Facebook Twitter Delicious Stumble Upon
0 comments

wireless Lan security implementation

One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this problem reflects issues that have long troubled many types of wired networks (it has been possible in the past for individuals to plug computers into randomly available Ethernet jacks and get access to a local network), this did not usually pose a significant problem, since many organizations had reasonably good physical security. However, the fact that radio signals bleed outside of buildings and across property lines makes physical security largely irrelevant to Piggybackers. Such corporate issues are covered in wireless security


wireless lan,what is wireless lan,information security

wireless lan,what is wireless lan,information security


information security wireless access point wireless router network security lan security wireless lan adapter
information security wireless access point wireless router network security lan security wireless lan adapter wireless lan mobile wireless security wireless security wireless security system reviews wireless security cameras wireless network security wireless security system wireless lan mobile wireless security wireless security wireless security system reviews wireless security cameras wireless network security wireless security system
0 comments

Wireless USB from the USB-IF





With more than 2 billion legacy wired USB connections in the world today, USB is the de facto standard in the personal computing industry. Soon, these same, fast, interoperable connections will become available in the wireless world, with the introduction of Wireless USB from the USB-IF. Wireless USB is the new wireless extension to USB that combines the speed and security of wired technology with the ease-of-use of wireless technology. Wireless connectivity has enabled a mobile lifestyle filled with conveniences for mobile computing users. Wireless USB will support robust high-speed wireless connectivity by utilizing the common WiMedia MB-OFDM Ultra-wideband (UWB) radio platform as developed by the WiMedia Alliance.

 

UWB technology offers a solution for high bandwidth, low cost, low power consumption, and physical size requirements of next-generation consumer electronic devices.
* Wireless USB is the first high-speed wireless personal interconnect technology to meet the needs of multimedia consumer electronics, PC peripherals, and mobile devices.
* Wireless USB will preserve the functionality of wired USB while also unwiring the cable connection and providing enhanced support for streaming media CE devices and peripherals.
* Wireless USB performance is targeted at 480Mbps at 3 meters and 110Mbps at 10 meters.











wireless usb adapters wireless usb card wireless usb2.0 adapter wireless usb internet wirelessusbadapters wireless usb card wireless usb 2.0 adapter wireless usb internet wireless usb driver wireless n usb adapter wireless usb to hdmi wireless usb print server belkin wireless usb adapter driver wireless usb link belkin wireless usb adapter belkin wireless usb linksys wireless usb wireless router with usb wireless usb dongle wireless usb wireless card usb wireless n usb wireless usb to usb wireless usb drivers wireless usb adaptor wireless usb network adapter wireless usb adapterwireless usb driver wireless n usb adapter wireless usb to hdmi wireless usb print server belkin wireless usb adapter driver wireless usb link belkin wireless usb adapter belkin wireless usb linksys wireless usb wireless router with usb wireless usb dongle wireless usb wireless card usb wireless n usb wireless usb to usb wireless usb drivers wireless usb adaptor wireless usb network adapter wireless usb adapter


0 comments

Wireless USB advantages and disadvantages


usb drivers,wireless usb adaptor

Wireless USB is a short-range, high-bandwidth wireless radio communication protocol created by the Wireless USB Promoter Group. Wireless USB is sometimes abbreviated as "WUSB", although the USB Implementers Forum discourages this practice and instead prefers to call the technology "Certified Wireless USB" to differentiate it from competitors. Wireless USB is based on the WiMedia Alliance's Ultra-WideBand (UWB) common radio platform, which is capable of sending 480 Mbit/s at distances up to 3 meters and 110 Mbit/s at up to 10 meters. It was designed to operate in the 3.1 to 10.6 GHz frequency range, although local regulatory policies may restrict the legal operating range for any given country.


Keyword for more Search



wireless usb adapters wireless usb card wireless usb 2.0 adapter wireless usb internet wireless usb adapters wireless usb card wireless usb 2.0 adapter wireless usb internet wireless usb driver wireless n usb adapter wireless usb to hdmi wireless usb print server belkin wireless usb adapter driver wireless usb link belkin wireless usb adapter belkin wireless usb linksys wireless usb wireless router with usb wireless usb dongle wireless usb wireless card usb wireless n usb wireless usb to usb wireless usb drivers wireless usb adaptor wireless usb network adapter wireless usb adapterwireless usb driver wireless n usb adapter wireless usb to hdmi wireless usb print server belkin wireless usb adapter driver wireless usb link belkin wireless usb adapter belkin wireless usb linksys wireless usb wireless router with usb wireless usb dongle wireless usb wireless card usb wireless n usb wireless usb to usb wireless usb drivers wireless usb adaptor wireless usb network adapter wireless usb adapter

0 comments

what is xml ? methodology of xml



As a large quantity of information is represented in XML format on the Web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex, however, XML security comes to involve not only network security but also managerial security. But XML encryption support only simple network security. So it cannot support multiple users and multiple access control policy. In this paper, an integration method of encryption and access control policy for securing XML documents is proposed. This methodology can support multiple authorizations of multiple users with integrating access control.



Related more search keyword

xml viewer xml spy xml editors driveimage xml edi xml xml online tutorials xml comment free xml editor xml specification w3c xml xml dtd xml viewer xml spy xml editors driveimage xml edi xml xml online tutorials xml comment free xml editor xml specification w3c xml xml dtd open xml file xml editor free xml formatter xml tutorial xml database xml tags xml files xml file xml document xml examples xml format xml schema xml parser xml editor what is xml open xml file xml editor free xml formatter xml tutorial xml database xml tags xml files xml file xml document xml examples xml format xml schema xml parser xml editor what is xml


0 comments

Unix Millennium Bug or 2038 problem



The year 2038 problem (also known as the Unix Millennium Bug, Y2K38, Y2.038K, or S2G by analogy to the Y2K problem) may cause some computer software to fail at some point near the year 2038. The problem affects all software and systems that both store system time as a signed 32-bit integer, and interpret this number as the number of seconds since 00:00:00 UTC on Thursday, 1 January 1970.[1] The farthest time that can be represented this way is 03:14:07 UTC on Tuesday, 19 January 2038.[2] Times beyond this moment will "wrap around" and be stored internally as a negative number, which these systems will interpret as a date in 1901 rather than 2038. This is caused by Integer overflow. The counter "runs out" of usable digits, "increments" the sign bit instead, and reports a maximally negative number (continuing to count up, towards zero). This will likely cause problems for users of these systems due to erroneous calculations.

Further, while most programs will only be affected in or very close to 2038, programs that work with future dates will begin to run into problems much sooner. For example, a program that works with dates 20 years in the future will have to be fixed no later than in 2018.

Because most 32-bit Unix-like systems store and manipulate time in this format, it is usually called Unix time, and so the year 2038 problem is often referred to as the Unix Millennium Bug. However, any other non-Unix operating systems and software that store and manipulate time this way will be just as vulnerable.
0 comments

Code division multiple access (CDMA)

ABSTRACT


Code division multiple access (CDMA) is a channel access method used by various radio communication technologies. It should not be confused with the mobile phone standards called cdmaOne and CDMA2000 (which are often referred to as simply CDMA), which use CDMA as an underlying channel access method.

One of the basic concepts in data communication is the idea of allowing several transmitters to send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). This concept is called multiple access. CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code) to allow multiple users to be multiplexed over the same physical channel. By contrast, time division multiple access (TDMA) divides access by time, while frequency-division multiple access (FDMA) divides it by frequency. CDMA is a form of spread-spectrum signalling, since the modulated coded signal has a much higher data bandwidth than the data being communicated.

An analogy to the problem of multiple access is a room (channel) in which people wish to talk to each other simultaneously. To avoid confusion, people could take turns speaking (time division), speak at different pitches (frequency division), or speak in different languages (code division). CDMA is analogous to the last example where people speaking the same language can understand each other, but other languages are perceived as noise and rejected. Similarly, in radio CDMA, each group of users is given a shared code. Many codes occupy the same channel, but only users associated with a particular code can communicate.
0 comments

BitTorrent is a peer-to-peer file sharing protocol free seminar topic



Abstract


BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data.[vague] BitTorrent is one of the most common protocols for transferring large files, and it has been estimated that it accounted for roughly 27% to 55% of all Internet traffic (depending on geographical location) as of February 2009.


Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms.





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Beowulf (computing) free seminar topic | seminar title




Abstract

A Beowulf cluster is a computer cluster of what are normally identical, commercially available computers, which are running a free and open source software (FOSS), Unix-like operating system, such as BSD, Linux, or Solaris. They are networked into a small TCP/IP LAN, and have libraries and programs installed which allow processing to be shared among them. Originally referring to a specific computer built in 1994 by Thomas Sterling and Donald Becker at NASA, Beowulf systems similar to the original NASA system are now deployed worldwide, chiefly in support of scientific computing. They are high-performance parallel computing clusters of inexpensive personal computer hardware. The name comes from the main character in the Old English poem Beowulf, which was bestowed by Sterling because the epic poem describes Beowulf as having "thirty mens' heft of grasp in the grip of his hand."
There is no particular piece of software that defines a cluster as a Beowulf. Commonly used parallel processing libraries include Message Passing Interface (MPI) and Parallel Virtual Machine (PVM). Both of these permit the programmer to divide a task among a group of networked computers, and collect the results of processing. Examples of MPI software include OpenMPI (OpenMPI) or MPICH (MPICH). There are additional MPI implementations available



computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,

0 comments

Asynchronous on-chip networks Free seminar topic | seminar title




Abstract

Various kinds of asynchronous interconnect and synchronisation mechanisms are being proposed for designing low power, low emission and high-speed SOCs. They facilitate modular design and possess greater resilience to fabrication time inter-chip and run-time intra-chip process variability. They can provide a solution for low power consumption in chips and simplify global timing assumptions, e.g. on clock skew, by having asynchronous communication between modules. A few methodologies, including globally asynchronous, locally synchronous and desynchronisation, aim at leveraging the benefits of both synchronous and asynchronous design paradigms. The authors survey various methodologies used for leveraging asynchronous on-chip communication. They investigate various GALS based implementations, desynchronisation strategies and asynchronous network-on-chip (NoC) designs






computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Applications of artificial intelligence FRee seminar topics | seminar tiltle




Abstract

Artificial intelligence has been used in a wide range of fields including medical diagnosis, stock trading, robot control, law, scientific discovery and toys. However, many AI applications are not perceived as AI: "A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore. "Many thousands of AI applications are deeply embedded in the infrastructure of every industry."In the late 90s and early 21st century, AI technology became widely used as elements of larger systems, but the field is rarely credited for these successes.






computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Application of delay tolerant networking (DTN) in Airborne Networks : free seminar topics



Abstract

As airborne networks (ANs) evolve and become increasingly net-centric, it is critical that apt consideration is given to properly extend Internet protocol (IP)-based networking services to the tactical assets. This is an effort to resolve current interoperability issues through the use of a standard protocol and provide IP connectivity between all airborne network platforms. However, large gaps exist between the current AN architecture and future envisioned net-centric capabilities. The dynamic nature of the AN topology, typically characterized by highly intermittent links and long link delays, limits the use and effectiveness of Internet-based standards and protocols. Developed separately, the delay tolerant network (DTN) architecture has been designed to address the needs of networks characterized by link intermittency, lack of end-to-end connectivity between end users, and high latency. While originally developed for deep space networking and inter-planetary communications, DTNs are highly applicable for sensor-based networks, terrestrial wireless networks, satellite networks, underwater acoustic networks as well as airborne networks. This paper addresses the specific challenges of establishing and maintaining reliable communications within an IP-based AN environment. In addition, this paper provides an overview of DTN, and details how this technology may be integrated into to the AN infrastructure in order to address the current issues affecting AN performance





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Analysis of Queuing Delay in RPR Networks free seminar title, topics




Abstract

Resilient packet ring (RPR) that has been standardized as IEEE 802.17 is a MAC layer protocol designed for data centric metropolitan area network applications. A well-designed RPR network would be able to offer QoS guarantee for throughput and delay sensitive data classes in addition to providing other types of low cost best effort services. Careful network planning would be required to allow successful provisioning of classA services with strict delay and jitter requirements over RPR networks. This would require the knowledge of the dependency of delay and jitter for classA traffic on the load that is added to the ring. In this article, we propose an algorithm to estimate the dependency of delay and jitter for classA traffic in RPR networks on the total traffic added to the ring by nodes. We will follow an analytical approach based on queuing theory to find the probability density function of the delay for classA packets and try to find a closed-form solution to the problem using some simplifying assumptions. Simulations are used to verify the results of analytical derivations





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Analysis of coordination mechanisms in a two-echelon supply chain free seminar topics




Abstract

Coordinating the supply chain is a main object of supply chain management, and an inventory decision model is developed to analyze the coordination of a two-echelon supply chain with one supplier and one retailer. The products in our paper are perishable and sold over a single selling season. After discussing a pure wholesale price contract, we put forward a return contract. Then several tactics are proposed to improve the performance of the traditional return contract. All our findings are illustrated by a numerical example





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,

0 comments

An On-Chip In-Circuit Emulation Architecture for Debugging an Asynchronous Java Accelerator free seminar topic and title



Abstract


The solution to debug a problem in a deeply embedded system is to integrate the debug and communication module inside the chip. In this paper, we propose an on-chip in-circuit emulation (ICE) architecture for debugging an asynchronous Java accelerator core which can be integrated with any existing processor and operating system. The operation of this ICE module and the debug strategy of the Java accelerator are specifically designed for asynchronous implementation. They not only facilitate the system development but also provide a manufacture test method for asynchronous chips.




computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

An OFDM-specified lossless FFT architecture : free seminar topics ,seminar title




Abstract



In this paper, a VLSI architecture based on radix-22 integer fast Fourier transform (IntFFT) is proposed to demonstrate its efficiency. The IntFFT algorithm guarantees the perfect reconstruction property of transformed samples. For a 64-points radix-22 FFT architecture, the proposed architecture uses 2 sets of complex multipliers (six real multipliers) and has 6 pipeline stages. By exploiting the symmetric property of lossless transform, the memory usage is reduced by 27.4%. The whole design is synthesized and simulated with a 0.18-mum TSMC 1P6M standard cell library and its reported equivalent gate count usage is 17,963 gates. The whole chip size is 975 mumtimes977 mum with a core size of 500 mumtimes500 mum. The core power consumption is 83.56 mW. A Simulink-based orthogonal frequency demodulation multiplexing platform is utilized to compare the conventional fixed-point FFT and proposed IntFFT from the viewpoint of system-level behavior in items of signal-to-quantization-noise ratio (SQNR) and bit error rate (BER). The quantization loss analysis of these two types of FFT is also derived and compared. Based on the simulation results, the proposed lossless IntFFT architecture can achieve comparative SQNR and BER performance with reduced memory usage


computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics, 
0 comments

Ajax : free seminar topic | seminar title




Abstract

Ajax ( is a group of interrelated web development methods used on the client-side to create interactive web applications. With Ajax, web applications can send data to, and retrieve data from, a server asynchronously (in the background) without interfering with the display and behavior of the existing page. Data is usually retrieved using the XMLHttpRequest object. Despite the name, the use of XML is not needed (JSON is often used instead), and the requests need not be asynchronous.
Like DHTML and LAMP, Ajax is not one technology, but a group of technologies. Ajax uses a combination of HTML and CSS to mark up and style information. The DOM is accessed with JavaScript to dynamically display, and to allow the user to interact with the information presented. JavaScript and the XMLHttpRequest object provide a method for exchanging data asynchronously between browser and server to avoid full page reloads.


computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Adaptive power-fidelity in energy-aware wireless embedded systems free seminar topic

Adaptive power-fidelity in energy-aware wireless embedded systems




Abstract

Energy aware system operation, and not just low power hardware, is an important requirement for wireless embedded systems. These systems, such as wireless multimedia terminals or wireless sensor nodes, combine (soft) real-time constraints on computation and communication with requirements of long battery lifetime. In this paper, we present an OS-directed dynamic power management technique for such systems that goes beyond conventional techniques to provide an adaptive power vs. fidelity trade-off. The ability of wireless systems to adapt to changing fidelity in the form of data losses and errors is used to tradeoff against energy consumption. We also exploit system workload variation to proactively manage energy resources by predicting processing requirements. The supply voltage, and clock frequency are set according to predicted computation requirements of a specific task instance, and an adaptive feedback control machanism is used to keep system fidelity (deadline misses) within specifications. We present the theoretical framework underlying our approach in the context of both a static priority-based preemptive task scheduler as well as a dynamic priority based one, and present simulation-based performance analysis that shows that our technique provides large energy savings (up to 76%) with little loss in fidelity (<4%). Further, we describe the implementation of our technique in the eCos real-time operating system (RTOS) running on a StrongARM processor to illustrate the issues involved in enhancing RTOSs for energy awareness.



computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

Achieving EMC compliance by design - case study of fixed remote station in corDECT WLL system | free seminar topic

Achieving EMC compliance by design - case study of fixed remote station in corDECT WLL system


Abstract

Telecommunication has an important role in society enabling effective voice & data communication between people across the globe. EMC compliance is mandatory and vital for telecom products. This paper deals with the efforts put in during the design & development and EMC testing of such a telecom product - Wireless in Local Loop (WLL) system to comply to International standards like ETSI, IEC & CISPR and National standards like TEC. This paper also highlights the advantages of incorporating EMC design rules in early stage of design, due to flexibility in choosing of components like filters, shields and protective devices to achieve cost-effective solution and avoiding field modification. A case study of telecom product, viz., (FRS) Fixed Remote Station of Wireless Local Loop (WLL) subsystem, used in subscriber premises for voice telephony and Internet connectivity is taken up for elucidating EMI problems encountered during the EMC certification process and the measures taken to mitigate the same. The experience gained during this FRS EMC compliance certification of the corDECT system will substantially reduce the cycle time in future products with better design margin. Emission and susceptibility requirements from Standard Institutes to meet the Regulatory Authorities are also outlined







computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

A uniform laser energy control for ceramic sintering rapid prototyping free seminar topics

A uniform laser energy control for ceramic sintering rapid prototyping


Abstract

The rapid-prototyping has become popular nowadays as the lifecycles of commercial and consumer products have been shorten to years or even months. The rapid prototyping technology provides a modern way to review the rapid change of the product has forced the designers and manufacturers to make new designs, jigs, tools, and molds for the products. Unlike the traditional machining of cutting material, the rapid prototyping utilize technologies, such as etching, laser, etc., to form the shapes of designed articles within limited time and cost. As cutting-through is prohibited, means to control the machining are required and important to the success of prototyping. This study has focused on the laser energy control for the ceramic rapid prototyping, which will sinter the ceramic powders into a solid object. A uniform laser energy controller is developed to improve the quality of the ceramic working piece. The developed method has been implemented and tested on a MCU and FPGA controller to demonstrate its applicability to ceramic sintering rapid prototyping.





computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

A Tempest Fiber Optic Local Area Network post free seminar topics

A Tempest Fiber Optic Local Area Network post

Abstract



Local Area Networks (LANs) are coming to the forefront in data communications for both commercial as well as military applications. This thrust has resulted from the requirement to provide communications and resource sharing between dispersed users of computers and/or workstations. For many government/military applications, security is a key aspect. This paper describes a recently developed TEMPEST LAN which utilizes optical fiber as the communications medium along with LAN transceivers and communication servers designed to meet TEMPEST requirements. The LAN operates at 10 Mb/s using the Ethernet and IEEE 802.3 Standards.




computer science, computer science seminar topics, computer seminar topics, network control systems, ieee seminar topics, it seminar topics, computer science, seminar title, seminar, seminar topics,
0 comments

A New Routing Scheme Based on Greedy Tree in Delay Tolerant Networks

A New Routing Scheme Based on Greedy Tree in Delay Tolerant Networks


Abstract


Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although the messages are transferred to the destination, the redundant of messages copies increase much. These routing protocols are not appropriate for energyconstrained and bandwidth-constrained applications such as the wireless networks. In many resource-constrained mobile wireless DTN networks, single copy routing schemes should be used suitably. This paper presents a new routing scheme of single-copy based on the DTN connectivity graph and the corresponding greedy tree. The nodes choose the next intermediate node to transmit the message by comparing the location of nodes in the greedy tree. We show that delivery ratio is increased significantly by using our scheme in the single-copy routing



0 comments

A Fast Number Theoretic Finite Radon Transform - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



A Fast Number Theoretic Finite Radon Transform

 

Abstract


This paper presents a new fast method to map between images and their digital projections based on the Number Theoretic Transform (NTT) and the Finite Radon Transform (FRT). The FRT is a Discrete Radon Transform (DRT) defined on the same finite geometry as the Finite or Discrete Fourier Transform (DFT). Consequently, it may be inverted directly and exactly via the Fast Fourier Transform (FFT) without any interpolation or filtering [F. Matus and J. Flusser (1993)]. As with the FFT, the FRT can be adapted to square images of arbitrary sizes such as dyadic images, prime-adic images and arbitrary-sized images. However, its simplest form is that of prime-sized images [T. Hsung, D. Lun, and W. C. Siu (1996)]. The FRT also preserves the discrete versions of both the Fourier Slice Theorem (FST) and Convolution Property of the Radon Transform (RT). The NTT is also defined on the same geometry as the DFT and preserves the Circular Convolution Property (CCP) of the DFT [J. M. Pollard (1971) and C. Rader (1972)]. This paper shows that the Slice Theorem is also valid within the NTT and that it can be utilized as a new exact, integer-only and fast inversion scheme for the FRT, with the same computational complexity as the FFT. Digital convolutions and exact digital filtering of projections can also be performed using this Number Theoretic FRT (NFRT).
0 comments

Achieving EMC compliance by design - case study of fixed remote station in corDECT WLL system | seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Achieving EMC compliance by design - case study of fixed remote station in corDECT WLL system 


 

Abstract



Telecommunication has an important role in society enabling effective voice & data communication between people across the globe. EMC compliance is mandatory and vital for telecom products. This paper deals with the efforts put in during the design & development and EMC testing of such a telecom product - Wireless in Local Loop (WLL) system to comply to International standards like ETSI, IEC & CISPR and National standards like TEC. This paper also highlights the advantages of incorporating EMC design rules in early stage of design, due to flexibility in choosing of components like filters, shields and protective devices to achieve cost-effective solution and avoiding field modification. A case study of telecom product, viz., (FRS) Fixed Remote Station of Wireless Local Loop (WLL) subsystem, used in subscriber premises for voice telephony and Internet connectivity is taken up for elucidating EMI problems encountered during the EMC certification process and the measures taken to mitigate the same. The experience gained during this FRS EMC compliance certification of the corDECT system will substantially reduce the cycle time in future products with better design margin. Emission and susceptibility requirements from Standard Institutes to meet the Regulatory Authorities are also outlined


0 comments

A uniform laser energy control for ceramic sintering rapid prototyping - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


A uniform laser energy control for ceramic sintering rapid prototyping




Abstract



The rapid-prototyping has become popular nowadays as the lifecycles of commercial and consumer products have been shorten to years or even months. The rapid prototyping technology provides a modern way to review the rapid change of the product has forced the designers and manufacturers to make new designs, jigs, tools, and molds for the products. Unlike the traditional machining of cutting material, the rapid prototyping utilize technologies, such as etching, laser, etc., to form the shapes of designed articles within limited time and cost. As cutting-through is prohibited, means to control the machining are required and important to the success of prototyping. This study has focused on the laser energy control for the ceramic rapid prototyping, which will sinter the ceramic powders into a solid object. A uniform laser energy controller is developed to improve the quality of the ceramic working piece. The developed method has been implemented and tested on a MCU and FPGA controller to demonstrate its applicability to ceramic sintering rapid prototyping.
0 comments

A Tempest Fiber Optic Local Area Network Seminar Topic - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


A Tempest Fiber Optic Local Area Network




Abstract



Local Area Networks (LANs) are coming to the forefront in data communications for both commercial as well as military applications. This thrust has resulted from the requirement to provide communications and resource sharing between dispersed users of computers and/or workstations. For many government/military applications, security is a key aspect. This paper describes a recently developed TEMPEST LAN which utilizes optical fiber as the communications medium along with LAN transceivers and communication servers designed to meet TEMPEST requirements. The LAN operates at 10 Mb/s using the Ethernet and IEEE 802.3 Standards.


0 comments

Delay tolerant networking Free Seminar Topic - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

Delay tolerant networking 

 

Abstract




Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although the messages are transferred to the destination, the redundant of messages copies increase much. These routing protocols are not appropriate for energyconstrained and bandwidth-constrained applications such as the wireless networks. In many resource-constrained mobile wireless DTN networks, single copy routing schemes should be used suitably. This paper presents a new routing scheme of single-copy based on the DTN connectivity graph and the corresponding greedy tree. The nodes choose the next intermediate node to transmit the message by comparing the location of nodes in the greedy tree. We show that delivery ratio is increased significantly by using our scheme in the single-copy routing
0 comments

A methodology for architecture-oriented rapid prototyping - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

A methodology for architecture-oriented rapid prototyping



Abstract



A methodology for architecture-oriented rapid prototyping is presented. In the very early development phases, concept-oriented rapid prototyping is used to clarify the requirements between the customer and the contractor. In the second, more complex phase of rapid prototyping, the architecture of the target system is used. So this kind of rapid prototyping is called “architecture-oriented rapid prototyping”. Most electronic control units (ECUs) use microcontrollers with plenty of on-chip peripherals. Sometimes, application-specific microcontrollers with non-standard peripherals are used, but then, all of these peripheral components must be present in the rapid prototyping system. To obtain this, we developed an interface module with an FPGA for the peripheral parts of microcontroller-based designs, as well as a prototyping ECU which can be programmed with CASE tools

0 comments

A human-computer interface for a multi-sensor surveillance environment - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


A human-computer interface for a multi-sensor surveillance environment



Abstract


Presents a human-computer interface for a multi-sensor surveillance systems capable of adapting to the human's changing performance with time. The interface's algorithm works as follows. As the human performs tasks, his performance is measured and this knowledge is integrated together with the estimated task arrival and service rates. An optimal task allocation, based on the current human and system performances, is chosen which then determines which tasks are allocated to the human and to the computer respectively. The algorithm was tested within a human controlled surveillance system. Results showed that the use of the interface enhanced the human's performance during periods of high mental workload




0 comments

A decision making human-computer interface - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


A decision making human-computer interface



Abstract


A decision-making human-computer interface capable of adapting to the human's changing performance with time is presented. The interface's components are identified, and a suitable theoretical framework for each component is discussed. The interface's algorithm is based on the following interaction of the components. As the human performs tasks, his or her performance is measured and this knowledge is integrated with the estimated task arrival and service rates. An optimal task allocation that determines which tasks are allocated to the human and to the computer is then chosen on the basis of the current human and system performance. The algorithm was tested in a human-controlled surveillance system. Results showed that the use of the interface enhanced the human's performance during periods of high mental workload







0 comments

A decision making human-computer interface - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



A decision making human-computer interface

Abstract


A decision-making human-computer interface capable of adapting to the human's changing performance with time is presented. The interface's components are identified, and a suitable theoretical framework for each component is discussed. The interface's algorithm is based on the following interaction of the components. As the human performs tasks, his or her performance is measured and this knowledge is integrated with the estimated task arrival and service rates. An optimal task allocation that determines which tasks are allocated to the human and to the computer is then chosen on the basis of the current human and system performance. The algorithm was tested in a human-controlled surveillance system. Results showed that the use of the interface enhanced the human's performance during periods of high mental workload


0 comments

Load Balancing in Parallel Computers - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

Abstract



A parallel compute is a collection of processing elements that communicate and cooperate to solve large problems efficiently.
Parallel computers vary in two fundamental architecture facets, (i) Single Instruction Multiple Data (SIMD) Vs Multiple Instruction Multiple Data (MIMD) and (ii) Shared memory Vs Distributed memory. A parallel computer with a logically shared memory system provides a single global address space to all processors, and hence a shared programming paradigm to the users. Such systems ae referred as distributed shared memory (DSM) machines.

Load balancing on DSM machines is a challenging task, even though the shared global address space may be used as a common pool for work-loads awaiting as in centralized memory systems. Accessing remote memory banks are very expensive, an appropriate distribution of work-loads across physically distributed memories helps reduce such costly remote access.

Creating parallel programs involves first decomposing the overall computation into tasks and then assigning the tasks to the processors, this step is also called as partitioning. The optimization objective for partitioning is to balance the work-load among processors and to minimize the inter process communication needs. The number of processes generated by the partitioning step may not be equal to the processors, thus a processor may be idle or loaded with multiple processes. The primary optimization objective of mapping is to balance the workload of processors and to minimize the inter-processor communication cost. Collectively, the problem of load balancing is to develop partitioning and mapping algorithm for the purpose of achieving their respective optimization objectives.

Load balancing algorithms can be broadly categorized as static or dynamic. Static load balancing algorithms distribute the processes to processors at compile time, while dynamic algorithms bind processes to processors at run time. Static load balancing algorithms rely on the estimate execution times of the processes and inter-process communication requirement. It is not satisfactory for parallel programs that are of the dynamic and/or unpredictable kind. Consequently in dynamic load balancing, processes are generated and destroyed without a pattern at run time. A dynamic load balancing algorithm consists of four components, Load Measurement rule, an Information Exchange rule, an Initiation rule and a Load Balancing Operation.
0 comments

Digital Watermarking Applications and Advantages - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Digital Watermarking Applications and Advantages

 

 

Abstract




Digital watermarking is defined as the imperceptibly altering a work in order to embed information about that work. In the recent years copyright protection of digital content became a serious problem due to rapid development in technology. Watermarking is one of the alternatives to copyright-protection problem.


Digital watermarking can be classified as visible and invisible. The visible watermarks are viewable to the normal eye such as bills, company logos and television channel logos etc. This type of watermarks is easily viewable without any mathematical calculation but these embedded watermarks can be destroyed easily. In the case of invisible watermarks, the locations in which the watermark is embedded are secret, only the authorized persons extract the watermark. Some mathematical calculations are required to retrieve the watermark. This kind of watermarks is not viewable by an ordinary eye. Invisible watermarks are more secure and robust than visible watermarks.

The main characteristics of Digital watermark are:
Robustness: The watermark should be able to withstand after normal signal processing operations such as image cropping, transformation, compression etc.
Imperceptibility: The watermarked image should look like same as the original image to the normal eye. The viewer cannot detect that watermark is embedded in it.
Security: An unauthorized person cannot detect, retrieve or modify the embedded watermark.

Depending on the ability of the watermark to withstand normal signal processing operations, digital watermarking can be categorized as robust, fragile and semi-fragile watermarking. Robust watermarks are detectable even after some image processing operations has been performed on the watermarked image such as image scaling, bending, cropping, and so on. Robust watermarks are mainly used for copyright protection. Fragile watermarks became invalid even if a slight modification is done to the watermarked image. Fragile watermarks are mainly used for authentication purpose. Semi-fragile watermarks allow some acceptable distortion to the watermarked image. Beyond this acceptance level if any modification is done to the watermarked image, the watermark will not be detected.
0 comments

Information or Data Visualizing Techniques - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Information or Data Visualizing Techniques


Abstract



Visualization is the graphical presentation of information, with the goal of providing the viewer with a qualitative understanding of the information contents. Information can be in any form, like data, processes, relations, or concepts. Graphical presentation may entail manipulation of graphical entities (points, lines, shapes, images, text) and attributes (color, size, position, shape). Understanding of information involves detection, measurement, and comparison. It can be further enhanced via interactive techniques and providing the information from multiple views and with multiple techniques.


One of the active research and challenging task is representing and making sense of multidimensional data, partially due to the three- dimensional space we live in. Visualization techniques are powerful sense-making tools that support knowledge workers in their decision-making activities by stimulating visual thinking. While most of the scientific, engineering, and business data is multi-dimensional; i.e. datasets contain typically more than three attributes of data.

Characteristics of Data:

    * Numeric, symbolic (or mix)
    * Scalar, vector, or complex structure
    * Various units
    * Discrete or continuous
    * Spatial, quantity, category, temporal, relational, structural
    * Accurate or approximate
    * Dense or sparse
    * Ordered or non-ordered
    * Disjoint or overlapping
    * Binary, enumerated, multilevel
    * Independent or dependent
    * Multidimensional
    * Single or multiple sets
    * May have similarity or distance metric
    * May have intuitive graphical representation (e.g. temperature with color)
    * Has semantics which may be crucial in graphical consideration

The purpose of information visualization is the insights into data that it provides. Diversity analysis has got a great significance in economic and other branches of social science. Visualizing the Diversity Analysis gives significant importance in identifying the profitability of the commodities as well as the countries. The concentration measures such as entropy and Herfinahl-Hirschman Index (HHI) gives the significant results in identifying the Diversity nature of the countries as well as the commodities. We visualized the commodity export data along with the Concentration Measures using star coordinates.
0 comments

Real-time Transport Protocol (RTP) - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science






Abstract




As we all of us have experienced the advent of Voice over IP (VoIP) has given a new dimension to Internet and opened a host of new possibilities and opportunities for both corporate and public network planners. Many companies are seeing the value of transporting voice over IP networks to reduce telephone and facsimile costs.

Voice over Internet Protocol (also called IP Telephony, Internet telephony, and Digital Phone) – is the routing of voice conversations over the Internet or any other IP-based network. It was important to deal with challenges like interoperability, packet loss, delay, density, scalability, and reliability while adding voice to packet networks. The basic protocols being used at the network and transport layer have remained unchanged. This calls for the definition of new protocols, which can be used in addition with the existing protocols.


Real-Time Transport Protocol (RTP) is result of extensive research to meet the growing demands of industry and a common user. RTP usually used in conjunction with the RTP Control Protocol (RTCP). While RTP carries the media streams (e.g., audio and video) or out-of-band events signaling (DTMF in separate payload type), RTCP is used to monitor transmission statistics and quality of service (QoS) information. When both protocols are used in conjunction, RTP is usually originated and received on even port numbers, whereas RTCP uses the next higher odd port number.

For further information use the following recourses and comment if you have any questions or suggestions.
0 comments

10 Gigabit Ethernet - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



Abstract

The 10 gigabit Ethernet (10GE or 10GbE or 10 GigE) computer networking standard was first published in 2002. It defines a version of Ethernet with a nominal data rate of 10 Gbit/s (billion bits per second), ten times as fast as gigabit Ethernet.

10 gigabit Ethernet defines only full duplex links which are generally connected by network switches. Half duplex operation and CSMA/CD (carrier sense multiple access with collision detection) do not exist in 10GbE.

The 10 gigabit Ethernet standard encompasses a number of different physical layer (PHY) standards. However a networking device may support different PHY types by means of pluggable PHY modules and over time market forces narrow products to a few popular choices.
At the time that the 10 gigabit Ethernet standard was developed, interest in 10GbE as a wide area network (WAN) transport led to the introduction of a WAN PHY for 10GbE. This operates at a slightly slower data-rate than the local area network (LAN) PHY and adds some extra encapsulation. Both share the same Physical Medium Dependent sublayers so can use the same optics. Over time, the local area options became more popular.
From 2007 when only 1 million ports were shipped, 10 gigabit Ethernet deployments rose quickly to 124 million ports shipped in 2009. Other reports indicate the number of switch ports was slightly greater than two million ports in 2009.
0 comments

Security in Mobile Database Systems - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



Abstract


The importance of databases in modern businesses and governmental institutions is huge and still growing. Many mission-critical applications and business processes rely on databases. These databases contain data of different degree of importance and confidentiality, and are accessed by a wide variety of users. Integrity violations for a database can have serious impact on business processes; disclosure of confidential data in some cases has the same effect. Traditional database security provides techniques and strategies to handle such problems with respect to database servers in a non-mobile context.


For many businesses applications are going mobile that means using enterprise data in a mobile context, thus using a mobile DBMS. With these new developments the business data of an enterprise can be made available to an even larger number of users and a wider range of applications than before.

To work on business data anytime and anywhere is the major goal pursued by developing mobility support in database context. The confidentiality of mission- critical data must be ensured, even though most mobile devices do not provide a secure environment for storage of such data.
Security requirements that apply to a central company database should apply similarly and in an appropriate manner to the parts of the database replicated on mobile devices in the field. A mobile database security infrastructure is needed to accomplish this goal. When developing such an infrastructure we can benefit from the results of traditional database security work. But we also need to adapt the existing techniques and strategies to the mobile context, and we need to develop new ones that attack certain issues specific to use of database systems in a mobile environment.
0 comments

Radio Network Controller for 3G mobile and wireless network devices - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



Abstract

The Radio Network Controller (or RNC) is a governing element in the Universal Mobile Telecommunications System UMTS radio access network (UTRAN), which is responsible for control the Node Bs that are connected to it. Node B is a term used in UMTS to denote the BTS (base transceiver station). Usually the latest cell phones or mobile phones support 3G network allow access to TV, Internet and other on demand services like Navigation and scheduling systems. This is being developed to support the ever increasing need to mobile phones network users. This also an active area of research which may lead to digital convergence.


The functionality of the controller includes controlling and managing the radio transceivers in the Node B equipment, as well as management tasks like soft handoff. The main functions of the RNC are management of radio channels and the terrestrial channels. Radio Resource Management functionality includes Outer Loop Power Control, Load control, Admission Control, Packet scheduling, Handover control, Macrodiversity combining, Security functions and Mobility Management.

The RNC performs tasks in a 3G wireless network analogous to those of the Base Station Controller (BSC) in a 2G or 2.5G network. It interfaces with GPRS Service Nodes (SGSNs) and Gateways (GGSNs) to mediate with the network service providers. The connection from the RNC to a Node B is called the User Plane Interface Layer and it uses T1/E1 transport to the RNC.

Due to the large number of Node B transceivers, a T1/E1 aggregator is used to deliver the Node B data over channelized OC-3 optical transport to the RNC. The OC-3 pipe can be a direct connection to the RNC or through traditional SONET/SDH transmission networks. A typical RNC can be built on a PICMG or Advanced TCA chassis. It contains several different kinds of cards specialized for performing the functions and interacting with the various interfaces of the RNC.
0 comments

Next Generation Protocol (IPv6) - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science



Abstract

 

One of the greatest revolutionary innovations of the twentieth century is Internet. The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by a broad array of electronic and optical networking technologies.


Rapidly, there is a dramatic change in the way we communicate, do business, educate ourselves and entertain ourselves. Perhaps even the architects of Internet would not have foreseen the tremendous growth rate of the network being witnessed today. It made the ‘global village utopia ‘ a reality in a rather short span of time.

Using the internet it is easy for the people to exchange ideas, resources and information. Likewise there are millions of users to the Internet and the drawback of the Internet is that it cannot adequately support many services being imagined, such as interconnection of gigabit networks with lower bandwidths, high security applications and interactive virtual reality applications.

A more serious problem with today’s Internet is that it can interconnect a maximum of four billion systems only, which is a small number as compared to the projected systems on the Internet in the twenty-first century.

As IPv4 support 32 bit address, which is given to each machine on the net and unique. With 32 bits, a maximum of about four billion addresses are possible. Even though this is a large number, but the latest trends of accessing Internet from mobile phones, TV sets, and even pizza machines will lead to the shortage of addressing bits. Since each of them must have an IP address, this number becomes too small.
The revision of IPv4 “Internet Protocol version 4” was taken up mainly to resolve the address problem, but in the course of refinements, several other features were also added to make it suitable for the next generation Internet. This refined version was initially named IPng “IP next generation” and is now officially known as IPv6.

IPv6 supports 128-bit addresses
1 comments

Wireless Network Devices and digital convergence seminar title - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

Wireless Network Devices and digital convergence


 I am suggesting next Topic for  research and seminar   Wireless Network Devices and digital convergence .This good topic for both  one.It have many scope for research .You can find more resource and you can present seminar.That will use full for all researchers and other people.We are adding short abstraction of this topic


ABSTRACT


The wireless network digital electronic device includes a television signal receiver, a decoder, a processor, and a wireless network signal transceiver. The television signal receiver receives the television broadcasting signals, the decoder decodes the signals, and the processor encodes the decoded signals into wireless network signals. Subsequently, the wireless network signals are transmitted to the display device using the wireless network signal transceiver.


The proliferation of mobile computing devices including laptops, personal digital assistants (PDAs) and wearable computers has created a demand for wireless personal area networks (PANs). PANs allow proximal devices to share information and resources. The mobile nature of these devices places unique requirements on PANs, such as low power consumption, frequent make-and-break connections, resource discovery and utilization, and international regulations.

Communication demands compatibility, which is challenging in a heterogeneous marketplace. Yet by establishing and implementing compatible systems, manufacturers can offer more powerful and useful devices to their customers. Since these are, after all, digital devices living in a programmed digital world, compatibility and interoperation are possible.

The future of digital era exists in a digital convergence where every device interacts with other devises to make decisions and help human being in their daily life. A TV will interact with Phone and watch to display programs related to human interest and mod. A refrigerator will inform the about the milk when an owner is passing by a super market, and many more examples can be realized in near future. A great research is being carried out in this area and it can be realized with the presence of may conferences and research papers coming everyday.


For details please refer the following recources

wireless router

setting up a wireless network

wireless networking device

wireless networking

wireless network adapter

wireless internet network

wireless networks

securewireless network

digital convergence

wireless network devices

0 comments

Multicasting in Ad Hoc Networks :Seminar title - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

       Multicasting in Ad Hoc Networks

My next seminar title is  multicasting in ad Hoc Networks .It is very important networking topic . this topic which can be used to research and seminar.

ABSTRACT






MANETs are useful in many application environments and do not need any infrastructure support. Collaborative computing and communications in smaller areas (buildings, organizations, conferences, etc.) can be set up using MANETs.
Communications in battlefields and disaster recovery areas are other examples of application environments. Similarly communications using a network of sensors, and inter-island communications using floats over water are other potential applications of MANETs. The increasing use of collaborative applications and wireless devices may further add to the needs and usages of MANETs. Many of these potential applications of MANETs involve point-to-multipoint communication, and thus would benefit from multicasting support in the network layer.


IP multicasting – is an extension to Internet architecture to support multiple clients at network layer. The fundamental motivation behind IP multicasting is to save network and bandwidth resource via transmitting a single copy of data to reach multiple receivers simultaneously.


What makes ad hoc multicasting distinguished from Internet multicasting is that mobile nodes could move around freely and rapidly.


Ad hoc multicasting protocols in existing literature have either evolved from the Internet multicast protocol, or designed specifically for ad hoc networks. Most of these protocols attempt to adapt to the network dynamics in ad hoc networks. The primary goal of ad hoc multicasting protocols should be to construct/maintain a robust & efficient multicasting route even during high network dynamics.
Multicasting techniques in MANETs can be classified based on group dynamics or network dynamics.


A primary issue for managing multicast group dynamics is the routing path that is built for data forwarding. Most existing ad hoc multicasting protocols can be classified as tree-based or mesh-based.


In a tree-based protocol, a tree-like data forwarding path is built with the root at the source of the multicast session. In a mesh-based protocol, in contrast, multiple routes may exist between any pair of source and destination, which is intended to enrich the connectivity among group members for better resilience against topology changes.


A major source of network dynamics is node mobility and node failure


Reliance on More Nodes

Reliance on Fewer Nodes

Reliance on No Nodes

Reliance on Stable Nodes

Reliance on an Overlay Layer

 

 

More topic 


monet

ad hoc networks

mobile ad hoc networking

ad hoc networking

access networks

adhoc networking

adhoc

0 comments

Free seminar topic : Routing In Mobile Ad Hoc Networks - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

    Routing In Mobile Ad Hoc Networks

  
                    My next seminar topic suggestion is Routing in mobile ad Hoc networks.It is a good seminar topic.If you can research with this  topic.The routing is important on in network .We are adding complete Research and seminar topics only.Each topic we can  do research and seminar.


Abstract







Developing support for routing is one of the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing in ad hoc networks interesting.


First, nodes in an ad hoc network are allowed to move in an uncontrolled manner. Such node mobility results in a highly dynamic network with rapid topological changes causing frequent route failures. A good routing protocol for this network environment has to dynamically adapt to the changing network topology.


Second, the underlying wireless channel provides much lower and more variable bandwidth than wired networks. The wireless channel working as a shared medium makes available bandwidth per node even lower. So routing protocols should be bandwidth-efficient by expending a minimal overhead for computing routes so that much of the remaining bandwidth is available for the actual data communication.








Third, nodes run on batteries which have limited energy supply. In order for nodes to stay and communicate for longer periods, it is desirable that a routing protocol be energy-efficient as well. This also provides also another reason why overheads must be kept low. Thus, routing protocols must meet the conflicting goals of dynamic adaptation and low overhead to deliver good overall performance.


Types of Routing in MANETs

 

Flooding


Proactive Routing


Location-Based Routing


On-Demand Routing





Related topic 

mobile ad hoc

ad hoc network

ad hoc routing

ad hoc network routing protocols

dynamic routing

bank routing

0 comments

Minimizing file download time in stocastic peer to peer network - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science

              

Minimizing file download time in stochastic peer to peer network



I am suggesting this topic for seminar because not a seminar topic but also its an project topic.
The minimizing file download time in peer to peer network is successfully executing we can serve more than one people at a time .
that is mean Now server can serve one people at a time .
Then after implementing this concept we can serve more than 10 client a a time.
Its same tike bitorrent.The server and client act both server and client.

The main objective of the system is used to minimize the file download time in a stochastic peer to peer network.
The peer to peer technology is heavilty used for content distribution applications.The early model for content distribution is centralized one.in which the service provider simply sets up a server and every user download files from it.In type of network architecture ,many users have to complete for limited resources in terms of bottleneck bandwidth or procesing power of a single server.As a result ,each user may recieve very poor performance.From a single user's perspective ,The duration of a downloadsession or the download time for that individual users is the most often used performance metric.P2P technology tries to solve of scalability by making the system distributed.Each computer(peer) in the network can act both server and client at the time.Whe nuber of clients are trying to access a fle the peers will give response to clients based on load balancing in the peer Its obivious that as time goes on the sevice capacity of the entire network will increase due to the increse in the number of servicing peers.With this increasing service capacity,Theoretical studies have shown that the average download time for each user in the network is much shoter than that of a centralized network architecture in ideal cases in other words ,users of a p2p network should enjoy much faster downloads.



You can try to implement... its not only a seminar topic but also a project topic


if you know more details about this topic .You can share with readers and increase your knowledge
0 comments

Artificial intelligence research - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Artificial intelligence research



If every one know the what is mean by artificial intelligence.I will post a post on my blog .I will get huge response through email .For how to develop a artificial intelligence  robots.Then i will think to publish new article for beginners . I will worked with artificial intelligence .But i could not like to  publish company name  and personal details.



What is mean by artificial intelligence

I would not like explain definition .I will explain a simple example. We can solve a  mathematical problem.

 Ques: Find the sum of first hundred numbers

The Computer will not identify the values and anything .Here  possible only for spliting word and give values and formula to calculating values the human will be neccessary  to solve.



Here We can implement Artificial intelligence

The computer can be filter the terms and it will be choose the apropriate  key from question.Then it will be solve.



How to solve



Let me assign fixed keyword  like    find, sum,multiplication,addition,minus,.......etc

Then we can save the different formula ...  The formula will be assign with expansion .

Then Question will be insert for solving  program will be divided into multiple pieces and it will be fetch the keyword gallery and assign to variables . The matching formula can find and assign the property for each one.The we can easily solve.




I will think you will got small ideas about artificial intelligence.The efficient programmers will can do better  Artificial intelligence product .sorry i would like to change this word The efficient Thinkers can do better Artificial intelligence product.


Please send your comment

Labels

10 Gigabit Ethernet 2038 bug 2038 problem 2038 unix 3g mobile 3g mobile network 3g mobiles 3g network A apache load balancer Artificial intelligence Artificial intelligence research .Artificial intelligence ideas bca BE bsa bsc Btech computer science computer science seminar topics computer security computer seminar topics d rt data visualization data visualization blog databases databases security digital convergence digital watermark digital watermarking disable ipv6 dr t drt bick dtr E education ethernet controller ethernet switch F face recoganization free radio free watermark gigabit gigabit ethernet gigabit ethernet card gigabit ethernet lan gigabit ethernet switch gigabit switch grid architecture hirschman herfindahl index how to make a watermark human computer interaction human computer interface human factors IEEE ieee seminar topics information security interface design interface designers internet security ip v6 ipv4 to ipv6 ipv6 ipv6 address ipv6 example ipv6 format ipv6 link local ipv6 ping ipv6 to ipv4 ipv6 tunneling IT it seminar topics latest seminar topics load balancer load balancers load balancing lookout mobile security mca millenium bug mobile computing mobile data mobile database mobile tracker mobiles national seminars network control systems network controller network load balancing network radio network security networking online database parallel computer parallel computers parallel computing parallel processing phone radio radon transform Real-time Transport Protocol RTP rtp online rtp protocol rtp stream rtp udp rtp video rtp.pt rtp1 science seminar topics securewireless network seminar seminar title seminar topic seminar topics seminar topics computer seminar topics in computer science seminar topics it seminars seminartitle steganography stochastic network stock trading seminar topics streaming rtp T technology seminar topics test ipv6 the year 2038 problem training training seminars u Ubiquitous udp rtp ui ui patterns umts unix 2038 unix 2038 problem v video compersion visualization of data visualization tool voicexml Vrml water mark watermark free watermark images watermarking watermarks what is 3g what is wireless lan what is xml windows mobile wireless access point wireless card usb wireless internet network wireless lan wireless n usb wireless network devices wireless networks wireless router wireless usb wireless usb adapter wireless usb adaptor wireless usb drivers wireless usb network adapter wireless usb to usb workshop xml document xml editor xml examples xml file xml files xml format xml parser xml schema y2k38 year 2038 year 2038 problem