ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among th...
ABSTRACT In addition to sending messages between users, instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text messaging. In other words, the technique shown in Figure 2 is always used for file transfers. This peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network. Currently, none of the major instant mes...
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of nitc student information system. Almost all our Higher Institution has gone into nitc student information system because of the extraordinary benefit resulting from information technology. Information technology has enabled an online administration system to ...
ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. F...
ABSTRACT A vehicle Speed Sensor (VSS) is an automotive tachometer that gathers information regarding your wheels' rotational speed. Also known as a wheel speed sensor, this device is comprised of a toothed metal disk and a detector. As the wheels rotate, this sensor creates a magnetic field wherein the pulses that the field generates are then collected and passed on to your car's electronic control module or ECM. TABLE OF CONTENTS CHAPTER ONE 1.0INTRODUCTION 1.1STATEMENT OF THE PROBLEM 1.2...
ABSTRACT Increasingly, intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in manageme...
ABSTRACT Interest in large-scale sensor networks for both civilian and military applications is burgeoning. The deployment of such networks will require new approaches in resource discovery, query processing and data routing. This paper presents a framework and some analytic results for query satisfaction and data routing in networks consisting of clients, sensors and data filtering/fusion servers. In this model, multiple clients pose queries that are satisfied by processing a set of sensor d...
ABSTRACT The term Puyo game covers a range of computer-based packages, which aim to provide interactive instruction usually in a specific subject area, and many predate the Internet. These can range from sophisticated and expensive commercial packages to applications developed by projects in other educational institutions or national initiatives to simple solutions developed by individuals with no funding or support to tackle a very Interactive Tutor problem. The amount of time and money inve...
ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability ...
ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...
ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...
ABSTRACT Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be ...
ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or ...
ABSTRACT This project work, is a computerization it Performance evaluation of routing algorithm using NS2 of an organization. Full duplex asynchronous data transfer system based on a single-phase two-line coding. (a) Data is transmitted from a primary module PM to a secondary module SM, while data is transmitted from the secondary module SM to the primary module PM independently at the same time. (b) Code words A and B, in which data and color (request signal: ODD or EVEN) are superimpose...
ABSTRACT Current GPUs have many times the memory bandwidth and computing power compared to CPUs. The difference in performance is getting bigger as the evolution speed of the GPUs is higher than of the CPUs. This make it interesting to use the GPU for general purpose computing (GPGPU). I begin by looking at the architecture of the GPU, and some different techniques for programming on a GPU, including some of the available high- level languages. �...