Vous êtes sur la page 1sur 5

VoWiFi

VoWiFi is used to reference a Wi-Fi-based VoIP service. VoWiFi is one of those weird acronym type
words made up of a combination of abbreviation and acronym. Just because we can merge
technologies, doesn't mean we should merge acronyms and abbreviations. 

Voice Morphing
The method of transforming the source speaker speech to that of the target speaker is usually referred
as Voice Morphing or voice transformation or voice conversion. Using the linear transformations
estimated from time-aligned parallel training data, it transforms the spectral envelope of the potential
speaker in tone with the target speaker. As the image morphing is analogous in nature, i.e. the source
face smoothly changing its shape and texture to the target face, speech morphing also should smoothly
change the source voice into another, keeping the shared characteristics of the starting and ending
signals.  The pitch and the envelope information are two factors that coincide in a speech signal, which
needs to be separated. The method of cepstral analysis is usually employed to extract the same.

Robocode
Robocode is an Open Source educational game by Mathew Nelson (originally R was provided by IBM). It
is designed to help people learn to program in Java and enjoy the experience. It is very easy to start - a
simple robot can be written in just a few minutes - but perfecting a bot can take months or more.
Competitors write software that controls a miniature tank that fights other identically-built (but
differently programmed) tanks in a playing field. Robots move, shoot at each other, scan for each other,
and hit the walls (or other robots) if they aren t careful. Though the idea of this game may seem simple,
the actual strategy needed to win is not.

Good robots have hundreds of lines in their code dedicated to strategy. Some of the more successful
robots use techniques such as statistical analysis and attempts at neural networks in their designs. One
can test a robot against many other competitors by downloading their bytecode, so design competition
is fierce. Robocode provides a security sandbox (bots are restricted in what they can do on the machine
they run on) which makes this a safe thing to do.

Java Cryptography Architecture (JCA)


The Java Cryptography Architecture (JCA) is a framework for working with cryptography using the Java
programming language. It forms part of the Java security API, and was first introduced in JDK 1.1 in the
java.security package.

MeSCoDe
File Management is a very relevant application in computer field.  MeSCoDe software focuses
on splitting files in a user friendly manner, merging different source files into a single one,
compressing a file that can save large extend of memory decompressing compressed files to
produce the original file. Compression and decompression are very useful for durable data.
The software named MeSCoDe has been developed using C++. The title MeSCoDe is the
abbreviation of Merging, Splitting, Compression and Decompression. All these facilities can be
done using MeSCoDe.

Zombie
In the world of UNIX, a zombie refers to a 'child' program that was started by a 'parent' program but
then abandoned by the parent. Zombie is also used to describe a computer that has been implanted
with a daemon that puts it under the control of a malicious hacker without the knowledge of the
computer owner.  

Bayesian Networks
Bayesian Networks are becoming an increasingly important area for research and application in the
entire field of Artificial Intelligence. This paper explores the nature and implications for Bayesian
Networks beginning with an n overview and comparison of inferential statistics and Bayes theorem. The
nature, relevance and applicability for Bayesian Network theories for advanced computability form the
core of the current discussion.

A number of current applications using Bayesian networks are examined. The paper concludes with a
brief description of the appropriateness and limitations of Bayesian networks for human-computer
interactions and automated learning.

WISENET
WISENET is a wireless sensor network that monitors the environmental conditions such as light,
temperature, and humidity. This network is comprised of nodes called motes that form an ad-hoc
network to transmit this data to a computer that function as a server.

 The server stores the data in a database where it can later be retrieved and analyzed via a web-based
interface. The network works successfully with an implementation of one sensor mote.

Wolfpack
Officially known as  Microsoft Cluster Server (MSCS), it was released in September, 1997 as part of
Windows NT 4.0, enterprise Edition. Wolfpack is the codename used for Microsoft's clustering solution

C3D
C3D has had a breakthrough in the 3-D arena with their FMD technology, which allows multiple layers of
data to be printed onto the surface of a CD-sized 12 cm disk. What sets FMD apart is the sheer number
of layers that are made possible.

C3Ds fluorescent technology could scale up to an impressive 1.4 terabytes of data storage when applied
on a single sided 12 cm disk with 100 layers. With S3Ds new FMD technologies, gigabytes will replace
megabytes as data storages common currency.

Cooperative Linux
Employing the novel idea of a co-operative virtual machine(CVM) co-operative linux or
colinx can support the kernel of both the Microsoft windows and the linux, to run parallel on
the same machine. Unlike in the traditional VMs where every guest is in the unprivileged
mode to control the real machine also where the resources are virtualised for every OS, the
CVM gives both the OSs complete control of the host machine. Since the system hardware
of today is not compatible to deal with two different operating systems at a time, the word
co-operative used to denote two bodies working in parallel would only theoretically suite the
whole idea.

 So, although each of the kernels has its own complete CPU context and address space, and
can also make a decision when to give control back to its associate what really happens is
that the host kernel is left in control of the real hardware and the guest kernel that has
some special drivers can communicate with the host and provide various important devices
to the guest OS.

Trans European Services for Telematics between


Administrations (TESTA)
The Trans European Services for Telematics between Administrations (TESTA) system is the private IP-
based network of the European Community. TESTA is a telecommunications interconnection platform
for secure information exchange between the European public administrations.

TESTA is not a single network, but a network of networks, composed of the EuroDomain backbone and
Local Domain networks. The EuroDomain is a European backbone network for administrative data
exchanges acting as a network communication platform between local administrations.

MOIP
Mobile communications Over Internet Protocol is designed to be totally mobile-centric, and is optimized
specifically for mobile-handsets environment rather than the PC. MoIP unlike mobile VoIP,  is not a VoIP
program made accessible from mobile phones or a switchboard application using VoIP in the
background buts it's a form of peer-to-peer communications found on users' handsets, used to conduct
talk and chat over the internet connection as its primary channel via standard mobile communications
applications including 3G, GPRS and Wifi.

Most MoIP applications work without any proprietary hardware and are enhanced with real-time
contact availability (presence) thereby users save money by utilizing free WiFi internet access or fixed
internet data plans instead of GSM (talk) minutes. 

Holographic Versatile Disc (HVD)


It's an optical disc technology still in the childhood stages of research called as the collinear
holography, would soon gain upper hand over the existing technologies like the blue-ray
and HD DVD optical disc systems with respect to its storage capacity. Consisting of a blue-
green laser and a red laser collimated in a single beam, the blue-green laser reads data
encoded as laser interference fringes from a holographic layer near the top of the disc while
the red laser is used as the reference beam and to read servo information from a regular
CD-style aluminium layer near the bottom.

Cyborgs
The artificial living parts!

Choke packet
The picture of an irate system administrator trying to choke their router is what comes to mind when
you see this term. While we think this should be used in anger management seminars for network
administrators, sadly the term choke packet is already taken and being used to describe a specialized
packet that is used for flow control along a network.

AKA
AKA stands for the Authentication and Key Agreement security protocol. It is a mechanism which
performs authentication and session key distribution in Universal Mobile Telecommunications System
(UMTS) networks. AKA is a challenge-response based mechanism that uses symmetric cryptography.
AKA is typically run in a UMTS IM Services Identity Module (ISIM), which resides on a smart card like
device that also provides tamper resistant storage of shared secrets.
Exponential key exchange
The first publicly knownbpublic-key agreement protocol that meets the above criteria was the Diffie-
Hellman exponential key exchange, in which two people jointly exponentiate a generator with random
numbers, in such a way that an eavesdropper has no way of guessing what the key is.However,
exponential key exchange in and of itself does not specify any prior agreement or subsequent
authentication between the participants. It has thus been described as an anonymous key agreement
protocol.
Authentication
Anonymous key exchange, like Diffie-Hellman, does not provide authentication of the parties, and is
thus vulnerable to Man-in-the-middle attacks.A wide variety of cryptographic authentication schemes
and protocols have been developed to provide authenticated key agreement to prevent man-in-the-
middle and related attacks. These methods generally mathematically bind the agreed key to other
agreed-upon data, such as:
Public/private key pairs , Shared secret keys , Passwords

Vous aimerez peut-être aussi