P. 1
Ppt Topics

Ppt Topics

|Views: 163|Likes:
Published by vidyagiri

More info:

Published by: vidyagiri on Dec 15, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as TXT, PDF, TXT or read online from Scribd
See more
See less

12/15/2010

pdf

text

original

1)real time image processing 2)wi-fi/WI-MAX 3)storage devices-recent trends 4)fuzzy logic, 5)semantic web, 6)bluetooth 7)Spyware

8)Citation Mgt. 9)online survey 10)remote security 11)online storage THESE ARE THE FEW TOPICS ON WHICH YOU CAN GIVE THE PPTS. Semantic web and online storage are the hot topics

Cyber Crime and Security Open Source Technology Nano computing VoIP in mobile phones Mobile Adhoc Network Network Security .Digital smell 2.Navbelt 3.Imax 4.Stream computing 1. cloud computing 2. AI 3. Network secuirity 4. data mining cyber crime and security. biocomputing mobile adhoc networks voip imax stream computing cloud computing HIGH ALTITUDE AERONAUTICAL PLATFORMS (HAAPS) (Download Full Report And Abstract) INTRODUCTION HIGH ALTITUDE AERONAUTICAL PLATFORMS (HAAPS) High Altitude Aeronautical Platform Stations (HAAPS) is the name of a technology for providing wireless narrowband and broadband telecommunication services as w ell as broadcasting services with either airships or aircrafts. The HAAPS are op erating at altitudes between 3 to 22 km. A HAAPS shall be able to cover a servic e area of up to 1'000 km diameter, depending on the minimum elevation angle acce pted from the user's location. The platforms may be airplanes or airships (essen tially balloons) and may be manned or un-manned with autonomous operation couple d with remote control from the ground. HAAPS mean a solar-powered and unmanned a irplane or airship, capable of long endurance on-station “possibly several years. A high altitude telecommunication system comprises an airborne platform “ typicall y at high atmospheric or stratospheric altitudes “ with a telecommunications paylo ad, and associated ground station telecommunications equipment. The combination

For broadcast applications. The opportunities for applications are virtually unlimited. Recent dev elopments in digital array antenna technology make it possible to construct 100+ cells from one platform.. satellite networks and terrestrial gateways are also possib le. traffic could be switched through air via the HAAPS platform. Linking and switching of traffic between multiple high altitude platforms. Lighter-than air HAAPS are kept stationary. or as straightforward as the use of lightweight. such as telephony. For future telecommunications operators such a platform could provide blanket coverage from day one with the added advantage of not bein g limited to a single service. . The HALO Network.of altitude. possible inflatable parabolic dishes with mechanical steering. as is done in cellular se rvice. payload capability. In the case of a moving HAAP it would also be n ecessary to compensate motion by electronic or mechanical means in order to keep the cells stationary or to "hand off" connections between cells as is done in c ellular telephony. high above terrestrial towers and we ll below satellite constellations). Economically it provides the opportunity for developing countries to have sa tellite-like infrastructure without the funds flowing out of the country due to gateways and control stations located outside of these countries. HAAP Feeder-band beam User-band Beam Public/Private networks Coverage Area The platform is positioned above the coverage area. with a growth potential beyond 100 Gbps. The possibilities range from narrowband services such as paging and mobile voice to interactive broadband services such as multimedia and video conferencing. a simple antenna bea ms signals to terminals on the ground. whose initial capacity will be on the scale of 10 Gbps. HALO NETWORK CONCEPTS High-Altitude Long Operation (HALO) aircraft present a new layer in the hierarch y of wireless communications -. "cells" are created on the ground by some beam forming technique in order to reuse channels for spatially separated users. while airplane-based HAA PS are flown in a tight circle. Where little or unreliable infrastructure exists. For individualized communication. The packet-switched network will be de signed to offer bit rates to each subscriber in the multimegabit-per-second rang e. Technically.a 10-mile tall tower in the stratosphere above r ain showers and below meteor showers (i. the concept offers a solution to the propagation and rollout problems of terrestrial infrastructure and capacity and cost problems of satellite networks. There are basically two type s of HAAPS. and power supply capability makes it ideal to s erve new and metropolitan areas with advanced telecommunications services such a s broadband access and regional broadcasting. GENERAL ARCHITECTURE A typical HAAP-based communications systems structure is shown . HALO airplane will be the central node of a wireless broadband communications ne twork. Beam forming can be as sophisticated as the use of phased-array antennas.e.

and power supply capability makes it ideal to s erve new and metropolitan areas with advanced telecommunications services such a s broadband access and regional broadcasting. and the virtual path will be changed to accomplish the beam-to-beam ha ndoff. .com/Thread-high-altitude-aeronautical-plat forms-haaps-download-full-report-and-abstract#ixzz17c1iN5hU HIGH ALTITUDE AERONAUTICAL PLATFORMS (HAAPS) (Download Full Report And Abstract) INTRODUCTION HIGH ALTITUDE AERONAUTICAL PLATFORMS (HAAPS) High Altitude Aeronautical Platform Stations (HAAPS) is the name of a technology for providing wireless narrowband and broadband telecommunication services as w ell as broadcasting services with either airships or aircrafts. For the case of aircraft-fixed beams. Broadband channels to subscribers in adjacent be ams will be separated in frequency. The platforms may be airplanes or airships (essen tially balloons) and may be manned or un-manned with autonomous operation couple d with remote control from the ground. at altitudes high er than 51. The HAAPS are op erating at altitudes between 3 to 22 km. payload capability. the concept offers a solution to the propagation and rollout problems of terrestrial infrastructure and capacity and cost problems of satellite networks. A high altitude telecommunication system comprises an airborne platform “ typicall y at high atmospheric or stratospheric altitudes “ with a telecommunications paylo ad. The opportunities for applications are virtually unlimited. Reference: http://www.000 feet. Linking and switching of traffic between multiple high altitude platforms. while the airplane maintains stationary overhead. A HAAPS shall be able to cover a servic e area of up to 1'000 km diameter. Flight operational ta ctics will be steadily evolved to achieve high availability of the node in the s tratosphere. Where little or unreliable infrastructure exists. The possibilities range from narrowband services such as paging and mobile voice to interactive broadband services such as multimedia and video conferencing. capable of long endurance on-station “possibly several years. A MMW antenna array and its related components will be located in a po d suspended below the aircraft fuselage. For future telecommunications operators such a platform could provide blanket coverage from day one with the added advantage of not bein g limited to a single service. Economically it provides the opportunity for developing countries to have sa tellite-like infrastructure without the funds flowing out of the country due to gateways and control stations located outside of these countries.The airplane's fuselage can house switching circuitry and fast digital network f unctions. For each city to be served. more than 100. The antenna array will produce many bea ms -. HAAPS mean a solar-powered and unmanned a irplane or airship. satellite networks and terrestrial gateways are also possib le. depending on the minimum elevation angle acce pted from the user's location.typically. traffic could be switched through air via the HAAPS platform. The aircraft will fly above commercial airline traffic. The combination of altitude. and associated ground station telecommunications equipment. the be ams will traverse over a user location. a fleet of three aircraft will be operated in shifts to achieve around-the-clock service.seminarprojects. Recent dev elopments in digital array antenna technology make it possible to construct 100+ cells from one platform. GENERAL ARCHITECTURE A typical HAAP-based communications systems structure is shown . Technically.

000 feet. The HALO Network.com/Thread-high-altitude-aeronautical-plat forms-haaps-download-full-report-and-abstract#ixzz17c1iN5hU Title: Cryptography & Steganography with Watermarking Description: Cryptography & Steganography with Watermarking . For the case of aircraft-fixed beams. For broadcast applications.e.typically. There are basically two type s of HAAPS. with a growth potential beyond 100 Gbps.. while the airplane maintains stationary overhead. HALO NETWORK CONCEPTS High-Altitude Long Operation (HALO) aircraft present a new layer in the hierarch y of wireless communications -. Reference: http://www. a fleet of three aircraft will be operated in shifts to achieve around-the-clock service. A MMW antenna array and its related components will be located in a po d suspended below the aircraft fuselage. Beam forming can be as sophisticated as the use of phased-array antennas. The packet-switched network will be de signed to offer bit rates to each subscriber in the multimegabit-per-second rang e. more than 100. For individualized communication. while airplane-based HAA PS are flown in a tight circle. In the case of a moving HAAP it would also be n ecessary to compensate motion by electronic or mechanical means in order to keep the cells stationary or to "hand off" connections between cells as is done in c ellular telephony. whose initial capacity will be on the scale of 10 Gbps.a 10-mile tall tower in the stratosphere above r ain showers and below meteor showers (i. the be ams will traverse over a user location. such as telephony. high above terrestrial towers and we ll below satellite constellations). possible inflatable parabolic dishes with mechanical steering. The aircraft will fly above commercial airline traffic.HAAP Feeder-band beam User-band Beam Public/Private networks Coverage Area The platform is positioned above the coverage area. and the virtual path will be changed to accomplish the beam-to-beam ha ndoff. The airplane's fuselage can house switching circuitry and fast digital network f unctions. or as straightforward as the use of lightweight. For each city to be served. at altitudes high er than 51.seminarprojects. a simple antenna bea ms signals to terminals on the ground. The antenna array will produce many bea ms -. Lighter-than air HAAPS are kept stationary. "cells" are created on the ground by some beam forming technique in order to reuse channels for spatially separated users. as is done in cellular se rvice. Flight operational ta ctics will be steadily evolved to achieve high availability of the node in the s tratosphere. Broadband channels to subscribers in adjacent be ams will be separated in frequency. HALO airplane will be the central node of a wireless broadband communications ne twork.

Steganographys intent is to hide message. Integrity. As c omplexity increases. r esulting in Stegotext. some have more than others. and transforming it into unread able data for the purpose of secure transmission. a nd then a cover text is modified in some way to contain the encrypted message. Hash Functions uses a mathematical transformation to irreversibly encrypt information . which uses one key for encryption and another for decryption. Steganography is being vastly used through the media of text. Cryptography presents va rious methods for taking legible. In addition to these. microd ots. Steganography is the art of passing information in a manner that the very existe nce of the message is unknown. The most secure techniques use a mathematical algorithm and a variable value known as a key. Cry ptography uses a single key to encrypt i. readable data. a technique called digital watermarking is discusse d which provides a means to embed copyright and other information for identifica tion and tracking. The goal of cryptography extends beyond merely making data unreadable. In this the idea is that a codeword is embedded in the document by altering part . in whatever form. Steganographic messages are often first encrypted by some traditional means. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. Privacy/confidentiality. and audio. which corresponds to the message being h idden. Non-repud iation. In the past. There are several ways of classifying cryptographic algorithms Secret Key Crypto graphy.e. Information secur ity is not confined to computer systems. Information security deals with several different trust aspects of information. changing data so that it is unrecogn izable and useless to an unauthorized person and decrypt a message i. Steganography refers to the practice of hiding secret message in commun ications over a public channel so that an eavesdropper cannot even tell that a s ecret message is being sent. There are many aspects to security and many app lications. cryptography is heavily used for military applicat ions to keep sensitive information secret from enemies. All the st eganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB. changing it back to its original form.Everyone has secrets.In this the original m essage to be transformed is called the plaintext and resulting message after tra nsformation is called the ciphertext. which uses a single key for both encryption and decryption. One essential aspect for secure communications is that of cryptography. and then using a key to transf orm it back into readable data when it reaches its destination. Among these methods are invisible inks. ranging from secure commerce and payments to private communications a nd protecting passwords. The goal of Ste ganography is to hide message inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present . We propose possibilities to develop adaptive steganographic techniques in general. images. it's important to protect the i nformation while its in transit. Cryptography is the study of mathematical techniques related to aspects of infor mation security. Public Key C ryptography. nor to information in an electronic or machine-readable form.e. and covert channels and spread spectrum communication. it also extends into user authentication. Steganography includes a vast array of techniques for hid ing messages in variety of media. Another common term is information assurance. we need to understand the basics of security in a network w orld. Cryptography can also be defined as the sc ience and art of manipulating massege to make them secure. digital signatures. while c ryptography scrambles a message so that it cannot be understood. When it becomes necessary to t ransmit those secrets from one point to another. It applies to all aspects of safeguarding or protecting i nformation or data. Security is a complicated subject. which can be tackled by trained experts.

but does not retain t he original images exactness. The downside to this of course is th at large file sizes might induce unwanted suspicions. Combined. JPEG (Joint Photographic Experts Group) is an exam ple of such compression. A digital image is an arr ay of numbers that represent light intensities at various points. To deal with this. the greater opportunity there is to apply Steganography techniques.024 x 768) has more than 2 million pixels. a white background is 11111111. and 11111111.As infringes make identical copies of documents without paying royalties or revenues to the original author this method is used. Each color is represented by a single storage byte. Images with 640 x 480 pixels and 256 colors can contain up to 300 kilobits of data. Three features are identified in this method as Digital technology offers new ways to apply Steganography techniques. This is i mportant because certain compression applications can interfere with hidden mess ages. but can be used to identify the intended recipient of a document just by exami nation of a recovered document. Pixel representation makes up a file's size. but do so differently. file co mpression is used. and green. Lossy compression is the most efficient space saver. The larger the file. for instance. in contrast. including the ability to hide information inside digital images. three bytes are allocated for each primary color (hence eigh t bits per byte multiplied by three bytes). producing a file over 2MB in size. There are two kinds available today: Lossy and loss less. . 1111 1111. With 24-bit images. Each pixel on a computer monitor selects from three primary color variat ions: red. Bot h methods compress files to save storage space. Represented in binary values. thes e light intensities or pixels form the images raster data. A loss less approach.icular textual features . Thus a 24-bit i mage displayed in high resolution (1. retains the integrit y of the original image. blue. Images saved as GIF (Graphic Interchange Format) or BMP (bitmap file) apply loss less compression. Printa ble documents are marked with a unique codeword that is indiscernible to readers . But it is more ty pical to see digital images in sizes of eight-bit or 24-bit files. especially in image sizes of 2 4-bits. This provides an excellent opportunity for hiding information.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->