Wouldn’t you love to replace password based access control to avoid having to reset forgotten password and worry about the intergrity of your system? Wouldn’t you like to rest secure in comfort that your healthcare system does not merely on your social security number as proof of your identity for granting access to your medical records? Because each of these questions is becoming more and more important, access to a reliable personal identification is becoming increasingly essential .Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. ID cards can be lost forged or misplaced; passwords can be forgotten or compromised. But a face is undeniably connected to its owner. It cannot be borrowed stolen or easily forged. More ....
--------------------------------------------------------------------------------
10. Free space optics
Free space optics ( FSO ) is a line-of-sight technology that currently enables optical transmission up to 2.5 Gbps of data, voice, and video communications through the air , allowing optical connectivity without deploying fiber optic cables or securing spectrum licenses. FSO system can carry full duplex data at giga bits per second rates over Metropolitan distances of a few city blocks of few kms. FSO, also known as optical wireless, overcomes this last-mile access bottleneck by sending high –bitrate signals through the air using laser transmission. More ....
--------------------------------------------------------------------------------
11. Image authentication techniques
Automatic video surveillance (AVS) systems are used for continuous and effective monitoring of dangerous and remote sites. Video data acquired by the automatic video surveillance system can be recorded and presented as a proof in front of court law. But digital video data lacks legal validity due to the ease to manipulate them without leaving any trace of modification. Image authentication is the process of giving a legal validity to the video data. By authentication technique content tampering can be detected and we can indicate the true origin of the data. There are two types of authentication schemes, which are
1. Cryptographic data authentication.
2. Watermarking-based authentication.
In this presentation an attempt is made to present the basic features of the image authentication techniques. More....
1. Cryptographic data authentication.
2. Watermarking-based authentication.
In this presentation an attempt is made to present the basic features of the image authentication techniques. More....
--------------------------------------------------------------------------------
12. Integrated power electronic module
IPEM is an improved power processing technology through advanced integration of power electronics components. It provides high frequency synthesis, resulting in important improvements in performance, size, and cost.
Currently, assemblies of power semiconductor switches and their associated drive circuitry are available in modules. Though the module contains a small size power switching part, the associated control, sensing, electro magnetic power passives and inter connect structures are very bulky. In IPEM, the reduction in size and weight is provided by planar metalization that allows 3-D integration of power devices and power passives to increase the power density.
This paper addresses the improvements of power processing technology through advanced integration of power electronics. The fundamental functions in electronic power processing, the materials, processes, and integration approaches and future concepts are explained. More ....
Currently, assemblies of power semiconductor switches and their associated drive circuitry are available in modules. Though the module contains a small size power switching part, the associated control, sensing, electro magnetic power passives and inter connect structures are very bulky. In IPEM, the reduction in size and weight is provided by planar metalization that allows 3-D integration of power devices and power passives to increase the power density.
This paper addresses the improvements of power processing technology through advanced integration of power electronics. The fundamental functions in electronic power processing, the materials, processes, and integration approaches and future concepts are explained. More ....
--------------------------------------------------------------------------------
Previous----------------------------------Next
---------------------------------------------------
No comments:
Post a Comment