Report on Library Mnagement System

  CONTENTS       1              Introduction To Project Ø Project Definition Ø Need of the System Ø Software Progress Model Ø Linear Sequential Model   2              System Analysis Ø Feasibility Study Ø Information Gathering Source   3     H/W and S/W requirement Ø H/W requirement Ø S/W requirement   4     Data Flow Diagrams   5.           Entity Relationship Diagram   6.          … Read moreReport on Library Mnagement System

Bioinformatics in biological research

  This paper presents a comprehensive way of integrating biological research with Information Technology and presents a magical approach by using computer technology to solve biological problems. A number of tools and variety of bioinformatics techniques are in use for research purpose. In this paper we have formulated these techniques and reflecting its significance for the improvement of health. Bioinformatics… Read moreBioinformatics in biological research


  In the high computerized society the world has nowadays, it is impossible don’t use the computer to spread, research and explain the principal resource used for these Goals are the multimedia.   Multimedia has many different means for different people. For someone, multimedia means that a computer has CD-ROM. To others, multimedia is the use of combination of many… Read moreMultimedia

Mobile banking

            Mobile banking Mobile banking is the next evolutionary step after on-line Internet banking.  M-banking envisages carrying out banking operations through hand held wireless devices.  Bankers and mobile operators have teamed up in the world over to make m-banking a reality.  Any typical banking operation can be carried out through mobile services.  Customers can do banking operations wherever they… Read moreMobile banking

RFID Systems and Security and Privacy Implications

RFID Systems and Security and PrivacyImplications Abstract. The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in low-cost RFID systems… Read moreRFID Systems and Security and Privacy Implications

Hybrid Approach for Managing Cost-Performance Tradeoff in Scheduling for Embedded Multiprocessor SOCs

Hybrid Approach for Managing Cost-Performance Tradeoff in Scheduling for Embedded Multiprocessor SOCs   In This paper we present a new methodology for task scheduling in embedded systems that combines the low runtime complexity of a design time scheduling phase with the flexibility of a runtime scheduling phase. It schedules tasks such that the task consumes the least energy under a… Read moreHybrid Approach for Managing Cost-Performance Tradeoff in Scheduling for Embedded Multiprocessor SOCs

A report On Library Master

“Necessity is often the spur to genius”.  This saying by Balzac is authenticated by the development of “Library Master”; a project on library management. As we know that it is too much complicated to manage the library because the detail of the books, magazines, CDs, users, etc. is much difficult to handle. But now librarians don’t worry about this frustration… Read moreA report On Library Master

Report on CDMA technology

       The founders of QUALCOMM realized that CDMA technology could be used in commercial cellular communications to make even better use of the radio spectrum than other technologies. They developed the key advances that made CDMA suitable for cellular, then demonstrated a working prototype and began to license the technology to telecom equipment manufacturers.        The first CDMA networks were… Read moreReport on CDMA technology

Dynamic Routing in a Mesh Network

  This paper, show how to optimize the routing decision in a non-deterministic routing called convergence routing in which routes may change depending on the traffic conditions. The routing algorithm guarantees a loss-free delivery of packets from burst sources, and a deterministic bound on the route length in arbitrary topology networks.   The routing decisions are based on assigning routing… Read moreDynamic Routing in a Mesh Network