Computer Science Research Papers/Topics

DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND APPLICATION INSTALLER WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among th...

DESIGN AND IMPLEMENTATION OF TCP/IP CHAT CLIENT SERVER OPTION AND CHALLENGES

ABSTRACT In addition to sending messages between users, instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text  messaging. In other words, the technique shown in Figure 2 is always used for file transfers. This peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network. Currently, none of the major instant mes...

DESIGN AND IMPLEMENTATION OF NITC STUDENT INFORMATION SYSTEM (CASE STUDY OF FIRST BANK TRAINING INSTITUTE ENUGU)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of nitc student information system. Almost all our Higher Institution has gone into nitc student information system because of the extraordinary benefit resulting from information technology. Information technology has enabled an online administration system to ...

DESIGN AND IMPLEMENTATION OF STEGANOGRAPHY FOR HIDING DATA IN AUDIO FILM (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. F...

DESIGN AND IMPLEMENTATION OF SPEED SENSOR

ABSTRACT A vehicle Speed Sensor (VSS) is an automotive tachometer that gathers information regarding your wheels' rotational speed. Also known as a wheel speed sensor, this device is comprised of a toothed metal disk and a detector. As the wheels rotate, this sensor creates a magnetic field wherein the pulses that the field generates are then collected and passed on to your car's electronic control module or ECM. TABLE OF CONTENTS CHAPTER ONE 1.0INTRODUCTION 1.1STATEMENT OF THE PROBLEM 1.2...

DESIGN AND IMPLEMENTATION OF SCET INTRANET

ABSTRACT Increasingly, intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in manageme...

DESIGN AND IMPLEMENTATION OF QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORK

ABSTRACT Interest in large-scale sensor networks for both civilian and military applications is burgeoning. The deployment of such networks will require new approaches in resource discovery, query processing and data routing. This paper presents a framework and some analytic results for query satisfaction and data routing in networks consisting of clients, sensors and data filtering/fusion servers. In this model, multiple clients pose queries that are satisfied by processing a set of sensor d...

DESIGN AND IMPLEMENTATION OF COMPUTERIZED PUYO GAME

ABSTRACT The term Puyo game covers a range of computer-based packages, which aim to provide interactive instruction usually in a specific subject area, and many predate the Internet. These can range from sophisticated and expensive commercial packages to applications developed by projects in other educational institutions or national initiatives to simple solutions developed by individuals with no funding or support to tackle a very Interactive Tutor problem. The amount of time and money inve...

DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION

ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability ...

DESIGN AND IMPLEMENTATION OF PROJECT TRACKING AND ITS PORTFOLIO MANAGEMENT SYSTEM

ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...

DESIGN AND IMPLEMENTATION OF A CRIME MANAGEMENT AND TRACKING INFORMATION SYSTEM (A CASE STUDY OF FIIB HEADQUARTERS OGBOR-HILL ABA)

ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...

DESIGN AND IMPLEMENTATION OF PRISON MANAGEMENT SYSTEM (A CASE STUDY PRISON SERVICE COMMISSION ENUGU)

ABSTRACT Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be ...

DESIGN AND IMPLEMENTATION OF PRINCIPLES AND OPERATION OF SENSOR BASED INTRUSION DETECTION SYSTEM (CASE STUDY OF DHL ENUGU)

ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or ...

DESIGN AND IMPLEMENTATION OF PERFORMANCE EVALUATION OF ROUTING ALGORITHM USING NS2 (CASE STUDY OF MTN NIGERIA)

ABSTRACT This project work, is a computerization it Performance evaluation of routing algorithm using  NS2 of an organization.  Full duplex asynchronous data transfer system based on a single-phase two-line coding. (a) Data is transmitted from a primary module PM to a secondary module SM, while data is transmitted from the secondary module SM to the primary module PM independently at the same time. (b) Code words A and B, in which data and color (request signal: ODD or EVEN) are superimpose...

DESIGN AND IMPLEMENTATION OF PARALLEL PROCESSING IMPLEMENTATION OF THE MANDELBROT SET ON GPU FOR ONLINE PAYMENT (CASE STUDY OF IMT ENUGU)

ABSTRACT Current GPUs  have  many times the memory bandwidth and  computing power compared to CPUs.   The  difference in  performance is getting bigger as  the evolution speed  of the GPUs  is higher than of the CPUs. This  make it interesting to use  the GPU  for general purpose computing (GPGPU). I begin  by looking  at the architecture of the GPU,  and  some different techniques for  programming on  a  GPU,  including some  of the available high-  level  languages. �...


796 - 810 Of 953 Results