Computer Science Project Topics and Materials (Page 12)

Showing 276 - 300 of 2,678

276) PERSONAL AUTHENTICATION USING 3-D FINGER GEOMETRY

ABSTRACT In this project, a biometric authentication system based on measurements of the user's three-dimensional (3-D) hand geometry is proposed. The system relies on a novel real-time and low-cost 3-D sensor that generates a dense range image of the scene. By exploiting 3-D information we are able to limit the constraints usually posed on the... Continue Reading

277) PERFORMANCE EVALUATION DISTANCE ROUTING ALGORITHM IN MANET

ABSTRACT A mobile ad-hoc network (MANET) consists of wireless mobile hosts (nodes) that communicate with each other over wireless link, in the absence of a fixed infrastructure. Routes between two hosts in MANET may consists of hops through other hosts in the network, due to the limitation of broadcasting range of each host Movement of hosts... Continue Reading

278) PEER TO PEER MESSAGING SYSTEM USING JXTA

ABSTRACT Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk... Continue Reading

279) PEER TO PEER MESSAGING

ABSTRACT Peer to peer messaging is a simple information dissemination platform that is supported by a protocol which is based on pairs of request/response PDUs (protocol data units, or packets) exchanged over OSI layer 4 (TCP session or X.25 SVC3) connections. PDUs are binary encoded for efficiency. Data exchange may be synchronous, where each... Continue Reading

280) OPTIMAL MULTICAST ROUTING IN MOBILE AD HOC NETWORK

ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading

281) DESIGN AND IMPLEMENTATION OF A COMPUTERIZED PROPERTY MANAGEMENT SYSTEM (A CASE STUDY OF ENUGU NORTH LOCAL GOVERNMENT AREA)

ABSTRACT This project lays emphasis on the contribution a computerized property management system in Enugu North Local Government Area and how the computer can be programmed to record property management system and computations so as to eliminate the abuse and fraudulent activities associated with manual methods of property management system. The... Continue Reading

282) PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)

ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading

283) PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSIONS

ABSTRACT The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of... Continue Reading

284) DESIGN AND IMPLEMENTATION OF A PROTOCOL SEQUENCER AND SUBSYSTEM INTERFACE: ADMINISTRATOR TOOL WHICH WILL MONITOR APPLICATION ON A LAN PROVIDE FUNCTIONS (CASE STUDY OF NETWORKING TRAINING)

ABSTRACT A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage... Continue Reading

285) QUIEVE: CONSISTENT OBJECT SHARING FOR EDGE SERVICE

ABSTRACT We present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These... Continue Reading

286) READING AND WRITING AVI FILE USING STEGANOGRAPHY

ABSTRACT The video stream in an AVI file is nothing more than a sequence of bitmaps. This article is about extracting these bitmaps and re-building the stream, in order to hide a message in the video. Before reading this article, you should have read at least part one, Steganography - Hiding messages in the Noise of a Picture. This one uses the... Continue Reading

287) REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY (CASE STUDY OF PRESSURE WORLD CAFEE )

ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading

288) REMOTE ELECTRICITY BILLING SYSTEM AUTOMATION AND IMPLEMENTATION -EJB (A CASE STUDY OF NEPA)

ABSTRACT With the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of water billing system. Almost all the big organization are developing their billing system because of the... Continue Reading

289) REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACT Remote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing... Continue Reading

290) RETRIEVING FILES USING CONTENT BASED SEARCH

ABSTRACT Content Based File Search is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost... Continue Reading

291) DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the... Continue Reading

292) SECURE DATA HIDING AND EXTRACTION USING BPCS

ABSTRACT Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In... Continue Reading

293) SEARCH-WEB BASE SEARCH ENGINE

ABSTRACT Web base search engine is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the... Continue Reading

294) SCALABLE AND EFFICIENT END TO END NETWORK TOPOLOGY INFERENCE

ABSTRACT To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topology among a group of hosts. Previously, Max-Delta has been proposed to infer a highly accurate topology with a low number of traceroutes. However, Max-Delta... Continue Reading

295) AUTOMATIC DEPENDENT SURVEILLANCE BROADCASTING (ADSB)

ABSTRACT ADS-B, which consists of two different services ADS–B Out and ADS–B In, will be replacing radar as the primary surveillance method for controlling aircraft worldwide. In the United States, ADS-B is an integral component of the NextGen National Airspace strategy for upgrading/enhancing aviation infrastructure and operations. The ADS-B... Continue Reading

296) SHORTEST NODEFINDER IN WIRELESS AD HOC NETWORK

ABSTRACT Ad hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of... Continue Reading

297) SMART KNOWLEDGE PROVIDER

ABSTRACT The Smart Knowledge Provider and the CAD use a mutual active authentication protocol to identify each other. The card generates a random number and sends it to the CAD, which encrypt the number with a shared encryption key before returning it to the card. The card then compares the returned result with its own encryption. The pair may... Continue Reading

298) STACK IP: NEW PACKET MARKETING AND FILTERING MECHANICS FOR DDOS AND IP SPOOFING DEFENSE

ABSTRACT Network administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses,... Continue Reading

299) STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA

ABSTRACT This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient... Continue Reading

300) DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND SERVICES APPLICATION WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless... Continue Reading
Need help with your Computer Science Project Topic? Click here to request assistnce or reach us on + 234 813 0686 6500
whatsappWhatsApp Us