Posts

The Tor Browser

  With time everyone wants CIA i.e., confidentiality, integrity, and availability of their data. But while using a browser like Chrome, Mozilla Firefox, etc it is easy to get knowledge about your activity on the internet for example which site you had visited, online post and messages, etc. The Tor Browser is going to be the proper solution to keep up the privacy of your data. What is Tor Browser? Tor is a Freely distributed Application Software, which enables us to surf the Internet anonymously, making it easy to guard our identity online. It's open-source which is safe and reliable.  Also known as “Onion Router” because of its working mechanism written in C programming language. Can be downloaded on Mac, Linux, Window and mobile devices too. How does it work? Tor  runs on the concept of  Onion routing . In onion processing, layers are built into each other just like other onion layers. It uses identical servers, consecutive TCP / IP codes, and also the same encryption algorithms

BLUE EYE TECHNOLOGY

  INTRODUCTION OF BLUE EYE TECHNOLOGY: The blue eyes technology works on artificial intelligence and aims to give human abilities of the computer. It aims to give human power possibilities to a computer so that systems can naturally interact with human beings directly. This technology is used to simplify by providing user-friendly facilities. This helps to reduce the gap between humans and computers. REQUIREMENT OF BLUE EYE TECHNOLOGY:- To avoid and reduce human errors like: *Tiredness –huge load of work *Mental illness-typical body imbalance *emotional outcomes- the outrage of emotions like fear and anger *brain unconsciousness The Blue-eye is the mouse that senses the psychological attributes which are correlated to emotions using a correlation model by simply touching the mouse, the computer will be able to determine a person’s emotional state.

IBOC TECHNOLOGY

                                Introduction of IBOC:- In-band on-channel is a hybrid method of transmitting digital radio and analog radio broadcast signals simultaneously on the same frequency. This technology allows digital audio broadcasting without the need for new spectrum allocation of a digital signal. It utilizes AM and FM bands by attaching the digital side to the standard analog. This basically comprises the FEC coding and interleaving section  IBOC IMPLEMENTATION TECHNIQUE:- The requirement of FM to IBOC isolation is also somewhat difficult to achieve because of the power ratio. There are few techniques used to combine FM and IBOC signals.  Low level combines relies essentially on a common amplification technique which means that both the host FM and the IBOC signals are amplified in the same power amplifier (PA) IBOC adds 1% total channel power; its power consumption is negligible, so the antenna’s power rating is normally not an issue. WHY DELAY IN ADOPTION? *Low power  F

Paper Battery

A paper battery is formed largely of cellulose and used for conductivity its surface acts as high surface area electrodes for the conductivity. A paper battery consists of carbon and paper, it is used both as a capacitor as well as battery. It is an ultra-thin storage device. It is biodegradable as well as economical.  It is also known as Nanocomposite paper.   STEPS TO BE PERFORMED FOR THE CONSTRUCTION:- STEP 1: Take a cellulose-based paper and apply black carbon ink to it. STEP 2:  Spread this ink applied on the paper. STEP3:- after spreading ink laminate a thin film over the cellulose  STEP 4: Heat the cellulose paper for 5 min at 80 degrees. STEP 5: Then peel off from the substrate. ADVANTAGES OF PAPER BATTERY: It is used for folding, cutting, etc. It is used as well as a capacitor. It has special properties such as more economical and biodegradable. It can generate electrical energy of 1.5V. DISADVANTAGES OF PAPER BATTERY: The carbon nanotubes used in the paper batter are very exp

APPROACH TOWARDS CLUSTER COMPUTING

Image
  Cluster computing is the software or tool which is used to presenting  the latest research and technology in computer systems and networks.   It is a single logical unit that are linked through LAN. It provides faster processing speed larger speed larger storage capacity and better data integrity. It need good data integrity in cost.  It presents research and applications in parallel processing Disadvantages Of Cluster Computing Difficult to organize a large number of computers. poor performance in case of non –parallelizable applications. It increases power consumption. Advantages Of Cluster Clustering It enables data recovery in the event of disaster in data processing Need Of Cluster Computing Clustering is used to explore data.it is used to find natural groupings.  It is used for data -preprocessing . it finds cluster of data that are similar in sense to one another.  It is also used to segment the data which is also previously defined. PRIYANSHI VASHISTHA (2019-2023) Computer Sc

COMPUTER VISION

Image
  Computer vision is one of the main technologies in the world that enables the digital world to the physical world. It enables self-driving cars to make sense of the physical world. It plays  very important role in facial applications to see the real identity of people’s face. It has nuanced applications. It is an in disciplinary scientific field so it gains high level understanding. Use of Computer Vision Computer vision begins with the acquisition of images. It is the use of information presents I visual images. Using a computer to analyze images also called machine vision. It is an integralpartof artificial intelligence. It is not only one technology but after combined with others it creates intelligence. Computer vision describes the process of using digital images and videos to gain stronger insights from users. Information from data sources is extracted automatically and understands. Goal of Computer Vision The goal of computer vision is to understand the content of digital imag

SPOOFING

Image
  Spoofing means to provide false information about your idea gain unauthorized identity to gain unauthorized access to others computer systems. In a spoofing attack one person or program successfully pretends as another falsifying data thereby gaining as illegal advantage. IP spoofing are the most popular spoofing attacks. The objective of IP spoofing is to make the data look as if it has come from trusted host as it. Spoofing is always done with an intention. Types of Spoofing IP Spoofing:  It do not provide mechanisms for authenticating the source or destination of a message ad they are thus vulnerable to spoofing attacks to verify the identify the sending or receiving post.  Content spoofing: It includes the caller’s number and sometimes  Caller ID spoofing:  It includes the caller’s name and caller’s number., it allows to hack the caller’s id information. E-mail spoofing: The sender information shown in emails. It is commonly used by spammers to hide the origin information   Concl