Genealogy and the Internet

01 Aug 2017

4 (1,206 )

The topic of genealogy has been thoroughly researched throughout the decades. The main problem with genealogy was the travel that traditionally accompanied any genealogist in their search for records and sources. Access to records, or the lack thereof, is the pivotal issue for genealogists. They have lobbied successfully to increase physical access to records, and they also work to increase intellectual access through mentoring and ...

Click here to read more arrow

Use and Application of Data Mining

01 Aug 2017

3 (886 )

Data mining is the process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform the data into information. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery [1-3]. Data mining can be applied on a variety of data types. Data types include structured data (relational), multimedia data, free ...

Click here to read more arrow

Event-Driven Programming Features

26 Jul 2017

3 (985 )

Event-driven programming known as a computer programming paradigm that used the occurrence of events to determine the control flow of the program. This type of application is designed to detect events as they occur, and use an appropriate event-handling procedure to deal with it, which normally use a callback function or method. Theoretically, event-driven style of programming is supported in all programming languages, but they ...

Click here to read more arrow

SOAP/REST Research

26 Jul 2017

9 (3,450 )

  Web Services   Over the years, along with technological evolution, software industry has adopted the concept of Web Services, defined as distributed model in which multiple web applications can intercommunicate with each other [1]. Web Services are standardized web applications that cooperate with different web applications in order to interchange information. Communication between web services is based on open protocols such as HTTP ...

Click here to read more arrow

OpenStack Introduction and Uses

26 Jul 2017

3 (1,157 )

OpenStack: It is an open-source programming stage for distributed computing, generally sent as a framework and as an administration. The product stage comprises of interrelated segments that control various multi-seller equipment's, stockpiling and system administration assets all through a server base. Amazon Web Service: It is a protected cloud administration stage which offers figure control, database stockpiling, content conveyance and many other uses to help ...

Click here to read more arrow

Wireless Devices and Applications

26 Jul 2017

2 (778 )

There are different uses of remote gadgets inside a business association. The applications, for example, M-Business and field benefit administration. The advances that are utilized by remote gadgets: Email, SMS, WAP, Wi-Fi, PDAs, Cell phone, GPS and WLAN. Remote telemedicine in which pictures of conclusion and therapeutic treatment is sent utilizing remote system inside an association is one of the WDA application. There are substantial ...

Click here to read more arrow

Windows Server Deployment Proposal

26 Jul 2017

9 (3,374 )

Contoso Advertising has two locations. The main site location is in Pensacola, Florida (FL) with a smaller site in Casper, Wyoming (WY). Multiple servers will be distributed throughout these sites to support the various services required by each department. Throughout the growing enterprise, there will initially be 90 employees distributed into five departments between the two sites. Contoso has a small Executive department of 9 ...

Click here to read more arrow

Importance of Database Security

23 Mar 2015 21 Jul 2017

7 (2,573 )

Keywords: database security ecommerce, database security layers To be able to manage a huge amount of data effectively and fast, a well organized system is needed to build. It will also need to store and retrieve data easily. Generally, a database system is designed to be used by many users simultaneously for the specific collections of data. Databases are classified based on their types of collections, such ...

Click here to read more arrow

Car Rental System Literature Review

23 Mar 2015 18 Jul 2017

6 (2,376 )

The Rental vehicles web system is a web-based that creates by JavaScript. Our software application aims to be a complete solution for a web based car rental broker companies with the support of call center functionality in Langkawi Island It can be easy for tourist , travel agency ,and Private visitor to online make research , comparison vehicles prices and make reservation , online payment when they ...

Click here to read more arrow

Artificial Intelligence Essay

23 Mar 2015 17 Jul 2017

5 (1,857 )

Keywords: student essays artificial intelligence, ai essay This paper is the introduction to Artificial intelligence (AI). Artificial intelligence is exhibited by artificial entity, a system is generally assumed to be a computer. AI systems are now in routine use in economics, medicine, engineering and the military, as well as being built into many common home computer software applications, traditional strategy games like computer chess and other video ...

Click here to read more arrow

Different Networking Systems Advantages and Disadvantages

23 Mar 2015 17 Jul 2017

5 (1,644 )

Keywords: networking systems analysis Local Area Network: Local Area network is isolated network. Generally, It is build in a physical location. such as office, home etc. Computers are connected to each other by a small server and also connected to the wide area network (Internet). This types of networks are very usefull for sharing data likes files, small or big document, play network games etc. Metro Politian ...

Click here to read more arrow

Classification Of Operating System

23 Mar 2015 11 Jul 2017

4 (1,377 )

Keywords: operating system classification, classification of os An Operating System is the basic software of computers that provides an interface between the computer programs and hardwares. Operating system also provides a software platform on top to other programs, they are called application programs (Application program: is the software that helps the users to make typical functions, like making text, others…). Your choice of the operating system, determinates ...

Click here to read more arrow

Advantages of Binary System

23 Mar 2015 07 Jul 2017

11 (4,396 )

Keywords: advantages of binary number system, binary system analysis The binary number system, base two, uses only two symbols, 0 and 1. Two is the smallest whole number that can be used as the base of a number system. For many years, mathematicians saw base two as a primitive system and overlooked the potential of the binary system as a tool for developing computer science and many ...

Click here to read more arrow

Introduction to MS Excel

23 Mar 2015 06 Jul 2017

6 (2,287 )

Keywords: essay on ms excel, ms excel essay, microsoft excel essay Microsoft Word is a powerful word-processing program that will take your documents far beyond what you can produce with a typewriter. Whether you want to create a simple letter to a friend, produce a newsletter for a professional organization, or even write a complicated, multiple-page report containing graphics and tables with numerical data, you will find ...

Click here to read more arrow

What is Online Examination System?

23 Mar 2015 05 Jul 2017

20 (7,838 )

Keywords: online examination system, e examination system Online examinations, sometimes referred as e-examinations, are the examinations conducted through the internet or in an intranet (if within the Organization) for a remote candidate(s). Most of the examinations issue results as the candidate finish the examination, when there is an answer processing module also included with the system. They can be used to efficiently evaluate the candidate thoroughly through ...

Click here to read more arrow

Android Operating System Analysis

23 Mar 2015 14 Jun 2017

4 (1,547 )

Keywords: android essay, operating system android Android (Operating System) - Revolution in Mobile Technology Abstract Android's mobile operating system is based on the Linux kernel and it is a software stack for mobile devices. This operating system is one of the world's best-selling Smartphone platform. Android involves many developers writing applications that helps in extended the functionality of the devices. There are currently over 1,50,000 applications ...

Click here to read more arrow

Future Scope of Image Processing

23 Mar 2015 12 Jun 2017

6 (2,167 )

Keywords: image processing future, image processing improvement Imaging can be defined as the representation of an objects external form. That definition no longer holds true. More information within an image can be considered. Fluorescent tags, mechanical-biological parameters, internal structures are some of the recent additions. Fabrication while imaging and the characterization of materials as yet undefined can also be part of imaging. The extremely small images can ...

Click here to read more arrow

Blowfish Algorithm Advantages and Disadvantages

23 Mar 2015 07 Jun 2017

6 (2,220 )

Keywords: blowfish encryption strengths, blowfish encryption weaknesses, advantages blowfish algorithm Blowfish is a keyed (piece of information that determines the functional output of a cryptographic algorithm or cipher), symmetric cryptographic block cipher. It was designed by Bruce Schneier in 1993. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is license-free and is available free for all ...

Click here to read more arrow

Online Course Registration And Management System

23 Mar 2015 06 Jun 2017

22 (8,442 )

Keywords: online registration it, management system development Currently the Microsoft IT Academy in Multimedia University Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to enroll on the specific course. As the course registration is still done manually, below is the summary of the problem on the manual method: User : It consumes time ...

Click here to read more arrow

Analysis Of A Hotel Management System

23 Mar 2015 02 Jun 2017

5 (1,689 )

Keywords: hotel management system analysis, hotel database system This is software which has mainly made for management of a Hotel. The software has been designed with front-end as VB and backend as Oracle. The project Hotel Management manages maintains the records of customers and room in the hotel. The rooms have different categories. So there charges and records will be maintained accordingly. This software has been made ...

Click here to read more arrow

Hackers And Ethical Hackers

23 Mar 2015 01 Jun 2017

5 (1,630 )

Cyber security is one of the most critical aspects of security that any organization in the modern world must be concerned with. Why? Mostly because of Black-hat Hackers. The following review is a general discussion about hackers and its best countermeasure, Ethical Hacking. The reason I chose this topic is because it is of great interest to me, as I someday want to be an Ethical hacker ...

Click here to read more arrow

Explain the Role of Computer Systems in Different Environments

23 Mar 2015 01 Jun 2017

4 (1,332 )

In todays era, computer has become one of the basic needs for human beings. Computer which we used like every day was invented for solely one purpose i.e. for calculating numerical problems and mathematical calculations. The term computer is derived from Latin world called 'computare' which means to calculate. With the advancement of technologies, computer has become one of the powerful machines ever created. There are different ...

Click here to read more arrow

Functional Requirements of Airline Reservation System

23 Mar 2015 31 May 2017

12 (4,464 )

This project deals with the development of a Software Requirements Specification (SRS) document that specifies what an airline reservation system should and should not do. The SRS document is divided into five sections namely System Objectives This section lists all the goals and objectives of the system categorized based on the viewpoint of the airline company and the customer (passenger). These are higher-level goals which are somewhat ...

Click here to read more arrow

XML Database: An Introduction and Analysis

23 Mar 2015 31 May 2017

17 (6,415 )

XML, mnemonic of eXtensible Markup Language is one of the most extensively used data format and is used as a standard for exchange of data over the internet. As large amount of data is represented as XML documents, techniques like RDMS have to be used to store and query these XML documents. There are two well known approaches for parsing an XML document to convert into relational ...

Click here to read more arrow

Traffic Lights Microprocessor

23 Mar 2015 30 May 2017

5 (1,670 )

Keywords: microprocessor components, traffic lights program Microprocessor: A microprocessor is defined as the digital electronic component embedded with transistors on a single semiconductor integrated circuit. One or more than one microprocessors typically serve as a central processing unit in a computer system. Microprocessor Components: Basic Components: The following are the basic components of the microprocessor: Registers: A register is a storage element which is composed of an ...

Click here to read more arrow

Adaptive Input And Output Devices

23 Mar 2015 26 May 2017

7 (2,571 )

Keywords: assistive technology, optical character recognition, ocr, refreshable braille Technology has been advancing and developing rapidly in the current era. The current era, also known as the information era, have involved in workers in the creation, distribution and the use of information. However, an adaptive and assistive device is also being invented to aid the disabled in using the computer. An assistive device can allow disabled people ...

Click here to read more arrow

Comparison of Operating Systems

23 Mar 2015 25 May 2017

11 (4,100 )

Keywords: linux advantages and disadvantages, linux vs windows 2000 Abstract: The main aim of the paper is to clearly distinguish the Comparison between the Linux, Windows Network operating System and Amoeba Distributed operating System. This paper explains clearly about the network operating systems like Linux, windows 2000 and Amoeba, Amoeba can be described as an example of a distributed operating system. Starting from the Linux operating system, ...

Click here to read more arrow

Advantages And Disadvantages Of Wireless Internet

23 Mar 2015 19 May 2017

9 (3,399 )

Wireless Internet is also called Wireless Web, Mobile Internet, and Internet Wireless. Wireless Internet means access the internet through a wireless devices, For Example laptop, cellular telephone , PDA, etc... , Using Wireless internet any person can do their day today activities like e-mail, e-banking, communication, conferencing, etc.., In addition to that can be accessed weather and travel information, etc… any where any time. Advantages of wireless ...

Click here to read more arrow

Networking And Routing Protocols

23 Mar 2015 19 May 2017

10 (3,787 )

At present, internet plays a vital role in many of our daily life. It made a dramatic revolution on communication which we enjoy today. The revolution offered web appliances, e-commerce, video conferences, online gaming and so on. All these became possible and operating on the backbone called networks. On the first hand, before discussing about routing and routing protocols we'll go through and networking. Initially U.S. government ...

Click here to read more arrow

Design Of Two Stage High Gain Opamp

23 Mar 2015 19 May 2017

4 (1,599 )

A High Swing Ultra-Low-Power Two Stage CMOS OP-AMP in 0.18 um Technology with 1.2v supply, is presented. Cascode technique has been used to increase the dc gain. The unity-gain bandwidth is also enhanced using a gain-stage in the Miller capacitor feedback path. The proposed opamp provides 236MHz unity-gain bandwidth, 109.7 degree phase margin. The circuit has 94.34dB gain. The power dissipation of the designed only is approximately ...

Click here to read more arrow

An Introduction To Encryption And Decryption

23 Mar 2015 18 May 2017

8 (3,200 )

CHAPTER 1 This thesis proposes a VHSIC Hardware Description Language (VHDL) design of Encryption and Decryption Algorithm for Data. In this chapter, the challenges of cryptography is firstly presented. This chapter also briefly discusses the problem definition, scope of work and the thesis objectives are also highlighted.Finally, the chapter end with the chapter organization. The dissertation presentation is provided at the end 1.1 An introduction to Encryption ...

Click here to read more arrow

Limitations And Advantages Of A Directional Antenna

23 Mar 2015 18 May 2017

7 (2,450 )

Abstract - A discussion of directional antennas and performance, the limitations or drawbacks and advantages of using directional antennas compare to omnidirectional antennas. INTRODUCTION The definition for directional antennas is antennas which radiates in one or more directions that allowing to increases the performance on transmit, receive and reduce the interference from other sources, or in another way to say is the antennas that receives or sends ...

Click here to read more arrow

Online Cinema Reservation System

23 Mar 2015 18 May 2017

7 (2,799 )

This assignment title for Introduction to Software Engineering assignment is to do a research and analysis of a software project. The topic chosen for this assignment is Online Cinema Ticket Reservation System. Following are the tasks need to be done of the assignment. To identify the requirements for cinema online ticket reservation system. To identify the design principles and concept and produce the design based on the ...

Click here to read more arrow

Computerised Hotel Maintenance Systems

23 Mar 2015 17 May 2017

4 (1,534 )

I intend to develop a computerised Hotel maintenance system for Global Grange Hotel. The proposed system would help to organise & manage the Maintenance department in an efficient manner in order to minimize the drawbacks of the current system. The main entities that I have taken into account are the ordering up to date stock, up to date problem solves, History of problems and suppliers. The new ...

Click here to read more arrow

Factors Determining Layout And Design

23 Mar 2015 17 May 2017

9 (3,457 )

Facility layout and design is an important component of a businesss overall operations, both in terms of maximizing the effectiveness of the production process and meeting the needs of employees. The basic objective of layout is to ensure a smooth flow of work, material, and information through a system. The basic meaning of facility is the space in which a business's activities take place. The layout ...

Click here to read more arrow

How Number System Is Used In IT

23 Mar 2015 17 May 2017

8 (2,849 )

In this documentation I have discussed of how the application of number system is used in IT applications in both hardware and applications, operating system and in programming language. I have discussed about the use of base 2 in the 8 bit bytes form use with the operation for subnet. The use of hexadecimal form addressing memory and classless inter Domain Routing. There are number of different ...

Click here to read more arrow

Microcontrollers In Wireless Sensor Networks

23 Mar 2015 17 May 2017

5 (1,881 )

ABSTRACT: Now a day's wireless sensor networks have been gaining interact with physical in world. Whereas these can be used in different applications in medical, military, roadside, industrial etc .In the wireless sensor network reducing power is the main importance. In wireless sensor network, which are using battery operated sensors need low-power component devices to increase the life time of the sensors and also gives rise for ...

Click here to read more arrow

Study Of Mobile Application Development

23 Mar 2015 17 May 2017

4 (1,440 )

Nowadays all around the world have the explosive growth of the mobile application market has created a vast and complicated set of alternatives for developers because of an increasingly important role in everyone's life. Consumers are migrating to Smartphone mobile devices that are Internet enabled for work and play and, most importantly, with family, friends and colleagues. The mobile software technology comprises a wide variety of platforms, ...

Click here to read more arrow

Differences Between MIPV4 And MIPV6

23 Mar 2015 17 May 2017

4 (1,369 )

With the fast growth in the numbers of the mobile and handheld devices that are connected to the internet, the current IPv4 protocol is not able to cover all theses growth number of IP addresses. This is why the Internet Protocol IPv6 has been developed. Mobile IPv6 is an essential mandatory feature of the IPv6 that has been built to enable mobility for mobile device in IP ...

Click here to read more arrow

Comparison Of Land Line And Mobile Phones

23 Mar 2015 16 May 2017

6 (2,310 )

No one can ever forget Alexander Graham Bell, who is credited as the inventor of "Telephone". With innovation and advancement in technology, the simple two way communicating device has taken a new form popularly known as "mobile phone". We have reached an era where it is very common to hear words like "I can't live without mobile phone". Cell phone has become a part of our daily ...

Click here to read more arrow

Routing Protocol Simulation With NS2

23 Mar 2015 16 May 2017

20 (7,625 )

Network simulation is a method of investigation in network technology. In the process of investigating a new technology, due to various reasons, it is costly and unrealistic to physically test a network system. In such situation, simulation becomes one of the best available solutions in testing, evaluation and validation. Network simulation has the features of small cycle and low cost, and it is easier for researchers to ...

Click here to read more arrow

Advantages And Disadvantages Of Optimisation Techniques

23 Mar 2015 16 May 2017

5 (1,741 )

We have to use different techniques to optimise our website. Our main focus will be on how to reduce the size of the webpage and script execution time. This, in turn, will definitely improve the user experience as well as reduce the load on the servers. The images and graphical interfaces occupy the maximum storage size on the webpage. Therefore we need to compress the images and ...

Click here to read more arrow

Micro Operations Microinstruction Micro Program Micro Code

23 Mar 2015 16 May 2017

5 (1,865 )

Each microinstruction in a microprogram provides the bits which control the functional elements that internally compose a CPU. The advantage over a hard-wired CPU is that internal CPU control becomes a specialized form of a computer program. Microcode thus transforms a complex electronic design challenge (the control of a CPU) into a less-complex programming challenge. Microcode is a layer of hardware-level instructions and/or data structures involved in ...

Click here to read more arrow

Effects Of Noise In A Data Communication

23 Mar 2015 15 May 2017

7 (2,489 )

This report will look into different types of noise that are associated with Unshielded Twisted Pair and Radio Waves. The noise that affects these transmission mediums such as thermal noise, crosstalk, multipath interference, intermodulation noise and impulse noise will be explored and the damages that it can cause to data being transmitted will be explained. I will also discuss the different modulation techniques and technologies that can ...

Click here to read more arrow

Background Of Studies On Computer Viruses

23 Mar 2015 15 May 2017

17 (6,532 )

A computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is ...

Click here to read more arrow

Types Of Peripheral Devices

23 Mar 2015 15 May 2017

7 (2,542 )

What is Information Technology (IT)? Information Technology can be known as being the study, design, development, implementation support and management of any computer based information systems. This relates particularly to software applications and computer hardware. Information Technology deals with using electronic computers and software to convert, store, protect, process, retrieve with security or transmit any information. Everything from data management, networking, engineering computer hardware, software design, database ...

Click here to read more arrow

The Benefits Of Antivirus Protection

23 Mar 2015 12 May 2017

3 (1,143 )

This report presents antivirus protection, its definition and different types of. It shows how it is important of this program to protect computer. Because attacker spread viruses around the world, people need strong and effective antivirus program to prevent their computers from these viruses. In this report, will be mentioned the idea of antivirus protection types, how its work and which methods use and benefits of this ...

Click here to read more arrow

Functions Of Operating Systems

23 Mar 2015 12 May 2017

3 (1,032 )

Operating system is the program, which usually installed into the computer by a boot program. It manages all other programs in computer. Sometimes it also called as "OS". These programs also called applications. The application uses the operating system by making requests for services through API (Application Program Interface). Sometimes users can directly use the operating system through GUI (Graphical Users Interface) or command language. Operating system ...

Click here to read more arrow

Antivirus Research And Development Techniques

23 Mar 2015 12 May 2017

17 (6,605 )

Antivirus software is the most booming product which has constant developments to be most up to date defensive detecting product competing with all other antivirus software products available in the commercial market. This thesis covers few techniques used by the antivirus products, a general background information about viruses and antivirus products, some research made on antivirus overheads which shows what overheads are introduced to the computer on ...

Click here to read more arrow

An Android Application Development

23 Mar 2015 12 May 2017

8 (3,015 )

This paper talks briefly about developing applications on the android mobile platform using the Java Programming language. The overview includes introduction to the android platform features, architecture, APIs, application framework and the android SDK. A Hello World application walks you through the development process to understand the concepts of the android software stack and the tools involved. In late 2007, a group of industry leaders came together ...

Click here to read more arrow

Study Of Blue Eye Technology

23 Mar 2015 11 May 2017

14 (5,382 )

Blue eye is the technology to make computers sense and understand human behavior and feelings and react in the proper ways. The blue eye technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. It uses non-obtrusive sensing method, employing the most modern video cameras and microphones to identify the user's actions through the use of imparted sensory abilities. The ...

Click here to read more arrow

Social Networking Sites Analysis

23 Mar 2015 10 May 2017

3 (1,166 )

Social Networking Sites are increasingly becoming popular, attracting the attention of millions of users by functioning like an online community. These sites are web based services that allow individuals to create a public/private profile on one or more sites. Users once registered can input their personal data including photos and videos. This then allows them to interact with other users with whom they want to share a ...

Click here to read more arrow

Facebook: A Useful Communication Tool

23 Mar 2015 10 May 2017

4 (1,544 )

This report provides an analysis about Facebook, which has become an important source of communication now days. The report starts with an introduction of Facebook, history of Facebook and its importance now days. The report then moves on the use of the social network as a communication tool, entertainment, business and information. The report also tells about the usage of Facebook among different people of different regions ...

Click here to read more arrow

Importance Of IP Addresses

23 Mar 2015 10 May 2017

5 (1,722 )

Each device that participates in networking activities must have a unique IP address. Network services that use TCP/IP identify other network hosts by using IP addresses. The IP address provides the exact location of a host device on a network. If the internet protocol determines that a destination address is on the local network, it transmits the packet directly to the network host. If it is determined ...

Click here to read more arrow

A Multi User Chat System In Java

23 Mar 2015 10 May 2017

7 (2,788 )

The aim of this project is to develop an multi-user chat system to facilitate communicate between users with in the corporate or scientific organization. Chat application is to allow user for private chat, group chat (conference chat), share files while chatting, store and archive communicated messages. Chat application should allow do download desktop based application installed on local system to connect chat server and user should bale ...

Click here to read more arrow

Three Major Categories Of Software

23 Mar 2015 10 May 2017

12 (4,770 )

Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category. Software applications refer to programs on a client machine which are written to perform specific tasks. Nowadays, ...

Click here to read more arrow

Programming Languages: Types and Uses

23 Mar 2015 10 May 2017

8 (2,976 )

1. Introduction C Programming is a computer language that is structured and disciplined approach to program design. It's a good systems programming language. This is faster than java, more predictable performance and it has low level operations and it has a lot scope for bugs. This C programming has no Boolean type . It is used by using int false is zero and true is non-zero A ...

Click here to read more arrow

User Side And Server Side Factor

23 Mar 2015 09 May 2017

6 (2,031 )

In this report, I will describe and explain about user side and server side factor that can influence the performance of a website and state particular server side capabilities with consideration for limitation of equipment and software customer may be using to browse the website. User side factor: Hardware: The speed of computer system can influence the performance of the website. If the computer system is slow ...

Click here to read more arrow

Introduction Of Computer Virus

23 Mar 2015 09 May 2017

4 (1,553 )

Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet. The computer virus also can be spread by via disk, CD, thauDVD or flash drive or other devices.Usually, a virus is written to target a network ...

Click here to read more arrow

Study On CPU And Memory Hierarchy

23 Mar 2015 09 May 2017

5 (1,861 )

CPU must have compatibility with the memory in the computer system. Memory cannot increase the speed of the processor however it can help the processor increase its performance. If the CPU doesn't get the data it requires, it would sit idle wasting CPU clock cycles that would decrease the overall throughput and execution of the processes. If data needs to be accessed to and from hard disk ...

Click here to read more arrow

Assembler, compiler and interpreter

23 Mar 2015 09 May 2017

3 (898 )

Assembler 1. An assembler is not equivalent to an interpreter, or compiler, assembly language is a low level language. 2. An assembler is one form of program translation. This is one relationship between assembler, compiler and interpreter. Each assembly language statement directly corresponds to one machine instruction. 3. The Assembler changes Assembly instructions into machine language, whereas a Compiler runs a higher level programming language instructions into ...

Click here to read more arrow

Differences Between RPC And RMI

23 Mar 2015 09 May 2017

5 (1,888 )

In enterprise application there is possibility that resources need to be access across multiple system to do a business process. One of the Java's solutions for distributed application is Remote Method Invocation (RMI). Objective of this paper is understand how a RMI system works in real time scenarios and how enterprise application can implemented using java RMI API's. An enterprise distributed system is a set of objects ...

Click here to read more arrow

How Firewalls Mitigate Attacks

23 Mar 2015 09 May 2017

13 (5,048 )

Network Security is the process by which digital information assets are protected. If the network security is compromise, severe consequences could occur such as loss of confidential information [6]. To protect the networks the goal of security should be maintain integrity, protect confidentiality and ensure availability [5]. To begin the network security process, you have to first develop security policy and access rules. This policy must identify ...

Click here to read more arrow

NoSQL Databases | Research Paper

23 Mar 2015 08 May 2017

10 (3,840 )

In the world of enterprise computing, we have seen many changes in platforms, languages, processes, and architectures. But throughout the entire time one thing has remained unchanged - relational databases. For almost as long as we have been in the software profession, relational databases have been the default choice for serious data storage, especially in the world of enterprise applications. There have been times when a database ...

Click here to read more arrow

Classification Of Facility Layout Problems

23 Mar 2015 08 May 2017

15 (5,640 )

The purpose of this literature review is to explore the general facility layout problem, the dynamic facility layout problem, the models that have been used to represent the facility layout problem and the algorithms that solve the models,. Classification of Facility Layout Problems "Determining the most efficient arrangement of physical departments within a facility is defined as a facility layout problem (FLP)" (SMTF Ghomi et al, 2011). ...

Click here to read more arrow

Literature Review: Methods Of Virus Protection

23 Mar 2015 08 May 2017

13 (5,045 )

Computer viruses are most critical area in computer science. All computer users in the world are suffering from this threat. Viruses reproduce themselves and spread through computer to computer as well as network to network. There are some antivirus software and some best practices to prevent from computer viruses. As well as this literature review contains the present situation of computer viruses, protection from computer viruses and ...

Click here to read more arrow

Windows Vs Linux Comparison

23 Mar 2015 05 May 2017

4 (1,248 )

Linux and windows operating systems are software with programs and information needed to run and monitor the computer programs. An operating system is one of the most important computer programs which a computer can not run without them. Even though they are both important for computer programs, Linux and windows are two different operating systems and they have different features which basically differentiates them. (Web msdn.microsoft.com, online)[26th ...

Click here to read more arrow

A Remote Desktop Application For Android

23 Mar 2015 05 May 2017

12 (4,565 )

The aim of this project is to develop a simple-to-use remote desktop application which enables users to remote view contents of their desktop and view, create, edit and delete files and folders remotely. The application runs on a portable device (such as a cell-phone or tablet) which fully supports the Android mobile platform and is equipped with features like WiFi, touchscreen, document editor etc. An important goal ...

Click here to read more arrow

Feature extraction using crossing number (cn) and ridge tracking technique

23 Mar 2015 04 May 2017

6 (2,221 )

PROPOSED ALGORITHM: FEATURE EXTRACTION USING CROSSING NUMBER (CN) AND RIDGE TRACKING TECHNIQUE The various steps involved in feature extraction are as given below: 3.2.1 ADAPTIVE BINARIZATION The enhanced greyscale image is converted to a binary image using adaptive binarization [1]. Global thresholding is not used for binarization because of possibilities of non-uniform illumination on the surface of scanner. Thus using adaptive binarization with a window size of ...

Click here to read more arrow

The Different Smart Home Technologies

23 Mar 2015 04 May 2017

9 (3,397 )

In this report I am going to explain the different smart home technologies EIB also known as KNX and CBUS. I will be giving a full explanation about what each system is capable of and a little about their company background. I will also be comparing both system with the advantages and disadvantages for each system. (Add more) EIB (KNX) System EIB (KNX) is the only worldwide ...

Click here to read more arrow

The Plc Controlled Systems

23 Mar 2015 04 May 2017

9 (3,466 )

This document has been created to give an overview of what PLC Systems are and why we use them in modern day life. By writing this report I hope to give a good understanding of what I know about PLC Systems. I will start with a short history of PLCs showing how they first started off to what we currently use today including the different design types. ...

Click here to read more arrow

The System Hacking Cycle

23 Mar 2015 04 May 2017

5 (1,759 )

System hacking means to hack system password within the operating system. Many hacking attempts start with attempting to crack passwords. However, passwords are the key piece of information needed to access a system. Users, while creating a password, often select password that are prone to being cracked. Passwords may be cracked manually or with automated tools such as dictionary or brute-force method, each of which are discussed ...

Click here to read more arrow

Communication Satellites And Computer Networks

23 Mar 2015 03 May 2017

4 (1,459 )

A communication satellite which is sometimes abbreviated to COMSAT is an artificial satellite to engage in space for the purpose of telecommunications. Modern communication satellites use different orbits including geostationary orbits, Molina orbits, other elliptical orbits and low earth orbits. They are also used for mobile applications such as communications to ships, vehicles, planes and hand held terminals and for TV and radio broadcasting, for which application ...

Click here to read more arrow

Network Troubleshooting Symptoms And Solutions

23 Mar 2015 03 May 2017

19 (7,235 )

Data transfer from one point to another is the most important aspect of computers. Networks should be safe, reliable and secure for data movement. Any problem which occurs with computer networks causes havoc. Understanding networks, the way they work, and how they are built helps a network administrator to identify and fix the problems. 11.2 Procedure to troubleshoot network problems A simple formula that enables network administrators ...

Click here to read more arrow

Fuzzy Logic Control Implementation On Pic Microcontroller

23 Mar 2015 03 May 2017

5 (1,819 )

Conventional PID controllers were used as a control strategy for various industrial processes from many years due to their simplicity in operation. They used mathematical models to control the plant for different process control applications. Fuzzy logic based control systems were introduced by Lotfi Zadeh to optimize the process control parameters in better way. In this paper, we have implemented a DC motor control strategy with the ...

Click here to read more arrow

Literature Survey On Steganography

23 Mar 2015 03 May 2017

12 (4,461 )

In this chapter, the literature survey on the steganography and various network security mechanisms are described. Many existing algorithms for steganography since 1991 to 2009 are studied and presented in this literature survey. Numbers of web sites as well as research papers are referred on virtualization, ARP Spoofing, IDS Architectures. The description of the research papers referred pertaining to steganography and network security are given in the ...

Click here to read more arrow

A Study About Blue Eye Technology

23 Mar 2015 03 May 2017

9 (3,356 )

Blue Eyes system provides technical means for monitoring and recording the operator's basic physiological parameters. The most important parameter is saccadic activity1, which enables the system to monitor the status of the operator's visual attention along with head acceleration, which accompanies large displacement of the visual axis (saccades larger than 15 degrees). Complex industrial environment can create a danger of exposing the operator to toxic substances, which ...

Click here to read more arrow

Simulation Of Scheduling Algorithms

23 Mar 2015 03 May 2017

10 (3,816 )

Abstract- In this term paper we have discuss simulation of scheduling algorithm. We have discuss various type of scheduling algorithm such as robin round, first comes first served, shortest job first, and etc. We also discuss its advantages and disadvantages. In this term paper we take some c programme based on this scheduling algorithm to understand properly. We also include some graphical representatiion of each scheduling. From ...

Click here to read more arrow

Problem For Swinton Hotel Management

23 Mar 2015 03 May 2017

8 (2,979 )

The aim of this project is to build a comprehensive tool E-reservation system for Swinton Hotel Management. "Swinton" Hotel provides all facilities like, advance booking room facilities, Better Food quality and also management believes to present good customer services. Management does not have proper reservation system and lack of data management system. In addition, they don't have any advance E- reservation system for tourist. The organisation needs ...

Click here to read more arrow

Study On Computer Input And Output Devices

23 Mar 2015 03 May 2017

7 (2,635 )

The history of ergonomics is start from Greece. The meaning of ergonomics come from Greek words ergon [work] and nomos [natural laws] and first entered the modern lexicon when Wojciech Jastrzębowski used the word in his 1857 article Rys ergonomji czyli nauki o pracy, opartej na prawdach poczerpniętych z Nauki Przyrody (The Outline of Ergonomics, i.e. Science of Work, Based on the Truths Taken from the Natural ...

Click here to read more arrow

Feasibility Study On Le Diner Restaurant

23 Mar 2015 03 May 2017

8 (3,024 )

There are various approaches that can be deliberate for considering project feasibility and vital consideration necessary for each feasibility methods. The purpose of this study is not to solve the problem, but to decide whether the problem is worth solving. It includes tests such as Operational, Technical, Economic and Schedule feasibility. Operational feasibility study tests the operational range of the new information system before it is going ...

Click here to read more arrow

Google And Yahoo Search Engine

23 Mar 2015 03 May 2017

26 (10,170 )

Web search engines are keys to the immense treasure of information. Dependency on the search engines is increasing drastically for both personal and professional use. It has become essential for the users to understand the differences between the search engines in order to attain a higher satisfaction. There is a great assortment of search engines which offer various options to the web user. Thus, it is significant ...

Click here to read more arrow

Different uses for spreadsheets

23 Mar 2015 03 May 2017

4 (1,250 )

Spreadsheets Coursework There are many different uses for spreadsheets; the main use for spreadsheets is using basic formulas to work out various sums. They can also used to represent data graphically using graphs and charts. In this document I plan to explore the various uses for spreadsheets in different areas and focus on one specific area and look at the uses for a spreadsheet in that area ...

Click here to read more arrow

Programmable Logic Controller System Plc

23 Mar 2015 03 May 2017

7 (2,594 )

Two decades ago, machines were simple and work in factories was, for the most part, manual in nature. Machines were designed to be manually controlled. Today, if people look for around them will find many things have the control systems, which are necessary to organize the complex devices. The control system is of primary importance for devices and machines in factories, aircraft, cars, and even in some ...

Click here to read more arrow

Windows 7: An overview and analysis

23 Mar 2015 02 May 2017

11 (4,172 )

Windows 7 Windows 7 is the latest the most release version of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs.it uses Kernel type:Hybrid Windows 7 introduced a large number of new features, Presentations given by Microsoft is multi-touch support, Redesigned Windows Shell with a new taskbar,the "Superbar" Home networking system called HomeGroup, ...

Click here to read more arrow

Literature Review Of Load Shedding Methods

23 Mar 2015 02 May 2017

15 (5,733 )

In chapter 1, a brief discussion about active distribution networks was presented. The importance of operation of islanded distribution networks was discussed. This chapter is intended to give the reader a better understanding of the load shedding methods currently applied and proposed over the years. However, it is assumed that the reader is familiar with basic power system engineering. In section 2.2, the area of probability of ...

Click here to read more arrow

A Study On Computer Aided Design

23 Mar 2015 02 May 2017

7 (2,568 )

Before the 1070s, nearly every drawing produced in the world done with pencil or ink on paper. Minor changes require erasing and redrawing while major changes often meant recreating the drawing from the scratch. A change in a drawing will affect the other documents and all of these changes and recognition are done manually which is time consuming (iBM.com, 2003). The introduction of Computer Aided Design (CAD) ...

Click here to read more arrow

Tata Motors Significance Of ERP Automotive Sector

23 Mar 2015 02 May 2017

5 (1,610 )

Tata Motors Ltd. is a multinational company, based in Mumbai, India. It is part of the Tata Group, and formerly known as Tata Engineering and Locomotive Company. Tata Motors is the largest automobile company in India, with consolidated revenues of $ 20 million in 2009-10. Tata Motors is number one in commercial vehicles and among the best players in the sector of passenger vehicles. Tata Motors has ...

Click here to read more arrow

Software Engineering And HCI

23 Mar 2015 02 May 2017

8 (3,004 )

In this essay I will talk about the issue which currently annoying the HCI community about its connection with software engineering and how to merge them. We encourage both HIC and software engineering to take a larger view, and we suggest system engineering as one of the structure for achieving such merging. Users sometimes face complex tasks within the progression of interactive software. There is no adequately ...

Click here to read more arrow

Business Game As A Training Method

23 Mar 2015 02 May 2017

5 (1,857 )

The use of lecture, handout, case studies, coaching, and other methods are very common for the training purposes. Each of the method has its own specific usage and yet it also consists of its limitation. Business games are different from the traditional training method and it has now shown to be a valuable and enjoyable teaching tool. They allow the participant to be involved directly instead of ...

Click here to read more arrow

Memory Units And Memory Hierarchy

23 Mar 2015 01 May 2017

6 (2,392 )

Memory organisation is combination of several memory devices efficiently. Memory devices are combined and organised based on their characteristic such as access time, speed, storage capacity, physical size and cost per byte. Memory devices organised in such a way that computer system should operate at highest speed, provide bulky storage capacity, smaller in size and less in a cost. Memory organisation uses primary memory devices and secondary ...

Click here to read more arrow

3D Graphics Animation Technology

23 Mar 2015 01 May 2017

5 (1,917 )

Abstract- In this paper a simple study to gain what is today 3D graphic animation technology has been researched. A brief explanation on the history and variety technology of 3D graphics is obtained. The design of 3D animation graphic is explained in introduction section. The inter information of the technology were discussed by referring the available internet sources. The figure of the 3D animation graphics also have ...

Click here to read more arrow

Different Types Of Computer Memory

23 Mar 2015 01 May 2017

4 (1,368 )

In earlier computers, the most common form of random-access storage for computer main memory employed an array of doughnut-shaped ferromagnetic loops referred to as cores. Hence, main memory was often referred to as core, a term that persists to this day. The advent of, and advantages of, microelectronics has long since vanquished the magnetic core memory. Today, the use of semiconductor chips for main memory is almost ...

Click here to read more arrow

Comparison Of RC5 And RC6 Block

23 Mar 2015 01 May 2017

6 (2,150 )

Due to rapid growth in Internet and networks applications so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. So it is desirable to develop a systematic understanding of database security concerns and their solutions and to come up with a framework. Ideally, such a framework should give some assurance that all relevant security problems have been addressed, ...

Click here to read more arrow

Ofdm Techniques In Satellite Communications

23 Mar 2015 01 May 2017

6 (2,039 )

The concept of Orthogonal Frequency Division Multiplexing was first proposed in 1960 and developed in the 70s .All bandpass modulation schemes use single carrier by adjusting frequency, phase or amplitude .As Digital transmission uses high Bandwidth (data rates), the duration of bit information becomes smaller. The system becomes more vulnerable to loss of information from impulse noise,signal reflections and other impairments. As the bandwidth used by a ...

Click here to read more arrow

Sr Research Experiment Builder

23 Mar 2015 01 May 2017

12 (4,406 )

The SR Research Experiment Builder SREB is a visual experiment creation tool for use by Psychologists and Neuroscientists. The SREB is designed to be easy to use while maintaining a high degree of flexibility. This unique design combination allows for a wide range of experimental paradigms to be created by someone with little or no programming or scripting expertise. When used in combination with the SR Research ...

Click here to read more arrow

Testing Webservices Using Soapui And Jmeter

23 Mar 2015 01 May 2017

7 (2,767 )

Web servers are an integral part of a web application. Choosing the right web server that meets the application�s requirements and the expected load is a key decision in providing a real-time response. This paper studies and compares the performance of different open source web servers like Apache Tomcat and Jetty under different loads. The objective is to carry out load testing using Jmeter, which is an ...

Click here to read more arrow

New Era Of Science And Technology

23 Mar 2015 01 May 2017

9 (3,236 )

In this new era of science and technology, it is very difficult to imagine people working without assistance of computers. Our dependency on computers has led to the rapid development of faster, smaller microprocessor, multi-tasking software and better graphics cards for them. Computes already become a daily activities needs for personal, social, educational, professional, and entertainment purposes. Today video game are very famous, almost 75% of heads ...

Click here to read more arrow

Application On Blood Donation Using Android Platform

23 Mar 2015 28 Apr 2017

4 (1,387 )

Android powers hundreds of millions of mobile devices in more than 190 countries around the world. Its the largest installed base of any mobile platform and growing fast-every day another million user's power up their Android devices for the first time and start looking for apps, games, and other digital content. Android gives you a world-class platform for creating apps and games for Android users everywhere, as ...

Click here to read more arrow

Processor Is The Heart Of The Computer

23 Mar 2015 27 Apr 2017

10 (3,620 )

A microprocessor or processor is the heart of the computer and it performs all the computational tasks, calculations and data processing etc. inside the computer. Microprocessor is the brain of the computer. In the computers, the most popular type of the processor is the Intel Pentium chip and the Pentium 1V is the latest chip by Intel Corporation. The microprocessors can be classified based on the following ...

Click here to read more arrow
ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now