Asynchronous messaging services using Java
Dissertation - 47 pages - Computer science
Messaging Services provides asynchronous communication facility between two Business organizations. This system saves the time, money and reduces the man-power and both participant organizations may be benefited by each other. Consider two business organizations are an insurance company and the...
One dimensional cellular automata based security scheme with both authentication and confidentiality
Thesis - 11 pages - Electronics, mechanics, engineering & technology
In the past few years organization have widely adopted local area network (LAN), wide area network (WAN) and internet to take advantages of advancement in technology1, 2. As a result of connecting private and internal network to the outside network, exchange of information is greatly facilitated....
Security using firewalls
Thesis - 6 pages - Computer science
In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the dependence of...
Active character technology based on neural networks Genetic Algorithms and AI
Thesis - 7 pages - Computer science
A combination of Neural networks genetic algorithms and conventional computing in Multimedia and Gaming industry has never been attempted before. Existing technologies operate on fixed databases and manipulate limited data that is bound by some logical algorithm. Even many of the AI based...
Network security on Bluetooth
Essay - 5 pages - Electronics, mechanics, engineering & technology
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices...
Nano-robots: The molecular manipulators
Thesis - 8 pages - Electronics, mechanics, engineering & technology
A human fetus begins life as a single cell, and then divides to become two cells, then four, then eight and so on. Nanotechnology aims to build in a similar way, constructing objects out of their most basic components. A nanometer is a thousandth of a millionth of a meter. This is about as far...
A look at cogeneration
Thesis - 14 pages - Computer science
Power is one of the basic requirements for the economic development of a country. The performance of various activities is dependent on the availability of adequate and reliable power supply. Our country has made a rapid progress in the field of electricity generation. Thermal power plants are a...
Grid computing: Faster networking
Case study - 6 pages - Computer science
Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious...
Security and advantages of cluster computing over distributed systems
Thesis - 7 pages - Computer science
A cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. In the case Server, Cluster consists of two types of participant's dispatchers and servers. The goal of a cluster is to allow distributing of the computing load over the several...
Cellular communication technologies: Understanding how the cellular service works
Thesis - 7 pages - Electronics, mechanics, engineering & technology
Today's work force is demanding mobility, flexibility and real-time access to critical data. Over recent years, the trend towards the smaller and faster device, coupled with the need for information access on the move, has paved the way for a new technology of the Mobile Communications. Mobility...
Authentication techniques: An overview
Thesis - 8 pages - Computer science
Authentication is a process by which one can prove the identity of a communicating partner and/or confirm the genuineness of a document. The process becomes a corner stone of security services in any applications ranging from defense sector to grocery shop. Initially,...
Parellel performance modelling using a genetic programming based error correction procedure
Thesis - 6 pages - Computer science
Performance models of high performance computing (HPC) applications are important for several reasons. First, they provide insight to designers of HPC systems on the role of subsystems such as the processor or the network in determining application performance. Second, they allow HPC centers more...
A report on activities on and around OFDM
Thesis - 5 pages - Physics
Multi-carrier communications are currently in a state of very rapid development, both in the introduction of new techniques and in its application to a wide variety of channels and services. Orthogonal Frequency-Division Multiplexing (OFDM) is a bandwidth-efficient signaling scheme for wideband...
Providing mobility management in a heterogeneous wireless networks
Thesis - 5 pages - Computer science
Mobile Routers moving in a heterogeneous network environment can take advantage of the different, often complementing, characteristics of the various wireless network technologies. Satellite and cellular networks can provide wide coverage outside urban areas. However, the cost of communications...
Location-based service over 3GPP IMS: Approaching real-time connectivity with the next generation of network communication
Essay - 5 pages - Electronics, mechanics, engineering & technology
Emerging mobile applications will need location information for delivering the right services to right persons at right places and time. A location-based service (LBS) is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability...
Non inclusion property in chip multiprocessors with multi-level cache
Thesis - 5 pages - Electronics, mechanics, engineering & technology
Difference between speed of processor and memory is increasing with the advent of new technology. Chip Multi Processors (CMP) has further increased the pressure on the memory hierarchy. So it has become important to manage on chip memory very judiciously to reduce average memory access time....
Cyber Terrorism: The darker side of internet applications
Thesis - 4 pages - Computer science
Cyber terrorism is the convergence of cyberspace and terrorism. Computers and the Internet are aggressively being used by many international terrorist groups. Although cyber terrorism attacks have not yet happened and also there is no such identified substantiation that terrorists are planning a...
Growth of distributed systems using grid computing and softer aspects of E science
Thesis - 7 pages - Computer science
Grid computing and eScience are two major areas of growth of distributed systems. The grid concept refers to the virtualization of computing resources in the sense that end-users should have the illusion of using a single source of computing power without knowing the locality of the computation....
Use of SOA and semantics for creating and retaining consistency in loosely coupled systems
Thesis - 5 pages - Computer science
The primary objective of service-oriented architecture (SOA) is to use information technology to address the key goals of business today: innovation, agility, and market value. Agility in SOA is achieved by use of the principles of encapsulation, modularity, and loose coupling. Loose coupling...
A high level language abstraction for reconfigurable computing
Thesis - 7 pages - Computer science
The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain parameters of the SVC...
Sensor protocols for information via negotiation: A data centric routing protocol for wireless sensor networks
Case study - 6 pages - Computer science
The emergence of Wireless Sensor Networks (WSN) as one of the dominant technology trends in the coming decades has posed numerous challenges for researchers. These networks are likely to be comprised of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in...
Idiosyncratic applications of data mining in E learning environments
Thesis - 5 pages - Computer science
Data Mining is a very popular and effective way of discovering new knowledge from large and complex data sets. Its benefits are its ability to gain deeper understanding of the patterns previously unseen using current available reporting capabilities. Internet education arose from traditional...
Computer vision signal processing on graphics processing units
Thesis - 5 pages - Computer science
In some sense, computer graphics and computer vision are inverses of one another. Special purpose computer vision hardware is rarely found in typical mass-produced personal computers, but graphics processing units (GPUs) found on most personal computers, often exceed (in number of transistors as...
Network technologies for cluster computing
Thesis - 12 pages - Computer science
A broad and growing range of possibilities are available to designers of a cluster when choosing an interconnection technology. As the price of network hardware in a cluster can vary from almost free to several thousands of dollars per computing node, the decision is not a minor one in...
A new era in MPSOC at runtime for DES using RTOS 10- steps algorithm
Thesis - 3 pages - Computer science
This research paper is on the design methodology required to make intelligent decisions about the a new ERA AND APPRAOCH for MPSOC At Runtime using RTOS Algorithm. However we see that evidence of the soundness of the methodology by applying it on actual applications is a major requirement. This...
Satellite link emulation
Thesis - 4 pages - Computer science
Herein is a research paper which depicts the use of emulation for testing purpose to illustrate the propagation of signals in the satellite communication. With the software NIST Net we could emulate any kind of links and get the results with actual packets in consideration. The procedure testing...
Remote triggering based embedded servers for smart home environments
Thesis - 4 pages - Computer science
Smart home systems are expected to become key research area for ubiquitous and embedded system Computing in coming years. In this paper, a new scheme in smart home systems technology using Embedded server for providing intelligent control of home appliances is proposed. A wireless based Embedded...
Motion picture compression technique used in digital television sets
Thesis - 5 pages - Electronics, mechanics, engineering & technology
Digital television is a completely new way of broadcasting and is the future of television. With the advent of digital technology, digital audio and video compression and other advanced signal processing, it is possible to transmit and receive broadband data over co-axial cable and through...
Speech processing using wavelete transformation and its implementation in digital hearing aids
Thesis - 4 pages - Electronics, mechanics, engineering & technology
Hearing impairment is the number one chronic disability affecting people in the world. Many people have great difficulty in understanding speech with background noise. This is especially true for a large number of elderly people and the sensorineural impaired persons. Several investigations on...
Implementation of vector quantization technique in image compression and speech recognition
Thesis - 6 pages - Electronics, mechanics, engineering & technology
In this paper, we have described the application of Vector Quantization in Image and Speech processing. Compressing image data by using Vector Quantization (VQ)[1]-[3] will compare Training Vectors with Codebook. The result is an index of position with minimum distortion. Basically there are...