ABSTRACT Interest in large-scale sensor networks for both civilian and military applications is burgeoning. The deployment of such networks will require new approaches in resource discovery, query processing and data routing. This paper presents a framework and some analytic results for query satisfaction and data routing in networks consisting of clients, sensors and data filtering/fusion servers. In this model, multiple clients pose queries that are satisfied by processing a set of sensor d...
ABSTRACT The term Puyo game covers a range of computer-based packages, which aim to provide interactive instruction usually in a specific subject area, and many predate the Internet. These can range from sophisticated and expensive commercial packages to applications developed by projects in other educational institutions or national initiatives to simple solutions developed by individuals with no funding or support to tackle a very Interactive Tutor problem. The amount of time and money inve...
ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability ...
ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...
ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...
ABSTRACT Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be ...
ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or ...
ABSTRACT This project work, is a computerization it Performance evaluation of routing algorithm using NS2 of an organization. Full duplex asynchronous data transfer system based on a single-phase two-line coding. (a) Data is transmitted from a primary module PM to a secondary module SM, while data is transmitted from the secondary module SM to the primary module PM independently at the same time. (b) Code words A and B, in which data and color (request signal: ODD or EVEN) are superimpose...
ABSTRACT Current GPUs have many times the memory bandwidth and computing power compared to CPUs. The difference in performance is getting bigger as the evolution speed of the GPUs is higher than of the CPUs. This make it interesting to use the GPU for general purpose computing (GPGPU). I begin by looking at the architecture of the GPU, and some different techniques for programming on a GPU, including some of the available high- level languages. �...
ABSTRACT Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the flow of sensitive information during such an exchange. Previous work on ATN is based on access control techniques, and cannot handle cyclic policy interdependency satisfactorily. We show that the problem can be modelled as a 2-party secure function evaluati...
ABSTRACT In our present society, communication is more or less the “cannot – do – without” that people always say and the strength of every successful business generally. The impact of this can be felt in the life of individuals, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication lines and distribute it equally among the popula...
ABSTRACT The study is all about design and implementation of ONLINE TUTORIAL GLOBAL FORUM FOR EDUCATORS AND STUDENTS. The current study is concerned with reducing work lag-time on online global tutorial forum for educators and student’s platforms, and delivering undergraduates and postgraduate programmes all over the world. The research has highlighted various kinds of ONLINE TUTORIAL GLOBAL FORUM FOR EDUCATORS AND STUDENTS platforms such as teleconferencing, virtual reality and video-confe...
ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of online student registration system. Almost all our Higher Institution has gone into online student registration system because of the extraordinary benefit resulting from information technology. Information technology has enabled an online administration syst...
ABSTRACT On-line Voting System is a web based system that facilitates the running of elections and surveys online. This system has been developed to simplify the process of organizing elections and make it convenient for voters to vote remotely from their home computers while taking into consideration security, anonymity and providing other additional capabilities. TABLE OF CONTENT TITLE PAGE CERTIFICATION APPROVAL DEDICATION ACKNOWLEDGEMENT ABSTRACT TABLE OF CONTENT CHAPTER ONE 1.0INTRODUC...