Dual Trapezoidal Fuzzy Number and Its Applications

12 Mar 2018

10 (3,682 )

Jon Arockiaraj. J, Pathinathan.T, Revathy.S   Abstract: In this paper, we introduce Convergence of α-Cut. We define at which point the α-Cut converges to the fuzzy numbers it will be illustrated by example using dual trapezoidal fuzzy number and Some elementary applications on mensuration are numerically illustrated with approximated values. KeyWords: Fuzzy number, α-Cut, Dual trapezoidal fuzzy number, Defuzzification. Introduction: ...

Click here to read more arrow

Analysis of Attribution Selection Techniques

12 Mar 2018

7 (2,560 )

ABSTRACT: From a large amount of data, the significant knowledge is discovered by means of applying the techniques and those techniques in the knowledge management process is known as Data mining techniques. For a specific domain, a form of knowledge discovery called data mining is necessary for solving the problems. The classes of unknown data are detected by the technique called classification. Neural networks, rule based, ...

Click here to read more arrow

VOIP Technology to Make Voice Calls

12 Mar 2018

7 (2,620 )

Faculty of Engineering, Architecture and Science Computer Networks Program Course Number CN8814 Course Title Network Mathematics and Simulations Semester/Year Summer 2015 Instructor Dr. Alagan Anpalagan Lab Assignment No Lab 2 ...

Click here to read more arrow

Soft Computing Based Model for Trip Production

12 Mar 2018

8 (2,829 )

Synopsis On A Soft Computing based model for Trip Production and Attraction 1. Area of the Proposed Research work Computer Science & Applications 2. Research Topic A Soft Computing based model for Trip Production and Attraction 3. Aim and Objectives of research work The aim and objectives of this research is to develop a soft computing based model for trip production, trip attraction & mode-wise traffic pattern in ...

Click here to read more arrow

A Survey on Mobile User's Data Privacy Threats

12 Mar 2018

5 (1,606 )

ABC EFG1 , ABC EFG2* and ABC EFG3   4. Security Challenges for Mobile Devices Mobile device applications offer a level of convenience that the world has never think before it. Everywhere (home. Office, hotel, playground, road, parking, picture palace, travelling in different countries or each place of world) any mobile user can use applications to fulfil their daily needs like communicate, ...

Click here to read more arrow

Sustainable Development of the ICT Sector

12 Mar 2018

6 (2,225 )

Chapter 7:Conclusion In this last chapter of the dissertation motivation behind the research is discussed and the conclusion of the research is presented. The conclusion is presented by revisiting the research objectives set in first chapter of the dissertation and then, analysing the results obtained, in light of these objectives. As vulnerabilities, exploits and security in information and communication technology is a very vast topic and ...

Click here to read more arrow

Report on Critical Review of Binary Search Tree Algorithm

12 Mar 2018

8 (3,106 )

What is Binary Search Tree? Binary search tree (BST) is a dynamic data structure, which means that its size is only limited by amount of free memory in the computer and number of elements may differ during the program executed. BST has aComparableKey (and an associated value) for each. All elements in its left sub-tree are less-or-equal to the node (<=), and all the elements in ...

Click here to read more arrow

Modelling Tool for Photonic Crystal Device Issues

12 Mar 2018

7 (2,789 )

Chapter - 4 SIMULATION DETAILS OF THE PROJECT In the past 10 years, photonic crystals (PCs) have attracted much scientific and commercial interest. The research and design work for PCs starts from accurate modal analysis of the device. Once the modes are found, structure can be simulated for that particular mode and the results of power spectra can be observed at the detector. In this chapter ...

Click here to read more arrow

On-chip Static RAM

12 Mar 2018

6 (2,099 )

For code and/or information stockpiling on-chip static RAM can be utilized. The SRAM might conceivably access as 8 bit, 16 bit and 32 bit. It gives the 8 KB of static RAM for the LPC2109 and 16 KB for the LPC2119 and LPC2129. 3.1.6 10-bit ADC The LPC 2109/2119/2129 every having a solitary 10 bit progressive rough guess ADC with four multiplexed channels. ADC Elements Introduce ...

Click here to read more arrow

Proposal for an Automated System

12 Mar 2018

4 (1,489 )

III. PROPOSED SYSTEM All traditional frameworks do not discuss functional requirements or, explicitly automatable parts of ITSM processes. Automation is identified as one of the approach to tackle the challenges of current service management processes. The architecture of the system is shown below in Figure 1: Figure 1. Block Diagram for the Architecture As shown in the figure above, the architecture consists of three main ...

Click here to read more arrow

Proactive and Reactive Cyber Forensics Investigation Process

12 Mar 2018

9 (3,277 )

PROACTIVE CYBER FORENSIC ANALYSIS Proactive And reactive cyber forensics investigation processes: A Systematic Literature Review(SLR) A multi-component framework of cyber forensics investigation   Abstract—Digital Forensics can be defined as the ensemble of methods, tools and techniques used to collect, preserve and analyze digital data originating from any type of digital media involved in an incident with the purpose of extracting valid evidence for a court of ...

Click here to read more arrow

Speech Recognition using Epochwise Back Propagation

12 Mar 2018

9 (3,409 )

International Journal of Computer Applications (0975 – 8887) Volume *– No.*, ___________ 2013 Speech Recognition using the Epochwise Back Propagation through time Algorithm Neelima Rajput S.K.Verma Department of C.S.E. Department of C.S.E. GBPEC, Pauri Gharwal, GBPEC, Pauri Gharwal, Uttrakhand, India. Uttrakhand, India ABSTRACT In this paper, artificial neural networks are used to accomplish the English alphabet speech recognition. The challenging issue in the area of speech ...

Click here to read more arrow

SQL Injection and Buffer Overflow Attack Detection

12 Mar 2018

4 (1,295 )

CHAPTER ONE INTRODUCTION This chapter discussed about research requirement for this research. It discussed briefly the research background in section 1.1, problem statement in 1.2, research objectives in 1.3, research questions in 1.4, scope of research in 1.5, research elements in 1.6 and research significant in 1.7 1.1 Research Background The internet which is a free, supportive and self-sustaining facility reachable to hundreds of millions of ...

Click here to read more arrow

Location Based Services and Crime Detection Alert

12 Mar 2018

7 (2,487 )

CHAPTER 1 INTRODUCTION Nowadays, many issues and trend of crimes such as robbery, drug addicts, rape, murder or snatch had arisen via the whole world. These arise of crimes was happening shows that the public especially victims seek for a proper assistance in the soonest time from emergency agencies such as police, fire fighter or hospital. To overcome those crimes a lot of effort and works ...

Click here to read more arrow

K-degree-l-diversity Anonymity Model

12 Mar 2018

7 (2,526 )

Abstract Privacy is one of the major concerns when publishing or sharing social network data for social science research and business analysis. Recently, researchers have developed privacy models similar to k-anonymity to prevent node reidentification through structure information. However, even when these privacy models are enforced, an attacker may still be able to infer one’s private information if a group of nodes largely share the same ...

Click here to read more arrow

Replica System in Distributed File Sharing Environments

12 Mar 2018

4 (1,561 )

AN EFFECTIVE FRAMEWORK FOR MANAGING REPLICA SYSTEM IN DISTRIBUTED FILE SHARING ENVIRONMENTS Tesmy K Jose,  Dr.V.Ulagamuthalvi   Abstract-An Enhanced file system called Probabilistic File Share System is used to resolve all the distributed file update issues. There are three mechanisms designed in the probabilistic file share system such as Lazy Adaptive Synchronization Approach, Standard Replica System Replay Approach and Probabilistic method. The adaptive replica synchronization and Standard ...

Click here to read more arrow

Messaging System for Hand Held Devices using Wi-Fi/Bluetooth

12 Mar 2018

4 (1,390 )

Multidisciplinary Journal of Research in Engineering and Technology, Volume _, Issue _ () Pg. Messaging System for hand held devices using Wi-Fi/Bluetooth Network Ajita Arvind Mahapadi,Prof.Soumitra Das   Abstract : In day-to-day life use and performance of mobile phones has increased drastically from previous few years. Most of them take the benefit of extremely capable smartphones for file sharing. Exisiting peer-to-peer system suffers from frequent disconnections and ...

Click here to read more arrow

Detection of Copy Move Forgery

12 Mar 2018

6 (2,276 )

J.Reethrose B.E., Dr. J. P. Ananth M.E., Ph.D.,   Abstract—Digital images are easy to manipulate and edit using some editing software. So it is difficult to identify the duplicate images. Copy-move manipulations are common form of local processing, where parts of an image are copied and reinserted into another part of the same image. The problem of detecting the copy-move forgery describes an efficient and ...

Click here to read more arrow

Analysis of Mobile IP Networks

12 Mar 2018

5 (1,721 )

That allows users with mobile devices whose IP address is associated with one network to stay connected when moving to a network with a different IP address. When a user leaves the network with which his device is associated home network and enters the domain of a foreign network. The foreign network uses the MIP protocol to inform the home network of care of address to ...

Click here to read more arrow

Sample Code of API’s Controls in Written Javascript

12 Mar 2018

5 (1,831 )

"use strict" //function to load Facebook JavaScript. var loadFacebookJS = function () { blockUI(); if (!$("#modalWindowDivControl #FacebookDivision").contents().find(".fb-share-button").attr("data-href")) { unBlockUI(); (function () { var e = document.createElement('script'); e.type = 'text/javascript'; e.src = document.location.protocol + '//connect.facebook.net/en_US/all.js#xfbml=1&appId=297301533752770'; e.async = true; document.getElementById('fb-root').appendChild(e); } ()); } else { setTimeout(loadFacebookJS, 200); } } // freez the screen until the whole page loads function blockUI(controllerId, message) { controllerId = controllerId || "ctl00_gridDiv"; message ...

Click here to read more arrow

Comparison between SOAP and REST

12 Mar 2018

10 (3,662 )

Dickriven Chellemboyee Table of Contents (Jump to) Abstract Introduction to Software Architecture Service-Oriented Architecture Resource-Oriented Architecture Web service SOAP REST RESTful Features SOAP WS-* REST Description Language WSDL WADL Message Format XML JavaScript Object Notation Pros and Cons Pros of SOAP over REST Cons of SOAP over REST Statistics Real Life Scenario Conclusion References List of Figures Figure 1: Basic web service Figure 2: ...

Click here to read more arrow

Issues in Distributed Computing

12 Mar 2018

3 (1,054 )

Introduction Distributed computing empowers profoundly versatile administrations to be effortlessly expended over the Internet on an as-required premise. A real peculiarity of the cloud administrations is that clients' information are generally prepared remotely in obscure machines that clients don't possess or work. While appreciating the comfort brought by this new rising innovation, clients' apprehensions of losing control of their own information can turn into a noteworthy ...

Click here to read more arrow

Network Attacks in Real Time Scenario Over Campus Network

12 Mar 2018

10 (3,692 )

Amit Mahajan* Vibhakar Mansotra** ABSTRACT This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper discusses about the dependency over the IDS/IPS signatures and proposes for a solution which records the events with raw traffic and visualizes the traffic to give better understanding of the behavior of the traffic ...

Click here to read more arrow

Bring Your Own Device System: Pros and Cons

12 Mar 2018

6 (2,161 )

Table of Contents (Jump to)   Introduction Advantage of using BYOD Risks of using a BYOD System How to build a Secure BYOD policy 1. Carry out a survey 2. How does employees use their device on the cooperate network Suggested BYOD Policy Access Control/ Acceptable Use Roles and responsibilities Devices and Support Security Termination of employment ISO standards to follow Benefits of using ISO 27002 ...

Click here to read more arrow

Technologies to Analyze Big Data

12 Mar 2018

4 (1,441 )

Hassan, Ruman Ul Currently, most of the companies like Facebook, Google, and Amazon are generating an extensive data and this data is termed as big data. In addition to the above mentioned sources, there are many other sources like banking, airlines, stock market, and digital media that generates big data. Nandimath, Patil, Banerjee, Kakade, and Vaidya (2013) state that the volume of data being ...

Click here to read more arrow

Survey Engine to Assess Indirect Attainment Parameter in OBE

12 Mar 2018

11 (4,150 )

1 INTRODUCTION The proposed system consists to two modules: Admin Users Report The administrator can perform several operations such as add and delete Question in question bank and creating survey etc. The administrator cans also send email to user to give survey and generate report. The User can receive an email to give survey he can give survey by opening link in email received ...

Click here to read more arrow

Data Locations and Security Issues in Cloud Computing

12 Mar 2018

9 (3,532 )

ANURAG JAIN  JITENDRA TAWARI  SANDEEP SONI   ABSTRACT-: Cloud computing is one of today's most important technology because in this technology cost low, exciting and flexible. It is the most important technology of growing industrial areas. It allows user to access applications, documents etc., that consist location of our own computer or other Internet-connected devices. Data is stored remotely from a location.it can be ...

Click here to read more arrow

An RSA-Type OTP Generator

12 Mar 2018

8 (2,962 )

An RSA-Type OTP Generator Aiswarya Vinayachandran, Sivasankar M   Abstract Simple and secure authentication protocols are in great demand due to the ever expanding use of internet for financial and message communications. Multifactor authentication, in particular 2Factor Authentication (2FA) is preferred to static passwords-only authentication. One Time Passwords (OTPs) play a vital role in the construction of 2FA protocols. In this paper, an efficient OTP ...

Click here to read more arrow

Speaker Independent Speech Recognizer Development

12 Mar 2018

9 (3,456 )

Chapter 4 Methodology and Implementation This chapter describes the methodology and implementation of the speaker independent speech recognizer for the Sinhala language and the Android mobile application for voice dialing. Mainly there are two phases of the research. First one is to build the speaker independent Sinhala speech recognizer to recognize the digits spoken in Sinhala language. The second phase is to build an android application ...

Click here to read more arrow

MPLS-Traffic Engineering

12 Mar 2018

6 (2,101 )

I. Webserver We will be using apache web server in our project. The Apache HTTP Server Project is a synergistic programming improvement exertion went for making a hearty, business grade, featureful, and unreservedly accessible source code execution of a HTTP (Web) server. The undertaking is together overseen by a gathering of volunteers placed as far and wide as possible, utilizing the Internet and the Web to ...

Click here to read more arrow

Software Requirement Specifications

12 Mar 2018

6 (2,270 )

2.1.1 Proposed Method Fig.2.1 Block Diagram of D.A.P.S It is dependent on core Harvard Architecture and ARM9263 choosing individual data and command buses. The ARM9 processor commands are accomplish by means of the five stage pipelining. The clock frequency of the ARM9263 processor is too high evaluated to ARM7 processor. ARM9263 processor might accomplish the instructions in a single clock cycle. This processor also ...

Click here to read more arrow

Dynamic Modeling Laboratory

12 Mar 2018

6 (2,134 )

Chapter Three 3. Implementation of model Although the improvement of complex design system involves the development of representations for design tools and mappings, design tool environment models, and project flow definitions, these significant improvements in systems cannot be technologically advanced in isolation. After outlining the various frameworks, the developer(s) of any given model must be able to examine what is under creation to prove that the ...

Click here to read more arrow

Evaluation Model for Web Service Change Management

12 Mar 2018

9 (3,265 )

EVALUATION MODEL FOR WEB SERVICE CHANGE MANAGEMENT BASED ON BUSINESS POLICY ENFORCEMENT G.NANDHINI,P.INBAVALLI Abstract-Today organizations in all industries are increasingly dependent upon IT and a highly available network to meet their business objectives. As customer expectations and demands rise, and their needs is one of the prevailing problems faced by IT enterprises at present, leading to increasingly ...

Click here to read more arrow

IntelliP: Effective Mechanism for Resource Monitoring

12 Mar 2018

7 (2,768 )

IntelliP: Effective Mechanism for Resource Monitoring in Private Cloud Vivekanand Adam   Abstract—Cloud computing paradigm makes huge virtualized compute resources available to users as pay-as-you-go style. Resource monitoring is the premise of many major operations such as network analysis, management, job scheduling, load balancing, billing, event predicting, fault detecting, and fault recovery in Cloud computing. Cloud computing is more complicated than ordinary network owing ...

Click here to read more arrow

Enumerating Identical Skyline Prospects

12 Mar 2018

5 (1,701 )

    K. L. Shankar A. Manikanteswar W.RajeshKumar   ABSTRACT We took the problem of enumerating the skyline for uncertain data sets with N elements. We are introducing a method, called skyline, which returns the objects that are not overruled by any other objects in ...

Click here to read more arrow

Cheating Prevention in Multiplayer Online Games

12 Mar 2018

6 (2,239 )

Shane Willcox Introduction One of the many modes within most games these days is playing with other players with Online Multiplayer. While most games have a multiplayer mode, some games are based and built for multiplayer. Multiplayer games are become extremely popular with millions of people playing them every day. Since Multiplayer games attract many players, there are always those people who go out ...

Click here to read more arrow

Simulation Of Inmarsat C Channels Using Matlab

23 Mar 2015 11 Dec 2017

17 (6,744 )

This report is all about Inmarsat-c channels its standards and simulation of C channels using matlab. The use of satellites for control, command, communications and navigation is an area of high end technology which has grown significantly over the last decade and been primarily dominated by the military. The establishment of mobile satellites is offering services to the public and commercial fleet operators the opportunity to take ...

Click here to read more arrow

Client Server Network Architecture Essay

23 Mar 2015 11 Dec 2017

5 (1,856 )

Abstract This report is about the client server network architecture in which each computer or process on the network is either a client which is low end computer which request services and or a server which is high end powerful computer which is highly capable of providing services to many different clients at the same time. The task which servers performs are like managing disk drives which ...

Click here to read more arrow

Different lan Technologies

23 Mar 2015 11 Dec 2017

2 (565 )

1. AIM To learn about different lan technologies and to design a network based on these lan technologies and to simulate these networks by a simulation tool know as opnet and by putting different loads on these networks and to study the performance of these networks. 2. Overview      Local area networks (LAN) are a group of devices which communicate with each other in a small geographical area ...

Click here to read more arrow

Web Database Based Inventory System

23 Mar 2015 11 Dec 2017

15 (5,772 )

Web database based inventory system is for management of items, orders, customers and payment. This system helps in Stock management, payment, and orders. This system allows conducting payment for customers and for ordered items in the purchase order. The main objective of this project is about the design of Web-based inventory system. Bakery feyasse use traditional paper based inventory system to manage his information concerning customer, ordered ...

Click here to read more arrow

Probing Using Zenmap Gui

23 Mar 2015 11 Dec 2017

4 (1,260 )

Hackers traditionally follow a 5-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying your target and learning as much as possible about the target. Hackers traditionally perform an initial reconnaissance & probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, students will plan an ...

Click here to read more arrow

Autonomous Tennis Ball Picker Robot

23 Mar 2015 11 Dec 2017

6 (2,273 )

The basic purpose of this project is to provide opportunity and benefit to the sports players. They can do more practice in less time with the help of this robot. Various different electronic devices were used to pick the tennis ball or any other ball. It is not so easy for any tennis player to pick a ball lot of times during practice. It affects his practice ...

Click here to read more arrow

Developing High Quality Multimedia Products

23 Mar 2015 11 Dec 2017

6 (2,274 )

Introduction: The increasing development of computer science including the web design in parallel to the huge revelation of media has resulted to an increase in multimedia content at the final product presented to the user (Martin & Lynch, 2003). From this statement, we can immediately see the important role the multimedia is playing in our lives. We can hardly find a business product or a technical application ...

Click here to read more arrow

Characteristics of System Modules

23 Mar 2015 11 Dec 2017

16 (6,100 )

Identify and report the names , purpose and characteristics of system modules such as mother board, power supply, CPU, Memory modules, storage devices, display devices, adaptor cards, ports and cases in the given machine.(10 marks) Name: Mother Board (P4-GA-EP45T-UD3LR {775/DDR3} w/Sound+LAN) Purpose: The purpose of mother board is to guide the computer do computations. It has buses, or electrical pathways to allow data to travel between the ...

Click here to read more arrow

Nonfunctional Requirements with Data Mining

23 Mar 2015 11 Dec 2017

6 (2,043 )

INTRODUCTION      The use of software has invaded our daily lives as it enable us to accomplish many tasks especially those which are associated in doing various business processes and in dealing with different business systems. It enables the use of knowledge on both computing and computers to be able to help solve various problems which confront everyday situations. The often most encountered problems encountered in the field ...

Click here to read more arrow

Technical Writing in Computer Hardware Electronics

23 Mar 2015 11 Dec 2017

4 (1,211 )

What is Technical Writing? Technical writing is a style of formal writing used in various fields as diverse as computer hardware and software, chemistry, aerospace industry, robotics, finance, consumer electronics and biotechnology. In short it is conveying specific information about a technical subject to a specific audience for a specific purpose. Presentation of information is indeed very important as it helps the reader in solving a particular ...

Click here to read more arrow

Techniques of Spoofing Attacks

23 Mar 2015 11 Dec 2017

17 (6,694 )

Spoofing is sending fake address of a transmission to gain entry which is illegal into a secure system. It is creates fake responses or signals in order to keep the session alive and prevent timeouts. It captures, alters, re-transmits a communication stream that can mislead the recipient. Hackers use it to refer especially to the TCP/IP packets of addresses in order to disguise a trusted machine. The ...

Click here to read more arrow

Developing Joined Tables for Data

23 Mar 2015 11 Dec 2017

3 (895 )

4. Pre-Joined tables Consider creating tables of pre-joined data when two or three tables should join on a normal format by an application although the disadvantage of the join is not allowed, the pre-joined tables should: Consist no redundant columns (matching join criteria columns) contain only those columns completely essential for the application to provide its processing requirements Be made frequently using SQL to join the ...

Click here to read more arrow

Sinhala Text To Speech System Development | Research

23 Mar 2015 11 Dec 2017

8 (2,933 )

The system, which I am developing, called SINHALA TEXT TO SPEECH is a one kind of fully research project. This documentation briefly describes the functionality of my STTS and highlights the important and benefits of the project. So this system will allow user to enter sinhala texts and internally it will convert in to pronunciation form. Actually it will happen after user select the particular option (convert ...

Click here to read more arrow

Research Paper: CalREN Systems

11 Aug 2017 11 Dec 2017

7 (2,456 )

Introduction: The Corporation for Education Network Initiatives in California (CENIC) projected that they the state of California can achieve greater heights if they give it a better and more improved internet. On April 9, CENIC announced that they had talked with the technology giants and are working on the same project and those partners are going to provide all the hardware and communication technology to ...

Click here to read more arrow

Online Web Application For Selling Computer Products

23 Mar 2015 11 Dec 2017

5 (1,646 )

This project report represents the idea of the Online Shopping Website application for Computer products. In this project we are having primary goal of to increase the sale of the Computer product in the market, and to reduce the manual work and increasing the technical support for sellers and buyers to sale or buy product online. The second goal of this site is to maintain the data ...

Click here to read more arrow

Analysis of Weinberger's Concepts of Cyberwarfare

26 Jul 2017 11 Dec 2017

11 (4,179 )

In June 2010, analysts from the antivirus software company VirusBlokAda examined a computer in Iran due to suspicion of malware activity. Lurking inside the machine was a computer worm known as Stuxnet. Stuxnet possessed an array of abilities, among them was the ability to "target the software that controls pumps, valves, generators and other industrial machines" (Weinberger, 2011). Unlike other viruses that use forged security ...

Click here to read more arrow

Direct Manipulation Principles

23 Mar 2015 11 Dec 2017

4 (1,216 )

PART - 1 DIRECT MANIPULATION PRINCIPLES Three Major Principles of Direct Manipulation Process based on selection, interrupted and visible performance of object Process based on selection is immediately displayed, which works fast, incremental and two sided actions Process based on selection using pointing action instead of typed commands (No Syntax) Advantages of Direct Manipulation Beginners learn Quickly Seldom users can remember concepts Getting error ...

Click here to read more arrow

Attendance System Using Fingerprint

23 Mar 2015 11 Dec 2017

11 (4,112 )

The project entitled "ATTENDANCE SYSTEM USING FINGERPRINT" is to provide an authentified attendance system for Roots Industries Limited. This software provides various information, which is useful for user as well as administrator. This software can be used as a whole in organization, or can partly used as separate modules, whenever needed. The project deals with capturing the thumb impression of the employee through the thumb scanner and ...

Click here to read more arrow

Data Storage for Art Gallery

23 Mar 2015 11 Dec 2017

14 (5,303 )

Executive Summary This assignment is based upon an Art Gallery. Being the system analyst and designer the art gallery is hopeful I demonstrate professionalism and propose a computerized cataloging system which they require. Currently the Art Gallery has 8 exhibition rooms where they display art items from around the word. These items don't only belong to the Art Gallery but by other owners, be it other galleries ...

Click here to read more arrow

Passive and Active Security Attacks

23 Mar 2015 11 Dec 2017

6 (2,193 )

Ans :- The difference between active and passive attacks in case of active attack involve the updating upon the data means the active attack access the data and then perform alteration upon the data and than data transmit on the network but in case of passive attack the attacker just access the message and the contents of the message without any alteration upon the data means just ...

Click here to read more arrow

Attack Tree Model Analysis of Security Breaches

23 Mar 2015 11 Dec 2017

7 (2,705 )

THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting ...

Click here to read more arrow

Software to Manage the Olympic Games

23 Mar 2015 11 Dec 2017

2 (663 )

The Olympic and Paralympic Games are the world's largest peace-time event. The modern Olympic Games were first held in Greece in 1896 and since 1960, the Paralympic Games have provided athletes with disabilities with the opportunity to compete at the highest level. All athletes are encouraged to live by a set of shared principles -the Olympic and Paralympic Values of friendship, equality, respect, courage, determination, excellence and ...

Click here to read more arrow

Strategies for Literature Review Searches

23 Mar 2015 11 Dec 2017

3 (1,166 )

Detail an appropriate search strategy using relevant databases to identify an article on evidenced based practice in the healthcare setting Literature search has been a vital aspect of students' academic life, especially with the advance of technology. Burns and Grove (2005) define literature searching as an organised search system which identifies information relevant to the topic of interest. Moreover, searching has an essential role in supporting clinicians ...

Click here to read more arrow

Cryptography and Steganography For Secure Communication

23 Mar 2015 11 Dec 2017

12 (4,657 )

Combination of Cryptography and Steganography for secure communication is a tool that combines both Cryptography methods and Steganography techniques for secure communication. The application is a cross-platform tool that can be effectively hide a message inside a digital video file. In the field of data communication, security has the top priority. Cryptography is one of the technique for secure plain text messages. Cryptography makes the necessary elements ...

Click here to read more arrow

The Trojan Horse Virus: An Overview

08 Dec 2017

3 (1,085 )

Another type of malware that is not technically a virus because there is usually no auto-replication is a Trojan horse program, which seems to be something useful, as a free utility, but actually contains some kind of malware. The unhappy about a Trojan program that is running the software users willingly and still do not know what is causing problems on their systems. Rootkits are a form ...

Click here to read more arrow

Implementing an Electronic Health Record System

05 Jul 2017 27 Sep 2017

8 (2,928 )

Implementing Electronic Health Record System Based on HL7 RIM -Reusing the RIM Model Archetypes Nancy Mittal Abstract: It is difficult to exchange healthcare information between different HealthCare Systems. Health Level Seven is a universal standard to facilitate the communication between different HealthCare Systems. Electronic Health Record System is a software platform that store patient health data which maintained by hospital and medical practice. Health Level 7 ...

Click here to read more arrow

Importance of Discrete Mathematics in Computer Science

03 Oct 2016 27 Sep 2017

8 (2,806 )

Computer science is the study of problems, problem solving and the solutions that come out of the problem solving process, B. Miller and D. Ranum (2013). A computer scientist goal is to develop an algorithm, a step by step list of instructions in solving a problem. Algorithms are finite processes that if followed will solve the problem Discrete mathematics is concerned with structures which take on ...

Click here to read more arrow

The Benefits of Java

03 Oct 2016 27 Sep 2017

5 (1,609 )

JAVA INCLUDES A LIBRARY OF CLASSES AND INTERFACES: The Java platform includes an extensive class library so that programmers can use already existing classes, as it is, create subclasses to modify existing classes, or implement interfaces to augment the capabilities of classes. Both classes and interfaces contain data members (fields) and functions (methods), but there are major differences. In a class, fields may be either variable ...

Click here to read more arrow

Technological Considerations in Interface Design

03 Oct 2016 27 Sep 2017

9 (3,544 )

Technological Considerations in Interface Design Physical characteristics of the device and device internal software affects the screen interface design. Graphics compatibility for Screen design must be ensured with the following system components: System power. Screen size. Screen resolution. Display colors. Other display features. Development and implementation tools being used. System platform being used. Platform style guide being used. Information Retrieval (IR): it concerns with ...

Click here to read more arrow

System Development Lifecycle

03 Oct 2016 27 Sep 2017

7 (2,753 )

1.1. Introduction According to Allerano and Taverz (2012), the system development lifecycle has dominated the information technology (IT) arena for numerous decades and remains one of the most commonly used methods in software development and acquisition. It is observed that, though the system development lifecycle has evolved over the years and has gone through a multitude of paradigm shifts with respect to building of software, at ...

Click here to read more arrow

Support Vector Machine Based Model

03 Oct 2016 27 Sep 2017

8 (2,987 )

Support Vector Machine based model for Host Overload Detection in Clouds Abstract. Recently increased demand in computational power resulted in establishing large-scale data centers. The developments in virtualization tech-nology have resulted in increased resources utilization across data centers, but energy efficient resource utilization becomes a challenge. It has been predicted that by 2015 data center facilities costs would contribute about 75%, whereas IT would contribute the ...

Click here to read more arrow

Real Time Video Processing and Object Detection on Android

03 Oct 2016 27 Sep 2017

12 (4,428 )

Real Time Video Processing and Object Detection on Android Smartphone Abstract – As Smartphone is getting more potent, can do more superior stuffs that previous required a computer. For employing the high processing power of Smartphone is mobile computer vision, the ability for a device to capture; process; analyze; understanding of images. For mobile computer vision, Smartphone must be faster and real time. In this study ...

Click here to read more arrow

Performance Evaluation and Enhancement of Mobile Node: MIH

03 Oct 2016 27 Sep 2017

5 (1,677 )

PERFORMANCE EVALUATION AND ENHANCEMENT OF MOBILE NODE USING MIH CHAPTER 4 NETWORK SIMULATOR 4.1 Introduction NS2 is associate open-source simulation tool that runs on Linux, it's a discreet event machine targeted at networking analysis and provides substantial support for simulation of routing, multicast protocols and informatics protocols, like UDP, TCP, RTP and SRM over wired and wireless (local and satellite) networks. Its several blessings that build ...

Click here to read more arrow

Analysis of Types of Operating Systems

03 Oct 2016 27 Sep 2017

8 (2,991 )

Task 1 1.0 Introduction An Operating System (OS) is software that manages computer hardware and software resources, and to provide public services for computer programs. The operating system is an important part of the system software in a computer system. Although it is possible to directly interface software applications and hardware, the vast majority of applications in an operating system, which allows them to take advantage ...

Click here to read more arrow

Low-Power Folded Tree Architecture for DSP Applications

03 Oct 2016 27 Sep 2017

6 (2,392 )

Low-Power Folded Tree Architecture for DSP applications Abstract— Wireless communication exhibits the highest energy consumption in wireless sensor network (WSN) nodes. Due to their limited energy supply from batteries, the low power design have become inevitable part of today’s wireless devices. Power has become a burning issue in VLSI design. In modern integrated circuits, the power consumed by clocking gradually takes a dominant part. Reducing the ...

Click here to read more arrow

Literature Review on Online Gaming

03 Oct 2016 27 Sep 2017

8 (2,947 )

The purpose of this study is to map out and see the relationship between MMORPG game player personalities and style based on player type theory and game players’ thinking preferences in order to increase sales, opportunity to improve in game development and apply thinking preference to offer personalize in-game product or promotion by using framework of Player type theory and Whole brain thinking preference model relationship. ...

Click here to read more arrow

Development of Computer Technology

03 Oct 2016 27 Sep 2017

7 (2,661 )

Nowadays we can hardly see people live without either a desktop computer, a laptop or even a tablet. As we are moving towards a technology free-world era, our lives are literally revolve around technology and technical devices. Technology advancement has no doubt successfully ease people’s life. They have made things function in a more simpler and systematic ways. Imagine an accountant who has pile and pile ...

Click here to read more arrow

Characteristics of Real Time System

03 Oct 2016 27 Sep 2017

7 (2,699 )

ABSTRACT Scheduling refers to the set of policies and mechanism to control the order of work to be performed by a computer system. process scheduling in real time system has almost used many more algorithms like FIFO, Round ROBIN ,Uniprocessor Multiprocessor etc. The choices for these algorithms are simplicity and speed in the operating system but the cost to the system in the form of ...

Click here to read more arrow

Are People Becoming Too Reliant on Technology?

03 Oct 2016 27 Sep 2017

4 (1,316 )

Smart phones, Facebook, Netflix, YouTube…. The world is living in an era of constant dynamic technological revolutions. Information Technology has become inextricable from everyday life. Information technology refers to combination of computing technology, such as networking, hardware, software, the Internet, and the people that work with these technologies. The main aim of T is to facilitate the life of each and every one, as Steve Ballmer ...

Click here to read more arrow

Development of E-Recruitment Software

03 Oct 2016 27 Sep 2017

9 (3,281 )

3.7 Advantages & Disadvantages of E-Recruitment There are many benefits both to the employers and the job seekers but the not also free from a few shortcomings. Some of the advantages and the disadvantages of e –Recruitment are as follows: Advantages of E-Recruitment (For the Proposed System) are: Lower costs to the organization. Also, posting jobs online is cheaper than advertising in the newspapers. No ...

Click here to read more arrow

3 Dimensional Modelling in Architectural Design

20 Sep 2017

4 (1,501 )

Computer software technology is an important part of computer technology, because computer is made up of computer software, computer software technology is one of the most concerned area in the computer technology, human today manipulated by the fast development of computer technology. Today's software development tends to be more professional and directionality, as a student whom is studying design, we are often in pursuit of better ...

Click here to read more arrow

Creating an IT Infrastructure Asset List

11 Aug 2017 29 Aug 2017

6 (2,029 )

Abstract This document was created following Lab #1 titled Creating an IT Infrastructure Asses List and Identifying Where Privacy Data Resides in the laboratory manual that accompanies Legal Issues in Information Security. The lab focuses on creating an IT assets/inventory checklist organized within the seven domains of IT infrastructure. Identifying assets and applying classifications to each asset and explaining how data classification standard is linked ...

Click here to read more arrow

Authenticated Color Extended Visual Cryptography

11 Aug 2017 29 Aug 2017

15 (5,761 )

Authenticated Color Extended Visual Cryptography with Perfect Reconstruction R. Sathishkumar, Gnanou Florence Sudha Abstract - Visual Cryptography Scheme (VCS) is an image safeguarding scheme which encrypts the secret text based image into multiple binary images called shares, which are then transmitted to participants. These shares are then stacked over by the participants to decrypt the secret image, however with reduced quality. In Extended ...

Click here to read more arrow

Development of Cryptography Studies

11 Aug 2017 29 Aug 2017

12 (4,488 )

0.1 Abstract This report is an overview of some structures that have heavily influence the course and study of Cryptography the last decades. Initially, we will analyse the structure of some important ciphers such as DES, 3DES and AES by underlying some dark and complicated points and emphasizing the critical functions called S-boxes. We will then expand of some basic attributes of these block ciphers, for ...

Click here to read more arrow

Networked Game Issues

11 Aug 2017 29 Aug 2017

7 (2,797 )

Network Issues and how they affect gameplay and interactivity A network is when two or more computers have a digital connection between them, particular in networked multiplayer games the players are physically separated from each other. Networks allow user's clients to communicate by sending bits of data through the internet of the form of packets, these will then build on top of the internet protocol, ...

Click here to read more arrow

Understanding Mobile Technology Development

11 Aug 2017 29 Aug 2017

3 (901 )

The world becomes increasingly interconnected technologically. The use of mobile data has grown surprisingly with the rising use of the smart phones. Therefore, mobile app plays an important role for the today's business. There are three different approaches for developing mobile apps: Native Apps: The Android and iOS are the two widely used app platforms. The Native apps are developed for a specific platform.  So ...

Click here to read more arrow

Experiment for Plant Recognition

11 Aug 2017 29 Aug 2017

21 (8,071 )

Abstract In classical sparse representation based classification (SRC) and weighted SRC (WSRC) algorithms, the test samples are sparely represented by all training samples. They emphasize the sparsity of the coding coefficients but without considering the local structure of the input data. Although the more training samples, the better the sparse representation, it is time consuming to find a global sparse representation for the test sample ...

Click here to read more arrow

Risk Assessment of Sangrafix Video Design Company

11 Aug 2017 29 Aug 2017

8 (3,118 )

Introduction SanGrafix is a technologically oriented company that uses cutting edge technologies in designing of mobile and PC platform games with market orientation. Due to the demanding nature of the gaming industry, the company has decided to perform a risk assessment to ensure they consistently continue to meet the customer demands without interruptions in service delivery. Securing of their network assets is aimed at ensuring ...

Click here to read more arrow

Applications of Computer Technology

11 Aug 2017 29 Aug 2017

3 (1,169 )

Provide an overview of how computer technology is used in a variety of situations every day We are at the stage now in life, that some of us can not survive without technology in every day life. Even for the stay at home mum, texting other parents about car pooling, we all have our washing machines, ovens, etc. Our mobile phones, which can be use ...

Click here to read more arrow

Concepts and Features of Game Engines

11 Aug 2017 29 Aug 2017

19 (7,417 )

Introduction This report will cover almost everything consumers and entry level developers may need to know or be interested to know about game engines, how they work and what they're used for. This report will cover topics such as the history of game engines, different forms of engines (across multiple platforms), how game engines can be used by the community to create interesting things such ...

Click here to read more arrow

Methods of Analyzing Data in Data Warehouse

11 Aug 2017 29 Aug 2017

5 (1,620 )

Data Mining methods for Customer Relationaship Management Abstract-Data warehousing and data mining, applied to Customer Relationship Management (CRM), are a relatively fresh sector for organizations considering their immense advantage. Through data mining, organizations can identify key customers, predict future behaviors and take proactive and knowledge driven decisions. In this article, we discuss few data mining techniques for various CRM activities. Keywords- Customer ...

Click here to read more arrow

Comparing and Contrast Jean Bartik and Margaret Hamilton

11 Aug 2017 29 Aug 2017

3 (1,178 )

Software engineering; hearing this term brings to mind words corresponding to innovating, analyzing complex problems, designing software, and maintenance of programs. People picture a  stubborn nerd who only knows how to communicate with computers. It is a common misconception that in the field of technology, males are dominating all the positions that are available. Despite all that, Jean Bartik, a pioneer software engineer of ENIAC, ...

Click here to read more arrow

Replica Node Detection using Enhanced Single Hop Detection

11 Aug 2017 29 Aug 2017

12 (4,631 )

REPLICA NODE DETECTION USING ENHANCED SINGLE HOP DETECTION WITH CLONAL SELECTION ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS 1. INTRODUCTION Sensor systems are being theme of enthusiasm among the scholarly community and industry because of those broad variety relevance in different system situations. WSNs comprise of an expansive number of little sensors, generally sent thickly in the objective territory to gather important information ...

Click here to read more arrow

Perceived User Experience of Interactive Animated Transition

11 Aug 2017 29 Aug 2017

5 (1,741 )

Perceived User Experience of Interactive Animated Transitions in Mobile User Interfaces and Visualisation Animated transitions hold an important part of graphical user interface design practice. They can help to guide users' attention and highlight changes in the interface. Also Information visualisation research has concentrated thus far on desktop PCs and larger displays while interfaces for more compact mobile device have been neglected. The aim ...

Click here to read more arrow

Programming Languages for Data Analysis

11 Aug 2017 29 Aug 2017

5 (1,808 )

R and Python for Data Analysis Abstract This paper discusses the comparison between the popular programming languages for Data analysis. Although there are plenty of choices in programming languages for Data science like Java, R Language, Python etc. With a whole lot of research carried out to know the strengths of these languages, we are going to discuss any two of these. Data ...

Click here to read more arrow

Data Vault in Data Warehouse: Advantages and Disadvantages

11 Aug 2017 29 Aug 2017

5 (1,723 )

Applications, Implementation, Merits and Limitations of Data vault in Data warehouse Abstract- Business companies face many challenges in exploiting and analyzing data held in diverse sources. Data vault is the latest data warehouse methodology which caters the business needs of flexibility, scalability, agility and large volume of data storage which the prior existing models fail to bestow. Brief data vault architecture, applications of ...

Click here to read more arrow

The User Experience in Mobile Computing

11 Aug 2017 29 Aug 2017

3 (822 )

ABSTRACT Mobile phones have become a necessity for almost every person throughout the world. Cell phones have become almost a status symbol in addition to the convenience and security that comes from owning them. In this article, We would like to discuss the importance of the user experience and the user interface in Mobiles/Soft Wearables. 1INTRODUCTION In this paper, We would discuss the user experience/ ...

Click here to read more arrow

Increasing Visual Comfort with Blue Light in Video

11 Aug 2017 29 Aug 2017

10 (3,646 )

Adjusting the blue light of the video to increase the visual comfort belong to the changed of light environment Abstract: This paper is an approached method adjusting the blue light of the video to reduce the eye strainwhen people watching video on digital devices such as computer display, smartphone screen or tablet in different luminance of the environment's light. The method is using the ...

Click here to read more arrow

Implementing a Client-to-client Communication System

11 Aug 2017 29 Aug 2017

4 (1,383 )

Abstract Due to people, behaviour over the social networking and peer-peer needs for the online chatting and sharing the information, file etc..., Chat Applications had acquired great importance and there is abundant increase in the development of these applications. Therefore, in this Conference Chat Application Project we are going to develop a chat application to implement client-to-client communication using client server architecture for the group ...

Click here to read more arrow

Data Mining Analysis in Health Department

11 Aug 2017 29 Aug 2017

5 (1,950 )

Data mining has been used intensively and appreciably in lots of fields of life. Likewise in healthcare, data mining is becoming more and more popular each day. Its extensive applications can greatly advantage all events worried inside the healthcare industry. As an instance, data mining in healthcare enterprise benefits each insurer and insured. It assist insurers to hit upon fraud and abuse, healthcare agencies make ...

Click here to read more arrow

Body Sensor Network: A Modern Survey & Performance Study

11 Aug 2017 29 Aug 2017

10 (3,867 )

ABSTRACT As because of modern emerging technologies, low power integrated circuits and wireless communication has enabled a new generation of sensors network. The incorporation of these sensors networks in Health care is very popular and plays a vital role in breath breaking situations. The deployment of monitoring hardware incorporated with various wireless standards plays a key role in regard to interoperability, invasion privacy, sensors validation ...

Click here to read more arrow

Regression Test Case Optimization (RTCO) Techniques Analysis

11 Aug 2017 29 Aug 2017

9 (3,337 )

Abstract: This research paper reviews different metaheuristic techniques used in Regression Test Case Optimization (RTCO) by various researchers. The research also emphases on the most used objective function for analyzing the efficiency and effectiveness of the technique used. This research has used a theoretical approach to examine different metaheuristic techniques used in RTCO. The Genetic algorithm is the chief technique used in the dominion of ...

Click here to read more arrow

Impact of Computer Technology

14 Aug 2017 29 Aug 2017

3 (1,175 )

Computer Technology I am using and how I'm using it? Computer technology starts from the time you wake in the morning, your alarm on your phone to the cup of coffee brewing. Computer technology has come a long way from when I was a child. Lots of us now have house alarms, electric toothbrushes, plasma televisions, Xboxes', I pad, tablets, laptops all these to interact ...

Click here to read more arrow

Web Application Design for School Organisation Optimization

16 Aug 2017 29 Aug 2017

17 (6,730 )

Application and Knowledge Design At first, the ontology will be planned in accordance with the methodology of ontology building. Description of the Ontology The ontology domain is based upon the running of a school. The goal of the research is to provide users of the applications with the prospects to get information regarding the requirement that is required in the running of a ...

Click here to read more arrow
ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now