Ascertaining the use of agile methodology in Extreme Programming (XP) in the software development industry
Dissertation - 28 pages - Computer science
Software has been division of modern society since previous 50 years. There are many software development methodologies in use. Some companies have their own customized methodology for developing the software but majority of them speak about two kinds of methodologies: heavyweight and...
A critical analysis of two 2006 information technology security surveys
Case study - 6 pages - Computer science
My analysis of two surveys - the 2006 Australian Computer Crime and Security Survey (AusCERT, 2006) and the Ernst and Young 2006 Global Information Security Survey (Ernst and Young Global Limited, 2006) will proceed systematically according to the following simple scheme, one that is motivated by...
Motives, methods, and morals: Towards an informed anti-cheating policy in massively online multiplayer games
Thesis - 10 pages - Computer science
World of Warcraft and other massively multiplayer online games have become immensely popular in the past few years. Their growing popularity, advanced player-driven economies, and often reinforced social and political tendencies have yielded an interesting if troublesome set of problems....
Emails and privacy
Case study - 7 pages - Computer science
The general notion among people is that email is a time of private communication. We have become so unaware of our surroundings that we think just because we are sitting in a room by ourselves, there is no one else there to see what we are doing. We seem to forget the fact that when we do enter...
E-Horoscope
Dissertation - 43 pages - Computer science
First, a horoscope is an astrological map of the heavens keyed to the time and place of a specific birth. It is a kind of a map that appears as a two dimensional chart. It shows positions of the Sun, the Moon, and planets at the precise moment of your birth. The earth moves from west to east &...
Asynchronous messaging services using Java
Dissertation - 47 pages - Computer science
Messaging Services provides asynchronous communication facility between two Business organizations. This system saves the time, money and reduces the man-power and both participant organizations may be benefited by each other. Consider two business organizations are an insurance company and the...
Security using firewalls
Thesis - 6 pages - Computer science
In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the dependence of...
Active character technology based on neural networks Genetic Algorithms and AI
Thesis - 7 pages - Computer science
A combination of Neural networks genetic algorithms and conventional computing in Multimedia and Gaming industry has never been attempted before. Existing technologies operate on fixed databases and manipulate limited data that is bound by some logical algorithm. Even many of the AI based...
A look at cogeneration
Thesis - 14 pages - Computer science
Power is one of the basic requirements for the economic development of a country. The performance of various activities is dependent on the availability of adequate and reliable power supply. Our country has made a rapid progress in the field of electricity generation. Thermal power plants are a...
Grid computing: Faster networking
Case study - 6 pages - Computer science
Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious...
Security and advantages of cluster computing over distributed systems
Thesis - 7 pages - Computer science
A cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. In the case Server, Cluster consists of two types of participant's dispatchers and servers. The goal of a cluster is to allow distributing of the computing load over the several...
Authentication techniques: An overview
Thesis - 8 pages - Computer science
Authentication is a process by which one can prove the identity of a communicating partner and/or confirm the genuineness of a document. The process becomes a corner stone of security services in any applications ranging from defense sector to grocery shop. Initially,...
Parellel performance modelling using a genetic programming based error correction procedure
Thesis - 6 pages - Computer science
Performance models of high performance computing (HPC) applications are important for several reasons. First, they provide insight to designers of HPC systems on the role of subsystems such as the processor or the network in determining application performance. Second, they allow HPC centers more...
Providing mobility management in a heterogeneous wireless networks
Thesis - 5 pages - Computer science
Mobile Routers moving in a heterogeneous network environment can take advantage of the different, often complementing, characteristics of the various wireless network technologies. Satellite and cellular networks can provide wide coverage outside urban areas. However, the cost of communications...
Cyber Terrorism: The darker side of internet applications
Thesis - 4 pages - Computer science
Cyber terrorism is the convergence of cyberspace and terrorism. Computers and the Internet are aggressively being used by many international terrorist groups. Although cyber terrorism attacks have not yet happened and also there is no such identified substantiation that terrorists are planning a...
Growth of distributed systems using grid computing and softer aspects of E science
Thesis - 7 pages - Computer science
Grid computing and eScience are two major areas of growth of distributed systems. The grid concept refers to the virtualization of computing resources in the sense that end-users should have the illusion of using a single source of computing power without knowing the locality of the computation....
Use of SOA and semantics for creating and retaining consistency in loosely coupled systems
Thesis - 5 pages - Computer science
The primary objective of service-oriented architecture (SOA) is to use information technology to address the key goals of business today: innovation, agility, and market value. Agility in SOA is achieved by use of the principles of encapsulation, modularity, and loose coupling. Loose coupling...
A high level language abstraction for reconfigurable computing
Thesis - 7 pages - Computer science
The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain parameters of the SVC...
Sensor protocols for information via negotiation: A data centric routing protocol for wireless sensor networks
Case study - 6 pages - Computer science
The emergence of Wireless Sensor Networks (WSN) as one of the dominant technology trends in the coming decades has posed numerous challenges for researchers. These networks are likely to be comprised of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in...
Idiosyncratic applications of data mining in E learning environments
Thesis - 5 pages - Computer science
Data Mining is a very popular and effective way of discovering new knowledge from large and complex data sets. Its benefits are its ability to gain deeper understanding of the patterns previously unseen using current available reporting capabilities. Internet education arose from traditional...
Computer vision signal processing on graphics processing units
Thesis - 5 pages - Computer science
In some sense, computer graphics and computer vision are inverses of one another. Special purpose computer vision hardware is rarely found in typical mass-produced personal computers, but graphics processing units (GPUs) found on most personal computers, often exceed (in number of transistors as...
Network technologies for cluster computing
Thesis - 12 pages - Computer science
A broad and growing range of possibilities are available to designers of a cluster when choosing an interconnection technology. As the price of network hardware in a cluster can vary from almost free to several thousands of dollars per computing node, the decision is not a minor one in...
A new era in MPSOC at runtime for DES using RTOS 10- steps algorithm
Thesis - 3 pages - Computer science
This research paper is on the design methodology required to make intelligent decisions about the a new ERA AND APPRAOCH for MPSOC At Runtime using RTOS Algorithm. However we see that evidence of the soundness of the methodology by applying it on actual applications is a major requirement. This...
Satellite link emulation
Thesis - 4 pages - Computer science
Herein is a research paper which depicts the use of emulation for testing purpose to illustrate the propagation of signals in the satellite communication. With the software NIST Net we could emulate any kind of links and get the results with actual packets in consideration. The procedure testing...
Remote triggering based embedded servers for smart home environments
Thesis - 4 pages - Computer science
Smart home systems are expected to become key research area for ubiquitous and embedded system Computing in coming years. In this paper, a new scheme in smart home systems technology using Embedded server for providing intelligent control of home appliances is proposed. A wireless based Embedded...
Content management with repository open service interface definition
Thesis - 7 pages - Computer science
Now days the term content management is the key issue with website's design, what to include what not to include is very crucial problem. Here, in this paper we have shown the way of managing content called assets, which may contain metadata, course materials, assessment items, images, videos...
Data warehousing and data mining: Bringing pinpoint accuracy to sales
Thesis - 4 pages - Computer science
For most businesses, the primary means of growth involves the acquisition of new customers. This could involve finding customers who previously were not aware of your product, were not candidates for purchasing your product, or customers who in the past have bought from your competitors. Some of...
Simple Mail Transfer Protocol
Presentation - 21 pages - Computer science
This presentation talks about Simple Mail Transfer Protocol. First of all it begins with a clear description of SMTP, how it is implemented and what are the alternatives used on mail servers after which it explains what authenticated SMTP with pictorial representation is. Following this it moves...
Performance based comparision of TCP variants: Reno and Sack on real test beds
Thesis - 4 pages - Computer science
One of the most important parameter of data communication is the TCP protocol. It has underwent many changes which brought into existence many variant of it like tahoe, reno, new reno, sack, vegas, westwood. Nowadays we are using TCP SACK as the tcp variant as it is better as compared to its...
Optimization of TCP SACK
Thesis - 4 pages - Computer science
Internet is expanding rapidly over entire glob with heterogeneous networks. TCP/IP protocol suite is an inseparable part of Internet. Hence, the efficiency of the protocols is plays a vital role in performance of Internet. The increasing use of wireless links in expanding Internet has brought out...