Seminars
You can download full documentation also.....
The Impact of Information Technology on Diabetic Mellitus in developing Countries
Abstract
Diabetes
mellitus has been on the rise across the world affecting over 150 million
people. Over
20% of diabetics in the world are Indians. At present, it is higher in developed than in
developing countries. At the same time, diabetes has over the last two
developments according the spectrum of information technology, Excellent diabetes
care and self-management depends heavily on the flow of timely, accurate
information to patients and providers are present through Recent developments
in information technology, (IT) may therefore, hold great promise.
In this article, we have briefly reviewed the computer assisted case
interventions and current state of bioinformatics in the understanding of
diabetes and its complications.
Wireless Video Surveillance
Abstract
Increasing need for intelligent video surveillance in public,
commercial and family applications makes automated video surveillance systems
one of the main current application domains in computer vision. Intelligent
video surveillance systems deal with the real-time monitoring of persistent and
transient objects within a specific environment.
A
low-cost intelligent mobile phone-based wireless video surveillance solution
using moving object recognition technology is proposed in this paper. The proposed
solution can be applied not only to various security systems, but also to
environmental surveillance. Firstly, the basic principle of moving object
detecting is given. Limited by the memory consuming and computing capacity of a
mobile phone, a background subtraction algorithm is presented for adaptation.
Then, a self-adaptive background model that can update automatically and timely
to adapt to the slow and slight changes of natural environment is detailed.
When the subtraction of the current captured image and the background reaches a
certain threshold, a moving object is considered to be in the current view, and
the mobile phone will automatically notify the central control unit or the user
through phone call, SMS (Short Message System) or other means.
The proposed algorithm can be implemented in an
embedded system with little memory consumption and storage space, so it’s
feasible for mobile phones and other embedded platforms, and the proposed
solution can be used in constructing mobile security monitoring system with
low-cost hardware and equipments. Thus our results first emulated in Wireless toolkit
and the results show the effectiveness of proposed
solution.
Artificial
Intelligence
Abstract
computer
systems are becoming commonplace; indeed, they are almost ubiquitous. We find
them central to the functioning of most business, governmental, military,
environmental, and health-care organizations. They are also a part of many
educational and training programs. But these computer systems, while
increasingly affecting our lives, are rigid, complex and incapable of rapid
change. To help us and our organizations cope with the unpredictable
eventualities of an ever-more volatile world, these systems
need capabilities that will enable them to adapt readily to change. They need
to be intelligent. Our national competitiveness depends increasingly on
capacities for accessing, processing, and analyzing information. The computer
systems used for such purposes must also be intelligent. Health-care providers
require easy access to information systems so they can track health-care
delivery and identify the most recent and effective medical treatments for
their patients' conditions. Crisis management teams must be able to explore
alternative courses of action and support decision making. Educators need
systems that adapt to a student's individual needs and abilities. Businesses
require flexible manufacturing and software
design aids to maintain their leadership position in
information technology, and to regain it in manufacturing
Software Risk Management is a proactive
approach for minimizing the uncertainty and potential loss associated with a
project. A risk is an event or condition that, if it occurs, has a
positive or negative effect on a project’s objectives. The three common
characteristics of risk are (1) it represents a future event, (2) it has a
probability of occurring of greater than 0%, but less than 100%, and (3) the
consequence of the risk must be unexpected or unplanned for. Future
events can be categorized as opportunity-focused (positive risk) if their
consequences are favorable, or as threat-focused (negative risk) if their
consequences are unfavorable.
AN IMAGE PROCESSING USING SIGNALS & SYSTEMS
Abstract
A real-time face recognition system can be implemented on an IBM compatible personal computer with a video camera, image digitizer, and custom VLSI image correlator chip. With a single frontal facial image under semi-controlled lighting conditions, the system performs (i) image preprocessing and template extraction, (ii) template correlation with a database of 173 images, and (iii) postprocessing of correlation results to identify the user. System performance issues including image preprocessing, face recognition algorithm, software development, and VLSI hardware implementation are addressed. In particular, the parallel, fully pipelined VLSI image correlator is able to perform 340 Mop/second and achieve a speed up of 20 over optimized assembly code on a 80486/66DX2. The complete system is able to identify a user from a database of 173 images of 34 persons in approximately 2 to 3 seconds. While the recognition performance of the system is difficult to quantify simply, the system achieves a very conservative 88% recognition rate using cross-validation on the moderately varied database.
Artificial Intelligence & Global Risk
Abstract
computer
systems are becoming commonplace; indeed, they are almost ubiquitous. We find
them central to the functioning of most business, governmental, military,
environmental, and health-care organizations. They are also a part of many
educational and training programs. But these computer systems, while
increasingly affecting our lives, are rigid, complex and incapable of rapid
change. To help us and our organizations cope with the unpredictable
eventualities of an ever-more volatile world, these systems need capabilities that will
enable them to adapt readily to change. They need to be intelligent. Our
national competitiveness depends increasingly on capacities for accessing,
processing, and analyzing information. The computer systems used for such
purposes must also be intelligent. Health-care providers require easy access to
information systems so they can track health-care delivery and identify the
most recent and effective medical treatments for their patients' conditions.
Crisis management teams must be able to explore alternative courses of action
and support decision making. Educators need systems that adapt to a student's
individual needs and abilities. Businesses require flexible manufacturing and software design aids to maintain their
leadership position in information technology, and to regain it in
manufacturing
AUTOMATED GEOSPATIAL CONFLATION OF VECTOR ROAD MAPS TO HIGH RESOLUTIONARY
IMAGE
ABSTRACT:
As
the availability of various geospatial data increases, there is an urgent need
to integrate multiple datasets to improve spatial analysis. However, since
these datasets often originate from different sources and vary in spatial
accuracy, they often do not match well to each other. In addition, the spatial
discrepancy is often nonsystematic such that a simple global transformation
will not solve the problem. Manual correction is T labor-intensive and
time-consuming and often not practical. In this paper, we present an innovative
solution for a vector-to-imagery conflation problem by integrating several
vector-based and image-based algorithms. We only extract the different types of
road intersections and terminations from imagery based on spatial contextual
measures. We eliminate the process of line segment detection which is often
troublesome. The vector road intersections are matched to these detected points
by a relaxation labeling algorithm. The matched point pairs are then used as
control points to perform a piecewise rubber-sheeting transformation. With the
end points of each road segment in correct positions, a modified snake algorithm
maneuvers intermediate vector road vertices toward a candidate road image.
Finally a refinement algorithm moves the points to center each road and obtain
better cartographic quality. To test the efficacy of the automated conflation
algorithm, we used U.S.
Census Bureau’s TIGER vector road data and U.S. Department of Agriculture’s
1-m multi-spectral near infrared aerial photography in our study. Experiments
were conducted over a variety of rural, suburban, and urban environments. The
results demonstrated excellent performance. The average correctness measure
increased from 20.6% to 95.5% and the average root-mean-square error decreased
from 51.2 to 3.4 m.
BIOMETRIC FACE RECOGNITION
Abstract:
As one of the most successful applications of image analysis and
understanding, face recognition has recently
received significant attention, and has an important advantage over other
biometric technologies as it is a non -intrusive and easy to use method.
One of the fastest
growing areas of advanced security involves biometric face recognition technologies.
The art of picking a face out of a crowd is a time honored skill. Applying
technology to such a pursuit has to date proven both fruitful and frustrating.
Biometric face recognition technology offers great promise in its ability to identify
a single face, from multiple lookout points,
from a sea of hundreds of
thousands of other faces. In addition to serving as a information access control
tool, biometric face recognition technologies are being used to safeguard
international borders, financial ATM transactions, prevent benefits and
identity fraud, and help combat terrorism.
Body Area Network for Device Control
Abstract:
Using electro-physiological
signals like EMG or EOG for device control is a promising research area. The
application in practice however has the disadvantage that electrodes have to be
attached to the user and all electrodes have to be wired to biosignal
amplifiers and the device to be controlled. To minimizethe effort of electrode
application and to avoidwiring at all a set of biosignal amplifiers with
bodyarea network connectivity is being developed. In the first stage an EMG
module and the base station of the body area network is demonstrated.
Challenges and Solutions on Routing in Multichannel
Wireless Mesh Networks
“Efficient Algoritham for Hirarchical Online mining of Association Rules”
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad hoc networks, including a number of secure on-demand routing protocols, that defend against a variety of possible attacks on network routing. In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, ARAN, and SAODV, are unable to discover routes longer than two hops when subject to this attack. This attack is also particularly damaging because it can be performed by a relatively weak attacker. We analyze why previous protocols fail under this attack. We then develop Rushing Attack Prevention (RAP), a generic defense against the rushing attack for on-demand protocols. RAP incurs no cost unless the underlying protocol fails to find a working route, and it provides provable security properties even against the strongest rushing attackers.
Abstract:
Wireless mesh networks have emerged as a
promising solution to providing cost-effective last-mile connectivity. Employing
multiple channels is shown to be an effective approach to overcoming the
problem of capacity degradation in multihop wireless networks. However,
existing routing schemes that are designed for single channel multihop wireless
networks may lead to inefficient routing paths in multichannel WMNs. To fully
exploit the capacity gain due to multiple channels, one must consider the
availability of multiple channels and distribute traffic load among channels as
well as among nodes in routing algorithms. In this article we focus on the
routing problem in multichannel WMNs. We highlight the challenges in designing routing algorithms for multichannel
WMNs and examine existing routing metrics that are designed for multichannel
WMNs, along with a simulation-based performance
study. We also address some open research issues related to routing in multichannel WMNs.
Computer Forensics
Abstract:
In today’s day and age,
there is no such thing as 100% secure. But with the stroke of a key, the bad
guys can erase all of their data and hide their tracks when using computers for
not so legal purposes, or can they? Just because you hit the delete key doesn’t
mean that the evidence is gone. Today, there is a growing demand for computer
forensics professionals to aid in the fight against those that would use the
very technology we depend on against us.
We see the evidence every day, identity theft, viruses, malware, computer intrusion and more. But what about the things we don’t think or hear about? The emails, downloaded programs, or even the corporate espionage that we only used to read about. What about those threats such as the latest and greatest viruses that attack our cell phones, PDAs, etc.
We see the evidence every day, identity theft, viruses, malware, computer intrusion and more. But what about the things we don’t think or hear about? The emails, downloaded programs, or even the corporate espionage that we only used to read about. What about those threats such as the latest and greatest viruses that attack our cell phones, PDAs, etc.
MOBILE IRIS RECOGNITION SYSTEM BY USING
ABSTRACT:
In
this paper we describe a mobile iris recognition system, where a mobile camera
is used in iris recognition system. The demand for high confidence
authentication of human identity using biometric technique has grown steadily
in the recent past. But the big problem lies in implementing these biometric systems
is it can be implemented only in costly mobiles especially 3G mobiles. In
mobile iris recognition system a mobile device with camera is used to capture
the iris image. Captured image is transmitted to IServer via GPRS. (General
Packet Radio Service).It can also be used as mobile tracker by using GPRS and
also for security purposes.
CRYPTOGRAPHY IN SMART CARDS FOR NETWORK SECURITY
ABSTRACT
In the age of universal electronic
connectivity, of viruses and hackers of electronic eaves dropping and
electronic fraud there is indeed no time at which security does not matter. The
issue of security and privacy is not a new one however, and the age-old science
of cryptography has been in use, since people had information that they wish to
hide. Cryptography has naturally been extended into realm of computers, and
provides a solution electronic security and privacy issue.
As the technology
increases, Smart Cards (e.g.: SIM cards, Bank cards, Health cards) play very
important role in processing many transactions with high level of security.
This security level achieved by means of Cryptography. In this paper i am
presenting an introduction to cryptography, basics of Smart Cards, the role of
cryptography in Smart Cards, and the processing of an example transaction
involving security (Bank Card).
CYBER
CRIMES
Abstract:
The
revolution in information technologies has changed society fundamentally and
will probably continue to do so in the foreseeable future. Many tasks have
become easier to handle. Where originally only some specific sectors of society
had rationalised their working procedures with the help of information technology,
now hardly any sector of society has remained unaffected. Information
technology has in one way or the other pervaded almost every aspect of human
activities.
The developments have given rise to an
unprecedented economic and social changes, but they also have a dark side: the
emergence of new types of crime as well as the commission of traditional crimes by means of new technologies that
we called “Cyber crime”.
Moreover, the consequences of criminal behaviour can be more far-reaching than
before because they are not restricted by geographical limitations or national
boundaries. The recent spread of detrimental computer viruses all over the
world has provided proof of this reality. Other than computer viruses,
cyber crime also consists of specific crimes dealing with computers and
networks (such as hacking) and the facilitation of traditional crime through
the use of computers (child pornography, hate crimes, telemarketing /Internet
fraud)
DATA WAREHOUSING AND DATA MINING TECHNOLOGY FOR BUSINESS
INTELLIGENCE
Abstract
The information economy puts a premium on high quality
actionable information - exactly what business intelligence (BI) tools like
data warehousing, data mining, and OLAP can provide to the retailers. A close
look at the different retail organizational functions suggests that BI can play
a crucial role in almost every function. It can give new and often surprising
insights about customer behavior; thereby helping the retailers meet their
ever-changing needs and desires. On the supply side, BI can help retailers
identify their best vendors and determine what separates them from not so good
vendors. It can give retailers better understanding of inventory' and its
movement and also help improve storefront operations through better category
management Through a host of analyses and reports, BI can also improve
retailers' internal organizational support functions like finance and human
resource management.
Mining With Noise Knowledge: Error-Aware
Data Mining
Abstract—Real-world data mining deals with noisy information sources
where data collection inaccuracy, device limitations, data transmission and
discretization errors, or man-made perturbations frequently result in imprecise
or vague data. Two common
practices are to adopt either data
cleansing approaches to enhance the data consistency or simply take noisy data
as quality sources and feed them into the data mining algorithms. Either way
may substantially sacrifice the mining performance. In this paper, we consider
an error-aware (EA) data mining design, which takes advantage of statistical
error information (such as noise level and noise distribution) to improve data
mining results.We assume that such noise knowledge is available in advance, and
we propose asolution to incorporate it into the mining process. More
specifically, we use noise knowledge to restore original data distributions, which
are further used to rectify the model built from noisecorrupted data. We
materialize this concept by the proposed EA naive Bayes classification
algorithm. Experimental comparisonson real-world datasets will demonstrate the
effectiveness of this design.
“Efficient Algoritham for Hirarchical Online mining of Association Rules”
Abstract:-Several
multi-pass algorithms have been proposed for Association Rule Mining from static
repositories. However, such algorithms are incapable of online processing of
transaction streams. In this paper we introduce an efficient single-pass
algorithm for mining association rules, given a hierarchical classification
amongst items. Processing efficiency is achieved by utilizing two
optimizations, hierarchy-aware counting
and transaction reduction,
which become possible in the context of hierarchical classification. We also
propose a modified algorithm for the rule generation phase which avoids the
construction of an explicit adjacency lattice.
Multi resolution Watermark Based On Wavelet Transform For
Digital Images
Abstract:
The overabundant and easily accessible digital
data on the internet has made it the most vulnerable information-store subject
to piracy. Digital watermarking is a tool developed to fight piracy. The rapid
expansion of the internet in the recent years has rapidly increased the
availability of digital data such as audio, images and videos to the public. As
we have witnessed in the past few months, the problem of protecting multimedia
information becomes more and more important and a lot of copyright owners are
concerned about protecting any illegal duplication of their data or work. Some
serious work has to be done to maintain the availability of multimedia
information and at the same time protecting the intellectual property of
creators, distributors or simple owners of such data. This is an interesting
challenge and is probably the reason why so much attention has been drawn toward
the development of digital images protection schemes.
Platform
Virtualization
ABSTRACT
Virtualization is a proven
software technology that is rapidly transforming the IT landscape and
fundamentally changing the way that people compute. Today’s powerful x86
computer hardware was designed to run a single operating system and a single
application. This leaves most machines vastly underutilized. Virtualization
lets you run multiple virtual machines on a single physical machine, sharing
the resources of that single computer across multiple environments. Different
virtual machines can run different operating systems and multiple applications
on the same physical computer.
We use a
desktop which runs on a single operating system. We also see systems which have
more than one operating system installed, but run on one via dual boot. The
utilization percentage of these systems is much low when compared to the level
of their capability.
RECENT ADVANCES IN SOFTWARE ENGINEERING
ABSTRACT:
Much
of current software engineering practice and research is done in a
value-neutral setting, in which every requirement, use case, object, and defect
is treated as equally important; methods are presented and practiced as largely
logical activities; and a “separation of
concerns” is practiced, in which the responsibility of software engineers
is confined to turning software requirements into verified code. In earlier
times, when software decisions had relatively minor influences on a system’s
cost, schedule, andvalue, the value-neutral approach was reasonably workable.
But today and increasingly in the future, software has a major influence on
most systems’ cost, schedule, and value; and value-neutral software decisions
can seriously degrade project outcomes. This paper presents an agenda for a
discipline of Value-Based Software Engineering. It accepts the challenge of
integrating value considerations into all of the existing and emerging software
engineering principles and practices, and of developing an overall framework in
which they compatibly reinforce each
other.
Example elements of this agenda include value-based requirements engineering,
architecting, design and development, verification and validation, planning and
control, risk management, quality management, and people management. It
presents seven key elements that provide candidate foundations for value based
software engineering: Benefits Realization Analysis; Stakeholder Value
Proposition Elicitation and Reconciliation; Business Case Analysis; Continuous
Risk and Opportunity Management; Concurrent System and Software Engineering;
Value-Based Monitoring and Control; and Change as Opportunity.
RED TACTON
Abstract
Technology is making many things easier. We
can say that this concept is standing example for that. So far we have seen
LAN, MAN, WAN, INTERNET & many more but here is new concept of “ RED TACTON ” which makes the human body as a
communication network by
name .... HAN (Human Area Network). Red Tacton is a new Human Area networking technology that uses the surface of the
human body as a safe, high speed network transmission path. Red Tacton uses the
minute electric field generated by human body as medium for transmitting the
data. The chips which will be embedded in various devices contain transmitter
and receiver built to send and accept data in digital format. In this paper we
will discuss about red tacton, and its working states, and applications of red
tacton various fields. And we will compare our red tacton with the other
technology for data transmission and know about human area network.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
ABSTRACT:
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad hoc networks, including a number of secure on-demand routing protocols, that defend against a variety of possible attacks on network routing. In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, ARAN, and SAODV, are unable to discover routes longer than two hops when subject to this attack. This attack is also particularly damaging because it can be performed by a relatively weak attacker. We analyze why previous protocols fail under this attack. We then develop Rushing Attack Prevention (RAP), a generic defense against the rushing attack for on-demand protocols. RAP incurs no cost unless the underlying protocol fails to find a working route, and it provides provable security properties even against the strongest rushing attackers.
SUPER WORMS AND CRYPTO VIROLOGY: A DEADLY COMBINATION
Abstract:
Understanding the possible extent of the future
attacks is the key to successfully protecting against them. Designers of
protection mechanisms need to keep in mind the potential ferocity and
sophistication of viruses that are just around the corner. That is why we think
that the potential destructive capabilities of fast spreading worms like the
Warhol worm, Flash worm and Curious Yellow need to be explored to the maximum extent
possible. While re-visiting some techniques of viruses from the past, we can
come across some that utilize cryptographic tools in their malicious activity.
That alarming property, combined with the speed of the so-called “super worms”,
is explored in the present work. Suggestions for countermeasures and future
work are given.
VIRTUAL UNIVERSITIES
ABSTRACT:
This report is based on “internet and web applications.”As nowadays internet is playing a key role in all fields, so we would like to give a presentation on the applications of the internet and web.
We selected the topic “VIRTUAL UNIVERSITIES”, one of the most important applications of the internet.
In our presentation, we concentrate on the virtual universities, how they are working, some examples, how the students are connecting to the internet, the advantages and the disadvantages of the virtual universities.
This is very helpful to future generations in this computer era. Simply by sitting in the home, we get the information in the entire world and also helpful for getting education.
Many countries in the world are implementing these types of universities. In India also some universities are providing these virtual study courses.
This report is based on “internet and web applications.”As nowadays internet is playing a key role in all fields, so we would like to give a presentation on the applications of the internet and web.
We selected the topic “VIRTUAL UNIVERSITIES”, one of the most important applications of the internet.
In our presentation, we concentrate on the virtual universities, how they are working, some examples, how the students are connecting to the internet, the advantages and the disadvantages of the virtual universities.
This is very helpful to future generations in this computer era. Simply by sitting in the home, we get the information in the entire world and also helpful for getting education.
Many countries in the world are implementing these types of universities. In India also some universities are providing these virtual study courses.
Visual Mining
Abstract :
Data mining
strategies are usually applied to collected data and frequently focus on the
discovery of structure such as clusters, bumps, trends, periodicities,
associations and correlations, quantization and granularity, and other
structures for which a visual data analysis is very appropriate and quite
likely to yield insight. However, data mining
strategies often applied to massive data sets where visualization may not be
very successful because of the limits of both screen resolution, human visual system resolution as
well as the limits of available computational resources. In this paper we
suggest some strategies for overcoming such limitations and illustrate visual
data mining with some examples of successful attacks on high-dimensional and large
data sets.
MINING
CUSTOMER VALUE FROM DECISION TREES
Most
data mining algorithms and tools stop at discovered customer models, producing
distribution information on customer profiles. Such techniques, when applied to
industrial problems such as customer relationship management (CRM), are useful
in pointing out customers who are likely attritors and customers who are loyal,
but they require human experts to post process the discovered knowledge
manually. Most of the post processing techniques have been limited to producing
visualization results, but they do not directly suggest actions that would lead
to an increase in the objective function such as profit. In this paper, we
present novel algorithm that suggest actions to change customers from an undesired
status (such as attritors) to a desired one (such as loyal) while maximizing an
objective function: the expected net profit. These algorithms can discover cost
effective actions to transform customers from undesirable classes to desirable
ones. The approach we take integrates data mining and decision making tightly
by formulating the decision making problems directly on top of the data mining
results in a post processing step. To improve the effectiveness of the
approach, we also present an ensemble of decision trees which is shown to be
more robust when the training data changes.
Click here to download...
REMOTE PROCEDURE CALL
Remote
procedure call (RPC) is an Inter-process
communication technology that allows a compute program to cause a subroutine
procedure to execute in another address space (commonly on another computer on
a shared network) without the programmer explicitly coding the details for this
remote interaction. That is, the programmer would write essentially the same
code whether the subroutine is local to the executing program, or remote. When
the software in question is written using object-oriented principles, RPC may
be referred to as remote invocation
or remote method invocation. RPC is a
powerful technique for constructing distributed, client-server based
applications. It is based on extending the notion of conventional, or local
procedure calling, so that the called procedure need not exist in the same
address space as the calling procedure. The two processes may be on the same
system, or they may be on different systems with a network connecting them. By
using RPC, programmers of distributed applications avoid the details of the
interface with the network.
Click here to download..
Mobi pads
Traditionally,
middleware technologies, such as CORBA, Java RMI, and Microsoft’s DCOM, have
provided a set of distributed computing services that essentially abstract the
underlying network services to a monolithic “black box.” In a mobile operating
environment, the fundamental assumption of middleware abstracting a unified
distributed service for all types of applications operating over a static
network infrastructure is no longer valid. In particular, mobile applications
are not able to leverage the benefits of adaptive computing to optimize its
computation based on current contextual situations. In this paper, we introduce
the Mobile Platform
for
Actively Deployable Service (MobiPADS) system. MobiPADS is designed to support
context-aware processing by providing an executing platform to enable active
service deployment and reconfiguration of the service composition in response
to environments of varying contexts.
Unlike
most mobile middleware, MobiPADS supports dynamic adaptation at both the
middleware and application layers to provide flexible configuration of
resources to optimize the operations of
mobile applications. Within theMobiPADS
system, services are configured as chained service objects to provide augmented
services to the underlying mobile applications
so as to alleviate the adverse conditions of a wireless environment.
seminars for u
ReplyDeleteexecellent ,..............
ReplyDeleteRefer Seminars for u tab for Seminar Topics its very nice...........
ReplyDelete