091-2230-8145     |      dataprojectng@gmail.com
1

1. AN EVALUATION OF ROLE OF THE MEDIA AND NATIONAL SECURITY IN NIGERIA

 Background to Study

The mass media comprises the means by which a society disseminates and receives information. The traditional instruments of the mass media to the modern man are the newspapers, magazines, radio and television. The Journalist is...

Read more

2. SECURITY CHALLENGES AND COPING STRATEGIES OF UNIVERSITY LIBRARIES FOR EFFECTIVE SERVICE DELIVERY IN ENUGU STATE

Background Of The Study

Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...

Read more

3. SECURITY CHALLENGES AND COPING STRATEGIES OF UNIVERSITY LIBRARIES FOR EFFECTIVE SERVICE DELIVERY IN ENUGU STATE

Background Of The Study

Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...

Read more

4. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM

INTRODUCTION

The interconnection of computer with other related office equipments are finding increasing application in almost all field of human endeavour most especially the financial

 sector. More and more banks are introducing the us...

Read more

5. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

6. DESIGN AND IMPLEMENTATION OF RESULT PROCESSING SYSTEM

INTRODUCTION

A student’s result is the criteria for the measurement of the student’s capability in terms of academic work in the school. It is also used to measure a student’s capability in each subject offered by the student. Without an adequate resul...

Read more

7. Design and Implementation of an Intrusion Tolerant System

Abstract

The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...

Read more

8. DESIGN AND CONSTRUCTION OF AN INTRUDER DETECTOR FOR OFFICE AND HOME USE

Background of Study

Environmental, home and office security against intruders has become a thing of individual, national and international concern. The essence of this project is to provide a cost effective and more efficient security system in areas li...

Read more

9. MULTI-LEVEL INTRUSION DETECTION AND LOG MANAGEMENT SYSTEM IN CLOUD COMPUTING

INTRODUCTION

As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...

Read more

10. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM: A CASE STUDY OF DIAMOND BANK NIG PLC OWERRI

INTRODUCTION

The integration of computers with other relevant office equipment is finding growing use in virtually every aspect of human endeavor, but particularly in the realm of finance. The usage of computer networks is becoming increasingly commonp...

Read more

11. DESIGN OF INTRUSION DETECTION AND PREVENTION SYSTEM IN MICRO FINANCE BANK IN IKOT EKPENE

Introduction

An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...

Read more

12. THE IMPACT OF INSECURITY ON RESIDENTIAL PROPERTY VALUE

BACKGROUND OF THE STUDY

In recent times, there has been a high level of unprecedented insecurity across developing economies. This is one of the most problems existing in communities, even in low crime rate zones. Insecurity has been established to...

Read more

13. COMPUTER BASED SECURITY AND MONITORING SYSTEM FOR FORENSIC EXPERTS

BACKGROUND OF THE STUDY

The world is becoming a smaller place in which to live and work. A technological revolution in communications and information exchange has taken place within business, industry and homes. Most developed and developing countries are substantially more invested in...

Read more

14. CONSTRUCTION OF CAR TOUCH INTRUDER ALARM

ABSTRACT

The main objective of this project was to ensure a proper security to car being parked in garage against theft or an intruder. The circuit uses three NE555 timers; one of the NE555 was wired as a monostable oscillator and remaining two were wired as tone genera...

Read more

15. DESIGN AND IMPLEMENTATION OF PASSWORD BASED ACCESS CONTROL WITH INTRUDER ALERT SYSTEM

ABSTRACT

The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...

Read more

16. DESIGN AND CONSTRUCTION OF A MULTIPERPOSE SECURITY SYSTEM WITH ALARM AND DISPLAY

ABSTRACT

This project report is a thesis written specifically to cover the design analysis construction, test and packaging of a multipurpose security system from electric component that can be easily be obtainable from the market.

The report discusses the var...

Read more

17. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE

Statement of the Problem

The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:

  1. Absence of an  intrusion  detection and prevention system.
  2. ...
Read more

18. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE STUDY

  1.   Introduction

An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...

Read more

19. SIMULATION AND THEORETICAL STUDY OF SWIMMING AND RESISTIVE FORCES WITHIN GRANULAR MEDIA

ABSTRACT.

One way to investigate the physics of a medium is to study the forces on intruders moving through the media. A special case of intruders moving in media is the locomotion of organisms. Locomotion within fluids (flying in air and swimming in water) has been extensively studied...

Read more

20. RELATIONSHIP BETWEEN PSYCHO-SOCIAL VARIABLES AND MARITAL ADJUSTMENT AMONG WOMEN IN FEDERAL COLLEGE OF EDUCATION

Background to the Study

The importance of marital adjustment cannot be over-emphasized; the adjustment of each marriage or family is eventually the growth of the nation at large. Marital adjustment as referred to in this study as individual‟s subjective experience of ma...

Read more

21. ON GENERATING MECHANISMS AND DETECTION OF OUTLIERS IN MULTIVARIATE TIME SERIES

General Introduction

Generally, time series is defined as a collection of observations made sequentially over time or data that are collected at regular interval of time. Although the ordering is usually through time, particularly in terms of some equally spaced time in...

Read more

22. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more
whatsapp