Computer Science Research Papers/Topics

EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)

ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losse...

EFFICIENT MANAGING DETECTION OF NETWORK AND ITS COMPONENT USING SNMP

ABSTRACT As we move past the middle of the decade, the trend continues away from host-based to client- server systems. It's no secret this operational migration has caused as many new network management problems as it has answered. Intensified requirements come from all directions: more nodes, more uptime, more communications, more flexibility, more shared resource availability, more desktop capabilities, more reliability. More everything except the standards that have seemingly been left beh...

DESIGN AND IMPLEMENTATION OF DUPLEX MESSAGING FOR ENTERPRISE SYSTEM (A CASE STUDY OF NOKIA)

ABSTRACT The growth of information and communication technologies (ICTs) has already revealed an impact on our modern society. Mobile messaging technologies have already been considered as a key field for variety of research to pick up the knowledge how ICTs can help the modern society people, who are dynamically shifting toward information-based civilization. Duplex messaging for enterprise system (DMES) is one of the branches of mobile messaging technologies, which is a rich content message...

EFFICIENT FAULT-TOLERANT DISTRIBUTED ALLOCATION ALGORITHM FOR CELLULAR NETWORK

ABSTRACT A channel allocation algorithm in a cellular network consists of two parts: a channel acquisition algorithm and a channel selection algorithm. Some of the previous works in this field focused on centralized approaches to allocating channels. But, centralized approaches are neither scalable nor reliable. Recently, distributed dynamic channel allocation algorithms have been proposed, and they have gained a lot of attention due to their high reliability and scalability. But, in most of ...

DYNAMIC SIGNATURE VERIFICATION USING PATTERN RECOGNITION

ABSTRACT In this work we describe a new approach to dynamic signature verification using the discriminative training framework. The authentic and forgery samples are represented by two separate Gaussian Mixture models and discriminative training is used to achieve optimal separation between the two models. An enrollment sample clustering and screening procedure is described which improves the robustness of the system. We also introduce a method to estimate and apply subject norms representing...

DYNAMIC ATM CARD MANAGEMENT SYSTEM

ABSTRACT Automation is the partial or full performance by a machine system (mechanical or electronic, or both) of a function previously performed by a human, or which conceivably could be performed by a human. Automation has been developed for decades, though most existing technology is now seen simply as machine operation. Automation is necessary to increase capacity and to improve or maintain safety. Some of the justifications for automation include reliability, speed and (processing) power...

DESIGN AND IMPLEMENTATION OF ELECTRONIC LEARNING (e LEARNING) SYSTEM FOR NIGERIA UNIVERSITIES (CASE STUDY OF UNIVERSITY OF NIGERIA NSUKKA)

ABSTRACT The study is all about design and implementation of electronic learning (e_learning) system for Nigeria universities. The current study is concerned with reducing work lag-time on electronic learning (e_learning) system for Nigeria universities platforms, and delivering undergraduates and postgraduate programmes all over the world. The research has taken highlighted various kinds of electronic learning (e_learning) system for Nigeria universities platforms such as teleconferencing, v...

DESIGN AND IMPLEMENTATION OF E-CAREER CONSULTANCY SERVICES ONLINE (CASE STUDY OF CAREERS NIGERIA)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of an e-carrier consultancy services. Almost all our Companies have gone into e-carrier consultancy services because of the extraordinary benefit resulting from information technology. Information technology has enabled an e-carrier consultancy services to work ...

MICRO COMPUTER BASED ROBOT

ABSTRACT This article presents a microcomputer-based robot dynamic sensing system by the use of the linear scanning approach for object recognition and manipulation. In this research, a 512 × 1 solid-state photodiode linear array sensor is used for dynamic scanning the object to be identified. An experimental prototype is built, which consists of a fully opened parallel jaw gripper and a 360d̀ turnable pedestal located between the jaws of the gripper. The sensor with the lens is mounted nea...

NET BANKING SERVICES

ABSTRACT This project work is concerned with the use of the Net Banking services and solution operations, a case study of the Intercontinental Bank Plc Enugu. Net Banking services and solution is a way for the customer to perform banking actions on his or her cell phone or other mobile device. It is a quite popular method of banking that fits in well with a busy, technologically oriented lifestyle. It might also be referred to as M-banking or SMS banking. The Electronic in acts over evolving ...

MUILTI CAST ROUTING WITH DELAY AND DELAY VARIATION CONSTRAINTS FOR COLLABORATIVE APPLICATION ON OVERLAY NETWORK

ABSTRACT Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications include video-conferencing, distributed database replication, and online games. This type of application requires a multicasting subnetwork, using which messages should arrive at the destinations within a specified delay bound. These applications also require that destinations receive the message from the source...

DESIGN AND IMPLEMENTATION OF NETWORK ANALYSIS (CASE STUDY OF IMT ENUGU)

ABSTRACT A network analysis is an instrument that measures the network parameters of electrical networks. Today, network analysis commonly measure s–parameters because reflection and transmission of electrical networks are easy to measure at high frequencies, but there are other network parameter sets such as y-parameters, z-parameters, and h-parameters. Network analyses are often used to characterize two-port networks such as amplifiers and filters, but they can be used on networks with an...

OPTIMAL CRYPTOGRAPHIC TECHNIQUES

ABSTRACT The age of information is also the age of digital information assets, where the professional programmer has to deal with cryptography. This work presents the theory, source code, and implementation for variable key size RSA encryption/decryption, digital signing, multi precision library, Diffie-Hellman key exchange, entropy collection, pseudo random number generator, and more. The work presents how to implement your own secure protocol using the IOCP technology, by presenting a secur...

OPTICAL CHARACTER RECOGNITION SYSTEM

ABSTRACT The offline optical character recognition (OCR) system for different languages has been developed over the recent years. Since 1965, the US postal service has been using this system for automating their services. The range of the applications under this area is increasing day by day, due to its utility in almost major areas of government as well as private sector. This technique has been very useful in making paper free environment in many major organizations as far as the backup of ...

DESIGN AND IMPLEMENTATION OF AN ONLINE SHOPPING WITH SHOPPING CART SYSTEM

ABSTRACT This study discusses factors affecting the customer value, and the performance of the ONLINE SHOPPING SYSTEM  model. In our case, the biggest trading company in our country developed An ONLINE SHOPPING SYSTEM model to be taken into use in its supermarkets. The time was not yet right to implement the online shopping with shopping cart, but useful knowledge was gained as for the internal and external factors to be taken into account when planning ONLINE SHOPPING SYSTEM . The company d...


1546 - 1560 Of 1654 Results