ABSTRACT Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be ...
ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or ...
ABSTRACT This project work, is a computerization it Performance evaluation of routing algorithm using NS2 of an organization. Full duplex asynchronous data transfer system based on a single-phase two-line coding. (a) Data is transmitted from a primary module PM to a secondary module SM, while data is transmitted from the secondary module SM to the primary module PM independently at the same time. (b) Code words A and B, in which data and color (request signal: ODD or EVEN) are superimpose...
ABSTRACT Current GPUs have many times the memory bandwidth and computing power compared to CPUs. The difference in performance is getting bigger as the evolution speed of the GPUs is higher than of the CPUs. This make it interesting to use the GPU for general purpose computing (GPGPU). I begin by looking at the architecture of the GPU, and some different techniques for programming on a GPU, including some of the available high- level languages. �...
ABSTRACT Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the flow of sensitive information during such an exchange. Previous work on ATN is based on access control techniques, and cannot handle cyclic policy interdependency satisfactorily. We show that the problem can be modelled as a 2-party secure function evaluati...
ABSTRACT In our present society, communication is more or less the “cannot – do – without” that people always say and the strength of every successful business generally. The impact of this can be felt in the life of individuals, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication lines and distribute it equally among the popula...
ABSTRACT The study is all about design and implementation of ONLINE TUTORIAL GLOBAL FORUM FOR EDUCATORS AND STUDENTS. The current study is concerned with reducing work lag-time on online global tutorial forum for educators and student’s platforms, and delivering undergraduates and postgraduate programmes all over the world. The research has highlighted various kinds of ONLINE TUTORIAL GLOBAL FORUM FOR EDUCATORS AND STUDENTS platforms such as teleconferencing, virtual reality and video-confe...
ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...
ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of online student registration system. Almost all our Higher Institution has gone into online student registration system because of the extraordinary benefit resulting from information technology. Information technology has enabled an online administration syst...
ABSTRACT On-line Voting System is a web based system that facilitates the running of elections and surveys online. This system has been developed to simplify the process of organizing elections and make it convenient for voters to vote remotely from their home computers while taking into consideration security, anonymity and providing other additional capabilities. TABLE OF CONTENT TITLE PAGE CERTIFICATION APPROVAL DEDICATION ACKNOWLEDGEMENT ABSTRACT TABLE OF CONTENT CHAPTER ONE 1.0INTRODUC...
INTRODUCTION Jock itch gets its name because it is common in people who sweat a lot, majorly the athletes. It is also more likely to occur in people who are overweight. Although often uncomfortable and bothersome, jock itch usually is not serious. Jock itch (tinea cruris) is a fungal infection that affects the skin of the genitals, inner thighs and buttocks. Jock itch causes an itchy, red, often ring-shaped rash in these warm, moist areas of the body. groin area clean and dry and applying t...
ABSTRACT This research work is determined to provide a more secure platform for cash dispensing machines and financial transactions. The security of the transactions on the Automated Teller Machine (ATM) has been raising many concerns in some parts of the world. These concerns are due to series of limitations in the existing designs of the various service points. The current use of Personal Identification Number (PIN) for ATM user’s verification and identification has been susceptible to ...
INTRODUCTION Agricultural microbiology is a branch of microbiology dealing with plant-associated microbes and plant and animal diseases. It also deals with the microbiology of soil fertility, such as microbial degradation of organic matter and soil nutrient transformations. Agricultural microbiology is a scientific discipline oriented to satisfy the request of new knowledge from the society, consumers and producers, needed for the exploitation of microbial resources in the main frame of agric...
ABSTRACTToday scientists are in research to create an artificial brain that can think, response, take decision, and keep anything in memory. Human brain is the most valuable creation of God. The man is intelligent because of the brain. “Blue brain” is the name of the world’s first virtual brain. That means a machine can function as human brain. The main aim is to upload human brain into machine. So that man can think, take decision without any effort. After the death of the body, the vi...
ABSTRACT Chickenpox is a highly contagious viral illness caused by primary infection with the Varicella zoster virus (VZV). It is characterized by vesicular skin lesions and fever. It causes an itchy rash that looks like tiny blisters. The rash usually starts on the face, stomach, chest or back, and spreads to other parts of the body. A mild fever, tiredness, and slight body discomfort usually come with the rash. Anyone who hasn’t had chickenpox already can get it, but it is most common amo...