Proactive and Reactive MANET Protocols Analysis Our goal in this Masters thesis is to evaluate the performance of Proactive and Reactive MANET protocols. These protocols have different behaviors for…
Example Computer Science Dissertations
Search here to find a specific article or browse from the list below:
MapReduce for Distributed Computing The purpose of the thesis is to research about the possibility of using a MapReduce framework to implement Hadoop. Now all this is possible by the…
Visual Information Encryption by D-H Key Agreement Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and…
H.264 Video Streaming System on Embedded Platform This report presents the integration of a video streamer module into a baseline H.264/AVC encoder running a TMSDM6446EVM embedded platform.
Analysis of the Security Management Market in Hong Kong Security management is the combination of hardware, software, and services that normalizes, aggregates, correlates, and visualizes data from disparate…
Impact of the Technological Revolution The role of technological revolution has touched every aspect of people’s lives from shopping to banking. The changes have great impact on services…
Effects of Social Networking on Everyday Life Today, the most popular and common topic of many discussions are social networking websites. The Internet connected us, made ​​us even more…
Security Issues in Peer-to-peer Networking This dissertation is all about the security issues in the peer-to-peer networks. There are many security issues in peer-to-peer networks.
Development for an Reliable Internet Service Application The ultimate aim of our project is to provide the design and development for an reliable internet service application which workable on the WAP enabled…
Public Class Login Form in VB Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles okButton2.Click
Design of 4 Line Private Exchange Box The main aim of this project is to design and implement a 4 line private exchange box that is able to create connection between four different telephone…
Practices of Agile Methods in Project Management The paper is divided into four parts. In the first part an overview of the project management and its processes and knowledge areas discussed…
Analysis of Performance Appraisal System Purpose of the study is to identify whether the management people who are working in the head office are convinced or not with performance appraisal…
Password Management System Advantages and Disadvantages The aim of this project is to analyze and test a standard password generator system and propose a technique for helping people to remember strong…
Optical Character Recognition (OCR) Optical Character Recognition (OCR) is the mechanical or electronic interpretation, reading of images of handwritten, typewritten or printed text…
Concepts of Object Oriented Techniques with OO Issues This paper sought to 1) define the concepts of object oriented techniques in addition with the OO issues, development techniques and concepts of object…
Mobile Messaging System Development for Higher Education Mobiles are one of the most versatile electronics in the present scenario. It constantly keeps us connected with our near ones even when we are…
Mobile Ad Hoc Networks MANET Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in…
Characteristics of Java Language Initially java language is named as “Oak” in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java.
Analysis of Botnet Security Threats What are the main differences between centralized and decentralized botnets? What is the best and efficient general extensible solution for detecting…
Intelligent Software Agent Intelligence refers to the ability of the agent to capture and apply domain specific knowledge and processing to solve problems. An Intelligent Agent…
Incident Handling on Cloud Computing Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites.As cloud computing…
Human Resource Management System for Resume Processing The main aim of is human resource management system is automating the resume processing for organization that is applied by the candidates.
Evolution of Smart Homes Smart home technology is still in its early stage and has failed to achieve anticipated results. Satisfying the need of user is the major challenge…
Six Thinking Hats Model for Learning Tool The aim of this project is to implement an effective discussion tool by using six thinking hats model as the mechanism.