Bluejacking

ABSTRACT

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.

Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

If you are interested in this seminar topic, Click here to know 
how to get the full report. * conditions apply
Advertisements

5G Mobile Technology

ABSTRACT

5G Technology stands for 5th Generation Mobile technology. 5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. Recently apple has produced shivers all around the electronic world by launching its new handset, the I-phone. Features that are getting embedded in such a small piece of electronics are huge.

The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future. The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Confidential Data Storage and Deletion

ABSTRACT

With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions.

This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

If you are interested in this seminar topic, Click here to know
how to get the full report. * conditions apply

Co-operative Linux

ABSTRACT

This seminar describes Cooperative Linux, a port of the Linux kernel that allows it to run as an unprivileged lightweight virtual machine in kernel mode, on top of another OS kernel. It allows Linux to run under any operating system that supports loading drivers, such as Windows or Linux, after minimal porting efforts. The paper includes the present and future implementation details, its applications, and its comparison with other Linux virtualization methods. Among the technical details, it also presents the CPU-complete context switch code, hardware interrupt forwarding, the interface between the host OS and Linux, and the management of the VM‘s pseudo physical RAM.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Emotional Annotation of Text

ABSTRACT

Emotion is at the core of understanding ourselves and others, and the automatic expression and detection of emotion could enhance our experience with technologies. Emotion analysis is a rapidly developing area in computational linguistics. With the advent of affective computing, the task of adequately identifying, representing and processing the emotional connotations of text has acquired importance. This seminar concentrates on how the emotion of the text is annotated. The emotion of a sentence of text should be derived by composition of the emotions of the words in the sentence. Existing approaches to this task rely most often on a simplified representation of the sentence as a bag of words, where all words contribute in equal measure. However, intuitively certain words can probably be considered more significant; depending on the role they play in the word from their syntactic or semantic structure. Of the various existing approaches for representing emotions, some are better suited for some problems and some for others. In this seminar I am focusing on the various problems and the technologies used to implement the same and how the emotional annotation of a text is done by ontological reasoning.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Fluorescent Multilayer Disc (FMD)

ABSTRACT

Compact discs were a revolutionary product at its time and influenced many spheres of human activity. People started recording music of high quality, which didn’t get worse with the time as it happens to be on tape. As soon as CDs appeared in computer industry they immediately became an undoubted helper both for users and for programmers. The latter were able to increase volume of their program products by adding video and audio elements etc. Later discs were used for digital video (VideoCD).

But technologies are progressing. Data are growing faster and faster. A usual CD is far not enough (640 MBytes). So, there appeared DVD technology. Of course we are happy with those 17 GBytes that can be kept on one DVD disc, but this is a limiting point. So we need a completely new method of storing information on portable data medium. And at last, the company Constellation 3D demonstrates a new format: FMD (Fluorescent Multilayer Disk), which can provide us with a staggering 140 GB of storage space seems to be an enticing solution for the storage-hungry masses.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony

ABSTRACT

SPam over Internet Telephony (SPIT) is a potential source of future annoyance in Voice over IP (VoIP) systems. A typical way to launch a SPIT attack is the use of an automated procedure (i.e., bot), which generates calls and produces unsolicited audio messages. A known way to protect against SPAM is a Reverse Turing Test, called CAPTCHA (Completely Automated Public Turing Test to Tell Computer and Humans Apart). In this paper, we evaluate existing audio CAPTCHA, as this type of format is more suitable for VoIP systems, to help them fight bots. To do so, we first suggest specific attributes-requirements that an audio CAPTCHA should meet in order to be effective. Then, we evaluate this set of popular audio CAPTCHA, and demonstrate that there is no existing implementation suit-able enough for VoIP environments. Next, we develop and implement a new audio CAPTCHA, which is suitable for SIP-based VoIP telephony. Finally, the new CAPTCHA is tested against users and bots and demonstrated to be efficient.

If you are you interested in this seminar topic, mail to us to get

the full report * of the seminar topic.

Mail ID: - contact4seminars@gmail.com 

* conditions apply

– OR –

Click here for Quick Contact (Request for Topics)

  • © 2008 – 2013 seminars4you,

  • All rights reserved.