" Download lot of Presentations, This Site features presentations about Science and Engineering topics"

Thursday, December 30, 2010

Building Applications

Going the Extra Mile
View more presentations from Karthik Kastury.

Download Now

Information Security Slides

 

image

 

Download Now

Honey Pots Tracking System

 

image

 

Download Now

Grid Computing

 

image

Download Now

Imbricate cryptography

Imbricate cryptography
View more presentations from Presentaionslive.blogspot.com.

 

Download Now

Network Security & Cryptography

Abstract

Network security can be described as the effort to create a secure computing platform, designed so that agents (users or programs) cannot perform actions that they are not allowed to perform, but can perform the actions that they are allowed to. Network Security systems insure the integrity of the system by protecting from hackers trying to get into the system and by restricting access within the system to individuals specific needs.

We have dealt with one of the Basic Network Security Tools the Firewalls. It is a combination of hardware and software that secures access to a local network or computer. A firewall guards the local network by analyzing the data leaving and entering, allowing authorized traffic through while keeping unauthorized traffic out.

Firewalls are typically configurable by network administrators so that they can set

policy to determine what traffic is deemed safe. A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. Firewalls use one or more of three methods to control traffic flowing in and out of the network: packet filtering, proxy service, and stateful inspection.

Firewalls are customizable (add or remove filters) through IP address, protocols, domain services etc. They protect the network from SMTP session hijacking, denial of service, spam, viruses, e-mail bombs etc. A function that is often combined with a firewall is a proxy server. The proxy server is used to access Web pages by the other computers.

Hence we conclude that Network Security has become a mandatory thing for every network to such an extent that we can’t imagine a world without it in future.
image

 

Download Now

Information Security

Abstract:

According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, we put forward a contrary view: information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics: network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons

image

 

Download Now

Brain Computer Interface

 

 

 

Abstract:

BCIs (Brain Computer Interface) exploit the ability of human communication and control bypassing the classical neuromuscular communication channels. BCI can help people with inabilities to control wheel chairs, or other devices with brain activity.

BCI is a new neuroscience paradigm that might help us in better understanding how the human brain works in terms of reorganization, learning, memory, social interaction, neuroprosthetic extensions and much more. The Technology involved in BCIS is EEG(Electroencephalogram),MEG (Magentoencephalogram), fMRI (functional Magnetic Resonance Imaging) and ECOG (Electrocorticography).

Download Now

Keywords:EEG(Electroencephalogram),MEG(Magentoencephalogram),fMRI(functionalMagneticResonanceImaging),Neuroprostheticextensions,ECoG(Electrocorticography).

Technorati Tags: ,,,,,,,

Use of Hydrogen gas in IC Engines

Abstract

In view of alarming rates at which the fossil fuels are dwindling , the development of alternate fuel technology has been inevitable. In search of alternate fuels for the future the major contenders is identified as hydrogen. This invention relates generally to the use of hydrogen in an internal combustion engine, and particularly relates to promoting the use of hydrogen in existing internal combustion engines while minimizing engine retrofitting and invasion. The merits and demerits associated with hydrogen fuel is discussed.

Download Now

Sunday, December 26, 2010

Mobile Computing

http://downtopl.blogspot.com/2010/12/mobcomputing.html

Mobile Computing
View more presentations from Ajay kiran.

Grid Computing

 

Grid computing
View more presentations from Ajay kiran.

Cmod

Cmod
View more presentations from Ajay kiran.

Y2K38 Problem

 

Y2 k38.
View more presentations from Ajay kiran.

 

Cryptography

 

Security and Cryptography
View more presentations from Ajay kiran.

Cryonics

Cryonics
View more presentations from Ajay kiran.

 

Zigbee

Zigbee technology
View more presentations from Ajay kiran.

Voice Over Internet Protocol

VOIP
View more presentations from Ajay kiran.

Wimax

Wireless presentation1
View more presentations from Ajay kiran.

Unique P mail Adressing

Unique p mail-addressing 97-03
 

down

LinkWithin

Related Posts Plugin for WordPress, Blogger...

Site INFO

<>" Download lot of Presentations, This Site features presentations about Science and Engineering topics"

Subscribe via email

Enter your email address:

Delivered by FeedBurner