1.1. Overview The use of agent-based systems is widespread in all aspects of every day life and industry for example commercial aircrafts, automobile industry, consumer products, chemical plants, aerospace systems, nuclear power plants, medical devices, weapon systems and public transportation. This extensive use has brought two important issues, accuracy and completeness, although these seem to have been given a lower priority than rapid technological developments. The need for more robust,...
When we use multihop cellular network to transmit the data, the main problem is faulty nodes ands and selfish nodes. We can avoid the faulty nodes by using appropriate firewalls at the sender side and receiver side. The selfish nodes are avoid by charging the source and destination nodes when both of them benefit from the communication and it can secure the payment, charge the source and destination nodes almost computationally free, and significantly reduce the number of generated and...
Robotics is technology that deals with the design, construction and operation of robots that are used in numerous applications is called robotics. It has become an unstoppable force in the development of modern machinery as they make life easier. It is an interesting topic to dwell in as it is the future of mankind. Although we know them as recent inventions, the idea of automated or controlled machines has fascinated humans. With this fascination it motivated me to work on this project,...
The research is focused to explore online privacy in social networking sites with a view to create users privacy, and determine if the existing privacy settings and features really protect user's privacy violation, with Facebook as case study social. INTRODUCTION: The issue of online privacy in social networking sites has become an issue of serious concern to users of Facebook and general public. The fact that new users are required to upload photographs, date of birth, names, sex, interest,...
Today, it is widely recognized computer is really essential for the entire world. During the 21th century, many people were realize using computer could help them successful a lot of things with easier, either that's for calculation or management. Of course, besides the hardware and software component, there has a most important thing to keep a computer system working smoothly, which is the operating system. Even though many people are using computer, but most of them doesn't know how it...
In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. For such environments, Mobile Ad-Hoc Networks or MANETs will be the most suitable option of deployment as they do not require any infrastructure and are easily deployed. The main problem with MANETs, however, is the energy of each mobile node, which has to be conserved for an efficient working. For that we designed an energy efficient algorithm that uses network...
The conceptual model provides a formal and instinctive way to specify the data used in the application. It is developed by conforming to the new data modeling language based on RDF Graphs. The main ingredients of the RDF based data model are Resources which are used to represent any entity in the application domain and Associate predicates which are used to interconnect resources and to represent features of the particular resource, while representing semantic association between...
Microsoft SilverLight is a cross-browser and is a application framework for writing, running, building, creating, and delivering Rich Internet Application (RIA) for the web, and with the features and purpose similar as Adobe Flash, such as support multimedia, graphics, video, animation and so on. Besides that, SilverLight also give developers supports for Common Language Infrastucture (CLI) language and development tools. The run-time environment of the SilverLight is also available as a...
Ethernet is a family of frame-based computer networking technologies for local area networks (LANs). The name comes up to from the physical idea of the ether. It define a number of wiring and signaling standards for the Physical Layer of the OSI networking model in addition to a common addressing format and Media Access Control at the Data Link Layer. Ethernet is standardized as IEEE 802.3. The combination of the twisted pair versions of Ethernet for connecting end systems to the network, along...
I. INTRODUCTION Most of the ad-hoc routing protocols proposed in the current literature presume that nodes are cooperative and are always willing to contribute their own resources (e.g., power, bandwidth, storage) in support of routing processes. In such settings, nodes are assumed to be truthful in the sense that intermediate nodes do not alter the content of forwarded packets and do not mischaracterize routing parameters so as to gain an advantage with respect to routing. However, in...