Bluejacking

ABSTRACT

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.

Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

Sixth Sense Technology

ABSTRACT

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand. Also can access or manipulate the information using fingers make a call by Extend hand on front of the projector and numbers will appear for to click know the time by Draw a circle on wrist and a watch will appear. take a photo by Just make a square with fingers, highlighting what want to frame, and the system will make the photo which can later organize with the others using own hands over the air.

The device has a huge number of applications, it is portable and easily to carry as can wear it in neck. The drawing application lets user draw on any surface by observing the movement of index finger. Mapping can also be done anywhere with the features of zooming in or zooming out. The camera also helps user to take pictures of the scene is viewing and later can arrange them on any surface. Some of the more practical uses are reading a newspaper reading a newspaper and viewing videos instead of the photos in the paper. Or live sports updates while reading the newspaper. The device can also tell arrival, departure or delay time of air plane on tickets. For book lovers it is nothing less than a blessing. Open any book and find the Amazon ratings of the book. To add to it, pick any page and the device gives additional information on the text, comments and lot more add on feature.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

5G Mobile Technology

ABSTRACT

5G Technology stands for 5th Generation Mobile technology. 5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. Recently apple has produced shivers all around the electronic world by launching its new handset, the I-phone. Features that are getting embedded in such a small piece of electronics are huge.

The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

NANOSCALE MATERIALS AND DEVICES FOR FUTURE COMMUNICATION NETWORKS

ABSTRACT

New discoveries in materials on the nanometer-length scale are expected to play an important role in addressing ongoing and future challenges in the field of communication. Devices and systems for ultra-high-speed short-and long-range communication links, portable and power-efficient computing devices, high-density memory and logics, ultra-fast interconnects, and autonomous and robust energy scavenging devices for accessing ambient intelligence and needed information will critically depend on the success of next-generation emerging nanomaterials and devices. This seminar presents some exciting recent developments in nanomaterials that have the potential to play a critical role in the development and transformation of future intelligent communication networks.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Nokia Morph Technology

ABSTRACT

In business a product could have a shorter life if it can’t win the hearts of people and showcase new technology, so Nokia is coming up with the Nokia Morph flexible mobile phone which the company claims include nanotechnology and would immensely benefit its end-users. The main benefit of Nanotechnology is that its components are flexible, transparent and extremely strong. The company believes this latest technology would be a distinctive phone by 2015, but a few technical glitches remain to be solved, like the use of new battery materials etc.

Nokia morph is a joint technology concept, developed by Nokia Research Center (NRC) and the University of Cambridge (UK). The morph demonstrate how future mobile device might be stretchable and flexible, allowing the user to transform their mobile devices into radically different shaped. It demonstrates the ultimately that nanotechnology might be capable of delivering: flexible material, transparent electronics and self-cleaning surface. Fibril proteins are woven into three dimensional meshes that reinforce thin elastic structures. Using the same principle behind spider silk, this elasticity enables the device to literally changes shapes and configure itself to adapt to the task at hand.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Confidential Data Storage and Deletion

ABSTRACT

With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions.

This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Skinput

ABSTRACT

Skinput is an input technology that uses bio-acoustics sensing to localize finger taps on the skin. When augmented with a pico projector, the device can provide a direct manipulation, graphical user interface on the body. The technology was developed by Chris Harrison, Desney Tan and Dan Morris at Microsoft Research’s Computational User experience Group.

Skinput represents one way to decouple input from electronic devices with the aim of allowing devices to become smaller without simultaneously shrinking the surface area on which input can be performed. While other systems, like Sixth sense have attempted this with computer vision, Skinput employs acoustics, which take the advantage of the human body’s natural sound conductive properties. This allows the body to be annexed as an input surface without the need for the skin to be invasively instrumented with sensors, tracking, markers, or other items.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply
  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,362 other followers