SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
SIXTH SENSE CLOUD COMPUTING
1-
Yugank Srivastava 2-
Sumit Rajan 3-
Prem Chand Rawat 4-
Shivam Shukla
1-
Research scholar, Information technology department, Uttrakhand technical university
Dehradun, Uttrakhand, India
srivastavayugank@yahoo.co.in
2-
Research Research scholar, Mechanical department, Uttrakhand technical university
Dehradun, Uttrakhand, India
sumit.sharma.one@hotmail.com
3-
Research scholar, Mechanical department, Uttrakhand technical university
Dehradun, Uttrakhand, India
pcrawat.one@hotmail.com
4-
Research scholar, Mechanical department, Uttrakhand technical university
Dehradun, Uttrakhand, India
shukla.shivam143@hotmail.com
Abstract
“Cloud computing” was first coined by
Google™ Chief Executive Eric Schmidt in 2006.
Kaufman (2009: 61) suggests that cloud
computing terminology „originates from the
telecommunications world of the 1990s, when
providers began using virtual private network
(VPN) services for data communication‟.
Desisto, Plummer and Smith (2008: 1) state that
„the first SaaS [Software as a Service] offerings
were delivered in the late 1990s.Although these
offerings weren‟t called cloud computing‟. There
is, however, agreement on the definition of
Cloud Computing. Therefore, “SIXTH SENSE
CLOUD COMPUTING” is the mixture of sixth
sense concept invented by MR. PRANAV
MISTRY and cloud computing. The main
concepts comprises of important modules and
sub-modules.
1: Designing hardware and source code
connectivity.
2: Replacement (replacing Smartphone, laptop or
heavy internet modems for connectivity).
1. Introduction
Sixth sense cloud computing basically involves
the main concept of connecting the compact
hardware to the cloud with a specific log in ID,
PASSWORD, to make it accessible anywhere
and user just need an internet connection and
compact hardware which mainly replaces
LAPTOPS, PC‟S e.t.c ,Therefore anything
anywhere concept is evolved, and the most
important part is the security which is plays an
important role in making success to any
evolution ,Therefore user will be given an
specific id and password which will help the user
to secure his “VIRTUAL LAPTOP” means his
whole data in cloud and no one can access it
without the prior permission of the main account
holder or user. The term virtual laptop can be
explained through this picture clicked by MR
PRANAV MISTRY during his research on sixth
sense.
As we see from the above live images that our
virtual laptop can be on wall or on our own
Palm. Sixth Sense cloud computing totally
comprises virtualization that‟s makes it pure
compact and portable and secure too. It records
and control commands because of HAND
GESTURES and COLOUR MARKERS which
acts as mouse to control and decode commands
of the users.
2. Construction
The components of sixth sense cloud computing
are as follows:
1: CAMERA-
The camera acts as the input encoder and digital
eye of sixth sense cloud computing. The major
functions of the camera can be listed as:
1. Captures user‟s hand movements and
gestures (used in reorganization of user
gestures) 2.
2. Captures the scene in front and objects
the user is interacting with (used in
object reorganization and tracking)
3. Takes a photo of the scene in front
when the user performs a „framing‟
gesture Captures the scene of projected
interface (used to correct the alignment,
placement and look and feel of the
projected interface components)
Suggested Product: Logitech QuickCam
Pro for notebooks. Code- 3333333
3: MICROPHONE.
The MICROPHONE is used to encode and
decode our audio capabilities and hence
made us easy to perform our audio platform
actions.
4:Projector: The projector is the key output
device of the SixthSense system. The
projector visually augments surfaces, walls
and physical objects the user is interacting
with by projecting digital information and
graphical user interfaces. The mobile
computing device provides the projector
with the content to be projected. The
projector unit used in prototype runs on a
rechargeable battery. The major functions of
the projector can be listed as: Projects
graphical user interface of the selected
application onto surfaces or walls in front
Augments the physical objects the user
interacting with by projecting just-in-time
and related information from the Internet
Suggested Products: You can buy either
laser (AAXA, Microvision) or L.E.D (3M
MPro110) projectors. Mirror The mirror
reflects the projection coming out from the
projector and thus helps in projecting onto
the desired locations on walls or surfaces.
The user manually can change the tilt of the
mirror to change the location of the
projection. For example in application where
the user wants the projection to go on the
ground instead of the surface in front, he can
change the tilt of the mirror to change the
projection. Thus, the mirror in the
SixthSense helps in overcoming the
limitation of the limited projection space of
the projector. Suggested Product: Any
1”X1” first surface mirror Microphone The
microphone is an optional component of the
SixthSense. It is required when using a
paper as a computing interface. When the
user wants to use a sheet of paper as an
interactive surface, he or she clips the
microphone to the paper. The microphone
attached this way captures the sound signals
of user‟s touching the paper. This data is
passed to computing device for processing.
Later, combined with the tracking
information about user‟s finger, the system
is able to identify precise touch events on
the paper. Here, the sound signal captured
by the microphone provides time
information whereas the camera performs
tracking. The applications enabled by this
technique are explained earlier. Mobile
computing device The Sixth Sense system
uses a mobile computing device in user‟s
pocket as the processing device. The
software program enabling all the features of
the system runs on this computing device.
This device can be a mobile phone or a
small laptop computer. The camera, the
projector and the microphone are connected
to this device using wired or wireless
connection. The detail of the software
program that runs on this device is provided
in next section. The mobile computing
device is also connected to the Internet via
3G network or wireless connection.
Suggested Product: Any Windows computer
For a more detailed list of resources, along
with prices check Links / Resources
CODING PLATFORM:
Coding is done in Microsoft visual studio
version and hence all the components used are
connected to each other and made into action.
Because of the Smartphone the coading is done
to interconnect the devices used.
MAIN CONCEPT USED WHICH
MAKE SIXTH SENSE CLOUD
COMPUTING DIFFERENT FORM
ORIGNAL SIXTH SENSE:
The main concept we using is that we
replacing the Smartphone and putting whole
laptop data in the cloud which makes us the
virtual laptop can be easily accessible:
Any place, Anywhere, Anytime and On
anything, the DATA will be available.
4. Conclusions:
The main idea of the project is to
develop the virtualization era in the
world and to replace the hardware and
heavy or bulk material, with
virtualization and in coming time all
should be in ones hand to access the data
anywhere anyplace anything.
References
[1] PRANAV MISTRY, Sixth Sense Concept.
[2] McAfee_ Avert_ Labs, Alton House,
Gatehouse Way, Aylesbury, Herts HP19
8YD, UK.
Cloud Security technology paper, 2009.
[3] Seongwook Jin, Jeongseob Ahn, Sanghoon
Cha, and Jaehyuk Huh
Computer Science Department, KAIST
Daejeon, Korea
{swjin, jeongseob, shcha, and
jhuh}@calab.kaist.ac.kr
Architectural Support for Secure Virtualization
under a
Vulnerable Hypervisor.

Mais conteúdo relacionado

Mais procurados

World explorer
World explorerWorld explorer
World exploreralila1
 
Virtual Numeric Keyboard for mobile devices using Echo Sound Technique
Virtual Numeric Keyboard for mobile devices using Echo Sound TechniqueVirtual Numeric Keyboard for mobile devices using Echo Sound Technique
Virtual Numeric Keyboard for mobile devices using Echo Sound Techniquehatshalahire9
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computerseSAT Publishing House
 
Gesture Based Interface Using Motion and Image Comparison
Gesture Based Interface Using Motion and Image ComparisonGesture Based Interface Using Motion and Image Comparison
Gesture Based Interface Using Motion and Image Comparisonijait
 
IRJET- Mouse on Finger Tips using ML and AI
IRJET- Mouse on Finger Tips using ML and AIIRJET- Mouse on Finger Tips using ML and AI
IRJET- Mouse on Finger Tips using ML and AIIRJET Journal
 
Future of interface design 2010
Future of interface design 2010Future of interface design 2010
Future of interface design 2010Pavel Růžička
 
Comparative study of augmented reality
Comparative study of augmented realityComparative study of augmented reality
Comparative study of augmented realityijcsa
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...eSAT Publishing House
 
Sixth sense
Sixth senseSixth sense
Sixth senseShilpa S
 
Etna dev 2016 - Deep Dive Holographic Applications
Etna dev 2016 - Deep Dive Holographic ApplicationsEtna dev 2016 - Deep Dive Holographic Applications
Etna dev 2016 - Deep Dive Holographic ApplicationsMatteo Valoriani
 
Mixed Reality from demo to product
Mixed Reality from demo to productMixed Reality from demo to product
Mixed Reality from demo to productMatteo Valoriani
 
66619186 5-pen-pc-technology
66619186 5-pen-pc-technology66619186 5-pen-pc-technology
66619186 5-pen-pc-technologynagaaece
 

Mais procurados (18)

World explorer
World explorerWorld explorer
World explorer
 
Virtual Numeric Keyboard for mobile devices using Echo Sound Technique
Virtual Numeric Keyboard for mobile devices using Echo Sound TechniqueVirtual Numeric Keyboard for mobile devices using Echo Sound Technique
Virtual Numeric Keyboard for mobile devices using Echo Sound Technique
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computers
 
Gesture Based Interface Using Motion and Image Comparison
Gesture Based Interface Using Motion and Image ComparisonGesture Based Interface Using Motion and Image Comparison
Gesture Based Interface Using Motion and Image Comparison
 
IRJET- Mouse on Finger Tips using ML and AI
IRJET- Mouse on Finger Tips using ML and AIIRJET- Mouse on Finger Tips using ML and AI
IRJET- Mouse on Finger Tips using ML and AI
 
Virtual mouse
Virtual mouseVirtual mouse
Virtual mouse
 
hand gestures
hand gestureshand gestures
hand gestures
 
Future of interface design 2010
Future of interface design 2010Future of interface design 2010
Future of interface design 2010
 
Comparative study of augmented reality
Comparative study of augmented realityComparative study of augmented reality
Comparative study of augmented reality
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Etna dev 2016 - Deep Dive Holographic Applications
Etna dev 2016 - Deep Dive Holographic ApplicationsEtna dev 2016 - Deep Dive Holographic Applications
Etna dev 2016 - Deep Dive Holographic Applications
 
Mixed Reality from demo to product
Mixed Reality from demo to productMixed Reality from demo to product
Mixed Reality from demo to product
 
Sixth sensing robot
Sixth sensing robotSixth sensing robot
Sixth sensing robot
 
i-Mouse
i-Mousei-Mouse
i-Mouse
 
Papaer4 ea
Papaer4 eaPapaer4 ea
Papaer4 ea
 
CGV 18CS62 VTU CSE
CGV 18CS62 VTU CSECGV 18CS62 VTU CSE
CGV 18CS62 VTU CSE
 
66619186 5-pen-pc-technology
66619186 5-pen-pc-technology66619186 5-pen-pc-technology
66619186 5-pen-pc-technology
 

Destaque

Sixth sense-final-ppt
Sixth sense-final-pptSixth sense-final-ppt
Sixth sense-final-pptThedarkangel1
 
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!Fathima Mizna Kalathingal
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete pptatinav242
 

Destaque (7)

Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
SIXTH SENSE TECHNOLOGY
SIXTH SENSE TECHNOLOGYSIXTH SENSE TECHNOLOGY
SIXTH SENSE TECHNOLOGY
 
Sixth sense presentation
Sixth sense presentationSixth sense presentation
Sixth sense presentation
 
Sixth sense-final-ppt
Sixth sense-final-pptSixth sense-final-ppt
Sixth sense-final-ppt
 
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
SIXTH SENSE TECHNOLOGY (PRANAV MISTRY) -WEAR YOUR WORLD!!!
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 

Semelhante a Sixth sense cloud computing

Sixth sense technology(seminar presentation)
Sixth sense technology(seminar presentation)Sixth sense technology(seminar presentation)
Sixth sense technology(seminar presentation)guddu yadav
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyRaga Deepthi
 
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET Journal
 
Quantify Measure App Project concept presentation
Quantify Measure App Project concept presentationQuantify Measure App Project concept presentation
Quantify Measure App Project concept presentationAsheeshK
 
Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)Hemanth kumar
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technologyAkhil Ak
 
sixth sense technology by pranav mistery
sixth sense technology by pranav misterysixth sense technology by pranav mistery
sixth sense technology by pranav misteryAmitGajera
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyPrakhar Gore
 
Ijmsr 2016-04
Ijmsr 2016-04Ijmsr 2016-04
Ijmsr 2016-04ijmsr
 
Create your own sixth sense device
Create your own sixth sense deviceCreate your own sixth sense device
Create your own sixth sense deviceFaheem Nazir
 
Pradeep6th sence
Pradeep6th sencePradeep6th sence
Pradeep6th senceRam Sita
 
Anti missile diffusion system through MATLAB with Image Processing
Anti missile diffusion system through MATLAB with Image ProcessingAnti missile diffusion system through MATLAB with Image Processing
Anti missile diffusion system through MATLAB with Image ProcessingVeer Singh shakya
 
COMUTER GRAPHICS NOTES
COMUTER GRAPHICS NOTESCOMUTER GRAPHICS NOTES
COMUTER GRAPHICS NOTESho58
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyIRJET Journal
 

Semelhante a Sixth sense cloud computing (20)

Sixth sense technology(seminar presentation)
Sixth sense technology(seminar presentation)Sixth sense technology(seminar presentation)
Sixth sense technology(seminar presentation)
 
Sixth sense technolgy
Sixth sense technolgySixth sense technolgy
Sixth sense technolgy
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
 
Sixth Sense Technology
Sixth Sense Technology Sixth Sense Technology
Sixth Sense Technology
 
Quantify Measure App Project concept presentation
Quantify Measure App Project concept presentationQuantify Measure App Project concept presentation
Quantify Measure App Project concept presentation
 
Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
sixth sense technology by pranav mistery
sixth sense technology by pranav misterysixth sense technology by pranav mistery
sixth sense technology by pranav mistery
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
F04402038042
F04402038042F04402038042
F04402038042
 
Ijmsr 2016-04
Ijmsr 2016-04Ijmsr 2016-04
Ijmsr 2016-04
 
Create your own sixth sense device
Create your own sixth sense deviceCreate your own sixth sense device
Create your own sixth sense device
 
Pradeep6th sence
Pradeep6th sencePradeep6th sence
Pradeep6th sence
 
Anti missile diffusion system through MATLAB with Image Processing
Anti missile diffusion system through MATLAB with Image ProcessingAnti missile diffusion system through MATLAB with Image Processing
Anti missile diffusion system through MATLAB with Image Processing
 
Cg notes
Cg notesCg notes
Cg notes
 
COMUTER GRAPHICS NOTES
COMUTER GRAPHICS NOTESCOMUTER GRAPHICS NOTES
COMUTER GRAPHICS NOTES
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 

Último

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Último (20)

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Sixth sense cloud computing

  • 1. SIXTH SENSE CLOUD COMPUTING 1- Yugank Srivastava 2- Sumit Rajan 3- Prem Chand Rawat 4- Shivam Shukla 1- Research scholar, Information technology department, Uttrakhand technical university Dehradun, Uttrakhand, India srivastavayugank@yahoo.co.in 2- Research Research scholar, Mechanical department, Uttrakhand technical university Dehradun, Uttrakhand, India sumit.sharma.one@hotmail.com 3- Research scholar, Mechanical department, Uttrakhand technical university Dehradun, Uttrakhand, India pcrawat.one@hotmail.com 4- Research scholar, Mechanical department, Uttrakhand technical university Dehradun, Uttrakhand, India shukla.shivam143@hotmail.com Abstract “Cloud computing” was first coined by Google™ Chief Executive Eric Schmidt in 2006. Kaufman (2009: 61) suggests that cloud computing terminology „originates from the telecommunications world of the 1990s, when providers began using virtual private network (VPN) services for data communication‟. Desisto, Plummer and Smith (2008: 1) state that „the first SaaS [Software as a Service] offerings were delivered in the late 1990s.Although these offerings weren‟t called cloud computing‟. There is, however, agreement on the definition of Cloud Computing. Therefore, “SIXTH SENSE CLOUD COMPUTING” is the mixture of sixth sense concept invented by MR. PRANAV MISTRY and cloud computing. The main concepts comprises of important modules and sub-modules. 1: Designing hardware and source code connectivity. 2: Replacement (replacing Smartphone, laptop or heavy internet modems for connectivity). 1. Introduction Sixth sense cloud computing basically involves the main concept of connecting the compact hardware to the cloud with a specific log in ID, PASSWORD, to make it accessible anywhere and user just need an internet connection and compact hardware which mainly replaces LAPTOPS, PC‟S e.t.c ,Therefore anything anywhere concept is evolved, and the most important part is the security which is plays an important role in making success to any evolution ,Therefore user will be given an specific id and password which will help the user to secure his “VIRTUAL LAPTOP” means his whole data in cloud and no one can access it without the prior permission of the main account holder or user. The term virtual laptop can be explained through this picture clicked by MR PRANAV MISTRY during his research on sixth sense.
  • 2. As we see from the above live images that our virtual laptop can be on wall or on our own Palm. Sixth Sense cloud computing totally comprises virtualization that‟s makes it pure compact and portable and secure too. It records and control commands because of HAND GESTURES and COLOUR MARKERS which acts as mouse to control and decode commands of the users. 2. Construction The components of sixth sense cloud computing are as follows: 1: CAMERA- The camera acts as the input encoder and digital eye of sixth sense cloud computing. The major functions of the camera can be listed as: 1. Captures user‟s hand movements and gestures (used in reorganization of user gestures) 2. 2. Captures the scene in front and objects the user is interacting with (used in object reorganization and tracking) 3. Takes a photo of the scene in front when the user performs a „framing‟ gesture Captures the scene of projected interface (used to correct the alignment, placement and look and feel of the projected interface components) Suggested Product: Logitech QuickCam Pro for notebooks. Code- 3333333 3: MICROPHONE. The MICROPHONE is used to encode and decode our audio capabilities and hence made us easy to perform our audio platform actions. 4:Projector: The projector is the key output device of the SixthSense system. The projector visually augments surfaces, walls and physical objects the user is interacting with by projecting digital information and graphical user interfaces. The mobile computing device provides the projector with the content to be projected. The projector unit used in prototype runs on a rechargeable battery. The major functions of the projector can be listed as: Projects graphical user interface of the selected application onto surfaces or walls in front Augments the physical objects the user interacting with by projecting just-in-time and related information from the Internet Suggested Products: You can buy either laser (AAXA, Microvision) or L.E.D (3M MPro110) projectors. Mirror The mirror reflects the projection coming out from the projector and thus helps in projecting onto the desired locations on walls or surfaces. The user manually can change the tilt of the mirror to change the location of the projection. For example in application where the user wants the projection to go on the ground instead of the surface in front, he can change the tilt of the mirror to change the projection. Thus, the mirror in the
  • 3. SixthSense helps in overcoming the limitation of the limited projection space of the projector. Suggested Product: Any 1”X1” first surface mirror Microphone The microphone is an optional component of the SixthSense. It is required when using a paper as a computing interface. When the user wants to use a sheet of paper as an interactive surface, he or she clips the microphone to the paper. The microphone attached this way captures the sound signals of user‟s touching the paper. This data is passed to computing device for processing. Later, combined with the tracking information about user‟s finger, the system is able to identify precise touch events on the paper. Here, the sound signal captured by the microphone provides time information whereas the camera performs tracking. The applications enabled by this technique are explained earlier. Mobile computing device The Sixth Sense system uses a mobile computing device in user‟s pocket as the processing device. The software program enabling all the features of the system runs on this computing device. This device can be a mobile phone or a small laptop computer. The camera, the projector and the microphone are connected to this device using wired or wireless connection. The detail of the software program that runs on this device is provided in next section. The mobile computing device is also connected to the Internet via 3G network or wireless connection. Suggested Product: Any Windows computer For a more detailed list of resources, along with prices check Links / Resources CODING PLATFORM: Coding is done in Microsoft visual studio version and hence all the components used are connected to each other and made into action. Because of the Smartphone the coading is done to interconnect the devices used. MAIN CONCEPT USED WHICH MAKE SIXTH SENSE CLOUD COMPUTING DIFFERENT FORM ORIGNAL SIXTH SENSE: The main concept we using is that we replacing the Smartphone and putting whole laptop data in the cloud which makes us the virtual laptop can be easily accessible: Any place, Anywhere, Anytime and On anything, the DATA will be available.
  • 4. 4. Conclusions: The main idea of the project is to develop the virtualization era in the world and to replace the hardware and heavy or bulk material, with virtualization and in coming time all should be in ones hand to access the data anywhere anyplace anything. References [1] PRANAV MISTRY, Sixth Sense Concept. [2] McAfee_ Avert_ Labs, Alton House, Gatehouse Way, Aylesbury, Herts HP19 8YD, UK. Cloud Security technology paper, 2009. [3] Seongwook Jin, Jeongseob Ahn, Sanghoon Cha, and Jaehyuk Huh Computer Science Department, KAIST Daejeon, Korea {swjin, jeongseob, shcha, and jhuh}@calab.kaist.ac.kr Architectural Support for Secure Virtualization under a Vulnerable Hypervisor.