Matt Swarbrick

Matt Swarbrick
1,170
Articles Published

Matt holds a BA and MA certificate from Cambridge, and is an subject-matter expert in Business and Management. Matt also writes about subjects like Finance, Economics and Computing/ICT.

Articles by Matt Swarbrick

Email Protocol: SMTP, POP, and MIME

Essay. Published: 5 April 2018

Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client sid…

Analysis of Tools for Data Cleaning and Quality Management

Essay. Published: 5 April 2018

Data cleaning is needed in process of combining heterogeneous data sources with relation or tables in databases. Data cleaning or data cleansing or data scrubbing is defined as removing and detecting…

Improving Resource Allocation for Data Center Overbooking

Essay. Published: 5 April 2018

Overbooking becomes feasible because user applications tend to overestimate their resources and requirements, that tends to utilize only a fraction of the allocated resources. Overbooking has to be carefully planned in order not to impact application performance. Resource utilization and Data centres utilization can be used in this overbooking scheduler. Data send can send from sources to destination via node….

System to Filter Unwanted Messages from OSN User Walls

Essay. Published: 5 April 2018

M.Renuga Devi, G.Seetha lakshmi, M.Sarmila Abstract—One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own priva…

Acoustic Cryptanalysis of RSA and Its Counter Measure

Essay. Published: 5 April 2018

Prof. J P Agrawal Saurabh Sharma Siddharth Gupta ABSTRACT Acoustics has come up as a new vulnerability in the field of information security. The RSA encryption algorithm, although h very hard to br…

Smart Prepaid Energy Meter Using GSM Module

Essay. Published: 5 April 2018

KISHORE KUMAR K   GAYATHRI N   RAJESH KUMAR V T   Abstract This paper aims at proposing a system that reduces the power loss and power theft due to illegal activities. This frame…

Techniques for Understanding Human Walking Motion

Essay. Published: 5 April 2018

  Introduction Multimedia is a term that collectively describes a variety of media content available in various forms of text, speech, audio, still images, video, animation, graphics, 3D models and …

Vulnerability Assessment and Penetration Testing Comparison

Essay. Published: 5 April 2018

Jignesh C Doshi Bhushan Trivedi ABSTRACT Business using internet has grown drastically in past decade. Attacks on web application have increased. Web application security is a big challenge for any …

Smartphone Operating Systems: Evaluation & Enhancements

Essay. Published: 5 April 2018

Muneer Ahmad Dar Javed Parvez Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. Th…

Concepts and Research into Green Networking

Essay. Published: 5 April 2018

Green Networking Abstract: Saving of excessive energy consumption is becoming a key concern in networking, because of theprobable economical benefits. These concerns, usually argued to as “green ne…

Load Balancing as an Optimization Problem: GSO Solution

Essay. Published: 5 April 2018

METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is em…

Automatic Metadata Harvesting From Digital Content

Essay. Published: 5 April 2018

MR. RUSHABH D. DOSHI, MR. GIRISH H MULCHANDANI Abstract: Metadata Extraction is one of the predominant research fields in information retrieval. Metadata is used to references information resource…

Proficient Key Tree Structure for Secure Dynamic Groups

Essay. Published: 5 April 2018

Secure Group Communication ensures forward secrecy and backward secrecy of the data. It is the responsibility of the Group Center (GC) to disallow new members to have access to previous data called b…

Information Security Management Plan

Essay. Published: 5 April 2018

Cyber security is about protecting your computer-based equipment and information from unintended or unauthorised access, change, theft or destruction HM Governement (2015), you can manage the risks b…

Stages of Alzheimer’s Utilizing Machine Learning Techniques

Essay. Published: 5 April 2018

Abstract: Alzheimer’s disease (AD) is the general type of dementia that affects the elderly population globally. An accurate and early diagnosis of Alzheimer is crucial for the treatment of patient…

Mutation Testing by Using Formal Method

Essay. Published: 4 April 2018

Jaspreet Singh Abstract Mutation testing was introduced in 1970’s in the field of software testing as a process of testing the test suites by intentionally seeding errors i.e. mutation operators,…

Heterogeneous Wireless Sensor Networks (HWSN) Management

Essay. Published: 4 April 2018

A Key Management & Establishment Scheme in Heterogeneous Wireless Sensor Networks (HWSN) Premamayudu B, Venkata rao K, and Suresh Varma P   Abstract: Key management is the one of the fundamen…

Skew Detection of Devanagari Script Using Pixels

Essay. Published: 4 April 2018

Skew Detection of Devanagari Script Using Pixels of Axes-Parallel Rectangle and Linear Regression Trupti A. Jundale Ravindra S. Hegadi   Abstract—Skew detection and correction of handwritten dat…

Efficient Database Driven Reverse Mapping Dictionary

Essay. Published: 4 April 2018

Building an Efficient Database Driven Reverse Mapping Dictionary ABSTRACT With the enormous availability of words in usage it is always being a challenge to find the meaning. Even the versatile speak…

Asynchronous JavaScript and XML (AJAX)

Essay. Published: 4 April 2018

Anjan Thapaliya Abstract AJAX stands for Asynchronous JavaScript and XML. It is a web technology that evolved in early 2000 and uses a mix of technology like JavaScript and XML. This paper discusse…