Hash functions or algorithm generates fixed-size digest using variable-size message. Hash algorithms are one-way which cannot be decoded to original message once converted, Hash algorithms such as MD5, SHA-1, HAVAL, etc..These algorithms have served the internet era in many ways such as securing the software distribution and online payment mechanism. Another new Hash algorithm named Aegishjalmur developed by my supervisor. This algorithm is introduced in my dissertation and comparing its...
Multimedia is a general term used to describe any application or technology that can be used to manipulate a number of types of media like text, audio, images, graphics, and video. Multimedia provides a level of interactivity with each of these elements separately, as well as through a combination of different multimedia mediums. Multimedia is the use of technology to better communicate information. This includes the use of digital video, interactive programs, Internet content, graphics, audio,...
Subcarrier based space processing was conventionally employed in Orthogonal Frequency Division Multiplexing systems under Multiple-Input and Multiple-Output (MIMO) channels to achieve optimal performance. At the receiver of such systems, multiple Discrete Fourier Transform (DFT) blocks, each corresponding to one receive antenna, are required to be used. This induces considerable complexity. In this paper, we propose a pre-DFT processing scheme for the receiver of MIMO-OFDM systems with...
This paper provides the interoperability between DHCP and DNS over TCP/IP network. The basic idea and operation of DHCP and DNS is mentioned initially which support the queries. The DHCP will be assigning the temporary IP address which are non-routable to the user system on lease for a certain period and disconnect after lease and update information is maintained in its servers. The DNS will do mapping between the host name and the actual IP address. It provides the methods to avoid the...
The Ad-hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in ad-hoc mobile networks. AODV is a reactive protocol: the routes are created only when they are needed. It uses traditional routing tables, one entry per destination, and sequence numbers to determine whether routing information is up-to-date and to prevent routing loops. An important feature of AODV is the maintenance of time-based states in each node: a routing entry not recently used is expired. In case of a...
Knowing about OS or operating system leads any computer user to clearly know how his computer runs. A good definition of operating system is: "an operating system is a set of software and data, which operate and run on a computer, in order to manage and control computer hardware, it also provides an efficient interface for various application software". Functions of OS: Therefore the operating system does an essential and very important role in the functioning of the whole computer...
The aim of this project is carry out performance testing on a web application and deliver the performance verification report. The concept of performance testing is new to me and I learned it in detail before proceeding to carry out the performance testing. The performance of the application is one of the important requirements considered to be used by the customers. I have taken a web application, warehouse management application developed by one of the senior and studied the application and...
This report elucidates the significance of web standard for web designing. A brief introduction depicts the requirement of web standard and further w3c consortium Standard has been discussed. The discussion then focuses on the different web standard Accessibility, Device-Independence, Backwards Compatibility, Web Interoperability and Web validation. The report critically evaluates the importance of web standard in potential use of web site. The web was framed for the use of sharing knowledge...
The design and implementation of Intelligent Tutoring Systems (ITS) is a very complex task, as it involves a variety of organizational, administrative, instructional and technological components. In addition, there are no well established methodologies or development tools for ITS implementation. Therefore systematic, disciplined approaches must be devised in order to leverage the complexity of ITS implementation and achieve overall product quality within specific time and budget limits (Vladan...
Low-density parity-check (LDPC) codes are forward error-correction codes, which were invented by Robert Gallager in his PhD thesis in 1962 [1]. After long term neglect, LDPC drew the attention of numerous researchers. Nowadays, design techniques enables LDPC codes approach the capacity of classical memory-less channels within hundredths of decibel [2]. In addition to the theoretical research, LDPC codes have been utilized in many fields, such as satellite-based digital video broadcasting and...