This project aimed to design and develop an inventory management system which would increase organization, improve efficiency, enhance manageability and promote productivity. The system was created after analysis of the problems, brainstorming of ideas to solve the problems, evaluation of ideas, getting feedbacks and improvement. The objectives of the project were successfully achieved; incorporating a more technological system would further enhance and ease the system.1. INTRODUCTION1.1...
In 2005,the IT industry experts thought that companies in 2006 will be obsessed by a number of new threats like next-generation spyware.Many of the IT industry experts still believes that the worms and viruses pose a greater risk than any other security afflictions.But Natalie lambert who is an security analyst with Cambridge,said that it's been two and half years since there was a virus outbreak that makes the companie's defenses to be brought down.The main reason for this is lack of money for...
The symmetric and parallel construction of Rijndael Cipher makes it stand out among all others as it gives a lot of flexibility to the implementers, easy adoptability with the processors and importantly it does not allow efficient attacks against it. It is the most effective cipher with a very simple algorithm. The thing that appealed me a lot to write on Rijndael is its distinguishing property of repetition, substitutions and transposition which make it almost unbreakable. Every step in linked...
PayPal is a globally well-known and widely used as an e-commerce business to carry out financial payments and other money transfers through the Internet. It substitutes the traditional paper methods for transferring money such as cheques or money orders with online transfer of money [1]. Recently, PayPal discovered in its website three remote-access vulnerabilities and the flaws found were submitted to the PayPal's Bug Bounty Program. The vulnerabilities were reported by researcher Benjamin...
Real-time communications is any mode of communication that the user communicate instantly. Real implies 'live'. Real-time communications can include: Telephony in the conventional sense Mobile and cellular telephone Two-way or multi-way amateur radio IM (instant messaging) VoIP (Voice over IP, also called Internet telephone) IRC (Internet Relay Chat) or other chatting modes Live videoconference communications Live teleconference communications Robotic telepresence. Real Time Communication has...
Web usage mining is a technique to discover usage patterns from Web log in an order to understand and fulfill the needs of users navigating on the Web. Sequential pattern mining is a significant application of web usage mining which is used to extract useful and relevant information from the huge amount of data. Web usage mining has become one of the major fields of most frequently used knowledge domain. It basically mines the data from the web log server by applying algorithm to the pattern...
Computers and computer use have become part of our everyday routines. Aside from writing papers, playing games on the Internet and Instant Messaging your friends, how much do you REALLY know about computers? This investigation will take you back in time to explore the history of computers. Using the provided links you will learn about the first computer (is it really a computer?), and will learn some key names associated with the development of computers. You will also voyage into the middle of...
In this project I will define handover perditions. I will explain basic purpose of handover predictions. I will briefly describe handover predictions in heterogeneous networks. I will discuss how handover can maintain the seamless transmission in wireless networks. I will also discuss the main problems with handover in heterogeneous networks. In wireless network every mobile node or mobile device is connected to its Base Station (BS) or Access Point. Every base station is has its own coverage...
The need for more intensive decision support prompted the introduction of a new generation of tools. These new tools, called online analytical processing (OLAP), create an advanced data analysis environment that supports decision making, business modeling, and operations research activities. OLAP system share four main characteristics; they: ï‚·...
The Java servlet technology's core functionality is to deliver dynamic content to clients. A servlet extends the functionality of a server, and is used to bridge communications between the browser client and server. In this report we review scientific articles that focus on Java servlet functionality to gain insights on general Java servlet design. Also, we use the articles to analyze our own implementation of an invisible website hit counter, and illustrate how Java servlets can enhance web...