Computer Science Research Papers/Topics

BATCH PROCESSING AND REAL TIME PROCESSING: MERITS AND DEMERITS

ABSTRACT The needs of real-time software require the use of one or more synchronous programming languages, real-time operating systems, and real-time networks which provide the essential frameworks on which to build a real-time software application. Few technologies can help improve business responsiveness as dramatically as real time processing of event data. By implementing real time processing solutions to monitor streaming data as it enters your organization, you can identify new opportu...

APPLICATION OF FUZZY LOGIC IN AN ELEVATOR

ABSTRACT An elevator group supervisory controller is a control system that manages systematically two or more elevators in order to serve passengers as required. The elevator cars are assigned accordingly in response to hall calls, so as to optimize waiting time, riding time, power consumption, passengers’ comfort, etc. In this paper, the simplicity of ordinal structure fuzzy logic in making crucial supervisory control decisions is demonstrated. In addition, in order to further improve...

APPLICATION OF EXPERT SYSTEM

ABSTRACT Computers have been in existence for some time. Personal computers have emerged in the early eighties and changed substantially the way corporations perform their functions. Large quantity of application software, tools making the computer more useful, have been developed over the years. Different classes that describe application software, such as "Spreadsheets", "Word Processors" and "Data Bases", are now as much a part of our vocabulary as "fax" and "cellular phone" machines.  A...

ANALOGUE TO DIGITAL CONVERSION SYSTEM THEORY AND APPLICATION

ABSTRACT Digital signals propagate more efficiently than analog signals, largely because digital impulses, which are well-defined and orderly, are easier for electronic circuits to distinguish from noise, which is chaotic. This is the chief advantage of digital modes in communications. Computers "talk" and "think" in terms of binary digital data; while a microprocessor can analyze analog data, it must be converted into digital form for the computer to make sense of it. A typical telephone mo...

ADVANTAGES AND DISADVANTAGES OF OFF THE SHELF SOFTWARE AND CUSTOMIZED SOFTWARE

ABSTRACT Custom software is not targeted to the mass marketplace as good as is tailor finished for specific needs of companies as good as organizations this requires carrying the in accord with bargain of these principles. The software is finished as good as will in the little approach paint which classification as good as have it mount out in the little approach for the options accessible for clients business as good as users of these websites as good as have report exchnage improved in betw...

ADDRESSING PRINCIPLES USED IN TCP/IP PROTOCOLS

ABSTRACT Network administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (TCP/IP) networks and troubleshoot TCP/IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses, how they are expressed, and the types of unicast addresses assigned to network node interfaces. We demonstrate that the dynamic behavior of queue and ...

A SECURITY GATEWAY

ABSTRACT In the context of computer networking, an application-level gateway (also known as ALG or application layer gateway) consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, Bit-Torrent, SIP, RTSP, file transfer in IM applications etc. In order for these protocols ...

PC Assembly

Abstract—  Now  days,  purchasing  branded  Desktop  PC  from  a  single  Vendor  is  getting  expensive day  by  day.  Also  consumers  are  required  to  rely  on  single  Vendor  for  their  whole  Desktop  PC  and thereby  compromising  on  the  hardware  so  as  to  reduce  cost.  To  overcome  this  problem  a  new approach  was  developed  i.e.  to  assemble  the  PC  by  purchasing  its  essential  component  from  different...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED PERSONNEL RECORD MANAGEMENT SYSTEM

CHAPTER ONE 1.1 Background of the Study Every organization employs staffs and creates personnel records. Staffs is one of the organizations most important, and usually most expensive assets. Like any other asset, staff is a resource that must be deployed to maximum advantage. The proper management of personnel records can make a significant contribution to this objective by ensuring that information is available to take decisions and to protect the right both of the state and individuals. Mor...

Computer As An Aid To Engineer

LIST OF ABBREVIATIONS2D - Two Dimension3D - Three DimensionCAD - Computer-Aided DesignCAE - Computer-Aided EngineeringCAM - Computer-Aided ManufacturingCFD - Computational Fluid DynamicsFEA - Finite Element AnalysisIC - Integrated CircuitMBD - Multi-body DynamicsMIT - Massachusetts Institute Of TechnologyNVH - Noise, Vibration and HarshnessPC - Personal ComputerLIST OF FIGURES PagesFigure 1 Computer-Aided Engineering Process 4Figure 2 Sample Of CAE Software Inter...

AID OF COMPUTERS

With the outbreak of the computer age in almost all areas of our world, computers had become essential tools in the progress of a nation and aided men throughout the course of history and this very moment, they can be found from a house kitchen to the busy streets of the urban world. Since it can process facts faster and more effective than ever, man has derived many functions from these machines and derived uses from those benefits. One benefit computers give is the help they give through t...

The Use of Computers in Entertainment

In today’s electronic era computers have a hand in almost everything. Entertainment is no exception, in fact with the coming of digital information has made one of its greatest leaps. Movies, games, music, even books that that are simple and easy as it is have been impacted greatly by computers. But how far is too far? Music is now stolen, movies the same, games can be hacked and broken into with simple programs. As technology continues, more and more information will be taken, changed, sto...

Seminar On Cryptography

Abstract "Times New Roman"">  Cryptography is the practice and study of techniques for secure communication and has become so powerful that messages scrambled with it are virtually undecipherable, like many powerful technologies, this is a double -edge sword. In Cryptography,encryption can keep emails, financials transaction and electronic commerce over the internet, secure and private. In this paper, we tried to put the topic of cryptography into context, discussed the main objectiv...

Car expert system

INTRODUCTION Nowadays, it seems like almost every one own a car and in fact, we can say that each house have at least one car. But the more is approximately three cars per house. This figure shows that car is very important to people’s life as it completed the cycle of living. Without a car, it is almost impossible to move from one place to another especially for those who are always mobilise in their jobs. Car simplified our life and it makes time to be more valuable as we can save much ti...

PROBLEMS MILITATING AGAINST TEACHING AND LEARNING OF COMPUTER STUDIES IN JUNIOR SECONDARY SCHOOLS IN NSUKKA LOCAL GOVERNMENT AREA OF ENUGU STATE.

INTRODUCTION The use of the electronic sophisticated and automatic machine called computer has justified the saying of our time that the world is global village. The computer make work done conveniently and faster, Adedapo (2010). Large volumes of data with the aid of  computers are processed automatically into information and distributed across the globe in few seconds. Individuals, organization and governments communicate with one another, transact business and share ideas without incurrin...


76 - 90 Of 114 Results