar, important dates, history facts, and etc. In the busy life every one want to be relaxed .Can not we use any machine to assist for all these? Virtual brain may be the solution to it. What if we upload ourselves into computer, we were simply aware of a computer, or maybe, what if we lived in a computer as a program?


How it is possible?
              First, it is helpful to describe the basic manners in which a person may be uploaded into a computer. Raymond Kurzweil recently provided an interesting paper on this topic. In it, he describes both invasive and noninvasive techniques. The most promising is the use of very small robots, or nanobots. These robots will be small enough to travel throughout our circulatory
systems. Traveling into the spine and brain, they will be able to monitor the activity and structure of our central nervous system. They will be able to provide an interface with computers that is as close as our mind can be while we still reside in our biological form. Nanobots could also carefully scan the structure of our brain, providing a complete readout of the connections between each neuron. They would also record the current state of the brain. This information, when entered into a computer, could then continue to function as us. All that is required is a computer with large enough storage space and processing power. Is the pattern and state of neuron connections in our brain truly all that makes up our conscious selves? Many people believe firmly those we posses a soul, while some very technical people believe that quantum forces contribute to our awareness.
                    But we have to now think technically. Note, however, that we need not know how the brain actually functions, to transfer it to a computer. We need only know the media and contents. The actual mystery of how we achieved consciousness in the first place, or how we maintain it, is a separate discussion.


 people who think that humans telling the machines what to do is totally backwards. Henry Markram, director of the Blue Brain Project, says we are ten years away from a functional artificial human brain. The Blue Brain project was launched in 2005 and aims to reverse engineer the mammalian brain from laboratory data.
Reconstructing the brain piece by piece and building a virtual brain in a supercomputer—these are some of the goals of the Blue Brain Project. The virtual brain will be an exceptional tool giving neuroscientists a new understanding of the brain and a better understanding of neurological diseases. The Blue Brain project began in 2005 with an agreement between the EPFL and IBM, which supplied the BlueGene/L supercomputer acquired by EPFL to build the virtual brain. The human brain is an immensely powerful, energy efficient, self-learning, self-repairing computer. If we could understand and mimic the way it works, we could revolutionize information technology, medicine and society. To do so we have to bring together everything we know and everything we can learn about the inner workings of the brain’s molecules, cells and circuits. With this goal in mind, the Blue Brain team has recently come together with 12 other European and international partners to propose the Human Brain Project (HBP), a candidate for funding under the EU’s FET Flagship program.
The computing power needed is considerable. Each simulated neuron requires the equivalent of a laptop computer. A model of the whole brain would have billions. Supercomputing technology is rapidly approaching a level where simulating the whole brain becomes a concrete possibility. Abstract | IBM’s Blue Gene supercomputer allows a quantum leap in the level of detail at which the brain can be modelled. Henry Markram’s team has perfected a facility that can create realistic models of one of the brain’s essential building blocks. This process is entirely data driven and essentially automatically executed on the supercomputer. Meanwhile the generated models show a behavior already observed in years of neuroscientific experiments. These models will be basic building blocks for larger scale models leading towards a complete virtual brain.Models of the brain will revolutionize information technology, allowing us to design computers, robots, sensors and other devices far more powerful, more intelligent and more energy efficient than any we know today. Brain simulation will help us understand the root causes of brain diseases, to diagnose them early, to develop new treatments, and to reduce reliance on animal testing. The project will also throw new light on questions human beings have been asking for more than two and a half thousand years. What does it mean to perceive, to think, to remember, to learn, to know, to decide? What does it mean to be conscious? In summary, the Human Brain Project has the potential to revolutionize technology, medicine, neuroscience, and society.


Blue Brain Seminar Report 
Refernce:
http://www.ijaiem.org/Volume2Issue3/IJAIEM-2013-03-28-091.pdf
Blue-Brain-Ppt.pdf
BLUE-BRAIN PPT
BLUE BRAIN PPT
Blue BrainTechnology PPT
BLUE-BRAIN PPT
BLUE BRAIN

Sunday, January 13, 2013

Wireless Chargers (Inductive charging)

Abstract:

Wireless battery charging or wireless inductive charging as it is also called, is a method for transferring electrical energy from a charger to a device without the need for a physical wire connection.
Wireless battery charging has many advantages in terms of convenience because users simply need to place the device requiring power onto a mat or other surface to allow the wireless charging to take place.


Refer Links:

What Is Wireless Charging?


Situations often occur in which it is inconvenient to bring along a regular battery charger for many popular electronic items, such as cell phones, laptop computers, and portable music devices. Solving this issue is what the concept of wireless charging strives to do. As many might guess from the very name, this type of technology allows myriad electronics to charge without having wires attached. Another aspect of the idea that is often convenient for many people is the fact that most wireless chargers are able to charge nearly any device, not just a specific kind. This means that only one charger usually is needed to charge a cell phone, MP3 player, laptop, or other small mechanism that runs on electricity.
Though wireless charging is likely convenient for many, the majority of people do not understand the concept, which usually involves inductive charging. The main power behind this kind of device is electromagnetic induction, which involves making a magnetic field that does not leave the charger like most wired products do. Instead, the field flows parallel to the surface of the charger, spreading magnetic force across the entire device. Due to this action, a thin receiver coil is created within the charger, so that there are two coils instead of the usual one. The small gap between the two coils makes it possible for an electrical transformer to be created, so it does not need an outlet to obtain power.

How does wireless charging work?

To appreciate the practical difficulties in transmitting power without wires, it helps to know a little about how electricity works. When an electrical current flows down a conductor, it generates a magnetic field, orientated at right angles to the conductor.

By creating a coil, the magnetic field is amplified and if a second coil is placed within the magnetic field of the first, then an electric current will be generated in the second coil, a process known as induction.

However, because the size of the magnetic field is proportional to the energy of the current running through the coil, and the fact that inductance over distance is a fairly inefficient transfer method, the two coils have to be placed in close proximity.

In an electric toothbrush, for instance, the two coils are less than 10mm apart. In order to increase the distance between the coils, both the size of the coils and the amount of current flowing through them, has to be significantly increased, although because the magnetic fields radiate in all directions, efficiency decreases.

Is increased resonance the answer?

One way to increase the efficiency and distance over which induction can occur, is to use resonance. Every object has a frequency at which it will naturally vibrate, called its resonant frequency. Researches at MIT discovered that if you enable the coils and fields to resonate at the same frequency, it increases the efficiency of the induction and were able to demonstrate this principle by using resonating coils to power a light bulb, over a distance of two meters.

With this sort of distance, the idea of being able to walk into a room and whatever gadgets you are carrying are immediately able to receive power from a transmitter buried in the wall or ceiling starts to gain some traction. Unfortunately, even though MIT demonstrated the principle nearly six years ago, the technology is still very much in the development stage.
Intel has also demonstrated resonant power transmission, but as can be seen the coil size needed for a light bulb is huge
Intel has also demonstrated resonant power transmission, but as can be seen the coil size needed for a light bulb is huge

Using larger induction coils is one way in which to increase transmission distance. In the MIT experiment, for instance, the coils were 60cm in diameter, but only about 45 per cent of the power was transmitted at two meters. With portable electronics, their size and the amount of free space within the casing is a major limiting factor.

An electric toothbrush is only used for a few minutes a day and spends the rest of the time being charged, so can have quite small coils. However, a smartphone has a very high capacity battery and using a standard charger, needs to achieve full charge in one or two hours.

Charging up vehicles

One area where the size of the coil doesn't really matter is in vehicles. Using specially built inductive roadways, trials have been run which enable an electric car or bus to receive power as it travels along the road. Wireless charging points built into bus stops and parking bays have also been successfully used to recharge on-board batteries, but it's still less efficient than physically plugging a cable in.

WiTricity is one company that markets wireless charging solutions for the automotive market. The company has also demonstrated its inductive resonance technology wirelessly powering a television as well as a number of mobile phones, is supplying its technology to OEMs and believes the first products should be on the market this year.
WiTricity's system enables electric vehicles to be charged without wires, delivering 3.3kW of power
WiTricity's system enables electric vehicles to be charged without wires, delivering 3.3kW of power

There already some products on the market, such as Duracell's Powermat, which doesn't use the resonance technique, so is much shorter range. In addition, devices such as mobile phones don't yet have induction coils built in and so have to be fitted with special cases containing the necessary circuitry.

However, if there's one sign that a technology is becoming more mainstream, it's when car manufacturers start to adopt it. Chrysler has announced that in 2013, its Dodge Dart car will have the option for a wireless charging bin. As devices to be charged will require special sleeve or cases, it's not clear if this is a bespoke Powermat solution, or something else, but the option to do away with a wired cigarette lighter adapter is certainly a welcome move. The $200 price tag may be a bit much to swallow though!
Chrysler will be adding an optional wireless charging system to the Dodge Dart in 2013
Chrysler will be adding an optional wireless charging system to the Dodge Dart in 2013
It seems that the technology still has quite a way to go, before it becomes an attractive proposition. Duracell has been refining the Powermat technology and has a vision where tables in bars or cafes have embedded wireless charging points. A lot of people leave their phone on the table when they are out socialising, so why not top up the battery while you're at it? However, so long as you need to add a case of sleeve to your device, the appeal of wireless charging is limited.

Ironically, some phones such as the Samsung S3, already contain part of the technology needed for wireless charging and it's even built into the battery. RFID, or Near Field Communication (NFC) uses very similar principles, in that a coil in the phone's battery, induces a current in the chip that you are trying to read, which then has enough power to transmit back the required information.

The history of wireless charging

Wireless charging isn’t a new concept. In fact, it’s been around since the 19th century when physicist Nicolas Tesla came up with the idea of wireless power transfer. It was first demoed by Intel back in 2007, with the idea being that if you can do it safely and efficiently, it would work for the majority of the devices we use every day. The idea of a laptop that people could just keep using and never, ever run out of juice, that could go directly off of wireless power or charge wirelessly? Sounds like something straight out of a sci-fi movie, but if the goal is to eventually have a completely wireless experience, these are just some of the scenarios we could possibly be looking at.
Wireless charging is seen by many as one of the biggest possible advancements we could have for personal computing in this century. Cables – messy, unwieldy, and with a predilection to getting lost at the most inconvenient times – could be a thing of the past in just the next couple of years. In addition to computers, wireless charging could make its way to the automotive industry with electric vehicles, making the charging process virtually automatic.

Two kinds of wireless charging

There are two kinds of wireless charging technologies (WCT): magnetic induction and resonance charging. Basically, the difference is distance: magnetic induction requires that the receiver be in direct contact with the transmitter, or charging device; resonance charging requires that the receiver merely be placed near the transmitter for charging.
Eventually,  the technology is aiming towards an Ultrabook coming pre-built with WCT detection software, enabling users to merely place their smartphones or tablets in the vicinity of their Ultrabooks and charge away (near field communication, or NFC). This would be in a “BE-BY” configuration, whereby two different devices don’t necessarily have to be touching in order to exchange energy, as opposed to a “BE-ON” configuration.
As debuted at IDF 2012, the Ultrabook transmitter recharging configuration will actually take up very little space (21 cm ², 7 cm x 3 cm x 5 mm) within the form factor. On the receiver side, we’re talking even smaller 5.6 cm ²), so definitely no chance of our smartphones, tablets, or mice getting bigger all of a sudden. 
Intel and IDT
Integrated Device Technology (IDT) will be developing and delivering integrated transmitter and receiver chipsets for Intel’s Wireless Charging Technology based on resonance charging technology, targeted for deployment within Ultrabooks, PCs, smartphones, and the plethora of other standalone devices (like Smart Watches) out there on the market.  
Now, this isn’t necessarily limited to inductive charging or smartphones/tablets on a charging mat usage; Intel is working with IDT, vendors (smartphones, printers, cameras, and much more), OEMs, and other partners to make WCT a completely non-touch-based reality for the devices we use every single day.  Intel is definitely putting its money on wireless charging, and plans to build the technology into Ultrabooks by 2013, implementing transmitters into these machines with receivers built within a range of devices using Intel’s own chips. 
Ultrabooks and WCT
As detailed by Intel execs this past week at IDF 2012, the battery life of Ultrabooks will be greatly increased with Intel’s upcoming Haswell processors.   Battery life will be essentially doubled, with battery life of up to ten hours for Ultrabooks, even more (12 hours or more) in the case of convertible Ultrabooks. Ultrabooks with Haswell configurations will also feature wireless charging and NFC capabilities, making that move to no cords even more of a reality.

Wireless battery charging basics

Wireless battery charging uses an inductive or magnetic field between two objects which are typically coils to transfer the energy from one to another. The energy is transferred from the energy source to the receiver where it is typically used to charge the battery in the device.
This makes wireless charging or inductive charging ideal for use with many portable devices such as mobile phones and other wireless applications. However they have also found widespread use in products such as electric toothbrushes where cordless operation is needed and where connections would be very unwise and short-lived.
The system is essentially a flat form of transformer - flat because this makes it easier to fit into the equipment in which it is to be used. Many wireless battery charging systems are used in consumer items where small form factors are essential.
Wireless battery charging concept
Wireless battery charging concept
The primary side of the transformer is connected to the energy supply that will typically be a mains power source, and the secondary side will be within the equipment where the charge is required.
In many applications the wireless battery charging system will consist of two flat coils. The power source is often contained within a pad or mat on which the appliance to be charged is placed.

Wireless battery charging advantages / disadvantages

As with any system, there are both advantages and disadvantages to wireless battery charging systems.

ADVANTAGESDISADVANTAGES
  • Convenience - it simply requires the appliance needing charging to be placed onto a charging area.
  • Reduced wear of plugs and sockets - as there is no physical connection, there are no issues with connector wear, etc. Physically the system is more robust than one using connectors.
  • Resilience from dirt - some applications operate in highly contaminated environments. As there are no connectors, the system is considerably more resilient to contamination
  • Application in medical environments - using wireless charging no connectors are required that may harbour bacteria, etc.. This makes this solution far more applicable for medical instruments that may require to be battery powered.
  • Added complexity - the system requires a more complicated system to transfer the power across a wire-less interface
  • Added cost - as the system is more complicated than a traditional wired system, a wireless battery charger will be more expensive
  • Reduced efficiency - there are losses on the wireless battery charging system - resistive losses on the coil, stray coupling, etc. However typical efficiency levels of between 85 - 90% are normally achieved.

Wireless charging has now become a mainstream technology. Initially it was a novelty, but with its applications and advantages becoming recognised, it has now become a mainstream application. It is anticipated that wireless battery charging will become very widespread, if not the most common method.
With standardised interfaces and techniques, only a single wireless battery charger will be required to charge a variety of items. No longer will a whole myriad of chargers be required. Also reliability and convenience will be improved as it is far easier to place the item to be charged on the charging mat, rather than having to use a small connector.
Although the efficiency of wireless battery charging is less than that using direct connections, the added intelligence could reduce the end of charge current, thereby reducing the overall power consumption as many normal chargers are left connected even when they are not charging
The obvious advantage of wireless charging is the ability to place electronics on a wireless charger device, rather than take a cell phone charger, laptop charger, or other type of charger everywhere in case the batteries run out of charge. Another less known benefit of wirelesscharging is that such chargers can be placed near water when necessary. This is because all the parts are enclosed, with no wires sticking out, so some electric razors or toothbrushes come with wireless chargers for the sake of safety. Additionally, the majority of wireless chargers can sense how much power each type of electronic device needs, so batteries are not typically overcharged.

One disadvantage of the ability to charge electronics wirelessly is the typically higher cost when compared to wired chargers. To get the most efficient wireless charging devices, it is often necessary to spend a lot of money, which usually results in the latest charger. Otherwise, older wireless chargers are frequently found to be slower at charging. They also often generate more heat than wired chargers, which can be considered a danger despite the somewhat smaller chances of electric shock when it comes to wireless charging devices.