Quantcast
Channel: All About Education » Seminar
Browsing latest articles
Browse All 27 View Live

Wireless Network Devices and digital convergence

The wireless network digital electronic device includes a television signal receiver, a decoder, a processor, and a wireless network signal transceiver. The television signal receiver receives the...

View Article



Mobile ad hoc network (MANET)

Communication has become very important for people to exchange information anytime from and to anywhere. Mobile Ad hoc Networks, called MANETs, are becoming useful as the existing wireless...

View Article

Computational Methods for Bankruptcy Prediction

“Bankruptcy” is a legally declared inability or impairment of ability of an individual or organizations to pay their creditors. Creditors may file a bankruptcy petition against a debtor in an effort to...

View Article

Digital Watermarking Applications and Advantages

Digital watermarking is defined as the imperceptibly altering a work in order to embed information about that work. In the recent years copyright protection of digital content became a serious problem...

View Article

Information or Data Visualizing Techniques

Visualization is the graphical presentation of information, with the goal of providing the viewer with a qualitative understanding of the information contents. Information can be in any form, like...

View Article


Security in Mobile Database Systems

The importance of databases in modern businesses and governmental institutions is huge and still growing. Many mission-critical applications and business processes rely on databases. These databases...

View Article

Privacy Preserving Data Mining

Explosive growth in data storing and data processing technologies has led to the creation of large databases that record unprecedented amount of information. Consequently, with the increase in data...

View Article

Biometrics Authentication systems

Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be...

View Article


Palmprint Authentication Application

Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be...

View Article


Intrusion Detection System

In highly networked modern world, conventional techniques of network security such as user authentication, cryptography and intrusion prevention techniques like firewalls are not enough, owing to...

View Article

Embedded Auditors for Intrusion Detection

A basic cornerstone of security is to verify the integrity of fundamental data stored in the system. This integrity checking is being achieved using integrity tools such Tripwire, which depend on the...

View Article

Why To Work For A Good Seminar And Project

Long back, I wrote posts related to Seminar Topics especially for computer science seminars. The idea is to bring some latest technology and its understanding in an easy way to the help students....

View Article

Expert Systems and decision making

One of the most successful applications of artificial intelligence reasoning techniques using facts and rules has been in building expert systems that embody knowledge about a specialized field of...

View Article


Agent Based Systems and Applications

Agents (adaptive or intelligent agents and multi-agent systems) constitute one of the most prominent and attractive technologies in Computer Science at the beginning of this new century. Agent and...

View Article

Routing In Mobile Ad Hoc Networks

Developing support for routing is one of the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing...

View Article


Multicasting in Ad Hoc Networks

MANETs are useful in many application environments and do not need any infrastructure support. Collaborative computing and communications in smaller areas (buildings, organizations, conferences, etc.)...

View Article

Load Balancing in Internet

The Internet is a network of networks in which users at any one computer can get access to the information from any other computer. It was conceived by the Advanced Research Projects Agency (ARPA) of...

View Article


Load Balancing in Parallel Computers

A parallel compute is a collection of processing elements that communicate and cooperate to solve large problems efficiently. Parallel computers vary in two fundamental architecture facets, (i) Single...

View Article

Server Load Balancing

Server load balancing is defined as a process and technology that distributes site traffic among several servers using a network device. A load balancer, intercepts network based traffic destined for a...

View Article

RFID Technology

Radio Frequency Identification (RFID) is an automated identification technology that used tags to transmit data upon RFID reader queries. Compared to barcodes identification technology, RFID tags...

View Article
Browsing latest articles
Browse All 27 View Live




Latest Images