ABSTRACT We present an algorithm which analyzes memory requirements of the streaming processing of a given XSLT stylesheet on the set of XML documents defined by a given XML schema. This schema-based analyzer represents an integral part of the Xord framework for the streaming processing of XSLT - it determines the most efficient streaming algorithm for a given transformation and the class of XML documents defined by a schema. We describe the implementation of the analyzer for the stack-based ...
ABSTRACT This project entitled “Employee profile management system” has been designed towards improving the Management of Employee Information in the field offices of civil service commission. It maintains Seniority, Leave Records, Transfer & Postings and other basic information of Employee. Various MIS reports can be generated through it Viz. Ever since man discovered the computer and hence computer science, attempt has been made to computerize every facet of human life. This project wor...
ABSTRACT Video steganography is all about transmission of streaming data, in its real-time nature. Though subject to bandwidth constraints, I propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be anything from subtitles to correction signals and watermarking. TABLE OF CONTENT TITLE PAGE CERTIFICATION APPROVAL DEDICATION ACKNOWLEDGEMENT ABSTRA...
ABSTRACT An e-mail server is the computerized equivalent of your friendly neighborhood mailman. Every email that is sent passes through a series of mail servers along its way to its intended recipient. Although it may seem like a message is sent instantly - zipping from one PC to another in the blink of an eye - the reality is that a complex series of transfers takes place. Without this series of mail servers, you would only be able to send emails to people whose email address domains matched...
ABSTRACT With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge rather an electronic means of learning has continued to evolved. Electronic learning (e-learning), which facilitates education using communications or network, has made learning possible from anywhere at anytime using the internet, wide area networks or local area networks. Notably, e-learning applications which have now...
ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losse...
ABSTRACT As we move past the middle of the decade, the trend continues away from host-based to client- server systems. It's no secret this operational migration has caused as many new network management problems as it has answered. Intensified requirements come from all directions: more nodes, more uptime, more communications, more flexibility, more shared resource availability, more desktop capabilities, more reliability. More everything except the standards that have seemingly been left beh...
ABSTRACT The growth of information and communication technologies (ICTs) has already revealed an impact on our modern society. Mobile messaging technologies have already been considered as a key field for variety of research to pick up the knowledge how ICTs can help the modern society people, who are dynamically shifting toward information-based civilization. Duplex messaging for enterprise system (DMES) is one of the branches of mobile messaging technologies, which is a rich content message...
ABSTRACT A channel allocation algorithm in a cellular network consists of two parts: a channel acquisition algorithm and a channel selection algorithm. Some of the previous works in this field focused on centralized approaches to allocating channels. But, centralized approaches are neither scalable nor reliable. Recently, distributed dynamic channel allocation algorithms have been proposed, and they have gained a lot of attention due to their high reliability and scalability. But, in most of ...
ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and screening procedure is described which improves the robustness of the system. We also introduce a method to estimate and apply subject norms representing...
ABSTRACT Automation is the partial or full performance by a machine system (mechanical or electronic, or both) of a function previously performed by a human, or which conceivably could be performed by a human. Automation has been developed for decades, though most existing technology is now seen simply as machine operation. Automation is necessary to increase capacity and to improve or maintain safety. Some of the justifications for automation include reliability, speed and (processing) power...
ABSTRACT The study is all about design and implementation of electronic learning (e_learning) system for Nigeria universities. The current study is concerned with reducing work lag-time on electronic learning (e_learning) system for Nigeria universities platforms, and delivering undergraduates and postgraduate programmes all over the world. The research has taken highlighted various kinds of electronic learning (e_learning) system for Nigeria universities platforms such as teleconferencing, v...
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of an e-carrier consultancy services. Almost all our Companies have gone into e-carrier consultancy services because of the extraordinary benefit resulting from information technology. Information technology has enabled an e-carrier consultancy services to work ...
ABSTRACT This article presents a microcomputer-based robot dynamic sensing system by the use of the linear scanning approach for object recognition and manipulation. In this research, a 512 × 1 solid-state photodiode linear array sensor is used for dynamic scanning the object to be identified. An experimental prototype is built, which consists of a fully opened parallel jaw gripper and a 360d̀ turnable pedestal located between the jaws of the gripper. The sensor with the lens is mounted nea...
ABSTRACT This project work is concerned with the use of the Net Banking services and solution operations, a case study of the Intercontinental Bank Plc Enugu. Net Banking services and solution is a way for the customer to perform banking actions on his or her cell phone or other mobile device. It is a quite popular method of banking that fits in well with a busy, technologically oriented lifestyle. It might also be referred to as M-banking or SMS banking. The Electronic in acts over evolving ...