Works Under Computer Science

READING AND WRITING AVI FILE USING STEGANOGRAPHY

ABSTRACTThe video stream in an AVI file is nothing more than a sequence of bitmaps. This article is about extracting these bitmaps and re-building the stream, in order to hide a message in the video. Before reading this article, you should have read at least part one, Steganography - Hiding messages in the Noise of a Picture. This one uses the application described in parts 1-3, but you don’t need the extended features to understand it. TABLE OF CONTENTSTitle page ...

Save
Aka Possibility Premium 47 PAGES (4191 WORDS) Computer Science Project 882 Views
Real Time Application

AbstractThis research report mainly focus on real time application in real analogy, its classification, difference application areas of real time application and functionality. Special emphasis is placed on hard and soft real time application. Typical examples of real time applications include Air Traffic Control System, Air Bag System, Anti-Lock Brakes, Network Multimedia System and Mobile Phone Embedded System.  Real time application is becoming pervasive....

REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY (CASE STUDY OF PRESSURE WORLD CAFEE )

ABSTRACTMany techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multigrade authenticat...

Save
Aka Possibility Premium 41 PAGES (4415 WORDS) Computer Science Project 590 Views
REMOTE ELECTRICITY BILLING SYSTEM AUTOMATION AND IMPLEMENTATION -EJB (A CASE STUDY OF NEPA)

ABSTRACTWith the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of water billing system.Almost all the big organization are developing their billing system because of the extraordinary benefit resulting from information technology. Information technology has enabled water billing system to work successfully.  To ease the...

Save
Aka Possibility Premium 48 PAGES (4323 WORDS) Computer Science Project 1,221 Views
REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACTRemote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except simple ...

Save
Aka Possibility Premium 51 PAGES (6151 WORDS) Computer Science Project 820 Views
RETRIEVING FILES USING CONTENT BASED SEARCH

ABSTRACTContent Based File Search is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Windows XP and Vist...

Save
Aka Possibility Premium 31 PAGES (3626 WORDS) Computer Science Project 1,106 Views
ROLE OF COMPUTER IN THE BANKING SECTOR

ABSTRACTThis study explains the role of computer in the banking sector. It further describes the need and importance for banks make use of Micro Computers for effective utilization and storage of data. The use of computer in the banking sector can be an efficient tool in speeding up the process and cutting the price of creating and undertaking figure works. There are numerous benefits of Computer in the Banking Sector such as: Bring about simplicity in term of worrying condition. Reduce stres...

Save
Dude Lebowski Premium 19 PAGES (2845 WORDS) Computer Science Seminar 10,900 Views
SCALABLE AND EFFICIENT END TO END NETWORK TOPOLOGY INFERENCE

ABSTRACTTo construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topology among a group of hosts. Previously, Max-Delta has been proposed to infer a highly accurate topology with a low number of traceroutes. However, Max-Delta relies on a central server to collect traceroute results and to select paths for hosts to traceroute. It is not scalable to large groups. In this paper, w...

Save
Aka Possibility Premium 35 PAGES (4166 WORDS) Computer Science Project 537 Views
SEARCH-WEB BASE SEARCH ENGINE

ABSTRACTWeb base search engine is a Java application to find files that contain (or don’t contain) a given string. The string may be in plain text or it may be a Java regular expression. Such a trivial search should be part of the operating system, and in fact, once was. As bigger and more impressive features were added to Windows, it lost the ability to search files for arbitrary bytes of text. Windows 98/ME/2000 could find words buried in files with unknown formats; Windows XP and Vista s...

Save
Aka Possibility Premium 31 PAGES (3660 WORDS) Computer Science Project 662 Views
SECURE DATA HIDING AND EXTRACTION USING BPCS

ABSTRACTBit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation. This...

Save
Aka Possibility Premium 36 PAGES (5806 WORDS) Computer Science Project 960 Views

451 - 460 Of 512 Results