ABSTRACT Electronic circuit simulation uses mathematical models to replicate the behavior of an actual electronic device or circuit. Simulation software allows for modeling of circuit operation and is an invaluable analysis tool. Due to its highly accurate modeling capability, many Colleges and Universities use this type of software for the... Continue Reading
ABSTRACT File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books. It may be implemented through a variety of storage, transmission, and distribution models and common methods of file sharing incorporate manual sharing... Continue Reading
ABSTRACT This system provides online comprehensive solution for providing online registration services for Mathematics and Computer Science students, their courses and other registration procedural requirements. The system dedicates its resources to becoming the best Tertiary institution web based portal for students. The resources included in... Continue Reading
ABSTRACT This project deals with the design and implementation of an expert system for car faults diagnosis. The project is motivated by the need to guide car owners and learners motor mechanics in the maintenance and trouble shooting of motor problems without having to resort to presumptions and conjectures. Particularly, it is expected that the... Continue Reading
ABSTRACT As mobile phone handsets attain increasing capabilities, we see many more opportunities for novel applications development. These handsets are typically characterized as constrained computing platforms, due to limitations in computing, storage and interface capabilities. Specialized development environments, such as J2ME, allow for... Continue Reading
ABSTRACT Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a streaming provider. The name refers to the delivery method of the medium rather than to the medium itself. The distinction is usually applied to media that are distributed over telecommunications networks, as most other... Continue Reading
ABSTRACT The XTC ad-hoc network topology control algorithm shows three main advantages over previously proposed algorithms. First, it is extremely simple. Second, it does not assume the network graph to be a Unit Disk Graph; XTC proves correct also on general weighted network graphs. Third, the algorithm does not require availability of node... Continue Reading
ABSTRACT Contemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and, typically, there are discrepancies between the actual workflow processes and the... Continue Reading
ABSTRACT This project is all about Windows management and instrumentation, Window is an operating system that is a typical example of free software and open source development. The source code of Window is available for anyone to use, modify, and redistribute freely. The many Window distributions differ for various reasons including technical,... Continue Reading
ABSTRACT This study discusses factors affecting the customer value, and the performance of the WEBSHOP MAIL WEBSHOP SITE model. In our case, the biggest trading company in our country developed Webshop mail webshop site model to be taken into use in its supermarkets. The time was not yet right to implement the web shopping with shopping cart,... Continue Reading
ABSTRACT Internet Relay Chat, or IRC, is a means of chatting online in real-time through a client application like mIRC, through which data is sent via connected servers to various computers which are in turn connected to those servers all across the world. Internet Relay Chat (IRC) allows people across the world to chat in real-time with each... Continue Reading
ABSTRACT Focusing on methods that are used to implement strong user authentication for online-consumer identities, this article aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level. It discusses effective solution... Continue Reading
ABSTRACT In software engineering, performance testing is testing that is performed, to determine how fast some aspect of a system performs under a particular workload. It can also serve to validate and verify other quality attributes of the system, such as scalability, reliability and resource usage. Performance testing is a subset of Performance... Continue Reading
ABSTRACT Supply Chain Management encompasses the planning and management of all activities involved in sourcing and procurement, conversion, and all logistics management activities. Importantly, it also includes coordination and collaboration with channel partners, which can be suppliers, intermediaries, third-party service providers, and... Continue Reading
ABSTRACT This project is all about Web based administration of linux server which is focus on the administrative aspect of the company and also it gives each member access to his/her own corporate environment which will not affect the environment of the other staff in the company. In this kind of system all the staff of the company have access to... Continue Reading
ABSTRACT In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server. The... Continue Reading
ABSTRACT Sending e-cards via email is becoming increasingly common. Here we create a WAP-enabled greeting card system called WAP Reetings, which allows WAP-enabled device users to send greeting cards to other WAP users. Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP... Continue Reading
ABSTRACT WallMaster inherits the basic key features of its commercial brother, WallMaster Pro. You can program the desktop wallpaper to change at a predetermined time interval (e.g. every 10 minutes) and customize the wallpaper position (tile, center, fit to screen, auto fit, or custom) easily. With all its cool and unique features packed within a... Continue Reading
ABSTRACT Voice based xml is the name of a technology standard developed and managed by the Voice based xml Forum (www.voice based xml.org). It builds upon the work of earlier technologies such as VoXML from Motorola and SpeechML from IBM to create a standardized way to interact with services through a voice interface. Not surprisingly, this... Continue Reading
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of a video and photo editing. Many video organizations have gone into video and photo editing because of the... Continue Reading
ABSTRACT Kate is the default text editor in linux, and also one of the most powerful and feature-rich text editors available for Linux. It can also be used successfully as an IDE (integrated development environment) and supports, among many others, spell-checking, highlighting for a huge amount of programming languages, it has an integrated... Continue Reading
ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless... Continue Reading
ABSTRACT In addition to sending messages between users, instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text messaging. In other words, the technique shown in Figure 2 is always used for file transfers. This peer-to-peer scheme is used to... Continue Reading
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of nitc student information system. Almost all our Higher Institution has gone into nitc student information... Continue Reading
ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available.... Continue Reading