In electronics, an integrated circuit is a miniaturized electronic circuit consisting mainly of semiconductor devices, as well as passive components that has been manufactured in the surface of a thin substrate of semiconductor material. Integrated circuits are used in almost all electronic equipment in use today and have revolutionized the world of electronics. Complementary metal-oxide-semiconductor (CMOS) is a major class of integrated circuit and CMOS tecnology is used for a vide variety of...
This research work was assigned to us keeping in view that we in a group of four people could either work on Memory architecture, advanced architecture and Input & Output devices. This assignment aims at making us understand the different versions of processors, virtual memory, memory hierarchy, polling, IRQ conflict and its solution, cache coherence, assembly language and interface module for input & output devices. As we all know memory is all related to storing, acquiring, retaining...
Students are strongly advised to read and follow the instructions to students section at the front of this assignment as well as the assignment questions. Understanding the instructions is part of the assignment and marks may be lost if the directions are not followed. This assignment solution can further be improved by linking to a database to store the data. If you are interested in learning, you must do this. Prepare the assignment in a word processor document and print it for submission....
Crimes that occur in the virtual world as opposed to tangible attacks in the real world are called cyber attacks. Through a successful attack the individual or group involved succeed in stealing sensitive information, causes disruption and denial of service leading to tangible loses which include both financial loses and erosion of credibility. As the Internet grows exponentially end users are benefited by the improvements resulting from increased online access to personal, business and...
A mobile ad-hoc network or MANET is a collection of mobile nodes sharing a wireless channel without any centralized control or established communication backbone. They have no fixed routers with all nodes capable of movement and arbitrarily dynamic. These nodes can act as both end systems and routers at the same time. When acting as routers, they discover and maintain routes to other nodes in the network. With a one-to-many or many-to-many transmission pattern, multicast is an efficient...
Many people believe that cloud computing has a very huge scope in future. With the introduction of cloud computing the conventional way of using the hardware has changed and many of them prefer to use the servers online, but they involve data security issues. For instance consider a popular photo-sharing site Instagram they use Amazon EC2 computing service to provide services to their users, it provides privacy to the users data by using Secure Socket Layer and Secure Shell. Most of the cloud...
Software methodology is a set of activities and associated results which lead to the production of a software product. These may involve the development of software from scratch although it is increasingly the case that new software is developed by extending and modifying existing systems. These activities are mostly carried out by software engineers (Sommerville, 2001). "A methodology in the domain of information system must cover a number of aspects of the project, although coverage...
The World Wide Web Consortium devised these document markup andstyle- sheet languages in the interests of Web device independence,content reuse, and network-friendly encoding. Since 1990's web has become major source of information access. Whether the information is textual or visual form, locating the information needed has always been a difficult task. Search Engines have been improved over the last few years for textual information. When people gained interest in the web and began...
Your shelter is an organisation which as three branches and a headquarter. Currently there is a situation at your shelter as all the file management system is messed up in the whole organizations. The organization currently relays on hard copies and achieved files for data interchange. The costs for communication shooting up as the staffs are using telephones as their primary mode of communication. Therefore time has come to switch to a new system which would bring on the cost of communication...
The Particle Swarm Optimization clustering algorithm can generate more compact clustering results than the traditional K-means clustering algorithm. However, when clustering on high dimensional datasets, the PSO clustering algorithm is notoriously slow because its computation cost increases exponentially with the size of the dataset dimension. Dimensionality reduction techniques offer solutions that both significantly improve the computation time, and yield reasonably accurate clustering...