Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
Plastics have long formed the skeletons and skin of products, whereas silicon has supplied the brains. With the advent of polymer and crystalline organic electronics, plastics will make up the brains...
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator .
The goal of the Space Communications Protocol Standards (SCPS) project is to provide a suite of standard data handling protocols which (from a user viewpoint) make a remote space vehicle appear to be...
Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition has emerged as one of the most powerful and a...
The foundation for a self-defending network is integrated security - security that is native to all aspects of an organization. Every device in the network - from desktops through the LAN and across t...
‘Silent Sound’ technology aims to notice every movements of the lips and transform them into sounds, which could help people who lose voices to speak, and allow people to make silent calls without bothering others.
A smart card, a type of chip card is a plastic card embedded with a computer chip that stores and transacts data between users. The card data is transferred via a reader that is part of a computing system.
The idea behind eyeOS is that the whole system lives in the web browser. The client must have only a web browser to work with eyeOS and all its applications, including Office and PIM ones. This applie...
This is an attempt to describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and...
Intel Centrino mobile technology connects without wires. The new Intel Centrino mobile technology allows users to work, play and connect without wires and choose from a whole new generation of thin an...
Biometrics based authentication is a potential candidate toreplace password-based authentication. Among all the biometrics, fingerprint based identification is one of the most mature and proven techni...
Wouldn’t you love to replace password based access control to avoid having to reset forgotten pa...
Remote Administration Trojans, also known as RATs are the most popular type of Trojans today. This type of Trojan allows the creator or who ever is using it to gain access to victims are there and pe...
Eye is one the most important organs of the body.The human eye is an organ which reacts to light for several purposes. The visual system in the brain is too slow to process information if the images a...
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords tha...
The enormous popularity of the World Wide Web in the early 1990's demonstrated the commercial potential of offering multimedia resources through the digital networks. Since commercial interests seek t...
Many organizations posses valuable information they guard closely. As more of this information is stored in computers the need of data security becomes increasingly important. Protecting this informat...
Hawk-Eye is the most sophisticated officiating tool used in any sport. It is accurate, reliable and practical: fans now expect and demand it to be a part of every event. Hawk-Eye first made its name i...