PHISHING SEMINAR REPORT PPT FREE DOWNLOAD

Phishing is the act of attempting to acquire information such as username, password and credit card details as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites ,auction sites, online payment process or IT administrators are commonly used to lure the unsuspecting public .Phishing emails may contain links to websites that are infected with malware.A Phishing technique was described in details in 1987 and the first recorded use of the term “Phishing” was made in 1995.A Phishing was described in details, in a paper and presentation delivered to the International HP users Group , Interex.


SOFTWARE REUSE SEMINAR PPT FREE DOWNLOAD

Software reuse is the process of implementing or updating software systems using existing software components.To explain the benefits of software reuse and some reuse problems.To discuss several different ways to implement.To discuss cots reuse.To describe the development of software product lines.Horizontal Reuse:Horizontal reuse to software components used across a wide variety of applications.Vertical Reuse:Vertical Reuse the reuse of system functional areas, or domains, that can be used by a family of systems with similar functionality.Higher quality products.Less development time.Higher scheduling accuracy.Reliability.The applicability of generator reuse is limited to a small number of application domains.


GREEN CLOUD COMPUTING PPT FREE DOWNLOAD

Software Cloud computing is the use of computing resource (hard ware and)that are delivered  as a service over a network (typically the internet ).the name comes from the use of  a cloud –shaped symbol as an abstraction from the complex infrastructures it contains in system diagrams .cloud computing entrusts remote service with a users data ,software and computation.Software-as-a-Service (SaaS): A wide range of application services delivered via various business models normally available as public offering. Platform-as-a-Service (PaaS): Application development platforms provides authoring and runtime environment.Infrastructure-as-a-Service (IaaS): Also known as elastic compute clouds, enable virtual hardware for various uses.


 

BITTORRENT SEMINAR PPT FREE DOWNLOAD

To share a file or group of files, a peer first creates a .torrent file, a small file that contains metadata about the files to be shared, and Information about the tracker, the computer that coordinates the file distribution. Peers first obtain a .torrent file, and then connect to the specified tracker, which tells them from which other peers to download the pieces of the file.When transferring data over TCP, always have several requests pending at once, to avoid a delay between pieces being sent. At any point in time, some number, typically 5, are requested simultaneously.Every time a piece or a sub-piece arrives, a new request is sent out.Initially, a peer has nothing to tradeImportant to get a complete piece ASA.Select a random piece of the file and download it.



FACE RECOGNITION TECHNOLOGY PPT FREE DOWNLOAD

Face recognition is an attractive biometric for use in security applications. Face  recognition is non-intrusive, it can be performed without the subject’s knowing. This become particularly important in modern times because demand for enhanced  security  is in public interest.Facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a person’s claimed identity.  Regardless of specific method used.To identify any person we generally look at face and eyes in particular seem to tell a story how the person feels.Face recognition is a kind of electronic unmasking.It is a unique measurable characteristics of a human being Used to automatically recognize an individual’s identity.Two types 1.physiological & 2. behavioral characteristics A “biometric system” refers to integrated hardware and software used to conduct biometric identification.


GI-FI TECHNOLOGY PPT FREE DOWNLOAD

Gi-Fi or Gigabit Wireless is the world's first transceiver integrated on a single chip that  operates at 60GHz on the CMOS process.It allows  wireless transfer of audio and   video data  up to 5 gigabits per second within a range of 10 meters.It was developed by the Melbourne University based laboratories of NICTA (National ICT Australia Limited), Australia’s Information and Communications Technology Research Centre of Excellence.GI-FI means gigabit wireless.Worlds first transceiver integrated on single chip.Operates on 60ghz on the CMOS process.Allows wireless transfer of audio and video data at upto 5gb per second.Gi-Fi is ten times the current maximum wireless transfer rate usually within a range of 10 meters.The  reason for  pushing  into  Gi-Fi  technology is  because  of Slow data transfer rate,high power consumption,low range of frequency operation of earlier technologies i.e. Bluetooth and Wi-Fi.The  core components  of a GI-FI system  is  the  subscriber station which available to several  access points.It  supports  standard  of  IEEE  802.15.3C  Wireless PANThe wirelessspan is   computer    network    used    for communication   among   computer   devices (including   telephones   and   personal   digital assistants) close to one person .An 802.15.3c based system often uses  small antenna at the  subscriber station.The antenna  is  mounted  on  the roof.


MOBILE TV PPT FREE DOWNLOAD

Mobile TV has become a key, if not the key, application that mobile operators need to deploy to attractnew subscribers, or simply retain their existing base. Even before the business models and killerapplications for mobile video have been fully explored, mobile operators and broadcasters already face a wide variety of mobile video distribution standards, devices, and applications that deeply impact the way in which those services are deployed.This presentation will focus on the knowledge gained from early deployments of MPEG-4 encoders for.Mobile TV. Featured highlights include case studies on the Orange 3GPP deployment, with an overview of its technical challenges as well as current requirements for successful Mobile TV deployments.Mobile TV deployments can only be considered a success if they contribute positively to an operator's business. Most operators are looking beyond user subscription fees as the sole revenue source for the service by adding revenue from targeted advertising and other paid content. Operators also see tangential benefits of improved subscriber adoption.


 

Powered by Blogger.