LOGARITHMIC KEYING

ABSTRACT

Consider a communication network where each process needs to securely exchange messages with its neighboring processes. In this network, each sent message is encrypted using one or more symmetric keys that are shared only between two processes: – the process that sends the message and the neighboring process that receives the message. A straightforward scheme for assigning symmetric keys to the different processes in such a network is to assign each process O(d) keys, where d is the maximum number of neighbors of any process in the network.
This report presents a more efficient scheme for assigning symmetric keys to the different processes in a communication network. This scheme is referred to as logarithmic keying, which assigns O(log d)symmetric keys to each process in the network. We show that logarithmic keying can be used in rich classes of communication networks that include star networks, dense bipartite networks.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

A Search Engine for 3D Models

ABSTRACT


As the number of 3D models available on the Web grows, there is an increasing need for a search engine to help people find them. Unfortunately, traditional text-based search techniques are not always effective for 3D data. In this paper, we investigate new shape-based search methods.
The key challenges are to develop query methods simple enough for novice users and matching algorithms robust enough to work for arbitrary polygonal models. We present a web-based search engine system that supports queries based on 3D sketches, 2D sketches, 3D models, and/or text keywords. For the shape-based queries, we have developed a new matching algorithm that uses spherical harmonics to compute discriminating similarity measures without requiring repair of model degeneracies or alignment of orientations. It provides 46{245% better performance than related shape matching methods during precision-recall experiments, and it is fast enough to return query results from a repository of 20,000 models in under a second. The net result is a growing interactive index of 3D models available on the Web (i.e., a Google for 3D models).



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



E-Intelligence

ABSTRACT


E-intelligence systems provide internal business users, trading partners, and corporate clients rapid and easy access to the e-business information, applications, and services they need in order to compete effectively and satisfy customer needs. They offer many business benefits to organizations in exploiting the power of the Internet. For example, e-intelligence systems give the organization the ability to:

1. Integrate e-business operations into the traditional business environment, giving business users a complete view of all corporate business operations and information.

2. Help business users make informed decisions based on accurate and consistent e-business information that is collected and integrated from e-business applications. This business information helps business users optimize Web-based offerings (products offered, pricing and promotions, service and support, and so on) to match marketplace requirements and analyze business performance with respect to competitors and the organization’s business-performance objectives.
3. Assist e-business applications in profiling and segmenting e-business customers. Based on this information, businesses can personalize their Web pages and the products and services they offer.
4. Extend the business intelligence environment outside the corporate firewall, helping the organization share internal business information with trading partners. Sharing this information will let it optimize the product supply chain to match the demand for products sold through the Internet and minimizes the costs of maintaining inventory.

5. Extend the business intelligence environment outside the corporate firewall to key corporate clients, giving them access to business information about their accounts.
With this information, clients can analyze and tune their business relationships with other organization, improving client service and satisfaction.

6. Link e-business applications with business intelligence and collaborative processing applications, allowing internal and external users to seamlessly move among different systems.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com 
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Smart Cards

ABSTRACT


In this seminar, is giving some basic concepts about smart cards. The physical and logical structure of the smart card and the corresponding security access control has been discussed in this seminar. It is believed that smart cards offer more security and confidentiality than the other kinds of information or transaction storage. Moreover, applications applied with smart card technologies are illustrated which demonstrate smart card is one of the best solutions to provide and enhance their system with security and integrity. The seminar also covers the contactless type smart card briefly. Different kinds of scheme to organise and access of multiple application smart card are discussed. The first and second schemes are practical and workable on these days, and there is real applications developed using those models. For the third one, multiple independent applications in a single card, there is still a long way to go to make it becomes feasible because of several reasons.

At the end of the paper, an overview of the attack techniques on the smart card is discussed as well. Having those attacks does not mean that smart card is unsecure. It is important to realise that attacks against any secure systems are nothing new or unique. Any systems or technologies claiming 100% secure are irresponsible. The main consideration of determining whether a system is secure or not depends on whether the level of security can meet the requirement of the system.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com 
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



IEEE 802.11n –Next Generation Wireless Standard

ABSTRACT


The newest standard in Wireless LAN is called 802.11n. 802.11 is an industry standard for high-speed networking. 802.11n is designed to replace the 802.11a, 802.11b and 802.11g standards. 802.11n equipment is backward compatible with older 802.11gab and it supports much faster wireless connections over longer distances. So-called “Wireless N” or “Draft N” routers available today are based on a preliminary version of the 802.11n. The beta version of this standard is used now in laptops and routers. 802.11n will work by utilizing multiple input multiple output (MIMO) antennas and channel bounding in tandem to transmit and receive data. It contains at least 2 antennas for transmitting data’s. 802.11n will support bandwidth greater than 100 Mbps and in theory it can have a speed of 600 Mbps.It can be used in high speed internets, VOIP, Network Attach Storage (NAS), gaming. The full version will be implemented in the laptops and in the LANs in upcoming years.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com 
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



Shallow Water Acoustic Networks

ABSTRACT


In the last two decades, underwater acoustic communications has experienced significant progress. The traditional approach for ocean-bottom or ocean-column monitoring is to deploy oceanographic sensors, record the data, and recover the instruments. But this approach failed in real-time monitoring. The ideal solution for real-time monitoring of selected ocean areas for long periods of time is to connect various instruments through wireless links within a network structure. Basic underwater acoustic networks are formed by establishing bidirectional acoustic communication between nodes such as autonomous underwater vehicles (AUVs) and fixed sensors. The network is then connected to a surface station, which can further be connected to terrestrial networks such as the Internet.



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com 
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



10 GB ETHERNET

ABSTRACT


Since its inception at Xerox Corporation in the early 1970s, Ethernet has been the dominant networking protocol. Of all current networking protocols, Ethernet has, by far, the highest number of installed ports and provides the greatest cost performance relative to Token Ring, Fiber Distributed Data Interface (FDDI), and ATM for desktop connectivity. Fast Ethernet, which increased Ethernet speed from 10 to 100 megabits per second (Mbps), provided a simple, cost-effective option for backbone and server connectivity.

10 Gigabit Ethernet builds on top of the Ethernet protocol, but increases speed tenfold over Fast Ethernet to 10000 Mbps, or 10 gigabit per second (Gbps). This protocol, which was standardized in august 2002, promises to be a dominant player in high-speed local area network backbones and server connectivity. Since10 Gigabit Ethernet significantly leverages on Ethernet, customers will be able to leverage their existing knowledge base to manage and maintain gigabit networks.

The purpose of this technology brief is to provide a technical overview of 10 Gigabit Ethernet. This paper discusses:

• The architecture of the Gigabit Ethernet protocol, including physical interfaces, 802.3x flow control, and media connectivity options
• The 10 Gigabit Ethernet standards effort and the timing for Gigabit Ethernet
• 10 Gigabit Ethernet topologies
• Migration strategies to 10 Gigabit Ethernet



If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com
* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)



  • © 2008 – 2013 seminars4you,

  • All rights reserved.