A research paper presents the findings of an investigation on a scholarly topic.  Researchers present their papers in conferences. Research papers are also published in journals and magazines. Researchers use the findings from other research papers as a foundation for their investigations, and reference these sources as a citation. Once they are published, researchers would like to know if anyone has cited their findings. This is possible, to some extent, in currently available search engines,...
Requirements for Advanced Database Technologies Due to business needs and challenges, there is a need for advanced database technologies. There will be need of clustered servers, large memory models and high compressed storage. Although there has been great improvements on database management systems (DBMS) there remains requirements and potential for improvement and creation virtualized, structured or unstructured access to data resulting in simple data management process which is highly...
This paper defines the concept of wireless sensor network that is made by the micro electro -mechanical system technology, wireless communication and digital electronics. In this wireless sensor network applications and the communication architecture are also described. The main purpose of this paper is to explore the different MAC layered protocols.Keywords: wireless sensor network, MAC, routing, Ad hoc network, node localization, clock synchronization and power management.IntroductionWireless...
ABSTRACT: A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the...
We report two different technologies in this paper and they are Mobile WIMAX and Cloud Computing.The fixed and mobile access in a broadband access in a network are being replaced by Mobile WiMax and it is the most extensively used technology nowadays.The effects of WiMax are discussed in the current market.Cloud Computing has been around for a long time now and was not realized due to its bandwidth problem and Cloud Computing is known to have evolved from Grid Computing and is considered the...
Image Compression forms the backbone for several applications such as storage of images in a database, TV and facsimile transmission, video conferencing. Compression of images involves taking advantage of the redundancy in data present within an image. Vector quantization is often used when high compression ratios are required. Quantization is referred to produce of approximating continuous with discrete values. (Digitizing the amplitude values). Vector Quantization is stated as finding the...
Magnetic storage devices are used to store data in magnetic medium. In this term paper we will discuss about its types and working principle. The main logic is that the data will secure in these storage devices and data will store quickly in these devices. In this term paper we will also discuss the future of these devices.MAGNETIC STORAGE DEVICESMagnetic storage and magnetic recording are terms from engineering referring to the storage of data on a magnetized medium. Magnetic storage uses...
The word CRYPTOGRAPHY in Greek means "Secret Writing", which is the ancient methodology of encoding the messages so that only the dispatcher and receiver can understand them (Hingham 1999). Communication and sharing of information has become prominent these days. With the advances in technology many threats has also been increased leading to misuse of the information. Thus Cryptography which started as a modern art now has been extended its roots to every major discipline of...
Magnetic field is a vector field that is produced by a magnet in the direction all around it. By measuring the force that is exerted by the field on a moving charge; the field can be calculated. In the wire the current is flows which results in producing the magnetic field in the form of concentric circles all around it. This magnetic field is perpendicular to the wire. The thumb is in the direction of the current and the curled fingers shows the direction of the magnetic field. The direction...
Abstract The focus of this paper is to present a low-cost and simple approach to designing intelligent home system using the concept of mobile-to-machine and machine-to-mobile communication. First, we develop a general purpose electronic circuit design that can control and monitor a variety of home appliances with interface that can be plugged into GSM handset unit. The design based on PLC comprises microcontroller, adaptation circuit, power circuit, and RS232 interface. Then, we develop...