Introduction Mobile Ad hoc network (MANET) is a collection of wireless mobile nodes that can be set up anywhere, anytime and connected via wireless link without using an existing of any fixed infrastructure. MANET is formed dynamically by an autonomous system of mobile nodes. These nodes are wirelessly connected. It represents a dynamic distributed system of arbitrarily moving wireless devices. …
Read More »admincom
Performance Evaluation in Web Architectures
INTRODUCTION Now a day’s for web development mainly used CWA, DWA and SOA. However business stakeholders believe in DWA and SOA for his business application. Distributed web-applications play major role to improve web application through quality attributes. Along with the great demand of web applications in the era of pervasive and ubiquitous computing, a number of issues related to quality …
Read More »Security Measures of WSN Networks by Avoiding Message Replay Attacks
Introduction A wireless sensor network is a collection of nodes organized into a cooperative network. Wireless networks based upon IEEE 802.11 standards can now provide bandwidth approaching those of wired networks [4]. At the same time, the IEEE has noticed the low expense and high capabilities that sensor networks offer. The organization has defined the IEEE 802.15 standard for personal …
Read More »Simulation Study to Observe the Effects of Increasing Each of The Network Size and the Network Area Size on MANET’s Routing Protocols
Introduction MANET usually refers to the autonomous system without any centralized management. The expression ‘Ad Hoc’ means that this type of networks can take different forms. Because its quick and easiest deloyment, this type of network is feasible to be used in search, military, rescue operation, sensor networks and meeting rooms [Jogendra Kumar, 2012][Gurleen kaur wailed, 2013]. MANET can also be …
Read More »A Systematic Literature Survey on Various Techniques for Software Fault Proneness
INTRODUCTION Fault prone modules prediction is an important area in the software engineering. Constraints and the complexity of software are increasing day by day. Due to which it is very difficult to produce software without faults. Risk management also can be done by the early identification of the fault prone software modules. First of all it is must to know …
Read More »GPS Based Surveying for Mapping of Canal Alignment in GIS Environment – A Case Study of a Branch Canal of Alimineti Madhava Reddy project, Nalgonda District, Andhra Pradesh, India.
Introduction The Govt. of Andhra Pradesh has proposed and implementing many irrigation projects across the state as a major activity. Many new canals and sub canals / distributaries are proposed to construct under the command areas of these new and existing projects. Mapping of canal alignments from a specific location, linked to a river, reservoir or a major canal with …
Read More »Background Construction of Video Frames in Video Surveillance System Using Pixel Frequency Accumulation
Introduction Moving object detection in real time is a challenging task in visual surveillance systems. It often acts as an initial step for further processing such as classification of the detected moving object. In order to perform more sophisticated operations such as classification[1]. Visual surveillance is one of the major research topics and has two major steps: detection and recognition …
Read More »A Review on Shot Boundary Detection
Introduction The increased availability and usage of online digital video has created a need for automatic video content analysis techniques. Detection of shot boundaries is an early and quite important processing step in video analysis, especially for indexing and effective retrieval applications [1]. Video shot boundary detection algorithms have to challenge the difficulty of finding shot boundaries in the presence …
Read More »A Comparative Study of two major Search Engines: Google and Yahoo
INTRODUCTION WWW plays a vital role in day to day life of people. A large amount of information is available on the web. The friendly user interface and adequate features of the WWW attract the users to access the web. Web holds text documents as well as multimedia information like images, videos, sounds, graphics etc. Internet has become the most …
Read More »A Novel Approach to Deal with Keyloggers
Introduction Keyloggers are software programs that monitor user input data to gather information concerning these data and are often used with malicious intent. Data collected by Keyloggers usually contain personal and financial information such as bank account user name and password, email or text messages and etc.[1] Increased use of personal computers for financial and e-commerce transactions has fueled the …
Read More »Multi-module Singular Value Decomposition for Face Recognition
INTRODUCTION In recent years, computer vision research has witnessed a growing interest in subspace analysis techniques. And the important problem is how to extract the valid discriminator features for face recognition. The Karhunen-Loève Transform(KLT) and Principal Component Analysis are examples of eigen vector-based reduction and features extraction. A maximum a posteriori (MAP) matching rule using a Bayesian similarity measure derived …
Read More »The Relation between E-Commerce and AIS in Medium Scale Organizations
Introduction The breakthrough of e-commerce has created an international open market that does not have any kind of geographical constraints. With the start of the twenty first century in cooperation with the IT revolution and the wide use of computers and internet in most fields, the use of the internet as a medium for the execution of the e-commerce operations …
Read More »