Imbricate Cryptography

Imbricate cryptography is a new technique that uses the layered approach designed by us. It is a type of symmetric cryptography in which the key is implanted in the message, so the message cannot be recovered without using the correct key. Here the message and the key are inwardly plaited.

Deploying Wireless Sensor Network on Active Volcano

Todays typical volcanic data-collection station consists of a group of bulky, heavy, power-hungry components that are difficult to move and require car batteries for power. Remote deployments often require vehicle or helicopter assistance for equipment installation and maintenance. Local storage is also a limiting factor stations typically log data to a Compact Flash card or hard drive, which researchers must periodically retrieve, requiring them to regularly return to each station.

BitTorrent – A revolution in P2P technology

BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. It costs nothing to use and includes no spyware or popup advertising. Because of the nature of this protocol, large files can be handled more efficiently than thetypical client/server method. The protocol was designed in April 2001 and implemented in Summer 2002 by programmer BramCohen, and is now maintained by BitTorrent.