ACKNOWLEDGEMENTS I would like to thank my supervisor JONATHAN C WESTLAKE for his insurmountable guidance and tremendous encouragement throughout this research. Without him I couldn’t get effective results in this research. His precious inputs and valuable suggestions helped me throughout my research. I would like to thank my award leader PHILLMICKLEBURGH for his wonderful support […]
There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these […]
CHAPTER 1 – INTRODUCTION 1.1 Background Starting of wireless Network is a result of a research Project carried out by University of Hawaii. Initially it’s called as Aloha net, but later it used to call as Wireless Local Area Network or WLAN. At the beginning of aloha net, is capable of transferring 1 to 2 […]
Abstract- In the Computer Supported Cooperative Work (CSCW) domain, researchers have always wondered about which principles and models to adopt for the development of collaborative applications capable to really meet the needs of their users. However, these users’ requirements are unpredictable and depend on several task or environment-related factors. Integrated collaborative environments are rarely open, […]
Chapter 1: Introduction Introduction This project proposal is created to propose an IT solution to the student of Sunway University. The main point that the author want to highlight is regarding the efficiencies for student in Sunway University. An example, inefficiencies that occur in posting the announcement that is post on the website or in […]
Chapter 3 3. Analysis of QoS Parameters 3.1 Introduction A Number of QoS [11] of parameters can be measured and monitored to determine whether a service level offered or received is being achieved. These parameters consist of the following 1. Network availability 2. Bandwidth 3. Delay 4. Jitter 5. Loss 3.1.1 Network Availability Network availability […]
2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at which computer networks are expanding in this modern time to accommodate higher bandwidth, unique storage […]
Introduction:- The literature reviews the operational and strategic analysis of E-grocery systems. There are many business models in E-grocery business. To make E-business model a sustainable one they are using different strategies in different targeted markets. Each individual model varies from one other in various dimensions such as placing of order, assembling and delivering the […]
The highest aim of the thesis is to consult the open source servers and knowing out their benefits in business industry. Owing to the extensive development of technology, it is high time to consider the best to be done to sustain and improve the businesses. The primary aim of a business person is not just […]
Abstract Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might […]