Computer Science Research Papers/Topics

WEB BASE PROXY SERVER AN OVERVIEWED OF ISSUES AND PROSPECTS

ABSTRACT In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is ...

DESIGN AND IMPLEMENTATION OF WAP ENABLE GREETING CARD SYSTEM –WAPENABLE DEVICE USER TO SEND GREETING CARD TO OTHER WAP ENABLE DEVICE

ABSTRACT Sending e-cards via email is becoming increasingly common. Here we create a WAP-enabled greeting card system called WAP Reetings, which allows WAP-enabled device users to send greeting cards to other WAP users. Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones (called "cellular phones" in some countries) that uses the protocol. The Wireless Appli...

DESIGN AND IMPLEMENTATION OF WALLPAPER CHANGER UTILITY

ABSTRACT WallMaster inherits the basic key features of its commercial brother, WallMaster Pro. You can program the desktop wallpaper to change at a predetermined time interval (e.g. every 10 minutes) and customize the wallpaper position (tile, center, fit to screen, auto fit, or custom) easily. With all its cool and unique features packed within a simple easy-to-use interface, mastering your desktop wallpaper has never been this easy and fast! TABLE OF CONTENT TITLE PAGE CERTIFICATION APPROV...

DESIGN AND IMPLEMENTATION OF VOICE ORGANIZATION (A CASE STUDY OF NOKIA)

ABSTRACT Voice based xml is the name of a technology standard developed and managed by the Voice based xml Forum (www.voice based xml.org). It builds upon the work of earlier technologies such as VoXML from Motorola and SpeechML from IBM to create a standardized way to interact with services through a voice interface. Not surprisingly, this technology is XML-based. The Voice based xml Forum was founded by AT&T, Lucent Technologies, Motorola, and IBM with the "aim to drive the market for voice...

DESIGN AND IMPLEMENTATION OF VIDEO AND PHOTO EDITING

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of a video and photo editing. Many video organizations have gone into video and photo editing because of the extraordinary benefit resulting from information technology. Information technology has enabled a video and photo editing to work successfully. With this...

DESIGN AND IMPLEMENTATION OF TEXT EDITOR FOR LINUX PLAT FORM (CASE STUDY OF LINUX)

ABSTRACT Kate is the default text editor in linux, and also one of the most powerful and feature-rich text editors available for Linux. It can also be used successfully as an IDE (integrated development environment) and supports, among many others, spell-checking, highlighting for a huge amount of programming languages, it has an integrated terminal (which inherits Konsole's settings), encoding support. It supports sessions, plugins, encodings, bookmarks and even the possibility to split the ...

DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND APPLICATION INSTALLER WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among th...

DESIGN AND IMPLEMENTATION OF TCP/IP CHAT CLIENT SERVER OPTION AND CHALLENGES

ABSTRACT In addition to sending messages between users, instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text  messaging. In other words, the technique shown in Figure 2 is always used for file transfers. This peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network. Currently, none of the major instant mes...

DESIGN AND IMPLEMENTATION OF NITC STUDENT INFORMATION SYSTEM (CASE STUDY OF FIRST BANK TRAINING INSTITUTE ENUGU)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of nitc student information system. Almost all our Higher Institution has gone into nitc student information system because of the extraordinary benefit resulting from information technology. Information technology has enabled an online administration system to ...

DESIGN AND IMPLEMENTATION OF STEGANOGRAPHY FOR HIDING DATA IN AUDIO FILM (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. F...

DESIGN AND IMPLEMENTATION OF SPEED SENSOR

ABSTRACT A vehicle Speed Sensor (VSS) is an automotive tachometer that gathers information regarding your wheels' rotational speed. Also known as a wheel speed sensor, this device is comprised of a toothed metal disk and a detector. As the wheels rotate, this sensor creates a magnetic field wherein the pulses that the field generates are then collected and passed on to your car's electronic control module or ECM. TABLE OF CONTENTS CHAPTER ONE 1.0INTRODUCTION 1.1STATEMENT OF THE PROBLEM 1.2...

DESIGN AND IMPLEMENTATION OF SCET INTRANET

ABSTRACT Increasingly, intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in manageme...

DESIGN AND IMPLEMENTATION OF QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORK

ABSTRACT Interest in large-scale sensor networks for both civilian and military applications is burgeoning. The deployment of such networks will require new approaches in resource discovery, query processing and data routing. This paper presents a framework and some analytic results for query satisfaction and data routing in networks consisting of clients, sensors and data filtering/fusion servers. In this model, multiple clients pose queries that are satisfied by processing a set of sensor d...

DESIGN AND IMPLEMENTATION OF COMPUTERIZED PUYO GAME

ABSTRACT The term Puyo game covers a range of computer-based packages, which aim to provide interactive instruction usually in a specific subject area, and many predate the Internet. These can range from sophisticated and expensive commercial packages to applications developed by projects in other educational institutions or national initiatives to simple solutions developed by individuals with no funding or support to tackle a very Interactive Tutor problem. The amount of time and money inve...

DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION

ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability ...


1471 - 1485 Of 1643 Results