Computer Science Research Papers/Topics

ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE AD HOC

ABSTRACTActive networking is the emerging technology that will provide new network environment where lots of potential applications can be enhanced and developed. Current IP network is somehow good at simple packet forwarding, but it desperately needs some flexibility to support QoS and has to meets some restraint in certain environment. Active packets allow many functionalities with great flexibility, however way too slow for data forwarding. To realize best performance in wireless environme...

DESIGN AND IMPLEMENTATION OF CODE OPTIMIZATION: IMPLEMENTATION OF SCALAR OPTIMIZATION

ABSTRACTOptimization is the process of transforming a piece of code to make more efficient (either in terms of time or space) without changing its output or side-effects. The only difference visible to the code’s user should be that it runs faster and/or consumes less memory. It is really a misnomer that the name implies you are finding an "optimal" solution— in truth, optimization aims to improve, not perfect, the result. Optimization is the field where most compiler research is done...

A NOVEL SECURE COMMUNICATION PROTOCOL FOR ADHOC NETWORK (SCP) (Case Study of Pleasure World Cafe )

ABSTRACTWireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except...

A NEAR-OPTIMAL MULTICAST SCHEME FOR MOBILE ADHOC NETWORK USING GENETIC ALGORITHM

ABSTRACTMulticast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack of redundancy, multiple paths and multicast tree structure. Tree graph optimization problems (GOP) are usually difficult and time consuming NP-hard o...

A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT

ABSTRACTMeasurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the network. The objective of our study is to understand how to measure packet loss episodes accurately with end-to-end probes. We begin by testing the cap...

DESIGN AND IMPLIMENTATION OF TENS UNIT A COMPUTER AIDED SYSTEM FOR MEDICAL DIAGNOSIS AND TREATMENT OF ILLNESS (A CASE STUDY OF UNTH ENUGU)

ABSTRACT Technological trend in recent time’s nit nesses an appreciable decrease in hardware cost, implementation in microchip technology and a boost in the use of micro – computer’s in all ere as of human life. Transcutaneous electrical nerve stimulation unit  (acronym TENS unit) is the use of electric current produced by a device to stimulate the nerves for therapeutic purposes. TENS by definition covers the complete range of transcutaneously applied currents used for nerve excitatio...

UNIFIED INTERFACE FOR MULTIPLE NAMING SERVICE USING JNDI

ABSTRACT InterfaceTM technology (JNDI) provides a unified interface to multiple naming and directory services. As part of the Java enterprise API set, JNDI enables seamless connectivity to heterogeneous enterprise naming and directory services. Developers can now build powerful and portable directory enabled Java applications using this industry-standard interface. The JNDI specification was developed by Sun Microsystems with a number of leading industry partners, including Novell, Netscape,...

TIME SYNCHRONIZATION SYSTEM USING JAVA

ABSTRACT Time synchronization is a critical piece of infrastructure for any distributed system. Distributed, wireless sensor networks make extensive use of synchronized time, but often have unique requirements in the scope, lifetime, and precision of the synchronization achieved, as well as the time and energy required to achieve it. Existing time synchronization methods need to be extended to meet these new needs. We outline the synchronization requirements of future sensor networks and pres...

USING TRIGONOMETRY AND PYTHAGORAS TO WATERMARK AN IMAGE

ABSTRACTThe class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh!...

UTILITIES TO COMPRESS, DECOMPRESS AND SPLIT MERGE FILES

ABSTRACTThough modern larger capacity hard drives are becoming more affordable, they may still not have enough room to store large multimedia files or programs. Compressing such files makes them easier to store and faster to transmit via email or through a website. Even then, if a compressed archive proves too big, it may need to be split into smaller zip files, which must then be joined before the original can be decompressed.Powerful file utility that can handle file compression, decompress...

DESIGN AND IMPLEMENTATION OF A VIDEO STEGANOGRAPHY USING MOBILE SIMULATION

ABSTRACTSteganography is an art of hiding sensitive data or some confidential information in some cover medium file. In this project, video steganography method has been implemented. As name suggest, video steganography means hiding any digital data in video files. The aim of this project is to hide, detect and retrieve the secret message hidden in video frames (images). This application is capable of hiding a text file in any desired frame in the video. It can also create an extra new frame ...

DESIGN AND IMPLEMENTATION OF VIRTUAL CLASSROOM

ABSTRACTVirtual education is a term describing online education using the Internet. This term is used in K-12 schooling, often to refer to cyber schools, and in higher education, where so-called Virtual Universities have been established. A virtual program (or a virtual course of studies) is a study program in which all courses, or at least a significant portion of the courses, are virtual courses, whether in synchronous (i.e. real time) or asynchronous (i.e. self-paced) formats. Virtual cour...

A VIRTUAL PRIVATE NETWORK USING JAVA 9 (A CASE STUDY OF UBA ENUGU)

ABSTRACTA Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private netw...

VISION BASED PROCESSING FOR REAL-TIME 3D DATA ACQUISATION BASED CODE STRUCTURED LIGHT

ABSTRACTThe structured light vision system is a successfully used for the measurement of 3D surface in vision. There is some limitation in the above scheme, that is tens of picture are captured to recover a 3D sense. This paper presents an idea for real-time Acquisition of 3-D surface data by a specially coded vision system. To achieve 3-D measurement for a dynamic scene, the data acquisition must be performed with only a single image. A principle of uniquely color-encoded pattern projection ...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED ERP FOR SMALL BUSINESS (A CASE STUDY OF EMENITE PLC ENUGU)

ABSTRACT  Small and mid-size businesses often have unique requirements for enterprise resource planning software that demand full capabilities without complexity. They also want to see a quick return on investment. Vendors now are stepping up.  The time is ripe for small and mid-size businesses to adopt enterprise resource planning (ERP) applications, according to leading industry analysts. There are more options than ever among the crowded ERP-vendor field targeting the small and mid-size ...


916 - 930 Of 953 Results