Natural & Applied Sciences

Research Papers/Topics Natural & Applied Sciences

SEARCH-WEB BASE SEARCH ENGINE

ABSTRACT Web base search engine is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Windows XP and Vista ...

SCALABLE AND EFFICIENT END TO END NETWORK TOPOLOGY INFERENCE

ABSTRACT To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topology among a group of hosts. Previously, Max-Delta has been proposed to infer a highly accurate topology with a low number of traceroutes. However, Max-Delta relies on a central server to collect traceroute results and to select paths for hosts to traceroute. It is not scalable to large groups. In this paper, ...

AUTOMATIC DEPENDENT SURVEILLANCE BROADCASTING (ADSB)

ABSTRACT ADS-B, which consists of two different services ADS–B Out and ADS–B In, will be replacing radar as the primary surveillance method for controlling aircraft worldwide. In the United States, ADS-B is an integral component of the NextGen National Airspace strategy for upgrading/enhancing aviation infrastructure and operations. The ADS-B system can also provide traffic and government generated graphical weather information through TIS-B and FIS-B applications.[3] ADS-B enhances safet...

SHORTEST NODEFINDER IN WIRELESS AD HOC NETWORK

ABSTRACTAd hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of introducing the physical shortest path for the selection of best route offering the fast connection and greater throughput.TABLE OF CONTENTTITLE PAGE ...

SMART KNOWLEDGE PROVIDER

ABSTRACTThe Smart Knowledge Provider and the CAD use a mutual active authentication protocol to identify each other. The card generates a random number and sends it to the CAD, which encrypt the number with a shared encryption key before returning it to the card. The card then compares the returned result with its own encryption. The pair may then perform the operation in reverse. Once communication is established, each message between the pair is verified through a message authentication cod...

STACK IP: NEW PACKET MARKETING AND FILTERING MECHANICS FOR DDOS AND IP SPOOFING DEFENSE

ABSTRACTNetwork administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses, how they are expressed, and the types of unicast addresses assigned to network node interfaces. We demonstrate that the dynamic behavior of queue an...

STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA

ABSTRACTThis paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to take action to contain the attacks appropriately before...

DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND SERVICES APPLICATION WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACTIn our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it.The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among the ...

STEGANOGRAPHY – AN ART OF HIDING DIGITAL INFORMATION

ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your videos and they would never know it had your personal information on it! Or, if you want more privacy when sending e-mails, encrypt a message in a pictu...

TELECOM INVENTORY MAINTENANCE SERVICES APPLICATION WITH ERROR TRACKING

ABSTRACT One of the more popular benefits to outsourcing your maintenance is the ability to improve department focus. Being able to outsource your facility maintenance lets your employees focus more on their higher priority tasks and operational issues. When it comes down to it, facility maintenance should be worry free and reduce stress on both you, your staff, and your company. This is why outsourcing your maintenance also allows your staff to be more efficient and effective while operating...

TEXT TO SPEECH TECHNOLOGY

ABSTRACT Text-to-speech (TTS) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice speaking the text. This project focuses on TTS software tools that use synthesized speech to read any text. There are a wide range of TTS software tools available....

AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY

ABSTRACT Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- th...

ASP: NET PROJECT TITLES

ABSTRACT Active Server Pages (APS) also known as classic ASP or ASP classic was Microsoft’s first server side script engine for dynamically generated web page initially released as an add-on to internet information services (HS)via the windows NT 4.0 option pack (Ca 1998) of was subsequently included as a free component of windows server (since the initial release of windows component of windows 2000 server. ASP NET has supersede ASP. ASP 2.0 provided six built in object application ASP Err...

APPLICATION OF MOBILE AGENT IN DISTRIBUTED MULTIMEDIA DATABASE SYSTEM

ABSTRACT Multimedia technologies are attracting more and more interest every day. Video-on-Demand is one of the buzzwords today and is now available for the public. Content providers such as publishers, broadcasting companies and audio/video production firms must be able to archive and index their productions for later retrieval. This is a formidable task and it is even more so when the material to be handled encompasses several media types and covers a time span of several years. In order fo...

ANTI-VIRUS

ABSTRACTBringing it to a layman, an Anti-virus can be explained as the cure to virus and viral infections in the computer system. Though virus has been identified to be existing and causing harms in various forms, there are a variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-ca...


8101 - 8115 Of 8202 Results
@