Consult more than 14904 documents with no limitation. Our subscription options

Computer science

Filter by:

Filter by:
 
See all documents

293 results

11 Aug 2009
doc

Emails and privacy

Case study - 7 pages - Computer science

The general notion among people is that email is a time of private communication. We have become so unaware of our surroundings that we think just because we are sitting in a room by ourselves, there is no one else there to see what we are doing. We seem to forget the fact that when we do enter...

17 Jun 2009
doc

E-Horoscope

Dissertation - 43 pages - Computer science

First, a horoscope is an astrological map of the heavens keyed to the time and place of a specific birth. It is a kind of a map that appears as a two dimensional chart. It shows positions of the Sun, the Moon, and planets at the precise moment of your birth. The earth moves from west to east &...

17 Jun 2009
zip

Asynchronous messaging services using Java

Dissertation - 47 pages - Computer science

Messaging Services provides asynchronous communication facility between two Business organizations. This system saves the time, money and reduces the man-power and both participant organizations may be benefited by each other. Consider two business organizations are an insurance company and the...

16 Jun 2009
doc

Security using firewalls

Thesis - 6 pages - Computer science

In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the dependence of...

16 Jun 2009
doc

Active character technology based on neural networks Genetic Algorithms and AI

Thesis - 7 pages - Computer science

A combination of Neural networks genetic algorithms and conventional computing in Multimedia and Gaming industry has never been attempted before. Existing technologies operate on fixed databases and manipulate limited data that is bound by some logical algorithm. Even many of the AI based...

16 Jun 2009
doc

A look at cogeneration

Thesis - 14 pages - Computer science

Power is one of the basic requirements for the economic development of a country. The performance of various activities is dependent on the availability of adequate and reliable power supply. Our country has made a rapid progress in the field of electricity generation. Thermal power plants are a...

16 Jun 2009
doc

Grid computing: Faster networking

Case study - 6 pages - Computer science

Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious...

16 Jun 2009
doc

Security and advantages of cluster computing over distributed systems

Thesis - 7 pages - Computer science

A cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. In the case Server, Cluster consists of two types of participant's dispatchers and servers. The goal of a cluster is to allow distributing of the computing load over the several...

16 Jun 2009
doc

Authentication techniques: An overview

Thesis - 8 pages - Computer science

Authentication is a process by which one can prove the identity of a communicating partner and/or confirm the genuineness of a document. The process becomes a corner stone of security services in any applications ranging from “defense sector” to “grocery shop”. Initially,...

11 Jun 2009
pdf

Parellel performance modelling using a genetic programming based error correction procedure

Thesis - 6 pages - Computer science

Performance models of high performance computing (HPC) applications are important for several reasons. First, they provide insight to designers of HPC systems on the role of subsystems such as the processor or the network in determining application performance. Second, they allow HPC centers more...

11 Jun 2009
pdf

Providing mobility management in a heterogeneous wireless networks

Thesis - 5 pages - Computer science

Mobile Routers moving in a heterogeneous network environment can take advantage of the different, often complementing, characteristics of the various wireless network technologies. Satellite and cellular networks can provide wide coverage outside urban areas. However, the cost of communications...

11 Jun 2009
pdf

Cyber Terrorism: The darker side of internet applications

Thesis - 4 pages - Computer science

Cyber terrorism is the convergence of cyberspace and terrorism. Computers and the Internet are aggressively being used by many international terrorist groups. Although cyber terrorism attacks have not yet happened and also there is no such identified substantiation that terrorists are planning a...

11 Jun 2009
pdf

Growth of distributed systems using grid computing and softer aspects of E science

Thesis - 7 pages - Computer science

Grid computing and eScience are two major areas of growth of distributed systems. The grid concept refers to the virtualization of computing resources in the sense that end-users should have the illusion of using a single source of computing power without knowing the locality of the computation....

11 Jun 2009
pdf

Use of SOA and semantics for creating and retaining consistency in loosely coupled systems

Thesis - 5 pages - Computer science

The primary objective of service-oriented architecture (SOA) is to use information technology to address the key goals of business today: innovation, agility, and market value. Agility in SOA is achieved by use of the principles of encapsulation, modularity, and loose coupling. Loose coupling...

11 Jun 2009
pdf

A high level language abstraction for reconfigurable computing

Thesis - 7 pages - Computer science

The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain parameters of the SVC...

11 Jun 2009
pdf

Sensor protocols for information via negotiation: A data centric routing protocol for wireless sensor networks

Case study - 6 pages - Computer science

The emergence of Wireless Sensor Networks (WSN) as one of the dominant technology trends in the coming decades has posed numerous challenges for researchers. These networks are likely to be comprised of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in...

11 Jun 2009
pdf

Idiosyncratic applications of data mining in E learning environments

Thesis - 5 pages - Computer science

Data Mining is a very popular and effective way of discovering new knowledge from large and complex data sets. Its benefits are its ability to gain deeper understanding of the patterns previously unseen using current available reporting capabilities. Internet education arose from traditional...

11 Jun 2009
pdf

Computer vision signal processing on graphics processing units

Thesis - 5 pages - Computer science

In some sense, computer graphics and computer vision are inverses of one another. Special purpose computer vision hardware is rarely found in typical mass-produced personal computers, but graphics processing units (GPUs) found on most personal computers, often exceed (in number of transistors as...

11 Jun 2009
pdf

Network technologies for cluster computing

Thesis - 12 pages - Computer science

A broad and growing range of possibilities are available to designers of a cluster when choosing an interconnection technology. As the price of network hardware in a cluster can vary from almost free to several thousands of dollars per computing node, the decision is not a minor one in...

11 Jun 2009
pdf

A new era in MPSOC at runtime for DES using RTOS 10- steps algorithm

Thesis - 3 pages - Computer science

This research paper is on the design methodology required to make intelligent decisions about the a new ERA AND APPRAOCH for MPSOC At Runtime using RTOS Algorithm. However we see that evidence of the soundness of the methodology by applying it on actual applications is a major requirement. This...

11 Jun 2009
pdf

Satellite link emulation

Thesis - 4 pages - Computer science

Herein is a research paper which depicts the use of emulation for testing purpose to illustrate the propagation of signals in the satellite communication. With the software NIST Net we could emulate any kind of links and get the results with actual packets in consideration. The procedure testing...

11 Jun 2009
pdf

Remote triggering based embedded servers for smart home environments

Thesis - 4 pages - Computer science

Smart home systems are expected to become key research area for ubiquitous and embedded system Computing in coming years. In this paper, a new scheme in smart home systems technology using Embedded server for providing intelligent control of home appliances is proposed. A wireless based Embedded...

09 Jun 2009
pdf

Content management with repository open service interface definition

Thesis - 7 pages - Computer science

Now days the term content management is the key issue with website's design, what to include what not to include is very crucial problem. Here, in this paper we have shown the way of managing content called assets, which may contain metadata, course materials, assessment items, images, videos...

09 Jun 2009
pdf

Data warehousing and data mining: Bringing pinpoint accuracy to sales

Thesis - 4 pages - Computer science

For most businesses, the primary means of growth involves the acquisition of new customers. This could involve finding customers who previously were not aware of your product, were not candidates for purchasing your product, or customers who in the past have bought from your competitors. Some of...

09 Jun 2009
ppt

Simple Mail Transfer Protocol

Presentation - 21 pages - Computer science

This presentation talks about Simple Mail Transfer Protocol. First of all it begins with a clear description of SMTP, how it is implemented and what are the alternatives used on mail servers after which it explains what authenticated SMTP with pictorial representation is. Following this it moves...

08 Jun 2009
pdf

Performance based comparision of TCP variants: Reno and Sack on real test beds

Thesis - 4 pages - Computer science

One of the most important parameter of data communication is the TCP protocol. It has underwent many changes which brought into existence many variant of it like tahoe, reno, new reno, sack, vegas, westwood. Nowadays we are using TCP SACK as the tcp variant as it is better as compared to its...

08 Jun 2009
pdf

Optimization of TCP SACK

Thesis - 4 pages - Computer science

Internet is expanding rapidly over entire glob with heterogeneous networks. TCP/IP protocol suite is an inseparable part of Internet. Hence, the efficiency of the protocols is plays a vital role in performance of Internet. The increasing use of wireless links in expanding Internet has brought out...

08 Jun 2009
doc

Development of a grid framework using .net

Thesis - 8 pages - Computer science

It is difficult to analyze the performance of dynamic environment like Grid. In a Grid , data need to be collected and analyzed in real time. A Grid has to adapt to the changing resources usages scenario. The objective of this paper is to present an object oriented implementation of a part of...

07 Jun 2009
ppt

Mechanical forming of metals: Study of rapid prototyping processes

Case study - 30 pages - Computer science

The introduction of the presentation will give a brief overview of the trend that the information in it will follow after which it will begin with the reasons why RP is used. It will then move onto a mention of the classifications of RP followed by a section on stereo lithography, inject based...

07 Jun 2009
ppt

Software process models

Presentation - 46 pages - Computer science

This presentation deals with software process models. It begins with the definition of software development process and its different phases. It then moves on to the description of each of the software models beginning with waterfall model,its advantages and disadvantages, incremental life cycle...