Category Archives: TECHNICAL PAPERS

Technical Papers category in Krazytech.com hosts technical presentation topics for college students, technical topics for presentation for Computer Science and Engineering, technical topics for presentation for Electronics and Communications Engineering, technical topics for presentation for Electrical engineering, technical topics for seminars,  paper presentation topics. In addition to this, you can also get latest trends in science and technology, research topics etc

Digital Jewelry

Digital jewelry is the fashion jewelry with embedded intelligence. Digital jewelry can help you solve problems like forgotten passwords and security badges. These devices have a tiny processor and unique identifiers that interact with local sensors. Digital jewelry is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information.

Graphical Password Authentication

Noway days people do not go to a bank to make a transaction, do not go to an Electric board to pay bill, do not go to railway station to make a train reservation and what not. All these time consuming and non productive tasks are simplified because of Internet (Read more on How Internet works?). To carry out… Read More »

Axial-Field Electrical Machines

An electrical machine translates its input electrical power into an output mechanical power i.e. it is an electromagnetic energy conversion device. Electrical machines have been available and working for nearly a century. During this period many extensive efforts have been made by researchers worldwide to develop and improve design, configuration, and performance of electrical machines. They may be categorized according… Read More »

Fingerprint Identification System using Neural Networks

Biometric Identification Systems are widely used for unique identification. Especially for verification and identification. There are many types of biometric systems like fingerprint recognition, voice recognition, face recognition, palm recognition, iris recognition, etc. Among all of these, Fingerprint recognition is one of the well-known and most widely used biometric technologies. A fingerprint is the pattern of ridges and valleys on the… Read More »

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.