Sunday, August 3, 2008
This online tool can do anything to make your image into a perfect cartoon and its pretty simple to use. Here are the following features which you would find in it:
- Cartoonizer
- Uvtar ( The image is the out come of uvtar)
- Video Cartoonizer.
Normal Photo
Cartoonised Pic
Another thing which can be done is SKETCH. There are various levels, so you can select the amount of sketch or amount of cartoonising the pic according to your wish. Another good option is GOODIES. Here various tools are available to make the image look more appealing.You will be able to download the picture after you have Cartoonized it enough and you are happy about it. So what are you waiting for?
Go to: http://www.befunky.com/
Article Idea: http://system-hacks.blogspot.com/2008/06/convert-images-videos-into-cartoon.html
Labels: Techno delights
Saturday, March 8, 2008
Motion Portrait is a cool digital animation technology that allows an ordinary digital photograph of a face into a living 3D animation. It works by automatically recognizing the eyes, nose and mouth and animating these creates a whole range of emotions that can be manipulated.
Uses of Motion Portrait could be for avatars, games and advertisements (e.g. how you would look with different hairstyles). More animated demos can be found here and here.
1 videoclip of Motion Portrait application follows....
Article idea:http://www.hemmy.net/2007/11/04/motion-portrait/
Labels: Techno delights
Wednesday, January 30, 2008
Power of Innovation!! !
Radical new tire design by Michelin. The next generation of tires.
These are actual pictures taken in the South Carolina plant of Michelin. It will be awhile before they are available to the automotive industry.
Labels: Techno delights
Tuesday, January 29, 2008
I was collecting information on Natural language processing.
This is when I met ELIZA.
It is a nice program which you would definitely love.
It speaks with you!!!
ELIZA is a computer program by Joseph Weizenbaum, designed in 1966, which parodied a Rogerian therapist, largely by rephrasing many of the patient's statements as questions and posing them to the patient. Thus, for example, the response to "My head hurts" might be "Why do you say your head hurts?" The response to "My mother hates me" might be "Who else in your family hates you?" ELIZA was named after Eliza Doolittle, a working-class character in George Bernard Shaw's play Pygmalion, who is taught to speak with an upper class accent.
Want to chat with ELIZA?????
Click here to meet ELIZA
ELIZA - a friend you could never have before
Eliza: Hello. I am ELIZA. How can I help you?
This is how the page will look!!!!
But dont try the questions here...
It wont work!!!
Labels: Techno delights
Sunday, January 27, 2008
Last week I had my department function(virtuoso).It was really cool and I worked for 2 events in the function.One was best manager and the other was Project presentation.Project presentation was my favourite and it was rocking.One of the project presented there was steganography.This term was relatively new to me.But my senior informed me that it was a very common project and it was used by Osama Bin Laden!!!This kindled interest in me to find more on this subject.This post contains some nice information on steganography such that,even a novice could understand!!!
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet -- a change so subtle that no one who isn't actively looking for it is likely to notice it.
Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.
The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.Often, steganography and cryptography are used together to ensure security of the covert message.
Steganography used in electronic communication include steganographic coding inside of a transport layer, such as an MP3 file, or a protocol, such as UDP.
Labels: Cryptography, Techno delights
Monday, November 12, 2007
How would computers look in the future???
Everyone has this doubt in mind.....
I saw a video in metacafe!
The technology was superb....
It is based on a pen being used as the computer!!
I wanted to share that video with you...
But don't bother the logical mistakes(windows xp the future?)in the video
because it is only a virtual representation....
Labels: Techno delights
Saturday, November 3, 2007
Labels: Techno delights
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags.
An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radiowaves. Some tags can be read from several meters away and beyond the line of sight of the reader.
Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a (RF) signal and can also be used for other specialized functions. The second is an antenna for receiving and transmitting the signal. A technology called chipless RFID allows for discrete identification of tags without an integrated circuit, thereby allowing tags to be printed directly onto assets at lower cost than traditional tags.
Labels: Techno delights
The 120 foot long video wall in Gehry’s InterActiveCorps IAC building provides an immersive experience that feels and looks out of this world. The high-resolution screen keeps the images crisp, making the entire lobby feel like a set of one long commercial.
As reported in Metropolis magazine, the wall was the brainchild of Bruce Mau Design, which proposed “a giant presentation for large audiences” that drive past the building along the autoroute next door every day. The technology involved in such a large rear-projection screen requires “not one, but 18 sequential projectors perfectly calibrated with computer software so that the point at which one projected image starts and the next takes over is barely discernible—a process called “edge blending.”
Labels: Techno delights
Friday, October 19, 2007
Now everyone has suddenly started to speak about surface
computers.
Actually What is a surface computer?
The Surface has a 3GHz Pentium 4 processor, 2GB of memory, an off the shelf graphics card, a scratch-proof spill-proof surface, a DLP projector, and 5 infrared cameras as mentioned above. However, the expensive components required for the interface also give the Surface a price tag of nearly $10,000.
Labels: MICROSOFT, Techno delights