In internet, Information retrieval is not very efficient as most of the web contents are not understandable by computers.GA enabled ontology for platform free dynamic semantic web aims at enhancing the web content with metadata to make it more meaningful. The analysis of the extracted token is carried out similar to Bootstrapping Ontology using TF/IDF for word ranking and Genetic Algorithm for finding the promise able region of identifying relevant words and fuzzy logic is used for ontology...
Windows is just another piece of software, like the zillions of others lining the store shelves. But it's not a program in the normal sense. Rather, Windows controls the way you work with your computer. For years, computers have clung to a "typewriter" style of work. Just as on a typewriter, people type letters and numbers onto the screen. This time-tested system works well. But it takes a long time to learn, and it's as boring as reading the ingredients on a jar of reduced-fat...
This report discusses video compression using Hadoop and MapReduce framework. Hadoop and MapReduce are fairly new frameworks that support distributed computing with multiple nodes on a cloud network. These frameworks can process data stored on large distributed file systems like Hadoop Distributed File System (HDFS) or Google File System (GFS). MapReduce is a functional programming paradigm suitable to speed up the highly parallelizable processes like video compression. The purpose of the...
This project comprises two portions. The first portion required the students to choose three encryption methods and conduct thorough research on it. The second portion is the development of a simple encryption and decryption program that reads in text message over a network.2.0 IntroductionThe three encryption methods chose was Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and Advance Encryption Standard (AES). In-depth investigation and study were done according to...
Geographic Information System (GIS) is a computer based information system used to analyse and digitally represent and analyse the geographic features present on the Earth' surface and the events (non-spatial attributes linked to the geography under study) that taking place on it. The meaning to represent digitally is to convert analog (smooth line) into a digital form. "Every object present on the Earth can be geo-referenced", is the fundamental key of associating any database to...
Cryptography is "the art of writing in secret characters". Encrypting is the act of translating a normal message to a message written with secret characters (also known as the encrypted message). Decrypting is the act of translating a message written with secret characters into a readable message (the unencrypted message). It is, by far, one of the most important areas in computer security, since modern encryption algorithms can ensure all three pillars of a secure conversation:...
Preamble General-purpose computing on Graphics Processing Unit (GPGPU) is the utilization of GPU to handle computation in applications which are traditionally performed by the central processing unit (CPU). It involves using GPU along with CPU with the aim of accelerating general-purpose scientific and engineering applications. CPUs contains of a few cores which are optimized for serial processing whereas GPUs contains hundreds of smaller cores with high efficiency and designed for parallel...
Knowledge of radio propagation characteristics is a prerequisite for the design of radio communications systems. Unlike fixed communications, the environment of mobile communications is rather difficult to predict. Traditionally, radio channels are modeled in statistical way using real propagation measurement data. Many measurements and studies have been done to obtain the characteristics of radio environment. References (J. B. Anderson. 1995) (B. H. FLEURY. 1996) (D. Molkdar. 1991) and (H....
Virtual privet network mean secure connection over the internet. Virtual privet network is a computer network which include special security technology for secure the data. VPN specially use in intranets, remote access and extranets. This provide for users to access their organization network securely. In some networks they use different types of normal security systems to secure the data from hackers. But sometimes it is not use full, because when the system transferring the data between...
Here we are once again at the Microsoft OS circle where we begin to wonder should I or shouldnt I upgrade. We had a wonderful run with their Windows XP which seems to have been their best OS, for the most part in comparison to their slightly admired, disappointing Vista OS. With all the drama over Microsoft Vista and the foot dragging of many IT shops to convert over to Vista away from XP, Microsoft is now to release an advanced Windows 7 OS. Here we will compare the new Windows 7 to its...