Computer Science Research Papers/Topics

DESIGN AND IMPLEMENTATION OF HTML EDITOR (CASE STUDY OF MICROSOFT CORPORATION)

ABSTRACT A HTML editor is an authoring software program that is used to create content for web sites. HTML software is easy to use since it has a feature that is known as WYSIWYG. When you design web pages you want to use editor features that are simple to understand. You can buy and download HTML management software from the Internet as well as templates that will help you create web pages for your business or personal use. There are many advantages to you when you use editing software to de...

HIDING MESSAGE IN THE NOISE OF A PICTURE

ABSTRACT Text encryption software to hide and encrypt data within a picture undetectable to others! This software allows you to hide text messages within a picture! You can use this software to store personal information, financial details and so forth embedded within a picture, and password protect! So you could even give someone a copy of your videos and they would never know it had your personal information on it! Or, if you want more privacy when sending e-mails, encrypt a message in a pi...

GENETIC ALGORITHM BASED TRAIN SIMULATION USING CONCURRENT ENGINEERING

ABSTRACT To control the traffic during the data transmission with out any loss of packets using genetic algorithm. In this the packets are transferred by frames using mac layer. So Error correction can be easily done. Genetic algorithm based train simulation using concurrent engineering” control over a single wired lane network, the project proposes a technique to transfer the data from one place to another without traffic. The main aim of project is to control over traffic in a single wire...

GENETIC ALGORITHM AND TRAVELLING SALESMEN PROBLEM USING C# AND ATL COM

ABSTRACT This project is about an application used by the travelling salesman, given a finite number of “cities” (I have choosen cities from 1 to a finite number) along with the distance of travel (distance between two cities is randomly choosen) between each pair of them the aim is to find the cheapest distance of visiting all the cities and returning to the starting point. using GA we can get an optimal solution to solve this problem. This is only an example to look at calling COM compo...

FUZZY CONTROL MODEL OPTIMIZATION FOR BEHAVIOR-CONSISTENT TRAFFIC ROUTING UNDER INFORMATION PROVISION

ABSTRACT This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behavior-consistent (BC) information-based control strategies to improve the performance of congested dynamic traffic networks. By adjusting the associated membership function parameters to better respond to nonlinearities and modeling errors, the approach is able to enhance the computational performance of the fuzzy control model. Computational efficiency is an important aspect i...

FIND AND REPLACE UTILITY

ABSTRACT How many times have you run into situations where you need to find-and-replace HTML content across a large web site? For example, you need to swap out headers and footers with SSIs (server side includes) on a large static web site for better maintainability. Or you need to find a header image across a site and replace it with another header image. One of my favorite tools for this task is Dreamweaver's Find and Replace utility. The GUI (graphical user interface) interface is simple t...

EXTRACTING DATA FROM PUBLISHED GRAPHS

ABSTRACT Published graphs in digital documents contain important information. Often, the results of scientific experiments and performance of businesses are summarized using plots. Although graphs are easily understood by human users, current search engines rarely utilize the information contained in the plots to enhance the results returned in response to queries posed by end users. We propose an automated algorithm for extracting information from line curves in graphs. The extracted infor...

DESIGN AND IMPLEMENTATION OF EXAMINATION RESULT ACCORDING TO CLASSES (CASE STUDY OF IMT ENUGU)

ABSTRACT This study was carried out to verify all the manual process involved in generating students examination Result and to seek a way of automating the system for effective operations. Since there is continuous moves towards technological advances that enhanced productivity of labour and free human beings of task more economically by machines. Computer and its appreciations have become vital tools in economic, industrial and social development of advanced countries of the world. Therefore...

ER SCHEMA ANALYSER WITH DATA STREAMING

ABSTRACT We present an algorithm which analyzes memory requirements of the streaming processing of a given XSLT stylesheet on the set of XML documents defined by a given XML schema. This schema-based analyzer represents an integral part of the Xord framework for the streaming processing of XSLT - it determines the most efficient streaming algorithm for a given transformation and the class of XML documents defined by a schema. We describe the implementation of the analyzer for the stack-based ...

DESIGN AND IMPLEMENTATION OF EMPLOYEE PROFILE MANAGEMENT SYSTEM - AN EFFECTIVE EMPLOYEE MANAGEMENT RESOURCE (A CASE STUDY CIVIL SERVICE COMMISSION ENUGU)

ABSTRACT This project entitled “Employee profile management system” has been designed towards improving the Management of Employee Information in the field offices of civil service commission. It maintains Seniority, Leave Records, Transfer & Postings and other basic information of Employee. Various MIS reports can be generated through it Viz. Ever since man discovered the computer and hence computer science, attempt has been made to computerize every facet of human life. This project wor...

EMBEDDING IN VIDEO STEGANOGRAPHY

ABSTRACT Video steganography is all about transmission of streaming data, in its real-time nature.  Though subject to bandwidth constraints, I propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be anything from subtitles to correction signals and watermarking. TABLE OF CONTENT TITLE PAGE CERTIFICATION APPROVAL DEDICATION ACKNOWLEDGEMENT ABSTRA...

E-MAIL SERVER USING THREADED SOCKETS

ABSTRACT An e-mail server is the computerized equivalent of your friendly neighborhood mailman. Every email that is sent passes through a series of mail servers along its way to its intended recipient. Although it may seem like a message is sent instantly - zipping from one PC to another in the blink of an eye - the reality is that a complex series of transfers takes place. Without this series of mail servers, you would only be able to send emails to people whose email address domains matched...

E-LEARNING WEB PORTAL DESIGN AND IMPLEMENTATION

ABSTRACT With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge rather an electronic means of learning has continued to evolved. Electronic learning (e-learning), which facilitates education using communications or network, has made learning possible from anywhere at anytime using the internet, wide area networks or local area networks. Notably, e-learning applications which have now...

EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)

ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losse...

EFFICIENT MANAGING DETECTION OF NETWORK AND ITS COMPONENT USING SNMP

ABSTRACT As we move past the middle of the decade, the trend continues away from host-based to client- server systems. It's no secret this operational migration has caused as many new network management problems as it has answered. Intensified requirements come from all directions: more nodes, more uptime, more communications, more flexibility, more shared resource availability, more desktop capabilities, more reliability. More everything except the standards that have seemingly been left beh...


1531 - 1545 Of 1652 Results