Computer and Information Science Research Papers/Topics

Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

The  tumultuous  increase  in  ATM  attacks  using  eavesdropping,  shoulder-surfing,  has  risen  great  concerns.  Attackers  often  target  the  authentication stage where a customer may be entering his login information on the ATM and  thus  use  direct  observation  techniques  by looking  over the  customer's shoulder to steal his passwords. Existing authentication mechanism employs the  traditional  password-based  authentication  system  which  fails  t...

NETWORK BASED SECURITY INFORMATION SYSTEM

CHAPTER ONE INTRODUCTION 1.1    Introduction Security on the Internet and on Local Area Networks is now at the forefront of computer network related issues.  The  evolution  of  networking  and  the  Internet,  the  threats   to   information   and   networks   have   risen   dramatically.   Many   of   these   threats   have   become   cleverly    exercised    attacks    causing    damage    or    committing   theft.   The   Internet�...

Design and implementation of a Simple word processor

CHAPTER ONE INTRODUCTION 1.1BACKGROUND OF THE STUDY  The importance of computer cannot be over emphasized with respect to designing and implementation in text editing package which could be in sciences, engineering, business or government etc.   Consequently, computers are becoming indispensable. This is obviously true in developed countries; like Nigeria is gradually being gravitated into computer oriented society with professional engineers, analyst, design and implementation of some pa...

Wireless Health Care Automated for Arewa Medical Hospital

It is a software design for hospital to ease their work, instead of using paper now they can use software to do the work, it ease the of doctor and patient. Table ofContentsACKNOWLEDGEMENT....................................................................................................1ABTRACT..........................................................................................................................2CHAPTER 1.....................................................................

Phytoremediation of Crude Oil Contaminated Soil with Carpet Grass (Axonopuscompressus) in the Niger Delta Region of Nigeria

CHAPTER ONE1.0 INTRODUCTIONSoil contamination is one of the major environmental problems facing the world today.Contamination of soil by hydrocarbons (mostly petroleum hydrocarbons) is becomingprevalent worldwide (Njoku et al., 2008). This is probably due to heavy dependence onpetroleum as a major source of energy throughout the world, rapid industrialization,population growth and complete disregard for the environmental health. In Nigeria, oilpollution problems have been prevalent since the ...

A GUIDE TO ENHANCING BUSINESS CONTINUITY USING COMPUTER SECURITY INCIDENT RESPONSE MANAGEMENT SYSTEMS

ABSTRACT Computer security incident response is a management activity within the corporate governance framework of a business enterprise, and has become an important component of information technology (IT) programs for IT enabled business establishments. It provides the strategic direction for security activities and ensures objectives are achieved and protects day to day business operations. This research work provides a platform for enlightening and assisting organizations on the awareness...

A Review on a Simplified Alternative Algorithm to the Simplex Method for Solving Linear Programming Problems

ABSTRACT This paper discusses the review of a new solution algorithms and a comparative analysis of standard Simplex Method and the Push and Pull algorithms in solving Linear Programming problems. Linear Programming is a branch of Operation Research in the field of mathematics. As a result of the complicated nature of solving and determining accurate results from linear programming problems, various methods and algorithms have been developed to reduce the complications and increase efficienc...

IMPLEMENTATION OF HUMAN RESOURCE MANAGEMENT SYSTEM BASED ON CLOUD COMPUTING PRINCIPLES

ABSTRACT In other for a business/firm to get the best out of its employees and a high return on its investment in people, the human resources must be well managed. A good human resource management system brings consistency in human resource management practices and improves human relations in the company thereby enhancing individual/organizational effectiveness. With larger firms/organizations, it becomes increasingly difficult to manage a large number of human resources. Therefore, human r...

A review of documented findings on Text Summarization for Children news rendering

News rendering involves the representation of News in a suitable and usable manner essentially for better understanding. Over the years there has been severe interest in the ways by which this representation is being formulated. These concerns are majorly issues around the target audience especially children. Many approaches to re-render news objects to children have failed as they alter the semantics of the body of the contents. The difficulty has been a gap that necessitated the study. We ...

Design and Implementation of a Campus Navigation System

  ABSTRACT Mobile phones are nowadays, far more than merely communication devices. In particular, Smartphones  and Tablets are  products  that  help  to  make  our  works  and  everyday  life  easier.  Along  with  the advance  in  technology  and  popularity  of  these  devices,  the  use  of  mobile  applications  increased enormously  in  the  last   few years.  Based  on  new  techniques  like  Global Positioning System (GPS)  and  sensors,  li...

Quantifying the Value of Open Source Hard-ware Development

With the maturation of digital manufacturing technologies like 3-D printing, a new paradigm is emerging of distributed manufacturing in both scientific equipment and consumer goods. Hardware released under free licenses is known as free and open source hardware (FOSH). The availability of these FOSH designs has a large value to those with access to digital manufacturing methods and particularly for scientists with needs for highly-customized low-volume production products. It is challenging t...

AWARENESS AGAINST RAPE

Considering the topic “Awareness against rape, child trafficking and domestic violence” the modern technology would played a huge role of creating a great awareness to safe guard our loved ones from this monstrous disease that is afflicting almost every family in the world. This project work is mainly to create awareness against rape, child trafficking and domestic violence and also to give an overview of how these is affecting everyday life of the people and the negative and psychologica...

DESIGNING VIRTUAL REFERENCE SERVICE SYSTEM

TABLE OF CONTENTS DECLARATIION.. ii APPROVAL.. iii DEDICATION.. iv ACKNOWLEDGEMENT.. v LISTS OF ACRONYMS. vi LIST OF TABLES. xi LIST OF FIGURES. xii ABSTRACT.. xiii   CHAPTER ONE:1 INTRODUCTION.. 1 1.0 Introduction. 1 1.1 Background of the project.1 1.2 Back ground of UIAHMS. 2 1.2.1 Mission of UIAHMS. 3 1.2.2 Vision of UIAHMS. 3 1.2.3 Goal3 1.2.4 Core values of the institution. 3 1.2.5 The UIHMS library. 3 1.2.6 Collection of the library. 4 1.2.7 The library users at UIAHMS. 4 1.2.8 Service...

A Prototype Mobile Money Implementation in Nigeria

Researchers have shown that majority of the populace in the developing nations are rural dwellers that do not have access to basic financial services and are poor. This class of people are peasant farmers and petty traders who rely mostly on remittances from their wards and relations in major cities and abroad to meet their financial obligations at home. The methods of remittances are encumbered with challenges. Mobile money is a tool that allows individuals to make financial transactions...

Assessing the Value of a Computerised Biometric System for Screening Examination and Checking Attendance of Students in a University Environment: A Case of Pentecost University College

Checking students for examination and attendance in a university environment is too cumbersome as a result of the increasing number of students. Private institutions especially are faced with problems of attaining accurate records of students’ attendance which normally involves circulating papers for students to sign in and sign out by registering their names on paper during examinations and this has proved to be stressful, time consuming, unreliable, inaccurate and inefficient.  The study...


136 - 150 Of 156 Results