Network security

Related essay: Online privacy 1.1 Network Security Today’s network environment is full of dangerous attackers, hackers, crackers, and spammers. Authentication, authorization and auditing are the most important issues of security on data communication. An authentication system must provide adequate security for its intended environment, otherwise it fails to meet its primary goal. A proposed system should … Read more

FPGA based Jpeg encoder

Compression is playing a vital role in data transfer. Hence, Digital camera uses JPEG standard to compress the captured image data from sensors so as to reduce the storage requirements. Because, Photos capture from digital camera are big in size, so it take more time to upload such photos on web. Some time connection speed … Read more

Online social network (OSN)

ABSTRACT Online Social Network (OSN) is a vast environment where people communicate with each other and share their ideas. The ideas that are shared by the person is posted on the user profile. So that all the views of the person are shared among the people. The major drawback in OSN is the irrelevant messages … Read more

VOIP

Internet telephony or Voice over Internet Protocol (VoIP) is a product that is quickly changing the telecom industry and how people communicate. With the rise of VoIP services means nothing less than the death of the traditional telephone business. VoIP is an emerging technology that utilizes the Internet infrastructure to make phone calls as opposed … Read more

Authentication

There have been many authentication methods that have been proposed by researchers for authentication. Some of the most prominent of them have been discussed here. Initially there have been some techniques where user based mechanisms are used to authenticate server. Automated Challenge Response Method (ARM) [19] is one such authentication mechanisms where challenge generation module … Read more

A survey of peer to peer systems

A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts, are defined to measure capabilities of peers in providing services and … Read more

Graphical passwords

CHAPTER 3 AN ENHANCED MULTILEVEL AUTHENTICATION SCHEME USING GRAPHICAL PASSWORDS Now-a-days there are several types of technologies to avoid online attacks . Still there are some limitations which are leading to violation of the security. This results in attacks in which the intruder can claim the user’s confidential information. 3.1 Traditional Password Authentication In the … Read more

Online privacy

Related essay: Network security Imagine being followed in a shopping mall by a survey taker who is trying to record every store you visited, the products you have bought, or the conversations you carried on with someone? Starting from the cell phones to the atm withdrawals and credit card use, the everyday actions of most … Read more

PLC controllers

Introduction: The PLC – logic controllers or programmable – Is an electronic device used in automation in industrial systems Kaltgm mechanism of action of the production lines at the plant what , and unlike systems traditional computer has been designed to suit the conditions more difficult in terms of the areas of bearing temperatures and dust … Read more

Effects of technology

Technology has changed the way of living; it has changed the way we interact with people. Technology is the ultimate persuasion for people today, and it’s something they want to master. Technology has affected our lifestyle drastically and led us to believe that our life has changed for the better. However, there is a critical … Read more

Image processing

INTRODUCTION 1.1 IMAGE PROCESSING: Image processing is a computer imaging where application involves a human being in the visual loop. In other words the image are to be examined and a acted upon by people. The image processing mainly involves in three stages: Image restoration. Image enhancement. Image compression. 1.1.1 Image Restoration This is the … Read more

Digital watermarking scheme

ABSTRACT Digital media application, multimedia security, copyright protection are becoming important in today’s world as its distribution over network is increasing rapidly, indeed left a concern for the owner about their ownership protection. For the copyright protection of the digital applications, digital watermarking is introduced that enables to mark the digital image with undetectable secret … Read more