JATIT

Displaying 241-250 of 250 results

  • White Papers // Oct 2008

    The Implementation and Evaluation of an Online Course Authoring Tool (OCATLO)

    This paper presents the development of bilingual e-learning system and reports on its usability on a set of computing courses according to a specific e-content development methodology. The system is organized into five layers. The selection of layers and their inter-dependencies is intended to make the functional responsibility clearer and...

    Provided By JATIT

  • White Papers // Oct 2008

    Genetic Zone Routing Protocol

    In multi-hop wireless networks such as ad hoc networks, mobile users need to communicate where there is no fixed networking infrastructure or no time to create such an infrastructure. The idea of ad hoc networking is sometimes also called infrastructure-less networking. Mobile Ad hoc NETworks (MANETs) are created dynamically. The...

    Provided By JATIT

  • White Papers // Oct 2008

    Review and Implications of Time Division Multiple Access Techniques for Wireless Environment Services and Applications

    Time Division Multiple Access (TDMA) is a channel access method for shared medium (usually radio) networks. It allows several users to share the same frequency channel by dividing the signal into different timeslots. The users transmit in rapid succession, one after the other, each using his own timeslot. This allows...

    Provided By JATIT

  • White Papers // Oct 2008

    The Effects of Global Positioning System for Reliable Positioning, Navigation and Timing Services

    The Global Positioning System (GPS) is a U.S. space-based radionavigation system that provides reliable positioning, navigation, and timing services to civilian users on a continuous worldwide basis - freely available to all. GPS provides specially coded satellite signals that can be processed in a GPS receiver, enabling the receiver to...

    Provided By JATIT

  • White Papers // Sep 2008

    Watermarking Using Neural Network and Hiding the Trained Network Within the Cover Image

    The major source of communication in present world is digital media. As it is quite easy to manipulate a digital media, it becomes essential to protect the digital information by legitimate means. Digital Watermarking has evolved as one of the latest technologies for digital media protection. Many techniques based on...

    Provided By JATIT

  • White Papers // Sep 2008

    WAN Cloud Access Link Utilizations for Compressed Video

    There are a number of different video compression standards. Most of them are variations of the work of two different committees. The International Telephony Union's Specialist Group on Coding for Visual Telephony and the International Standards Organization's motion picture expert group, known as MPEG. The most popular standards are the...

    Provided By JATIT

  • White Papers // Sep 2008

    Deriving Cluster Knowledge Using Rough Set Theory

    Clustering algorithms gives general description of the clusters listing, number of clusters, and member entities in those clusters. It lacks in generating cluster description in the form of pattern. Deriving pattern from clusters along with grouping of data into clusters is important from data mining perspective. In the proposed approach...

    Provided By JATIT

  • White Papers // Sep 2008

    A Reinforced Evolution-Based Approach to Multi-Resource Load Balancing

    A fundamental goal in computer science is to provide an algorithm which would determine an optimal solution in acceptable time. Computational Complexity Theory is the field which studies the efficiency of computation; its major goals are to find efficient algorithms for natural problems or to show that no efficient solutions...

    Provided By JATIT

  • White Papers // Sep 2008

    Agent Based University Planning of Sakarya University: "CAWIS" Project

    The core aim of Agent Based University Planning project of Sakarya University is designing and implementation of a system that is based on Distributed Artificial Intelligence technique for scheduling and planning to face the problems that often takes place in a university administration division. This paper particularly focuses on course...

    Provided By JATIT

  • White Papers // Sep 2008

    Voice Based Hardware Controller

    The day is not far away, where, computer peripherals will perform tasks by taking commands from the most natural form of communication: the human voice. Yes, this idea of developing a voice operable hardware device by using the speech recognition technology is to develop a basic application which demonstrates a...

    Provided By JATIT