Computer Science Research Papers/Topics

TIME SYNCHRONIZATION SYSTEM USING JAVA

ABSTRACT Time synchronization is a critical piece of infrastructure for any distributed system. Distributed, wireless sensor networks make extensive use of synchronized time, but often have unique requirements in the scope, lifetime, and precision of the synchronization achieved, as well as the time and energy required to achieve it. Existing time synchronization methods need to be extended to meet these new needs. We outline the synchronization requirements of future sensor networks and pres...

USING TRIGONOMETRY AND PYTHAGORAS TO WATERMARK AN IMAGE

ABSTRACTThe class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and transparency (byte). This may sound fairly trivial but calculating the angle of the diagonal line through a Rectangle of unknown Size at design time (big d'oh!...

UTILITIES TO COMPRESS, DECOMPRESS AND SPLIT MERGE FILES

ABSTRACTThough modern larger capacity hard drives are becoming more affordable, they may still not have enough room to store large multimedia files or programs. Compressing such files makes them easier to store and faster to transmit via email or through a website. Even then, if a compressed archive proves too big, it may need to be split into smaller zip files, which must then be joined before the original can be decompressed.Powerful file utility that can handle file compression, decompress...

DESIGN AND IMPLEMENTATION OF A VIDEO STEGANOGRAPHY USING MOBILE SIMULATION

ABSTRACTSteganography is an art of hiding sensitive data or some confidential information in some cover medium file. In this project, video steganography method has been implemented. As name suggest, video steganography means hiding any digital data in video files. The aim of this project is to hide, detect and retrieve the secret message hidden in video frames (images). This application is capable of hiding a text file in any desired frame in the video. It can also create an extra new frame ...

DESIGN AND IMPLEMENTATION OF VIRTUAL CLASSROOM

ABSTRACTVirtual education is a term describing online education using the Internet. This term is used in K-12 schooling, often to refer to cyber schools, and in higher education, where so-called Virtual Universities have been established. A virtual program (or a virtual course of studies) is a study program in which all courses, or at least a significant portion of the courses, are virtual courses, whether in synchronous (i.e. real time) or asynchronous (i.e. self-paced) formats. Virtual cour...

A VIRTUAL PRIVATE NETWORK USING JAVA 9 (A CASE STUDY OF UBA ENUGU)

ABSTRACTA Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private netw...

VISION BASED PROCESSING FOR REAL-TIME 3D DATA ACQUISATION BASED CODE STRUCTURED LIGHT

ABSTRACTThe structured light vision system is a successfully used for the measurement of 3D surface in vision. There is some limitation in the above scheme, that is tens of picture are captured to recover a 3D sense. This paper presents an idea for real-time Acquisition of 3-D surface data by a specially coded vision system. To achieve 3-D measurement for a dynamic scene, the data acquisition must be performed with only a single image. A principle of uniquely color-encoded pattern projection ...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED ERP FOR SMALL BUSINESS (A CASE STUDY OF EMENITE PLC ENUGU)

ABSTRACT  Small and mid-size businesses often have unique requirements for enterprise resource planning software that demand full capabilities without complexity. They also want to see a quick return on investment. Vendors now are stepping up.  The time is ripe for small and mid-size businesses to adopt enterprise resource planning (ERP) applications, according to leading industry analysts. There are more options than ever among the crowded ERP-vendor field targeting the small and mid-size ...

WAP BASED INFORMATION RETRIEVAL SYSTEM (CASE STUDY OF NATIONAL ARCHIVES ENUGU)

ABSTRACTOne of the challenges of modern information retrieval is to rank the most relevant documents at the top of the large system output. This calls for choosing the proper methods to evaluate the system performance. The traditional performance measures, such as precision and recall, are based on binary relevance judgment and are not appropriate for multi-grade relevance. The main objective of this paper is to propose a framework for system evaluation based on user preference of documents. ...

WATERMARK BASED DIGITAL RIGHT MANAGEMENT

ABSTRACTThe business of content providers is being threatened by technology advances in hardware, software and IP networks resulting in an increasing amount of illegal copies available online as well as offline. Digital rights management standards are being developed for the digital content and digital watermarking, a popular technique for content authentication and forgery prevention is viewed as an enabling technology to protect distributed content from unauthorized reuse, or reuse with ina...

WEB BASED ADMINISTRATION OF LINUX SERVER

ABSTRACTThis project is all about Web based administration of linux server which is focus on the administrative aspect of the company and also it gives each member access to his/her own corporate environment which will not affect the environment of the other staff in a company. In this kind of system all the staff of the company have access to certain operations that are meant to meet up with the company and almost all the staff on their own are administrators.  TABLE OF CONTENTTITLE PAGE �...

WEB BASED CREDIT CARD SYSTEM

ABSTRACTcredit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder's promise to pay for these goods and services.[1] The issuer of the card creates a revolving account and grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user. A credit card is different from a charge card: a charge card requires the balance to be pa...

WIRELESS TRAFFIC VIEWER USING J2ME

ABSTRACTReal time data and information processing and transmission is the bane of the modern day information technology concepts. [J2ME] phones can monitor real-time traffic video realization that This document is the realization of Mobile Traffic Cam Viewer, Electronic devices connect to one another in a variety of ways: A cable connects a computer's processing unit to a display, a data cable and a docking cradle connect a personal digital assistant (PDA) or a cellular phone to a computer, r...

WINDOWS MULTI FILE SEARCH UTILITY

ABSTRACTWindows multi file search utility is a framework application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Window...

WORKFLOW BASED COMPLAINT MANAGEMENT SYSTEM

ABSTRACTContemporary workflow management systems are driven by explicit process models, i.e., a completely specified workflow design is required in order to enact a given workflow process. Creating a workflow design is a complicated time-consuming process and, typically, there are discrepancies between the actual workflow processes and the processes as perceived by the management. Therefore, we have developed techniques for discovering workflow models. The starting point for such techniques i...


1621 - 1635 Of 1654 Results