Computer Science Project Topics and Materials (Page 81)

Showing 2,001 - 2,025 of 2,678

2,001) WINDOWS MULTI FILE SEARCH UTILITY

ABSTRACT Windows multi file search utility is a framework application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to... Continue Reading

2,002) WIRELESS TRAFFIC VIEWER USING J2ME

ABSTRACT Real time data and information processing and transmission is the bane of the modern day information technology concepts. [J2ME] phones can monitor real-time traffic video realization that This document is the realization of Mobile Traffic Cam Viewer, Electronic devices connect to one another in a variety of ways: A cable connects a... Continue Reading

2,003) WEB BASED CREDIT CARD SYSTEM

ABSTRACT credit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder's promise to pay for these goods and services.[1] The issuer of the card creates a revolving account and grants a line of credit to the consumer (or the user) from which the user can borrow... Continue Reading

2,004) WEB BASED ADMINISTRATION OF LINUX SERVER

ABSTRACT This project is all about Web based administration of linux server which is focus on the administrative aspect of the company and also it gives each member access to his/her own corporate environment which will not affect the environment of the other staff in a company. In this kind of system all the staff of the company have access to... Continue Reading

2,005) WATERMARK BASED DIGITAL RIGHT MANAGEMENT

ABSTRACT The business of content providers is being threatened by technology advances in hardware, software and IP networks resulting in an increasing amount of illegal copies available online as well as offline. Digital rights management standards are being developed for the digital content and digital watermarking, a popular technique for... Continue Reading

2,006) WAP BASED INFORMATION RETRIEVAL SYSTEM (CASE STUDY OF NATIONAL ARCHIVES ENUGU)

ABSTRACT One of the challenges of modern information retrieval is to rank the most relevant documents at the top of the large system output. This calls for choosing the proper methods to evaluate the system performance. The traditional performance measures, such as precision and recall, are based on binary relevance judgment and are not... Continue Reading

2,007) DESIGN AND IMPLEMENTATION OF E-LIBRARY SYSTEM (A CASE STUDY OF UNIVERSITY OF PORT-HARCOURT)

ABSTRACT Libraries have been an important part of educational and information sector of any school or community. The success of any library largely depends on proper management. Several libraries have suffered failure as a result of inadequate management and incapacitations in handling sensitive information as regards members of the library. ... Continue Reading

2,008) DESIGN AND IMPLEMENTATION OF AN ONLINE BARCODE ATTENDANCE SYSTEM

ABSTRACT Attendance is very important in every student. a single absent make a big difference in performance in the school. Most students of high school are prone to absence from classes claiming that the class is boring. Others due to laziness fail to attend classes, having preference of going to computer shops or playing games while some... Continue Reading

2,009) DESIGN AND IMPLEMENTATION OF A VISITOR MANAGEMENT SYSTEM

ABSTRACT In this computer technology world the impact of IT contributes major roles in all real time system. Various management systems implemented for achieving the business organization towards profit, standards, and further business enhancement. The main aim of this research is to implement a web based system that can secure the information’s... Continue Reading

2,010) DESIGN AND IMPLEMENTATION OF A WEB BASED LIBRARY INFORMATION SYSTEM (A CASE STUDY OF GODFREY OKOYE UNIVERSITY)

ABSTRACT In Godfrey Okoye University, library management and administration is a very manual one in the sense that the information management methods are mostly done using the file system, students access to library resources are heavily manual, and that the library catalogue is done using the file system. As a result, accidents of data loss are... Continue Reading

2,011) DESIGN AND IMPLEMENTATION OF TRAFFIC OFFENCE TRACKING SYSTEM

ABSTRACT Traffic Offence Tracking System is a useful web based and database program that records all the traffic offences committed nationwide. The system helps the Federal Road Safety Commission to keep adequate records of all traffic offences that has been committed, the offender details and penalty payment made. It also helps to heck financial... Continue Reading

2,012) DESIGN AND IMPLEMENTATION OF MEDICAL DIAGNOSTIC FOR AVIAN FEVER (INFLUENZA) IN NIGERIA

ABSTRACT This project, Expert System on Avian and Fever Diagnosis, is a software system tailored for use in the Diagnosis of Avian Fever Diseases. The software is an expert system with a database containing an expert knowledge. The user only uses it to determine whether he or she has any of the diseases within its domain and also Present expert... Continue Reading

2,013) COMPUTERISED HOSTEL ALLOCATION SYSTEM

ABSTRACT This project examines and addresses the problems and challenges facing student’s registration in Godfrey Okoye University, Enugu. The objective of this research work is to find out solutions to the challenges facing the bulk paperwork of student’s hostel allocation in the university. At the end of the study, it is concluded that to an... Continue Reading

2,014) TELECOM INVENTORY MAINTENANCE SERVICES APPLICATION WITH ERROR TRACKING

ABSTRACT One of the more popular benefits to outsourcing your maintenance is the ability to improve department focus. Being able to outsource your facility maintenance lets your employees focus more on their higher priority tasks and operational issues. When it comes down to it, facility maintenance should be worry free and reduce stress on both... Continue Reading

2,015) STEGANOGRAPHY – AN ART OF HIDING DIGITAL INFORMATION

ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your... Continue Reading

2,016) DESIGN AND IMPLEMENTATION OF TELECOM INVENTORY MAINTENANCE AND SERVICES APPLICATION WITH ERROR TRACKING (A CASE STUDY OF GLOBACOM ENUGU BRANCH)

ABSTRACT In our present society, communication is more or less that people cannot – do – without. People always say and the strength of every successful business generally depends on it. The impact of this can be felt in the life of area, homes and government establishment, without adequate communication network every activity is useless... Continue Reading

2,017) STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA

ABSTRACT This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient... Continue Reading

2,018) STACK IP: NEW PACKET MARKETING AND FILTERING MECHANICS FOR DDOS AND IP SPOOFING DEFENSE

ABSTRACT Network administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses,... Continue Reading

2,019) SMART KNOWLEDGE PROVIDER

ABSTRACT The Smart Knowledge Provider and the CAD use a mutual active authentication protocol to identify each other. The card generates a random number and sends it to the CAD, which encrypt the number with a shared encryption key before returning it to the card. The card then compares the returned result with its own encryption. The pair may... Continue Reading

2,020) SHORTEST NODEFINDER IN WIRELESS AD HOC NETWORK

ABSTRACT Ad hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of... Continue Reading

2,021) AUTOMATIC DEPENDENT SURVEILLANCE BROADCASTING (ADSB)

ABSTRACT ADS-B, which consists of two different services ADS–B Out and ADS–B In, will be replacing radar as the primary surveillance method for controlling aircraft worldwide. In the United States, ADS-B is an integral component of the NextGen National Airspace strategy for upgrading/enhancing aviation infrastructure and operations. The ADS-B... Continue Reading

2,022) SCALABLE AND EFFICIENT END TO END NETWORK TOPOLOGY INFERENCE

ABSTRACT To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topology among a group of hosts. Previously, Max-Delta has been proposed to infer a highly accurate topology with a low number of traceroutes. However, Max-Delta... Continue Reading

2,023) SEARCH-WEB BASE SEARCH ENGINE

ABSTRACT Web base search engine is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the... Continue Reading

2,024) SECURE DATA HIDING AND EXTRACTION USING BPCS

ABSTRACT Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In... Continue Reading

2,025) DESIGN AND IMPLEMENTATION OF SELECTIVE ENCRYPTION OF STILL IMAGE (CASE STUDY OF WOMAN OF FAITH)

ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the... Continue Reading
Need help with your Computer Science Project Topic? Click here to request assistnce or reach us on + 234 813 0686 6500
whatsappWhatsApp Us