Great Ideas in Computer Architecture

Application of the following great ideas has accounted for much of the tremendous growth in computing capabilities over the past 50 years.They are 1. Design for Moore’s law 2. Use abstraction to simplify design 3. Make the common case fast 4. Performance via parallelism 5. Performance via pipelining 6. Performance via prediction 7. Hierarchy of … Read more

Typical Cad Command Structure

All systems have their own command structure and this is almost invariably of the form: (VERB> NOUN> <MODIFIERS) Data Part> The verb defines the action which is to be performed, such as ‘draw’, ‘erase’, ‘drag’. The noun describes the object upon which the action is to be performed, examples being ‘line’, ‘arc’, ‘circle’. Modifiers, which … Read more

Data mining

Various journals and articles related to data mining were studied and analyzed. Some compared the already existing algorithms while some try to modify them and improve the performance. Table 2.0 shows some research works carried out by renounce scholars in the field of frequent item set mining. As frequent itemset mining is very important in … Read more

A NOVEL AND RELIABLE EVENT DETECTION AND ENHANCED CONGESTION CONTROL TECHNIQUE FOR WSN

Abstract Effectiveness of a Wireless Sensor Network (WSN) is determined by its performance and any WSN can lose packets when it is congested. Sinks collecting information from other nodes are most likely to be less efficient when there is congestion. There are many congestion control algorithms while congestion detection and control are major research areas. … Read more

Electronic receipts app

Introduction For my project I will be talking about an existing services based on the new world that is surrounded by technology. This service exists in the U.S. and it was designed by Proximiant Company. For the project I have decided to ‘’Radical innovate’’ the new technology that has already been created but never introduced … Read more

THROUGHSILICON VIA (TSVs) IN 3D INTEGRATED CIRCUIT

PROGRESS AND CHALLENGES OF POSITIONING AND NUMBERING OF THROUGHSILICON VIA (TSVs) IN 3D INTEGRATED CIRCUIT Abstract—In 3-D Integrated circuit the dies are stacked vertically by identifying the location, numbering and position of TSVs. By using TSVs, optimization is done in wire length, area and power. The TSVs are also used for the power distribution, inter … Read more

Improving the quality of service audio for real time media

Abstract Real time media applications such as image sharing, video ne conferencing and online chat are increasing in usage. These bandwidth intensive applications put high demands on a network and often the quality experienced by the user is suboptimal. In a traditional network stack, data from an application is transmitted in the order that it … Read more

Security Guidance for Critical Areas of Mobile Computing

“Security Guidance for Critical Areas of Mobile Computing” 1.2. What Is Mobile Computing? Mobile Computing is very broad term which can be used to define any means of using a computer outside the workplace. This includes working from home or on the road, at airport or at hotel. This also includes kiosks used to remotely … Read more

Analysis of user involvement, impacts on information systems use and success

Abstract User involvement during information systems development has been an eminent term discussed in information system literature. User involvement is considered to be one of the primal factors that contribute to the success of a system. This research essay has been conducted to examine the need for user involvement, how, where and when users participate … Read more

Problem Definintion – finding frequent itemsets in large transactional datasets

The main problem associated with finding frequent itemsets in large transactional datasets is to establish association rule amongst the frequent itemsets. A lot of different algorithms were introduced — some were enhanced to suit different datasets and situations. Algorithms in the form of Horizontal layout (e.g. Apriori, AprioriTID, Apriori Hybrid e.t.c) and Projected layout algorithms … Read more

Data mining

Data Mining refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. The kinds of patterns that can be discovered depend upon the data mining tasks employed. By and large, there are two types of data mining tasks: descriptive data mining tasks that describe the general properties of … Read more

FERS – imitate the human visual system

CHAPTER TWO LITERATURE SURVEY 2.1 Literature Review In the literature, there are many methods for the holistic class, such as, Eigenfaces and Fisherfaces, which are built on Principal Component Analysis (PCA); the more recent 2D PCA, and Linear Discriminant Analysis are also examples of holistic methods. Although these methods have been studied widely, local descriptors … Read more

Facial recognition

CHAPTER ONE INTRODUCTION 1.1 Facial Recognition: This system is a computer application for verifying or identifying a person from a digital image or a video frame from a video source, One of the ways to do this is by comparing selected facial features from the image or a facial database. Facial recognition is typically used … Read more