Works Under Computer Science

A VIRTUAL PRIVATE NETWORK USING JAVA 9 (A CASE STUDY OF UBA ENUGU)

ABSTRACTA Virtual Private Network using JAVA 9 (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization to ensure security in the organization. It encapsulates data transfers between two or more networked devices which are not on the same private...

Save
Aka Possibility Premium 57 PAGES (5630 WORDS) Computer Science Project 626 Views
ACTIVE SOURCE ROUTING PROTOCOL FOR MOBILE AD HOC

ABSTRACTActive networking is the emerging technology that will provide new network environment where lots of potential applications can be enhanced and developed. Current IP network is somehow good at simple packet forwarding, but it desperately needs some flexibility to support QoS and has to meets some restraint in certain environment. Active packets allow many functionalities with great flexibility, however way too slow for data forwarding. To realize best performance in wireless environme...

Save
Aka Possibility Premium 33 PAGES (4372 WORDS) Computer Science Project 586 Views
AID OF COMPUTERS

With the outbreak of the computer age in almost all areas of our world, computers had become essential tools in the progress of a nation and aided men throughout the course of history and this very moment, they can be found from a house kitchen to the busy streets of the urban world. Since it can process facts faster and more effective than ever, man has derived many functions from these machines ...

Save
Emmanuel Gabriel Premium 4 PAGES (1655 WORDS) Computer Science Seminar 0 Views
AN ANALYSIS OF A VIRTUAL LIBRARY SYSTEM (CASE STUDY OF NATIONAL LIBRARY OF NIGERIA, ENUGU STATE)

ABSTRACTThe term virtual library is diffuse enough to be applied to a wide range of collections and organizations, but to be considered a virtual library, a virtual collection of information must be managed by and made accessible to a community of users. Thus, some web sites can be considered virtual libraries, but far from all. Many of the best known virtual libraries are older than the web including Project Perseus, Project Gutenberg, and ibiblio. Nevertheless, as a result of the developmen...

Save
Aka Possibility Premium 45 PAGES (5669 WORDS) Computer Science Project 664 Views
AN ANTI PHISHING STRATEGY BASED ON VISUAL SIMILARITY ASSESSMENT

ABSTRACTAnti-phishing strategy uses visual characteristics to identify potential phishing sites and measure suspicious pages similarity to actual sites registered with the system. The first of two sequential processes in the SiteWatcher system runs on local email servers and monitors emails for keywords and suspicious URLs. The second process then compares the potential phishing pages against actual pages and assesses visual similarities between them in terms of key regions, page layouts, and...

Save
Aka Possibility Premium 32 PAGES (3414 WORDS) Computer Science Project 599 Views
AN ASSESSMENT OF METHODS OF TEACHING COMPUTER COURSES TO COMPUTER SCIENCE STUDENTS IN SELECTED NIGERIAN POLYTECHNICS

ABSTRACTThe study focuses on the methods of teaching computer courses to computer science major in selected Nigeria polytechnics.It examines the background, methods of teaching, tools and equipments use in teaching computer courses to computer science major. The primary data for the study were generated from well structured question broadcasted to random samples of 70 out of 200 NDII students from federal polytechnic Nekede and Abia State Polytechnic and supported with interviews. Frequency l...

Save
IKenna Gerald Premium 76 PAGES (7503 WORDS) Computer Science Project 294 Views
AN ASSESSMENT ON THE ACTIVITIES OF FRAUDSTERS USING ATM PIN

ABSTRACT  The use of ATM has grown rapidly in popularity because of its low banks transaction  costs and customers convenience which has made it a basic element of today’s financial service delivery. However, the ATM which is meant to be serving the customers better is now becoming a nightmare for some customers because of fraud perpetuated in their accounts through ATM withdrawals. The main purpose of this work is to examine the activities of fraudsters through ATM pin and h...

Save
Adewale Adekunle Premium 90 PAGES (5231 WORDS) Computer Science Project 9 Views
AN EVALUATION OF MULTIMEDIA SYSTEMS

ABSTRACTThe multimedia application user can use sound right off the bat on both the Macintosh and on a multimedia PC running Windows because beeps and warning sounds are available as soon as the operating system is installed. On the Macintosh you can choose one of the several sounds for the system alert. In Windows system sounds are WAV files and they reside in the windows\Media subdirectory. Sound is perhaps the most important element of multimedia. It is meaningful “speech” in any langu...

Save
Aka Possibility Premium 45 PAGES (5339 WORDS) Computer Science Project 716 Views
ANALYSIS OF ONLINE EXAMINATION REGISTRATION SYSTEM

ABSTRACTThe process of examination pre-registration is aimed to obtain accurate information on the intended candidates individually and collectively. These information are used to make a multitude of decisions such as the nature and structure of examination questions, categories and number of expected candidates, and other information which might be personal such as bio information. Unless a sufficiently accurate and efficient methods are used for  the data ...

Save
ERC RESOURCES Premium 27 PAGES (6258 WORDS) Computer Science Seminar 9 Views
ANTI-VIRUS

ABSTRACTBringing it to a layman, an Anti-virus can be explained as the cure to virus and viral infections in the computer system. Though virus has been identified to be existing and causing harms in various forms, there are a variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-ca...

Save
Aka Possibility Premium 32 PAGES (3524 WORDS) Computer Science Project 689 Views

11 - 20 Of 512 Results