On the Implant Communication and MAC Protocols for a WBAN

08 Feb 2018

20 (7,772 )

Abstract Recent advances in micro-electro-mechanical systems (MEMS), wireless communication, low-power intelligent sensors, and semiconductor technologies have allowed the realization of a wireless body area network (WBAN). A WBAN provides unobtrusive health monitoring for a long period of time with real-time updates to the physician. It is widely used for ubiquitous healthcare, entertainment, and military applications. The implantable and wearable medical devices have several critical requirements such ...

Click here to read more arrow

Features of Transport Layer Security (TLS)

08 Feb 2018

25 (9,893 )

- TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. ...

Click here to read more arrow

Para Social Interaction Theories of Celebrities and Race

08 Feb 2018

27 (10,491 )

Introduction The aim of my dissertation is to apply the theories of para-social interaction and celebrity and race, to four issues of Time magazine featuring Barack Obama, whilst analysing how the representation of Obama develops and changes over time. I have chosen Time magazine as the basis of my study as it is so widely read and respected in America and is regarded as politically neutral. ...

Click here to read more arrow

The Secret Language of Leadership - Steve Denning

08 Feb 2018

29 (11,408 )

Selected in 2000 as one of the world's ten most admired knowledge leader, Steve Denning is an award winner for the books «The secret language of leadership» and «the leader's guide to storytelling». He studied law and psychology in Sydney University and then went to Oxford in the UK for a law postgraduate degree. He worked in organization in the US, Europe, Asia and Australia and ...

Click here to read more arrow

Simple Network Management Protocol (SNMP) for MIB

08 Feb 2018

32 (12,689 )

SNMP Abstract: SNMP or Simple Network Management Protocol (SNMP) is an application layer protocol that provides the exchange of management information between network devices. SNMP is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Through this research the emergency of network management will be managed for fire alarm, power off. Managing devices such as computers is vital and tracking for its safe and ...

Click here to read more arrow

Analysis of Data Security in Wireless Networks

08 Feb 2018

46 (18,397 )

Chapter 1: Introduction Research Method Research is defined as search for new knowledge or an art of scientific and careful investigation of new facts. Research method is referred as a systematic methodology of defining and re-defining the problems, suggest solutions, formulate hypothesis, evaluate the data, make deductions and then reach conclusions. At last, test the conclusions to determine whether they are suitable for the formulating hypothesis ...

Click here to read more arrow

Integration of Technology in Higher Education

08 Feb 2018

24 (9,273 )

Abstract The potentials of mobile phone technology are huge and it has opened possibilities and avenues for enhancing knowledge sharing activities among academics in Institutions of Higher Learning (IHLs). However, it was found that there was lack of academic research on the use of mobile phone technologies for knowledge sharing purposes in IHLs. In IHLs, technologies of mobile phones such as cell phones, smart phones, and ...

Click here to read more arrow

Brand Equity for the Indian Telecom Market

08 Feb 2018

38 (14,904 )

INTRODUCTION Background Telecommunication may well be India's best told story and an apt indicator of its current economic potential. In around a decade, this booming industry has seen more growth and coverage in newspapers than any other sector. Aiding this superlative growth s of being one of the fastest growing markets in the world, is India's rising incomes, dropping tariff's, more options with newer entrants and ...

Click here to read more arrow

Image Based Steganographyusing LSB Insertion Technique

08 Feb 2018

30 (11,957 )

ABSTRACT Steganography is a technique used to hide the message in vessel data by embedding it. The Vessel Data which is visible is known as external information and the data which is embedded is called as internal information.The extrenal information is not much useful to the data owner. The techniques used in Steganography makes hard to detect hidden message within an image file. By this technique ...

Click here to read more arrow

Definitions and Strategies of Communication

08 Feb 2018

22 (8,617 )

Communication is the nervous system of an organisation. It keeps the members of the organisation informed about the internal and external happenings relevant to a task and of interest to the organisation. It co-ordinates the efforts of the members towards achieving organisational objectives. It is the process of influencing the action of a person or a group. It is a process of meaningful interaction among human ...

Click here to read more arrow

Bluetooth Remote Access to PC Using Mobile Devices

08 Feb 2018

39 (15,378 )

CHAPTER 1 INTRODUCTION TO RESEARCH 1.1 INTRODUCTION: Bluetooth is a wireless technology of the last decade, there has been a lot of research going on this technology all over the world. The Bluetooth was named after the 10th century Danish King Harald Blatand or Harold Bluetooth. King Blatand was influential in uniting militaristic factions in parts of what are now Norway, Sweden and Denmark - just ...

Click here to read more arrow

Artificial Neural Networks to forecast London Stock Exchange

08 Feb 2018

75 (29,683 )

Abstract This dissertation examines and analyzes the use of the Artificial Neural Networks (ANN) to forecast the London Stock Exchange. Specifically the importance of ANN to predict the future trends and value of the financial market is demonstrated. There are several contributions of this study to this area. The first contribution of this study is to find the best subset of the interrelated factors at both ...

Click here to read more arrow

Digital Signal Processing (DSP) and CDMA Advantages

08 Feb 2018

50 (19,697 )

INTRODUCTION ANALOG AND DIGITAL SIGNALS The signal is initially generated is in the form of an analog electrical voltage or current, produced for example by a microphone or some other type of transducer. The output from the readout system of a CD (compact disc) player, the data is already in digital form. An analog signal must be converted into digital form before DSP techniques can be ...

Click here to read more arrow

Albanian Mobile Communications (AMC) Analysis

08 Feb 2018

26 (10,251 )

Albanian Mobile Communications Market segments characteristics. (Demands type) Business and Residential are the main customer segments for Data and Internet services. According to ERG Report on regulation of access products necessary to deliver the business connectivity, business customers distributed with remote branches/offices nationally, tend to order wholesale services ordered by the headquarter rather than ordered as separate packages by the remote branches and while this is ...

Click here to read more arrow
Get in Touch With us

Get in touch with our dedicated team to discuss about your requirements in detail. We are here to help you our best in any way. If you are unsure about what you exactly need, please complete the short enquiry form below and we will get back to you with quote as soon as possible.