Natural & Applied Sciences

Research Papers/Topics Natural & Applied Sciences

RETRIEVING FILES USING CONTENT BASED SEARCH

ABSTRACT Content Based File Search is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Windows XP and Vis...

DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions of an image when ...

SECURE DATA HIDING AND EXTRACTION USING BPCS

ABSTRACT Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation. Thi...

SEARCH-WEB BASE SEARCH ENGINE

ABSTRACT Web base search engine is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Windows XP and Vista ...

SCALABLE AND EFFICIENT END TO END NETWORK TOPOLOGY INFERENCE

ABSTRACT To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topology among a group of hosts. Previously, Max-Delta has been proposed to infer a highly accurate topology with a low number of traceroutes. However, Max-Delta relies on a central server to collect traceroute results and to select paths for hosts to traceroute. It is not scalable to large groups. In this paper, ...

AUTOMATIC DEPENDENT SURVEILLANCE BROADCASTING (ADSB)

ABSTRACT ADS-B, which consists of two different services ADS–B Out and ADS–B In, will be replacing radar as the primary surveillance method for controlling aircraft worldwide. In the United States, ADS-B is an integral component of the NextGen National Airspace strategy for upgrading/enhancing aviation infrastructure and operations. The ADS-B system can also provide traffic and government generated graphical weather information through TIS-B and FIS-B applications.[3] ADS-B enhances safet...

SHORTEST NODEFINDER IN WIRELESS AD HOC NETWORK

ABSTRACTAd hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of introducing the physical shortest path for the selection of best route offering the fast connection and greater throughput.TABLE OF CONTENTTITLE PAGE ...

SMART KNOWLEDGE PROVIDER

ABSTRACTThe Smart Knowledge Provider and the CAD use a mutual active authentication protocol to identify each other. The card generates a random number and sends it to the CAD, which encrypt the number with a shared encryption key before returning it to the card. The card then compares the returned result with its own encryption. The pair may then perform the operation in reverse. Once communication is established, each message between the pair is verified through a message authentication cod...

STACK IP: NEW PACKET MARKETING AND FILTERING MECHANICS FOR DDOS AND IP SPOOFING DEFENSE

ABSTRACTNetwork administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses, how they are expressed, and the types of unicast addresses assigned to network node interfaces. We demonstrate that the dynamic behavior of queue an...

STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA

ABSTRACTThis paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to take action to contain the attacks appropriately before...

DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND SERVICES APPLICATION WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACTIn our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it.The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among the ...

STEGANOGRAPHY – AN ART OF HIDING DIGITAL INFORMATION

ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your videos and they would never know it had your personal information on it! Or, if you want more privacy when sending e-mails, encrypt a message in a pictu...

TELECOM INVENTORY MAINTENANCE SERVICES APPLICATION WITH ERROR TRACKING

ABSTRACT One of the more popular benefits to outsourcing your maintenance is the ability to improve department focus. Being able to outsource your facility maintenance lets your employees focus more on their higher priority tasks and operational issues. When it comes down to it, facility maintenance should be worry free and reduce stress on both you, your staff, and your company. This is why outsourcing your maintenance also allows your staff to be more efficient and effective while operating...

TEXT TO SPEECH TECHNOLOGY

ABSTRACT Text-to-speech (TTS) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice speaking the text. This project focuses on TTS software tools that use synthesized speech to read any text. There are a wide range of TTS software tools available....

AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY

ABSTRACT Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- th...


8776 - 8790 Of 8880 Results
@