Prashant singh, Pratik kr. Sharma, Tanuj kr. Aggarwal,
Cryptography And Network Security Principles And Practices
Prashant singh, Pratik kr. Sharma, Tanuj kr. Aggarwal,
he field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. That is a broad statement that covers a host of possibilities. To give you a feel for the areas covered in this paper, consider the following examples of security violations: 1. User A transmits a file to user B. The file contains sensitive information (e.g., payroll records) that is to be protected from disclosure. User C, who is not authorized to read the file, is able to monitor the transmission and capture a copy of the file during its transmission.This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic techniques.
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden.. This paper in tends to give an overview of image steganography, its use sand techniques. It also attempts to identify the requirements of a good steganographical go rithmand briefly reflectson which steganographic techniques are more suitable for which applications
Review of Single Step Techniques for Production of ACNT’s
Mr.Asad , Suhail Farooq,
The perpendicular orientation of carbon nanotubes to a substrate are vertically aligned carbon nanotubes (VACNT), and parallel to the substrate are horizontally aligned CNT’s. Their proper and dense alignment along with outstanding physical and chemical properties enables ACNT to be used to may various fields. The most common single step methods to produced aligned carbon nanotubes (ACNT’s) are Thermal pyrolysis and flame synthesis, and both are relatively simple. This review explore different methods used for ACNT growth, the process parameter determine the morphology ACNT and the application of structured ACNT’s.
FPGA (Field Programmable gate Array) devices are one of the modern technologies that are changing the electronic industry. They are riding the same integrated circuit process curves as processors and memories and keep getting larger, faster, and cheaper and are now common in low and mid volume embedded products With the advances of FPGA technology, many engineers now have the opportunity to do medium scale digital design. They can be found in primary and secondary surveillance radar, satellite communication, automotive, manufacturing, and many other types of products. Time triggered communication within FPGA is enhanced with the help of UART (Universal Asynchronous Receiver Transmitter).It translates between serial and parallel bits of data. The device changes incoming parallel information to serial data which can be sent on a communication line. A second UART can be used to receive the information. The UART performs all the tasks, timing, parity checking, etc. needed for the communication. UART is designed in VHDL. The design process involves converting the requirements into a format that represents the desired digital function(s).
A Study On Spatial Data Clustering Algorithms In Data Mining
Sundararajan S, Dr.Karthikeyan S,
The enormous amount of hidden data in large databases has produced incredible interests in the area of data mining. Clustering is an indispensable task in data mining to cluster data into significant subsets to obtain useful information. Clustering spatial data is a significant issue that has been broadly investigated to discover hidden patterns or useful sub-groups and has several applications like satellite imagery, geographic information systems, medical image analysis, etc. The spatial clustering approach is supposed to satisfy the necessities of the application for which the investigation is carried out. In addition the same clustering approach should be very efficient in processing data along with noise and outliers, since they are inherently present in spatial data. In recent times, several commercial data mining clustering approaches have been developed and their practice is increasing enormously to realize desired objective. Researchers are attempting their best efforts to accomplish the fast and effective algorithm for the abstraction of spatial data, which are clearly discussed in the literature. Each individual clustering approach has its own merits and demerits for processing multidimensional data and consequently in spatial clustering.
This paper deals with the mind control using psychotronics as a directed energy weapons & its relevant uses in human life in present day. These device works on the principle of squad(ssss) or e.m wave. We are very thankful Prof. Sitanshu Ray for his tireless support and his lucid way of explaining us the salient points really helped us to write this paper.
This paper deals with the cyber crime & its realistic facts which blocked our working capability, efficiency & revealed the privacy of victims. This paper also deals with the futuristic cyber crime & its prevention. We are very thankful to Prof. Sitanshu Ray for his tireless support and his lucid way of explaining us the salient points really helped us to write this paper.
Network Security – How to Defend an Infinitely Expanding Frontier
Titu kumar, Rohit kumar jha, Sitanshu Mohan Ray,
This paper is all about the network security, how to save your network from various type of attack. I am very thankful to all my friends and teacher who help me to write this kind of article.