Natural & Applied Sciences

Research Papers/Topics in Natural & Applied Sciences

DESIGN AND IMPLEMENTATION OF DATA AND VIDEO STREAMING SYSTEM

ABSTRACTStreaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a streaming provider. The name refers to the delivery method of the medium rather than to the medium itself. The distinction is usually applied to media that are distributed over telecommunications networks, as most other delivery systems are either inherently streaming (e.g., radio, television) or inherently non-streaming (e.g., books, video cassettes, audio CDs). The ve...

DESIGN AND SIMULATION OF CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL

ABSTRACTOn-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology changes are unpredictable. In this paper, we propose proactively disseminating the broken link information to the nodes that have that link in their ca...

DESIGNING AND IMPLEMENTING A TRANSACTING SYSTEM OR AN ATM MACHINE. A CASE STUDY OF ECO BANK PLC, OBOSI ONICHA)

ABSTRACTThis project is aimed at designing and implementing a transacting system or an ATM machine for Eco Bank Plc, Obosi Onicha. Specially, this study covered the activities of financial institutions in mobilizing cash payments and given the larger part of it to customers who wish to do their cash transactions electronically in Eco bank Obosi Onitsha. In a bid to successfully carry out a transaction receipt generating system  for an ATM  machine with a view of finding out its shor...

XTC: AN ACTIVE VIRTUAL QUEUE (AVQ) ALGORITHM FOR ACTIVE QUEUE MANAGEMENT

ABSTRACTVirtual Queue-based marking schemes have been recently proposed for AQM (Active Queue Management) in Internet routers. We consider a particular scheme, which we call the Adaptive Virtual Queue (AVQ), and study its following properties: stability in the presence of feedback delays, its ability to maintain small queue lengths and its robustness in the presence of extremely short flows (the so-called web mice). Using a linearized model of the system dynamics, we present a simple rule to ...

DESIGN AND SIMULATION OF PROBABILISTIC TECHNIQUES FOR CACHE REPLACEMENT

ABSTRACTWe analyze a class of randomized Least-Recently-Used (LRU) cache replacement algorithms under the independent reference model with generalized Zipf’s law request probabilities. The randomization was recently proposed for Web caching as a mechanism that discriminates between different document sizes. In particular, a requested document that is not found in the cache either replaces a necessary number of least recently used documents with probability depending on its size or the cache...

DESIGN AND IMPLEMENTATION OF A VIRTUAL E-LEARNING SYSTEM (A Case Study of Lagos State University)

ABSTRACTThe demand to acquire knowledge or to learn has rise, thus, the present technology had gone a long way to provided means to learn, irrespective of the distance or the location of the E-learner and source of information. This is achieved through electronic sharing of information and virtual classroom. However, virtual classroom and text based e- learning is a system design to help student gain access and acquire knowledge in any university of their choice. This method of learning will ...

AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

ABSTRACTAnti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and...

DIGITAL WATER MARKING FOR VIDEO PIRACY

ABSTRACTDigital watermarking is the process by which identifying data is woven into media content such as images, movies, music or programming, giving those objects a unique, digital identity that can be used for a variety of valuable applications. Imperceptible to the human senses yet easily recognized by special software detectors, a digital watermark remains constant even through recording, manipulation and editing, compression and decompression, encryption, decryption and broadcast withou...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED ANTENATAL INFORAMTION SYSTEM

ABSTRACTThe Antenatal unit in the outpatient Department of any hospital letters for medical advices and treatments to payment mothers before delivery. Antenatal care is all about material and fetal care, to see that the baby is developing without malformation and giving mothers advice an what to eat, type of exercise needed scanning and pathology rest. This project work tends to design and implement a system (computerized) that offers information on Antenatal care as of when due (Just-in-time...

DESIGN AND IMPLEMENTATION OF AN ACADEMIC INFORMATION SYSTEM USING RELATIONAL DATABASE AND HTTP SEVER (A CASE STUDY OF FEDERAL POLYTECHNIC NEKEDE, OWERRI)

ABSTRACTIn our today activities, most people have some kind of “database” collections of CDs, students’ academic entries, a phonebook of phone numbers and name entries, vehicles parts, records to be processed by a program. With a bit more precision, the term database means a logically coherent collection of related data with inherent meaning, built for a certain application and representing a “mini-word”. A database management system (DBMS) is the software that allows database to be...

AN EVALUATION OF MULTIMEDIA SYSTEMS

ABSTRACTThe multimedia application user can use sound right off the bat on both the Macintosh and on a multimedia PC running Windows because beeps and warning sounds are available as soon as the operating system is installed. On the Macintosh you can choose one of the several sounds for the system alert. In Windows system sounds are WAV files and they reside in the windows\Media subdirectory. Sound is perhaps the most important element of multimedia. It is meaningful “speech” in any langu...

DISTRIBUTED CHANNEL MANAGEMENT SYSTEM

ABSTRACTWireless hotspots are typically implemented using 802.11 APs. Each AP typically operates on a single, administrator-configured wireless channel. Each client associates with a single AP and subsequently interacts with this AP alone, on the AP’s configured channel. As a basic design rule, APs within radio frequency (RF) range of each other are set to different ‘non-overlapping’ channels. Proper assignment of channels to APs is important so that the network can take full advantage ...

DESIGN AND IMPLEMENTATION OF AN EXPERT MANAGEMENT SYSTEM FOR AUTOMOBILE FAULT DETECTION.

ABSTRACTThis project deals with the design and implementation of an expert system for car faults diagnosis. The project is motivated by the need to guide car owners and learners motor mechanics in the maintenance and trouble shooting of motor problems without having to resort to presumptions and conjectures. Particularly, it is expected that the proposed design would ensure that car owners have proper assistance in times of crisis and what’s more will save them from the clutches of exploita...

APPLICATION OF BILL ACCOUNTING SYSTEM FOR A HOTEL INDUSTRY (CASE STUDY OF HOTEL PRESIDENTIAL)

ABSTRACTThe importance of sales accounting is gradually being recognized as germane to prudent management of any business firm.  This has necessitated the need for the computerization of structured operations as the sales managers structured operations are known with certainly for instance, the computation and decisions based on sales ratios. This project therefore is a case study of Presidential Hotel.  It describes the computerization of the sales accounting of the hotel as packa...

DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOL FOR DYNAMIC PEER GROUP

ABSTRACTWe consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic natur...


1426 - 1440 Of 1833 Results