Asset Publisher Asset Publisher

Options

Steganography

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks)with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
1 of 6

Asset Publisher Asset Publisher

Options

LI-FI

The aim of this paper is to make you understand “li-fi is bidirectional, high speed and fully networked wireless communications, like Wi-Fi, using visible light. Li-Fi is a subset of visible light communications (VLC) and can be a complement to RF communication (Wi-Fi or Cellular network), or a replacement in contexts of data broadcasting. It is wireless and uses visible light communication (instead of radio frequency waves), part of wireless communications technology, which carries much more information, and has been proposed as a solution to the RF-bandwidth limitations . A complete solution includes an industry led standardization process.
1 of 4

Asset Publisher Asset Publisher

Options

Consumer's Equilibrium

The aim of this paper is to make you understand “How does a consumer maximize his satisfaction from consumption of goods and services. As the resources are limited in relation to unlimited wants a consumer has to follow some principles and laws in order to attain the highest satisfaction level. The two main approaches to study consumer’s behaviour and consumer’s equilibrium are “Cardinal Utility Approach” and “Ordinal Utility Approach”. We will study about them in detail. This paper will also tell us about the concept of utility in which we will discuss about total utility, marginal utility and relationship between both of them.
1 of 3

Asset Publisher Asset Publisher

Options

Steganography

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks)with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
1 of 6

Asset Publisher Asset Publisher

Options

Cloud Computing- issues Advantages and Disadvantages

Cloud computing is the latest effort in providing computing resources as a service which make a new path Ahead in computer science world. To a big extent , cloud computing will be based on virtualized may be significant to mean data centre hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that allow real-time , policy based control of computing resources. Cloud computing represents a different way to architect through offering software and that of platform as a service and managing computer resources. This paper is a brief review based on cloud and it also tries to point out related topics , challenges and possible applications of it.
1 of 6

Asset Publisher Asset Publisher

Options

Ethernet

Ethernet is the most widely-installed local area network ( LAN) technology.Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox from an earlier specification called Alohanet (for the Palo Alto Research Center Aloha network) and then developed further by Xerox, DEC, and Intel.
1 of 6