Computer Science Project Topics and Materials (Page 10)

Showing 226 - 250 of 2,678

226) MOBILE INFORMATION PROVIDER

ABSTRACT The ability to access information on demand at any location confers competitive advantage on individuals in an increasingly mobile world. As users become more dependent on this ability, the span of access of data repositories will have to grow. The increasing social acceptance of the home or any other location as a place of work is a... Continue Reading

227) MESSAGING SERVICE OVER TCP/IP IN LOCAL AREA NETWORKS

ABSTRACT Instant messaging systems allow users to exchange files. Current systems transfer files directly between peers rather than through the server, as with text messaging. In other words, the peer-to-peer scheme is used to eliminate the high bandwidth demands that server-centric file transfers would place on the provider’s network.... Continue Reading

228) DESIGN AND IMPLEMENTATION OF A MEDICAL IMAGING SOFTWARE SYSTEM (CASE STUDY OF PARKLANE ENUGU)

ABSTRACT Imaging System is a collection of hardware and software that work together to capture, store and retrieve images. A sample system includes a scanner, management. This study investigate computer Imaging System in Nigeria Hospital. Ordinary, some doctors use trial and error method in treating patients. As a result, wrong drugs can be... Continue Reading

229) LOCATION AIDED ROUTING FOR MOBILE AD-HOC NETWORKS (CASE STUDY OF EASY LINK CAFEE)

ABSTRACT A mobile ad hoc network consists of wireless hosts that may move often.   Movement of hosts results in a change in routes, requiring some mechanism for determining new routes.  Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for instance, obtained... Continue Reading

230) JAVA NETWORK FILE SHARING SYSTEM

ABSTRACT We implemented a distributed, peer-to-peer file system in Java using the Chord protocol for efficient location of files stored across a network. Chord is a distributed key lookup technique that scales logarithmically with an increase in the number of storage nodes. Initially, we discovered problems with the Chord algorithms, and... Continue Reading

231) ITP: AN IMAGE TRANSPORT PROTOCOL FOR THE INTERNET

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, but this is overly restrictive for image data. Our analysis shows that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions... Continue Reading

232) INVENTORY MANAGEMENT SYSTEM

ABSTRACT Inventory Management System is important to ensure quality control in businesses that handle transactions revolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good Inventory Management System will alert the retailer when it is time to reorder. Inventory... Continue Reading

233) INTRUSION DETECTION PREVENTION SYSTEM

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading

234) INTRUSION DETECTION IN WIRELESS AD HOC NETWORK

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading

235) INTRUSION DETECTION PREVENTION AND TRACE BACK SYSTEM

ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading

236) INTEGRATING SPEECH ENGINE WITH WEB NAVIGATOR

ABSTRACT Integrated speech engine (ISE) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice... Continue Reading

237) INCREMENTAL DEPLOYMENT SERVICE OF HOP BY HOP MULTICAST ROUTING PROTOCOL (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment... Continue Reading

238) IMAGE STREAM TRANSFER USING REAL TIME TRANSMISSION PROTOCOL

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the... Continue Reading

239) IMAGE RENDERING FOR GRID TECHNOLOGY

ABSTRACT In this paper, we propose a volume rendering method using grid computing for large-scale volume image. Grid computing is attractive because medical institutions and research facilities often have a large number of idle computers. A large-scale volume image is divided into sub-volumes and the sub-volumes are rendered using grid computing.... Continue Reading

240) DESIGN AND IMPLEMENTATION OF HTML EDITOR (CASE STUDY OF MICROSOFT CORPORATION)

ABSTRACT A HTML editor is an authoring software program that is used to create content for web sites. HTML software is easy to use since it has a feature that is known as WYSIWYG. When you design web pages you want to use editor features that are simple to understand. You can buy and download HTML management software from the Internet as well as... Continue Reading

241) HIDING MESSAGE IN THE NOISE OF A PICTURE

ABSTRACT Text encryption software to hide and encrypt data within a picture undetectable to others! This software allows you to hide text messages within a picture! You can use this software to store personal information, financial details and so forth embedded within a picture, and password protect! So you could even give someone a copy of your... Continue Reading

242) GENETIC ALGORITHM BASED TRAIN SIMULATION USING CONCURRENT ENGINEERING

ABSTRACT To control the traffic during the data transmission with out any loss of packets using genetic algorithm. In this the packets are transferred by frames using mac layer. So Error correction can be easily done. Genetic algorithm based train simulation using concurrent engineering” control over a single wired lane network, the project... Continue Reading

243) GENETIC ALGORITHM AND TRAVELLING SALESMEN PROBLEM USING C# AND ATL COM

ABSTRACT This project is about an application used by the travelling salesman, given a finite number of “cities” (I have choosen cities from 1 to a finite number) along with the distance of travel (distance between two cities is randomly choosen) between each pair of them the aim is to find the cheapest distance of visiting all the cities and... Continue Reading

244) EXTRACTING DATA FROM PUBLISHED GRAPHS

ABSTRACT Published graphs in digital documents contain important information. Often, the results of scientific experiments and performance of businesses are summarized using plots. Although graphs are easily understood by human users, current search engines rarely utilize the information contained in the plots to enhance the results returned in... Continue Reading

245) DESIGN AND IMPLEMENTATION OF EXAMINATION RESULT ACCORDING TO CLASSES (CASE STUDY OF IMT ENUGU)

ABSTRACT This study was carried out to verify all the manual process involved in generating students examination Result and to seek a way of automating the system for effective operations. Since there is continuous moves towards technological advances that enhanced productivity of labour and free human beings of task more economically by machines.... Continue Reading

246) ER SCHEMA ANALYSER WITH DATA STREAMING

ABSTRACT We present an algorithm which analyzes memory requirements of the streaming processing of a given XSLT stylesheet on the set of XML documents defined by a given XML schema. This schema-based analyzer represents an integral part of the Xord framework for the streaming processing of XSLT - it determines the most efficient streaming... Continue Reading

247) DESIGN AND IMPLEMENTATION OF EMPLOYEE PROFILE MANAGEMENT SYSTEM - AN EFFECTIVE EMPLOYEE MANAGEMENT RESOURCE (A CASE STUDY CIVIL SERVICE COMMISSION ENUGU)

ABSTRACT This project entitled “Employee profile management system” has been designed towards improving the Management of Employee Information in the field offices of civil service commission. It maintains Seniority, Leave Records, Transfer & Postings and other basic information of Employee. Various MIS reports can be generated through it Viz.... Continue Reading

248) EMBEDDING IN VIDEO STEGANOGRAPHY

ABSTRACT Video steganography is all about transmission of streaming data, in its real-time nature.  Though subject to bandwidth constraints, I propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be... Continue Reading

249) E-MAIL SERVER USING THREADED SOCKETS

ABSTRACT An e-mail server is the computerized equivalent of your friendly neighborhood mailman. Every email that is sent passes through a series of mail servers along its way to its intended recipient. Although it may seem like a message is sent instantly - zipping from one PC to another in the blink of an eye - the reality is that a complex... Continue Reading

250) E-LEARNING WEB PORTAL DESIGN AND IMPLEMENTATION

ABSTRACT With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge rather an electronic means of learning has continued to evolved. Electronic learning (e-learning), which facilitates education using communications or network, has made... Continue Reading
Need help with your Computer Science Project Topic? Click here to request assistnce or reach us on + 234 813 0686 6500
whatsappWhatsApp Us