Thursday, December 16, 2010

Blue Tooth Technology

  • What Is Blue Tooth?
    Bluetooth is an industrial specification for wireless personal area networks (PANs). Bluetooth provides a way to connect and exchange information between devices such as mobile phones, laptops, PCs, printers, digital cameras, and video game consoles over a secure, globally unlicensed short-range radio frequency. The Bluetooth specifications are developed and licensed by the Bluetooth Special Interest Group.
    Spectrum
    Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is available and unlicensed in most countries
    List of applications
    More prevalent applications of Bluetooth include:
    • Wireless control of and communication between a cell phone and a hands-free headset or car kit. This was one of the earliest applications to become popular.
    • Wireless networking between PCs in a confined space and where little bandwidth is required.
    • Wireless communications with PC input and output devices, the most common being the mouse, keyboard and printer.
    • Transfer of files between devices with OBEX.
    • Transfer of contact details, calendar appointments, and reminders between devices with OBEX.
    • Replacement of traditional wired serial communications in test equipment, GPS receivers, medical equipment and traffic control devices.
    • For controls where infrared was traditionally used.
    • Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices.
    • Seventh-generation game consoles—Nintendo Wii[2], Sony PlayStation 3—use Bluetooth for their respective wireless controllers.
    Bluetooth Technology Benefits
    Why Choose Bluetooth wireless technology?
    Bluetooth wireless technology is the simple choice for convenient, wire-free, short-range communication between devices. It is a globally available standard that wirelessly connects mobile phones, portable computers, cars, stereo headsets, MP3 players, and more. Thanks to the unique concept of “profiles,” Bluetooth enabled products do not need to install driver software. The technology is now available in its fourth version of the specification and continues to develop, building on its inherent strengths — small-form factor radio, low power, low cost, built-in security, robustness, ease-of-use, and ad hoc networking abilities. Bluetooth wireless technology is the leading and only proven short-range wireless technology on the market today shipping over five million units every week with an installed base of over 500 million units at the end of 2005.
    Globally Available
    The Bluetooth wireless technology specification is available free-of-charge to our member companies around the globe. Manufacturers from many industries are busy implementing the technology in their products to reduce the clutter of wires, make seamless connections, stream stereo audio, transfer data or carry voice communications. Bluetooth technology operates in the 2.4 GHz, one of the unlicensed industrial, scientific, medical (ISM) radio bands. As such, there is no cost for the use of Bluetooth technology. While you must subscribe to a cellular provider to use GSM or CDMA, with Bluetooth technology there is no cost associated with the use beyond the cost of your device.
    Range of Devices
    Bluetooth technology is available in an unprecedented range of applications from mobile phones to automobiles to medical devices for use by consumers, industrial markets, enterprises, and more. The low power consumption, small size and low cost of the chipset solution enables Bluetooth technology to be used in the tiniest of devices. Have a look at the wide range products made available by our members in the Bluetooth product directory and the component product listing.
    Ease of Use
    Bluetooth technology is an ad hoc technology that requires no fixed infrastructure and is simple to install and set up. You don’t need wires to get connected. The process for a new user is easy – you get a Bluetooth branded product, check the profiles available and connect it to another Bluetooth device with the same profiles. The subsequent PIN code process is as easy as when you identify yourself at the ATM machine. When out-and-about, you carry your personal area network (PAN) with you and can even connect to others.
    Globally Accepted Specification
    Bluetooth wireless technology is the most widely supported, versatile, and secure wireless standard on the market today. The globally available qualification program tests member products as to their accordance with the standard. Since the first release of the Bluetooth specification in 1999, over 4000 companies have become members in the Bluetooth Special Interest Group (SIG). Meanwhile, the number of Bluetooth products on the market is multiplying rapidly. Volumes have doubled for the fourth consecutive year and are likely to reach an installed base of 500 million units by the close of 2005.
    Secure Connections
    From the start, Bluetooth technology was designed with security needs in mind. Since it is globally available in the open 2.4 GHz ISM band, robustness was built in from the beginning. With adaptive frequency hopping (AFH), the signal “hops” and thus limits interference from other signals. Further, Bluetooth technology has built-in security such as 128bit encryption and PIN code authentication. When Bluetooth products identify themselves, they use the PIN code the first time they connect. Once connected, always securely connected
    How Bluetooth Technology Works
    Bluetooth wireless technology is a short-range communications system intended to replace the cables connecting portable and/or fixed electronic devices. The key features of Bluetooth wireless technology are robustness, low power, and low cost. Many features of the core specification are optional, allowing product differentiation.
    The Bluetooth core system consists of an RF transceiver, baseband, and protocol stack. The system offers services that enable the connection of devices and the exchange of a variety of data classes between these devices.

    Overview of Operation
    The Bluetooth RF (physical layer) operates in the unlicensed ISM band at 2.4GHz. The system employs a frequency hop transceiver to combat interference and fading, and provides many FHSS carriers. RF operation uses a shaped, binary frequency modulation to minimize transceiver complexity. The symbol
    rate is 1 Megasymbol per second (Msps) supporting the bit rate of 1 Megabit per second (Mbps) or, with Enhanced Data Rate, a gross air bit rate of 2 or 3Mb/s. These modes are known as Basic Rate and Enhanced Data Rate respectively.
    During typical operation, a physical radio channel is shared by a group of devices that are synchronized to a common clock and frequency hopping pattern. One device provides the synchronization reference and is known as the master. All other devices are known as slaves. A group of devices synchronized in this fashion form a piconet. This is the fundamental form of communication for Bluetooth wireless technology.
    Devices in a piconet use a specific frequency hopping pattern which is algorithmically determined by certain fields in the Bluetooth specification address and clock of the master. The basic hopping pattern is a pseudo-random ordering of the 79 frequencies in the ISM band. The hopping pattern may be adapted to exclude a portion of the frequencies that are used by interfering devices. The adaptive hopping technique improves Bluetooth technology co-existence with static (non-hopping) ISM systems when these are co-located.
    The physical channel is sub-divided into time units known as slots. Data is transmitted between Bluetooth enabled devices in packets that are positioned in these slots. When circumstances permit, a number of consecutive slots may be allocated to a single packet. Frequency hopping takes place between the transmission or reception of packets. Bluetooth technology provides the effect of full duplex transmission through the use of a time-division duplex (TDD) scheme.
    Above the physical channel there is a layering of links and channels and associated control protocols. The hierarchy of channels and links from the physical channel upwards is physical channel, physical link, logical transport, logical link and L2CAP channel.
    Within a physical channel, a physical link is formed between any two devices that transmit packets in either direction between them. In a piconet physical channel there are restrictions on which devices may form a physical link. There is a physical link between each slave and the master. Physical links are not formed directly between the slaves in a piconet.
    The physical link is used as a transport for one or more logical links that support unicast synchronous, asynchronous and isochronous traffic, and broadcast traffic. Traffic on logical links is multiplexed onto the physical link by occupying slots assigned by a scheduling function in the resource manager.
    A control protocol for the baseband and physical layers is carried over logical links in addition to user data. This is the link manager protocol (LMP). Devices that are active in a piconet have a default asynchronous connection-oriented logical transport that is used to transport the LMP protocol signaling. For historical reasons this is known as the ACL logical transport. The default ACL logical transport is the one that is created whenever a device joins a piconet. Additional logical transports may be created to transport synchronous data streams when this is required.
    The link manager function uses LMP to control the operation of devices in the piconet and provide services to manage the lower architectural layers (radio layer and baseband layer). The LMP protocol is only carried on the default ACL logical transport and the default broadcast logical transport.
    Above the baseband layer the L2CAP layer provides a channel-based abstraction to applications and services. It carries out segmentation and reassembly of application data and multiplexing and de-multiplexing of multiple channels over a shared logical link. L2CAP has a protocol control channel that is carried over the default ACL logical transport. Application data submitted to the L2CAP protocol may be carried on any logical link that supports the L2CAP protocol.

Donot Use mobile While Driving

If you drive using a mobile phone you are four times more likely to crash, than someone not using a phone.
 
                          

Using a mobile phone while driving reduces your ability to react and distracts your concentration. This applies equally to conversations on hand-held and hands-free phones.
 
Some studies have shown that using a mobile phone while driving can affect your ability as much as being over the drink-drive limit.
Having a mobile phone conversation increases drivers' mental workload and stress levels.
Using a mobile phone while driving affects your ability to:
  • stay in lane
  • keep to a steady speed
  • keep to the speed limit
  • stay a safe distance from the vehicle in front
Using a mobile phone while driving also affects your:
  • reaction times
  • judgement of safe gaps
  • general awareness of other traffic
Research shows using a mobile phone while driving can lead to more aggressive driving behaviour.
 
Hands-free mobile calls still affect your driving ability; reducing awareness and increasing reaction times.
 
You can still be prosecuted for dangerous driving when using a hands-free mobile phone.


Doctors Find 6 Sewing Needles In Baby

BEIJING, Jun. 18, 2007

(AP) Doctors in southern China were planning to perform surgery on a 1-year-old boy whose parents took him to a hospital because he had been unusually fussy and learned he had six sewing needles in his body, newspapers reported Monday.

The child's parents, migrant workers from southwest China, said they had no idea how the needles ended up in their son, nicknamed Xiao Yu.

The Beijing Youth Daily ran a color photo of an X-ray showing five needles throughout the boy's torso. The Beijing Morning Post printed close-ups of the X-ray, plus another that showed a needle that had apparently been pushed through the top of the child's head.

The photographs showed the needles completely embedded inside the boy.

"We have to perform the surgery as soon as possible, but we cannot promise that we can remove all the needles," the doctor, Gu Yong, was quoted as saying.

The parents said they took Xiao Yu to a hospital on June 2 after he cried for three or four nights in a row and ate less than usual.

An X-ray taken there revealed two needles inside the boy's chest. He was sent for surgery at another hospital, where a second X-ray revealed four more needles _ two in his scrotum, one in his head and another in his abdomen.

The parents, who work at a bag factory in southern China's Guangzhou city, said no strangers have come into contact with the boy.

Pakistan's Benazir Bhutto : Women of Power killed

      
Pakistan's opposition leader Benazir Bhutto was assassinated on December 27, 2007 Thursday in a suicide attack that also killed at least 20 others at the end of a campaign rally, aides said. "The surgeons confirmed that she has been martyred," Bhutto's lawyer Babar Awan said.
A party security adviser said Bhutto was shot in neck and chest as she got into her vehicle to leave the rally in Rawalpindi near the capital Islamabad. A gunman then blew himself up."At 6:16 p.m. she expired," said Wasif Ali Khan, a member of Bhutto's party who was at Rawalpindi General Hospital where she was taken after the attack.Her supporters at the hospital began chanting "Dog, Musharraf, dog," referring to Pakistan's president Pervez Musharraf.

Benazir Bhutto was a Pakistani politician. Bhutto was the first woman elected to lead a post-colonial Muslim state. She was twice elected Prime Minister of Pakistan. She was sworn in for the first time in 1988 but removed from office 20 months later under orders of then-President Ghulam Ishaq Khan on grounds of alleged corruption. In 1993 Bhutto was re-elected but was again removed in 1996 on similar charges, this time by President Farooq Leghari.
                                     
Bhutto went into self-imposed exile in Dubai in 1998, where she remained until she returned to Pakistan on October 18,2007 after reaching an understanding with General Musharraf by which she was granted amnesty and all corruption charges were withdrawn. 
                              
On the same day(18-10-2007), her homecoming parade in karachi was also targeted by a suicide attacker, killing more than 140 people. On that occasion she narrowly escaped injury.
 
Like the Nehru-Gandhi family in India, the Bhuttos of Pakistan are one of the world's most famous political dynasties. Benazir's father, Zulfikar Ali Bhutto, was prime minister of Pakistan in the early 1970s. On 18 December 1987 she married Asif Ali Zardari in Karachi. The couple had three children: Bilawal, Bakhtwar, and Aseefa. Benazir Bhutto was the last remaining bearer of her late father's political legacy.
 
Her brother, Murtaza - who was once expected to play the role of party leader - fled to the then-communist Afghanistan after his father's fall. He won elections from exile in 1993 and became a provincial legislator, returning home soon afterwards, only to be shot dead under mysterious circumstances in 1996
 
Benazir's other brother, Shahnawaz - also politically active but in less violent ways than Murtaza - was found dead in his French Riviera apartment in 1985

Bhutto thought that she experienced a lot of gender discrimination as the first Muslim woman Prime Minister. She felt that, many of the Muslim religious leaders believed she had taken a man's place. This criticism based on her gender was something she found very difficult to deal with.
 
Ms. Bhutto is the author of "Foreign Policy in Perspective" (1978) and her autobiography, "Daughter of Destiny" (1989). She received the Bruno Kreisky Award for Human Rights in 1988 and the Honorary Phi Beta Kappa Award from Radcliffe in 1989.She has been mentiond as "The world's most popular politician" in the New Guinness Book of Record 1996. The "Times " and the "Australian Magazine"(May 4, 1996) have drawn up a list of 100 most powerful women and have included Benazir bhutto as one of them.
Benazir Bhutto is a woman of courage and conviction and acknowledged with the International Leadership Award.

Burj Dubai Tower-World's Tallest Building

DUBAI - The world's tallest building, still under construction in the booming Gulf emirate of Dubai, has become the world's tallest free-standing structure, its developers said on Thursday.
 
                                 
 
The Burj Dubai tower is now 555 metres (1,831.5 feet) tall and has surpassed the 553-metre- (1,824.9-feet) CN Tower in Toronto, Canada, which held the record for the world's tallest free-standing structure since 1976, developers Emaar Properties said in a statement.

The skyscraper, being built by South Korea's Samsung and set for completion at the end of next year, is one of several mega projects taking shape in Dubai, which is part of the United Arab Emirates.
The statement did not reveal the tower's final projected height or its final number of storeys, which Emaar has kept secret since launching the project in January 2004.
 
                                     
The developer announced in July that Burj Dubai, Arabic for Dubai Tower, had exceeded Taiwan's Taipei 101 which is 508 metres (1,676.4 feet) tall, to become the tallest building in the world.


Facts About Friendship

1. Don't worry about knowing people just make yourself worth knowing.
2. Friends are those rare people who ask how we are and then wait to hear the answer.
3. If you can buy a person's friendship, it is not worth it.
4. True friends have hearts that beat as one.
5. If you cannot think of any nice things to say about your friends, then you have the wrong friends.
6. Make friends before you need them.
7. If you were another person, would you like to be a friend of yours?
8. A good friend is one who neither looks down on you nor keeps up with you.
9. Be friendly with the folks you know. If it weren't for them you would be a total stranger.
10. A friend is never known till he is needed.
11. Friendship is a responsibility. ..not an opportunity.
12. Friendship is the cement that holds the world together
13. Friends are those who speak to you after others don't
14. The reason a dog has so many friends is that he wags his tail and not his tongue.
15. Pick your friends, but not to pieces.
16. A friend is one who puts his finger on a fault without rubbing it in.
17. The way to have friends is to be willing to lose some arguments.
18. If a friend makes a mistake, don't rub it in....rub it out.
19. Deal with other's faults as gently as if they were your own.
20. People are judged by the company they keep and the company they keep away from.
21. A friend is a person who can step on your toes without messing your shine.
22. The best mirror is an old friend.
23. The best possession one may have is a true friend.
24. Make friendship a habit and you will always have friends.
25. You will never have a friend if you must have one without faults.
26. Doing nothing for your friends results in having no friends to do for.
27. Anyone can give advice, but a real friend will lend a helping hand.
28. You can make more friends by being interested in them than trying to have them be interested in you.

29. A real friend is a person who, when you've made a fool of yourself, lets youforget it.
30. A friend is a person who listens attentively while you say nothing.
31. You can buy friendship with friendship, but never with dollars.
32. True friends are like diamonds, precious but rare; false friends are like autumn leaves, found everywhere.
33. A friend is someone who thinks you're a good egg even though you're slightly cracked.

Know The Truth About Money: Some Interesting Facts

MONEY
 
 

It can buy a house
 
But not a home
 
It can buy a clock
 
But not time
 
It can buy you a position
 
But not respect
 
It can buy you a bed
 
But not sleep
 

It can buy you a book
 
 
 But not knowledge
 
It can buy you medicine
 
But not health
 
It can buy a you a heart
 
transplant
 
But not true love
 
It can buy you blood
 
 
But not life
 

So you see money isn't everything
And it often causes pain and suffering
I tell you this because I am your friend
And as your friend I want to
Take away your pain and suffering!!
So Send me all your money
And I will suffer for you!
Cash only please! 
After all, what are friends
 
for.

Stupid Questions With Smart Answers

BoY : May I hold your hand?
GIRL : No thanks, it isn't heavy.


GIRL : Say you love me! Say you love me!
BOY : You love me...


GIRL : If we become engaged will you give me a ring??
BOY : Sure, what's your phone number??
GIRL : I think the poorest people are the happiest.
BOY : Then marry me and we'll be the happiest couple
GIRL : Darling, I want to dance like this forever.
BOY : Don't you ever want to improve??

MAN : You remind me of the sea.
WOMAN : Because I'm wild, romantic and exciting?
MAN : NO, because you make me sick.


WIFE : You tell a man something, it goes in! one ear and comes out of the other.
HUSBAND : You tell a woman something: It goes in both ears and comes out of the mouth.


MARY : John says I'm pretty. Andy says I'm ugly. What do u think, Peter?
PETER : A bit of both. I think you're pretty ugly.
Teacher : "What do you call a person who keeps on talking when people are no longer interested?"
Pupil : "A teacher".
Teacher : "Sam, you talk a lot !"
Sam : "It's a family tradition".
Teacher : "What do you mean?"
Sam : "Sir, my grandpa was a street hawker, my father is a teacher".
Teacher : "What about your mother?"
Sam : "She's a woman".

Teacher : "Now, children, if I saw a man beating a donkey and stopped him,what virtue would I be showing?"
Student : "Brotherly love".
Teacher : "Now, Sam, tell me frankly do you say
prayers before eating?"
Sam : "No sir, I don't have to, my mom is a good
cook".


Teacher : " Can anybody give an example of
COINCIDENCE?"
Student : "Sir, my Mother and Father got married on the same day and at the same time."

Scientific Explanation of Common Phenomena

1. It is dangerous to sleep in an unventilated room with fire burning inside because the fire produces carbon monoxide and carbon dioxide gases. Carbon monoxide is poisonous and can cause death. 
2. The filament of an electric bulb is made of tungsten because it has a high melting point and can be heated to a high temperature to emit light. 
3. Water kept in an earthen pitcher becomes cold because the pitcher has minute pores on its surface which absorb water. Water in the pores evaporates when it comes in contact with air, and produces a cooling effect. 
4. A sliced apple, when exposed to air, turns brown after some time as it contains iron which gets oxidised and gives the fruit a brownish colour. 
5. The freezing compartment inside a refrigerator is at the top because the air in contact with it becomes cold and heavy and sinks downwards, cooling the rest of the compartment. 
6. A copper vessel left in the air for a long time turns green. This is due to the formation of copper carbonate when copper reacts with carbon dioxide and moisture present in the air. 
7. A wick in a stove keeps burning continuously as kerosene rises in the wick due to capillary action. 
8. The Earth rotates on its axis from west to east. This rotation makes the sun and the stars appear to be moving across the sky from east to west. 
9. The sky appears blue because the light of the sun is spread or scattered by the dust particles in the air. In space the sky would appear black as there are no dust or air particles to scatter the light. 
10. Food is cooked quickly in a pressure cooker because the boiling point of water increases at high pressure. Food cooks faster at high temperature. 
11. In mountainous regions, the atmospheric pressure is less than it is at seal level water, therefore, boils at a lower temperature(less than 100° C) and food takes more time to cook.
12. When ice floating in a glass of water melts, the level of water remains unchanged because as a solid, ice displace an equal volume of water.
13. A man weigh more at the poles than at the equator because the polar radius of the Earth is less than the equatorial radius .Hence the gravitational pull is more at the poles than at the equator.
14. Standing in double-decker buses, particularly on the upper floor, is not allowed because on tilting, the centre of gravity of the bus gets changed and it is likely to overturn.
15. The boiling point of seawater will be more than the boiling point of pure water because the former contains salt and other impurities.
16. An ordinary clock loses time in summer because the length of its pendulum increases, and therefore, its time period also increases. The pendulum takes more time to complete each oscillation and thus loses time.
17. Whenever there is water loss from the body, secretion of saliva is reduced resulting in dryness of the mouth and stimulating the sensation of thirst. Intake of fluid then helps in restoring the loss of the water.
18. A swimmer just out of the river feels cold particularly if it is windy, because of the evaporation of water from his body surface. The evaporation is more on a windy day.
19. Alcohol is sometimes rubbed on the body of a person suffering from fever. As soon as it is applied on the body, it evaporates taking away some heat from the body. Since evaporation has a cooling effect, the body temperature can be reduced by rubbing alcohol.
20. Soft iron is used as an electromagnet because it remains a magnet only while the current passes through the coil around it and loses its magnetism when the current is switched off. 

21. The person jumping out of a moving train is carried forward in the direction of the train because the person himself is in motion sharing the velocity of the train and will continue in its state of uniform motion unless it exercises some force to prevent it (Newton’s first law of motion).
22. A lightning conductor is fixed to tall buildings to protect them from the destructive effects of the lightning.
23. An electric bulb makes a bang when it is broken because there is a vacuum inside the electric bulb; when the bulb is broken air rushes in at great speed from all sides to fill the vacuum. The rushing of air produces a noise generally referred to as the “bang”.
24. A small space is left between each set of two rails of railway line to allow for their expansion in summer.
25. A bad egg floats in water because the up-thrust produced on account of displaced water by the immersed portion of the bad egg is greater than the weight of the egg.
26. Moisture gather on the outer surface of a glass tumbler containing cold water because the water vapors present in the air get cooled and appear as droplets of water on coming in contact with the cold surface of the glass tumbler.
27. The launching of Earth satellites should be from a place near the equator to take the fullest advantage of the earth’s movements. The regions of the Earth closer to the equator.
28. We experience difficulty in breathing on mountains because the pressure of the air out side is less as compared to the pressure of the pressure of air in side the lungs.
29. If a highly corked glass bottle full of water is left out of doors on a frosty night and convert into ice. There is no room available for the increased volume and this may result in bursting of the bottle.
30. Water extinguishes fire because as it evaporates, the temperature of the burning body is lowered, thus retarding or stopping the burning action also the resulting vapour surround the burning substance cutting off the oxygen supply thus inhibiting the burning process. In fact hot water will extinguish fire more quickly than cold water as hot water will vaporize faster. 

How Fingerprint Scanners Work ?

Introduction to How Fingerprint Scanners Work
Computerized fingerprint scanners have been a mainstay of spy thrillers for Computer Mouse with Fingerprint Scannerdecades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access.
In this article, we'll examine the secrets behind this exciting development in law enforcement and identity security. We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail.

Fingerprint Basics

Fingerprints are one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible identity cards. You have a unique design, which represents you alone, literally at your fingertips. How did this happen?
People have tiny ridges of skin on their fingers because this particular adaptation was extremely advantageous to the ancestors of the human species. The pattern of ridges and "valleys" on fingers make it easier for the hands to grip things, in the same way a rubber tread pattern helps a tire grip the road.
 
Fingerprint Impression
The other function of fingerprints is a total coincidence. Like everything in the human body, these ridges form through a combination of genetic and environmental factors. The genetic code in DNA gives general orders on the way skin should form in a developing fetus, but the specific way it forms is a result of random events. The exact position of the fetus in the womb at a particular moment and the exact composition and density of surrounding amniotic fluid decides how every individual ridge will form.
 
So, in addition to the countless things that go into deciding your genetic make-up in the first place, there are innumerable environmental factors influencing the formation of the fingers. Just like the weather conditions that form clouds or the coastline of a beach, the entire development process is so chaotic that, in the entire course of human history, there is virtually no chance of the same exact pattern forming twice.
 
Consequently, fingerprints are a unique marker for a person, even an identical twin. And while two prints may look basically the same at a glance, a trained investigator or an advanced piece of software can pick out clear, defined differences.
 
This is the basic idea of fingerprint analysis, in both crime investigation and security. A fingerprint scanner's job is to take the place of a human analyst by collecting a print sample and comparing it to other samples on record.
 
 
Optical Scanner

A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images.
There are a number of different ways to get an image of somebody's finger. The most common methods today are optical scanning and capacitance scanning. Both types come up with the same sort of image, but they go about it in completely different ways.
 
The heart of an optical scanner is a charge coupled device (CCD), the same light sensor system used in digital cameras and camcorders. A CCD is simply an array of light-sensitive diodes called photosites, which generate an electrical signal in response to light photons. Each photosite records a pixel, a tiny dot representing the light that hit that spot. Collectively, the light and dark pixels form an image of the scanned scene (a finger, for example). Typically, an analog-to-digital converter in the scanner system processes the analog electrical signal to generate a digital representation of this image. See How Digital Cameras Work for details on CCDs and digital conversion.
 
The scanning process starts when you place your finger on a glass plate, and a CCD camera takes a picture. The scanner has its own light source, typically an array of light-emitting diodes, to illuminate the ridges of the finger. The CCD system actually generates aninverted image of the finger, with darker areas representing more reflected light (the ridges of the finger) and lighter areas representing less reflected light (the valleys between the ridges).
 
Before comparing the print to stored data, the scanner processor makes sure the CCD has captured a clear image. It checks the average pixel darkness, or the overall values in a small sample, and rejects the scan if the overall image is too dark or too light. If the image is rejected, the scanner adjusts the exposure time to let in more or less light, and then tries the scan again.
 
If the darkness level is adequate, the scanner system goes on to check the image definition (how sharp the fingerprint scan is). The processor looks at several straight lines moving horizontally and vertically across the image. If the fingerprint image has good definition, a line running perpendicular to the ridges will be made up of alternating sections of very dark pixels and very light pixels.
 
If the processor finds that the image is crisp and properly exposed, it proceeds to comparing the captured fingerprint with fingerprints on file. We'll look at this process in a minute, but first we'll examine the other major scanning technology, the capacitive scanner.
 
 
 
Capacitance Scanner

Like optical scanners, capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current.

The diagram below shows a simple capacitive sensor. The sensor is made up of one or more semiconductor chips containing an array of tiny cells. Each cell includes two conductor plates, covered with an insulating layer. The cells are tiny -- smaller than the width of one ridge on a finger.
 
Capacitance Scanner
 
The sensor is connected to an integrator, an electrical circuit built around an inverting operational amplifier. The inverting amplifier is a complex semiconductor device, made up of a number of transistors, resistors and capacitors. The details of its operation would fill an entire article by itself, but here we can get a general sense of what it does in a capacitance scanner. (Check out this page on operational amplifiers for a technical overview.)
 
Like any amplifier, an inverting amplifier alters one current based on fluctuations in another current (see How Amplifiers Work for more information). Specifically, the inverting amplifier alters a supply voltage. The alteration is based on the relative voltage of two inputs, called the inverting terminal and the non-inverting terminal. In this case, the non-inverting terminal is connected to ground, and the inverting terminal is connected to a reference voltage supply and a feedback loop. The feedback loop, which is also connected to the amplifier output, includes the two conductor plates.
 
As you may have recognized, the two conductor plates form a basic capacitor, an electrical component that can store up charge (see How Capacitors Work for details). The surface of the finger acts as a third capacitor plate, separated by the insulating layers in the cell structure and, in the case of the fingerprint valleys, a pocket of air. Varying the distance between the capacitor plates (by moving the finger closer or farther away from the conducting plates) changes the total capacitance (ability to store charge) of the capacitor. Because of this quality, the capacitor in a cell under a ridge will have a greater capacitance than the capacitor in a cell under a valley.
 
To scan the finger, the processor first closes the reset switch for each cell, which shorts each amplifier's input and output to "balance" the integrator circuit. When the switch is opened again, and the processor applies a fixed charge to the integrator circuit, the capacitors charge up. The capacitance of the feedback loop's capacitor affects the voltage at the amplifier's input, which affects the amplifier's output. Since the distance to the finger alters capacitance, a finger ridge will result in a different voltage output than a finger valley.
 
The scanner processor reads this voltage output and determines whether it is characteristic of a ridge or a valley. By reading every cell in the sensor array, the processor can put together an overall picture of the fingerprint, similar to the image captured by an optical scanner.
 
The main advantage of a capacitive scanner is that it requires a real fingerprint-type shape, rather than the pattern of light and dark that makes up the visual impression of a fingerprint. This makes the system harder to trick. Additionally, since they use a semiconductor chip rather than a CCD unit, capacitive scanners tend to be more compact that optical devices. 
 
 
Analysis

In movies and TV shows, automated fingerprint analyzers typically overlay various fingerprint images to find a match. In actuality, this isn't a particularly practical way to compare fingerprints. Smudging can make two images of the same print look pretty different, so you're rarely going to get a perfect image overlay. Additionally, using the entire fingerprint image in comparative analysis uses a lot of processing power, and it also makes it easier for somebody to steal the print data.

Instead, most fingerprint scanner systems compare specific features of the fingerprint, generally known as minutiae. Typically, human and computer investigators concentrate on points where ridge lines end or where one ridge splits into two (bifurcations). Collectively, these and other distinctive features are sometimes called typica.
 
The scanner system software uses highly complex algorithms to recognize and analyze these minutiae. The basic idea is to measure the relative positions of minutiae, in the same sort of way you might recognize a part of the sky by the relative positions of stars. A simple way to think of it is to consider the shapes that various minutia form when you draw straight lines between them. If two prints have three ridge endings and two bifurcations, forming the same shape with the same dimensions, there's a high likelihood they're from the same print.
 
To get a match, the scanner system doesn't have to find the entire pattern of minutiae both in the sample and in the print on record, it simply has to find a sufficient number of minutiae patterns that the two prints have in common. The exact number varies according to the scanner programming.