Computer Science Research Papers/Topics

MOBILE TELECOMMUNICATION BASE STATIONS MONITORING SYSTEM

ABSTRACT With the technological advancement in wireless communications, the industry demands better and more reliable technology for transmission equipment. One of the most important requirements for the wireless communications industry is to manage base stations effectively for communication purpose. In order to provide the best transmission service to customers, base stations have to be spread over a large area. A large network of base stations requires a secured, stable and effective mana...

SIMULATION OF A NETWORK MONITORING SYSTEM

ABSTRACT This project topic “Simulation of a Network Monitoring System” was carried out with a view to deploying effective monitoring for computers in a local Area Network. The project developed a system that lets administrators remotely monitor computers in a network. Our aim is to show how user interface can be applied to provide a complete solution for monitoring networks. Securing and  monitoring a network is an important issue since computers connected in a network can be faulty a...

CRYPTOGRAPHY IN INFORMATION TECHNOLOGY

ABSTRACTCryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerc...

IMPORTANCE OF COMPUTER IN AUTOMOBILE MANUFACURING

ABSTRACT It is not uncommon nowadays to see computers entrusted with functions upon which human life are dependent, examples of such functions are embedded computers in heart pace-makers, anti-lock braking systems in cars, and fly-by-wire flight control systems for civil airliners. In recent times, the manufacturing industry has witnessed remarkable modernization in technology as well as the adoption of information technology and computer science on a massive scale. Automobile design and man...

SEMINAR PRESENTATION ON CARNIVORE SOFTWARE

ABSTRACT A carnivore is controversial program that is developed by the Federal Bureau of Investigation in US (United State) by which they are able to access the email activities of the person suspected. It was the third generation software of online detection. The FBI (Federal Bureau of Investigation) uses to configure the hardware with IP (Internet Protocol) address of software through which carnivore captures packets from a particular location. A carnivore is used to work on a phenomena of ...

DESIGN AND IMPLEMENTATION OF E-LEARNING SYSTEM

ABSTRACT The project critically looks into the design and implementation of an e-Learning system for Lagos State Polytechnic, Nigeria. The project discussed various kinds of e-Learning platforms such as teleconferencing, virtual reality and video-conferencing. It also addresses the impact of resource materials on the design and implementation of e-Learning platform as well as the awareness creation of the technology. At the end, the system was able to complement the various activities in the...

ANALYSIS OF ONLINE EXAMINATION REGISTRATION SYSTEM

ABSTRACT The process of examination pre-registration is aimed to obtain accurate information on the intended candidates individually and collectively. These information are used to make a multitude of decisions such as the nature and structure of examination questions, categories and number of expected candidates, and other information which might be personal such as bio information. Unless a sufficiently accurate and efficient methods are used for  the data collection,  the data retr...

Java Ring Technology

Abstract A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem´s Java Ring was introduced at their Java One Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor. Workstations at t...

SURVEY OF WIRELESS POWER TRANSFER TECHNIQUES IN CHARGING MOBILE DEVICES

ABSTRACT Wireless power transmission is the transmission of electrical energy from one point to another without using any conductor or wire through vacuum or atmosphere. It is useful to transfer electrical energy to those places where it is hard to transmit energy using conventional wires. The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been mad...

DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language. For the first few decades of their existence, computer networks were primarily used b...

Design and implementation of a point of sales system

ABSTRACT The global community especially the technologically advanced world is striving to attain what has been the global information age. It is an age that is envisaged to go beyond the use of computers as a mere tool for fast information processing, rather they will also become medium for processing and transferring such information from one location to another at equal fast rate. As a result, its appalling that sales in developing country like Nigeria have not been able to benefit much fr...

Computer and its Architecture

Computer Architecture Computer technology has made incredible progress in the throughly 60 years since the first general-purpose electronic computer was created. Today, less than $500 will purchase a personal computer that has more performance, more main memory, and more disk storage than a computer bought in 1985 for 1 million dollars. This rapid improvement has come both from advances in the technology used to build computers and from innovation in computer design. Although technological i...

AUTOMATION OF LAW FIRM

ABSTRACTThe need for automated method of keeping data is very vital. So many software's has been developed to solve this problem but to no avail. These software has been analyzed and discovered that very many of them are inefficient. Researchers have developed their own software but they could not give or develop error free software that will assist in report generation, automated client/matter saving to keep or build a database of matters in the firm. To bridge this gap or solve this ...

DESIGN AND IMPLEMENTATION OF COMPUTERISED TOURISM INFORMATION SYSTEM (CASE STUDY OF OWERRI IN IMO STATE)

ABSTRACT The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names and activities of the of tourism destination in owerri. This system computerizes tourism into a database that is stored permanently and updated through stored procedures. What motivated me to design th...

AUTOMATED DATABASE SYSTEM FOR GOVERNMENT ESTABLISHMENT (A CASE STUDY OF PHCN)

ABSTRACT The problem which always emanate from inadequate personnel information maintenance and management has been a torn in the flesh of the entire Nigerian society, Enugu state precisely.  In other to proffer solution to the existing problems, the project work researched into the modus operandi of personnel database management system of Enugu state. In the process of analysis of the existing system were detected, carefully analyzed and possible solution to the problems were proffered in t...


1246 - 1260 Of 1645 Results