Subscribe:

Pages

Showing posts with label ElectronicsSeminar-C. Show all posts
Showing posts with label ElectronicsSeminar-C. Show all posts

Monday, September 20, 2010

Cryptography is the art of devising codes and ciphers

Cryptography is the art of devising codes and ciphers, and cryptoanalysis is the art of breaking them. Cryptology is the combination of the two. In the literature of cryptology, information to be encrypted is known as plaintext, and the parameters of the encryption function that transforms are collectively called a key.
Cryptology took on many forms in the centuries between the fall of Rome and the dawn of the Industrial Age. By the late 19th century, with the advent of the telegraph and wireless radio, cryptology took its permanent place as an important component of commercial, military and diplomatic communications. Rudimentary mechanical and electromechanical encoding inventions developed at the turn of the 20th century and through World War I laid the foundation for stronger and more efficient cipher devices.
With the dawn of the computer age, the possibilities for encryption methods and devices expanded exponentially. Machines with blazing fast computing power gave cryptographers the ability for the first time to design complicated encryption techniques.
The next great evolution in cryptology came with the introduction of microprocessor-powered computers. The rapid deployment of increasingly powerful desktops quickened the pace of cryptographic development, since even a moderately skilled computer user could break many of the algorithms in use.
Cryptology is more deeply rooted in every part of our communication and computing world than when it was first employed by ancient peoples. We use it to protect everything from e-mail to e-commerce transactions to personal diaries. As our dependency upon technology increases, so too will our dependency upon cryptography. After all, we all have things we want to keep secret.

Sunday, September 27, 2009

Carbon nanotubes

“Carbon nanotubes can in principle play the same role as silicon as in electronic circuits”.

Although the electronics industry is already pushing the critical dimensions of transistors in commercial chips be-low 200 nanometers (billionths of a meter)- 400 atoms wide-engineers face large obstacles in continuing the miniaturization.

Within this decade, the materials and processes on which the computer revolution has been built will begin to hit fundamental physical limits.

Two major problems have so far thwarted attempts to shrink metal wires further.

1. There is as yet no good way to remove the heat produced by the devices, so packing them in more tightly will only lead to rapid overheating.

2. As metal wires get smaller, the gust of electrons moving through them becomes strong enough to bump the metal atoms around, and before long the wires fail like blown fuses

CLUSTERING TECHNOLOGY

The world of commerce relies on highly available information systems to run and manage core business operations such as data warehousing, online transaction processing, and decision support system solutions. Likewise, the worlds of science and engineering also rely on high-performance computing to provide solutions and solve problems,. No matter how fast or available today’s computers are, tomorrow’s applications will invariably demand more. A stage has been reached where stand-alone computers can no longer provide the required levels of availability and reliability. Today’s challenge involves not just providing high availability and optimal performance, but doing so flexibly and inexpensively. Clustering Technology should prove to be a possible solution to address a broad range of system availability and performance requirements.

A Cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. Generally speaking, clusters offer a way to utilize computer resources more productively in comparison to when the same number of machines in working standalone – the total result is greater than the sum of the separate parts. Clustering Technology aims at providing continuous high availability of resources despite processor and communication failures.

CELLULAR TECHNOLOGY

As we head into the 21st century, wireless communications are becoming a household name. Currently there are over 60 million cell phone subscribers in the world. It is not the cost of the cell phone device that counts but the cost of using it .as a result, the cellular phone infrastructure is being optimized to allow calls to be placed as inexpensively and reliably as possible. Today more than ever, cellular companies are looking for ways to bring down the cal cost to achieve even higher market penetration, especially in metropolitan areas.

Cell phones are available with an incredible array of functions. Depending on the cell phone model, you can store contact information, make task or to-do lists, keep track of appointments and set remainders, use the built calculator for simple math, send or receive email, get information (news, entertainment, stock quotes) from the internet, play simple games, and integrate other devices such as personal digital assistants (PDA), mp3 players, and GPS receivers.

We are going to explore the advent of analog cellular, security flaws and fixes, as well as the dawning of a new age with the proliferation of digital cellular technology.

Saturday, August 1, 2009

Chatterbot

A chatterbot is a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Though many appear to be intelligently interpreting the human input prior to providing a response, most chatterbots simply scan for keywords within the input and pull a reply with the most matching keywords or the most similar wording pattern from a local database. Like any person, chatterbots seem to have a sort of personality which is expressed by their answers. The top chatterbots are Elbot, Talk-bot, Yabberwacky, Eugene, Alice, and Alan. A chatterbot is a conversation simulator done as a computer program which gives the appearance of conversing with a user in natural language.

CELL PHONE VIRUSES AND SECURITY

Cell phones have become powerful and sophisticated computing devices and are moving toward an always on form of networking. However, such powerful networked computers are also at risk for a new class of malware, including viruses, worms and trojans specifically designed for a mobile environment. This seminar topic covers a taxonomy of attacks against mobile phones that shows known as well as potential attacks. Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Security experts are finding a growing number of viruses, worms, and Trojan horses that target cellular phones. Security researchers attack simulations have shown that before long, hackers could infect mobile phones with malicious software that deletes personal data or runs up a victim\'s phone bill by making toll calls. The attacks could also degrade or overload mobile networks, eventually causing them to crash, financial data stealing, and Risk factors for smart phones. Mobile-device technology is still relatively new, and vendors have not developed mature security approaches. An introduction to security concerns in mobile appliances. To counter the growing threat, antivirus companies have stepped up their research and development. In addition, vendors of phones and mobile operating systems are looking for ways to improve security. Recent innovations and emerging commercial technologies that address these issues are also incorporated in the topic