The field of defense has started concentrating on the info-wars, which have become a new possibility in the current era.  Valuable secret information could be sabotaged, manipulated or even, sold thereby, posing a threat to the very essence of confidentiality. Steganography has been playing a remarkable role in prevention of info-sabotage by adopting a principle of undetectable secret sharing. This technique camouflages the secret data into a unsuspecting image, thereby protecting the very...
With recent advancement in technology need for analysis of such unbounded streams is increasing day by day. Data mining process helps to excavate useful knowledge from rapidly generated raw data streams. In context with the continuously generated data, mining data streams is emerging challenging task in which several issues like limited space, limited time, accuracy, handling evolving data need to be considered. In this paper the main method of research is clustering which is focused to handle...
Abstract-The proposed work describes on study and development of visualization tool for investigating the speech perception from internal articulators movement of Tamil speech sounds. To improve accuracy of speech production a computer aided articulator interface is developed. The interface contain front and the side view of an animated face model which displays various possible movements of visible inner articulators such as tongue and lip. The tongue and the lip model plays a vital role to...
Presently pretty much everything has an interface that permits people to communicate with systems. Interface is just intermediate. Users or viewers use this intermediate to communicate with the products. By using this intermediate viewers accomplish their goals. Interface should be designed with usability principle in consideration. People of all ages as well as people with disability should be able to learn about interface easily. According to the assignment this essay will discuss about the...
Optimisation is based on the technique called MPR (Multi Point relaying). The proactive routing protocols in MANET keep constant update of entire network. It can be explained as the entire network should be known to all the nodes, these results in constant overhead of routing traffic but there will be no initial delays during communication. As OLSR is a table-driven protocol its main operation consists of updating and maintaining information in variety of tables. In OLSR, only selected nodes...
Today internet and Internet base technologies has become part of our daily life. The Internet operates using set of rules called Internet protocol as it foundation. The Internet Protocol is used to interconnect packet-switched communication network to make-up internet. It transmit block of data (datagram) received to and from source and destination host. [1][2] The present version of Internet Protocol IPv4 that is use by different organisations worldwide and in the internet was developed 30...
Now days, large number of banking transactions is done by the customer itself in online. Tracking all these transactions &maintaining the records of currency with respect to every individual citizen is a very difficult task. Even though many financial institutions devised their plan for monitoring and coordination, we try to propose a mechanism to enhance the existing system using Unique Identity and Fuzzy Inference Rules. The idea is to synchronize the data base related to all financial...
Reliability evaluation has been broadly used for power system planning and operations, since they are capable of incorporating various system uncertainties such as equipment failures as well as random variations in generation capacity or load demand. Meanwhile, power systems are becoming more complicated, which leads to highly nonlinear problems in their reliability evaluation. The purpose of assigning the reliability of a composite power system is to estimate the ability of the system to...
Information technology has become a crucial mean to provide information for any enterprises. It is utilized in all functions by the companies to manage the operations as well as increasing their competitiveness in the marketplace. In the last decade, IT has been made a high jump in it by increasing computing speed, decreasing the size of the equipments, adding new applications, etc. Therefore, the computers will be familiar devices when they are being used in the working environment like the...
The idea of this project initially generated from the research carried out in the module Project Skills, an interest of Bare Metal Virtualization and further more a Virtualized Exchange environment particularly in low budget. Regular discussions with Mr. Edwin Keen and Mr. Rob Campbell, the findings prior to extensive research, using a limited resourced hardware structure for virtualized and dedicated MS Exchange 2010 and observing performance issues in both environments. After final discussion...