Air powered cars

ABSTRACT

This seminar is to explain the working of air powered cars. These type of cars will run on compressed air instead of gasoline .The car is powered by a two cylinder compressed air engine.
The air powered car is also called as a low pollution or zero pollution cars. Since the car runs on compressed air it is environmentally friendly.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Tripwire

ABSTRACT

Tripwire is an intrusion detection system. It is a software tool that checks to see what has changed on your system. The program monitors the key attributes of files that should not change, including the size, binary signature, expected change of size, and other related important datas. Tripwire is an open source program created to monitor changes in a key subset of files identified by the user and report on any changes in any of those files. When changes are detected the system Administrator can determine whether those changes occurred due to normal, permitted activity, or whether they were caused by a breakin. If the former, the administrator can update the system baseline to the new files. If the latter, then repair and recovery activity begins. Tripwire’s principle is simple enough. The system administrator identifies key files and causes Tripwire to record checksum for those files. Administrator also puts a cron job to scan those files at intervals(daily or more frequently), comparing to the original checksum. Any changes, addition, or deletion are reported, so the proper action can be taken.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Honeypots

ABSTRACT

Honeypot is an exciting new technology with enormous potential for the security community. It is resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques.
They are a highly flexible tool that comes in many shapes and sizes. This paper deals with understanding what a honeypot actually is ,and how it works.
There are different varieties of honeypots. Based on their category they have different applications. This paper gives an insight into the use of honeypots in productive as well as educative environments.
This paper also discusses the advantages and disadvantages of honeypots , and what the future hold in store for them.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

DNSSEC: A Protocol towards securing the Internet Infrastructure

ABSTRACT

Unlike spam, worms, viruses, and phishing—all of which confront end users directly—infrastructure attacks occur outside their normal frame of reference and control. But attacks on the Domain Name System (DNS), an engine of the Internet infrastructure, appear to be increasing in length and severity, affecting DNS information associated with financial services institutions, Internet service providers, and major corporations in the travel, health, technology, and media/ entertainment sectors. Such attacks can result in, say, dropped or intercepted email messages or users unknowingly redirected to fraudulent sites where they inadvertently hand over personal information.
The ultimate casualty in a serious infrastructure attack is public trust. The Internet technical community has responded to threats to the DNS infrastructure by developing the DNS Security Extensions (DNSSEC) protocol standard. DNSSEC-enabled systems run primarily in only a few early adoption and experimental zones.
DNSSEC introduces security at the infrastructure level through a hierarchy of cryptographic signatures attached to DNS records. In the context of DNSSEC, users are assured that the source of the data is verifiable as the stated source, and the mapping of a name to an IP address is accurate. DNSSEC – capable name servers also provide denial of- existence; that is, they tell a user that a name does not exist.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Embedded Systems Security

ABSTRACT

The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security requirements in the device to prevent possible physical attacks to expose the secure data such as secret keys from the device. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

An Energy Aware Framework for Dynamic Software Management in Mobile Computing Systems

ABSTRACT

Energy efficiency is a very important and challenging issue for resource-constrained mobile computers. Here, a novel dynamic software management (DSOM) framework to improve battery utilization is introduced. DSOM module is designed and implemented in user space, independent of the operating system. DSOM explores quality-of-service adaptation to reduce system energy and employs a priority based pre-emption policy for multiple applications to avoid competition for limited energy resources. Software energy macromodels for mobile applications are employed to predict energy demand at each QoS level, so that DSOM module is able to select the best possible trade-off between energy conservation and application QoS; it also honors the priority desired by the user. Experimental results on some mobile applications like video player, speech recognizer and voice-over-IP show that this approach can meet user specified task oriented goals and significantly improve battery utilization.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Image Compression Using Wedgelets

ABSTRACT

Images typically contain strong geometric features, such as edges, that impose a structure on pixel values and wavelet coefficients. Modeling the joint coherent behavior of wavelet coefficients is difficult, and standard image coders fail to fully exploit this geometric regularity. i.e. Most wavelet-based image coders fail to model the joint coherent behavior of wavelet coefficients near edges. Wedgelet is introduced as a geometric tool for image compression. Wedgelets offer a convenient parameterization for the edges in an image, Wedgelets offer piecewiselinear approximations of edge contours and can be efficiently encoded.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,362 other followers