Bluejacking

ABSTRACT

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.

Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

5G Mobile Technology

ABSTRACT

5G Technology stands for 5th Generation Mobile technology. 5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. Recently apple has produced shivers all around the electronic world by launching its new handset, the I-phone. Features that are getting embedded in such a small piece of electronics are huge.

The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

NANOSCALE MATERIALS AND DEVICES FOR FUTURE COMMUNICATION NETWORKS

ABSTRACT

New discoveries in materials on the nanometer-length scale are expected to play an important role in addressing ongoing and future challenges in the field of communication. Devices and systems for ultra-high-speed short-and long-range communication links, portable and power-efficient computing devices, high-density memory and logics, ultra-fast interconnects, and autonomous and robust energy scavenging devices for accessing ambient intelligence and needed information will critically depend on the success of next-generation emerging nanomaterials and devices. This seminar presents some exciting recent developments in nanomaterials that have the potential to play a critical role in the development and transformation of future intelligent communication networks.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Nokia Morph Technology

ABSTRACT

In business a product could have a shorter life if it can’t win the hearts of people and showcase new technology, so Nokia is coming up with the Nokia Morph flexible mobile phone which the company claims include nanotechnology and would immensely benefit its end-users. The main benefit of Nanotechnology is that its components are flexible, transparent and extremely strong. The company believes this latest technology would be a distinctive phone by 2015, but a few technical glitches remain to be solved, like the use of new battery materials etc.

Nokia morph is a joint technology concept, developed by Nokia Research Center (NRC) and the University of Cambridge (UK). The morph demonstrate how future mobile device might be stretchable and flexible, allowing the user to transform their mobile devices into radically different shaped. It demonstrates the ultimately that nanotechnology might be capable of delivering: flexible material, transparent electronics and self-cleaning surface. Fibril proteins are woven into three dimensional meshes that reinforce thin elastic structures. Using the same principle behind spider silk, this elasticity enables the device to literally changes shapes and configure itself to adapt to the task at hand.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Confidential Data Storage and Deletion

ABSTRACT

With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions.

This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Skinput

ABSTRACT

Skinput is an input technology that uses bio-acoustics sensing to localize finger taps on the skin. When augmented with a pico projector, the device can provide a direct manipulation, graphical user interface on the body. The technology was developed by Chris Harrison, Desney Tan and Dan Morris at Microsoft Research’s Computational User experience Group.

Skinput represents one way to decouple input from electronic devices with the aim of allowing devices to become smaller without simultaneously shrinking the surface area on which input can be performed. While other systems, like Sixth sense have attempted this with computer vision, Skinput employs acoustics, which take the advantage of the human body’s natural sound conductive properties. This allows the body to be annexed as an input surface without the need for the skin to be invasively instrumented with sensors, tracking, markers, or other items.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Co-operative Linux

ABSTRACT

This seminar describes Cooperative Linux, a port of the Linux kernel that allows it to run as an unprivileged lightweight virtual machine in kernel mode, on top of another OS kernel. It allows Linux to run under any operating system that supports loading drivers, such as Windows or Linux, after minimal porting efforts. The paper includes the present and future implementation details, its applications, and its comparison with other Linux virtualization methods. Among the technical details, it also presents the CPU-complete context switch code, hardware interrupt forwarding, the interface between the host OS and Linux, and the management of the VM‘s pseudo physical RAM.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

Follow

Get every new post delivered to your Inbox.

Join 1,339 other followers