The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication mechanism employs the traditional password-based authentication system which fails t...
CHAPTER ONE INTRODUCTION 1.1 Introduction Security on the Internet and on Local Area Networks is now at the forefront of computer network related issues. The evolution of networking and the Internet, the threats to information and networks have risen dramatically. Many of these threats have become cleverly exercised attacks causing damage or committing theft. The Internet�...
CHAPTER ONE INTRODUCTION 1.1BACKGROUND OF THE STUDY The importance of computer cannot be over emphasized with respect to designing and implementation in text editing package which could be in sciences, engineering, business or government etc. Consequently, computers are becoming indispensable. This is obviously true in developed countries; like Nigeria is gradually being gravitated into computer oriented society with professional engineers, analyst, design and implementation of some pa...
It is a software design for hospital to ease their work, instead of using paper now they can use software to do the work, it ease the of doctor and patient. Table ofContentsACKNOWLEDGEMENT....................................................................................................1ABTRACT..........................................................................................................................2CHAPTER 1.....................................................................
CHAPTER ONE1.0 INTRODUCTIONSoil contamination is one of the major environmental problems facing the world today.Contamination of soil by hydrocarbons (mostly petroleum hydrocarbons) is becomingprevalent worldwide (Njoku et al., 2008). This is probably due to heavy dependence onpetroleum as a major source of energy throughout the world, rapid industrialization,population growth and complete disregard for the environmental health. In Nigeria, oilpollution problems have been prevalent since the ...
ABSTRACT Computer security incident response is a management activity within the corporate governance framework of a business enterprise, and has become an important component of information technology (IT) programs for IT enabled business establishments. It provides the strategic direction for security activities and ensures objectives are achieved and protects day to day business operations. This research work provides a platform for enlightening and assisting organizations on the awareness...
ABSTRACT This paper discusses the review of a new solution algorithms and a comparative analysis of standard Simplex Method and the Push and Pull algorithms in solving Linear Programming problems. Linear Programming is a branch of Operation Research in the field of mathematics. As a result of the complicated nature of solving and determining accurate results from linear programming problems, various methods and algorithms have been developed to reduce the complications and increase efficienc...
ABSTRACT In other for a business/firm to get the best out of its employees and a high return on its investment in people, the human resources must be well managed. A good human resource management system brings consistency in human resource management practices and improves human relations in the company thereby enhancing individual/organizational effectiveness. With larger firms/organizations, it becomes increasingly difficult to manage a large number of human resources. Therefore, human r...
News rendering involves the representation of News in a suitable and usable manner essentially for better understanding. Over the years there has been severe interest in the ways by which this representation is being formulated. These concerns are majorly issues around the target audience especially children. Many approaches to re-render news objects to children have failed as they alter the semantics of the body of the contents. The difficulty has been a gap that necessitated the study. We ...
ABSTRACT Mobile phones are nowadays, far more than merely communication devices. In particular, Smartphones and Tablets are products that help to make our works and everyday life easier. Along with the advance in technology and popularity of these devices, the use of mobile applications increased enormously in the last few years. Based on new techniques like Global Positioning System (GPS) and sensors, li...
With the maturation of digital manufacturing technologies like 3-D printing, a new paradigm is emerging of distributed manufacturing in both scientific equipment and consumer goods. Hardware released under free licenses is known as free and open source hardware (FOSH). The availability of these FOSH designs has a large value to those with access to digital manufacturing methods and particularly for scientists with needs for highly-customized low-volume production products. It is challenging t...
Considering the topic “Awareness against rape, child trafficking and domestic violence” the modern technology would played a huge role of creating a great awareness to safe guard our loved ones from this monstrous disease that is afflicting almost every family in the world. This project work is mainly to create awareness against rape, child trafficking and domestic violence and also to give an overview of how these is affecting everyday life of the people and the negative and psychologica...
TABLE OF CONTENTS DECLARATIION.. ii APPROVAL.. iii DEDICATION.. iv ACKNOWLEDGEMENT.. v LISTS OF ACRONYMS. vi LIST OF TABLES. xi LIST OF FIGURES. xii ABSTRACT.. xiii CHAPTER ONE:1 INTRODUCTION.. 1 1.0 Introduction. 1 1.1 Background of the project.1 1.2 Back ground of UIAHMS. 2 1.2.1 Mission of UIAHMS. 3 1.2.2 Vision of UIAHMS. 3 1.2.3 Goal3 1.2.4 Core values of the institution. 3 1.2.5 The UIHMS library. 3 1.2.6 Collection of the library. 4 1.2.7 The library users at UIAHMS. 4 1.2.8 Service...
Researchers have shown that majority of the populace in the developing nations are rural dwellers that do not have access to basic financial services and are poor. This class of people are peasant farmers and petty traders who rely mostly on remittances from their wards and relations in major cities and abroad to meet their financial obligations at home. The methods of remittances are encumbered with challenges. Mobile money is a tool that allows individuals to make financial transactions...
Checking students for examination and attendance in a university environment is too cumbersome as a result of the increasing number of students. Private institutions especially are faced with problems of attaining accurate records of students’ attendance which normally involves circulating papers for students to sign in and sign out by registering their names on paper during examinations and this has proved to be stressful, time consuming, unreliable, inaccurate and inefficient. The study...