Mobile Travel Guide

The paper presents the result of a study conducted on a prototype mobile travel guide to improve its usability of mobile application. ...

Click here to read more

The Computer Network

As the name suggests network is a group of computers which work together in a particular fashion. ...

Click here to read more

Dimension Reduction And Visualization

The recent explosion of publicly available biology gene sequences and chemical compounds o?ers an unprecedented opportunity for data mining. ...

Click here to read more

International Organization And Standardization

ISO Standard ?ISO/IEC 27002? is published by International Organization and Standardization and International Electrotechnical Commission. ...

Click here to read more

Wireless Networks Today

This project studies the principles behind various error correction and control mechanisms that are used in wireless networks today. ...

Click here to read more

Global Meltdown Impact On Indian

With the advent of globalization in the 1990s, the IT / ITeS industry in India entered its boom phase and has seen considerable growth since then. ...

Click here to read more

Web Based Conference Management System

The process of organizing a conference is time consuming if done manually. ...

Click here to read more

The Gender Game

This report is a review of themes and issues drawn from selected literature on the subject of game design for senior citizens. ...

Click here to read more

The Ip Internet Protocol

Since the initiation of the current generation of IP (Internet Protocol) version 4 in 1980, has been used for more than 20 years. ...

Click here to read more

The Hybrid Hardware

As we all know the meaning of hybrid, hybridis the combination of two or more different things, aimed at achieving a particular objective or goal. ...

Click here to read more

Molecular Simulation

Before a fundamentally new invention becomes a widespread application, it usually takes decades rather than years. ...

Click here to read more

An Expert System

There are 8 main components in and Expert system. ...

Click here to read more

The Grid Computing

Grid computing is an interconnected network which is made to solve complex computational problems by sharing all the resources in the network and by utilizing unused processing cycles of the systems connected in the network. ...

Click here to read more

Super Market Industry

In the present context, Super market industry has been very much challenging due to fierce competition posed by the rivalries and also due to the demanding nature of the customers. ...

Click here to read more

Common Operating Systems

The most common operating systems used in smartphones are Linux, Windows Mobile from Microsoft, Symbian, RIM BlackBerry and Palm OS. ...

Click here to read more

National Bank For Rural Development

Each NCC Education assessed assignment submitted by you must have this statement attached to the assignment as the cover page or it will not be accepted for marking. ...

Click here to read more

History Of Computer

History of computer began with mathematical computations. ...

Click here to read more

The Understatement Of The Decade

It's probably the understatement of the decade to say that cell phones have become the single greatest tool in business. ...

Click here to read more

Who Owns Software

Software ownership has always been a hot topic of discussion from the advent of the personal computer in the 80s till today. ...

Click here to read more

Orthogonal Frequency Division Multiplexing Mobile Systems

Orthogonal Frequency Division Multiplexing (OFDM) is robust against frequency selective fading due to the increase of the symbol duration. ...

Click here to read more

Proposal Of Centralized Telephone System

The company needs a centralized telephone system helps in solving the work remotely, this helps in interacting with customers and colleagues. ...

Click here to read more

Fundamentals Of Edge Detection

Edge detection refers to the process of identifying and locating sharp discontinuities in an image. ...

Click here to read more

The Botnet System

Bot is short term of robot and in fact is a piece of software that is developed for automated and controlled tasks and attacks. ...

Click here to read more

Intelligent Support For Software Release Planning

In this part we discuss the 'problem which motivated the need for a developer to take over the project. ...

Click here to read more

Tagpreneurs Marketing Programs And Strategies

This section will discuss Tagpreneur's marketing programs and the marketing strategies to communicate Tagpreneurs intention to the target customer. ...

Click here to read more

Mobile Ad Hoc Wireless Sensor Networks

The biggest disadvantage that Mobile Ad-Hoc Wireless Sensor Networks have is the localization of individual node i.e. each nodes position relative to each other in the network. ...

Click here to read more

Image Enhancement Using Fuzzy Logic

The main objective of image enhancement is to process the image so that the result is more suitable than the original image for a specific application. ...

Click here to read more

A Hybrid Method In Driver

Driving is a very complex task which, at its core, involves the interaction between the driver and his/her environment. ...

Click here to read more

Html Vs Xhtml

This paper discusses about the differences between HTML and XHTML. ...

Click here to read more

Talent Management Hris

Key strategic areas in Insurance are employee retention, compensation and reward policy. ...

Click here to read more

The Global Sourcing

The term global sourcing is used to describe the practices that sourcing from global market for product or services across geopolitical boundaries. ...

Click here to read more

Wireless Lan Security

Wireless technology is an exciting and evolving communication system, but not fully secure. ...

Click here to read more

Automatic Allocation Of Papers To Reviewers

At this time and age, conferences often have large number of participants and there are equally a high number of papers being submitted for review. ...

Click here to read more

Inventing The Internet

This manuscript discusses the good and bad social aspects of the cyberspace. ...

Click here to read more

Understanding And Promoting System Security

Biometrics is the part of science of establishing an individuals identity based on the attributes like behaviour, physical or chemical of a person. ...

Click here to read more