際際滷shows by User: attempremkumar / http://www.slideshare.net/images/logo.gif 際際滷shows by User: attempremkumar / Sun, 31 Jan 2016 08:50:14 GMT 際際滷Share feed for 際際滷shows by User: attempremkumar Redtacton /slideshow/redtacton-57695485/57695485 redtacton-160131085014
RedTacton is a Human Area Networking technology/Wireless Network, which is developed by Robin Gaur Jind, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body]]>

RedTacton is a Human Area Networking technology/Wireless Network, which is developed by Robin Gaur Jind, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body]]>
Sun, 31 Jan 2016 08:50:14 GMT /slideshow/redtacton-57695485/57695485 attempremkumar@slideshare.net(attempremkumar) Redtacton attempremkumar RedTacton is a Human Area Networking technology/Wireless Network, which is developed by Robin Gaur Jind, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/redtacton-160131085014-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> RedTacton is a Human Area Networking technology/Wireless Network, which is developed by Robin Gaur Jind, that uses the surface of the human body as a safe, high speed network transmission path. It is completely distinct from wireless and infrared technologies as it uses the minute electric field emitted on the surface of the human body
Redtacton from PREMKUMAR
]]>
543 7 https://cdn.slidesharecdn.com/ss_thumbnails/redtacton-160131085014-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Global wireless e-voting /slideshow/global-wireless-evoting-57695440/57695440 globalwirelesse-voting-160131084639
Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system.]]>

Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system.]]>
Sun, 31 Jan 2016 08:46:39 GMT /slideshow/global-wireless-evoting-57695440/57695440 attempremkumar@slideshare.net(attempremkumar) Global wireless e-voting attempremkumar Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/globalwirelesse-voting-160131084639-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system.
Global wireless e-voting from PREMKUMAR
]]>
681 9 https://cdn.slidesharecdn.com/ss_thumbnails/globalwirelesse-voting-160131084639-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Steganography /slideshow/steganography-56437865/56437865 steganography-151225063026
Steganography (US Listeni/st.鼻n.鼻r.fi/, UK /st鼻.n鼻.r.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (竜粒留僚), meaning "covered, concealed, or protected", and graphein (粒略竜旅僚) meaning "writing"]]>

Steganography (US Listeni/st.鼻n.鼻r.fi/, UK /st鼻.n鼻.r.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (竜粒留僚), meaning "covered, concealed, or protected", and graphein (粒略竜旅僚) meaning "writing"]]>
Fri, 25 Dec 2015 06:30:26 GMT /slideshow/steganography-56437865/56437865 attempremkumar@slideshare.net(attempremkumar) Steganography attempremkumar Steganography (US Listeni/st.鼻n.鼻r.fi/, UK /st鼻.n鼻.r.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (竜粒留僚), meaning "covered, concealed, or protected", and graphein (粒略竜旅僚) meaning "writing" <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/steganography-151225063026-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Steganography (US Listeni/st.鼻n.鼻r.fi/, UK /st鼻.n鼻.r.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (竜粒留僚), meaning &quot;covered, concealed, or protected&quot;, and graphein (粒略竜旅僚) meaning &quot;writing&quot;
Steganography from PREMKUMAR
]]>
1096 4 https://cdn.slidesharecdn.com/ss_thumbnails/steganography-151225063026-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wireless sensor network /slideshow/wireless-sensor-network-56437781/56437781 wirelesssensornetwork-151225062212
A sensor node, also known as a mote (chiefly in North America), is a node in a sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. A mote is a node but a node is not always a mote.]]>

A sensor node, also known as a mote (chiefly in North America), is a node in a sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. A mote is a node but a node is not always a mote.]]>
Fri, 25 Dec 2015 06:22:12 GMT /slideshow/wireless-sensor-network-56437781/56437781 attempremkumar@slideshare.net(attempremkumar) Wireless sensor network attempremkumar A sensor node, also known as a mote (chiefly in North America), is a node in a sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. A mote is a node but a node is not always a mote. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wirelesssensornetwork-151225062212-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A sensor node, also known as a mote (chiefly in North America), is a node in a sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. A mote is a node but a node is not always a mote.
Wireless sensor network from PREMKUMAR
]]>
378 5 https://cdn.slidesharecdn.com/ss_thumbnails/wirelesssensornetwork-151225062212-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android /slideshow/android-56437772/56437772 android-151225062009
Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping...etc]]>

Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping...etc]]>
Fri, 25 Dec 2015 06:20:09 GMT /slideshow/android-56437772/56437772 attempremkumar@slideshare.net(attempremkumar) Android attempremkumar Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping...etc <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/android-151225062009-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android&#39;s user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping...etc
Android from PREMKUMAR
]]>
154 4 https://cdn.slidesharecdn.com/ss_thumbnails/android-151225062009-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Mobile /slideshow/securing-mobile-53764178/53764178 prem-151010080053-lva1-app6892
Securing Mobile S辿curit辿 logicielle des smartphones]]>

Securing Mobile S辿curit辿 logicielle des smartphones]]>
Sat, 10 Oct 2015 08:00:53 GMT /slideshow/securing-mobile-53764178/53764178 attempremkumar@slideshare.net(attempremkumar) Securing Mobile attempremkumar Securing Mobile S辿curit辿 logicielle des smartphones <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/prem-151010080053-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Securing Mobile S辿curit辿 logicielle des smartphones
Securing Mobile from PREMKUMAR
]]>
205 4 https://cdn.slidesharecdn.com/ss_thumbnails/prem-151010080053-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Nano technology /slideshow/506-prem/53763762 nanotechnology-151010073125-lva1-app6891
("nanotech") is manipulation of matter on an atomic, molecular, and supramolecular scale]]>

("nanotech") is manipulation of matter on an atomic, molecular, and supramolecular scale]]>
Sat, 10 Oct 2015 07:31:25 GMT /slideshow/506-prem/53763762 attempremkumar@slideshare.net(attempremkumar) Nano technology attempremkumar ("nanotech") is manipulation of matter on an atomic, molecular, and supramolecular scale <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nanotechnology-151010073125-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> (&quot;nanotech&quot;) is manipulation of matter on an atomic, molecular, and supramolecular scale
Nano technology from PREMKUMAR
]]>
394 4 https://cdn.slidesharecdn.com/ss_thumbnails/nanotechnology-151010073125-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
3G technology /slideshow/506-prem-53763627/53763627 506-151010072132-lva1-app6891
3G, short form of third generation, is the third generation of mobile telecommunications technology]]>

3G, short form of third generation, is the third generation of mobile telecommunications technology]]>
Sat, 10 Oct 2015 07:21:32 GMT /slideshow/506-prem-53763627/53763627 attempremkumar@slideshare.net(attempremkumar) 3G technology attempremkumar 3G, short form of third generation, is the third generation of mobile telecommunications technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/506-151010072132-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 3G, short form of third generation, is the third generation of mobile telecommunications technology
3G technology from PREMKUMAR
]]>
303 4 https://cdn.slidesharecdn.com/ss_thumbnails/506-151010072132-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Robotics /slideshow/153-prem/53763567 153-151010071624-lva1-app6891
Robotics is the branch of engineering science & Technology]]>

Robotics is the branch of engineering science & Technology]]>
Sat, 10 Oct 2015 07:16:24 GMT /slideshow/153-prem/53763567 attempremkumar@slideshare.net(attempremkumar) Robotics attempremkumar Robotics is the branch of engineering science & Technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/153-151010071624-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Robotics is the branch of engineering science &amp; Technology
Robotics from PREMKUMAR
]]>
411 4 https://cdn.slidesharecdn.com/ss_thumbnails/153-151010071624-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Thermal Power Plant /slideshow/15-premkumar/53763462 15-151010070752-lva1-app6891
A thermal power PLANT is a power plant in which the prime mover is steam driven]]>

A thermal power PLANT is a power plant in which the prime mover is steam driven]]>
Sat, 10 Oct 2015 07:07:52 GMT /slideshow/15-premkumar/53763462 attempremkumar@slideshare.net(attempremkumar) Thermal Power Plant attempremkumar A thermal power PLANT is a power plant in which the prime mover is steam driven <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/15-151010070752-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A thermal power PLANT is a power plant in which the prime mover is steam driven
Thermal Power Plant from PREMKUMAR
]]>
1231 8 https://cdn.slidesharecdn.com/ss_thumbnails/15-151010070752-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Face Morphing /slideshow/12-premkumar/53763416 12-151010070503-lva1-app6892
Morphing is a special effect in motion pictures and animations that changes (or morphs) one image]]>

Morphing is a special effect in motion pictures and animations that changes (or morphs) one image]]>
Sat, 10 Oct 2015 07:05:03 GMT /slideshow/12-premkumar/53763416 attempremkumar@slideshare.net(attempremkumar) Face Morphing attempremkumar Morphing is a special effect in motion pictures and animations that changes (or morphs) one image <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/12-151010070503-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Morphing is a special effect in motion pictures and animations that changes (or morphs) one image
Face Morphing from PREMKUMAR
]]>
1007 5 https://cdn.slidesharecdn.com/ss_thumbnails/12-151010070503-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NANO ROBOTICS /slideshow/02-prem/53763396 02-151010070259-lva1-app6891
Nanorobotics is the emerging technology field creating machines or robots]]>

Nanorobotics is the emerging technology field creating machines or robots]]>
Sat, 10 Oct 2015 07:02:59 GMT /slideshow/02-prem/53763396 attempremkumar@slideshare.net(attempremkumar) NANO ROBOTICS attempremkumar Nanorobotics is the emerging technology field creating machines or robots <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/02-151010070259-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nanorobotics is the emerging technology field creating machines or robots
NANO ROBOTICS from PREMKUMAR
]]>
997 8 https://cdn.slidesharecdn.com/ss_thumbnails/02-151010070259-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
nuclear BATTERY /slideshow/1-prem/53763326 1prem-151010065820-lva1-app6892
An opto-electric nuclear battery is a device that converts nuclear energy into light, which it then uses to generate electrical energy. A beta-emitter such as technetium-99 or strontium-90 is suspended in a gas or liquid containing luminescent gas molecules of the excimer type, constituting a "dust plasma." This permits a nearly lossless emission of beta electrons from the emitting dust particles]]>

An opto-electric nuclear battery is a device that converts nuclear energy into light, which it then uses to generate electrical energy. A beta-emitter such as technetium-99 or strontium-90 is suspended in a gas or liquid containing luminescent gas molecules of the excimer type, constituting a "dust plasma." This permits a nearly lossless emission of beta electrons from the emitting dust particles]]>
Sat, 10 Oct 2015 06:58:20 GMT /slideshow/1-prem/53763326 attempremkumar@slideshare.net(attempremkumar) nuclear BATTERY attempremkumar An opto-electric nuclear battery is a device that converts nuclear energy into light, which it then uses to generate electrical energy. A beta-emitter such as technetium-99 or strontium-90 is suspended in a gas or liquid containing luminescent gas molecules of the excimer type, constituting a "dust plasma." This permits a nearly lossless emission of beta electrons from the emitting dust particles <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1prem-151010065820-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An opto-electric nuclear battery is a device that converts nuclear energy into light, which it then uses to generate electrical energy. A beta-emitter such as technetium-99 or strontium-90 is suspended in a gas or liquid containing luminescent gas molecules of the excimer type, constituting a &quot;dust plasma.&quot; This permits a nearly lossless emission of beta electrons from the emitting dust particles
nuclear BATTERY from PREMKUMAR
]]>
3531 9 https://cdn.slidesharecdn.com/ss_thumbnails/1prem-151010065820-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
World widetelescopetecfest /slideshow/world-widetelescopetecfest/52805210 worldwidetelescopetecfest-150915142721-lva1-app6891
world wide telescope mining the sky by web serivice]]>

world wide telescope mining the sky by web serivice]]>
Tue, 15 Sep 2015 14:27:21 GMT /slideshow/world-widetelescopetecfest/52805210 attempremkumar@slideshare.net(attempremkumar) World widetelescopetecfest attempremkumar world wide telescope mining the sky by web serivice <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/worldwidetelescopetecfest-150915142721-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> world wide telescope mining the sky by web serivice
World widetelescopetecfest from PREMKUMAR
]]>
224 7 https://cdn.slidesharecdn.com/ss_thumbnails/worldwidetelescopetecfest-150915142721-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network security /slideshow/network-security-52805207/52805207 networksecurity-150915142719-lva1-app6891
Network security technology]]>

Network security technology]]>
Tue, 15 Sep 2015 14:27:19 GMT /slideshow/network-security-52805207/52805207 attempremkumar@slideshare.net(attempremkumar) Network security attempremkumar Network security technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networksecurity-150915142719-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network security technology
Network security from PREMKUMAR
]]>
324 8 https://cdn.slidesharecdn.com/ss_thumbnails/networksecurity-150915142719-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
network security /slideshow/1255-52805165/52805165 1255-150915142646-lva1-app6892
Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.[citation needed] Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.]]>

Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.[citation needed] Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.]]>
Tue, 15 Sep 2015 14:26:46 GMT /slideshow/1255-52805165/52805165 attempremkumar@slideshare.net(attempremkumar) network security attempremkumar Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.[citation needed] Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1255-150915142646-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.[citation needed] Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
network security from PREMKUMAR
]]>
258 9 https://cdn.slidesharecdn.com/ss_thumbnails/1255-150915142646-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wifi vignan final /slideshow/wifi-vignan-final/52805154 wifi-vignanfinal-150915142637-lva1-app6891
wi-fi technology]]>

wi-fi technology]]>
Tue, 15 Sep 2015 14:26:37 GMT /slideshow/wifi-vignan-final/52805154 attempremkumar@slideshare.net(attempremkumar) Wifi vignan final attempremkumar wi-fi technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wifi-vignanfinal-150915142637-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> wi-fi technology
Wifi vignan final from PREMKUMAR
]]>
587 7 https://cdn.slidesharecdn.com/ss_thumbnails/wifi-vignanfinal-150915142637-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Memristor techonolgy /slideshow/07-52755285/52755285 07-150914134307-lva1-app6891
The memristor (/mmr膝str/; a portmanteau of memory resistor) was a term coined in 1971 by circuit theorist Leon Chua as a missing non-linear passive two-terminal electrical component relating electric charge and magnetic flux linkage.[1] The operation of RRAM devices was recently connected to the memristor concept.[2] According to the characterizing mathematical relations, the memristor would hypothetically operate in the following way. The memristor's electrical resistance is not constant but depends on the history of current that had previously flowed through the device, i.e., its present resistance depends on how much electric charge has flowed in what direction through it in the past. The device remembers its historythe so-called non-volatility property]]>

The memristor (/mmr膝str/; a portmanteau of memory resistor) was a term coined in 1971 by circuit theorist Leon Chua as a missing non-linear passive two-terminal electrical component relating electric charge and magnetic flux linkage.[1] The operation of RRAM devices was recently connected to the memristor concept.[2] According to the characterizing mathematical relations, the memristor would hypothetically operate in the following way. The memristor's electrical resistance is not constant but depends on the history of current that had previously flowed through the device, i.e., its present resistance depends on how much electric charge has flowed in what direction through it in the past. The device remembers its historythe so-called non-volatility property]]>
Mon, 14 Sep 2015 13:43:07 GMT /slideshow/07-52755285/52755285 attempremkumar@slideshare.net(attempremkumar) Memristor techonolgy attempremkumar The memristor (/mmr膝str/; a portmanteau of memory resistor) was a term coined in 1971 by circuit theorist Leon Chua as a missing non-linear passive two-terminal electrical component relating electric charge and magnetic flux linkage.[1] The operation of RRAM devices was recently connected to the memristor concept.[2] According to the characterizing mathematical relations, the memristor would hypothetically operate in the following way. The memristor's electrical resistance is not constant but depends on the history of current that had previously flowed through the device, i.e., its present resistance depends on how much electric charge has flowed in what direction through it in the past. The device remembers its historythe so-called non-volatility property <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/07-150914134307-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The memristor (/mmr膝str/; a portmanteau of memory resistor) was a term coined in 1971 by circuit theorist Leon Chua as a missing non-linear passive two-terminal electrical component relating electric charge and magnetic flux linkage.[1] The operation of RRAM devices was recently connected to the memristor concept.[2] According to the characterizing mathematical relations, the memristor would hypothetically operate in the following way. The memristor&#39;s electrical resistance is not constant but depends on the history of current that had previously flowed through the device, i.e., its present resistance depends on how much electric charge has flowed in what direction through it in the past. The device remembers its historythe so-called non-volatility property
Memristor techonolgy from PREMKUMAR
]]>
415 7 https://cdn.slidesharecdn.com/ss_thumbnails/07-150914134307-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
11 brain finger printing /slideshow/11-brain-finger-printing/52755216 11brainfingerprinting-150914134140-lva1-app6891
Brain fingerprinting....]]>

Brain fingerprinting....]]>
Mon, 14 Sep 2015 13:41:40 GMT /slideshow/11-brain-finger-printing/52755216 attempremkumar@slideshare.net(attempremkumar) 11 brain finger printing attempremkumar Brain fingerprinting.... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/11brainfingerprinting-150914134140-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Brain fingerprinting....
11 brain finger printing from PREMKUMAR
]]>
1056 10 https://cdn.slidesharecdn.com/ss_thumbnails/11brainfingerprinting-150914134140-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
4 g communications /slideshow/4-g-communications/52755203 4gcommunications-150914134122-lva1-app6891
4 g communications]]>

4 g communications]]>
Mon, 14 Sep 2015 13:41:21 GMT /slideshow/4-g-communications/52755203 attempremkumar@slideshare.net(attempremkumar) 4 g communications attempremkumar 4 g communications <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/4gcommunications-150914134122-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 4 g communications
4 g communications from PREMKUMAR
]]>
423 9 https://cdn.slidesharecdn.com/ss_thumbnails/4gcommunications-150914134122-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-attempremkumar-48x48.jpg?cb=1672291394 premkumar.attem.weebly.com https://cdn.slidesharecdn.com/ss_thumbnails/redtacton-160131085014-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/redtacton-57695485/57695485 Redtacton https://cdn.slidesharecdn.com/ss_thumbnails/globalwirelesse-voting-160131084639-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/global-wireless-evoting-57695440/57695440 Global wireless e-voting https://cdn.slidesharecdn.com/ss_thumbnails/steganography-151225063026-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/steganography-56437865/56437865 Steganography