International Journal Of Computer Architecture And Mobility

Displaying 1-10 of 10 results

  • White Papers // Jul 2013

    Interrupt Mechanism for Hybrid Operating System

    Real time performance analysis is critical during the design and integration of embedded software to guarantee that application time constraints will be met at run time. To select an appropriate operating system for an embedded system for a specific application, OS services needs to be analyzed. These OS services are...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concept and techniques of transaction processing of Distributed Database management system

    A Distributed DataBase (DDB) is a collection of multiple, logically interrelated databases distributed over a computer network. A Distributed DataBase Management System (distributed DBMS) is the software system that permits the management of the distributed database and makes the distribution transparent to the users. There are 2 processes in distributed...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concurrency Control issues in Mobile Database

    Mobile computing is a revolutionary technology, born as a result of remarkable advances in computer hardware and wireless communication. Mobile applications have become increasingly popular in recent years. Today, it is not uncommon to see people playing games or reading mails on handphones. With the rapid advances in mobile computing...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Intelligent Data Security - Efficient Way to Store the data

    Data security has always been the need of many business sectors. Especially in banking area's where the critical information of the customer's is there with the banks. Increasing cyber-attacks, network spoofing, key logging, malwares and viruses are the threats to data. In this paper author proposed an algorithm which will...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Prediction of Results in Education By Data Mining

    Now-a-days, a lot of information is available everywhere but the user need to use it smartly and apply it wisely. Here, the authors want to focus on the basic terminology of data mining can be used to predict the final year results by using students academic information since 1st standard...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Wireless Vision Sensor Node Based on FPGA

    The low-power consumption remote Industrial security alarm system developed by applying WSN, FPGA and GSM technology is presented. The recent advances in the embedded system, semiconductor and sensor system have made it possible to develop an efficient, low power vision sensor. Security and surveillance are one of the most popular...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Defended Cloud Data Storage

    Cloud computing is the next stage in providing the means through which everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered to the user as a service, internet evolution wherever and whenever they need. There are three main service offered by cloud such...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Obscure Surveillance and Server Monitoring

    Obscure surveillance and server monitoring is a technique to administrate a remote server and monitor the logs of client's work. It's a browseable method through which the authors can administrate the server from any platform. It contains a two level encryption one at the browser side and another at the...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jan 2013

    Phishing Attack Generalization

    Most of the attacks on web application occur by hits and trial methods, analysis of previous methods, misguiding users etc. User's are intelligent but could see only, that, which are visible. Internal configuration or working are hidden by the user, even by designer also, because web application has to cross...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2012

    Firewall as a Portable Embedded System

    The firewall is defined as a set of components that restricts an access between a protected network & an unprotected network. Problem with firewall are it does not provide full protection against virus, prevention against previously unknown attack type and protection against insider/connection that do not go through it. A...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Wireless Vision Sensor Node Based on FPGA

    The low-power consumption remote Industrial security alarm system developed by applying WSN, FPGA and GSM technology is presented. The recent advances in the embedded system, semiconductor and sensor system have made it possible to develop an efficient, low power vision sensor. Security and surveillance are one of the most popular...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Defended Cloud Data Storage

    Cloud computing is the next stage in providing the means through which everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered to the user as a service, internet evolution wherever and whenever they need. There are three main service offered by cloud such...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Intelligent Data Security - Efficient Way to Store the data

    Data security has always been the need of many business sectors. Especially in banking area's where the critical information of the customer's is there with the banks. Increasing cyber-attacks, network spoofing, key logging, malwares and viruses are the threats to data. In this paper author proposed an algorithm which will...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Obscure Surveillance and Server Monitoring

    Obscure surveillance and server monitoring is a technique to administrate a remote server and monitor the logs of client's work. It's a browseable method through which the authors can administrate the server from any platform. It contains a two level encryption one at the browser side and another at the...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2012

    Firewall as a Portable Embedded System

    The firewall is defined as a set of components that restricts an access between a protected network & an unprotected network. Problem with firewall are it does not provide full protection against virus, prevention against previously unknown attack type and protection against insider/connection that do not go through it. A...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concept and techniques of transaction processing of Distributed Database management system

    A Distributed DataBase (DDB) is a collection of multiple, logically interrelated databases distributed over a computer network. A Distributed DataBase Management System (distributed DBMS) is the software system that permits the management of the distributed database and makes the distribution transparent to the users. There are 2 processes in distributed...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Prediction of Results in Education By Data Mining

    Now-a-days, a lot of information is available everywhere but the user need to use it smartly and apply it wisely. Here, the authors want to focus on the basic terminology of data mining can be used to predict the final year results by using students academic information since 1st standard...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    Interrupt Mechanism for Hybrid Operating System

    Real time performance analysis is critical during the design and integration of embedded software to guarantee that application time constraints will be met at run time. To select an appropriate operating system for an embedded system for a specific application, OS services needs to be analyzed. These OS services are...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concurrency Control issues in Mobile Database

    Mobile computing is a revolutionary technology, born as a result of remarkable advances in computer hardware and wireless communication. Mobile applications have become increasingly popular in recent years. Today, it is not uncommon to see people playing games or reading mails on handphones. With the rapid advances in mobile computing...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jan 2013

    Phishing Attack Generalization

    Most of the attacks on web application occur by hits and trial methods, analysis of previous methods, misguiding users etc. User's are intelligent but could see only, that, which are visible. Internal configuration or working are hidden by the user, even by designer also, because web application has to cross...

    Provided By International Journal Of Computer Architecture And Mobility