Pawan Janorkar

Pune, Maharashtra,

male 35 809


Network Management Protocol

Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on (IP) network. Microsoft.

Network Security Firewalls

Initially, there were not many threats to network security. With the Internet becoming more popular, more companies are doing business over the web. In addition, a number of attempts to illegally infi...

Online Voting System

In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons.

Image Identification System

Authentication is the first line of defense against compromising confidentiality and integrity . Though traditional login/password based schemes are easy to implement, they have been subjected to seve...

Mind Reading Computer

The mind-reading computer system presents information about your mental state as easily as a keyboard and mouse present text and commands. Imagine a future where we are surrounded with mobile phones, cars and online services

GPRS

The GPRS specifications are written by the European Telecommunications Standard Institute (ETSI), the European counterpart of the American National Standard Institute (ANSI). GPRS stands for Genera...

Data Warehousing

Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making.

Flash Memory

Flash memory stores information in an array of memory cells made from floating-gate transistors. In traditional single-level cell (SLC) devices, each cell stores only one bit of information. Some newe...

Security Through Obscurity

As the information age progresses and data becomes more and more valuable, methods need to be discovered to protect and secure sensitive data. An original type of security has appeared, different from...

Linking and Loading Tech.

The basic job of any linker or loader is simple: it binds more abstract names to more concrete names, which permits programmers to write code using the more abstract names. That is, it takes a name wr...

Mobile Radio

Mobile radio or mobiles refer to wireless communications systems and devices which are based on radio frequencies, and where the path of communications is movable on either end. There are a variety of...

Mobile Radio.

Mobile radio or mobiles refer to wireless communications systems and devices which are based on radio frequencies, and where the path of communications is movable on either end. There are a variety of...

Digital Watermarking

A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the doc...

Discovering Conditional CFD

This paper investigates the discovery of conditional functional dependencies (CFDs). CFDs are a recent extension of functional dependencies (FDs) by supporting patterns of semantically related constan...

Distributed Databases

Users have access to the portion of the database at their location so that they can access the data relevant to their tasks without interfering with the work of others. A centralized distributed datab...

Digital Broadcasting Televisions

As digital broadcasting televisions are increasing and the high definition audiovisual content becomes popular rapidly, the data size of the audiovisual content strikingly increases and the transfer...

Honeypots

Honeypot is an exciting new technology with enormous potential for the security community.It is resource which is intended to be attacked and compromised to gain more information about the attacker...

Mobile IP

The exponential growth of the Internet and the inexorable increase in native computing power of laptop computers and other digital wireless data communication devices has brought the need for mobile n...

Ultra Wide Band

UWB is a wireless technology that transmits binary data—the 0s and 1s that are the digital building blocks of modern information systems. It uses low-energy and extremely short duration (in the orde...

Ubiquitous Networking

Mobile computing devices have changed the way we look at computing. Laptops and personal digital assistants (PDAs) have unchained us from our desktop computers. A group of researchers at AT&T Laborato...