091-2230-8145     |      dataprojectng@gmail.com
1

1. SATELLITE TELEVISION CHANNELS PREFERENCE AMONG YOUTHS

Background to the Study

With the shrinking of the world into a global village through the increasing sophistication of communication technologies, the local media in a nation is brought under fierce competition for local audience by the global media. What broadcasting d...

Read more

2. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

3. ONLINE MARKETING'S EFFECT ON REAL ESTATE BUSINESS

​​​​​​​Background of the study

Over the past decade, there has been a spectacular increase in the usage of the Internet, and more specifically the World Wide Web. This rise has had an influence on virtually every aspect of daily life in industrialized c...

Read more

4. ASSESSMENT OF ONLINE MARKETING AND ITS INFLUENCE ON REAL ESTATE BUSINESS

Background of the study

Over the past ten years, there has been a spectacular increase in the usage of the Internet, and more specifically the World Wide Web. This rise has had an influence on practically every aspect of daily life in industrialised cul...

Read more

5. PROSPECTS AND CHALLENGES OF MOBILE BANKING IN NIGERIA  

ABSTRACT

Today, the advancement of mobile technologies has provided an opportunity for financial service providers in introducing new financial innovations. One of the emerging financial innovations introduced by financial providers is mobile banking or m-banking. This...

Read more

6. TRIPLY ENTRY ACCOUNTING SYSTEM AND FINANCIAL REPORTING

INTRODUCTION

Modern financial accounting is based on a double entry system. Described simply, double entry bookkeeping allows firms to maintain records that reflect what the firm owns and owes and also what the firm has earned and spent over any given p...

Read more

7. DESIGN AND IMPLEMENTATION COMPUTERIZED DATA ENCRYPTION SYSTEM

BACKGROUND OF THE STUDY

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or e...

Read more

8. DEVELOPMENT OF A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE IN DISCRETE ORTHONORMAL STOCKWELL TRANSFORM DOMAIN BASED ON PHOTON POLARIZATION

Excerpt from the Study

This study focused on the development of novel digital image watermarking technique in DOST domain in conjunction with DWT and SVD based on the principle of photon polarization using optimal scaling factor. The developed algorithm is applied on co...

Read more

9. Understanding and Exploiting Design Flaws of AMD Secure Encrypted Virtualization

Abstract

Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...

Read more

10. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more
whatsapp