PROBLEM DESCRIPTION:
This project is all about hospital management. This complex project has the scope of adding new employees, doctors, admitting outpatients, fixing appointments etc. This project also displays Continue reading
Get Latest Final Year Computer Projects in your Email
PROBLEM DESCRIPTION:
This project is all about hospital management. This complex project has the scope of adding new employees, doctors, admitting outpatients, fixing appointments etc. This project also displays Continue reading
Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out to the usual. Many different carrier file formats can be used, but digital images are the most popular because of their Continue reading
A major approach for fingerprint recognition today is to extract minutiae from fingerprint images and to perform fingerprint matching based on the number of corresponding minutiae pairings. One of the most difficult problems in fingerprint recognition has been that the Continue reading
When a new product should be acquired, a model over its functionality is made. A quite new idea in the military area is to use simulations to find out Continue reading
There are more and more applications appearing for mobile devices. So far, a lot of them have focused on entertaining the user. However, there are good reasons to believe that Continue reading
Almost all the concepts which are there in hospital are included in this hospital management system. Modules under this software are appointment, patient details, treatment details, dosage, creditors details, billing, calculation of bills, reports and Continue reading
In this project three problems areas are studied related to embedded system and device driver programming: a GPS driver, the CAN Bus and study of graphics libraries suitable for Continue reading
Today, intrusion detection is one of the major concern in the task of network administration and security. There is a need to safeguard the networks from known vulnerabilities and at the same time take steps to detect new and unseen, but possible, system abuses by Continue reading
The main aim of the project is to provide a complete, ready to run, fully customizable website for listing and managing Continue reading
The number of hacking and intrusion incidents is increasing alarmingly each year as new technology rolls out. Unfortunately in today’s digitally connected world, there is no place to hide. DNS, NSlookup, Newsgroups, web site trawling, e-mail properties etc. are just some Continue reading
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the Continue reading