Computer Science Research Papers/Topics

Integration Of A Memory Analyzer To The Browser Reference Architecture

ABS TRACT A Web Browser is a computer application used to access information on the World Wide Web. The browser‟s parsing capability has advanced over years since its inception. The advancements have consequently increased demand for memory as manifested by computer crawl. Contemporary browsers are anchored on reference architecture that lacks memory control mechanism that can limit maximum memory a browser can use thus posing a challenge in multiprogramming environments with less memory th...

Designing A Byod Real-Time Forensic Investigation Framework For Data Leakage Through Mobile Devices

ABSTRACT Global digitalisation has perpetuated the use of mobile devices for both personal and workrelated activities. As such, some African organisations have been allowing their employees to utilise their personally owned mobile devices to carry out work-related activities all in the name of convenience, reliability, mobility, and reduced maintenance costs. The Directorate on Corruption and Economic Offenses (DCEO), being an anti-corruption agency in Lesotho is embracing the BYOD benefits....

Proverb Representation using Semantic Technologies: A case study of Nigerian Yoruba Proverbs

Abstract Indigenous Knowledge (IK) is the unique, traditional, local knowledge existing within and developed around the specific condition of women and men indigenous to a particular geographic area. Forms of expressing IK include folklores, songs, stories, festivals, outfit and proverbs. Proverbs are grounded upon years of experience and close observation of life and natural phenomena. Some research posed proverbs to be the bedrock of civilization of a society. By implication, almost all so...

Numerical Computation Of Steady Buoyancy Driven Mhd Heat And Mass Transfer Past An Inclined In_Nite Flat Plate With Sinusoidal Surface Boundary Conditions

Abstract In this paper we study the eects of magnetohydrodynamics (MHD) uid  ow on a two dimensional boundary layer  ow of a steady free convection heat and mass transfer on an inclined plate in which the angle of inclination is varied. The  uid is taken as viscous, incom- pressible, electrically conducting. The mathematical formulation yields a set of governing partial dierential equations (PDEs) under a set of appropriate boundary conditions. The PDEs are transformed into ordi- nary die...

Designing An Algorithm That Can Influence Children’s Behaviour Online And Raise Their Cyber Security Awareness

Table of Contents Chapter 1: Introduction ................................................................................................................................ 1 1.1. Background of the study .................................................................................................................... 1 1.2. Problem statement ............................................................................................................................ 4 1.3. Objectives of the stu...

An Attribute-Value Pair (AVP) Model For Creating And Exploiting Annotations In Economic Intelligence

ABSTRACT This study is concerned with the design and development of an annotation model that gives users the power of expressivity as required in Economic Intelligence (EI) context. Most of the existing annotation platforms lack this power of expressivity. The study also discovered a need to develop an annotation model for creating and structuring annotations that will adequately capture the intention of the users (EI actors) in decision making process. In addition, there was a need for a te...

An Empirical Study On E-Learning Adoption In Tanzanian Secondary Schools

ABSTRACT The overall goal of this research work was to develop and validate an e-Learning adoption model in Tanzanian secondary schools as literature had not revealed any comprehensive model that is specifically used in determining the adoption of e-Learning in Tanzanian secondary schools. The existence of this gap encouraged the carrying out of this research to empirically test and validate the combination of the Technology Acceptance Model (TAM), Task Technology Fit (TTF) and Technology Rea...

The Design And Implementation Of An Online Inventory Monitoring System

ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The stock data the board frameworks and stock observing frameworks are coordinated and sent together at a fixed point at store locations in some of the current inventory...

Design And Implementation Of An Online Inventory Monitoring System

ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The inventory information management systems and inventory monitoring systems are coordinated and sent together at a fixed point at store locations in some of the curren...

Detection And Prevention Of Sniffing On Networks

ABSTRACT With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to this problem at hand, an uninformed person can have his private information endangered to getting exposed to other unknown persons. Such act is called “Sniffing” and mostly occurs on networks. By sniffing the...

3D First Person Shooter PC Game

ABSTRACT Monsters Within is a fun 3D FPS horror survival game on the Windows platform that demands its players to have fast reflexes, quick thinking and deductive skills to survive in the game environment they have been thrust into; distorted humanoid creatures have overrun the city and continue to rapidly multiply. The player’s main objective is to circumvent this by destroying all nests in the vicinity. The quantitative research methodology was used to analyse the feasibility for the succ...

An implementation of the past question paper archive system model

ABSTRACT The proposed thesis is designed to be an online Baze University past question archiving system. The use of technologies has become critically important in the era of the Coronavirus pandemic which has required off-campus distance learning by students of Baze university. With no access to staff and on-campus facilities, the availability of easily accessible online study material has become critical. This project aims to provide students with the necessary materials needed to aid with ...

ISight: An Object Recognition Application for Visually Impaired Individuals

ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered their widespread adoption, such as cost, stigma attached to using the product in public, and lack of continued support for the product. In this time sma...

Face Recognition On Principal Component Analysis

ABSTRACT Facial recognition plays a significant role in different applications such as human computer communication, video surveillance, face tracking and face recognition. Efficient face recognition algorithm is required to accomplish such task. Face recognition is one of the most active research areas in computer vision and pattern recognition with practical applications. In present networked world, the need to conserve the security of information is becoming both increasingly significant a...


106 - 120 Of 253 Results