Abstract: Network(ed) sensor systems are seen by observers as an important technology that will experience major deployment in the next few years for a plethora of applications, not the least being national security. Typical applications include, but are not limited to, data collection, monitoring, surveillance, and medical telemetry. In addition to sensing, one is often also interested in control and activation. For this purpose in this paper, cellular automata is used for independent routing...
India is now home to the worlds largest number of blind people. Over 37 million people across the globe who are blind, from them 15 million are from India. The proposed system is to help the blind to know the letters through voice communication. In this electromechanical Braille system, the main objective is understand and acknowledgment mobile messages, to eliminate the barriers that prevent visually challenged children and adults for using mobiles. Thus the existing accessibility features...
The rapid development of information technology has introduced distinct solutions to cope with the nature of daily activities in more simultaneous and sophisticated approach. Smartphone devices are among those solutions which can facilitate such activities given their merits and design specifications in terms of their layout, size, multitasking mechanisms, personalization, and the offering technology. Smartphone market has witnessed a large gross of mobile sales in the last two years. According...
In today's modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been studied in order to grasp the main concepts of malware and its impacts on information technology as well as current security protection available in today's market.IntroductionThe purpose of this report is to give the reader an understanding on the concepts of malware and what technologies are...
Microsoft word was release on 29th September 1983. It was released during the PC World and free demonstration of the application was given to the PC World subscribers. Microsoft Word is what we call WYSIWYG (what you see is what you get) design. Moreover, Microsoft Word process output far superior compared to other products.Advantages of Microsoft WordAvailabilityMicrosoft Word has an advantages of availability because of you can find Microsoft Word installed in any computers around us...
The importance of a supply chain and prompt delivery to end customers continuously increases. A supply chain is a set of relationships between suppliers, manufacturers, distributors, and retailers that facilitates the transformation of raw materials into final products [1]. One of the major topics studied in facility location is the supply chain network (SCN) design. This network is a series of nodes and transportation links. The design of the SCN depends on factors, such as type of products,...
Abstract-Security is an important issue for any type of networks, especially for wireless ad-hoc networks. Many security mechanisms have been proposed for ad-hoc networks, one of them is KAMAN, but this mechanism has a problem. Kerberos tickets used in KAMAN authentication scheme can be captured over the network are prone to replay attacks. The research work described in this document demonstrates that the modification in KAMAN protocol can increase authorization. Tickets replay attacks in...
INTRODUCTION: As foreseen by the ITRS (International Technology Roadmap for Semiconductor), the scaling of transistor dimensions is expected to be the main trend in the future years. The miniaturization of transistor scaling in past decades has allowed the semiconductor industry to shape up the performance of the digital current and integration density in terms of speed, stability and portability. The performance achieve by the bulk silicon based transistor was effective but they were...
Abstract Our course project focuses on the security and privacy issues in social networking sites. Being the largest internet applications used by enormous amount of users throughout the world these sites and their users are likely to face many security and privacy breaches. The deliverable for this project will be a presentation and full report on the assessment of various security and privacy issues on popular social networking sites. The report will also focus on what has been done to defend...
This project paper discusses about a security measure designed to secure the short message service of GSM which currently has no specific security in the air interfaces (between user and base station). The means of dong it is by encrypting the text messages at the end system and allowing only intended party to perceive the contents or information through the usage of same shared secret key. The algorithm chosen is Blowfish Cipher by a computer security expert Bruce Schneir. This paper is about...