Recently, the uses of digital photogrammetry became more popular and now it had made photogrammetric technique became easier, quicker and cheaper. This study discuss about the capabilities of different photogrammetric software to build 3D mapping. The studies area will carry out on Shah Alam city and possible to cover around UiTM. Next data will be using Ground Control Point (GCP) using GPS. Since using two different of photogrammetric software, it involves processing the image such as aerial...
Raphael et. al presented a framework, which was designed to describe the block cipher cryptanalysis techniques compactly regardless of their individual differences. This framework describes possible attacks on block ciphers and also specifies the technical details of each type of attack and their respective strengths. It was shown how to apply the framework to describe various attacks on popular and recent block ciphers. A comparative study has been done between the proposed frame work and Co...
This paper is designed to propose a possible evolution of CAD/CAM in relation to the current technology. The context evolves round Web-based technology covering web based design and manufacturing respectively. The paper also suggest interventions to tackle the identified challenges and obstacles. Web-based systems in design and manufacturing , with machining intelligence built into the program, there is increase in efficiency and consistency. CAD/CAM technology is moving in the direction of C...
In the present world the security vulnerabilities are highly challenging in MANET. To get the maximum security and minimum threat there is lots of work going on. To effectively isolate the malicious node this paper proposes a Neuro fuzzy algorithm. By using fuzzy logic we can further improve the security level by identifying the malicious node more accurately. The concept behind the paper is as in real life scenario, trust and sharing. Here in this paper we use the concept of trusting support...
Introduction Memory management is an integral part of an operating system. Systems that are capable of supporting multiprogramming must manage available resources effectively so that processes will have the least amount of idle time. Many operating systems use virtual memory, a form of memory management, by storing additional memory to disk. This memory is actually an extension of main memory used by processes that require larger amounts of memory space. Virtual memory improved simple paging ...
1. INTRODUCTION Definition of the problem This research mainly deals about the multi threaded socket classes between the client and the server. In this the concept called threads are used by the developer but it is optional as its not yet decided whether it needs or not. Even detection can provide the feedback to the application where the socket classes and the other internet cannot provide. The following are the event detection methods provided: establishing the connection, dropping the conn...
Jose Maria A. et al. have presented an overview of the multi objective shortest path problem and a review of essential and recent issues regarding the methods to its solution. They further explored a multi objective evolutionary algorithm as applied to the MSPP and describe its behavior in terms of diversity of computational complexity, optimality and solutions. Results showed that the evolutionary algorithm could find diverse solutions to the MSPP in polynomial time (based on several network...
String-matching is a very significant subject in the wide domain of text processing. Nowadays, this problem received an enormous deal of attention due to its various applications. String matching algorithms play a key role in most of computer science problems, challenges and in implementation of computer software. String-matching algorithms work as follows. Compare the text of size n with the pattern of size equal to m. First put the left ends of the pattern and the text, then compare text ch...
Evolutionary Algorithms are the stochastic optimization methods, simulating the behavior of natural evolution. These algorithms are basically population based search procedures efficiently dealing with complex search spaces having robust and powerful search mechanism. EAs are highly applicable in multiobjective optimization problem which are having conflicting objectives. Resource optimization in computer network is an important research problem and it can be easily handled by the use of mult...
Nowadays internet applications are used multimedia data storing and retrieving from the multimedia database systems. In this context mainly deals with how the content based retrieval process going on and representations to describe the descriptors. In this paper determines content based retrieval displays the result in user-defined order on the World Wide Web. And also individually annotate what problem occurs while retrieving the multimedia data such as image retrieval, audio retrieval and v...