Offloading, MAUI, TROPIC and Femtonet

Abstract: Our everyday life experience shows a phenomenon of large scale usage of applications specifically devised for mobile devices. However the remarkable growth generated by the current lifestyle doesn’t match with a parallel improvement on mobile handset batteries, where there is no improvement in its lifetime at the same pace. Hence there is no sufficient … Read more

Internet of Things (IoT) and home automation

Abstract: Internet of Things (IoT) is extension of current internet to provide communication, connection, and inter-networking between various devices or physical objects also known as “Things.” In this paper we have reported an effective use of IoT for Environmental Condition Monitoring and Controlling in Homes. We also provide fault detection and correction in any devices … Read more

Improving Network Performance by Differentiating DDoS Attacks from Flash Crowds

Abstract : Today’s internet system has various vulnerabilities and threats due to excessive use of it. These threats are increasing day by day among which one is DDoS attack. It is very critical task for today’s defenders to detect DDoS attacks against flash crowds. Both DDoS attack and flash crowd cause surges of access to … Read more

A new technique based on SBPN for congestion avoidance

ABSTRACT In this we investigate a new technique based on SBPN For congestion avoidance. In this technique we proposed a new algorithm based on WFQ for improving the Qos for multimedia traffic in MANET ..In traditional algorithm, used SBPN-FIFO in which data transmitted in which order its received .In SBPN-FIFO all packets are treated equally … Read more

A review of "IT doesn't matter" by Nicholas Carr

Abstract In this article we will investigate whether or not the statement ‘IT doesn’t matter’ applies to 3 semi government agencies in the Netherlands. The research is based on the concepts of resource based theory. In this article, the hypothesis is tested that the resources of IT lack the characteristics that give sustainable competitive advantage … Read more

An approach of monitoring and detecting the data transmission over multiple channels in wireless sensor networks

Abstract — In wireless sensor networks,the protocols relay on secure data transmission to attains a secure and active channel conditions. They call such protocol as channel aware. Each user reports the measured channel condition to a wireless resource manager. The channel aware protocol use these reports to determines how resources are allocate to user. The … Read more

Google's policies on privacy

A privacy policy provides insight into the views of a company, and defines the procedures that govern the assortment and use of information collected from its Internet visitors. Although they are legal documents, privacy policies should be comprehensible, precise, and should avoid cloaking crucial information inside of ‘reams of text’. Google’s policies, those of any … Read more

Telecommunications trends in India

Executive summary India is the world’s second-largest telecommunications market, with 957.61million subscribers by the end of FY14. It stood third-highest in terms of total internet users in 2014, with 254.40 million internet subscriptions.   The acceleration of internet growth in India can be gauged from the fact that India took 10 years to move from … Read more

The impact of ICT on the banking sector and payment system

This chapter presents the methods and procedures used to discover, examine and estimate the impact of ICT on banking sector and payment system. The methodology specially explains the research model, research instruments, data collection process and the procedure for the data analysis. Research design The research design is the summarize or plan that is used … Read more

Assignment: Design patterns

Q.No.1: Give one example of each design pattern from software domain. 1. Proxy 2. Adapter 3. Singleton (a). Discuss how the relevant design pattern is solving the problem in your example [2 Marks] (b). Draw Class Diagram for each Example [4 Marks] (c). Identify the Participants in your example according to Design Pattern [4 Marks] … Read more

Incomplete, noisy, and inconsistent data

Imagine that you are manager at AllElectronics and have been charged of dissecting the organization’s data regarding the deals at your location. You promptly set out to perform this task. You deliberately examine the organization’s database and data warehouse, distinguishing and selecting the attributes or dimensions to be incorporated in your analysis, for example, item, … Read more

Preventing wormhole attacks

Wireless sensor network is simply a pool of self-directed devices organized into mutually connected network. Sensors are usually autonomous and spatially distributed within a certain area to monitor targeted physical and environmental conditions such as temperature, sound and pressure etc.In WSN, free frequency band and open architecture are used for supporting mission critical application in … Read more

Business processes, systems and IT

1. What is the linkage between IT, especially enterprise IT, and competition? Answer: It’s not you.it’s really getting harder to compete other guys ,since in the middle of 1990’s competition in the U.S economy accelerated to preceded levels. For better understanding how this IT confess competitive advantage in today’s Economy, By observing all publicly traded … Read more

CDMA systems

In CDMA systems, the narrowband message signal is multiplied by a very large bandwidth signal is a Spread sequence as space time block code Space’time block coding is a technique used in wireless communications to transmit multiple copies of a data stream across a number of antennas and to exploit the various received versions of … Read more