Pawan Janorkar

Pune, Maharashtra,

male 35 809


Quantum Computing

Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.

Plastic Memory

Plastics have long formed the skeletons and skin of products, whereas silicon has supplied the brains. With the advent of polymer and crystalline organic electronics, plastics will make up the brains...

Intrution Detection Systems

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator .

Space Communications Protocol

The goal of the Space Communications Protocol Standards (SCPS) project is to provide a suite of standard data handling protocols which (from a user viewpoint) make a remote space vehicle appear to be...

Iris Scanning

Biometrics is an automated method of capturing a person’s unique biological data that distinguishes him or her from another individual. Iris recognition has emerged as one of the most powerful and a...

Self Defending Networks

The foundation for a self-defending network is integrated security - security that is native to all aspects of an organization. Every device in the network - from desktops through the LAN and across t...

Silent Sound Technology

‘Silent Sound’ technology aims to notice every movements of the lips and transform them into sounds, which could help people who lose voices to speak, and allow people to make silent calls without bothering others.

Smart Card

A smart card, a type of chip card is a plastic card embedded with a computer chip that stores and transacts data between users. The card data is transferred via a reader that is part of a computing system.

EYEOS

The idea behind eyeOS is that the whole system lives in the web browser. The client must have only a web browser to work with eyeOS and all its applications, including Office and PIM ones. This applie...

FREENET

This is an attempt to describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and...

Intel Centrino Mobile Technology

Intel Centrino mobile technology connects without wires. The new Intel Centrino mobile technology allows users to work, play and connect without wires and choose from a whole new generation of thin an...

ATM Using Fingerprint

Biometrics based authentication is a potential candidate toreplace password-based authentication. Among all the biometrics, fingerprint based identification is one of the most mature and proven techni...

Face Recognition Technology

Wouldn’t you love to replace password based access control to avoid having to reset forgotten pa...

Sky X Technology

The Sky X system replaces TCP over satellite link with a protocol optimiz...

Remote Administrative Torrents

Remote Administration Trojans, also known as RATs are the most popular type of Trojans today. This type of Trojan allows the creator or who ever is using it to gain access to victims are there and pe...

Electronic Eye

Eye is one the most important organs of the body.The human eye is an organ which reacts to light for several purposes. The visual system in the brain is too slow to process information if the images a...

Graphical Passwords Authentication

The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords tha...

Image Authentication Digital Watermarking

The enormous popularity of the World Wide Web in the early 1990's demonstrated the commercial potential of offering multimedia resources through the digital networks. Since commercial interests seek t...

Palladium Cryptography

Many organizations posses valuable information they guard closely. As more of this information is stored in computers the need of data security becomes increasingly important. Protecting this informat...

HAWK Eye Sreeman

Hawk-Eye is the most sophisticated officiating tool used in any sport. It is accurate, reliable and practical: fans now expect and demand it to be a part of every event. Hawk-Eye first made its name i...