Computer Science Research Papers/Topics

FACTORS AFFECTING THE SPEED OF INTERNET ACCESS

ABSTRACT Today’s crucial information networks are vulnerable to fast-moving attacks by Internet worms and computer viruses. These attacks have the potential to cripple the Internet and compromise the integrity of the data on the end-user machines. Without new types of protection, the Internet remains susceptible to the assault of increasingly aggressive attacks. A platform has been implemented that actively detects and blocks worms and viruses at multi-Gigabit/second rates. It uses the...

FLAT FILE DATABASE SYSTEM VS RELATIONAL DATABASE SYSTEM

ABSTRACT Determining the type of database to be deployed for a project is a combination of access requirements and preference. In an effort to make an informed decision on which to deploy, the application engineer should be familiar with the types of databases as well as the pros/cons of each. In this entry we will consider two general types of databases and explore some of their applications and key points in the decision cycle when faced with a project. A "flat file" database allows the use...

HOW TO IMPROVE SECURITY ELECTRONIC VOTING

ABSTRACT The on-line voting system ensures that each intended voter is checked whether he/she is registered or not, if he/she is not registered, the system refuses him voting.  Also it checks whether he/she has voted for that particular election.  This on-line voting system prevents a situation where a particular candidate seizes the voters’ cards, and uses them to vote for himself.  Hence the rigging associated with the manual voting systems has been completely handled.  The syste...

I-CLOUD TECHNOLOGY AND APPLICATION

ABSTRACT Cloud technology provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallels to this concept can be drawn with the electricity grid, wherein end-users consume power without needing to understand the component devices or infrastructure required to provide the service. Cloud technology describes a new supplement, consumption, and delivery model for...

IMAGE PROCESSING AND ITS APPLICATIONS

ABSTRACT In electrical engineering and computer science, image processing is any form of signal processing for which the input is an image, such as a photograph or video frame; the output of image processing may be either an image or, a set of characteristics or parameters related to the image. Most image-processing techniques involve treating the image as a two-dimensional signal and applying standard signal-processing techniques to it. Image processing usually refers to digital image proces...

INDUSTRIAL APPLICATION USING NEURAL NETWORKS

ABSTRACT Neural networks have emerged as a field of study within AI and engineering via the collaborative efforts of engineers, physicists, mathematicians, computer scientists, and neuroscientists. Although the strands of research are many, there is a basic underlying focus on pattern recognition and pattern generation, embedded within an overall focus on network architectures. Many neural network methods can be viewed as generalizations of classical pattern-oriented techniques in statistics...

INTERNET AND EXTRANET IN VIRTUAL PRIVATE NETWORK

ABSTRACT An extranet extends an intranet by providing various levels of accessibility to authorized members of the public. For example, a corporation may extend their intranet to provide access to specific information, such as their ordering system, to registered customers. The largest and most widely accessed network is the Internet, a worldwide network of computers that is not controlled by any one organization. An intranet is a network that is used by a single organization, such as a corpo...

INTRUSION DETECTION AND PREVENTION SYSTEM

ABSTRACT An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting atte...

INVENTORY MANAGEMENT SYSTEM

ABSTRACT Inventory Management System is important to ensure quality control in businesses that handle transactions revolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good Inventory Management System will alert the retailer when it is time to reorder. Inventory Management System is also an important means of automatically tracking large shipments. For example, if a business orders ten pairs of socks for retail re...

IP SPOOFING: A NETWORK THREAT

ABSTRACT Some history of networking is included, as well as an introduction to TCP/IP and internetworking. We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better understand how to red...

ISSUES INVOLVED IN UPGRADING A COMPUTER

ABSTRACT The term upgrade refers to the replacement of a product with a newer version of the same product. It is most often used in computing and consumer electronics, generally meaning a replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics. Contrast update and replace. See also laptop upgrade. Upgrades of software introduce the risk that the new version (or patch) will contain a bug, causing th...

MESH TOPOLOGY: ITS PRINCIPLES, MERITS AND SETBACKS

ABSTRACT A mesh network topology can be seen as a special type of wireless ad-hoc network. A mesh network topology often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area. An ad-hoc network, on the other hand, is formed ad hoc when wireless devices come within communication range of each other. The mesh routers may be mobile, and be moved according to specific demands arising in the network. Often the mesh r...

MODUS OPERANDI OF SEARCH ENGINES

ABSTRACT A web search engine is designed to search for information on the World Wide Web and FTP servers. The search results are generally presented in a list of results often referred to as SERPS, or "search engine results pages". The information may consist of web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained by human editors, search engines operate algorithmica...

MULTIMEDIA CONFERENCING

ABSTRACT In this seminar, we use the term “multimedia conferencing†instead of videoconferencing because the systems discussed in this section integrate multiple media formats into one system, not just video. The multimedia conferencing market is believed to be one of the key markets within the multimedia market segment. Recent developments in multimedia systems and networking technology show that using desktop multimedia conferencing for group decision-making on WANs such as the In...

NETWORK TECHNOLOGIES IN DISTANCE LEARNING

ABSTRACT Distance learning is an excellent method of reaching the adult learner. Because of the competing priorities of work, home, and school, adult learners desire a high degree of flexibility. The structure of distance learning gives adults the greatest possible control over the time, place and pace of education; however, it is not without problems. Loss of student motivation due to the lack of face-to-face contact with teachers and peers, potentially prohibitive startup costs, and lack of...


46 - 60 Of 113 Results