Home | Conferences | Techknowledge | 9th National Conference

9th National Conference RSS

back 1 2 3 4 5 6 7 8 9 10 next total: 92 | displaying: 41 - 50

Working Parallel With Hyper Threading

In today’s competitive world, to achieve maximum performance in shorter duration is the need in every field. Same is the situation in the field of processing of hardware and software of computer systems. At a given time, more than one activity must be carried out, that is where a need of Parallel Processing creeps in. To achieve maximum performance, nearly 100 % CPU utilization must be done. To facilitate the need of Parallel activities,Hyper-threading. Technology is used the processors. It is used to improve parallelization of computations of microprocessors.. Hyper-threading works by duplicating certain sections of the processor. It works on the fact of logical processors, allowing operating system to appear as two “processors”, to schedule two threads simultaneously, thus increasing speed of computing. This technology is transparent to operating systems and programs. All that is required to take advantage of hyper-threading is symmetric multiprocessing(SMP) support.Execution units on a hyper-threaded CPU share certain elements, such as cache and pipelines. Hyper-threading is effective as it allows for flexible scheduling of all execution slots, so that core is busy as possible. ... Read Full Article

Search Engine For Semantic Web

Introduction: The good news about the Internet and its most visible component, the World Wide Web, is that there are hundreds of millions of pages available, waiting to present information on an amazing variety of topics. The bad news about the Internet is that there are hundreds of millions of pages available, most of them titled according to the whim of their author, almost all of them sitting on servers with cryptic names. When you need to know about a particular subject, how do you know which pages to read? If you're like most people, you visit Search Engine. Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There are differences in the ways various search engines work, but they all perform three basic tasks: They search the Internet -- or select pieces of the Internet -- based on important words. They keep an index of the words they find, and where they find them. They allow users to look for words or combinations of words found in that index. Early search engines held an index of a few hundred thousand pages and documents, and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. ... Read Full Article

Embedded Systems

This paper presents a survey of several major EMBEDDED OPERATING SYSTEMS. Normally an A Embedded Operating System is an operating system for embedded computer systems. These operating systems are designed to be very compact and efficient, forsaking many functions that non-embedded computer operating systems provide, and which may not be used by the specialized applications they run. They are frequently also real-time operating systems. Examples of embedded operating systems could include the software used in Automated Teller Machines (ATM’s), Cash Registers, CCTV systems, TV Box Set, GPS, Jukeboxes, etc. It analyzes several design issues of EMBEDDED OPERATING SYSTEMS, such as Advantages, Architecture, Memory Management, Inter Process Communication’s, Process Management, Network Support, and the Impact of Hardware Limitation and Application requirement of Embedded System. We analyzed three prevailing Embedded Operating systems: Windows XP Embedded (XPe) Operating System Windows CE operating System, and Embedded Linux. ... Read Full Article

Embedded Systems

This paper presents about ENRICHMENT OF EMBEDDED SYSTEMS SOFT WARE METHODS. Normally an A Embedded System. An Embedded System is a computer system designed to perform one or a few dedicated function often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Embedded systems are critical components of our everyday lives, be they in control systems like airbag controllers in cars, or in consumer products like washing machines and phones. Since such electronic products evolve to software intensive systems, software, becoming larger, more complex and prevalent, poses severe problems in the development of those systems. The required degree of dependability will lead to more rigour in construction and validation, and hence, strengthen the role of formal methods. Moreover, methods used in other areas, such as model checking in hardware verification and finite-state-machine-based testing in protocol testing, will make their way. ... Read Full Article

Virtual Classroom Tool

The demand for educational software is growing exponentially with the surge of interest in educational reform, internet and the distant education. Due to the wide variety of information on the Internet, students taking on-line courses. We propose a LAN based virtual classroom model to provide the instructor with the capability to call students' attention to class and to synchronize class activities. The tool provide components for instructors and students to interact effectively at the same time.VC will usher in the immense flexibility and sophistication in the existing learning platform structures, with the perfect blend of synchronous and asynchronous interaction. It provides a means of collaborative learnings for the students. Also included in the model is an FCFS floor control algorithm to regulate participants engaged in audio conferencing in an orderly fashion. ... Read Full Article

A Case Study: Security Issues In Mobile Ad Hoc Network

A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Security problems in MANETs have received much attention in the last few years. Most research efforts have been focused on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion detection and response etc. There are several security issues in Mobile Ad Hoc Network having their own advantages and disadvantages. In this paper, we review some security issues in MANET as well as their current solutions. ... Read Full Article

Re-Examination Of Protocols For Mobile Ah Hoc Network

A mobile ad hoc network is a multi-hop wireless network with dynamically and frequently changing topology. In recent years, with the development of mobile ad hoc networks (MANETs) technology, various multicast routing protocols such as On Demand Distance Vector Routing Protocol (AODV), AODV with break avoidance (AODV-BR), Scalable Multipath On Demand Routing (SMORT) protocol, DMSR have been proposed for MANETs. Most of the routing protocols, however, use a single route and do not utilize multiple alternate paths. These protocols have distinguishing features and different applications. This paper provides a control study of many different Routing Protocols by presenting their characteristics and functionality .We also focus on some applications of these protocols. ... Read Full Article

Dynamic Data Grid Replication And Data Consistency

This paper is based on problems of replication in grid computing. The study mainly focuses on replication strategy in data grid environment. I have proposed dynamic services for replicating and maintaining data in grid environments, and directing replicas to appropriate locations for use. To address a problem with the Bandwidth Hierarchy-based Replication (BHR) algorithm, a strategy for maintaining replicas dynamically, I have propose the Dynamic Maintenance Service (DMS). I anticipate striking a balance between improving data access performance and replica consistency in data grids. This work can find out the more efficient ways of utilizing storage space is an important point. ... Read Full Article

Impact Of Electronic Data Interchange In E-Business

1.    Introduction: Electronic Data Interchange is considered as a technical representation between two parties, either internal or external. It refers as a transformation of data ... Read Full Article

A Model For Learning Objects Reusability

Designing systems from scratch is an old fashioned concept nowadays. Availability of reusable components allows the developers to concentrate less on coding but more on reuse of these components in their application. If an application can be developed with such an approach then why not the material designed for E-learning. This paper focuses on Learning objects (LO), the core concept in E-learning reusability and suggests a model to check for reusability of an LO under consideration. Various metrics used in software engineering are used for that purpose. ... Read Full Article

back 1 2 3 4 5 6 7 8 9 10 next total: 92 | displaying: 41 - 50