Noway days people do not go to a bank to make a transaction, do not go to an Electric board to pay bill, do not go to railway station to make a train reservation and what not. All these time consuming and non productive tasks are simplified because of Internet (Read more on How Internet works?). To carry out… Read More »
Biometric Identification Systems are widely used for unique identification. Especially for verification and identification. There are many types of biometric systems like fingerprint recognition, voice recognition, face recognition, palm recognition, iris recognition, etc. Among all of these, Fingerprint recognition is one of the well-known and most widely used biometric technologies. A fingerprint is the pattern of ridges and valleys on the… Read More »
A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.
Underwater wireless communication is the wireless communication in which acoustic signals carry digital information through an underwater channel. Underwater wireless communication networks are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications such as underwater monitoring.