Computer Science Research Papers/Topics

DESIGN AND IMPLEMENTATION OF ONLINE JOB CONSULTANCY SERVICES (CASE STUDY OF CAREERS NIGERIA)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of an online job consultancy services. Almost all our Companies have gone into online job consultancy services because of the extraordinary benefit resulting from information technology. Information technology has enabled an online job consultancy services to wo...

DESIGN AND IMPLEMENTATION OF ONLINE BANKING SYSTEM (A CASE STUDY OF ALL STATES TRUST BANK PLC ENUGU)

ABSTRACT This project work is concerned with the use of the online banking operations, a case study of the All State Trust Bank Plc Enugu. The Electronic in acts over evolving state is becoming a serious method of business communication and data transfer worldwide.  As such banks and other financial institutions are beginning to use the Electronic database as new vehicle for doing business.  The Electronic database allows banks to offer both new services and level of convenience for existin...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED HOMEOPATHIC MANAGEMENT SYSTEM (A CASE STUDY OF UNIVERSITY OF NIGERIA TEACHING HOSPITAL ENUGU STATE)

ABSTRACT This work provide a basic introduction on the use of computer in medical practice and is aimed at computerized Homeopathic management system and its related processes at THE UNIVERSITY OF NIGERIA TEACHING HOSPITAL ENUGU. It also identifies the procedure, process and tasks involved in the installing a computerized diagnostic system in the establishment which is operating a full manual system and the impact of such shift. The problem of efficiency, effectiveness and scientific methods ...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED PHARMACY MANAGEMENT SYSTEM ( CASE STUDY OF JUHEL PHARMACEUTICALS LTD, ENUGU)

ABSTRACT This project is written to help Pharmaceuticals Companies especially Jahel Pharmaceuticals ltd Enugu in the areas they encounter problems in keeping their record and the solution given to tackle those problem. The research was carried out of many difficulties such as time factors, money and inability to get much information that could have been of help. But still with all those the researcher came up with something readable and valuable to any body that goes through it.   TABLE OF C...

PERSONAL AUTHENTICATION USING 3-D FINGER GEOMETRY

ABSTRACT In this project, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on the environment and the placement of the hand, and this greatly contributes to the unobtrusiveness of the system. Efficient, close to real-time algorithms...

PERFORMANCE EVALUATION DISTANCE ROUTING ALGORITHM IN MANET

ABSTRACT A mobile ad-hoc network (MANET) consists of wireless mobile hosts (nodes) that communicate with each other over wireless link, in the absence of a fixed infrastructure. Routes between two hosts in MANET may consists of hops through other hosts in the network, due to the limitation of broadcasting range of each host Movement of hosts results in a change of routes. Therefore various algorithms, to find  & maintain routes in MANET is difficult and important task for efficient routing, ...

PEER TO PEER MESSAGING SYSTEM USING JXTA

ABSTRACT Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Pe...

PEER TO PEER MESSAGING

ABSTRACT Peer to peer messaging is a simple information dissemination platform that is supported by a protocol which is based on pairs of request/response PDUs (protocol data units, or packets) exchanged over OSI layer 4 (TCP session or X.25 SVC3) connections. PDUs are binary encoded for efficiency. Data exchange may be synchronous, where each peer waits for a response for each PDU being sent, and asynchronous, where multiple requests can be issued without waiting and acknowledged in a skew o...

OPTIMAL MULTICAST ROUTING IN MOBILE AD HOC NETWORK

ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack of redundancy, multiple paths and multicast tree structure. Tree graph optimization problems (GOP) are usually difficult and time consuming NP-hard ...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED PROPERTY MANAGEMENT SYSTEM (A CASE STUDY OF ENUGU NORTH LOCAL GOVERNMENT AREA)

ABSTRACT This project lays emphasis on the contribution a computerized property management system in Enugu North Local Government Area and how the computer can be programmed to record property management system and computations so as to eliminate the abuse and fraudulent activities associated with manual methods of property management system. The study of this project is to design a new system that will be more efficient and will provide timely information and a special data input or enquiry....

PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)

ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream end-points. The fingerprint scrubber restricts an attacker's ...

PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSIONS

ABSTRACT The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach impos...

DESIGN AND IMPLEMENTATION OF A PROTOCOL SEQUENCER AND SUBSYSTEM INTERFACE: ADMINISTRATOR TOOL WHICH WILL MONITOR APPLICATION ON A LAN PROVIDE FUNCTIONS (CASE STUDY OF NETWORKING TRAINING)

ABSTRACT A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) o...

QUIEVE: CONSISTENT OBJECT SHARING FOR EDGE SERVICE

ABSTRACT We present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These migrations dramatically improve performance when operations involving an object exhibit geographic locality, since migrating this object into the vicinity o...

READING AND WRITING AVI FILE USING STEGANOGRAPHY

ABSTRACT The video stream in an AVI file is nothing more than a sequence of bitmaps. This article is about extracting these bitmaps and re-building the stream, in order to hide a message in the video. Before reading this article, you should have read at least part one, Steganography - Hiding messages in the Noise of a Picture. This one uses the application described in parts 1-3, but you don’t need the extended features to understand it.  TABLE OF CONTENTS Title page Certification Approva...


871 - 885 Of 953 Results