Report on Library Mnagement System

  CONTENTS       1              Introduction To Project Ø Project Definition Ø Need of the System Ø Software Progress Model Ø Linear Sequential Model   2              System Analysis Ø Feasibility Study Ø Information Gathering Source   3     H/W and S/W requirement Ø H/W requirement Ø S/W requirement   4     Data Flow Diagrams   5.           Entity Relationship Diagram   6.          … Read moreReport on Library Mnagement System

Bioinformatics in biological research

  This paper presents a comprehensive way of integrating biological research with Information Technology and presents a magical approach by using computer technology to solve biological problems. A number of tools and variety of bioinformatics techniques are in use for research purpose. In this paper we have formulated these techniques and reflecting its significance for the improvement of health. Bioinformatics… Read moreBioinformatics in biological research


  In the high computerized society the world has nowadays, it is impossible don’t use the computer to spread, research and explain the principal resource used for these Goals are the multimedia.   Multimedia has many different means for different people. For someone, multimedia means that a computer has CD-ROM. To others, multimedia is the use of combination of many… Read moreMultimedia

Mobile banking

            Mobile banking Mobile banking is the next evolutionary step after on-line Internet banking.  M-banking envisages carrying out banking operations through hand held wireless devices.  Bankers and mobile operators have teamed up in the world over to make m-banking a reality.  Any typical banking operation can be carried out through mobile services.  Customers can do banking operations wherever they… Read moreMobile banking

RFID Systems and Security and Privacy Implications

RFID Systems and Security and PrivacyImplications Abstract. The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in low-cost RFID systems… Read moreRFID Systems and Security and Privacy Implications

Hybrid Approach for Managing Cost-Performance Tradeoff in Scheduling for Embedded Multiprocessor SOCs

Hybrid Approach for Managing Cost-Performance Tradeoff in Scheduling for Embedded Multiprocessor SOCs   In This paper we present a new methodology for task scheduling in embedded systems that combines the low runtime complexity of a design time scheduling phase with the flexibility of a runtime scheduling phase. It schedules tasks such that the task consumes the least energy under a… Read moreHybrid Approach for Managing Cost-Performance Tradeoff in Scheduling for Embedded Multiprocessor SOCs

A report On Library Master

“Necessity is often the spur to genius”.  This saying by Balzac is authenticated by the development of “Library Master”; a project on library management. As we know that it is too much complicated to manage the library because the detail of the books, magazines, CDs, users, etc. is much difficult to handle. But now librarians don’t worry about this frustration… Read moreA report On Library Master