Computer Science Research Papers/Topics

SMART KNOWLEDGE PROVIDER

ABSTRACTThe Smart Knowledge Provider and the CAD use a mutual active authentication protocol to identify each other. The card generates a random number and sends it to the CAD, which encrypt the number with a shared encryption key before returning it to the card. The card then compares the returned result with its own encryption. The pair may then perform the operation in reverse. Once communication is established, each message between the pair is verified through a message authentication cod...

STACK IP: NEW PACKET MARKETING AND FILTERING MECHANICS FOR DDOS AND IP SPOOFING DEFENSE

ABSTRACTNetwork administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses, how they are expressed, and the types of unicast addresses assigned to network node interfaces. We demonstrate that the dynamic behavior of queue an...

STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA

ABSTRACTThis paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to take action to contain the attacks appropriately before...

DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND SERVICES APPLICATION WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACTIn our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it.The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among the ...

STEGANOGRAPHY – AN ART OF HIDING DIGITAL INFORMATION

ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your videos and they would never know it had your personal information on it! Or, if you want more privacy when sending e-mails, encrypt a message in a pictu...

TELECOM INVENTORY MAINTENANCE SERVICES APPLICATION WITH ERROR TRACKING

ABSTRACT One of the more popular benefits to outsourcing your maintenance is the ability to improve department focus. Being able to outsource your facility maintenance lets your employees focus more on their higher priority tasks and operational issues. When it comes down to it, facility maintenance should be worry free and reduce stress on both you, your staff, and your company. This is why outsourcing your maintenance also allows your staff to be more efficient and effective while operating...

TEXT TO SPEECH TECHNOLOGY

ABSTRACT Text-to-speech (TTS) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice speaking the text. This project focuses on TTS software tools that use synthesized speech to read any text. There are a wide range of TTS software tools available....

AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY

ABSTRACT Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization. The stronger the cipher -- that is, the harder it is for unauthorized people to break it -- th...

ASP: NET PROJECT TITLES

ABSTRACT Active Server Pages (APS) also known as classic ASP or ASP classic was Microsoft’s first server side script engine for dynamically generated web page initially released as an add-on to internet information services (HS)via the windows NT 4.0 option pack (Ca 1998) of was subsequently included as a free component of windows server (since the initial release of windows component of windows 2000 server. ASP NET has supersede ASP. ASP 2.0 provided six built in object application ASP Err...

APPLICATION OF MOBILE AGENT IN DISTRIBUTED MULTIMEDIA DATABASE SYSTEM

ABSTRACT Multimedia technologies are attracting more and more interest every day. Video-on-Demand is one of the buzzwords today and is now available for the public. Content providers such as publishers, broadcasting companies and audio/video production firms must be able to archive and index their productions for later retrieval. This is a formidable task and it is even more so when the material to be handled encompasses several media types and covers a time span of several years. In order fo...

ANTI-VIRUS

ABSTRACTBringing it to a layman, an Anti-virus can be explained as the cure to virus and viral infections in the computer system. Though virus has been identified to be existing and causing harms in various forms, there are a variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-ca...

APPLICATION AND CHALLENGES OF AN AD HOC NETWORK SYSTEM

ABSTRACT An ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad hoc networks can use ...

APPLICATION OF BILL ACCOUNTING SYSTEM FOR A HOTEL INDUSTRY (CASE STUDY OF HOTEL PRESIDENTIAL)

ABSTRACT The importance of sales accounting is gradually being recognized as germane to prudent management of any business firm.  This has necessitated the need for the computerization of structured operations as the sales managers structured operations are known with certainly for instance, the computation and decisions based on sales ratios. This project therefore is a case study of Presidential Hotel.  It describes the computerization of the sales accounting of the hotel as packaged for...

AN EVALUATION OF MULTIMEDIA SYSTEMS

ABSTRACT The multimedia application user can use sound right off the bat on both the Macintosh and on a multimedia PC running Windows because beeps and warning sounds are available as soon as the operating system is installed. On the Macintosh you can choose one of the several sounds for the system alert. In Windows system sounds are WAV files and they reside in the windowsMedia subdirectory. Sound is perhaps the most important element of multimedia. It is meaningful “speech” in any lang...

AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

ABSTRACTAnti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and...


1576 - 1590 Of 1637 Results