Natural & Applied Sciences

Research Papers/Topics Natural & Applied Sciences

ANTI-VIRUS

ABSTRACTBringing it to a layman, an Anti-virus can be explained as the cure to virus and viral infections in the computer system. Though virus has been identified to be existing and causing harms in various forms, there are a variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-ca...

APPLICATION AND CHALLENGES OF AN AD HOC NETWORK SYSTEM

ABSTRACT An ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad hoc networks can use ...

APPLICATION OF BILL ACCOUNTING SYSTEM FOR A HOTEL INDUSTRY (CASE STUDY OF HOTEL PRESIDENTIAL)

ABSTRACT The importance of sales accounting is gradually being recognized as germane to prudent management of any business firm.  This has necessitated the need for the computerization of structured operations as the sales managers structured operations are known with certainly for instance, the computation and decisions based on sales ratios. This project therefore is a case study of Presidential Hotel.  It describes the computerization of the sales accounting of the hotel as packaged for...

AN EVALUATION OF MULTIMEDIA SYSTEMS

ABSTRACT The multimedia application user can use sound right off the bat on both the Macintosh and on a multimedia PC running Windows because beeps and warning sounds are available as soon as the operating system is installed. On the Macintosh you can choose one of the several sounds for the system alert. In Windows system sounds are WAV files and they reside in the windowsMedia subdirectory. Sound is perhaps the most important element of multimedia. It is meaningful “speech” in any lang...

AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

ABSTRACTAnti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and...

XTC: AN ACTIVE VIRTUAL QUEUE (AVQ) ALGORITHM FOR ACTIVE QUEUE MANAGEMENT

ABSTRACTVirtual Queue-based marking schemes have been recently proposed for AQM (Active Queue Management) in Internet routers. We consider a particular scheme, which we call the Adaptive Virtual Queue (AVQ), and study its following properties: stability in the presence of feedback delays, its ability to maintain small queue lengths and its robustness in the presence of extremely short flows (the so-called web mice). Using a linearized model of the system dynamics, we present a simple rule to ...

DESIGN AND IMPLEMENTATION OF DATA AND VIDEO STREAMING SYSTEM

ABSTRACTStreaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a streaming provider. The name refers to the delivery method of the medium rather than to the medium itself. The distinction is usually applied to media that are distributed over telecommunications networks, as most other delivery systems are either inherently streaming (e.g., radio, television) or inherently non-streaming (e.g., books, video cassettes, audio CDs). The ve...

DESIGN AND IMPLEMENTATION OF MEASURING XML PERFORMANCE AND ACCESS DATABASE (CASE STUDY OF PARK LANE HOSPITAL, ENUGU)

ABSTRACT    This Working Group Note presents measurement results of various high-performance XML interchange encoding formats and their associated processors, made by the Efficient XML Interchange (EXI) Working Group. The measurements have been conducted following the recommendations of the XML Binary Characterization (XBC) Working Group. In particular, this draft covers measurements of the properties of "compactness", "processing efficiency" and "roundtrip support", as defined by the XBC ...

AN ANALYSIS OF A VIRTUAL LIBRARY SYSTEM (CASE STUDY OF NATIONAL LIBRARY OF NIGERIA, ENUGU STATE)

ABSTRACT The term virtual library is diffuse enough to be applied to a wide range of collections and organizations, but to be considered a virtual library, a virtual collection of information must be managed by and made accessible to a community of users. Thus, some web sites can be considered virtual libraries, but far from all. Many of the best known virtual libraries are older than the web including Project Perseus, Project Gutenberg, and ibiblio. Nevertheless, as a result of the developm...

DESIGN AND SIMULATION OF VEHICLE SPEED CONTROL SYSTEM

ABSTRACT This project work is an attempt to control the speedof the vehicle designed with computer software to enable thethird party or owner to get the location, speed and activity of thedriver. To achieve this, the system can transmit the informationin real time. The use of GSM/GPRS technologies allows thesystem to track the objects and provide the up-to-dateinformation. This information is authorized to specific users over the internet as the server gets the information. It is the tele-moi...

IMPACT OF SOCIAL NETWORK ON STUDENTS

ABSTRACT In today’s world where the Internet has experienced tremendous growth, social networking sites have become highly significant in students' lives. The aim of the study was to analyze the impact of social media on students. To achieve this, the survey research method was used. Three research questions guided the study. Research findings showed that a great number of students had access to the internet. Survey technique, interview, and online observation were the research methods used...

ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE AD HOC

ABSTRACTActive networking is the emerging technology that will provide new network environment where lots of potential applications can be enhanced and developed. Current IP network is somehow good at simple packet forwarding, but it desperately needs some flexibility to support QoS and has to meets some restraint in certain environment. Active packets allow many functionalities with great flexibility, however way too slow for data forwarding. To realize best performance in wireless environme...

DESIGN AND IMPLEMENTATION OF CODE OPTIMIZATION: IMPLEMENTATION OF SCALAR OPTIMIZATION

ABSTRACTOptimization is the process of transforming a piece of code to make more efficient (either in terms of time or space) without changing its output or side-effects. The only difference visible to the code’s user should be that it runs faster and/or consumes less memory. It is really a misnomer that the name implies you are finding an "optimal" solution— in truth, optimization aims to improve, not perfect, the result. Optimization is the field where most compiler research is done...

A NOVEL SECURE COMMUNICATION PROTOCOL FOR ADHOC NETWORK (SCP) (Case Study of Pleasure World Cafe )

ABSTRACTWireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except...

A NEAR-OPTIMAL MULTICAST SCHEME FOR MOBILE ADHOC NETWORK USING GENETIC ALGORITHM

ABSTRACTMulticast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack of redundancy, multiple paths and multicast tree structure. Tree graph optimization problems (GOP) are usually difficult and time consuming NP-hard o...


8116 - 8130 Of 8203 Results
@