Research Papers/Topics in Computer Science

DNA Computing

Abstract    DNA, the genetic code of life itself has been the molecule of this century and certainly for the next one. The future of DNA manipulation is speed, automation and miniaturization. Perhaps it will not be good enough to play games or surf the web, things traditional computers are good at, but it certainly might be used in the study of logic, encryption, genetic programming and algorithms, automata and lots of other things that haven’t even been invented yet!!  ...

OPEN SOURCE SOFTWARE

Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. ...

SIXTH SENSE TECHNOLOGY

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.

PARASITIC COMPUTING

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard comm...

Use of Network Activity Monitoring System to Solve Problems: Case Study of Benue Internal Revenue Service

ABSTRACTThe research work was conducted with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state by using Network Activity Monitory System. The activity monitoring system was designed, tested and found to achieve the following: It monitored the daily activities of the clients, has a great impact on memory management of the server, Detected active users, Provided accurate evidence on corporate fraud when investigation is being ...

WIRELESS ELECTRICITY

ABSTRACTElectric energy needs to be transported to the distribution lines through cords. One of the major issue in power transmission is the losses occurs during transmission anddistribution process of electrical power due to the energy dissipation in the conductor and equipment used for transmission. As the demand increase day by day, the power generation and power loss are also increased. In addition, the cost of making electricity is harmful to the environment. Reducing tr...

Using The Computer System In Crime Investigation

ABSTRACTMany traditional crimes are now being aided or abetted through the use ofcomputers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the fo...

USEFULNESS OF AN ENTERPRISE APPLICATION

ABSTRACTEnterprise software describes a collection of computer programs with common business applications, tools for modeling how the entire organization works, and development tools for building applications unique to the organization. The software is intended to solve an enterprise-wide problem (rather than a departmental problem) and often written using an Enterprise Software Architecture. Enterprise level software aims to improve the enterprise's productivity and efficiency by provid...

UNDERSTANDING THE FILE ALLOCATION TABLE [FAT] IN WINDOWS

ABSTRACTThe File Allocation Table of contents of a computer disk which tells what sectors are used for what file. The File Allocation Table ( also know as FAT, FAT16, and FAT32 ), is located in the master boot sector (first 63) of a bootable disk, floppy or hard. You visually cannot see this. The FAT follows the boot sector. The FAT file system revolves around the File Allocation Table for which it is named. Each logical volume has its own FAT, which serves two important functions: it co...

SPEECH RECOGNITION TECHNOLOGY

ABSTRACTSpeech recognition (also known as automatic speech recognition or computer speech recognition) converts spoken words to text. The term "voice recognition" is sometimes used to refer to recognition systems that must be trained to a particular speaker—as is the case for most desktop recognition software. Recognizing the speaker can simplify the task of translating speech. Speech recognition is a broader solution that refers to technology that can recognize speech without being ta...

PROSPECTS OF CLOUD COMPUTING IN NIGERIA

ABSTRACTCloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pr...

RAID TECHNOLOGY

ABSTRACTRAID is now used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple physical drives. The physical drives are said to be in a RAID, which is accessed by the operating system as one single drive. The different schemes or architectures are named by the word RAID followed by a number (e.g., RAID 0, RAID 1). Each scheme provides a different balance between two key goals: increase data reliability and increase input/output performance.RAI...

PARASITIC COMPUTING

ABSTRACTParasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.The example given can also be two computers communicating over the Internet, under disguise of a standard communications sessi...

ORGANISATION CHART OF AN INFORMATION DEPARTMENTS AND ITS FUNCTIONS

ABSTRACTAn organizational chart consists of activities such as task allocation, coordination and supervision, which are directed towards the achievement of organizational aims. It can also be considered as the viewing glass or perspective through which individuals see their organization and its environment. Most organizations have hierarchical charts, but not all. Organizations are a variant of clustered entities. An organization can be structured in many different ways, depending o...


1 - 15 Of 90 Results