Aisha Email System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
The Paper Entitle “Aisha Email System” deals with identifying the clients to send and receive mail with the same login. This utility will allow multiple clients to login under the same login name and still have personalized mail information, enabling them to send and receive mails. Each user willing to avail the services offered by the mail server application should exist as a user before he can send or receive mails. This is made possible by prompting each user to enter his user-id and password before he can send or view his mails. This Paper has Inbox, compose and address list. E-mail is one of the most common and reliable methods of communication for both personal and business purposes. It also plays an important role in each and every Web site. This role will be in the type of automated e-mails from the server after posting information from a form.
Authors and Affiliations
Aisha Hamad Abobaker
Hybrid Algorithm combining Genetic algorithms and CSP approach to plane an Optimized path for a Mobile Robot moving under Time Window
Abstract: The problems of optimization are considered as a type of a constraint satisfaction problem: COP (Constraint Optimization problem). In this frame goes our first works which are interested in the optimi...
Quality Enhancement of Video Denoising Algorithm withCombined Effect of Different Views
Abstract: An unwanted factor in digital images and videos called as Noise is responsible for hiding the detailsand destroying image information. Hence denoising has great importance in the detail restoration and to...
Privacy Preserving by Hiding Association Rule Mining from Transaction Database
Abstract: For making the decision of data mining process some expertise are required, some organization have their own expertise, but many organization doesn’t have their own expertise, so the organization helps with som...
Off-Line Signature Verification Using Principal ComponentVariances
Abstract: Signature verification system is always the most sought after biometric verification system. Being abehavioral biometric feature which can always be imitated, the researcher faces a challenge in designing...
Elaborating the performance of Sensor Networks with merest energy to prolong network endurance
The routing process in Wireless Sensor Networks may differ from other normal routing methods because it contains no link to follow and no definite structure. The Wireless Sensor Networks is created by densely de...