Steganography Presentation For Students

Steganography is the science and art of concealing the existence of information. It conceals the meaning or content of the existence message. Steganographic systems hide the messages within images or any other digital objects and these messages are invisible. There are two basic principles, i.e., files which have digitized images or sound can be changed to an extent in order to function properly and the inability of human to difference minor changes in image colors or sound quality. The image can be of 16-bit sound, 8-bit or 24-bit image.

Steganography Presentation For Students is to establish conceal communication is very important nowadays with the vast growth of the Internet. The process of steganography is mostly implemented on images. It is the art and science of writing hidden messages such that only recipient knows existence of the message.

 Steganography is used widely in historical times like hidden messages in wax tablets, hidden messages on messenger’s body, and hidden messages on paper in secret links.

This formula provides pieces of the steganographic process:

Cover_medium(image/audio files) + hidden_data + stego_key=stego_medium.

Modern techniques of steganography are hidden text within Web pages, hiding files in plain sight, and null ciphers. These types of steganography are used in conjunction with cryptography such that the information is doubly protected.

The most widely used application of steganography is digital watermarking. It is used to maintain the confidentiality of important information, to protect the data from possible sabotage, theft, and also used for illegitimate reasons. Steganography is still a new idea. It is difficult to detect the large text file within an image.

Conclusion:

Steganography is an effective and fascinating method of hiding data which is used throughout history. There are many reasons to use data hiding that include watermarking for passwords or key processes. However, this technology is easy to implement but difficult to detect.

Download Steganography Presentation For Students.

Quantumn Cryptography Btech Final Year Seminar

In computer networked system, the major security risk is with conducting business on the Net. The security risks that occur are unauthorized access, Eavesdropping, Password sniffing, spoofing-spoofing, Denial of Service, virus attack, System modification, Data modification, Repudiation, E-mail bombing. Therefore, Quantumn Cryptography Btech Final Year Seminar is one of the best methods to secure the information.

 It protects data transmitted over the telecommunication network and it is mainly by an appropriate Encryption techniques. The Cryptography deals with the encryption and decryption of data. Encryption is the method of scrambling information such that it becomes unintelligible and can be unscrambled with the help of keys.

 Encryption is acquired using a Symmetric Encryption or Asymmetric Encryption. In Symmetric Encryption or Single-key Cryptography, a single key is used to encrypt and decrypt the data. In Asymmetric Encryption or Public-key cryptography, two keys are used namely public and private key for encryption and decryption.

 The network security, Quantum cryptography is efficient and fastest method to secure the information. In Quantum cryptography, the basic concept is Quantum theory of light, polarization, the foundation of Quantum cryptography is present in the Heidelberg’s uncertainty principle. It is an effort to form a body of shared and secret information between two users of a communication channel.

 Cryptography is one of the host authentication technique applied in building a network channel secure to transmit confidential data. In cryptographic system, the plaintext is converted into ciphertext. The ciphertext is transmitted at the receiver end and is converted back to the plaintext. The Hinesburg uncertainty principle and Quantum entanglement exploited in a system of secure communication referred as Quantum cryptography.

Conclusion:

Quantum cryptography promises to have a secure communication by providing security based on the fundamental laws of physics. The quantum cryptography solves the problem of key distribution and the exchange of information is secured in a very strong sense.

Download Quantumn Cryptography Btech Final Year Seminar.

Voice over Internet Protocol (Voip)

Though Voice over Internet Protocol (VOIP) came into existence several years back, it recently has begun to take off as a public switched telephone networks (PSTN). This technology reduces costs with the help of single IP network to support data and voice applications. Service providers are also attracted by VoIP’s revenue potential. VoIP or Internet telephony is a technology which allows phone calls over the Internet.

 It is necessary to know the basic network functions which allow voice services possible. Here is brief description how PSTN and VoIP networks use. Database services locate endpoints and translate between the addressing schemes in two networks. Signaling to coordinate the actions of the multiple networking components to complete a call between two endpoints. Call connect and disconnect mechanisms to transport audio content. Coder-decoder (CODEC) operations to convert analog waveforms to digital.

 Packet switching sends a small chunk of data from one system to another which is called a packet. The payload is a piece of the e-mail, a music file or any type of file. The computer sends the packet to a router and router sends the packet to another router and so on.

 A typical VoIP network has five major components. They are VoIP phones, consoles and other devices, Call Processing Server/PBX, Media/PSTN-to-VoIP Gateways, IP network, and Session Border Controllers (SBCs). The VoIP network needs media gateways to perform the CODEC functions, i.e., analog-to-digital conversion of voice traffic to create voice IP packets.

Conclusion:

Deploying VoIP is not a simple technology though VoIP is an attractive alternative to traditional PSTN voice services. Before having a VoIP solution, organizations must have required functionality and the potential issues to deploy a VoIP network. It is surely this protocol flexibility which makes VoIP-based voice systems more useful than legacy voice systems. For designing their VoIP solution, Organizations should also remember about latency, jitter, bandwidth, packet loss, reliability, and security issues.

Download Voice over Internet Protocol (Voip) Technical Paper Presentation.

Zigbee Technology Seminar Presentation

Zigbee Technology Seminar Presentation is specified for a suite of high level communication protocols with the help of small and low-power digital radios. The Zigbee technology is purposed to be simpler and cheaper than Bluetooth. ZigBee is the most new specifications that have low data rates and consume very low power.

 With the help of ZigBee technology, interoperability will be enabled in multi-purpose self-organizing mesh networks. ZigBee is standard for embedded application software. The bandwidth of Bluetooth is 1 Mbps whereas ZigBee has one-fourth of this value. ZigBee has long battery life and low costs. ZigBee is meant to cater to the sensors and remote controls market and battery operated products.

 It is designed for sensors and remote controls which are numerous. It requires small data packets and extreme low power consumption for long life. It consists of three different types of ZigBee device. They are ZigBee coordinator (ZC), ZigBee Router (ZR), and ZigBee End Device (ZED).

 The ZigBee Standard composed of three sets of solutions called layers. These layers has features such as low cost, easy implementation, reliable data transfer, short-range operations, very low power consumption and adequate security. The three layers of Zigbee are Network and Application Support layer, Physical (PHY) layer, and Media access control (MAC) layer.

The topologies included in Zigbee are star, peer-to-peer, and mesh. There are four frame structures. They are Beacon frame, Data frame, Acknowledgement frame, and MAC command frame. Zigbee has four characters which are Low cost, Range and obstruction issue avoidance, Multisource products, and Low power consumption.

Its application includes Home Entertainment and Control, Home Awareness, Mobile Services, Commercial Building, and Industrial Plant.

Conclusion:

ZigBee is a communication protocol formulated by the relevant task force. It has many features like low cost, low power consumption, simply implemented. Zigbee devices will be highly ecological than its predecessors. It has high density of nodes per network.

Download Zigbee Technology Seminar Presentation.

Wireless Communication Red Tacton

Wireless Communication Red Tacton Broadband technology is a necessary for the population. Internet Service Providers (ISPs) have been dealing with challenges to get broadband solutions. Digital Subscriber Line (DSL) technology seems to be pioneer solution.

 Wi-Fi is used in MAN solutions with bandwidth, coverage, and power consumption for the development of conformance and interoperability of the IEEE 802.16 standard, which is known as Wireless MAN. The WiMAX is referred as a standards-based technology which enables wireless broadband access to cable and DSL. WiMAX is a certification mark or stamp of approval.

 Based on IEEE 802.16 and ETSI HiperMAN, WiMAX has common mode of operation, Concentrated in 2- to 11-GHz WMAN and Defines both the MAC and PHY layers. The IEEE 802.16 technical has three generations. They are IEEE 802.16, IEEE 802.16-2004, and IEEE 802.16-2005.

 A WiMAX system has two parts. One is WiMAX tower and second one is WiMAX   receiver. IEEE 802.16 gives support to two modes of operation, PMP and PTP. Point-to-point (PTP) link is a dedicated link which connects only two nodes that are BS and subscriber terminal.

 The topologies used are Point-to-multipoint (PMP) and Mesh Topology. Mesh networks are wireless data networks which give the SSs more intelligence than traditional wireless transmitters and receivers. WiMAX is a certification addressing interoperability over IEEE 802.16 standards-based products. The IEEE 802.16 standard has two models. One is fixed and another one is portable.

 Conclusion:

 WiMAX is the dominant standard for Wireless MAN networks in the world market. The OFDM shows the difference between the 802.16 and 802.16a standard. There are prototypes and development kits using WiMAX standard which are utilized for education. There are some products which are introduced into the market that already composed of WiMAX standard. Market is the key word to take into account. Products need to be delivered as per the market needs.

Download Wireless Communication Red Tacton Technical Seminar Report.

Wireless Power Transmission and Reception Using SPS & Rectenna

Wireless Power Transmission and Reception Using SPS & Rectenna: The inexhaustible energy resource is a high priority to fulfill long term needs. The solar energy can be converted directly into electrical energy with the help of solar cells. We are helpless if power supply need arises for 24 hours. For this, there is a solution which is wireless power transmission from space through a system consisting of SPS (Solar Power Satellite) and RECTENNA (RECTIFYING ANTENNA) by Microwaves.

 The advantage of the space location is it is independent of day-night cycle and weather and also is pollution free. Today’s techniques allow us to have a platform carrying solar batteries which are nothing but generators. It converts electric current into the Electromagnetic field energy of ten centimeter range (microwaves) and antenna forming electromagnetic wave beam. Space solar power stations are costly due the great size of their receiving and radiating antennas.

 Antenna and Rectenna sizes are selected in order that the rectenna is located in the antenna’s Fresnel’s area. The SPS and rectenna system is an economically competitive large scale energy source when compared to other energy sources and appears to provide much less expensive energy source. The SPS and rectenna system has many advantages in terms of environmental issues

 The configuration of the spacetenna is a triangular prism with a length of 800 m and sides of 100 m. The Spacetenna is a square shaped with whose dimension 132 meters by 132 meters and is regularly filled with 1936 segments of sub array. The spacetenna contains pilot signal receiving antennas which are followed by detectors to find out the location of the rectenna on the earth, power transmission antenna elements and phase control systems. A Rectenna is considered as a base station for a geo-stationary satellite.

 Conclusion:

Synthesizing the wireless power transmission, the SPS is commercially viable to improve its efficiency and the cost. It is achieved by placing the Rectenna within the Fresnel area of the transmitter and placing the transmitting antenna in the LEO orbit.

Download Technical PPT Paper Presentation on Wireless Power Transmission and Reception Using SPS & Rectenna.

WiMax CSE Power Point Presentation

WiMax CSE Power Point Presentation is an acronym which stands for Worldwide Interoperability for Microwave Access. It is a wireless metropolitan area network (MAN) technology. It connects IEEE 802.11 (Wi-Fi) hotspots with each other and to other parts of the Internet.

It can provide a wireless alternative to cable and DSL for last mile (last km) broadband access. WiMAX is the wireless solution for metropolitan area network (MAN). WiMax does not conflict with Wi-Fi but complements it.

 WiMax system consists of two parts. They are a WiMax tower & A WiMax receiver. It has the capacity to broadband Internet access. WiMAX is means of having high bandwidth for a variety of data-intensive applications. WiMAX is described as a framework for the evolution of wireless broadband, than a static implementation of wireless technologies.

There are two types of Wimax. They are Fixed Wimax and Mobile Wimax. Wi-Fi infrastructure devices typically have three categores based on its application. They are Wi-Fi at Home, Wi-Fi in Business, and Wi-Fi in gaming. The final step in the network area scale is the global area network (GAN). The proposal for GAN is IEEE 802.20.

 WiMAX is a wireless metropolitan area network (MAN) technology. It connects 802.11(WiFi) hotspots to the Internet. It provides a wireless extension to cable and DSL for last mile (last km) broadband access. 802.16 provides up to 50 km (31 miles) of linear service area range. It allows users connectivity to a base station. It defines a MAC(Media Access Control) layer that supports multiple physical layer (PHY) specifications.

 Conclusion:

The WiMAX helps the widespread broadband wireless access by creating a brand forth technology. WiMAX will achieve a peak by getting Portable Internet a reality. When WiMAX chipsets are connected laptops and other portable devices, it will provide high-speed data services extending limited coverage of public WLAN to metropolitan areas.

Download WiMax CSE Power Point Presentation.

Seminar on Underwater Wireless Communication

Technical Student Seminar on Underwater Wireless Communication is a flourishing research field of wireless communications. Applications like oceanographic data collection, AUVs(autonomous underwater vehicles),underwater radio, transmission of video and audio signals by real time monitoring emphasized to overcome the present limitations.

Wireless is a used to describe the telecommunication with which the electromagnetic waves carry the signal over the communication path. The signals are not radio signals as electromagnetic waves propagate at a short distance so acoustic waves are used that propagate at a long distance. To overcome some impediments, here is an existence of underwater wireless communication. Necessity of underwater wireless system includes temporary experiments, breaking of wires, significant cost for deployment, and experiment over long distances.

Acoustic modems employ advanced modulation scheme and channel equalization to combat multiple paths to have improved signal to noise ratio. A high performance error detection and correction coding scheme is employed which reduces the bit error rate to less than 10-7. Parts of an acoustic modem are DSP board (Digital Signal Processing Board), AFE board (Analog Front End Board), and DC/DC converter.

Underwater networks consist of a number of sensors and vehicles which are deployed to do collaborative monitoring tasks on a given area. There is a traditional approach for ocean bottom monitoring is to deploy underwater sensors which record data and then recover the instruments. With this method, real time monitoring is not possible and failures happen. It can overcome by connecting underwater instruments with the help of wireless links.

Conclusion:

Beside development of the underwater wireless communication, there is an immense scope. Hence more research of the ocean bottom still remains unexploded. Therefore, the main objective about this emerging field is to overcome the present limitations such as the environmental effects on the noise performance of acoustic systems. It is highly affected by heterogeneities of the water column, variations of sound velocity versus depth, temperature and salinity, multiple and random sea reflections and significant scattering by fish, bubble clouds and plankton.

Download Seminar on Underwater Wireless Communication.

Worldwide Interperability For Microwave Access WiMAX

A wireless revolution has entered into our daily routine lives and is becoming wireless. The broadband access continues to escalate worldwide and lower-bandwidth wire line methods failed to accomplish the use for higher bandwidth integrated data and voice services. WiMAX is radio technology that provides two-way Internet access at various megabits per second with ranges of many miles.

 The Worldwide Interperability For Microwave Access WiMAX technology can challenge DSL (Digital Subscriber Line) and cable broadband services and it provides similar speeds and is less expensive to set up. WiMAX provides fixed, nomadic, portable and, eventually, Mobile wireless broadband connectivity without Direct line-of-sight with a base station.

 WIMAX stands for Worldwide Interperability For Microwave Access. It ensures that broadband wireless radios use interoperates from vendor to vendor which is manufactured for customer. It is a new standard developed by the IEEE. It focuses to solve the problems of point to multipoint broadband outdoor wireless networks. It has various applications which have connectivity for homes and businesses and backhaul for wireless hot spots.

 WiMAX is a wireless technology which is faster and has a longer range than Wi-Fi. However, WiMAX does not conflict with Wi- Fi. It is designed to co-exist with it and extends to flavors of wired ethernet (IEEE 802.3), token ring (IEEE 802.5) and non- IEEE Standards.

 here are two layers addressed in the standard. They are the physical (PHY) and the media access control (MAC) layer design. It provides good coverage and good quality of service.

 Conclusion:

 For portable/nomadic, WiMAX systems will give a better performance, interference rejection, multipath tolerance, high data quality of service support (data oriented MAC, symmetric link) and lower future equipment costs i.e., low chipset complexity, high spectral efficiencies. Hence, WiMAX complements existing and emerging 3G mobile and wire line networks. It plays an important role to provide service and deliver converged service offerings.

Download Worldwide Interperability For Microwave Access WiMAX.

Web Search Engines Seminar For Students

Web Search Engines Seminar For Students is a program that is designed to locate stored data on the World Wide Web (WWW). Search engine indexes are complex and similar. The quality of the indexes breaks or makes the quality of search results.

The large number of users navigates the Web via search engines. It is more likely to display thousands of responses by typing a keyword or phrase and a handful are near to what we searching are located on secondary search pages. A web search engine helps a person to retrieve a number of references that match the content.

The first Web search engine was “Wandex”, collected by the World Wide Web Wanderer and other early search engine is Aliweb and the first “full text” crawler-based search engine was WebCrawler.

 The steps which are involved in processing search engine are Document Gathering-done by Crawlers, spiders, Document Indexing-done by Indexer, Searching, and Visualisation of results. The most emerging technologies in today’s network are Google, yahoo, MSN etc.

 The few challenges include that the web is growing faster than present technology search engine can possibly index, search engine has to revisit periodically, generated sites can be slow or difficult to index, sites are not indexable by search engines and this phenomenon is called invisible web, sites make use of tricks to manipulate the search engine to display them as the first result returned for some keywords. This may lead to search results being polluted.

Conclusion:

The usage of a search engine depends on the relevance of the results it gives back. The methods of search change from time to time as Internet usage changes with new techniques evolve. Most search engines help methods to grade the results to provide the “best” results first. There are other types of search engine that enterprise search engines that search on intranets, personal search engines that search individual personal computers, and mobile search engines.

Download Web Search Engines Seminar For Computer Science Students.