VDSL (Very high bit-rate Digital Subscriber Line) for businesses

Growing up a business having the vision of going international at one location is not enough. Having enough human resources, capital, many companies likewise this national firm of insurance brokers prefers to expand their operation to different offices to attract customers from several regional and even globally as well. With two branches in Birmingham and … Read more

PEKS and PKEET

Since keywords are chosen from much smaller space than passwords and users usually use well-known keywords (low entropy) for searching documents. Therefore, attackers can capture the trapdoor and have chance to guess keyword. By definition, a PEKS scheme only allows the server to search the client’s ciphertexts, and there are scenarios two clients may want … Read more

Wireless multichannel EEG recording system

Abstract: This paper describes a wireless multichannel EEG recording system. EEG is a technique that reads electrical activity of the brain that is recorded from the scalp. It consists of transmitter and receiver. The transmitter consists of electrodes, preprocessing section, processing unit, switches and Zigbee module. The receiver consist of Zigbee module, display unit, processing … Read more

Video technology

In this essay I will compare and contrast different forms of video technology from the past, to the more advanced technology that our current era has introduced. I think that video technology has developed significantly over the years and I prefer the digital technology. The first movie cameras created used celluloid technology. This kind of … Read more

Embedded Operating System based on multi core processor

Abstract: Now a day’s embedded multi core platforms are preferred for single processing, but development of such system is still very slow. In early time similar programming is further complicated as compare to sequential programming for average programming .Most of the times we prefer to use message passing interface is popular and efficient message passing … Read more

Comparative analysis of Distance vector and Link-state routing protocol

Abstract Dynamic routing protocols are classified in to two major categories: distance vector routing protocol and link-state routing protocol. The early routing protocols were based on distance vectors, where networks information is shared with the directly connected neighbour. Link-state routing protocol create a complete network topology by gathering information from all of the other network … Read more

Transition from 4G to 5G in the mobile industry

The mobile industries transition from 4G to 5G, which could take a decade or longer, will see network operators, infrastructure vendors and device manufacturer’s progressively implement next generation technologies. It is one of the fastest growing and most dynamic sectors in the world.. The development of wireless technologies has greatly improved people’s ability to communicate … Read more

Technology used by Electronic Parts Online

The internet technologies have been used by Electronic Parts Online for over a long time. There-fore, it is beneficial for the manufacturers to enhance their work performance by having this. Ex-amples of common internet technologies are as Optical Scanners, Barcodes and RFID (radio fre-quency identification device). Optical Scanners are devices that uses light beams to … Read more

WAN link connection between sites using VDLS modem

Growing up a business having the vision of going international at one location is not enough. Having enough human resources, capital, many companies likewise this national firm of insurance brokers prefers to expand their operation to different offices to attract customers from several regional and even globally as well. With two branches in Birmingham and … Read more

Phishing

1. Introduction Many criminals are currently focusing on retrieving private data; they do this by using deceptive techniques to carry out electronic fraud. [1] This is also called phishing. The Cambridge Dictionaries Online defines phishing as: an attempt to trick someone into giving information over the internet or by email that would allow someone else to … Read more

Wireless Sensor Network (WSN)

Abstract : In a WSN, there are two methods to detect an intruder single-sensing detection and multiple-sensing detection. In the single-sensing detection, the intruder is effectively detected by a single sensor. Whereas, in the multiple-sensing detection, the intruder can only be detected by multiple cooperating sensors. In some applications, the detected data provided by a … Read more

Fiber optic communication

INTRODUCTION Background Over the past century, communication and communication systems have developed enormously. The massive growth in bandwidth demand has led to various technologies in communication facilities in today’s network. One of the main factors for continuous research to create more efficient communication systems is the need to send more data (information) through a communication … Read more

Computer arrangement and networks

A computer arrangement is a accumulation of computer systems and added accretion accouterments accessories that are affiliated calm through advice channels to facilitate advice and resource-sharing a allotment of a advanced ambit of users. Networks are frequently categorized based on their characteristics. One of the ancient examples of a computer arrangement was a arrangement of … Read more

E-commerce

Electronic commerce or e-commerce is very essential for any nations all over the world because it allows for increasing profits of men or women who use e-commerce and also this help to improve the economy of the country. Another point, E-commerce contains many things as an example, buying or offering goods and services through using … Read more

Real Estate Software

Each, day thousands of land professionals go surfing to analysis land computer code. however what’s land computer code, and the way will it assist you improve your land business? These ar the queries we are going to address here. What is land Software? When we refer land computer code, we’re truly covering a large spectrum … Read more