Computer Science Project Topics and Materials (Page 13)

Showing 301 - 325 of 2,678

301) STEGANOGRAPHY – AN ART OF HIDING DIGITAL INFORMATION

ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your... Continue Reading

302) TELECOM INVENTORY MAINTENANCE SERVICES APPLICATION WITH ERROR TRACKING

ABSTRACT One of the more popular benefits to outsourcing your maintenance is the ability to improve department focus. Being able to outsource your facility maintenance lets your employees focus more on their higher priority tasks and operational issues. When it comes down to it, facility maintenance should be worry free and reduce stress on both... Continue Reading

303) TEXT TO SPEECH TECHNOLOGY

ABSTRACT Text-to-speech (TTS) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice speaking the... Continue Reading

304) AUTHENTIFICATION OF DIGITAL IMAGES BY ENCRYPTION AND DECRYPTION WITH PRIMARY KEY IMPLEMENTATION USING ISM ALGORITHM AND STEGANOGRAPHY

ABSTRACT Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company... Continue Reading

305) ASP: NET PROJECT TITLES

ABSTRACT Active Server Pages (APS) also known as classic ASP or ASP classic was Microsoft’s first server side script engine for dynamically generated web page initially released as an add-on to internet information services (HS)via the windows NT 4.0 option pack (Ca 1998) of was subsequently included as a free component of windows server (since... Continue Reading

306) APPLICATION OF MOBILE AGENT IN DISTRIBUTED MULTIMEDIA DATABASE SYSTEM

ABSTRACT Multimedia technologies are attracting more and more interest every day. Video-on-Demand is one of the buzzwords today and is now available for the public. Content providers such as publishers, broadcasting companies and audio/video production firms must be able to archive and index their productions for later retrieval. This is a... Continue Reading

307) ANTI-VIRUS

ABSTRACT Bringing it to a layman, an Anti-virus can be explained as the cure to virus and viral infections in the computer system. Though virus has been identified to be existing and causing harms in various forms, there are a variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data... Continue Reading

308) APPLICATION AND CHALLENGES OF AN AD HOC NETWORK SYSTEM

ABSTRACT An ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the... Continue Reading

309) APPLICATION OF BILL ACCOUNTING SYSTEM FOR A HOTEL INDUSTRY (CASE STUDY OF HOTEL PRESIDENTIAL)

ABSTRACT The importance of sales accounting is gradually being recognized as germane to prudent management of any business firm.  This has necessitated the need for the computerization of structured operations as the sales managers structured operations are known with certainly for instance, the computation and decisions based on sales ratios.... Continue Reading

310) AN EVALUATION OF MULTIMEDIA SYSTEMS

ABSTRACT The multimedia application user can use sound right off the bat on both the Macintosh and on a multimedia PC running Windows because beeps and warning sounds are available as soon as the operating system is installed. On the Macintosh you can choose one of the several sounds for the system alert. In Windows system sounds are WAV files and... Continue Reading

311) AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

ABSTRACT Anti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process... Continue Reading

312) XTC: AN ACTIVE VIRTUAL QUEUE (AVQ) ALGORITHM FOR ACTIVE QUEUE MANAGEMENT

ABSTRACT Virtual Queue-based marking schemes have been recently proposed for AQM (Active Queue Management) in Internet routers. We consider a particular scheme, which we call the Adaptive Virtual Queue (AVQ), and study its following properties: stability in the presence of feedback delays, its ability to maintain small queue lengths and its... Continue Reading

313) DESIGN AND IMPLEMENTATION OF DATA AND VIDEO STREAMING SYSTEM

ABSTRACT Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a streaming provider. The name refers to the delivery method of the medium rather than to the medium itself. The distinction is usually applied to media that are distributed over telecommunications networks, as most other... Continue Reading

314) DESIGN AND IMPLEMENTATION OF MEASURING XML PERFORMANCE AND ACCESS DATABASE (CASE STUDY OF PARK LANE HOSPITAL, ENUGU)

ABSTRACT     This Working Group Note presents measurement results of various high-performance XML interchange encoding formats and their associated processors, made by the Efficient XML Interchange (EXI) Working Group. The measurements have been conducted following the recommendations of the XML Binary Characterization (XBC) Working Group. In... Continue Reading

315) AN ANALYSIS OF A VIRTUAL LIBRARY SYSTEM (CASE STUDY OF NATIONAL LIBRARY OF NIGERIA, ENUGU STATE)

ABSTRACT The term virtual library is diffuse enough to be applied to a wide range of collections and organizations, but to be considered a virtual library, a virtual collection of information must be managed by and made accessible to a community of users. Thus, some web sites can be considered virtual libraries, but far from all. Many of the best... Continue Reading

316) DESIGN AND SIMULATION OF VEHICLE SPEED CONTROL SYSTEM

ABSTRACT This project work is an attempt to control the speedof the vehicle designed with computer software to enable thethird party or owner to get the location, speed and activity of thedriver. To achieve this, the system can transmit the informationin real time. The use of GSM/GPRS technologies allows thesystem to track the objects and provide... Continue Reading

317) ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE AD HOC

ABSTRACT Active networking is the emerging technology that will provide new network environment where lots of potential applications can be enhanced and developed. Current IP network is somehow good at simple packet forwarding, but it desperately needs some flexibility to support QoS and has to meets some restraint in certain environment. Active... Continue Reading

318) DESIGN AND IMPLEMENTATION OF CODE OPTIMIZATION: IMPLEMENTATION OF SCALAR OPTIMIZATION

ABSTRACT Optimization is the process of transforming a piece of code to make more efficient (either in terms of time or space) without changing its output or side-effects. The only difference visible to the code’s user should be that it runs faster and/or consumes less memory. It is really a misnomer that the name implies you are finding an... Continue Reading

319) A NOVEL SECURE COMMUNICATION PROTOCOL FOR ADHOC NETWORK (SCP) (CASE STUDY OF PLEASURE WORLD CAFE )

ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading

320) A NEAR-OPTIMAL MULTICAST SCHEME FOR MOBILE ADHOC NETWORK USING GENETIC ALGORITHM

ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading

321) A GEOMETRIC APPROACH TO IMPROVING ACTIVE PACKET LOSS MEASUREMENT

ABSTRACT Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly used to measure packet loss on end-to-end paths, there has been little analysis of the accuracy of these tools or their impact on the... Continue Reading

322) DESIGN AND IMPLIMENTATION OF TENS UNIT A COMPUTER AIDED SYSTEM FOR MEDICAL DIAGNOSIS AND TREATMENT OF ILLNESS (A CASE STUDY OF UNTH ENUGU)

ABSTRACT Technological trend in recent time’s nit nesses an appreciable decrease in hardware cost, implementation in microchip technology and a boost in the use of micro – computer’s in all ere as of human life. Transcutaneous electrical nerve stimulation unit  (acronym TENS unit) is the use of electric current produced by a device to... Continue Reading

323) UNIFIED INTERFACE FOR MULTIPLE NAMING SERVICE USING JNDI

ABSTRACT InterfaceTM technology (JNDI) provides a unified interface to multiple naming and directory services. As part of the Java enterprise API set, JNDI enables seamless connectivity to heterogeneous enterprise naming and directory services. Developers can now build powerful and portable directory enabled  Java applications using this... Continue Reading

324) TIME SYNCHRONIZATION SYSTEM USING JAVA

ABSTRACT Time synchronization is a critical piece of infrastructure for any distributed system. Distributed, wireless sensor networks make extensive use of synchronized time, but often have unique requirements in the scope, lifetime, and precision of the synchronization achieved, as well as the time and energy required to achieve it. Existing time... Continue Reading

325) USING TRIGONOMETRY AND PYTHAGORAS TO WATERMARK AN IMAGE

ABSTRACT The class presented here will place a watermark on an image. It takes a Bitmap object and returns another Bitmap with a string drawn diagonally (top-left to bottom-right) across it. An instance of the class is constructed with the actual text to place, font properties, maximum wanted font size (more on this in a bit), Color and... Continue Reading
Need help with your Computer Science Project Topic? Click here to request assistnce or reach us on + 234 813 0686 6500
whatsappWhatsApp Us