ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losse...
ABSTRACT As we move past the middle of the decade, the trend continues away from host-based to client- server systems. It's no secret this operational migration has caused as many new network management problems as it has answered. Intensified requirements come from all directions: more nodes, more uptime, more communications, more flexibility, more shared resource availability, more desktop capabilities, more reliability. More everything except the standards that have seemingly been left beh...
ABSTRACT The growth of information and communication technologies (ICTs) has already revealed an impact on our modern society. Mobile messaging technologies have already been considered as a key field for variety of research to pick up the knowledge how ICTs can help the modern society people, who are dynamically shifting toward information-based civilization. Duplex messaging for enterprise system (DMES) is one of the branches of mobile messaging technologies, which is a rich content message...
ABSTRACT A channel allocation algorithm in a cellular network consists of two parts: a channel acquisition algorithm and a channel selection algorithm. Some of the previous works in this field focused on centralized approaches to allocating channels. But, centralized approaches are neither scalable nor reliable. Recently, distributed dynamic channel allocation algorithms have been proposed, and they have gained a lot of attention due to their high reliability and scalability. But, in most of ...
ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and screening procedure is described which improves the robustness of the system. We also introduce a method to estimate and apply subject norms representing...
ABSTRACT Automation is the partial or full performance by a machine system (mechanical or electronic, or both) of a function previously performed by a human, or which conceivably could be performed by a human. Automation has been developed for decades, though most existing technology is now seen simply as machine operation. Automation is necessary to increase capacity and to improve or maintain safety. Some of the justifications for automation include reliability, speed and (processing) power...
ABSTRACT The study is all about design and implementation of electronic learning (e_learning) system for Nigeria universities. The current study is concerned with reducing work lag-time on electronic learning (e_learning) system for Nigeria universities platforms, and delivering undergraduates and postgraduate programmes all over the world. The research has taken highlighted various kinds of electronic learning (e_learning) system for Nigeria universities platforms such as teleconferencing, v...
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of an e-carrier consultancy services. Almost all our Companies have gone into e-carrier consultancy services because of the extraordinary benefit resulting from information technology. Information technology has enabled an e-carrier consultancy services to work ...
ABSTRACT This article presents a microcomputer-based robot dynamic sensing system by the use of the linear scanning approach for object recognition and manipulation. In this research, a 512 × 1 solid-state photodiode linear array sensor is used for dynamic scanning the object to be identified. An experimental prototype is built, which consists of a fully opened parallel jaw gripper and a 360d̀ turnable pedestal located between the jaws of the gripper. The sensor with the lens is mounted nea...
ABSTRACT This project work is concerned with the use of the Net Banking services and solution operations, a case study of the Intercontinental Bank Plc Enugu. Net Banking services and solution is a way for the customer to perform banking actions on his or her cell phone or other mobile device. It is a quite popular method of banking that fits in well with a busy, technologically oriented lifestyle. It might also be referred to as M-banking or SMS banking. The Electronic in acts over evolving ...
ABSTRACT Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications include video-conferencing, distributed database replication, and online games. This type of application requires a multicasting subnetwork, using which messages should arrive at the destinations within a specified delay bound. These applications also require that destinations receive the message from the source...
ABSTRACT A network analysis is an instrument that measures the network parameters of electrical networks. Today, network analysis commonly measure s–parameters because reflection and transmission of electrical networks are easy to measure at high frequencies, but there are other network parameter sets such as y-parameters, z-parameters, and h-parameters. Network analyses are often used to characterize two-port networks such as amplifiers and filters, but they can be used on networks with an...
ABSTRACT The age of information is also the age of digital information assets, where the professional programmer has to deal with cryptography. This work presents the theory, source code, and implementation for variable key size RSA encryption/decryption, digital signing, multi precision library, Diffie-Hellman key exchange, entropy collection, pseudo random number generator, and more. The work presents how to implement your own secure protocol using the IOCP technology, by presenting a secur...
ABSTRACT The offline optical character recognition (OCR) system for different languages has been developed over the recent years. Since 1965, the US postal service has been using this system for automating their services. The range of the applications under this area is increasing day by day, due to its utility in almost major areas of government as well as private sector. This technique has been very useful in making paper free environment in many major organizations as far as the backup of ...
ABSTRACT This study discusses factors affecting the customer value, and the performance of the ONLINE SHOPPING SYSTEM model. In our case, the biggest trading company in our country developed An ONLINE SHOPPING SYSTEM model to be taken into use in its supermarkets. The time was not yet right to implement the online shopping with shopping cart, but useful knowledge was gained as for the internal and external factors to be taken into account when planning ONLINE SHOPPING SYSTEM . The company d...