Bluejacking

ABSTRACT

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.

Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

Sixth Sense Technology

ABSTRACT

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand. Also can access or manipulate the information using fingers make a call by Extend hand on front of the projector and numbers will appear for to click know the time by Draw a circle on wrist and a watch will appear. take a photo by Just make a square with fingers, highlighting what want to frame, and the system will make the photo which can later organize with the others using own hands over the air.

The device has a huge number of applications, it is portable and easily to carry as can wear it in neck. The drawing application lets user draw on any surface by observing the movement of index finger. Mapping can also be done anywhere with the features of zooming in or zooming out. The camera also helps user to take pictures of the scene is viewing and later can arrange them on any surface. Some of the more practical uses are reading a newspaper reading a newspaper and viewing videos instead of the photos in the paper. Or live sports updates while reading the newspaper. The device can also tell arrival, departure or delay time of air plane on tickets. For book lovers it is nothing less than a blessing. Open any book and find the Amazon ratings of the book. To add to it, pick any page and the device gives additional information on the text, comments and lot more add on feature.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply

Confidential Data Storage and Deletion

ABSTRACT

With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions.

This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Co-operative Linux

ABSTRACT

This seminar describes Cooperative Linux, a port of the Linux kernel that allows it to run as an unprivileged lightweight virtual machine in kernel mode, on top of another OS kernel. It allows Linux to run under any operating system that supports loading drivers, such as Windows or Linux, after minimal porting efforts. The paper includes the present and future implementation details, its applications, and its comparison with other Linux virtualization methods. Among the technical details, it also presents the CPU-complete context switch code, hardware interrupt forwarding, the interface between the host OS and Linux, and the management of the VM‘s pseudo physical RAM.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Emotional Annotation of Text

ABSTRACT

Emotion is at the core of understanding ourselves and others, and the automatic expression and detection of emotion could enhance our experience with technologies. Emotion analysis is a rapidly developing area in computational linguistics. With the advent of affective computing, the task of adequately identifying, representing and processing the emotional connotations of text has acquired importance. This seminar concentrates on how the emotion of the text is annotated. The emotion of a sentence of text should be derived by composition of the emotions of the words in the sentence. Existing approaches to this task rely most often on a simplified representation of the sentence as a bag of words, where all words contribute in equal measure. However, intuitively certain words can probably be considered more significant; depending on the role they play in the word from their syntactic or semantic structure. Of the various existing approaches for representing emotions, some are better suited for some problems and some for others. In this seminar I am focusing on the various problems and the technologies used to implement the same and how the emotional annotation of a text is done by ontological reasoning.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Fluorescent Multilayer Disc (FMD)

ABSTRACT

Compact discs were a revolutionary product at its time and influenced many spheres of human activity. People started recording music of high quality, which didn’t get worse with the time as it happens to be on tape. As soon as CDs appeared in computer industry they immediately became an undoubted helper both for users and for programmers. The latter were able to increase volume of their program products by adding video and audio elements etc. Later discs were used for digital video (VideoCD).

But technologies are progressing. Data are growing faster and faster. A usual CD is far not enough (640 MBytes). So, there appeared DVD technology. Of course we are happy with those 17 GBytes that can be kept on one DVD disc, but this is a limiting point. So we need a completely new method of storing information on portable data medium. And at last, the company Constellation 3D demonstrates a new format: FMD (Fluorescent Multilayer Disk), which can provide us with a staggering 140 GB of storage space seems to be an enticing solution for the storage-hungry masses.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Zone Based Ant Colony Routing In MANET

ABSTRACT

Ant colony optimization (ACO) is a stochastic approach for solving combinatorial optimization problems like routing in computer networks. The idea of this optimization is based on the food accumulation methodology of the ant community. Position based routing algorithms (POSANT) had some significant loopholes to find route like it never guarantees the route would be the shortest one, in cases while it is able to find it. The routing algorithms which are based on ant colony optimization find routing paths that are close in length to the shortest paths. The drawback of these algorithms is the large number of control messages that needs to be sent or the long delay before the routes are established from a source to a destination.This paper presents a new routing algorithm for mobile ad hoc network by combining the concept of Ant Colony approach and Zone based routing approach using clustering to get shortest path with small number of control messages to minimize the overhead. Also this shows that zone based ant colony routing algorithm using cluster is more efficient than POSANT routing algorithm by comparative Overhead study of POSANT and Zone based Ant using clustering concept with respect to varying Node Number, Zone Size and Mobility.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony

ABSTRACT

SPam over Internet Telephony (SPIT) is a potential source of future annoyance in Voice over IP (VoIP) systems. A typical way to launch a SPIT attack is the use of an automated procedure (i.e., bot), which generates calls and produces unsolicited audio messages. A known way to protect against SPAM is a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). In this paper, we evaluate existing audio CAPTCHA, as this type of format is more suitable for VoIP systems, to help them fight bots. To do so, we first suggest specific attributes-requirements that an audio CAPTCHA should meet in order to be effective. Then, we evaluate this set of popular audio CAPTCHA, and demonstrate that there is no existing implementation suit-able enough for VoIP environments. Next, we develop and implement a new audio CAPTCHA, which is suitable for SIP-based VoIP telephony. Finally, the new CAPTCHA is tested against users and bots and demonstrated to be efficient.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

CAPTCHA security for Phishing: Secure or not?

ABSTRACT

Addressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable safe online banking on a compromised host, and solving the general ignorance of security warning.
CAPTCHA is primarily used to anti bot automated login, also, CAPTCHA base application can further provides secure PIN input against keylogger and mouse-logger for Bank’s customer.

Assuming users are always unconscious of security warning in our model, we have designed a series of attacks and defenses under this interesting condition. We will start by formalizing a security defense utilizing CAPCTCHA, its limitations are analyzed; Then, we will attack a local bank employing CAPTCHA solution, which we show how its can be bypassed from its vulnerability in its implementation. We further introduce – Control-Relaying Man-In-The-Middle (CR-MITM) attack, a remote attack just like a Remote Terminal Service that can capture and relay user inputs without local Trojan assistant, which is possible to defeat CAPTCHA phishing protection in the future. Under our model, we conclude, visual security defense alone is feeble for anti-phishing.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Bubble sensing

ABSTRACT

We propose bubble-sensing, a new sensor network abstraction that allows mobile phone users to create a binding between sensing tasks and the physical world at locations of interest, that remains active for a duration set by the user. We envision mobile phones being able to affix sensing task bubbles at places of interest and then receive sensed data as it becomes available in a delay-tolerant fashion, in essence, creating a living documentary of places of interest in the physical world. The system relies on other mobile phones that opportunistically pass through bubble-sensing locations to acquire tasks and do the sensing on behalf of the initiator, and deliver the data to the bubble-sensing server for retrieval by the user who initiated the task.

We describe an implementation of the bubble-sensing system using sensor-enabled mobile phones, specifically, Nokia’s N80 and N95 (with GPS, accelerometers, microphone, camera). Task bubbles are maintained at locations through the interaction of ”bubble carriers”, which carry the sensing task into the area of interest, and ”bubble anchors”, which maintain the task bubble in the area when the bubble carrier is no longer present. In our implementation, bubble carriers and bubble anchors implement a number of simple mobile phone based protocols that refresh the task bubble state as new mobile phones move through the area. Phones communicate using the local Ad-Hoc 802.11g radio to transfer task state and maintain the task in the region of interest. This task bubble state is ephemeral and times out when no bubble carriers or bubble anchors are in the area. Our design is resilient to periods when no mobiles pass through the bubble area and is capable of ‘‘reloading” the task into the bubble region.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

  • All rights reserved.