Computer Science Research Papers/Topics

ONLINE CASH RECEIPT GENERATING AND PROCESSING SYSTEM FOR A SUPERMARKET (A CASE STUDY OF ROBAN STORES)

ABSTRACT The world today is going global through various online and web platforms of doing and confirming business transactions. As a result of upcoming pc and mobile business transaction applications and platforms. This research work is going to be carried out on online cash receipt generating and processing system. The current process of cash receipt generation is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the ...

ONLINE STUDENT ADMISSION SYSTEM (CASE STUDY OF ENUGU STATE COLLEGE OF EDUCATION TECHNICAL- ESCET)

ABSTRACT  This system provides online comprehensive solution for providing online admission services for ESCET students, their courses and other admission procedural requirements.  The system dedicates its resources to becoming the best Tertiary institution online admission services provider for students of Enugu State College of Education Technical (ESCET).  The resources included in the College’s online admission system were made with accuracy and efficiency in mind since the system is...

DESIGN AND IMPLEMENTATION OF E-SALES PROCESSING SYSTEM

ABSTRACT With the development of the Internet in the 1990s there were high expectations for its widespread commercial use and for rapid growth in e-commerce. Early predictions were over-optimistic, and attention shifted to identifying various barriers to the widespread development of e-commerce. Specifically for business-to-consumer (B2C) transactions the development and use of online sales systems were identified as important concerns. Nonetheless B2C e-commerce is currently growing at aroun...

MOBILE INFORMATION PROVIDER

ABSTRACT The ability to access information on demand at any location confers competitive advantage on individuals in an increasingly mobile world. As users become more dependent on this ability, the span of access of data repositories will have to grow. The increasing social acceptance of the home or any other location as a place of work is a further impetus to the development of mechanisms for mobile information access.  This project provides good user interaction. The user could obtain the...

MESSAGING SERVICE OVER TCP/IP IN LOCAL AREA NETWORKS

ABSTRACT Instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text messaging. In other words, the peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network. Currently, none of the major instant messaging systems encrypt files transferred between instant messaging clients. While the files do not directly flow thro...

DESIGN AND IMPLEMENTATION OF A MEDICAL IMAGING SOFTWARE SYSTEM (CASE STUDY OF PARKLANE ENUGU)

ABSTRACT Imaging System is a collection of hardware and software that work together to capture, store and retrieve images. A sample system includes a scanner, management. This study investigate computer Imaging System in Nigeria Hospital. Ordinary, some doctors use trial and error method in treating patients. As a result, wrong drugs can be prescribed. Also, the manual process of treating internal sickness waste a lot of time and affects the accuracy, effectiveness and competence of the organ...

LOCATION AIDED ROUTING FOR MOBILE AD-HOC NETWORKS (CASE STUDY OF EASY LINK CAFEE)

ABSTRACT A mobile ad hoc network consists of wireless hosts that may move often.   Movement of hosts results in a change in routes, requiring some mechanism for determining new routes.  Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks.  By using location information, the proposed...

JAVA NETWORK FILE SHARING SYSTEM

ABSTRACT We implemented a distributed, peer-to-peer file system in Java using the Chord protocol for efficient location of files stored across a network. Chord is a distributed key lookup technique that scales logarithmically with an increase in the number of storage nodes. Initially, we discovered problems with the Chord algorithms, and prototyped corrections to verify the changes. To implement the file sharing system, a Sockets-based messaging framework was implemented in Java, using comman...

ITP: AN IMAGE TRANSPORT PROTOCOL FOR THE INTERNET

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, but this is overly restrictive for image data. Our analysis shows that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions of an image when they actually arrive. Thus an image is rendered in bursts interspersed with long idle times rather than smoothly. This paper descr...

INVENTORY MANAGEMENT SYSTEM

ABSTRACT Inventory Management System is important to ensure quality control in businesses that handle transactions revolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good Inventory Management System will alert the retailer when it is time to reorder. Inventory Management System is also an important means of automatically tracking large shipments. For example, if a business orders ten pairs of socks for retail re...

INTRUSION DETECTION PREVENTION SYSTEM

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environm...

INTRUSION DETECTION IN WIRELESS AD HOC NETWORK

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environm...

INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEM

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environm...

INTEGRATING SPEECH ENGINE WITH WEB NAVIGATOR

ABSTRACT Integrated speech engine (ISE) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice speaking the text. This project focuses on ISE software tools that use synthesized speech to read any text. There are a wide range of ISE software tools ...

INCREMENTAL DEPLOYMENT SERVICE OF HOP BY HOP MULTICAST ROUTING PROTOCOL (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment of the multicast service by supporting unicast clouds. This paper presents HBH (hop-by-hop multicast routing protocol). HBH adopts the source-specifi...


1516 - 1530 Of 1654 Results