Computer Science Research Papers/Topics

NETWORK TECHNOLOGIES IN DISTANCE LEARNING

ABSTRACT Distance learning is an excellent method of reaching the adult learner. Because of the competing priorities of work, home, and school, adult learners desire a high degree of flexibility. The structure of distance learning gives adults the greatest possible control over the time, place and pace of education; however, it is not without problems. Loss of student motivation due to the lack of face-to-face contact with teachers and peers, potentially prohibitive startup costs, and lack of...

NETWORK VIRUS: CREATION AND PREVENTION

ABSTRACTNetwork Virus are programs designed to destroy or hamper some function of the computer. By doing this they either destroy information or slow down processing capabilities of the computer system. In recent years they have also had a destructive presence on computer networks and on the internet.Many people do not understand what is a computer virus? In computing terminology it is a self replicating/self producing automated program. This program spreads by inserting itself into executabl...

NIGHT VISION TECHNOLOGY

ABSTRACT Night vision is the ability to see in low light conditions. Whether by biological or technological means, night vision is made possible by a combination of two approaches: sufficient spectral range, and sufficient intensity range. Humans have poor night vision compared to many animals, in part because the human eye lacks a tapetum lucidum.[ A night vision device (NVD) is an optical instrument that allows images to be produced in levels of light approaching total darkness. They are m...

OBJECT ORIENTED PROGRAMMING VS PROCEDURAL PROGRAMMING

ABSTRACT Object-oriented programming is a programming paradigm that uses abstraction (in the form of classes and objects) to create models based on the real world environment.  An object-oriented application uses a collection of objects, which communicate by passing messages to request services.  Objects are capable of passing messages, receiving messages, and processing data.  The aim of object-oriented programming is to try to increase the flexibility and maintainability of programs.  B...

OPEN-SOURCE SOFTWARE VS CLOSED SOFTWARE

ABSTRACT Open source is a development method for software that harnesses the power of distributed peer review and transparency of process. The promise of open source is better quality, higher reliability, more flexibility, lower cost, and an end to predatory vendor lock-in. The Open Source Initiative (OSI) is a non-profit corporation with global scope formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source com...

ORGANISATION CHART OF AN INFORMATION DEPARTMENTS AND ITS FUNCTIONS

ABSTRACT An organizational chart consists of activities such as task allocation, coordination and supervision, which are directed towards the achievement of organizational aims. It can also be considered as the viewing glass or perspective through which individuals see their organization and its environment. Most organizations have hierarchical charts, but not all.  Organizations are a variant of clustered entities.  An organization can be structured in many different ways, depending on th...

PARASITIC COMPUTING

ABSTRACT Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given can also be two computers communicating over the Internet, under disguise of a standard communications se...

RAID TECHNOLOGY

ABSTRACT RAID is now used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple physical drives. The physical drives are said to be in a RAID, which is accessed by the operating system as one single drive. The different schemes or architectures are named by the word RAID followed by a number (e.g., RAID 0, RAID 1). Each scheme provides a different balance between two key goals: increase data reliability and increase input/output performance. R...

PROSPECTS OF CLOUD COMPUTING IN NIGERIA

ABSTRACT Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, ech...

RADAR TRACKING SYSTEM CONCEPT AND APPLICATION

ABSTRACT A classical rotating air surveillance radar system detects target echoes against a background of noise. It reports these detections (known as "plots") in polar coordinates representing the range and bearing of the target. In addition, noise in the radar receiver will occasionally exceed the detection threshold of the radar's Constant false alarm rate detector and be incorrectly reported as targets (known as false alarms). The role of the radar tracker is to monitor consecutive update...

SPEECH RECOGNITION TECHNOLOGY

ABSTRACT Speech recognition (also known as automatic speech recognition or computer speech recognition) converts spoken words to text. The term "voice recognition" is sometimes used to refer to recognition systems that must be trained to a particular speaker—as is the case for most desktop recognition software. Recognizing the speaker can simplify the task of translating speech. Speech recognition is a broader solution that refers to technology that can recognize speech without being...

UNDERSTANDING THE FILE ALLOCATION TABLE [FAT] IN WINDOWS

ABSTRACT The File Allocation Table of contents of a computer disk which tells what sectors are used for what file. The File Allocation Table ( also know as FAT, FAT16, and FAT32 ), is located in the master boot sector (first 63) of a bootable disk, floppy or hard. You visually cannot see this. The FAT follows the boot sector.  The FAT file system revolves around the File Allocation Table for which it is named. Each logical volume has its own FAT, which serves two important functions: it cont...

USEFULNESS OF AN ENTERPRISE APPLICATION

ABSTRACT Enterprise software describes a collection of computer programs with common business applications, tools for modeling how the entire organization works, and development tools for building applications unique to the organization. The software is intended to solve an enterprise-wide problem (rather than a departmental problem) and often written using an Enterprise Software Architecture. Enterprise level software aims to improve the enterprise's productivity and efficiency by providin...

Using The Computer System In Crime Investigation

ABSTRACT Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the ...

BLUETOOTH AND INFRARED TECHNOLOGY

ABSTRACT Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 15,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents is required to implement the technology and are only licensed to t...


61 - 75 Of 114 Results