Research Papers/Topics in Computer Science

A Seminar Paper on Internet of Things (IoT)

ABSTRACT Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later as...

RELEVANCE OF DATA MINING IN HEALTHCARE DELIVERY

Tendency for data mining application in healthcare today is great, because healthcare sector is rich with information, and data mining is becoming a necessity. Healthcare organizations produce and collect large volumes of information on daily basis. Use of information technologies allows automatization of processes for extraction of data that help to get interesting knowledge and regularities, which means the elimination of manual tasks and easier extraction of data directly from electronic r...

Electro physiological interactive computer system (epics)

ABSTRACTNew  interactive  computing  applications  are  continually  being  developed  in  a  bidto    support people’s changing work and recreational   activities.   As  research focuses on oneparticular   class   of   interactive   systems,   high   level   models   of   interaction   are   formul...

INDUSTRIAL TRAINING REPORT ON NETWORKING

INDUSTRIAL TRAINING REPORT ON NETWORKING

DNA Computing

Abstract    DNA, the genetic code of life itself has been the molecule of this century and certainly for the next one. The future of DNA manipulation is speed, automation and miniaturization. Perhaps it will not be good enough to play games or surf the web, things traditional computers are good at, but it certainly might be used in the study of logic, encryption, genetic programming and algorithms, automata and lots of other things that haven’t even been invented yet!!  ...

OPEN SOURCE SOFTWARE

Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. ...

SIXTH SENSE TECHNOLOGY

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.

PARASITIC COMPUTING

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard comm...

Use of Network Activity Monitoring System to Solve Problems: Case Study of Benue Internal Revenue Service

ABSTRACTThe research work was conducted with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state by using Network Activity Monitory System. The activity monitoring system was designed, tested and found to achieve the following: It monitored the daily activities of the clients, has a great impact on memory management of the server, Detected active users, Provided accurate evidence on corporate fraud when investigation is being ...

WIRELESS ELECTRICITY

ABSTRACTElectric energy needs to be transported to the distribution lines through cords. One of the major issue in power transmission is the losses occurs during transmission anddistribution process of electrical power due to the energy dissipation in the conductor and equipment used for transmission. As the demand increase day by day, the power generation and power loss are also increased. In addition, the cost of making electricity is harmful to the environment. Reducing tr...

IP SPOOFING: A NETWORK THREAT

ABSTRACTSome history of networking is included, as well as an introduction to TCP/IP and internetworking. We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better un...

INTRUSION DETECTION AND PREVENTION SYSTEM

ABSTRACTAn intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attem...

INVENTORY MANAGEMENT SYSTEM

ABSTRACTInventory Management System is important to ensure quality control in businesses that handle transactions revolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good Inventory Management System will alert the retailer when it is time to reorder. Inventory Management System is also an important means of automatically tracking large shipments. For example, if a business orders ten pairs of socks for retail res...

INTERNET AND EXTRANET IN VIRTUAL PRIVATE NETWORK

ABSTRACTAn extranet extends an intranet by providing various levels of accessibility to authorized members of the public. For example, a corporation may extend their intranet to provide access to specific information, such as their ordering system, to registered customers. The largest and most widely accessed network is the Internet, a worldwide network of computers that is not controlled by any one organization. An intranet is a network that is used by a single organization, such as a corpor...

ISSUES INVOLVED IN UPGRADING A COMPUTER

ABSTRACTThe term upgrade refers to the replacement of a product with a newer version of the same product. It is most often used in computing and consumer electronics, generally meaning a replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics. Contrast update and replace. See also laptop upgrade.Upgrades of software introduce the risk that the new version (or patch) will contain a bug, causing the ...

Need a Professional researcher to work on your project? Click Here to Submit a Writing Request

1 - 15 Of 94 Results