Works Under Computer Science

Seminar On Cryptography

Abstract Cryptography is the practice and study of techniques for secure communication and has become so powerful that messages scrambled with it are virtually undecipherable, like many powerful technologies, this is a double -edge sword. In Cryptography,encryption can keep emails, financials transaction and electronic commerce over the internet, s...

SEMINAR PRESENTATION ON CARNIVORE SOFTWARE

ABSTRACTA carnivore is controversial program that is developed by the Federal Bureau of Investigation in US (United State) by which they are able to access the email activities of the person suspected. It was the third generation software of online detection. The FBI (Federal Bureau of Investigation) uses to configure the hardware with IP (Internet Protocol) address of software through which carnivore captures packets from a particular location. A carnivore is used to work on a phenomena of s...

Save
ALAKETU OLAMILEKAN Premium 22 PAGES (5499 WORDS) Computer Science Seminar 428 Views
SHORTEST NODEFINDER IN WIRELESS AD HOC NETWORK

ABSTRACTAd hoc networking is emerging as today and future requirement for dynamic and mobile wireless communication. For fast connections the refugee node needs a path where it can avail the best throughput by means of connections created on the fly, for single time usage or on short-term basis. In this paper we have focused on the scenario of introducing the physical shortest path for the selection of best route offering the fast connection and greater throughput.TABLE OF CONTENTTITLE PAGE&n...

Save
Aka Possibility Premium 42 PAGES (4674 WORDS) Computer Science Project 621 Views
SIMULATION OF A NETWORK MONITORING SYSTEM

ABSTRACTThis project topic “Simulation of a Network Monitoring System” was carried out with a view to deploying effective monitoring for computers in a local Area Network. The project developed a system that lets administrators remotely monitor computers in a network. Our aim is to show how user interface can be applied to provide a complete solution for monitoring networks. Securing and  monitoring a network is an important issue since computers connected in a network can be faulty ...

Save
ALAKETU OLAMILEKAN Premium 41 PAGES (6982 WORDS) Computer Science Project 442 Views
SMART KNOWLEDGE PROVIDER

ABSTRACTThe Smart Knowledge Provider and the CAD use a mutual active authentication protocol to identify each other. The card generates a random number and sends it to the CAD, which encrypt the number with a shared encryption key before returning it to the card. The card then compares the returned result with its own encryption. The pair may then perform the operation in reverse. Once communication is established, each message between the pair is verified through a message authentication cod...

Save
Aka Possibility Premium 39 PAGES (5170 WORDS) Computer Science Project 702 Views
STACK IP: NEW PACKET MARKETING AND FILTERING MECHANICS FOR DDOS AND IP SPOOFING DEFENSE

ABSTRACTNetwork administrators need a thorough understanding of both types of addressing to administer Transmission Control Protocol/Internet Protocol (STACK IP) networks and troubleshoot STACK IP-based communication. This chapter discusses in detail the types of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) addresses, how they are expressed, and the types of unicast addresses assigned to network node interfaces. We demonstrate that the dynamic behavior of queue an...

Save
Aka Possibility Premium 49 PAGES (4666 WORDS) Computer Science Project 637 Views
STATISTICAL TECHNIQUES FOR DETECTING TRAFFIC ANOMALIES THROUGH PACKET HEADER DATA

ABSTRACTThis paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks, have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies and to take action to contain the attacks appropriately before...

Save
Aka Possibility Premium 32 PAGES (4139 WORDS) Computer Science Project 565 Views
STEGANOGRAPHY – AN ART OF HIDING DIGITAL INFORMATION

ABSTRACTText encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your videos and they would never know it had your personal information on it! Or, if you want more privacy when sending e-mails, encrypt a message in a pictur...

Save
Aka Possibility Premium 51 PAGES (4999 WORDS) Computer Science Project 607 Views
Student database

This is a topic that deals with student database that is the student bio data and so on

Student’s Attendance System

This project is about developing a system, Student’s Attendance System using fingerprint technology. The Attendance system can be used by the university to digitally manage student’s attendance in class or examinations. This system focuses on registering the student’s attendance and report generation. This is achieved by designing a Visual Studio 2010 VB.NET based program for the registration, report generation and attendance taking with the aid of a fingerprint scanner, and a database ...

Save
Aliyu Usman 43 PAGES (7615 WORDS) Computer Science Project 837 Views

461 - 470 Of 512 Results