Matalan Architecture and Infrastructural Investigation

16 Aug 2017 29 Aug 2017

7 (2,637 )

  Introduction to my Organisation BLAG I chose Matalan as my organisation to undertake my report on as it was the most convenient option since I work there part time and have worked with a lot of the systems they use currently. Matalan is a well-established fashion retailer based in knowsley and has over 200 stores across the U.K (Advameg, 2017). I ...

Click here to read more arrow

Security Threats In Cloud Computing

16 Aug 2017 29 Aug 2017

4 (1,298 )

What is cloud computing? To explain "Cloud computing" in simple words, let's just say it is "Internet computing", if we observe closely the internet is basically the collection of cloud; thus, the "cloud computing" word can be elaborated as using the internet, to its full potential, to provide organization and people, technology enabled oriented services. Cloud computing let consumers access, by the help of ...

Click here to read more arrow

Digital Forensic Methodology and Strategy

16 Aug 2017 29 Aug 2017

4 (1,479 )

Introduction Digital forensic can be described as the cyber security mostly used to secure to identify, preserve, analyze and present digital data evidence in the manner it will be legally accepted  in any legal process. Digital forensic is mostly applied in recovering that involves investigation of materials on a digital media platform and network. (Britz, 2013 ) This forensic uses the method of scientific research   ...

Click here to read more arrow

Glaucoma Image Processing Technique

16 Aug 2017 29 Aug 2017

9 (3,409 )

Team 19 Members 40102434 - Andrew Collins 40134357 - Connor Cox 40056301 - William Craig 40133157 - Aaron Devine We have been tasked to develop a system that through image processing techniques would be able to detect glaucoma. This required us to enhance our knowledge in how to apply pre-processing, segmentation, feature extraction and post-processing on a set of given images to be ...

Click here to read more arrow

Cloud Computing in Educational Institutions

16 Aug 2017 29 Aug 2017

4 (1,521 )

Education plays a crucial position in preserving the financial growth of a country. Now a days the lecture room coaching is changing and college students are turning into extra technology oriented and therefore in his changing surroundings, it's critical that we assume approximately the modern technology to include in the teaching and getting to know manner. One of the brand new technology prevailing now days ...

Click here to read more arrow

Creation of an Online Prescence

11 Aug 2017 29 Aug 2017

5 (1,607 )

Scenario Assignment No 1 of 1- Sit 1 As an IT administrator for ACS (Awesome Clothing Store), you are responsible for the company's infrastructure including its online presence. The company has commissioned a new website in order to improve their revenue and reach a higher segment of customers. The developers have delivered the code and database for the website and you are now responsible for ...

Click here to read more arrow

Concepts of Information Security: Politics and Technology

11 Aug 2017 29 Aug 2017

7 (2,653 )

The "nothing to hide" argument has become a very important debate recently. Now, nearly everything we do leaves an electronic trace which along with data mining, can be used to see what we are doing, and even predict our behaviour. With the recently passed Investigatory Powers Act 2016 in the UK (HM Government, 2016), 48 different agencies will have access to communication data, bulk personal ...

Click here to read more arrow

Business Continuity Policy Statement

11 Aug 2017 29 Aug 2017

6 (2,065 )

Purpose The main purpose of the business continuity policy is to prepare SanGrafix for any kind of threat. Business continuity policy is just another term for backup. Running a company without backup is not a smart move in business industry. Our business continuity plan should contain a comprehensive roadmap to restore any information during any disaster. Copies of the plan should be sent out to ...

Click here to read more arrow

Detection and Mitigation of DDOS Attack

11 Aug 2017 29 Aug 2017

9 (3,567 )

A Survey on Detection and Mitigation of Distributed Denial of Service attack in Named Data Networking Sandesh Rai1*, Dr. Kalpana Sharma 2, and Dependra Dhakal 3 1Sikkim Manipal Institute of Technology, Student, Computer Science & Engineering, Rangpo, Sikkim. 2Sikkim Manipal Institute of Technology, Head of Department, Professor, Computer Science & Engineering, Rangpo, Sikkim 3Sikkim Manipal Institute of Technology, Assistant Professor, Computer Science & Engineering, Rangpo ,Sikkim ...

Click here to read more arrow

Multitouch Gesture Generation and Recognition Techniques

07 Aug 2017 18 Aug 2017

11 (4,345 )

Abstract: -A huge number of users are using smart phones to communicate with each other. A smart phone user is exposed to various threats when they use their phone for communication. These threats can disorganization the operation of the smart phone, and transmit or modify user data rather than original [1]. So applications must guarantee privacy and integrity of the information. Single touch mobile security ...

Click here to read more arrow

Canada and China: Cybercrime and Cryptocurrency

07 Aug 2017 18 Aug 2017

6 (2,016 )

Bitcoin, Cyber-crime, Cryptocurrency, Canada, China. Cyber-crime is a byproduct of the information age and is growing very fast worldwide (FBI, 2017). As technology has advanced so have the criminal's methods to exploit the internet. Cyber-crime can be described as the use of a computer, a network or other electronic device to facilitate a crime, Interpol makes a distinction between two types of cyber-crime (INTERPOL, 2017): ...

Click here to read more arrow

Multi-keyword Ranked Search Over Encrypted Cloud Data

07 Aug 2017 18 Aug 2017

4 (1,549 )

Now a days cloud computing has become more popular, so more information possessors are actuated to their information to cloud servers for great convenience and less monetary value in data management. However, sensible information should be encrypted before outsourcing for public. In this paper the problem of a secure multi-keyword search on cloud is solved by using encryption of data before ...

Click here to read more arrow

ODS & TS Forecast

07 Aug 2017 18 Aug 2017

10 (3,632 )

Abstract: Cloud computing share resources and then provide services to end users over host based demand services. Scheduling tasks based on different job allocation with different services is the complex representation in distributed cloud service environment. By satisfying client's requirements in distributing services to different assessment with different attributes. Traditionally propose Grouped Tasks Scheduling (GTS) to schedule distributed tasks based on different type of categories in ...

Click here to read more arrow

Evolution of Computer Technology in Last 25 Years

07 Aug 2017 18 Aug 2017

3 (1,123 )

The advancement of the computing technology could commonly identify in 6 generations. The physical size of the computers significantly decreased from the first generation vacuum tube computers to third generation computers based on the integrated chip technology. Fourth and fifth generation computer technology increased computer chip's efficiency by developing the very large scale integration (VLSI) and ultra large scale integration (ULSI) technology. (Halya, 1999) During ...

Click here to read more arrow

Computer Break-In Ethics Essay

07 Aug 2017 18 Aug 2017

3 (831 )

What do I define as Ethical? To me, ethical is equivalent to morally right. It can be thought of as the expression done when you consider the feelings of those who are or will be directly affected by your actions. Therefore, ethical behavior is to act in a way that is loving and respectful of the potentially affected person. Spafford uses a "deontological assessment" as ...

Click here to read more arrow

Business Plan for Educational Website

07 Aug 2017 18 Aug 2017

4 (1,596 )

1.0 Executive Summary Stay Clean, is a site that is based on Environmental Management Practices Education. It is owned and operated by me, Morrison Edwards. I am determined to ensuring that people live in an environment free of contaminations and appealing to live in. I am thus taking the initiative to educate people on how we can make our environment friendlier for habitation. The people ...

Click here to read more arrow

Cyber Attacks in Indonesia: Types, Targets, and Preventions

07 Aug 2017 18 Aug 2017

3 (817 )

According to Indonesia Security Incident Response Team on Internet and Infrastructure/Coordination Center (Id-SIRTII/CC), there are about 89 million attacks that occurred during the first half of 2014 with the domination by malware attacks as much as 46.3 million attacks.[1] The same research found 6,000 successfully irritated hacker website incidents and found almost 16,000 security holes on the websites in Indonesia. Indonesian Ministry of Defense released ...

Click here to read more arrow

Quality & Performance of Streaming Video(s) over Networks

07 Aug 2017 18 Aug 2017

10 (3,726 )

 ABSTRACT Video-based sharing services have gained a rapid fluctuation in user's over recent years with the help of the ever-growing internet availability, reaching even the most rural of areas, gaining an increasing share in the multimedia market. Online streaming videos should fulfil strict quality of service constraints. Internet streaming relies upon packet transmission; there are varying influences such as delays, packet loss, transmission ...

Click here to read more arrow

Intrusion Detection System Case Study

07 Aug 2017 18 Aug 2017

4 (1,556 )

Abstract Intrusion Detection system (IDS) has become powerful to provide security against the attack. It will help us to identify the deterring and deflecting malicious attacks over the network [1]. To remove all these problem regarding to security has been removed by this paper. In this paper we will go through the theoretical basis for intrusion detection. A distributed intrusion detection system based on agents ...

Click here to read more arrow

Trusted Platform Module (TPM)

07 Aug 2017 18 Aug 2017

14 (5,215 )

Trusted Platform Module (TPM) is a term used to define a chip or microcontroller. This chip or microcontroller can be placed into a motherboard configuration such as devices like mobile devices, or a personal computer (PCs). The requirements and application was presented and established by the Trusted Computing Group (TCG), to deliver a solution where a reliable and genuine relationship exists amongst hardware and software ...

Click here to read more arrow

Genetic Algorithm (GA) as Optimization Technique

07 Aug 2017 18 Aug 2017

3 (862 )

Preference learning (or preference elicitation) is a critical problem in many scientific fields, such as decision theory [1,2], economics [3,4], logistic [ref] and database [5]. When modeling user preference, researchers often model the preferences as a solution to an optimization problem which maximizes some utility function. In reality, however, we are not a-priori given a utility but have only access to a finite historical user ...

Click here to read more arrow

Reverse Engineering (Sequence Diagrams)

07 Aug 2017 18 Aug 2017

3 (1,100 )

Abstract- For better understanding of the software system the extraction of high level models with the help of reverse engineering of behavioral model is preferred. Reverse engineering of sequence diagrams depends on instrumentation and analysis of the source code that considers structure of control flow. In the absence of source code this approach is senseless. In the proposed paper, the approach is to analyze the execution ...

Click here to read more arrow

Eye Tracking in Usability Evaluation

07 Aug 2017 18 Aug 2017

10 (3,680 )

 In this literature review I have talked about experiments conducted on usability of various interfaces and designs using eye-tracking. The authors of the papers focus on various types of eye movements for usability evaluations like saccades, pupil dilation, fixation, scanpaths etc. Based on these measurements the try to infer the point/area of interest of the users, point on entry, the cognitive load etc. about the user. ...

Click here to read more arrow

A Survey "Fatigue Monitoring System"

07 Aug 2017 18 Aug 2017

6 (2,230 )

    Abstract: This is a fatigue detection system implemented in smartphone. This system will detect the drowsiness of the driver while he is driving. And if the reverie is detected by the system then it will generate an alert. In this the parameters are blinking of eyes, mouth yawning and head shaking. Head shaking is the new parameter which is used in this system. ...

Click here to read more arrow

Credit Card Fraud Detection through Data Mining

07 Aug 2017 18 Aug 2017

5 (1,735 )

  Abstract- With the increasing fraudsters day to day, the fallacious transaction is rapidly growing thus making the frauds in this scenario a matter of high importance. Huge database patterns are identified by various data mining models assisting to strengthen and detect the credit card fraud. This research primarily focusses on "Credit Card Fraud Detection" analyzing two different methods used to detect fraudulent systems and ...

Click here to read more arrow

Alan Turing's Life, Contributions, and Legacy

07 Aug 2017 18 Aug 2017

5 (1,629 )

Our daily lives are filled with technology. We wake up on time thanks to the alarms we set on our phone. We can find the fastest route available to get to where we need to go using the GPS. We can work anywhere and whenever we want, using our portable laptops. Sometimes we don't know how to spell a word, or know the answer to ...

Click here to read more arrow

Network Management Justification for Handmade Furniture Ltd

07 Aug 2017 18 Aug 2017

8 (2,802 )

  Based on the initial inspections carried out recently, Handmade Furniture Ltd has experienced difficulties managing the IT infrastructure as well as providing IT support for staff. The existing network management and support services are carried out in an uncontrolled procedures which have resulted in number of data losses and possible hacking attempts. This can lead to future compromises such as financial losses, disruption of ...

Click here to read more arrow

Analysis of Mobile Enterprise Model Frame (S&B Model)

07 Aug 2017 18 Aug 2017

10 (3,609 )

The first objective of this paper discusses the writers understanding of Scornavacca and Barnes (2008) mobile enterprise model frame (S&B Model) and an illustration of its current usage and future implementation in the field of existing Patient management system. The second objective is to discuss the existing implementation of mobile usage in Learning of Life University (LLU) with respect mobile enterprise model of S&B Model ...

Click here to read more arrow

Social and Legal Issues associated with Multimedia Industry

07 Aug 2017 18 Aug 2017

9 (3,305 )

Section A - Identify and discuss legal and social issues of the multimedia industry "Multimedia" the name itself indicates it's a combination of multiple media content, all the digital devices, electronic machines utilized this generation and future generations mainly aims to focus on delivering high quality multimedia content in their desired product. As the Quality of the products or service is good, such organizations have ...

Click here to read more arrow

Comparison on Computation Cost of the Cloud

07 Aug 2017 18 Aug 2017

4 (1,461 )

In this chapter, we list the comparison on computation cost of the cloud for file upload between … and our scheme. Computational Cost Data access issues in the field of the cloud computing provide a good measurement-based performance as mentioned along this research, and hence, the security features can be improved using the new proposed model as well as a suitable computational cost. However, the ...

Click here to read more arrow

Mosquito Species Detection using Smart Phone

07 Aug 2017 18 Aug 2017

16 (6,265 )

Abstract-According to WHO(World Health Organization) re-ports, among all disease transmitting insects mosquito is the most hazardous insect. In 2015 alone, 214 million cases of malaria were registered worldwide. Zika virus is another deadly disease transmitted from mosquitoes. According to CDC report, in 2016 62,500 suspected case of Zika were reported to the Puerto Rico Department of Health (PRDH) out of which 29,345 cases were found ...

Click here to read more arrow

Analysis of Web Service Efficiency

07 Aug 2017 18 Aug 2017

13 (4,983 )

Abstract Web service standards used nowadays are Extensible Markup Language based and the important technology in communication between heterogeneous applications are over Internet. Thereby selecting an efficient web services among numerous options satisfying client requirements has become a challenging and time consuming road block. The path for the optimal execution of all the user request is done using the Hidden Markov Model (HMM). The ...

Click here to read more arrow

Conventionally Broadcast Encryption (BE) Schemes

07 Aug 2017 18 Aug 2017

16 (6,353 )

ABSTRACT Conventionally broadcast encryption (BE) schemes enable a sender to securely broadcast to any subset of members, however it requires a trusted party to circulate decryption keys. Group key agreement protocols authorize a group of members to negotiate a common encryption passkey through spread out networks so that only the batch members can decode the ciphertextsviz encrypted under the shared encryption key, but a sender ...

Click here to read more arrow

Big Data in Cloud Computing Issues

07 Aug 2017 18 Aug 2017

6 (2,032 )

  Abstract- The term big data or enormous information emerged under the touchy increment of worldwide information as an innovation that can store and handle enormous and fluctuated volumes of information, giving both endeavors and science with profound bits of knowledge over its customers/tests. Cloud computing gives a solid, blame tolerant, accessible and versatile condition to harbor Big data distributed management systems. Inside this paper, ...

Click here to read more arrow

Radio Frequency Identification (RFID) System

07 Aug 2017 18 Aug 2017

6 (2,216 )

Literature review 2.1 RFID The Radio Frequency Identification (RFID) system is a technology for automated identification. Exploration of RFID technology dates back to 1948 when Harry Stockman published his research titled "Communication by means of the reflected power". Unfortunately technologies such as integrated circuits, transistors and microprocessors were not yet available and RFID had to wait another 20 years for its first commercial application (Landt 2005). Between 1970 and ...

Click here to read more arrow

Recovery of Digital Evidence

07 Aug 2017 18 Aug 2017

6 (2,288 )

Introduction The University suspects that a case of wrongdoing has been undertaken by a member of staff within Edge Hill University and the computer forensic team, of which you are part of, has been asked to investigate.  You and your team have been asked to launch an investigation into alleged misuse of the University's IT system. The office used a member of staff has been ...

Click here to read more arrow

SanGrafix Video Game Company Business Process

01 Aug 2017 18 Aug 2017

5 (1,927 )

The BMI was part of analyzing and selecting vital areas of SanGrafix Video Game Company. It was prepared on March 22, 2017. Regardless of how well the company plans for downtime errors, there is a chance that this will happen and the main point of consideration is how fast the company is able to recover from such errors. Purpose The purpose of this ...

Click here to read more arrow

TTS Systems for Android

01 Aug 2017 18 Aug 2017

11 (4,294 )

 ABSTRACT There are different kinds of TTS (Text to Speech) systems are already available for Personal computers and web applications. In the Platform of Smart Phone, few of TTS systems are available for Bangla Language. Nowadays android is a popular platform considering Smartphone. There are few Bangla TTS Systems are Available with different kind of Mechanisms and techniques, various kind of tools were used. Here ...

Click here to read more arrow

OPM System Potential Threats and Vulnerabilities

01 Aug 2017 18 Aug 2017

5 (1,653 )

Risk Assessment Report Purpose The purpose of conducting this risk assessment was to identify potential threats and vulnerabilities related to OPM System. The risk assessment will be used to identify possible risk mitigation plans related to Agency. The network was identified to have a potential high-risk during security assessment. Therefore, risk assessment is needed to be conducted to measure the impact of any breach ...

Click here to read more arrow

Impact of Internet Usage on the Academic Performance

01 Aug 2017 18 Aug 2017

9 (3,209 )

INTRODUCTION Problem Statement: The impact of internet usage on the academic performance of adolescent students at St. Stephens College . Statement of Problem: The study investigates how students of St Stephens College are affected by the use of the internet. St. Stephens College, located in Princes Town, Trinidad is known as one of the highest ranked academic institutions in the country. The school comprises of ...

Click here to read more arrow

P300-based Brain-Computer Interface Performance Enhancement

01 Aug 2017 18 Aug 2017

18 (7,191 )

Enhancing Performance and Bitrates in a P300-based Brain-Computer Interface for Disabled Subjects by Phase-to-Amplitude Cross-Frequency Coupling Stavros I.Dimitriadis1,2*, Avraam D. Marimpis3 1Institute of Psychological Medicine and Clinical Neurosciences, Cardiff University School of Medicine, Cardiff, UK 2Cardiff University Brain Research Imaging Center, School of Psychology, Cardiff University, Cardiff, UK 3Brain Innovation B.V., Netherlands Abstract A brain-computer interface (BCI) is a communication system that transforms brain-activity into ...

Click here to read more arrow

Customer Oriented E-Commerce Website

01 Aug 2017 18 Aug 2017

5 (1,796 )

Task 1: As a IT Project Manager along with Marketing officer you should visit a company "XYZ" to propose them to divert all the activities into IT based. Your proposal report should be SMART and must be follow the following criteria: * It should identify the project scope, functionality and consumption resources. * Your proposal should clearly mention the project objective, goal, outcome and time ...

Click here to read more arrow

Data Application Development Earthquake and Breast Cancer

26 Jul 2017 18 Aug 2017

8 (2,819 )

Data Application Development for Earthquake and Breast Cancer Datasets Abstract-This report is a general study of two datasets, the first contains data from the earthquake occurred in the region of Marche, Italy in the year 2016 and the second dataset is mammography data, with mean values of measurements and structures of tumors found in patients, for both studies different techniques related to data science were ...

Click here to read more arrow

Image Deblurring with Sparse Representation

26 Jul 2017 18 Aug 2017

8 (2,912 )

AN APPROACH FOR IMAGE DEBLURRING: BASED ON SPARSE REPRESENTATION AND REGULARIZED FILTER Abstract-Deblurring of the image is most the fundamental problem in image restoration. The existing methods utilize prior statistics learned from a set of additional images for deblurring. To overcome this issue, an approach for deblurring of an image based on the sparse representation and regularized filter has been proposed. The input image is ...

Click here to read more arrow

Creating an Information Security Policy

26 Jul 2017 18 Aug 2017

7 (2,568 )

Being relegated as the Chief Security Officer for the University is a requesting position and I mean to speak to the University in an expert matter. My first task is setting up and keeping up a venture wide data security program to guarantee that all data and information resources are not traded off. I will examine my arrangement to execute these obligations long with this ...

Click here to read more arrow

ISO 27001 Standard Summary

26 Jul 2017 18 Aug 2017

4 (1,328 )

A blueprint of ISO 27001 There are no less than two forms of ISO/IEC 27001. The 2005 form and the 2013 adaptation. Both renditions are very comparative with some minor contrasts, in light of changing master bits of knowledge between the years 2005 and 2013. For this synopsis we utilize the most recent adaptation, variant 2013. This standard addresses the accompanying subjects (section numbers in ...

Click here to read more arrow

Detecting of Ransomware using Software Defined Networking

26 Jul 2017 18 Aug 2017

7 (2,543 )

Abstract- Ransomware is a major weapon for cyber-extortion. The traditional signature-based detection no longer holds good against modern, sophisticated malware that employs encryption techniques and social engineering. This paper investigates the use of Software Defined Networks (SDN) to detect the illicit communication between infected PCs (ransomware) and their controller known as the Command & Control (C&C) server. SDN provides unique opportunities to detect malicious DNS ...

Click here to read more arrow

Online Shop Web Design

26 Jul 2017 18 Aug 2017

5 (1,904 )

Shop Online Web Application system, allows the customer to shop online for their required items, and also represents an associated window for the orders selected by the customer. Each Customer will be having their desired page when they login or signup into the Shop Online Web Application. The Customer can select the required items into the cart without logging into their account. But the purchase of ...

Click here to read more arrow

Debt Predictions Using Data Mining Techniques

26 Jul 2017 18 Aug 2017

19 (7,570 )

Data Mining Project Introduction This report is set out to address the issue in which banks are facing. The project brief describes; the banks are finding it difficult to tackle debt and have leant out money to many people who promise to pay the loan back but never do. The banks says that they want to stop this happening. The banks have given some data ...

Click here to read more arrow

Image Super-Resolver using Cascaded Linear Regression

26 Jul 2017 18 Aug 2017

11 (4,041 )

Abstract- A number of existing super-resolution algorithms fail in modeling the relationship between high and low resolution image patches and time complexity in training the model. To overcome the above-stated problem, simple, effective, robust and fast image super-resolver (SERF) based on cascaded linear regression has been used for learning the model parameters. The image divided into patches are grouped into clusters using k-means clustering algorithm for ...

Click here to read more arrow

SAP Material Management Document

26 Jul 2017 18 Aug 2017

17 (6,425 )

Mission of the Statement The main objective of this document is to provide a Business Requirement document of SAP Material Management. This document gives a brief introduction about the various features of SAP Material Management Software. The document will give an explanation how this software could enhance the productivity of any organization and how to implement it to gain the maximum gains out of it. ...

Click here to read more arrow

Internet of Things Paradigm

26 Jul 2017 18 Aug 2017

15 (5,780 )

Introduction According to 2016 statistical forecast, there are almost 4.77 billion number of mobile phone users in globally and it is expected to pass the five billion by 2019. [1] The main attribute of this significant increasing trend is due to increasing popularity of smartphones. In 2012, about a quarter of all mobile users were smartphone users and this will be doubled by 2018 which ...

Click here to read more arrow

Wireshark IP Routing

26 Jul 2017 18 Aug 2017

4 (1,459 )

Introduction To complete this study, I have had three Virtual machines running at once. Two of these Virtual Machines were running Ubuntu and one was running FREEBSD acting like a router between the two Ubuntu machines. Configured Each machine to the specified IP addresses beforehand and set two NAT Networks up as required in the study. Once all was set up I double checked IP ...

Click here to read more arrow

Fundamentals of Information Technology

11 Aug 2017 18 Aug 2017

7 (2,486 )

Human Computer Interface (HCI) Kurosu (2011) defines usability as the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use. Usability is dependent on the context of use and that the level of usability achieved will depend on the specific circumstances in which a product is used. The context ...

Click here to read more arrow

Principles of Information Security

11 Aug 2017 18 Aug 2017

5 (1,632 )

Purpose:In order to protect against accidental or intentional damage or loss of data, interruption of College business, or the compromise of confidential information we must classify data and establish minimum standards and guidelines to ensure a secure system. Effective from: 02/02/17 Scope: This policy must be applied to all of the following: students, faculty, staff, contractors, consultants, temporary employees, guests, volunteers and all other entities ...

Click here to read more arrow

Development of a Perception System for Indoor Environments

11 Aug 2017 18 Aug 2017

8 (3,016 )

Autonomous navigation is a well-known task in robotic research. It is associated to get the environmental information such as visual images or distance or proximity measurements from external sensors and to detect obstacles and measure the distance to objects close to the robot path[10, 35]. Most robots are equipped to distance sensors like ultrasonic, laser or infrared to be able to move through corridors and ...

Click here to read more arrow

Cyber Security Case Study: Pure Land Wastewater Treatment

11 Aug 2017 18 Aug 2017

9 (3,304 )

Introduction Every organization should use the industrial control system to ensure the success of their departments and ensure the ultimate success of critical operations within the premise. Since such organizations will rely on the services of these agencies, it is necessary to have the right strategies in place that will result in the security of such information. The contemporary society entails handling of large volumes ...

Click here to read more arrow

Benefits of Multi Functionality System

11 Aug 2017 18 Aug 2017

3 (945 )

A project can be defined as a temporary measure that is undertaken to create a result. The term temporary means that every project must have a start and a set end date. The end is reached when the objectives of the project have been achieved, or it becomes clear that the project aims for whatever reason will not be met, or ...

Click here to read more arrow

Packet-Hiding Method for Preventing Selective Jamming Attack

11 Aug 2017 18 Aug 2017

4 (1,493 )

Abstract The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming ...

Click here to read more arrow

History and Impact of the Smart Phone

11 Aug 2017 18 Aug 2017

5 (1,773 )

INTRODUCTION This report is regarding the smartphone which is used nowadays worldwide. In this modern world, almost every person is using a smartphone, even kids know how to use a smartphone. With the help of computers and laptops, we are able to complete all our necessary works with the help of these. After the invention of smartphones, people think that, some of their work can ...

Click here to read more arrow

Smart Music Player Integrating Facial Emotion Recognition

11 Aug 2017 18 Aug 2017

9 (3,370 )

Smart Music Player Integrating Facial Emotion Recognition and Music Mood Classification 1Shlok Gilda, 2Husain Zafar, 3Chintan Soni, 4Kshitija Waghurdekar Department of Computer Engineering, Pune Institute of Computer Technology, Pune, India Abstract-- Songs, as a medium, have always been a popular choice to depict human emotions. Reliable emotion based classification systems can go a long way in facilitating this. However, research in the field ...

Click here to read more arrow

Passive Reconnaissance Website Analysis

11 Aug 2017 18 Aug 2017

13 (4,834 )

Assignment: - Reconnaissance Paper Student Name: - Soumil Deshpande Executive Summary In this assignment, passive reconnaissance was performed on The Weather Channel's website i.e. www.weather.com and important results have been obtained regarding the organizations online behavior. In this passive reconnaissance attack we have discovered all the domain name and the corresponding IP addresses of the hosts, domain names, servers, reverse DNS, the webhost ...

Click here to read more arrow

Curvelet-based Bayesian Estimator for Speckle Suppression

10 Aug 2017 18 Aug 2017

12 (4,521 )

Curvelet-based Bayesian Estimator for Speckle Suppression in Ultrasound Imaging Abstract. Ultrasound images are inherently affected by speckle noise, and thus the reduction of this noise is a crucial pre-processing step for their successful interpretation. Bayesian estimation is a powerful signal estimation technique used for speckle noise removal in images. In the Bayesian-based despeckling schemes, the choice of suitable statistical models and the development of a shrinkage function for estimation of the noise-free signal are ...

Click here to read more arrow

IVR Cloud Migration Project

10 Aug 2017 18 Aug 2017

19 (7,571 )

INTRODUCTION The primary objective of the IVR Cloud Migration Project is to Lift and Shift their working Applications into the AWS Cloud Environment. The Lift and Shift of the IVR Applications are recommended to have automation the least amount of human interaction to build and deploy onto AWS Cloud. This document will give a step-by-step process to carry out the task of automating ...

Click here to read more arrow

Bag of Visual Words Model

10 Aug 2017 18 Aug 2017

4 (1,252 )

Abstract Automatic interpretation of Remote sensing images is a very important task in several practical fields. There are several approaches to accomplish this task, one of the most powerful and effective approach is the use of local features and machine learning techniques to detect objects and classify it. In such an approach, first, the image is scanned for local features and coded in a mathematically ...

Click here to read more arrow

Construction of Information Engine

10 Aug 2017 18 Aug 2017

5 (1,948 )

Coiza - Making sense of information  1. Introduction I more or less run my life directed by information from the Internet. I check the weather, check the traffic, look for places to go, look for reviews for the places, get updates from my friends and work - and browse lots of information from many other sources. The information I am interested in depends on many ...

Click here to read more arrow

Capital Shape Alphabet Encoding Based Text Steganography

10 Aug 2017 18 Aug 2017

7 (2,781 )

A Capital Shape Alphabet Encoding (CASE) Based Text Steganography Approach Abstract Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Steganography is a form of security through obscurity. Steganography algorithms uses cover media such as text, image, audio and video etc. to ...

Click here to read more arrow

Data Mining Analysis in the Telecommunications Industry

10 Aug 2017 18 Aug 2017

7 (2,793 )

Abstract The broadcast communications industry was one of the first to receive information mining innovation. This is in all probability since media transmission organizations routinely produce what's more, store tremendous measures of amazing information, have a vast client base, and work in a quickly changing and exceptionally focused environment. Media transmission organizations use information mining to enhance their showcasing endeavors, distinguish extortion, and better deal ...

Click here to read more arrow

Evolution of Mobile Device Technology

10 Aug 2017 18 Aug 2017

11 (4,095 )

Introduction Since the revolution of the smartphone in 2005 the development progress in this field grows rapidly. It became a part of our life and played a big role to change the attitude of our life style. This technology (smartphone) didn't stop at that level but it spread everywhere to cover all sides of our daily activities. Even anew terminology appear to name this technology ...

Click here to read more arrow

How Big Data is Used in Retail Industry: Etsy

10 Aug 2017 18 Aug 2017

7 (2,650 )

Big Data can be defined as the inability of traditional data architectures to efficiently handle the new datasets. Characteristics of Big Data that force new architectures are: 1. Volume: Size of dataset 2. Variety: Data from multiple sources 3. Velocity: Rate of flow 4. Variability: Change in other characteristics We all are aware of the 4 v's and they are considered as the core characteristics ...

Click here to read more arrow

Effect of Bring your own Device (BYOD) on Cybersecurity

10 Aug 2017 18 Aug 2017

5 (1,732 )

Effect of Bring your own Device (BYOD) on Cybersecurity at workplace Introduction Several new trends in information access are impacting organizations' ability to control and secure sensitive corporate data. The increase in web applications, cloud computing and Software as a Service (SaaS) offerings, and the Bring Your Own Device (BYOD) phenomenon, means that employees, business partners and customers are increasingly accessing information using a web ...

Click here to read more arrow

SQL to Firebase - A Metamorphosis

10 Aug 2017 18 Aug 2017

7 (2,719 )

Abstract- Firebase is being extensively used in cross-platform apps for various functionalities, one of them being Realtime Databases. This paper highlights how an RDBMS based database such as MySQL can be converted to a JSON based Firebase Realtime Database for easier readability, multi-device data access and manipulation, and cloud storage for a centralized database. Although MySQL follows a schema for the data and stores information ...

Click here to read more arrow

Resolving Problems with a Local Area Network

10 Aug 2017 18 Aug 2017

14 (5,363 )

Network user problems: Explain different problems that a user of a local area network may faces while accessing the network. Poor or bad cable issue: -Poor or bad cable issue is problem of a local area network which faces by user while accessing the network. In this problem, if the client computer is capable forconnect to the network, the performance might ...

Click here to read more arrow

Technology to Reduce Employee Stress

10 Aug 2017 18 Aug 2017

9 (3,301 )

STRESS BREAKER METHODOLOGY AND SYSTEM ANALYSIS & DESIGN DOCUMENT INTRODUCTION Computers are extremely proficient devices in that they help us with accomplishing more work in less time yet taking a shot at a Computers can be intense on the client's body and brain. This type of work can be stressful and can cause health issues related to brain. Stress is characterized as the ...

Click here to read more arrow

Fading Light Experiment on Arduino Kit

10 Aug 2017 18 Aug 2017

3 (826 )

Introduction Arduino is an open source prototyping platform enabling users to create interactive electronic objects. [1] Here, we performed "Fading Light" one of the basic activities on this Arduino kit. This activity demonstrates the use of analog output in the code (Pulse Width Modulation) to fade the LED light. You can fade out and fade in the light of LED automatically using Arduino with a ...

Click here to read more arrow

Computer Dynamics Network Proposal

10 Aug 2017 18 Aug 2017

2 (719 )

Computer Dynamics is a company with 300 computers in three adjacent five-story building with 100 computers in each building. The LAN's are similar in each building with a data center is located in one building on the second floor. There are no other office locations. The current system is poorly designed and must be completely replaced. Develop a logical design for this enterprise campus that ...

Click here to read more arrow

RBG Colour Model Experiment

10 Aug 2017 18 Aug 2017

3 (1,181 )

Introduction Color is a visual attribute of objects that results from the light they emit, transmit or reflect. [1] These colors give us the ability to appreciate things around us. With this, we can easily define or give meaning to the things we see almost every day. We can see these colors in paintings, surroundings, the food we eat, and almost everything, as almost everything ...

Click here to read more arrow

Mesos and Kubernetes : A Comparative Analysis

10 Aug 2017 18 Aug 2017

15 (5,627 )

Abstract - Containers and application containerization have fast gained traction as the most promising aspects of Cloud Computing. A massive increase in the number and variety of applications has created a need for smooth integration between developer and live environments with quick service time. The amount of user data being handled by today's applications requires heavy computing resources which further require large clusters of hosts. ...

Click here to read more arrow

A Case Study Audit Report of Veterans Affairs' Association

10 Aug 2017 18 Aug 2017

7 (2,413 )

Introduction The Veterans Affairs (VA) is subject to the Government Security Policy (GSP) and must ensure compliance with the GSP and operational standards. The VA is responsible for the conduct of an audit to determine the efficiency and effectiveness of its security program. At the request of the VA, we conducted an audit of security to provide management of the VA with an objective assessment ...

Click here to read more arrow

Healthy Eating Companion App

10 Aug 2017 18 Aug 2017

14 (5,467 )

1.INTRODUCTION Healthy eating is the most important factor in maintaining health. It is considered as most important means of promoting health. Healthy eating is an overall sense of well being and also helps in preventing many chronic diseases. Healthy and unhealthy eating are both influenced by variety of factors. The application allows users to specify their dietary requirements, based on which the application makes suggestions ...

Click here to read more arrow

Features and Functions of Information Systems

10 Aug 2017 18 Aug 2017

4 (1,386 )

In this assignment I am going to describe the features and functions of an information system and demonstrate my knowledge in information systems and ability to use the skills necessary to produce management information (information to aid in decision making) I am required to know the features and functions of information systems and to be able to use IT tools to produce management information. In ...

Click here to read more arrow

Operating System Questions and Answers Example

10 Aug 2017 18 Aug 2017

3 (1,004 )

Questions: What are the relationships between operating systems and the hardware? Answer: Operating system is the mediator between computer hardware and application programs .It also makes all possible effort to utilize hardware resources for the application programs which are install over operating system. Without any Operating system we cannot even access any computer hardware to perform any task required ...

Click here to read more arrow

Application of Database Developmental Cycle

10 Aug 2017 18 Aug 2017

10 (3,931 )

Task 1: Apply the database developmental cycle to a given data set or a case of your own Myreadingroom[1.1] details that the database development lifecycle, DDLC, contains six phases: the initial study, the design, implementation and loading, testing and evaluation, operation, and maintenance and evolution. The first phase of the DDLC is the initial study. This involves investigating the company's current solution, determining what ...

Click here to read more arrow

Logical Database Design for HR management System

10 Aug 2017 18 Aug 2017

7 (2,705 )

Task 1.1 The background information of the organization and operation that would support. In an organization a HR department is responsible for record each employee. Where the employees have an identification number, job identification code, e-mail address, manager as well as salary. They also track those employees earn incentive or commissions in addition to their salary. However, the company also tracks their role in the ...

Click here to read more arrow

Secure Sockets Layer in Security Technology

10 Aug 2017 18 Aug 2017

14 (5,416 )

SSL (Secure Sockets Layer) the most widely used and most powerful measure in security technology for creating an encrypted link between the Web Server web browsers. If the link is encrypted, they use https protocol. Secure receptacle Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user's confidentiality when they sending data from a customer side to a web ...

Click here to read more arrow

Project Design for IPMS

10 Aug 2017 18 Aug 2017

12 (4,635 )

 1. Scope Statement. In order to develop an effective project for IPMS within 12 weeks with limited costs using limited resources provided by Whitireia using IPMS to monitor and handle software company's projects, roles, employee information, skill level and timetables for its client and third party 1.1 Functional requirement: 1. To everybody can use the IPMS well, they must can create at least four kind ...

Click here to read more arrow

Migration of Ducati Virtualization Servers to Private Cloud

10 Aug 2017 18 Aug 2017

3 (1,051 )

Ducati Motor Holding limited is a motorcycle designers and manufactures based in Italy. It owned by German automobile manufacturer Audi and Lamborghini which all comes under Volksvogen. It has rapidly moved to virtualization in past few years thus reducing the capital costs and had flexibility in applications, Ducati moved to 100% cloud due to high utilization of server virtualization; So Ducati has also embraced to ...

Click here to read more arrow

Threats to Quality Web Designs Network System (QWD)

10 Aug 2017 18 Aug 2017

5 (1,705 )

Executive Summary The main purpose of this report is to existent the potential security threats that aspects Quality Web Designs network system (QWD). QWD specializes in website and web content design for dissimilar types of business and any type of security threat can significantly disturb its business operations. It is significant to uncover any potential vulnerabilities, assess potential threats, and the potentials of the threat ...

Click here to read more arrow

Self Reflection: Time Monitoring Worksheet

10 Aug 2017 18 Aug 2017

3 (1,108 )

Time Monitoring Worksheet Part 1: Monitor your time in hourly increments. Time Monday Tuesday Wednesday 5 a.m. Work work Work Work 6 a.m. Work Work work 7 a.m. work ...

Click here to read more arrow

Using Big Data to Defend Against Cyber Threats

10 Aug 2017 18 Aug 2017

9 (3,513 )

Abstract In today's world, there are petabytes of data being moved by the minute, that data is analyzed and algorithms are developed so companies can critique and improve their services, ultimately increasing their profit, this is called BIG DATA. Majority of the being moved holds critical information such as social security numbers, health information, locations, passwords and more. When data is compromised BILLIONS of dollars ...

Click here to read more arrow

Machine Learning in Malware Detection

10 Aug 2017 18 Aug 2017

8 (2,868 )

1.0 Background Research Malware was first created in 1949 by John von Neumann. Ever since then, more and more malwares are created. Antivirus company are constantly looking for a method that is the most effective in detecting malware. One of the most famous method used by antivirus company in detecting malware is the signature based detection. But over the years, the growth of malware is ...

Click here to read more arrow

Review and Comparison of Different Software Quality Models

10 Aug 2017 18 Aug 2017

9 (3,226 )

Muhammad Qasim Riaz1 and Zeeshan Asif2 1,2Department of Computer Science, University of Agriculture, Faisalabad, Pakistan Abstract Software quality models are one of the best means for the support of software quality management system. Since more than 30 years, several quality models have been offered and used with fluctuating mark of success. To be particular, with the idea of defining the multidimensional content of ...

Click here to read more arrow

Implement an Information System for SMARTS

10 Aug 2017 18 Aug 2017

4 (1,361 )

1 - Introduction Purpose of Document The purpose of this document is the outline the specification to implement an Information System for SMARTS. This document details the process of moving from the current system to the proposed system that was developed in addition to migrating data, also to plan for the implementation of a Help Desk to be available to staff through a ...

Click here to read more arrow

PIQL: Success-Tolerant Query Processing in the Cloud

10 Aug 2017 18 Aug 2017

3 (1,077 )

Advanced Topics in Foundations of Databases PIQL: Success-Tolerant Query Processing in the Cloud Stavros Anastasios Iakovou Introduction In our days it is widely know that modern web applications are directly linked with databases. In addition, the number of the users is highly increas- ing through the time and as result the related databases start overloading. Furthermore, despite the fact that data ...

Click here to read more arrow

Secure Vehicular Traffic Re-routing System using SCMS

10 Aug 2017 18 Aug 2017

10 (3,686 )

Secure Vehicular Traffic Re-routing System using SCMS in connected cars ABSTRACT The centralized system encounters two vital issues, the centralized server needs to accomplish genuine calculation and communication with the other vehicles continuously, which can make such architecture infeasible for extensive zones with various vehicles; and driver security is not guaranteed since the drivers need to share their area furthermore the beginning stages and goal ...

Click here to read more arrow

Importance of Using the ACARS System

10 Aug 2017 18 Aug 2017

13 (4,814 )

Abbreviations ACARS: Aircraft Communication Addressing and Reporting System ADS-B: Automatic dependent surveillance - broadcast CMU: Communication Management Unit CDU: Control Display Unit FMS: Flight Management System ATC: Air Traffic Control AOC: Aeronautical Operational Control AAC: Airline Administrative Control NOTAM: Notice to Airmen VHF: Very High Frequency VDL: VHF Data Link MAC: Message Authentication Code AES: Advance Encryption Standard SHA: Secure Hash Algorithm CA: Certificate ...

Click here to read more arrow

Protection of Biometric Templates

10 Aug 2017 18 Aug 2017

16 (6,247 )

Protection of Biometric Templates Stored on an Authentication Card by Salting the Templates   Problem Statement The proposed research addresses the problem of protection of biometric data stored on templates using a system-on-card approach for smart cards by proposing a method to 'salt' the templates. Research Statement This research proposes a robust and resilient method to 'salt' the templates stored and matched on-card. It prepares ...

Click here to read more arrow

Principles of Information Security

10 Aug 2017 18 Aug 2017

4 (1,519 )

Man in the Middle and Man in the Browser Attacks on Financial Institutions.   Abstract Four decades ago, what started as a US military research initiative to build network for linking US universities and research centers is now the Internet. Today it has expanded to every corner of the globe (Privgcca, 2016). The number of Internet users has risen from few computer scientists to ...

Click here to read more arrow

Functions and Elements of Self Organising Networks

10 Aug 2017 18 Aug 2017

9 (3,258 )

CHAPTER 1 In this chapter I will be discussing about the main functions of SON, its components, elements and how does it atomizes the whole LTE network infrastructure. I have organised this chapter in the following way and will explain each of the component respectively. OAM Automatic Configuration Features Neighbour Relation Automatic Neighbour Relation management Connectivity Management Self Test Automatic Inventory So, lets ...

Click here to read more arrow

Mmap Creation of New Mapping

10 Aug 2017 18 Aug 2017

6 (2,242 )

  The goal of this experiment is too understand how mmap creates a new mapping on a process virtual memory address space. Figure 1 The outcome of the program is shown (figure 1). The page size of this architecture is equal to 4096 bytes, which is the default page size for most modern operating systems. The program threw a segmentation core dump error ...

Click here to read more arrow
Get in Touch With us

Get in touch with our dedicated team to discuss about your requirements in detail. We are here to help you our best in any way. If you are unsure about what you exactly need, please complete the short enquiry form below and we will get back to you with quote as soon as possible.