Computer Engineeringelectronics Engineering Civil Engineering |
Today faster and cheaper computer processors make robots smarter and less expensive. Researchers are working to make robots move and
|
Computer Engineeringelectronics Engineering Civil Engineering |
Today faster and cheaper computer processors make robots smarter and less expensive. Researchers are working to make robots move and
|
Adaptive Brain Interfaces (ABI) is a part of European Union Information Technology |
Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection derives from studies suggesting that persons asked to lie show different patterns of brain activity than they do when being truthful. Issues related to the use of such evidence in courts are discussed. The author concludes that neither approach is currently supported by enough data regarding its accuracy in detecting deception to warrant use in court. Dr. Lawrence A. Farwell has invented, developed, proven, and patented the technique of Farwell Brain Fingerprinting, a new computer-based technology to identify the perpetrator of a crime accurately and scientifically by measuring brain-wave responses to crime-relevant words or pictures presented on a computer screen. Farwell Brain Fingerprinting has proven 100% accurate in over 120 tests, including tests on FBI agents, tests for a US intelligence agency and for the US Navy, and tests on real-life situations including actual crimes. In the field of criminology, a new lie detector has been developed in the United States of America. This is called |
The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation) systems and to provide a wide variety of new services, from high-quality voice to high-definition video to high-data-rate wireless channels. The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms used to describe 4G is MAGIC |
DTH is a new technology and it has matured to its full potential in other parts of the world. There are many application has been found everyday for exploitation of benefits of DTH? The word |
As corporations move rapidly toward deploying e-business systems, the lack of business intelligence facilities in these systems prevents decisionmakers from exploiting the full potential of the Internet as a sales, marketing, and support channel. To solve this problem, vendors are rapidly enhancing their business intelligence offerings to capture the data flowing through e-business systems and integrate it with the information that traditional decision-making systems manage and analyze. These enhanced business intelligence |
This paper discusses the basic concepts and current state of development of EUV lithography (EUVL), a relatively new form of lithography that uses extreme ultraviolet (EUV) radiation with a wavelength in the range of 10 to 14 nanometers (nm) to carry out projection imaging. Currently, and for the last several decades, optical projection lithography has been the lithographic technique used in the high-volume manufacture of integrated circuits. It is widely anticipated that improvements in this technology will allow it to remain the semiconductor industry's workhorse through the 100 nm generation of devices. However, some time around the year 2005, so-called Next-Generation Lithographies will be required. EUVL is one such technology vying to become the successor to optical lithography. This paper provides an overview of the capabilities of EUVL, and explains how EUVL might be implemented. The challenges that must be overcome in order for EUVL to qualify for high-volume manufacture are also discussed. Microprocessors, also called computer chips, are made using a process called lithography. Specifically, deep-ultraviolet lithography is used to make the current breed of microchips and was most likely used to make the chip that is inside your computer. Lithography is akin to photography in that it uses light to transfer images onto a substrate. Silicon is the traditional substrate used in chip making. To create the integrated circuit design that's on a microprocessor, light is directed onto a mask. A mask is like a stencil of the circuit pattern. The light shines through the mask and then through a series of optical lenses that shrink the image down. This small image is then projected onto a silicon, or semiconductor, wafer. The wafer is covered with a light-sensitive, liquid plastic called photoresist. The mask is placed over the wafer, and when light shines through the mask and hits the silicon wafer, it hardens the photoresist that isn't covered by the mask. The photoresist that is not exposed to light remains somewhat gooey and is chemically washed away, leaving only the hardened photoresist and exposed silicon wafer |
Wouldn't you love to replace password based access control to avoid having to reset forgotten password and worry about the intergrity of your system? Wouldn |
Fermi-FET transistor technology can lead to significant improvement in circuit performance, layout density, power requirements, and manufacturing cost with only a moderate alteration of traditional MOSFET manufacturing technology. This technology makes use of a subtle optimization of traditional buried channel technology to overcome the known shortcomings of buried channel while maintaining large improvements in channel mobility. This technology merges the mobility and low drain current leakage of BCA devices as well as the higher short channel effect immunity of SCI devices. This paper highlights aspects of the technology in a non-mathematical presentation to give a sound general understanding of why the technology is the most promising avenue for advanced very short devices. Transistor scaling, a major driving force in the industry for decades, has been responsible for the dramatic increase in circuit complexity. Shorter gate lengths have required lower drain voltages and concurrently lower threshold voltages. Recent CMOS evolution has seen a dramatic reduction in operating voltage as transistor size is reduced. This was due to the maximum field limit on the gate oxide needed to maintain good long-term reliability. Proper selection of the gate material can produce low threshold transistors with off-state performance parameters equivalent to high threshold devices. The Buried Channel Accumulation device, currently being used for p-type transistor processes has the Fermi level at a considerable depth from the gate thereby making it difficult to shut the device off. Attempts to bring the Fermi level up result in severe degradation of device performance. Need for optimization of existing BCA technology arose and Thunderbird Technologies, Inc. delivered! The |
With a 100-year head start over more modern screen technologies, the CRT is still a formidable technology. It |
Within the last two decades, communication advances have reshaped the way we live our daily lives. Wireless communications has grown from an obscure, unknown service to an ubiquitous technology that serves almost half of the people on Earth. Whether we know it or not, computers now play a dominant role in our daily activities, and the Internet has completely reoriented the way people work, communicate, play, and learn. However severe the changes in our lifestyle may seem to have been over the past few years, the convergence of wireless with the Internet is about to unleash a change so dramatic that soon wireless ubiquity will become as pervasive as paper and pen. WiMax |
The birth of every technology is the result of the quest for automation of some form of human work. This has led to many inventions that have made life easier for us. Fractal Robot is a science that promises to revolutionize technology in a way that has never been witnessed before. The principle behind Fractal Robots is very simple. You take some cubic bricks made of metals and plastics, motorize them, put some electronics inside them and control them with a computer and you get machines that can change shape from one object to another. Almost immediately, you can now build a home in a matter of minutes if you had enough bricks and instruct the bricks to shuffle around and make a house! It is exactly like kids playing with Lego bricks and making a toy hose or a toy bridge by snapping together Lego bricks-except now we are using computer and all the work is done under total computer control. No manual intervention is required. Fractal Robots are the hardware equivalent of computer software. |
A Graphics Processing Unit (GPU) is a microprocessor that has been designed specifically for the processing of 3D graphics. The processor is built with integrated transform, lighting, triangle setup/clipping, and rendering engines, capable of handling millions of math-intensive processes per second. GPUs allow products such as desktop PCs, portable computers, and game consoles to process real-time 3D graphics that only a few years ago were only available on high-end workstations. Used primarily for 3-D applications, a graphics processing unit is a single-chip processor that creates lighting effects and transforms objects every time a 3D scene is redrawn. These are mathematically-intensive tasks, which otherwise, would put quite a strain on the CPU. The functional purpose of a GPU then, is to provide a separate dedicated graphics resources, including a graphics processor and memory, to relieve some of the burden off of the main system resources, namely the Central Processing Unit, Main Memory, and the System Bus, which would otherwise get saturated with graphical operations and I/O requests. The abstract goal of a GPU, however, is to enable a representation of a 3D world as realistically as possible. So these GPUs are designed to provide additional computational power that is customized specifically to perform these 3D tasks. |
The need for reduction in highway traffic congestion and crashes has become serious challenges throughout the world. In order to overcome these challenges radars, cameras, sensors and other state-of-art technologies are integrated into vehicle to improve vehicle safety and driver comfort during travel. In addition to safety and traffic efficiency, wireless communication can also be shared by commercial and vehicular infotainment applications to, for instance, improve the occupants driving experience. Intervehicle communication (IVC) is attracting considerable attention from the research community and the automotive industry, where it is beneficial in providing intelligent transportation system (ITS) as well as drivers and passengers |
Java Card is a smart card that is capable of running programs written in Java. A smart card is a credit card sized plastic card with an integrated circuit (IC) inside. The IC contains a microprocessor and memory so the smart card can process and store information. The Java Card platform lets smart card developers standardize on a common card platform. Java Card technology combines a subset of the Java programming language with a runtime environment optimized for smart cards and similar kinds of small-memory embedded devices. The goal of Java Card technology is to bring many of the benefits of Java software programming to the resource-constrained world of smart cards. The Java Card API is compatible with international standards, such as ISO7816, and industry-specific standards, such as Europay/Master Card/Visa (EMV). Java Card is a smart card that is capable of running programs written in Java. For this a new Java platform, Sun's JavaSoft division has made available the Java Card 2.0 API specification, and several licensees are now implementing this API on smart cards. In order to program Java Cards that are 2.0-compliant, developers need to understand what a Java Card is architecturally, what its core classes are, and how to develop applications for the card. This article gets inside a Java Card, providing you, the developer, with technical guidance on the system architecture, application programming interface, and runtime environment of the Java platform in a smart card. This article begins with an overview of smart cards and a brief review of ISO 7816, the smart card standard. Then we will answer to the question, "What is a Java Card?" and gives an overview of the Java Card system architecture. Next, we'll focus on the many issues specific to the Java Card, including the Java Card lifecycle; the Java Card 2.0 language subset and API library classes; and Java Card security. Then we'll discuss the Java Card runtime environment and show how a Java Card runs. |
Password is a common mean of implementing security. Dallas Semiconductor has developed a new Java-based, computerized ring that will automatically unlock doors and log on to computers. This java based technique overcomes the deficiencies of the secret password. A Java Ring is a finger ring that contains a small microprocessor which runs JVM and is preloaded with applets. The jewel of Java Ring is Java iButton, which is a microchip enclosed in a secure package. There are many technologies similar to iButton. But there is no match for this technology. A Java Ring goes beyond a traditional smart card by providing real memory, more power, and a capacity for dynamic programming. iButtons have an advantage over smart cards in term of durability and longevity. There are different kinds of iButtons of which cryptographic iButtons require a special mention. Information is transferred between iButton and PC by means of blue dot receptor. A layer of software called TMEX is needed to interface iButtons to PCs and produce the desired information in the desired format. They find much applications in authentication and auditing trails. With a significant market penetration of 20 billion iButtons, we can expect an exponential growth in this technology. These devices will surely revolutionize the way we look at future. It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. Dallas Semiconductor is developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers. This mobile computer can become even more secure. You can keep the iButton with you wherever you go by wearing it as a closely guarded accessory - a watch, a key chain, a wallet, a ring - something you have spend your entire life practising how not to lose. Here are a few reasons why you might want to wear the iButton in the accessory that best fits your life style : w It is a safe place to keep the private keys to conduct transactions. w It overcomes the deficiencies of the secret password. w You eliminate keystroke with a quick, intentional press of the Blue Dot. w You keep your computer at hand versus lugging your everywhere you roam w You become part of the network economy w This steel-bound credential stands up to the hard knocks of everyday wear, including sessions in the swimming pool or clothes washer |
The use of C language to program microcontrollers is becoming too common. And most of the time its not easy to buld an application in assembly which instead you can make easily in C. So It |
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users |