Computer security is a safety operating system that is an important feature to install on a computer. It ensures safety and protection from unknown users and threats. If a safety operating system is weak, unknown users, or hackers, are able to break into the database and install harmful viruses, as well as steal personal information. Computer security and hacking can have both disadvantages and advantages. Computer security has evolved from early on to being a key component to own. ...
Clustering algorithm is a widely used segmentation method in image processing applications. The algorithm can be easily implemented; however in the occurrence of noise during image acquisition, this might affect the processing results. In order to overcome this drawback, this paper presents a new clustering-based segmentation technique that may be able to find different applications in image segmentation. The proposed algorithm called Denoising-based (DB) clustering algorithm has three...
Abstract- this paper includes the brief summary of data compression. It also includes the various techniques of data compression such as Huffman method, static defined sceme, adaptive Huffman coding. It also includes the future scope of the data compression technique. INTRODUCTION Data compression is often referred to as coding, where coding is a very general term encompassing any special representation of data which satisfies a given need. Information theory is defined to be the study of...
Abstract-The most prefered primary techniques used in software development methodology based on model-driven approach is a model transformation. The model transformation is a generation process made from one model to the other model(s) using a well-defined transformation process. The use of bidirectional model transformation (BMT) is extremely useful in software develepment although some terms are required at infancy stage. To achieve the full benefit of BMT several requirements are needed such...
Today, security is an issue concern by everyone. Many ways of implementing encryption algorithms have been investigated in order to achieve better performance in terms of security level, speed, power consumption and cost. This project will discuss about implementing Tiny Encryption Algorithm (TEA) using Field Programmable Gate Array (FPGA). FPGA are reconfigurable chips that the integrated circuit is designed meant for reconfigurable architecture. A FPGA chips is programmed using Hardware...
GSM, the Global System for Mobile Communications could be described as the second generation of the cellular mobile phone system (2G). In comparison to the first generation, GSM is not an analog system, it is digital. In the beginning of the 1980's mobile phone systems became more and more popular in Europe, but they just had a rather limited capacity. Additionally, most of them were not compatible with one another [comp.Stasiak11]. Although they were based on similar standards (e.g. NMT 450),...
Modulation is the technique of embedment of a signal into the carrier frequency (wave). There may be analog (includes FM, AM) or digital modulation. In digital modulation Binary values 0 and 1 is embedded in the carrier frequency by changing its frequency, amplitude or phase. In this way digital modulation may be ASK (Amplitude shift keying), FSK (Frequency shift keying) or PSK (Phase shift keying). In GSM, GMSK ("Gaussian Minimum shift keying", also known as "Gaussian filtered...
Introduction VPN stands for Virtual Private Network; it is an extension of a private network that contains links across shared pr public networks like the Internet. VPN allows data can be sent between computers across a shared or public internetwork in a manner that emulates the properties of a point-to-point private link. To emulate point to point link, the data is encapsulated with a header which will provide the routing information and permit it across the shared or public transit...
Concocting a Divisive Theory The phenomenal recovery of an mtDNA segment from the arm of the Feldhofer Cave Neandertal was greeted with the enthusiasm and yes, even with the hoopla it deserved. 1 It was a truly significant breakthrough, and from a laboratory that as recently as a year before had predicted it couldn't be done. The supporters of the theory that Neandertals are a different species were beyond exuberance (few others were quoted on the issue). And then, in a crescendo of...
The Friend of a Friend (FOAF) Project The Friend of a Friend (FOAF) project is a metadata scheme for representing information about people and organizations using the Resource Description Framework (RDF). Launched in 2000 under the umbrella of World Wide Web Consortium (W3C) Semantic Web Activity, its creators Dan Brinkley and Libby Miller designed it to "creat[e] a Web of machine-readable pages describing people, the links between them and the things they create and do" (Friend of a...