Natural & Applied Sciences

Research Papers/Topics Natural & Applied Sciences

INTRUSION DETECTION PREVENTION SYSTEM

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environm...

INTRUSION DETECTION IN WIRELESS AD HOC NETWORK

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environm...

INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEM

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environm...

INTEGRATING SPEECH ENGINE WITH WEB NAVIGATOR

ABSTRACT Integrated speech engine (ISE) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice speaking the text. This project focuses on ISE software tools that use synthesized speech to read any text. There are a wide range of ISE software tools ...

INCREMENTAL DEPLOYMENT SERVICE OF HOP BY HOP MULTICAST ROUTING PROTOCOL (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment of the multicast service by supporting unicast clouds. This paper presents HBH (hop-by-hop multicast routing protocol). HBH adopts the source-specifi...

IMAGE STREAM TRANSFER USING REAL TIME TRANSMISSION PROTOCOL

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions of an image when ...

IMAGE RENDERING FOR GRID TECHNOLOGY

ABSTRACT In this paper, we propose a volume rendering method using grid computing for large-scale volume image. Grid computing is attractive because medical institutions and research facilities often have a large number of idle computers. A large-scale volume image is divided into sub-volumes and the sub-volumes are rendered using grid computing. When using grid computing, different computers rarely have the same processor speeds. Thus the return order of results rarely matches the sending or...

DESIGN AND IMPLEMENTATION OF HTML EDITOR (CASE STUDY OF MICROSOFT CORPORATION)

ABSTRACT A HTML editor is an authoring software program that is used to create content for web sites. HTML software is easy to use since it has a feature that is known as WYSIWYG. When you design web pages you want to use editor features that are simple to understand. You can buy and download HTML management software from the Internet as well as templates that will help you create web pages for your business or personal use. There are many advantages to you when you use editing software to de...

HIDING MESSAGE IN THE NOISE OF A PICTURE

ABSTRACT Text encryption software to hide and encrypt data within a picture undetectable to others! This software allows you to hide text messages within a picture! You can use this software to store personal information, financial details and so forth embedded within a picture, and password protect! So you could even give someone a copy of your videos and they would never know it had your personal information on it! Or, if you want more privacy when sending e-mails, encrypt a message in a pi...

GENETIC ALGORITHM BASED TRAIN SIMULATION USING CONCURRENT ENGINEERING

ABSTRACT To control the traffic during the data transmission with out any loss of packets using genetic algorithm. In this the packets are transferred by frames using mac layer. So Error correction can be easily done. Genetic algorithm based train simulation using concurrent engineering” control over a single wired lane network, the project proposes a technique to transfer the data from one place to another without traffic. The main aim of project is to control over traffic in a single wire...

GENETIC ALGORITHM AND TRAVELLING SALESMEN PROBLEM USING C# AND ATL COM

ABSTRACT This project is about an application used by the travelling salesman, given a finite number of “cities” (I have choosen cities from 1 to a finite number) along with the distance of travel (distance between two cities is randomly choosen) between each pair of them the aim is to find the cheapest distance of visiting all the cities and returning to the starting point. using GA we can get an optimal solution to solve this problem. This is only an example to look at calling COM compo...

FUZZY CONTROL MODEL OPTIMIZATION FOR BEHAVIOR-CONSISTENT TRAFFIC ROUTING UNDER INFORMATION PROVISION

ABSTRACT This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behavior-consistent (BC) information-based control strategies to improve the performance of congested dynamic traffic networks. By adjusting the associated membership function parameters to better respond to nonlinearities and modeling errors, the approach is able to enhance the computational performance of the fuzzy control model. Computational efficiency is an important aspect i...

FIND AND REPLACE UTILITY

ABSTRACT How many times have you run into situations where you need to find-and-replace HTML content across a large web site? For example, you need to swap out headers and footers with SSIs (server side includes) on a large static web site for better maintainability. Or you need to find a header image across a site and replace it with another header image. One of my favorite tools for this task is Dreamweaver's Find and Replace utility. The GUI (graphical user interface) interface is simple t...

EXTRACTING DATA FROM PUBLISHED GRAPHS

ABSTRACT Published graphs in digital documents contain important information. Often, the results of scientific experiments and performance of businesses are summarized using plots. Although graphs are easily understood by human users, current search engines rarely utilize the information contained in the plots to enhance the results returned in response to queries posed by end users. We propose an automated algorithm for extracting information from line curves in graphs. The extracted infor...

DESIGN AND IMPLEMENTATION OF EXAMINATION RESULT ACCORDING TO CLASSES (CASE STUDY OF IMT ENUGU)

ABSTRACT This study was carried out to verify all the manual process involved in generating students examination Result and to seek a way of automating the system for effective operations. Since there is continuous moves towards technological advances that enhanced productivity of labour and free human beings of task more economically by machines. Computer and its appreciations have become vital tools in economic, industrial and social development of advanced countries of the world. Therefore...


8716 - 8730 Of 8880 Results
@