Nokia Morph Technology

ABSTRACT

In business a product could have a shorter life if it can’t win the hearts of people and showcase new technology, so Nokia is coming up with the Nokia Morph flexible mobile phone which the company claims include nanotechnology and would immensely benefit its end-users. The main benefit of Nanotechnology is that its components are flexible, transparent and extremely strong. The company believes this latest technology would be a distinctive phone by 2015, but a few technical glitches remain to be solved, like the use of new battery materials etc.

Nokia morph is a joint technology concept, developed by Nokia Research Center (NRC) and the University of Cambridge (UK). The morph demonstrate how future mobile device might be stretchable and flexible, allowing the user to transform their mobile devices into radically different shaped. It demonstrates the ultimately that nanotechnology might be capable of delivering: flexible material, transparent electronics and self-cleaning surface. Fibril proteins are woven into three dimensional meshes that reinforce thin elastic structures. Using the same principle behind spider silk, this elasticity enables the device to literally changes shapes and configure itself to adapt to the task at hand.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Issues of Routing IN VANET

ABSTRACT

Vehicular Ad Hoc Network (VANET) is a sub class of mobile ad hoc networks. VANET provides wireless communication among vehicles and vehicle to road side equipments. The communication between vehicles is used for safety, comfort and for entertainment as well. The performance of communication depends on how better the routing takes place in the network. Routing of data depends on the routing protocols being used in network. In this study different ad hoc routing protocols for VANET are studied. The main aim of this study is to identify which ad hoc routing method has better performance in highly mobile environment of VANET. To measure the performance of routing protocols in VANET, two different scenarios i.e. city and highway are considered. Routing protocols were selected carefully after carrying out literature review. The selected protocols were then evaluated through simulation in terms of performance metrics i.e. throughput and packet drop. After simulation results, MATLAB can be used to plot the graph to compare the results of selected routing protocols with each other.

From the results, it is observed that A-STAR shows better performance in terms of high throughput and low packet drop as compared to AODV and GPSR in city environment, while GPSR shows better performance as compared to AODV in both highway and city environment of VANET. Based on the results of performance metrics in different environments of VANET, it is realized that position based routing method of VANET outperformed the traditional ad hoc topology based routing. In VANET the protocol performance depends on vehicle speed, driving environment etc. that may vary from one environment of network to another.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Embedded OS for Real-Time Applications

ABSTRACT

The advent of microprocessors has opened up several product opportunities that simply did not exist earlier. These intelligent processors have invaded and embedded themselves into all fields of our lives be it the kitchen (food processors, microwave ovens), the living rooms (televisions, air conditioners) or the work places (fax machines, pagers, laser printer, credit card readers) …etc.

As the complexities in the embedded applications increase, use of an operating system brings in lot of advantages. Most embedded systems also have real-time requirements demanding the use of Real time Operating Systems (RTOS) capable of meeting the embedded system requirements. Real-time Operating System allows realtime applications to be designed and expanded easily. The use of an RTOS simplifies the design process by splitting the application code into separate tasks. An RTOS allows one to make better use of the system recourses by providing with valuable services such as semaphores, mailboxes, queues, time delays, time outs…etc.

This report looks at the basic concepts of embedded systems, operating systems and specifically at Real Time Operating Systems in order to identify the features one has to look for in an RTOS before it is used in a real-time embedded application. Some of the popular RTOS have been discussed in brief, giving their salient features, which make them suitable for different applications.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Zone Based Ant Colony Routing In MANET

ABSTRACT

Ant colony optimization (ACO) is a stochastic approach for solving combinatorial optimization problems like routing in computer networks. The idea of this optimization is based on the food accumulation methodology of the ant community. Position based routing algorithms (POSANT) had some significant loopholes to find route like it never guarantees the route would be the shortest one, in cases while it is able to find it. The routing algorithms which are based on ant colony optimization find routing paths that are close in length to the shortest paths. The drawback of these algorithms is the large number of control messages that needs to be sent or the long delay before the routes are established from a source to a destination.This paper presents a new routing algorithm for mobile ad hoc network by combining the concept of Ant Colony approach and Zone based routing approach using clustering to get shortest path with small number of control messages to minimize the overhead. Also this shows that zone based ant colony routing algorithm using cluster is more efficient than POSANT routing algorithm by comparative Overhead study of POSANT and Zone based Ant using clustering concept with respect to varying Node Number, Zone Size and Mobility.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Trends in Optical Switching Techniques

ABSTRACT

We are currently witnessing a strong worldwide push toward bringing fiber closer to individual homes and businesses. The emerging FTTX access networks will move the bandwidth bottleneck from the first/last mile toward metropolitan and wide area networks, creating a need for efficient optical-switching mechanisms. In this article, we review the current trends in optical switching that help to improve the bandwidth efficiency, as well as to decrease the cost and power consumption of next-generation optical networks. Our review provides an overview of the optical switching domain and facilitates the understanding of newly emerging switching techniques and their interpretation as derivatives of the presented main optical switching trends.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

CAPTCHA security for Phishing: Secure or not?

ABSTRACT

Addressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable safe online banking on a compromised host, and solving the general ignorance of security warning.
CAPTCHA is primarily used to anti bot automated login, also, CAPTCHA base application can further provides secure PIN input against keylogger and mouse-logger for Bank’s customer.

Assuming users are always unconscious of security warning in our model, we have designed a series of attacks and defenses under this interesting condition. We will start by formalizing a security defense utilizing CAPCTCHA, its limitations are analyzed; Then, we will attack a local bank employing CAPTCHA solution, which we show how its can be bypassed from its vulnerability in its implementation. We further introduce – Control-Relaying Man-In-The-Middle (CR-MITM) attack, a remote attack just like a Remote Terminal Service that can capture and relay user inputs without local Trojan assistant, which is possible to defeat CAPTCHA phishing protection in the future. Under our model, we conclude, visual security defense alone is feeble for anti-phishing.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Bubble sensing

ABSTRACT

We propose bubble-sensing, a new sensor network abstraction that allows mobile phone users to create a binding between sensing tasks and the physical world at locations of interest, that remains active for a duration set by the user. We envision mobile phones being able to affix sensing task bubbles at places of interest and then receive sensed data as it becomes available in a delay-tolerant fashion, in essence, creating a living documentary of places of interest in the physical world. The system relies on other mobile phones that opportunistically pass through bubble-sensing locations to acquire tasks and do the sensing on behalf of the initiator, and deliver the data to the bubble-sensing server for retrieval by the user who initiated the task.

We describe an implementation of the bubble-sensing system using sensor-enabled mobile phones, specifically, Nokia’s N80 and N95 (with GPS, accelerometers, microphone, camera). Task bubbles are maintained at locations through the interaction of ”bubble carriers”, which carry the sensing task into the area of interest, and ”bubble anchors”, which maintain the task bubble in the area when the bubble carrier is no longer present. In our implementation, bubble carriers and bubble anchors implement a number of simple mobile phone based protocols that refresh the task bubble state as new mobile phones move through the area. Phones communicate using the local Ad-Hoc 802.11g radio to transfer task state and maintain the task in the region of interest. This task bubble state is ephemeral and times out when no bubble carriers or bubble anchors are in the area. Our design is resilient to periods when no mobiles pass through the bubble area and is capable of ‘‘reloading” the task into the bubble region.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

DNSSEC: A Protocol towards securing the Internet Infrastructure

ABSTRACT

Unlike spam, worms, viruses, and phishing—all of which confront end users directly—infrastructure attacks occur outside their normal frame of reference and control. But attacks on the Domain Name System (DNS), an engine of the Internet infrastructure, appear to be increasing in length and severity, affecting DNS information associated with financial services institutions, Internet service providers, and major corporations in the travel, health, technology, and media/ entertainment sectors. Such attacks can result in, say, dropped or intercepted email messages or users unknowingly redirected to fraudulent sites where they inadvertently hand over personal information.
The ultimate casualty in a serious infrastructure attack is public trust. The Internet technical community has responded to threats to the DNS infrastructure by developing the DNS Security Extensions (DNSSEC) protocol standard. DNSSEC-enabled systems run primarily in only a few early adoption and experimental zones.
DNSSEC introduces security at the infrastructure level through a hierarchy of cryptographic signatures attached to DNS records. In the context of DNSSEC, users are assured that the source of the data is verifiable as the stated source, and the mapping of a name to an IP address is accurate. DNSSEC – capable name servers also provide denial of- existence; that is, they tell a user that a name does not exist.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Model checking for Securing E-commerce transaction

ABSTRACT

The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt that must be satisfied by e-commerce protocols. This seminar shows how model checking can be used to obtain an assurance about the existence of these properties in an e-commerce protocol. It is essential that these desirable properties be satisfied, even in the presence of site or communication failure. Using the model checker we evaluate which failures cause the violation of one or more of the properties. The results of the analysis are then used to propose a mechanism that handles the failures to make the protocol failure resilient.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Performance Evaluation of Efficient and Reliable Routing Protocols for Fixed-Power Sensor Networks

ABSTRACT

A Fixed–power wireless sensor networks are cost effective and prevalent, and they are facing lots of problems like RF interference, node failure from environmental noise and energy constraints. A routing protocol for Fixed – power wireless sensor networks must overcome these problems. Because it have to achieve reliability, energy efficiency and scalability in message delivery. In this paper, we propose an efficient and reliable routing protocol (EAR) that achieves reliable and scalable performance with minimal compromise of energy efficiency. The routing design of EAR is based on four parameters – expected path length and a weighted combination of distance traversed, energy levels and link transmission success history, to dynamically determine and maintain the best routes. We will evaluate the performance of efficient and reliable routing protocols for such networks.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,330 other followers