Church Information system

Church Information system Church Information system is a free church database network application written in PHP at front end and MySQL at back end. This membership and management database is designed specifically to help automate the operation of a church. It has features to track members, families, groups, donations, etc. It can be a good Project for Computer science, IT,… Read moreChurch Information system

User Level Router

User Level Router Sr.no Contents Pg No 1. Problem Statement and analysis.        1 2. Problem Solution Methodology and Architecture.     2 3. Tools, Technologies and Languages. 4 4. Logical Decomposition of Project. 5 5. Work done so far.       7 6. Proposed Work to be done in next semester. 9 7. Schedule and division of labor.          10 8. Resources Pages. 11 9…. Read moreUser Level Router

Ppt presentation on Computer Crime, Ethics and Security

Ppt presentation on Computer Crime, Ethics and Security ï‚¡ Computer crime is defined by Association of Information Technology Professionals as including  1) The unauthorised use, access, modification & destruction of hardware, software, data or network resources. 2) The unauthorised release of information, 3) The unauthorised copying of Software, 4) Denying an end user access to his/her own hardware, software, data… Read morePpt presentation on Computer Crime, Ethics and Security

Partial Eight Direction Based Line Segmentation Algorithm for Epigraphical Script Images

Line segmentation is essential for character segmentation in Optical Character Recognition (OCR) system. Partial eight direction based line segmentation algorithm is devised for segmenting overlapped text lines in a document. The Base Line and the Supplementary Reference Lines are derived for extracting the Core Text Line Region containing the complete text line. Multistage Graph and Partial Eight directions are employed… Read morePartial Eight Direction Based Line Segmentation Algorithm for Epigraphical Script Images

Biometeric Technologies

Biometric technology are used to accurately identify and verify an individual’s identity. This involves identifying his physiological and behavioral characteristics. Biometrics, in general, refers to the study of biological characteristics. With reference to computer security, it refers to authentication technique using biological characteristics that are measurable or identifiable, and unique to an individual.   Biometric methods of identification are currently… Read moreBiometeric Technologies

Cluster Computing setup with different hardware & performance analysis

Cluster Computing setup with different hardware & performance analysis   This paper is aimed at setting up a for node cluster physically and study the performance analysis increasing cluster node in parallel processing. The study is towards to build low cost clusters towards moderately high cost clusters to work as servers. The analysis is for performance evaluation increase in performance… Read moreCluster Computing setup with different hardware & performance analysis

Paper Presentation On Digital jewellery

Paper Presentation On Digital jewellery Mobile computing is beginning to break the chains that tie us to our desks, but many of today’s mobile devices can still be a bit awkward to carry around. In the next age of computing, there will be an explosion of computer parts across our bodies, rather than across our desktops. Basically, jewellery adorns the… Read morePaper Presentation On Digital jewellery