TABLE OF CONTENTS Certification Dedication CHAPTER ONE 1.1 Introduction 1.2 Definition of Siwes 1.3 Aims and objective of Siwes CHAPTER TWO 2.1 Operating system 2.2 Function of operating system 2.3 Types of operating system 2.4 Deferent and similarities between window OS and MS-DOS 2.4.1 Different 2.4.2 Similarities CHAPTER THREE 3.1 Introduction to computer networks 3.2 Advanta...
ABSTRACT The internet of things which is the current wave in the development of the internet has been around for some time. It is specifically about connecting objects (things) that would not ordinarily be considered worthy for internet connectivity. Things such as houses, cars, caps, ACs, and just think of it can be connected to the internet by embedding i...
CONTENTS,INTRODUCTION,KNOWLEDGE MANAGEMENT AND KNOWLEDGE REPRESENTATION,LOGIC AS A KNOWLEDGE REPRESENTATION METHOD,CLASSIFICATION OF LOGIC,PROPERTIES OF KNOWLEDGE,EVALUATION OF KNOWLEDGE REPRESENTATION METHODS,CONCLUSION,REFERNCES
CONTENTS,WHAT IS PROBLEM SOLVING?,WHAT IS META-COGNITION?,INSIGHT PROBLEM SOLVING,NON-INSIGHT PROBLEM SOLVING,EXPERIMENTS CONDUCTED,THE RESULTS OF THE EXPERIMENTS,CONCLUSION,REFERNCES
CONTENTS,DEFINITIONS OF LOGIC,PROPERTIES OF THE PAPER,LANGUAGE AND KNOWLEDGE,LANGUAGE AND ONTOLOGY,LANGUAGE AND COMMON SENSE KNOWLEDGE,CONCLUSION,REFERENCES
ABSTRACT Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later aspect lead...
Tendency for data mining application in healthcare today is great, because healthcare sector is rich with information, and data mining is becoming a necessity. Healthcare organizations produce and collect large volumes of information on daily basis. Use of information technologies allows automatization of processes for extraction of data that help to get interesting knowledge and regularities, which means the elimination of manual tasks and easier extraction of data directly from electronic r...
ABSTRACTNew interactive computing applications are continually being developed in a bidto support people’s changing work and recreational activities. As research focuses on oneparticular class of interactive systems, high level models of interaction are formulated andrequirements emerge that reflect shared features or common functionality among those systems.Within this seminar a new class of interactive syst...
INDUSTRIAL TRAINING REPORT ON NETWORKING
Abstract DNA, the genetic code of life itself has been the molecule of this century and certainly for the next one. The future of DNA manipulation is speed, automation and miniaturization. Perhaps it will not be good enough to play games or surf the web, things traditional computers are good at, but it certainly might be used in the study of logic, encryption, genetic programming and algorithms, automata and lots of other things that haven’t even been invented yet!! Therefore, it w...
Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. The open-...
Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communication...
ABSTRACT The research work was conducted with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state by using Network Activity Monitory System. The activity monitoring system was designed, tested and found to achieve the following: It monitored the daily activities of the clients, has a great impact on memory management of the server, Detected active users, Provided accurate evidence on corporate fraud when investigation is being carried ou...
ABSTRACT Electric energy needs to be transported to the distribution lines through cords. One of the major issue in power transmission is the losses occurs during transmission and distribution process of electrical power due to the energy dissipation in the conductor and equipment used for transmission. As the demand increase day by day, the power generation and power loss are also increased. In addition, the cost of making electricity is harmful to the environment. Reducing transmission lo...