Importance of information security in an organisation

Abstract: Information security is importance in any organizations such as business, records keeping, financial and so on. This information security will help the organizations to fulfill the needs of the customers in managing their personal information, data, and security information. There are a few challenges faced by the organizations in managing the information so that … Read more

Newsletter Publishing in Cloud Environment – SaaS Project (draft)

Overview: Cloud Computing provides us a means by which we can access the applications as utilities, over the internet. It allows us to create, configure, and customize the business applications online. EVALUTION OF CLOUD SOLUTIONS:– Cloud computing has become a major technology trend. Consultants believe cloud computing presently reshaping info technology and therefore the IT … Read more

Design Level Metrics to Measure the Complexity Across Versions of AO Software

Abstract Software metric plays a vital role in quantitative assessment of any specific software development methodology and its impact on the maintenance of software. It can also be used to indicate the degree of interdependence among the components by providing valuable feedback about quality attributes such as maintainability, modifiability and understandability. The effort for software … Read more

E-commerce and the logistics network design system in Logistics activities

Introduction The aim of this assignment is to elaborate further on E-commerce and the logistics network design system in Logistics activities. In order to link E-commerce and Logistics network design system we will be briefly discuss the evolution, factors of E-commerce, and the types of E-commerce that are set for specific products and services and … Read more

P2P networks

P2P networks can be classified as unstructured, loosely structured, and highly structured based on the control over data location and network topology Peer-to-Peer (P2P) file sharing applications, such as Napster and Gnutella supports millions of users to search and download desired data. Flooding is the predominant search technique in unstructured peer-to-peer (P2P) networks. P2P full-text … Read more

Selection of Database Management System with FAHP for Electronic Medical Record

Selection database is one of the main problem in designing Electronic Medical Record (EMR) Software, because that there are many different data with different types and format in it. This work provide an approach for select suitable Data Base Management System (DBMS) with Fuzzy Analytical Hierarchical Process that gives capabilities of requirements to electronic medical … Read more

Minimizing Energy Consumption in Large Scale Wireless Sensor Network using Adaptive Duty Cycle Algorithm

Abstract – In a large scale wireless sensor networks, monitoring particular area requires large number of nodes to be active. As the numbers of nodes are more, the energy consumed by each node will be more. Energy is the most critical issue in wireless sensor networks. At MAC level, duty cycle scheduling is being used … Read more

Secure Routing in Wireless Sensor Networks

Abstract – Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. However, wireless sensor networks are deployed mostly in open and unguarded environment. One of the major applications of the sensor networks is in military. So security is the greatest concern to deploy sensor … Read more

An exposure towards dynamic transmission by employing mitigation features

ABSTRACT: It is important to maintain the applications of group-oriented for the audio or video conference in mobile ad hoc networks, serving as a resourceful system of networking assisting exchange of data between mobile devices devoid of permanent infrastructures. A vehicular ad hoc network includes on-board units entrenched in vehicles helping as mobile nodes of … Read more

Understanding the performance of the TCP variants in MANET and its behavior with respect to different protocols

Introduction – 1.1 Background- To cope with multiple simultaneous data networks internet requires and efficient algorithmic techniques to supports data transmission successfully. Transmission control protocol/Internet Protocol (TCP/IP) has been very effective in data transmission delivery and have also developed variants to posses the possibility to increase performance and multiple packet loss recovery . An important … Read more

Disadvantages and Limitations of Agile Development Processes

Abstract In many organisations, Software developers and mainly project managers are scratching their head in confusion to grade the validity of agile processes to their very own development environment. This assignment shall identify the limitations which may applicable to multiple versions of agile processes concerning the different type of projects for which an implementation or … Read more

Private data collected about individuals and its uses

Over the last twenty years, there has been an extensive growth in the amount of private data collected about individuals. This data comes from a number of sources including medical, financial, library, telephone, and shopping records. Such data can be integrated and analyzed digitally as it’s possible due to the rapid growth in database, networking, … Read more

Information technology essay

Arguing first that it defines the geometry of networks of thread blocks, and the second argument that defines the geometry of thread blocks itself. Nets may be up to two dimensions, and thread blocks until the three dimensions. Block nets and use the specific type of data to determine their dim3, as shown in the … Read more