SlideShare a Scribd company logo
1 of 20
PRESENTEBY
MANJUSHREE MASHAL
 INTRODUCTION
 HISTORICAL PERSPECTIVE
 UNDERWATER SENSOR NETWORK
ARCHITECTURE
 APPLICATION OF WIRELESS SENSOR
NETWORK
 PROBLEM IN UNDERWATER SENSOR
NETWORK
 ATTACKS ON UWCN
 SECURITY REQUIREMENT
 CONCLUSION
2
 Underwater wireless communication is the
wireless communication in which acoustic signals
(waves) carry digital information through an
underwater channel.
 The signal that are used to carry digital
information through an underwater channel are
acoustic channel.
3
 Underwater wireless communication networks
(UWCNs) are constituted by sensors and autonomous
underwater vehicles (AUVs) that interact to perform
specific applications such as underwater monitoring
using the underwater acoustic channel.
 Electromagnetic waves propagate poorly in sea water,
acoustics provides the most obvious medium to
enable underwater communications
4
 The science of underwater acoustics began in 1490,
when Leonardo Da Vinci, stated.
 In 1687 Isaac Newton wrote his Mathematical
Principles of Natural Philosophy which included the first
mathematical treatment of sound in water.
HISTORY
5
6
Figure : Underwater sensor network with AUV
 Initial Efforts in Underwater Communications
 Incoherent and Coherent Modulation
 Production Systems
7
8
UNDERWATER SENSOR NETWORK
ARCHITECTURE
2D architecture of underwater sensor network
9
 Fastest way for finding underwater information
 Disaster Prevention
 Ocean Sampling Network
 Environmental Monitoring
APPLICATION S OF UNDERWATER
SENSOR NETWORK
APPLICATION
Search and rescue mission
10
 More costly devices
 Hardware Protection requirement
 Needed high power for communication:
 Localization
 Limited battery power
 Bandwidth size
 Reliability
 Temporary losses
11
12
Jamming
Wormhol
e attacks
Sybil
attack
Selective
Forwardin
g
Acknowle
dgment
Spoofing
ATTACKS Hello
Flood
attack
Sinkhole
Attacks
ATTACKS AND COUNTERMEASURES
Countermeasures
13
•The transmission of data packets continuously so that the
wireless channel get completely blocked.
•Spread spectrum techniques.
• Sensors can switch to sleep mode
Jamming
Wormhole Attack
Method of attack
•False neighborhood
relationship are created..
Countermeasures
• Estimating the direction of
arrival…
14
 SINKHOLE ATTACK : In a sinkhole attack, a
malicious node attempts to attract traffic from a
particular area toward it.
 HELLO FLOOD ATTACK : A node receiving a
HELLO packet from a malicious node may interpret
that the adversary is a neighbour.
 ACKNOWLEDGMENT SPOOFING:
 SYBIL ATTACK
15
Authentication
•Proof that data was sent by a valid user
Integrity
•It insures that Information is not altered by any
adversary node
16
Confidentiality
•Information is not accessible to unauthorized parties.
Availability
•Data should be available when needed by an authorized
user.
17
The main objective is to overcome the present limitations and
implement advanced technology for oceanographic research.
the future challenges like effective transmission of audio and
video signals etc.
Security in wireless sensor networks has attracted a lot of
attention in the recent years.
 www.ieee.org/organizations/pubs/newsletters/oes/ht
ml/spring06/underwater.html
 www.link-quest.com/html/oceans2000.pdf/
 www.gleonrcn.org/pgm-
download_media.php?name=Aquanode.pps
 www.cs.virginia.edu/sigbed/archives/akyildiz.pdf
20

More Related Content

What's hot

Underwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudasUnderwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudasBibhu Prasad Das
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde9527604481
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication AndeAkash
 
Signal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsSignal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsPraveen Kumar Reddy
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless NetworkSunilPoddar7
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,Er. Saba karim
 
Wireless underground sensor networks
Wireless underground sensor networksWireless underground sensor networks
Wireless underground sensor networksArnav Soni
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor networkfrestoadi
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communicationAbhirami P S
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelSANKETLKENDUR
 
RF Based Wireless Under Water Communication
RF Based Wireless Under Water CommunicationRF Based Wireless Under Water Communication
RF Based Wireless Under Water CommunicationKrishnabhashkar Jha
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communicationEr. Saba karim
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdmRAVITEJA828
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2Naveena N
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1kanusinghal3
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...theijes
 

What's hot (20)

Underwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudasUnderwater acoustic sensor networks (uw asn ) bibhudas
Underwater acoustic sensor networks (uw asn ) bibhudas
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Signal processing for underwater acoustic communications
Signal processing for underwater acoustic communicationsSignal processing for underwater acoustic communications
Signal processing for underwater acoustic communications
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
Underwater Wireless Communication”,
Underwater Wireless Communication”,Underwater Wireless Communication”,
Underwater Wireless Communication”,
 
Wireless underground sensor networks
Wireless underground sensor networksWireless underground sensor networks
Wireless underground sensor networks
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Underwater wireless communication
Underwater wireless communicationUnderwater wireless communication
Underwater wireless communication
 
Implementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channelImplementation of Optical wireless communication through underwater channel
Implementation of Optical wireless communication through underwater channel
 
RF Based Wireless Under Water Communication
RF Based Wireless Under Water CommunicationRF Based Wireless Under Water Communication
RF Based Wireless Under Water Communication
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
 

Viewers also liked

The Key of Future Research on Drone Technologies
The Key of Future Research on Drone TechnologiesThe Key of Future Research on Drone Technologies
The Key of Future Research on Drone TechnologiesIndustrial Robotic Drones
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channelsShudhanshu Singh
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVsKevin Ma
 
UnderseaWarfar_WritingSample
UnderseaWarfar_WritingSampleUnderseaWarfar_WritingSample
UnderseaWarfar_WritingSampleRoyce Morales
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsHydrographic Society Benelux
 
Maritime Robotics
Maritime RoboticsMaritime Robotics
Maritime RoboticsICSA, LLC
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceaniMichele Cocco
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defenseelev0083
 
The unmanned system in hydrographic applications (Z-Boat)
The unmanned system in hydrographic applications (Z-Boat)The unmanned system in hydrographic applications (Z-Boat)
The unmanned system in hydrographic applications (Z-Boat)Hydrographic Society Benelux
 
JSB Market Research - Unmanned Underwater Vehicles Market by product
JSB Market Research - Unmanned Underwater Vehicles Market by productJSB Market Research - Unmanned Underwater Vehicles Market by product
JSB Market Research - Unmanned Underwater Vehicles Market by productJSBMarketResearch
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesSteve Shaker
 
Autonomous underwater vehicles
Autonomous underwater vehiclesAutonomous underwater vehicles
Autonomous underwater vehiclesRAKESH MC
 
Flex Stack Rapid Prototyping System
Flex Stack Rapid Prototyping SystemFlex Stack Rapid Prototyping System
Flex Stack Rapid Prototyping Systemfrankp617
 
unmanned surface vechicle
unmanned surface vechicleunmanned surface vechicle
unmanned surface vechicle9845097705
 

Viewers also liked (19)

The Key of Future Research on Drone Technologies
The Key of Future Research on Drone TechnologiesThe Key of Future Research on Drone Technologies
The Key of Future Research on Drone Technologies
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
(Ma+ 2016 8 1 TN) Integrating RL Algorithms with UVs
 
UnderseaWarfar_WritingSample
UnderseaWarfar_WritingSampleUnderseaWarfar_WritingSample
UnderseaWarfar_WritingSample
 
Advantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVsAdvantages of a combined sonar data acquisition system for AUVs and ASVs
Advantages of a combined sonar data acquisition system for AUVs and ASVs
 
Maritime Robotics
Maritime RoboticsMaritime Robotics
Maritime Robotics
 
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani#Digit15 - Droni sottomarini per l'esplorazione degli oceani
#Digit15 - Droni sottomarini per l'esplorazione degli oceani
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defense
 
The unmanned system in hydrographic applications (Z-Boat)
The unmanned system in hydrographic applications (Z-Boat)The unmanned system in hydrographic applications (Z-Boat)
The unmanned system in hydrographic applications (Z-Boat)
 
JSB Market Research - Unmanned Underwater Vehicles Market by product
JSB Market Research - Unmanned Underwater Vehicles Market by productJSB Market Research - Unmanned Underwater Vehicles Market by product
JSB Market Research - Unmanned Underwater Vehicles Market by product
 
The Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface VehiclesThe Future of Unmanned Undersea and Surface Vehicles
The Future of Unmanned Undersea and Surface Vehicles
 
2013_UTS_Fall_web
2013_UTS_Fall_web2013_UTS_Fall_web
2013_UTS_Fall_web
 
Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)
 
AUV based on EL - Copy
AUV based on EL - CopyAUV based on EL - Copy
AUV based on EL - Copy
 
Autonomous underwater vehicles
Autonomous underwater vehiclesAutonomous underwater vehicles
Autonomous underwater vehicles
 
Flex Stack Rapid Prototyping System
Flex Stack Rapid Prototyping SystemFlex Stack Rapid Prototyping System
Flex Stack Rapid Prototyping System
 
unmanned surface vechicle
unmanned surface vechicleunmanned surface vechicle
unmanned surface vechicle
 
Kongsberg Maritime AUVs
Kongsberg Maritime AUVs Kongsberg Maritime AUVs
Kongsberg Maritime AUVs
 

Similar to underwater communication skills for the new way of devine(2)

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksDipaloke Arunodoy
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkkDipaloke Arunodoy
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148IJRAT
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)IJRAT
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communicationSrinivas Vasamsetti
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423IJRAT
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
 
UNDER WATER EIRELESS COMMUNICATION.pptx
UNDER WATER EIRELESS COMMUNICATION.pptxUNDER WATER EIRELESS COMMUNICATION.pptx
UNDER WATER EIRELESS COMMUNICATION.pptxssuser0af13c
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networksŞüheda Acar
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Sindhu Nathan
 
underwater_wireless_communication_networ.pptx
underwater_wireless_communication_networ.pptxunderwater_wireless_communication_networ.pptx
underwater_wireless_communication_networ.pptxSYETRajatChaskar2462
 
A Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksA Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksIJERA Editor
 

Similar to underwater communication skills for the new way of devine(2) (20)

Securing Underwater Wireless Communication Networks
Securing Underwater Wireless Communication NetworksSecuring Underwater Wireless Communication Networks
Securing Underwater Wireless Communication Networks
 
Securing Underwater Wireless Communication Networks.pptxkkkk
Securing Underwater  Wireless  Communication Networks.pptxkkkkSecuring Underwater  Wireless  Communication Networks.pptxkkkk
Securing Underwater Wireless Communication Networks.pptxkkkk
 
Paper id 2520148
Paper id 2520148Paper id 2520148
Paper id 2520148
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Under Water wireless communication
Under Water wireless communicationUnder Water wireless communication
Under Water wireless communication
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
shyam shinde
shyam shindeshyam shinde
shyam shinde
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
UNDER WATER EIRELESS COMMUNICATION.pptx
UNDER WATER EIRELESS COMMUNICATION.pptxUNDER WATER EIRELESS COMMUNICATION.pptx
UNDER WATER EIRELESS COMMUNICATION.pptx
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Wivi report
Wivi reportWivi report
Wivi report
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
 
underwater_wireless_communication_networ.pptx
underwater_wireless_communication_networ.pptxunderwater_wireless_communication_networ.pptx
underwater_wireless_communication_networ.pptx
 
A Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksA Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor Networks
 
rajat Ppt mwc.pptx
rajat Ppt mwc.pptxrajat Ppt mwc.pptx
rajat Ppt mwc.pptx
 
survey
surveysurvey
survey
 

More from Manjushree Mashal (16)

Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Dos attack
Dos attackDos attack
Dos attack
 
Sql injection
Sql injectionSql injection
Sql injection
 
Xss attack
Xss attackXss attack
Xss attack
 
Network packet analysis -capture and Analysis
Network packet analysis -capture and AnalysisNetwork packet analysis -capture and Analysis
Network packet analysis -capture and Analysis
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
TCP/IP FRAME FORMAT
TCP/IP FRAME FORMATTCP/IP FRAME FORMAT
TCP/IP FRAME FORMAT
 
Diabetic Retinopathy Analysis using Fundus Image
Diabetic Retinopathy Analysis using Fundus ImageDiabetic Retinopathy Analysis using Fundus Image
Diabetic Retinopathy Analysis using Fundus Image
 
Manjushree_EC_fresher_2016
Manjushree_EC_fresher_2016Manjushree_EC_fresher_2016
Manjushree_EC_fresher_2016
 
Tvws ppt 1
Tvws ppt 1Tvws ppt 1
Tvws ppt 1
 
Leaf chlorophyll concentration using random forest
Leaf chlorophyll concentration using random forestLeaf chlorophyll concentration using random forest
Leaf chlorophyll concentration using random forest
 
Vlsi design and fabrication ppt
Vlsi design and fabrication  pptVlsi design and fabrication  ppt
Vlsi design and fabrication ppt
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

underwater communication skills for the new way of devine(2)