In the 21st century mobile phones are in everyone's pocket and handbag. The main reason for this is that the multimedia processors were used in mobile phones. This paper is about the multimedia processors in mobile technology. This was impossible many years ago, but it is possible now in applications that can be implemented effectively and many mobile phone applications have changed people's lives. These technological applications developed so far are easy and useful. This paper describes the...
In the last few years, there has been a dramatic growth of use of wireless local area networks (WLANs), due to cost effective, convenient and easy solution for installing data networks. However, security over WLANs is more complicated compared to that of wired LANs. As a result, maintaining and improving the security of WLANs remains a major concern, especially for critical applications as, for example, the SCADA networks. In order to provide effective protection of data confidentiality and...
This operating system also called Macintosh OS, is developed, marketed and sold by the Apple Incorporation and since 2002 it has been included in the all Macintosh computer systems. Some of the features of this operating sytem are discussed below:Workspaces:It saves the configuration including location, window settings, and shell configurations of all the opened windows as a workspace. These configurations can then be recalled instantly.MAC Synchronization for System Preferences:With .Mac...
Mobile communication is becoming a strategic tool used by many organizations to leverage their productivity and facilitate communication. STARfruit Communications Sdn.Bhd is a regulatory agency which regulates utility companies in Malaysia. STARfruit Communications Sdn.Bhd has Head quarter and one branch based in Kuala Lumpur. Actually they have a client server and desktops connected to the wired network. However they decided to mobilize their desktop machines to be used on PDAs mobile...
INTRODUCTION A recent white paper from Cisco predicts that the mobile data traffic will almost double every year to increase from 0.2 EB per month in 2010 to 3.6 EB per month 2014 [1]. 802.11ad is one of the latest technologies in 802.11 families. According to IEEE 802.11 official Timeline, 802.11ad is still under process to be standardized and be recognized. It is expected to complete the process by Dec 2012 or earlier than that [2]. This is a huge evolution in telecommunication technology...
The development of GPU accelerated Neighborhood Dependent Component Feature Learning super resolution algorithm started with the MATLAB version obtained through collaboration between High Performance Computing Lab and Dr. Vijayan Asari at the University of Dayton. The MATLAB implementation was functionally sound but its performance fell well below than par. As such CPU only implementation written in high performance language C++ using Open Source Computer Vision library (OpenCV) was developed,...
Nowadays, the botnet is considered as one of the most dangerous threat on the internet [1]. Botnet is defined as a collection of compromised computers connected to the internet called bots that were controlled by an attacker to perform various types of attacks such as including spam, phishing, click fraud, key logging, key cracking, and denial of service (DoS). The attacker gains the control of the bot machine by installing and running a malicious program in this machine. This can be done in...
It is difficult to pin down precisely what an operating system is but here I will try to give few definitions and basic concepts of an operating system. An operating system (OS) is a layer of a computer system between hardware and the user programs (user software).An OS does what all software does; it implements some desired functionality by building on the functionality available at lower levels. An OS is build directly on hardware interface and provides the interface between the hardware and...
The main job of an engineer in his entire life is to design and test different systems. It will also include the various specifications and also the analysis of the systems and will result in the final product which helps in getting the results. The final result does not only include the working of the product but can be the software and also codes which will help in detecting the failure rate of the product in the future. As per the research done by - S.Drakunov and V.Utkin (1995) it can be...
This dissertation focuses on the design of a lowpass and a bandpass sigma-delta ADC in simulink. The objective is to compare the performance of these two types of converters in terms of their signal-to-noise ratio. It is found that the performance of a first order lowpass sigma-delta ADC matches to that of a second order bandpass sigma-delta ADC. Moreover it is deduced that the calculated effective number of bits (n) of the sigma-delta ADC is equivalent to an n-bit conventional ADC. Thus for...