Research Papers/Topics in Computer Engineering

Design Control and Monitoring System Of Water Distribution Networks

ABSTRACT  Nowadays, water distribution network automation is becoming more and more popular day by day due to its numerous advantages, an internet-based water distribution network system focuses on monitoring and controlling water distribution network instance. Water distribution network face wastage of water due to improper water supply management, non-monitoring in real time, this caused scarcity of water, scarcity of water consider mainly problem in cities. water distribution network auto...

2D Radar Antenna Orientation and Control

ABSTRACT The RADAR system is the first step and much more important and it has much more effect than the other step in the RADAR system works. The RADAR is used in different applications and systems, almost of these applications need high precision, and it's depending on the accuracy of RADAR ANTENNA orientation. Much research has been done and different systems designed to obtain a result within a permissible range. Design RADAR ANTENNA orientation and control system using FPGA and stepper m...

Design and Optimization of W-Tailored Optical Fiber

ABSTRACT  This research work studies the temperature effects in W-shaped core refractive index optical fiber. The work designs an optimized W-tailored optical fiber (OWTOF) that checks the effect of rising temperatures in W-tailored optical fiber (WTOF) for better communication. Initially, an introduction to the general concept of optical fibers including tailored optical fibers (TOF), temperature effects and models is presented as a background. This is followed by studies on existing litera...

Design of Digital Image Enhancement System Using Noise Filtering Techniques

ABSTRACT  Noise Reduction in digital image is one of the most important and difficult techniques in image research. The aim of Noise Reduction in digital image is to improve the visual appearance of an image, or to provide a better transform representation for another automated image processing. Many images like medical images, satellite images, aerial images and even real-life photographs suffer from viewing, removing blurring and noise, increasing contrast, etc. Reducing noise from the dig...

Design And Implementation Of An Automated Inventory Management System Case Study: Smart Shoppers Masaka

ABSTRACT The general purpose was to develop an efficient Inventory Management System (IMS) that improves service delivery at Smart shoppers’ Masaka. The main objectives were to collect and analyze user requirements that provide the researchers with enough information of what the system users want the system to accomplish, to design an Automated Inventory Management System, to implement a prototype and to test and validate the designed prototype. The methodology used includes Interviews, Que...

Inspired Safari Adventures Official Website

ABSTRACT This project is aimed to work as one of the marketing procedures and cores for Inspired Safari Adventures which acts as a general online website were the all public can view and understand more about the company. The users of this website are generally all the people who want to know about Inspired Safari Adventures in reference to the website components for example understanding the company location activities and so much more as illustrated in the website. The other users include i...

Performance Analysis Of A Single -Server Queue Communication System On A Local Area Network: Case Study: Sharing Youth Centre Cyber Cafe

ABSTRACT This study is primarily focused on investigation of major causes of performance bottlenecks on the respective Organization's Internet Cafe Local Area Network. This investigation is based primarily on analysis of a single-server queue which the system utilizes. The server queue perfotmance is analyzed using various measures of performance, the applications of which are highly referenced from published literature. The study also encompasses other minor elements of performance in the sy...

Design and Implementation of Two-Way Authentication System Using Rapsberry Pi

TABLE OF CONTENTSDECLARATION..........................................................................................................iiACKNOWLEDGEMENTS............................................................................................. iiiAPPROVAL...............................................................................................................ivTABLE OF CONTENTS ...............................................................................................vABBREVIATIONS...

Design & Implementation of Raspberry Pi Based Security System.

TABLE OF CONTENTSDECLARATION................................................................................................................................iAPPROVAL ...................................................................................................................................... iiACKNOWLEDGEMENT................................................................................................................ iiiTABLE OF CONTENTS ................................................

DESIGN AND IMPLEMENTATION OF AN ONLINE PRISON MANAGEMENT SYSTEM (A CASE STUDY OF NIGERIA PRISON SERVICE ENUGU)

ABSTRACTPrisoners’ management in Nigeria has long been a neglected area and has only recently been included in the 20-20 vision document under the e-governance. Currently, prisoner’s records are maintained in a very rudimentary way in the form of manual files and registers. This method of data management often results in human error, delay to retrieve information etc. Thus, An Online Prison Management System was designed and implemented to manage prisoner’s records for the Nigerian pris...

COMPUTER_BASED_SCRABBLE_GAME

CHAPTER ONEINTRODUCTION1.1 Background of the ProjectScrabble is an old classic board game, with game rules that are not very complicated. Compared to other classic board games, such as Chess, there are more factors to take into consideration when making a move in Scrabble. Apart from anagramming and generating words, there are other crucial decisions to make. A player would probably find several legal moves in one round, and then would have to decide which one to place. Choosing the move that...

BI-DIRECTIONAL VISITOR COUNTER

TABLE OF CONTENTS   TITLE PAGE CERTIFICATION DEDICATION ACKNOWLEDGEMENT LIST OF FIGURES TABLE OF CONTENTS ABSTRACT CHAPTER ONE 1.0INTRODUCTION 1.1AIM OF OBJECTIVE 1.2SIGNIFICANCE OF STUDY 1.3STATEMENT OF THE PROJECT CHAPTER TWO 2.0LITERATURE REVIEW 2.1DETECTOR BASED CONTROL SYSTEMS CHAP’TER THREE 3.0RESEARCH METHODOLOGY 3.1HARDWARE COMPONENTS ANALYSIS 3.1.1CRYSTAL OSCILLATOR: 3.1.2CAPACITOR 3.1.3TRANSISTOR 3.1.4ZERO PCB PLATE 3.1.5BATTERIES AND CONNECTORS: 3.1.616X2 LCD DISPLAY 3.1.7SENSO...

Early Plant Disease Detection and Recommendation Using ML CNN

Identification of the plant diseases is the key to preventing the losses in the yield and quantity of the agricultural product. Almost 70% people depend on it & shares major part of the GDP. Diseases in crops mostly on the leaves effects on the reduction of both quality and quantity of agricultural products. Perception of human eye is not so much stronger so as to observe minute variation in the infected part of leaf. In this paper, we are providing software solution to automatically detect a...

Improving Software Defect Prediction Using Cluster Undersampling

ABSTRACT Adequately learning and classifying datasets that are highly unbalanced has become one of the most challenging tasks in Data Mining and Machine Learning disciplines. Most datasets are adversely affected by the class imbalance problem due to the limited occurrence of positive examples. This phenomenon adversely affects the ability of classification algorithms to adequately learn from these data to correctly classify positive examples in new datasets. Data sampling techniques presente...

Strategies For Optimizing Password Management Against Versatile Attacks

Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this claim? Or...


1 - 15 Of 140 Results