Friday, July 30, 2010
Seminar on Photonic Band Gap Materials: Light Trapping Crystals
Labels:
ELECTRONICS SEMINAR TOPICS,
ElectronicsSeminar-P,
P
Power transformers
Seminar on Optical Isolator: Application to Photonic Integrated Circuits
reference :http://www.eng.monash.edu.au
Labels:
ELECTRONICS SEMINAR TOPICS,
O
Advanced Optical Functionalities in Photonic Crystals
High-quality self-assembled three-dimensionally-ordered photonic crystals have been synthesized with inorganic and polymeric colloids. These crystals display a pseudo bandgap in the UV / visible / near-IR regions with high values of reflectance combined with low transmission. The stop band characteristics have been modified after infiltrating these passive photonic crystals with materials such as ZnO as well as by synthesizing active photonic crystals directly from colloids made of organic dye-polymer composites. The emission characteristics of these active species are modified by the photonic crystal environment due to the anisotropic stop band. It has been possible to fabricate photonic crystal heterostructures as well as photonic crystal waveguides for building functionalities into photonic integrated circuits. BJ93GJCCMXAR
Labels:
A,
ELECTRONICS SEMINAR TOPICS,
ElectronicsSeminar-A
2010 seminar topic Multi-wavelength and Broadband Optical Sources for Fiber-Optic Communication
Labels:
ELECTRONICS SEMINAR TOPICS,
ElectronicsSeminar-M,
M
Wednesday, July 21, 2010
Cusat Previous Years Question Papers B.Tech all branch
| Civil Engineering |
| Computer Science |
| Electrical and Electronics Engineering |
Electronics and Communication Engineering |
| Information Technology |
| Mechanical Engineering |
| Safety and Fire Engineering |
reference :http://dspace.cusat.ac.in
Sunday, July 18, 2010
Cryptography
Security of information results from the need for Private transmission of messages. It is very essential that Security coverage should be provided to the computer systems, including to security to communication channels
Cryptography means hidden writing. Cryptography is used to protect information to which illegal access is possible and where other protective measures are inefficient
The basic idea in cryptography is to take a message in ordinary language, called plain text. This is transformed in some way to produce cipher text. The cipher text can now be sent to the correspondent. He uses another transformation to recover the plain text from the cipher text. The plain text is encrypted or hidden by the first transformation to obtain the cipher text. The cipher text is decrypted by another transformation to obtain the plain text once again. After encryption, cipher text can be transmitted over a data link or stored in a file
More details
Labels:
C,
CS AND IT SEMINAR TOPICS,
CS-IT-seminars-C
Subscribe to:
Comments (Atom)


