Wireless Network Devices and digital convergence
The wireless network digital electronic device includes a television signal receiver, a decoder, a processor, and a wireless network signal transceiver. The television signal receiver receives the...
View ArticleMobile ad hoc network (MANET)
Communication has become very important for people to exchange information anytime from and to anywhere. Mobile Ad hoc Networks, called MANETs, are becoming useful as the existing wireless...
View ArticleComputational Methods for Bankruptcy Prediction
“Bankruptcy” is a legally declared inability or impairment of ability of an individual or organizations to pay their creditors. Creditors may file a bankruptcy petition against a debtor in an effort to...
View ArticleDigital Watermarking Applications and Advantages
Digital watermarking is defined as the imperceptibly altering a work in order to embed information about that work. In the recent years copyright protection of digital content became a serious problem...
View ArticleInformation or Data Visualizing Techniques
Visualization is the graphical presentation of information, with the goal of providing the viewer with a qualitative understanding of the information contents. Information can be in any form, like...
View ArticleSecurity in Mobile Database Systems
The importance of databases in modern businesses and governmental institutions is huge and still growing. Many mission-critical applications and business processes rely on databases. These databases...
View ArticlePrivacy Preserving Data Mining
Explosive growth in data storing and data processing technologies has led to the creation of large databases that record unprecedented amount of information. Consequently, with the increase in data...
View ArticleBiometrics Authentication systems
Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be...
View ArticlePalmprint Authentication Application
Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be...
View ArticleIntrusion Detection System
In highly networked modern world, conventional techniques of network security such as user authentication, cryptography and intrusion prevention techniques like firewalls are not enough, owing to...
View ArticleEmbedded Auditors for Intrusion Detection
A basic cornerstone of security is to verify the integrity of fundamental data stored in the system. This integrity checking is being achieved using integrity tools such Tripwire, which depend on the...
View ArticleWhy To Work For A Good Seminar And Project
Long back, I wrote posts related to Seminar Topics especially for computer science seminars. The idea is to bring some latest technology and its understanding in an easy way to the help students....
View ArticleExpert Systems and decision making
One of the most successful applications of artificial intelligence reasoning techniques using facts and rules has been in building expert systems that embody knowledge about a specialized field of...
View ArticleAgent Based Systems and Applications
Agents (adaptive or intelligent agents and multi-agent systems) constitute one of the most prominent and attractive technologies in Computer Science at the beginning of this new century. Agent and...
View ArticleRouting In Mobile Ad Hoc Networks
Developing support for routing is one of the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing...
View ArticleMulticasting in Ad Hoc Networks
MANETs are useful in many application environments and do not need any infrastructure support. Collaborative computing and communications in smaller areas (buildings, organizations, conferences, etc.)...
View ArticleLoad Balancing in Internet
The Internet is a network of networks in which users at any one computer can get access to the information from any other computer. It was conceived by the Advanced Research Projects Agency (ARPA) of...
View ArticleLoad Balancing in Parallel Computers
A parallel compute is a collection of processing elements that communicate and cooperate to solve large problems efficiently. Parallel computers vary in two fundamental architecture facets, (i) Single...
View ArticleServer Load Balancing
Server load balancing is defined as a process and technology that distributes site traffic among several servers using a network device. A load balancer, intercepts network based traffic destined for a...
View ArticleRFID Technology
Radio Frequency Identification (RFID) is an automated identification technology that used tags to transmit data upon RFID reader queries. Compared to barcodes identification technology, RFID tags...
View Article
More Pages to Explore .....