Computer science

See all documents

269 results

17 Aug 2009

Testing a software before release

Essay - 28 pages - Computer science

This presentation is aimed at providing a general idea of how a software is tested prior to its release. In doing so it will cover points like problems that may occur during testing, characteristics of testing such as test effectiveness and test adequacy, strategies that need to be adopted during...

17 Aug 2009

The changing trends of information technology and its compatibility with the economy

Thesis - 5 pages - Computer science

This case study looks at one of the most commonly discussed questions in the world of information technology and economics. Is the economy and Information Technology changing at the same pace and which one is influencing the other one to change? Another core aspect of this case study is looking...

14 Aug 2009

Using MS Office PowerPoint 2003

Essay - 15 pages - Computer science

This presentation will help in learning the basics of using MS PowerPoint. It will cover points like getting started with explanations of the menu bar and buttons, fundamentals of PowerPoint and editing and formatting presentations which covers entering and editing text along with aligning text....

13 Aug 2009

Ascertaining the use of agile methodology in Extreme Programming (XP) in the software development industry

Dissertation - 28 pages - Computer science

Software has been division of modern society since previous 50 years. There are many software development methodologies in use. Some companies have their own customized methodology for developing the software but majority of them speak about two kinds of methodologies: heavyweight and...

13 Aug 2009

A critical analysis of two 2006 information technology security surveys

Case study - 6 pages - Computer science

My analysis of two surveys - the 2006 Australian Computer Crime and Security Survey (AusCERT, 2006) and the Ernst and Young 2006 Global Information Security Survey (Ernst and Young Global Limited, 2006) will proceed systematically according to the following simple scheme, one that is motivated by...

13 Aug 2009

Motives, methods, and morals: Towards an informed anti-cheating policy in massively online multiplayer games

Thesis - 10 pages - Computer science

World of Warcraft and other massively multiplayer online games have become immensely popular in the past few years. Their growing popularity, advanced player-driven economies, and often reinforced social and political tendencies have yielded an interesting if troublesome set of problems....

11 Aug 2009

Emails and privacy

Case study - 7 pages - Computer science

The general notion among people is that email is a time of private communication. We have become so unaware of our surroundings that we think just because we are sitting in a room by ourselves, there is no one else there to see what we are doing. We seem to forget the fact that...

17 Jun 2009

E-Horoscope

Dissertation - 43 pages - Computer science

First, a horoscope is an astrological map of the heavens keyed to the time and place of a specific birth. It is a kind of a map that appears as a two dimensional chart. It shows positions of the Sun, the Moon, and planets at the precise moment of your birth. The earth moves from west to east...

17 Jun 2009

Asynchronous messaging services using Java

Dissertation - 47 pages - Computer science

Messaging Services provides asynchronous communication facility between two Business organizations. This system saves the time, money and reduces the man-power and both participant organizations may be benefited by each other. Consider two business organizations are an insurance company and the...

16 Jun 2009

Security using firewalls

Thesis - 6 pages - Computer science

In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the...

16 Jun 2009

Active character technology based on neural networks Genetic Algorithms and AI

Thesis - 7 pages - Computer science

A combination of Neural networks genetic algorithms and conventional computing in Multimedia and Gaming industry has never been attempted before. Existing technologies operate on fixed databases and manipulate limited data that is bound by some logical algorithm. Even many of the AI based...

16 Jun 2009

A look at cogeneration

Thesis - 14 pages - Computer science

Power is one of the basic requirements for the economic development of a country. The performance of various activities is dependent on the availability of adequate and reliable power supply. Our country has made a rapid progress in the field of electricity generation. Thermal power plants are a...

16 Jun 2009

Grid computing: Faster networking

Case study - 6 pages - Computer science

Today we are in the Internet world and everyone prefers to enjoy fast access to the Internet. But due to multiple downloading, there is a chance that the system hangs up or slows down the performance that leads to the restarting of the entire process from the beginning. This is one of the serious...

16 Jun 2009

Security and advantages of cluster computing over distributed systems

Thesis - 7 pages - Computer science

A cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. In the case Server, Cluster consists of two types of participant's dispatchers and servers. The goal of a cluster is to allow distributing of the computing load over the several...

16 Jun 2009

Authentication techniques: An overview

Thesis - 8 pages - Computer science

Authentication is a process by which one can prove the identity of a communicating partner and/or confirm the genuineness of a document. The process becomes a corner stone of security services in any applications ranging from “defense sector” to “grocery shop”. Initially,...

11 Jun 2009

Parellel performance modelling using a genetic programming based error correction procedure

Thesis - 6 pages - Computer science

Performance models of high performance computing (HPC) applications are important for several reasons. First, they provide insight to designers of HPC systems on the role of subsystems such as the processor or the network in determining application performance. Second, they allow HPC centers more...

11 Jun 2009

Providing mobility management in a heterogeneous wireless networks

Thesis - 5 pages - Computer science

Mobile Routers moving in a heterogeneous network environment can take advantage of the different, often complementing, characteristics of the various wireless network technologies. Satellite and cellular networks can provide wide coverage outside urban areas. However, the cost of communications...

11 Jun 2009

Cyber Terrorism: The darker side of internet applications

Thesis - 4 pages - Computer science

Cyber terrorism is the convergence of cyberspace and terrorism. Computers and the Internet are aggressively being used by many international terrorist groups. Although cyber terrorism attacks have not yet happened and also there is no such identified substantiation that terrorists are planning a...

11 Jun 2009

Growth of distributed systems using grid computing and softer aspects of E science

Thesis - 7 pages - Computer science

Grid computing and eScience are two major areas of growth of distributed systems. The grid concept refers to the virtualization of computing resources in the sense that end-users should have the illusion of using a single source of computing power without knowing the locality of the computation....

11 Jun 2009

Use of SOA and semantics for creating and retaining consistency in loosely coupled systems

Thesis - 5 pages - Computer science

The primary objective of service-oriented architecture (SOA) is to use information technology to address the key goals of business today: innovation, agility, and market value. Agility in SOA is achieved by use of the principles of encapsulation, modularity, and loose coupling. Loose coupling...

11 Jun 2009

A high level language abstraction for reconfigurable computing

Thesis - 7 pages - Computer science

The gain of SVC depends upon the type of reactive power load for optimum performance. As the load and input wind power conditions are variable, the gain setting of SVC needs to be adjusted or tuned. In this paper, an ANN based approach has been used to tune the gain parameters of the SVC...

11 Jun 2009

Sensor protocols for information via negotiation: A data centric routing protocol for wireless sensor networks

Case study - 6 pages - Computer science

The emergence of Wireless Sensor Networks (WSN) as one of the dominant technology trends in the coming decades has posed numerous challenges for researchers. These networks are likely to be comprised of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in...

11 Jun 2009

Idiosyncratic applications of data mining in E learning environments

Thesis - 5 pages - Computer science

Data Mining is a very popular and effective way of discovering new knowledge from large and complex data sets. Its benefits are its ability to gain deeper understanding of the patterns previously unseen using current available reporting capabilities. Internet education arose from traditional...

11 Jun 2009

Computer vision signal processing on graphics processing units

Thesis - 5 pages - Computer science

In some sense, computer graphics and computer vision are inverses of one another. Special purpose computer vision hardware is rarely found in typical mass-produced personal computers, but graphics processing units (GPUs) found on most personal computers, often exceed (in number of transistors as...

11 Jun 2009

Network technologies for cluster computing

Thesis - 12 pages - Computer science

A broad and growing range of possibilities are available to designers of a cluster when choosing an interconnection technology. As the price of network hardware in a cluster can vary from almost free to several thousands of dollars per computing node, the decision is not a minor one in...

11 Jun 2009

A new era in MPSOC at runtime for DES using RTOS 10- steps algorithm

Thesis - 3 pages - Computer science

This research paper is on the design methodology required to make intelligent decisions about the a new ERA AND APPRAOCH for MPSOC At Runtime using RTOS Algorithm. However we see that evidence of the soundness of the methodology by applying it on actual applications is a major requirement. This...

11 Jun 2009

Satellite link emulation

Thesis - 4 pages - Computer science

Herein is a research paper which depicts the use of emulation for testing purpose to illustrate the propagation of signals in the satellite communication. With the software NIST Net we could emulate any kind of links and get the results with actual packets in consideration. The procedure testing...

11 Jun 2009

Remote triggering based embedded servers for smart home environments

Thesis - 4 pages - Computer science

Smart home systems are expected to become key research area for ubiquitous and embedded system Computing in coming years. In this paper, a new scheme in smart home systems technology using Embedded server for providing intelligent control of home appliances is proposed. A wireless based Embedded...

09 Jun 2009

Content management with repository open service interface definition

Thesis - 7 pages - Computer science

Now days the term content management is the key issue with website's design, what to include what not to include is very crucial problem. Here, in this paper we have shown the way of managing content called assets, which may contain metadata, course materials, assessment items, images, videos...

09 Jun 2009

Data warehousing and data mining: Bringing pinpoint accuracy to sales

Thesis - 4 pages - Computer science

For most businesses, the primary means of growth involves the acquisition of new customers. This could involve finding customers who previously were not aware of your product, were not candidates for purchasing your product, or customers who in the past have bought from your competitors. Some of...

By continuing to browse, you agree that Oboolo.com may use cookies or equivalent technology to store and / or access information on your device. This personal information (such as your browsing data and your IP address) may be used to present you with personalized content; to measure advertising and content performance, and to learn more about your use of the site. You can configure your choices to accept cookies or not, or to oppose them when the legitimate interest is used. You can also change your preferences at any time by clicking on the "Cookie settings" link at the bottom of the page of this site. For more information, see our Privacy Policy