Showing posts with label micro-controller based projects. Show all posts
Showing posts with label micro-controller based projects. Show all posts

Wednesday, August 29, 2012

Ocean Thermal Energy Conversion (OTEC)


OTEC, or Ocean Thermal Energy Conversion, is an energy technology that converts solar radiation to electric power. OTEC systems use the ocean's natural thermal gradient—the fact that the ocean's layers of water have different temperatures to drive a power-producing cycle. As long as the temperature between the warm surface water and the cold deep water differs by about 20°C (36°F), an OTEC system can produce a significant amount of power, with little impact on the surrounding environment.
The distinctive feature of OTEC energy systems is that the end products include not only energy in the form of electricity, but several other synergistic products. The principle design objective was to minimize plan cost by minimizing plant mass, and taking maximum advantage of minimal warm and cold water flows. Power is converted to high voltage DC, and is cabled to shore for conversion to AC and integration into the local power distribution network.

            The oceans are thus a vast renewable resource, with the potential to help us produce billions of watts of electric power.

CRYPTOGRAPHY AND NETWORK SECURITY


ABSTRACT:


Network security is the effort to create a secure computing platform, designed so that agents (user/programs) cannot perform action that they are not allowed to perform. But can perform the action that they are not allowed to. The action in question can be reduced to operations of access, modification and deletion. A network has been defined as “any set of interlinking lines resembling a net”. Network can be seen as a subfield of engineering which looks at broader security an issue in addition to network security. This network security also deals with the problems of legitimate messages being captured and replayed. And with the people trying to deny that they sent certain messages. Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become “wired”, an increasing number of people need to understand the basics of security in a network world.


Cryptography has a long and colorful history. Historically, four groups of people have used and contributed to the art if cryptography: military, the diplomatic corps, diarists and lovers. Of these the military has had the most important role and has shaped the field. Suppose that someone wants to send a message to a receiver, and wants to be sure that no one else can read the message. However, there is the possibility that someone else opens the letter and hearts the electronic communication. The cryptography process explaining through a generalized function is discussed through which encryption and decryption is done by the various algorithms like RSA algorithms, Hash functions and many cryptographic algorithms.  
    


Submitted by subbaiah

Solar Energy-The Renewable Energy for the Future



The oil shocks of 1970s led to spiraling crude oil prices in the world market which prompted planners to view energy security as an issue of national strategic importance. Energy security has an important bearing on achieving national economic development goals and improving the quality of life of the people. World’s dependence on crude oil will continue for most part of the 21st century but the continued dependence on crude oil is loaded against it with inherent price volatility linked to finite global reserves. In addition, global warming, caused largely by greenhouse gas emissions from fossil fuel energy generating systems, is also a major concern. So, there is a need to develop alternate fuels like non-conventional sources, considering the aforesaid two concerns.
This paper describes about the solar energy, one of the non-conventional sources and different ways of using it to convert to electric energy.