NE-Gen Blog » Archives for December 2012
ABSTRACT Extreme programming (XP) is a
lightweight methodology for small-tomedium sized teams developing
software in the face of vague or rapidly changing requirements. XP is a
deliberate and disciplined approach to software development. XP stresses
consumer satisfaction. An extreme attempt to dramatically simplify the
process of developing software systems is made focusing on what delivers
value: the requirements for the system or the code that implements the
system. Requirement specification in the form of User Stories, code
development by pairs of developers (Pair Programming), simplification of
the code through Refactoring and careful repeated testing are the
outstanding features of extreme Programming technique. XP improves a
software project in four essential ways; communication, simplicity,
feedback, and courage. XP has rejuvenated the notion of evolutionary
design with practices that allow evolution to become a viable design
strategy.
Click Here
Research Paper On Sky X Technology Free Download
Abstraction-
Sixth Sense Technology is a mini-projector
coupled with a camera and acellphone—which acts as the computer and
connected to the Cloud, all the information stored on the web. Sixth
Sense can also obey hand gestures. The
camera recognizes objects
around a person instantly, with the micro-projector overlaying the
information on any surface, including the object itself or hand. Also
can access or manipulate the information using fingers. make a call by
Extend hand on front of the projector and numbers will appear for to
click. know the time by Draw a circle on wrist and a watch will appear.
take a photo by Just make a square with fingers, highlighting what want
to frame, and the system will make the photo—which can later organize
with the others using own hands over the air.and The device has a huge
number of applications , it is portable and easily to carry as can wear
it in neck.
Click Here
Sixth Sense Technology
Bluejacking is the sending of unsolicited messages over
Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or
laptop computers, sending a vCard which typically contains a message in
the name field (i.e. for bluedating or bluechat) to another Bluetooth
enabled device via the OBEX protocol. Bluetooth has a very limited
range; usually around 10 meters on mobile phones, but laptops can reach
up to 100 meters with powerful transmitters.
Bluejacking allows
phone users to send business cards anonymously using Bluetooth wireless
technology. Bluejacking does not involve the removal or alteration of
any data from the device. Bluejackers often look for the receiving phone
to ping or the user to react. In order to carry out a bluejacking, the
sending and receiving devices must be within 10 meters of one another.
Phone owners who receive bluejack messages should refuse to add the
contacts to their address book. Devices that are set in non-discoverable
mode are not susceptible to bluejacking
Click Here
Bluejacking Research Paper/Seminar Report Free Download
ABSTRACT
This paper aims to present a new voting system employing biometrics in
order to avoid rigging and to enhance the accuracy and speed of the
process. The system uses thumb impression for voter identification as we
know that the thumb impression of every human being has a unique
pattern. Thus it would have an edge over the present day voting systems.
As a pre-poll procedure, a database consisting of the thumb impressions
of all the eligible voters in a constituency is created. During
elections, the thumb impression of a voter is entered as input to the
system. This is then compared with the available records in the
database. If the particular pattern matches with any one in the
available record, access to cast a vote is granted. But in case the
pattern doesn’t match with the records of the database or in case of
repetition, access to cast a vote is denied or the vote gets rejected.
Also the police station nearby to the election poll booth is informed
about the identity of the imposter. All the voting machines are
connected in a network, through which data transfer takes place to the
main host. The result is instantaneous and counting is done finally at
the main host itself. The overall cost for conducting elections gets
reduced and so does the maintenance cost of the systems.
Abstract Ad hoc networks are a new wireless networking
paradigm for mobile hosts. Unlike traditional mobile wireless networks,
ad hoc networks do not rely on any fixed infrastructure. Instead, hosts
rely on each other to keep the network connected. The military tactical
and other security-sensitive operations are still the main applications
of ad hoc networks, although there is a trend to adopt ad hoc networks
for commercial uses due to their unique properties. One main challenge
in design of these networks is their vulnerability to security attacks.
In this paper, we study the threats an ad hoc network faces andthe
security goals to be achieved. We identify the new challenges and
opportunities posed by this new networking environment and explore new
approaches to secure its communication. In particular, we take advantage
of the inherent redundancy in ad hoc networks — multiple routes between
nodes — to defend routing against denial of service attacks. We also
use replication and new cryptographic schemes, such as threshold
cryptography, to build a highly secure and highly available key
management service, which forms the core of our security framework.
Click Here Research Paper On Ad-hoc Wireless Network Free Download
Abstract- The overlay of a neural interface upon a Tiny OS based sensing and communication platform is described. The system amplifies, digitally encodes, and transmits two EEG channels of neural signals from an un-tethered subject to a remote gateway, which routes the signals to a client PC. This work demonstrates the viability of the TinyOS-based sensor technology as a foundation for chronic remote biological monitoring applications, and thus provides an opportunity to create a system that can leverage from the frequent networking and
communications advancements being made by the globalTinyOS-development
community.
Click Here Research Paper On Neural Interface Free Download
Abstract—This paper briefly summarizes
software reuse research, discusses major research contributions and
unsolved problems, provides pointers to key publications, and introduces
four papers selected from The Eighth International Conference on
Software Reuse (ICSR8).
Click Here
Research Paper On Software Reuse Free Download
ABSTRACT Soft Computing Model always composed of Fuzzy logic,
Neural Network, Genetic algorithm etc. Most of the time, these three
components are combine in different ways to form model. Fuzzy- Neuro
Model, Neuro- GA model, Fuzzy- Neuro- GA model etc. All this combination
is widely used in prediction of time series data. If in a time series
data, initial change are observed during some time interval, the final
value of this data must be predicted. In this paper, an effort has been
made to use soft computing approaches for predicting a final product of a
time series data. The data is taken from a statistical survey has been
conducted by a group of certain agricultural personnel on different
mustard plant under the supervision of
Prof. Dilip dey, Bidhan
Chandra Krishi Viswavidayalay West Bengal, India. In this paper, the
models of soft computing using neural network based on fuzzy input and
genetic algorithm have been tested on same data and based on error
analysis (calculation of average error) a suitable model is predicted
for this
data.
Click Here
Research Paper On Soft Computing Free Download
The World Wide Web, which has started as a document repository, is rapidly transforming to a full fledged virtualenvironment that facilitates services, interaction, and com-munication. Under this light, the Semantic Web and Web2.0 movements can be seen as intermediate steps of a natu-ral evolution towards a new paradigm, the 3D Internet. Weprovide an overview of the concept 3D Internet and discuss why it is a goal worth pursuing, what it does entail, andhow one can realize it. Our goal in this paper is to discuss a research agenda and raise interest in networking, security, distributed computing, and machine learning communities.We explore first the motivation for the 3D Internet and the possibilities it brings. Subsequently, we investigate the specific system level and research challenges that need to be
addressed in order to make the 3D Internet a reality.