ABSTRACTAs mobile phone handsets attain increasing capabilities, we see many more opportunities for novel applications development. These handsets are typically characterized as constrained computing platforms, due to limitations in computing, storage and interface capabilities. Specialized development environments, such as J2ME, allow for cross- platform development that respects these limitations. While it is important to respect these resource constraints, we also want to highligh...
ABSTRACTVirtual Queue-based marking schemes have been recently proposed for AQM (Active Queue Management) in Internet routers. We consider a particular scheme, which we call the Adaptive Virtual Queue (AVQ), and study its following properties: stability in the presence of feedback delays, its ability to maintain small queue lengths and its robustness in the presence of extremely short flows (the so-called web mice). Using a linearized model of the system dynamics, we present a simple rule to ...
ABSTRACT This project is all about Windows management and instrumentation, Window is an operating system that is a typical example of free software and open source development. The source code of Window is available for anyone to use, modify, and redistribute freely. The many Window distributions differ for various reasons including technical, organizational, and philosophical. Technical variations include support for different hardware devices and systems or software package configurations. ...
ABSTRACTOne of the challenges of modern information retrieval is to rank the most relevant documents at the top of the large system output. This calls for choosing the proper methods to evaluate the system performance. The traditional performance measures, such as precision and recall, are based on binary relevance judgment and are not appropriate for multi-grade relevance. The main objective of this paper is to propose a framework for system evaluation based on user preference of documents. ...
ABSTRACT Small and mid-size businesses often have unique requirements for enterprise resource planning software that demand full capabilities without complexity. They also want to see a quick return on investment. Vendors now are stepping up. The time is ripe for small and mid-size businesses to adopt enterprise resource planning (ERP) applications, according to leading industry analysts. There are more options than ever among the crowded ERP-vendor field targeting the small and mid-size ...
ABSTRACTA Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private netw...
ABSTRACTSteganography is an art of hiding sensitive data or some confidential information in some cover medium file. In this project, video steganography method has been implemented. As name suggest, video steganography means hiding any digital data in video files. The aim of this project is to hide, detect and retrieve the secret message hidden in video frames (images). This application is capable of hiding a text file in any desired frame in the video. It can also create an extra new frame ...
ABSTRACT The research work based on strengthening competitive advantage of rural business through quality and environmental management system was carried using Emenite Ltd Emene Enugu a company in the manufacturing sector of Nigerian Economy as a case study. This was as a result of the scope of the research work which had its main points as competitive advantage, quality system and environmental management. To make the work a fact based one, questionnaires were distributed randomly to staffs...
ABSTRACT The XTC ad-hoc network topology control algorithm shows three main advantages over previously proposed algorithms. First, it is extremely simple. Second, it does not assume the network graph to be a Unit Disk Graph; XTC proves correct also on general weighted network graphs. Third, the algorithm does not require availability of node position information. Instead, XTC operates with a general notion of order over the neighbors’ link qualities. In the special case of the network graph...
ABSTRACTThe business of content providers is being threatened by technology advances in hardware, software and IP networks resulting in an increasing amount of illegal copies available online as well as offline. Digital rights management standards are being developed for the digital content and digital watermarking, a popular technique for content authentication and forgery prevention is viewed as an enabling technology to protect distributed content from unauthorized reuse, or reuse with ina...
ABSTRACT Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and, typically, there are discrepancies between the actual workflow processes and the processes as perceived by the management. Therefore, we have developed techniques for discovering workflow models. The starting point for such techniques ...
ABSTRACTThe structured light vision system is a successfully used for the measurement of 3D surface in vision. There is some limitation in the above scheme, that is tens of picture are captured to recover a 3D sense. This paper presents an idea for real-time Acquisition of 3-D surface data by a specially coded vision system. To achieve 3-D measurement for a dynamic scene, the data acquisition must be performed with only a single image. A principle of uniquely color-encoded pattern projection ...
ABSTRACT This study discusses factors affecting the customer value, and the performance of the WEBSHOP MAIL WEBSHOP SITE model. In our case, the biggest trading company in our country developed Webshop mail webshop site model to be taken into use in its supermarkets. The time was not yet right to implement the web shopping with shopping cart, but useful knowledge was gained as for the internal and external factors to be taken into account when planning WEBSHOP MAIL WEBSHOP SITE. The company...
ABSTRACT Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a streaming provider. The name refers to the delivery method of the medium rather than to the medium itself. The distinction is usually applied to media that are distributed over telecommunications networks, as most other delivery systems are either inherently streaming (e.g., radio, television) or inherently non-streaming (e.g., books, video cassettes, audio CDs). The v...
ABSTRACTNeural Network Based Character Pattern Identification System has been one of the active and challenging research areas in the field of data computing, image processing and pattern recognition. It has numerous applications that includes, reading aid for blind, bank cheques and conversion of any hand written document into structural text form et cetera. Neural Network (NN) with its inherent learning ability offers promising solutions for handwritten character identification and recognit...
Privacy Policy | Refund Policy | Terms | Copyright | © 2023, Afribary Limited. All rights reserved.