I. Introduction The Internet these days is undergoing a rapid change from simple point-to-point best-effort communication toward a multiservice network that supports a number of multimedia applications and services with prospectively greater bandwidth need. The development of increasingly high bandwidth links has created possibilities for Internet Service Providers to go for a tactic of bandwidth over provisioning in the networks. On the other hand, this technique presently applies...
Evaluation of complex systems are generally complicated and time-consuming. Evaluation is needed nearly for all engineering tasks and the obstacles related with evaluation are increased proportional with complexity. New techniques can be used to automate manual evaluation and to overcome the obstacles related with evaluation that cannot be solved (or very difficultly solved) with conventional computing. In this study, a methodology was developed to handle the heuristic knowledge of experts for...
Fuzzy Logic: Fuzzy logic is extensively used in machine control. The term itself inspires convinced incredulity, sounding equivalent to half baked logic or bogus logic, but the fuzzy part does not refer to a lack of firmness in the method, rather to the fact that the logic involved can deal with fuzzy concepts-concepts that cannot be expressed as true or false but rather as partially true is called fuzzy logic. 2) IRISNet: The IrisNet (Internet scale Resource intensive sensor network services)...
Web services are a software system which is designed to support interoperability over the network is now most widely used web based applications. It enables towards asynchronous and loosely coupled collaboration of cross-domain applications. And as they tend to get wide spread which in turn increases the challenge to maintain access control to protect data. Therefore, now a day more and more data is stored in stored in third party server. But trusting third party servers is difficult. To...
Computer networks are typically a shared resource used by many applications for many different purposes. Sometimes the data transmitted between application processes is confidential, and the application users would prefer that others not be able to read it. A firewall is a specially programmed router that sits between a site and the rest of the network. It is a router in the sense that it is connected to two or more physical networks and it forwards packets from one network to another, but it...
Management of radio spectrum is of fundamental importance now days for wireless communication systems (WCS). Recent studies have shown that most of the available wireless spectrum has been allocated for different WCS and the assigned spectrum is significantly underutilized. For any new WCS, there is a problem of spectrum availability. For this reason dynamic spectrum access techniques are developed. Cognitive radio gives solution for dynamic access of spectrum. Cognitive radio aimed to improve...
Client/server networking grew in popularity many years ago as personal computers (PCs) became the common alternative to older mainframe computers. Client devices are typically PCs with network software applications installed that request and receive information over the network. Mobile devices as well as desktop computers can both function as clients. 2tier architecture is type of client server network. In Two-Tier model, you will have two separate layers namely Client & Server. The...
While creating and maintaining distributed applications, care must be taken about the design choices we make. One of it would be to decide on how the distributed applications are going to be interacting with each other. What would the communication model between these applications look like? How independent are we going to make these systems from each other? There is a need to make sure that the communication and synchronization of the various components across the network is efficient. The...
The Job-Shop Scheduling Problem (JSSP) is one of the most difficult problems, as it is classified as NP-Hard problem. In many cases, the combination of goals and resources exponentially increases the search space, and thus the generation of consistently good scheduling is particularly difficult because we have a very large combinatorial search space and precedence constraints between operations. Exact methods such as the branch and bound method and dynamic programming take considerable...
The present paper deals with the development of expert systems using machine learning techniques to advice the farmers in villages through online. An expert system is a computer program, with a set of rules encapsulating knowledge about a particular problem domain. Machine Learning is a mechanism, used in the development of Expert systems, concerned with writing a computer program that automatically improves with experience. ABC Algorithm was considered as base and proposed a new technique...