Research Papers/Topics in Computer Science

Comparison of First order predicate logic fuzzy logic and non-monotonic logic as knowledge representation methodology

CONTENTS,INTRODUCTION,KNOWLEDGE MANAGEMENT AND KNOWLEDGE REPRESENTATION,LOGIC AS A KNOWLEDGE REPRESENTATION METHOD,CLASSIFICATION OF LOGIC,PROPERTIES OF KNOWLEDGE,EVALUATION OF KNOWLEDGE REPRESENTATION METHODS,CONCLUSION,REFERNCES

Intuition in insight and non-insight problem solving

CONTENTS,WHAT IS PROBLEM SOLVING?,WHAT IS META-COGNITION?,INSIGHT PROBLEM SOLVING,NON-INSIGHT PROBLEM SOLVING,EXPERIMENTS CONDUCTED,THE RESULTS OF THE EXPERIMENTS,CONCLUSION,REFERNCES

Language, logic and ontology; Uncovering the structure of common sense knowledge

CONTENTS,DEFINITIONS OF LOGIC,PROPERTIES OF THE PAPER,LANGUAGE AND KNOWLEDGE,LANGUAGE AND ONTOLOGY,LANGUAGE AND COMMON SENSE KNOWLEDGE,CONCLUSION,REFERENCES

A Seminar Paper on Internet of Things (IoT)

ABSTRACT Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later as...

RELEVANCE OF DATA MINING IN HEALTHCARE DELIVERY

Tendency for data mining application in healthcare today is great, because healthcare sector is rich with information, and data mining is becoming a necessity. Healthcare organizations produce and collect large volumes of information on daily basis. Use of information technologies allows automatization of processes for extraction of data that help to get interesting knowledge and regularities, which means the elimination of manual tasks and easier extraction of data directly from electronic r...

Electro physiological interactive computer system (epics)

ABSTRACTNew  interactive  computing  applications  are  continually  being  developed  in  a  bidto    support people’s changing work and recreational   activities.   As  research focuses on oneparticular   class   of   interactive   systems,   high   level   models   of   interaction   are   formul...

INDUSTRIAL TRAINING REPORT ON NETWORKING

INDUSTRIAL TRAINING REPORT ON NETWORKING

DNA Computing

Abstract    DNA, the genetic code of life itself has been the molecule of this century and certainly for the next one. The future of DNA manipulation is speed, automation and miniaturization. Perhaps it will not be good enough to play games or surf the web, things traditional computers are good at, but it certainly might be used in the study of logic, encryption, genetic programming and algorithms, automata and lots of other things that haven’t even been invented yet!!  ...

OPEN SOURCE SOFTWARE

Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. ...

SIXTH SENSE TECHNOLOGY

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.

PARASITIC COMPUTING

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard comm...

Use of Network Activity Monitoring System to Solve Problems: Case Study of Benue Internal Revenue Service

ABSTRACTThe research work was conducted with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state by using Network Activity Monitory System. The activity monitoring system was designed, tested and found to achieve the following: It monitored the daily activities of the clients, has a great impact on memory management of the server, Detected active users, Provided accurate evidence on corporate fraud when investigation is being ...

WIRELESS ELECTRICITY

ABSTRACTElectric energy needs to be transported to the distribution lines through cords. One of the major issue in power transmission is the losses occurs during transmission anddistribution process of electrical power due to the energy dissipation in the conductor and equipment used for transmission. As the demand increase day by day, the power generation and power loss are also increased. In addition, the cost of making electricity is harmful to the environment. Reducing tr...

A SECURITY GATEWAY

ABSTRACTIn the context of computer networking, an application-level gateway (also known as ALG or application layer gateway) consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, Bit-Torrent, SIP, RTSP, file transfer in IM applications etc. In order for these protocols to...

ADDRESSING PRINCIPLES USED IN TCP/IP PROTOCOLS

ABSTRACTNetwork administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (TCP/IP) networks and troubleshoot TCP/IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses, how they are expressed, and the types of unicast addresses assigned to network node interfaces.We demonstrate that the dynamic behavior of queue and ave...


1 - 15 Of 97 Results