Skip to main content

You're using an out-of-date version of Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.

• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
  • Download
    • by 
    •   17  
      Computer Science, Computer Architecture, Computer Graphics, Human Computer Interaction
In traditional attendance in the most institution, the lecturers rely on attendance sheet pass across to students to sign. With the increase in the number of students nowadays, the difficulties in attendance record have increased... more
  • Download
    • by 
    •   2  
      Computer Science, Soft Computing
The application of the Internet of Things (IoT) in agriculture captures an enormous amount of data for decision making. However, hardest-to-detect abnormal data points that are transmitted can be harmful if not detected at an earlier... more
  • Download
    • by 
    •   15  
      Computer Science, Information Technology, Technology, Information Security
ABSTRACT
    • by 
    •   9  
      Computer Science, Microstrip Antennas, Antenna Theory, Conductivity
In this paper we report experimental results on the capacitive range, stability and reliability of low-cost and high-performance analog MEMS varactors. Our varactors are contact-less, parallel-plate devices with a tuning range of nearly... more
    • by 
    •   7  
      Computer Science, Packaging, Stability, Reliability
... Costas D. Sarris', Karen Tomko', Pawel Czarnu13, Shih-Hao Hung3, Robert L. Robertson', Donghoon Chun', Edward S. Davidson3 and Linda P. B. Katehi' Radiation Laboratory, EECS, University of Michigan, Ann Arbor... more
    • by 
    •   11  
      Computer Science, Parallel Algorithms, Computer Architecture, Antennas
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature... more
  • Download
    • by 
    •   8  
      Computer Science, Algorithms, Computer Engineering, Network Security
This study is carried out to evaluate the effect of computer virus infection of files and productivity of business enterprises. Chi-square test, tables, graphs, percentage and other simple statistical tools were used in the analysis of... more
  • Download
    • by 
    •   13  
      Computer Science, Information Technology, Technology, Computer Engineering
In this paper, I will explore Leibniz Law viz. the Identity of Indiscernibles, through an equivalent formulation by McTaggart, called Dissimilarity of the Diverse, emphasizing on the notion of Difference, as far as a non-idealist view... more
  • Download
    • by 
    •   20  
      Cognitive Science, Logic And Foundations Of Mathematics, Computer Science, Artificial Intelligence
Faculty of Electronic Engineering, GIK Institute of Engineering Sciences and Technology, Topi, 23460, Swabi, Pakistan ... *Computer Science Department, LUMS, Opposite Sector U, DHA, Lahore. ... ABSTRACT In this paper an implicitly... more
    • by 
    •   11  
      Computer Science, Controller Design, Stability, Controllability
Significant developments have taken place in the area of large-scale matrix computations. Much of these advancements are the result of contributions from Krylov subspace techniques. The popularity of this class of iterative methods in... more
    • by 
    •   13  
      Computer Science, Iterative Methods, Robust control, Stability
The aim of this study is to develop a plugin, which works in conjunction with Rhinoceros software, that both estimates and reports storm water runoff. The plugin is initially developed based on the SCS Runoff Curve Number Method. The CN... more
  • Download
    • by 
    •   15  
      Computer Science, Design, Architecture, Landscape Architecture
Landscape grading is a highly critical topic in the landscape architecture curriculum, which provides crucial skills for students, such as three dimensional visual imagination, critical thinking, management and problem solving. This... more
  • Download
    • by 
    •   8  
      Computer Science, Teaching and Learning, Architecture, E-learning
In big cloud structures or large data structures, fog computing could be interpreted, referring critically to the growing issues and problems in accessing the information among Internet of things (IoT) devices. Fog computing can be used... more
  • Download
    • by 
    •   2  
      Computer Science, Information Security
ABSTRACT HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with... more
    • by 
    •   20  
      Computer Science, Computer Engineering, Performance Studies, Computer Networks
What are the activities of three types of hackers? It's well known to all that's hackers are three types (white hat, black hat and the gray hat hackers) but most of us don't know the activities of three types of hackers that's because of... more
  • Download
    • by 
    •   16  
      Computer Science, Programming Languages, Computer Engineering, Python
Przedstawiony tekst jest napisanym przez autora rozdziałem w książce zatytułowanej "Teoretyczne podstawy informatyki". Omówione są podstawy teorii informacji oparte na pojęciu entropii, problem redundancji języków naturalnych i zasady... more
  • Download
    • by 
    •   5  
      Computer Science, Information Theory, Data Compression, Redundancy
Information technology adoption is nearly universal among all part of business including Hospitals. However, Hospitals specially in developing and under developed country like Nepal has many limitations & Challenges. Such hospital are... more
  • Download
    • by 
    •   15  
      Information Systems, Computer Science, Information Technology, Health Sciences
This paper presents a business process framework for e-learning software solutions development. Existing applicable e-business models have been studied and a suitable business model has been derived and improved to match with the product... more
  • Download
    • by 
    •   2  
      Computer Science, E-learning
Fully electronic safety devices to prevent the burning down and destruction of all kinds of computer kits and electronic devices used in light and heavy vehicles, industrial devices and others.
  • Download
    • by 
    •   6  
      Electronic Engineering, Computer Science, Computer Engineering, Power Electronics