Consult more than 14129 documents with no limitation. our subscription options

Computer science

Filtrer par :

See all documents

277 results

14 Apr 2010
pdf

Curriculum management using web intelligence

Thesis - 4 pages - Computer science

The major objective of an intelligent tutoring system is to provide adaptivity of the course material according to the learners need and background knowledge. In Automatic Courseware Sequencing, the main idea is to generate the course material that is well suited for the learner according to the...

14 Apr 2010
pdf

SGS authentication protocol resisting man-in-middle attack

Thesis - 4 pages - Computer science

SGS authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. This protocol removes the deficiency of Deffie-Hellman algorithm which is man-in-middle attack by...

14 Apr 2010
pdf

Unattended installation and un-installation of software remotely using mesh network

Thesis - 5 pages - Computer science

Remotely Unattended Installation / Un installation of Software is a collection of tools that allow the network administrator, sitting at his or her desk, to manage a network of remote PCs and accomplish the tasks like, to support of daily IT operations and management task. The tasks...

14 Apr 2010
pdf

Virtual LAN simulator

Thesis - 2 pages - Computer science

The project comprises of a device driver (basically a device driver on top of the existing Ethernet driver).This driver will effectively route the packets of the virtual LAN back to the machine exactly like the loop back driver does. It does not send any packets to the network. It also contains a...

14 Apr 2010
pdf

Web mail server for mobile mailing application

Thesis - 6 pages - Computer science

The Web Mail Server is a mailing system implemented to allow a user to access POP3 mail account through a Mobile SMS and also supports to access POP3 mail account through GUI on intranet. The server will be support to any mobile. To design a Mail Server to address the above problem and allows...

14 Apr 2010
pdf

Efficient compression and mobile communication techniques for ECG signals over wireless OFDM link

Thesis - 6 pages - Computer science

Efficient compression and communication of ECG signals is required for the doctors to remotely monitor the patient in some emergency cases. We investigate the performances of the different signal compression, encoding and communication techniques. We proposed modified run length encoding (MRLE)...

14 Apr 2010
pdf

Principal component filter banks for optimal multi-resolution analysis

Thesis - 9 pages - Computer science

An important issue in multi-resolution analysis is that of optimal basis selection. An optimal P-band perfect reconstruction filter bank (PRFB) is derived in this seminar, which minimizes that approximation error (in the mean square) between the original signal and its low resolution principal...

13 Apr 2010
pdf

ARM based electricity billing

Thesis - 3 pages - Computer science

It is anticipated that in existing electricity billing system has various loopholes, which consequently leads to unauthorized usage and difficulties in monitoring the usage control. In this paper we propose a system which has ARM-GSM interface for billing automation. The implementation uses a...

13 Apr 2010
pdf

Color and texture based two layer image retrieval system

Thesis - 5 pages - Computer science

Feature extraction is important part of Content Based Image Retrieval System (CBIR). Image retrieval method with single feature has limitation. Combination of two or more features increase number of computations which is crucial factor for content based image retrieval system. In this paper, we...

13 Apr 2010
pdf

Machine learning interfacing with natural language processing

Thesis - 3 pages - Computer science

Human computer interaction (HCI) is an important aspect that should concern every computer system. Ubiquitous computing applications and many other complex applications calls for an interface that have more than simple selection of couple of options. Consequently we need computer interfaces which...

13 Apr 2010
pdf

Text information extraction in images and video sequences

Thesis - 3 pages - Computer science

Text provides important information about images and video sequences in a documented image, but it always remains difficult to modify the static documented image. To carry out modification in any of the text matter the text must be segmented out from the documented image, which can be used for...

13 Apr 2010
pdf

X-Server: New trends in databases for wired and wireless networks

Thesis - 3 pages - Computer science

Nowadays XML is being used as an underlying technology for most of the transactions on the internet. XML is widely used for Database Storage. Most of the leading product developed companies use XML as their Metadata framework. This work started with a goal to manage XML data and to provide...

13 Apr 2010
pdf

Security in image transmission using audio watermarking

Thesis - 3 pages - Computer science

With the recent burgeoning of networked multimedia systems, techniques are needed to prevent illegal copying / forgery in distributed digital audio/ visual/text document. It may be also desirable to determine where and by how much the multimedia file has been changed from the original due...

13 Apr 2010
pdf

RFID based destination announcing system inside the railway bogie (India)

Thesis - 4 pages - Computer science

The local railway system forms a backbone of major cities in India. According to the statistics 43 % of the city's population uses this method to commute on a regular basis. The railway routes cover vast area and many stations, stoppage time for each station being approximately 30 seconds....

13 Apr 2010
pdf

Case Study on 'Monitoring the tasks, a task by itself

Thesis - 7 pages - Computer science

Monitoring compliances within any organization is a complex task by itself and becomes a headache for any management. Users have to be pushed, reminded, and pursued again and again to get a particular task done. This task becomes more complex when you have multiple organizations and large number...

12 Apr 2010
pdf

Formal security evaluation of ad hoc routing protocols

Thesis - 3 pages - Computer science

Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. If the underlying routing protocol cannot be...

07 Apr 2010
pdf

A new motion compensation technique for efficient video coding

Thesis - 6 pages - Computer science

Motion estimation and motion compensation are two interrelated and obviously important tasks in the total video coding process. Out of several motion estimation methods block matching algorithm (BMA) is the simplest, hence rightly adopted by several MPEGs and H.26X standards. Motion compensation...

07 Apr 2010
pdf

A comprehensive model for IS development: Information processing perspective

Thesis - 7 pages - Computer science

In order to develop IS (information systems) effectively, this study proposed a comprehensive model that delineates the relationships among contingency configurations of design variables, risk management, and software development success. Specifically, this paper examined the fit between...

07 Apr 2010
pdf

The measurement of information technology literacy: A case of Thai graduates

Tutorials/exercises - 6 pages - Computer science

The main objectives of this research are to develop a measurement tool for determining information technology literacy (ITL) and to assess the ITL of Thai graduates. ITL in this study is categorized into three components: fundamental knowledge, skills, and applications. The study consists of two...

07 Apr 2010
pdf

Online electronic version on physical book purchase: An analysis on resale and welfare impact

Thesis - 7 pages - Computer science

Amazon recently began a new service: providing an electronic version of books to its consumers after they purchase the physical books. This business practice provides consumers with an opportunity to reseller brand new books, which will influence publisher, retailers and consumers. Using a...

06 Apr 2010
pdf

A study on search system for e-learning products

Essay - 5 pages - Computer science

In this paper, we propose the E-learning product search system (ELSS) which can provides high quality information fitted to the learners' demands. ELSS can also provide the accurate information that doesn't contain unnecessary information in mass e-learning products on the internet. Through...

06 Apr 2010
pdf

Task-technology fit and adoption behaviors of mobile business systems

Essay - 8 pages - Computer science

In this paper, a combined task-technology fit (TTF) and UTAUT model is proposed to explore the adoption of mobile technologies in the real estate and insurance industry. The research results indicate: (1) five constructs: data quality, authorization, timeliness, reliability, and relationship with...

06 Apr 2010
pdf

Enterprise user interface and technology comparison

Tutorials/exercises - 19 pages - Computer science

The Enterprise User Interface (EUI) is a lightweight user interface for next generation of Web applications. It would extend the capabilities of the current Web browsers by incorporating the key strengths of the thick/full client environment while maintaining a lightweight user interface. EUI...

05 Apr 2010
pdf

Intelligent agent-assisted decision support for personalized virtual learning environment

Thesis - 7 pages - Computer science

In the delivery of online learning, Virtual Learning Environments (VLEs) have been growing quickly and research on intelligent agent supported eLearning systems has developed rapidly in the last decade. However, some online learning programs have not been successful, and one of the main reasons...

05 Apr 2010
pdf

Using a meta-modeling knowledge management layer: A new approach to designing the enterprise information architecture

Thesis - 10 pages - Computer science

As organizations continue to evolve with Inter/Intranet -based applications in this fast moving era of electronic commerce, organizations should adopt an Information technology architecture that conserves knowledge and enables decision-makers to use information systems at an even higher level of...

31 Mar 2010
pdf

Gesture recognition using divine proportion

Thesis - 5 pages - Computer science

In recent years, gesture recognition has become essential in many vision based systems related to wireless interfacing between human and machines. The rising interest in this research is in conjunction with the immense attentions of employing real time application to improve human - machine...

31 Mar 2010
pdf

JPEG image compression using MATLAB

Thesis - 5 pages - Computer science

The paper deals with studying techniques for reducing the storage required saving an image, or the bandwidth required transmitting it. Image compression addresses the problem of reducing the amount of data required to represent a digital image. The underlying basis of the reduction process is the...

31 Mar 2010
pdf

A simulation model for implementing collision detection & avoidance in InVANETs

Thesis - 4 pages - Computer science

Vehicular ad-hoc networks (VANETs) are an emerging new technology which is the focus of lot of ongoing research and projects.[12],[13] It aims at providing ubiquitous connectivity to mobile users and effective communication between vehicles on dynamic mobility. VANETs have various applications...

31 Mar 2010
pdf

Route optimization in mobile adhoc networks

Thesis - 8 pages - Computer science

With the increase of portable devices as well as progress in wireless communications, ad hoc networking is gaining importance with the increasing number of widespread applications. Ad hoc networking can be applied in places where there is little or no communication infrastructure or existing...

31 Mar 2010
pdf

Do online information retrieval systems pose a security threat?

Thesis - 4 pages - Computer science

The search engine's deceptive role of information mining from the crawled web servers has been gravely misunderstood. The general perception of search engine being an information locator is a universal truth. The 24x7 availability of the updated information makes it a potential information search...