Computer Science Research Papers/Topics

DESIGN AND IMPLEMENTATION OF VIDEO AND PHOTO EDITING

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of a video and photo editing. Many video organizations have gone into video and photo editing because of the extraordinary benefit resulting from information technology. Information technology has enabled a video and photo editing to work successfully. With this...

DESIGN AND IMPLEMENTATION OF TEXT EDITOR FOR LINUX PLAT FORM (CASE STUDY OF LINUX)

ABSTRACT Kate is the default text editor in linux, and also one of the most powerful and feature-rich text editors available for Linux. It can also be used successfully as an IDE (integrated development environment) and supports, among many others, spell-checking, highlighting for a huge amount of programming languages, it has an integrated terminal (which inherits Konsole's settings), encoding support. It supports sessions, plugins, encodings, bookmarks and even the possibility to split the ...

DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND APPLICATION INSTALLER WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless (paralyzed).countries all over the world has communication industry whose duty it is to acquire communication services and distribute it equally among th...

DESIGN AND IMPLEMENTATION OF TCP/IP CHAT CLIENT SERVER OPTION AND CHALLENGES

ABSTRACT In addition to sending messages between users, instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text  messaging. In other words, the technique shown in Figure 2 is always used for file transfers. This peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network. Currently, none of the major instant mes...

DESIGN AND IMPLEMENTATION OF NITC STUDENT INFORMATION SYSTEM (CASE STUDY OF FIRST BANK TRAINING INSTITUTE ENUGU)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of nitc student information system. Almost all our Higher Institution has gone into nitc student information system because of the extraordinary benefit resulting from information technology. Information technology has enabled an online administration system to ...

DESIGN AND IMPLEMENTATION OF STEGANOGRAPHY FOR HIDING DATA IN AUDIO FILM (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available. As privacy concerns continue to develop along with the digital communication domain, steganography will undoubtedly play a growing role in society. F...

DESIGN AND IMPLEMENTATION OF SPEED SENSOR

ABSTRACT A vehicle Speed Sensor (VSS) is an automotive tachometer that gathers information regarding your wheels' rotational speed. Also known as a wheel speed sensor, this device is comprised of a toothed metal disk and a detector. As the wheels rotate, this sensor creates a magnetic field wherein the pulses that the field generates are then collected and passed on to your car's electronic control module or ECM. TABLE OF CONTENTS CHAPTER ONE 1.0INTRODUCTION 1.1STATEMENT OF THE PROBLEM 1.2...

DESIGN AND IMPLEMENTATION OF SCET INTRANET

ABSTRACT Increasingly, intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in manageme...

DESIGN AND IMPLEMENTATION OF QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORK

ABSTRACT Interest in large-scale sensor networks for both civilian and military applications is burgeoning. The deployment of such networks will require new approaches in resource discovery, query processing and data routing. This paper presents a framework and some analytic results for query satisfaction and data routing in networks consisting of clients, sensors and data filtering/fusion servers. In this model, multiple clients pose queries that are satisfied by processing a set of sensor d...

DESIGN AND IMPLEMENTATION OF COMPUTERIZED PUYO GAME

ABSTRACT The term Puyo game covers a range of computer-based packages, which aim to provide interactive instruction usually in a specific subject area, and many predate the Internet. These can range from sophisticated and expensive commercial packages to applications developed by projects in other educational institutions or national initiatives to simple solutions developed by individuals with no funding or support to tackle a very Interactive Tutor problem. The amount of time and money inve...

DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION

ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream endpoints. The fingerprint scrubber restricts an attacker's ability ...

DESIGN AND IMPLEMENTATION OF PROJECT TRACKING AND ITS PORTFOLIO MANAGEMENT SYSTEM

ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...

DESIGN AND IMPLEMENTATION OF A CRIME MANAGEMENT AND TRACKING INFORMATION SYSTEM (A CASE STUDY OF FIIB HEADQUARTERS OGBOR-HILL ABA)

ABSTRACT Tracking system has been used since 1985, linking seemingly unrelated violent crime investigations and helping state and local law enforcement solve cases. This powerful and easy to use electronic case management software is designed to assist investigators in managing files from initial incident to court disclosure. The software features include: incident capture, case management, task management, disclosure management, access control, system and officer generated link analysis char...

DESIGN AND IMPLEMENTATION OF PRISON MANAGEMENT SYSTEM (A CASE STUDY PRISON SERVICE COMMISSION ENUGU)

ABSTRACT Prison information system is used to process various information as pertains to prison. Prison, institution designed to securely house people who have been convicted of crimes. These individuals, known as prisoners or inmates, are kept in continuous custody on a long-term basis. Individuals who commit the most serious crimes are sent to prison for one or more years; the more serious the offense, the longer the prison term imposed. For certain crimes, such as murder, offenders may be ...

DESIGN AND IMPLEMENTATION OF PRINCIPLES AND OPERATION OF SENSOR BASED INTRUSION DETECTION SYSTEM (CASE STUDY OF DHL ENUGU)

ABSTRACT This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or ...


1486 - 1500 Of 1654 Results