ABSTRACT Text encryption software to hide and encrypt data within a picture undetectable to others! This software allows you to hide text messages within a picture! You can use this software to store personal information, financial details and so forth embedded within a picture, and password protect! So you could even give someone a copy of your... Continue Reading
ABSTRACT A HTML editor is an authoring software program that is used to create content for web sites. HTML software is easy to use since it has a feature that is known as WYSIWYG. When you design web pages you want to use editor features that are simple to understand. You can buy and download HTML management software from the Internet as well as... Continue Reading
ABSTRACT In this paper, we propose a volume rendering method using grid computing for large-scale volume image. Grid computing is attractive because medical institutions and research facilities often have a large number of idle computers. A large-scale volume image is divided into sub-volumes and the sub-volumes are rendered using grid computing.... Continue Reading
ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable in-order byte-stream abstraction, but which is overly restrictive for image data. We analyze the progression of image quality at the receiver with time, and show that the... Continue Reading
ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment... Continue Reading
ABSTRACT Integrated speech engine (ISE) technology on a computer refers to the combination of text appearing on the computer display together with the computer speaking that text aloud with a digitized or synthesized voice. Digitized speech is a recorded (or digitized) human voice speaking, and synthesized voice is a computer-generated voice... Continue Reading
ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
ABSTRACT Inventory Management System is important to ensure quality control in businesses that handle transactions revolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good Inventory Management System will alert the retailer when it is time to reorder. Inventory... Continue Reading
ABSTRACT Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, but this is overly restrictive for image data. Our analysis shows that the in-order delivery abstraction provided by a TCP-based approach prevents the receiver application from processing and rendering portions... Continue Reading
ABSTRACT We implemented a distributed, peer-to-peer file system in Java using the Chord protocol for efficient location of files stored across a network. Chord is a distributed key lookup technique that scales logarithmically with an increase in the number of storage nodes. Initially, we discovered problems with the Chord algorithms, and... Continue Reading
ABSTRACT A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for instance, obtained... Continue Reading
ABSTRACT Libraries have been an important part of educational and information sector of any school. The success of any library largely depends on proper management. Several libraries have suffered failure as a result of inadequate management and incapacitations in handling sensitive information as regards members of the library. This... Continue Reading
ABSTRACT This study was carried out to verify al the manual processes involved in generating student’s transcript and to seek for a way of automating the system for a way of automating the system for effective operations. Since there is continues moves towards technological advances that enhanced productivity of labour and free human beings of... Continue Reading
ABSTRACT In Nigeria today, it is a well-known fact that mathematics is one of the subject that students find difficult to understand and pass for one reason or the other. The reason why students have this kind of problem very possible due to lack of good teachers and teaching, time of lecture and orientation. Some teachers might be good... Continue Reading
ABSTRACT The design and implementation of computer based stock exchange monitoring system. The purpose of this research work was to curb the inflationary possibilities of our economy, finance on recurrent budget deficit and improve the balance of payment position of the country. The design was base on developing a program that would counteract the... Continue Reading
ABSTRACT With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financial accounting to implore performance and accuracy. The principle aims of a... Continue Reading
ABSTRACT Most marketing, production, and manufacturing firms have the basic problem of information flow between the various departments within the organization. This research is intended to highlight the role of a computerized marketing information system in Guinness (Nig) Plc Compare to the manual system of marketing. To identify the various... Continue Reading
ABSTRACT As computational recourse become for use over the internet, a requirement has emerged to configure reviewers to an optional allration to cope with an unpredictable flow of incoming jobs this project describes all architecture that allows the dynamic reconfiguration of severs to process incoming jobs by switching severs between concept .... Continue Reading
ABSTRACT The Antenatal unit in the outpatient Department of any hospital letters for medical advices and treatments to payment mothers before delivery. Antenatal care is all about material and fetal care, to see that the baby is developing without malformation and giving mothers advice an what to eat, type of exercise needed scanning and pathology... Continue Reading
ABSTRACT The objective of this project work was the design and implementation of a computerized judicial system. The need arose due to the rigorous work involves in the judicial process and finally the end judgment. in this project work system design used pure module approach and normalized data structure that face litates easy usage and... Continue Reading
ABSTRACT This work has been designed to assist computer engineers to effectively diagnose problems in computer sub-systems, such as hard disk, floppy disk drives, monitors, keyboard, etc. Equipped with this system, the user can easily detect when a particularly subsystem is faulty. This program is developed with Qbasic programming language and is... Continue Reading
ABSTRACT Voting is a very important process in the Nigerian political system. It is one of the means and the most effective method of ensuring a legitimate government through popular participation. To enthrone sound democracy and stability in the political system of Enugu state, a system of refigure voting has to be put in place. The system would... Continue Reading
ABSTRACT The world is dynamic/versatile where nothing remains the same for too long. Information storage and retrieval was done manually decades ago. Today, it is been phased gradually in all areas of our day to day activities everything is undergoing computerization so there is need for auditing personnel auditing. In recognition, the work is... Continue Reading