Research Papers/Topics in Computer Engineering

Strategies For Optimizing Password Management Against Versatile Attacks

Managing passwords is a significant problem for most people in the modern world. Passwords are a critical part of information and network security. Passwords serve as primary authentication method to protect user accounts but a poorly chosen password, if compromised, could put the entire network at risk. Many users do not understand why good passwords and password management are important for information systems. “We’re secure! We use passwords!” How many of us have heard this clai...

Design Of Effectively Efficient Techniques For Circumvent Wireless Network Security Threats And Attacks

  ABSTRACT The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to ...

Case Study: Unyama National Teachers College, Gulu

For the last few years, technology has spread so fast. Every institution wants to computerize its system. Unyama National Teachers' College is one of the institutions.This institution is a teachers' training school whereby every year, students graduate after completing their course (takes two years).This therefore calls for an efficient and timely way of processing the students' transcript. A full analysis of the current system was done and problems being faced noted down.With knowledge...

Development Of Biomass Wastes Briquette Stove For Domestic Use

ABSTRACTBiomass energy in the form of woodfuel and charcoal contributes close to 68% of the total energy demand in Kenya. The continued depletion of biomass resources has led to the use of agricultural residue to supplement energy needs for domestic cooking. Biomass stoves used to burn these fuels in Kenya are characterized by high inefficiencies and high emissions that pose environmental and health risks to the users. This research aimed to reduce biomass fuels consumption, reduce fuel indoo...

Development Of A Smart Energy Management System In A Community Based Microgrid

ABSTRACT In this work, an expert system for energy management in community based microgrid was developed. This was necessitated in a bid to address the inadequate power supply predominant in sub-Saharan African countries, while also addressing the problem of energy wastage that comes from individuals supplying their own energy demands. To achieve this, an architecture for a microgrid network was developed by adopting existing standards in the geographical region of interest. An energy ...

Design Of Community Informatics Social Network Web Application: A Case Study Of Niger Delta Region Of Nigeria

ABSTRACT In this research, Social Network Web Application (SNWA) was developed and tailored for a specific use; community development in the Niger Delta region of Nigeria. In the SNWA development, preliminary context analysis was conducted to capture contextual information on community development challenges in the Niger Delta and the readiness of the target local community to adopt web-based solution to the identified challenges. Subsequently, User-Centered Requirement Engineering, Us...

Data Mining And Knowledge Discovery In Database For Improved Industrial Safety

Abstract Safety is crucial in oil and gas industries, it is normal practice to collect incident reports daily. The volume of such reports is always very huge, as a result, the interpretation poses a great challenge. Consequently, there is an urgent need for techniques that can intelligently assist in transforming such vast amount of data into useful information and knowledge. Data mining is part of the knowledge discovery process that offers ways of extracting non-trivial, previously un...

Analysis Of Transmission Control Protocol (TCP) And Its Performance Enhancement Methods On Wireless Networks

ABSTRACT Transmission Control Protocol (TCP) is the dominant transport protocol in the Internet and supports many of the most popular Internet applications, such as the World Wide Web (WWW), file transfer and e-mail. The recently developed advanced wireless networks, such as GPRS, are known to cause delay spikes in packet transfer which causes unnecessary TCP retransmission timeouts. In order to find solutions to this effect, packet losses across wireless links should be distinguished f...

A Tool For The Simulation Of Stream Processing Tasks On Two Dimensional Processor Arrays

ABSTRACT A tool for the simulation of stream processing tasks on two dimensional processor arrays is developed in this work. The tool, a Many-core Energy and Latency Estimator (MELE) has provided abstractions from the many design constraints facing application developers on Many-core platforms. A set of models have been designed to improve the programmer’s ability to iteratively map data flow applications to the target machine. Included in the model set are; an application model, wh...

Adaptive Hybrid Collaborative Filtering Recommendation System (AHCF)

ABSTRACT Recommendation systems play a vital role in boosting the organization’s profit, especially for ecommerce platforms such as Amazon. These systems focus on targeting specific products to users and predicting user preferences and interests. However, recommendation systems are plagued with many challenges, such as adapting them to changes in user preferences and taste, and the effectiveness of recommendations made also determines the ability to retain and engage new users, as new ...

Hybrid Cluster-Based Sampling Technique For Class Imbalance Problems

ABSTRACT Class imbalance problem is prevalent in many real-world domains and as such has become an area of increasing interest for many researchers. In binary classification problems, imbalance learning refers to learning from a dataset with a high degree of skewness to the negative class. This phenomenon causes traditional classification algorithms to perform woefully when predicting positive classes with new examples. Data resampling is among the most commonly used techniques used to ...

Fingerprint Based Students' Attendance System

ABSTRACT Attendance is typically a list of people present at a particular event. Manual approach of attendance taking has not been very effective due to difficulty in keeping the attendance list over a long period of time, unnecessary time wastage during writing or signing, improper documentation, students forgetting to write or sign-the attendance paper among others. The aim of this project is to develop a technology assisted attendance system that will enhance efficient and effective ...

Development Of An Automated Counter System For Small And Medium Enterprises

ABSTRACT Counting is a very common activity in our daily lives and when inaccurate results are produced, it could cost us dearly in terms of loss in production, profit and finances. This inaccuracy is very common with the manual method of counting due to fatigue from task repetition over a long period oftime. This project develops an automated counter system to solve the challenge of packaging items below or above advertised quantity to customers by many small scale business organizatio...

Development Of An Adjectival Phrase-Based System For English To Yoruba Machine Translation

ABSTRACT Yoruba language is gradually going into extinction because most speakers don't know how to write it despite that it is being taught in Primary and Secondary schools in Nigeria. This therefore call for the need of modern day processing tools such as machine translators for the language to catch up with the technological growth the world is experiencing. ln the face of rapid globalization, the significance of Machine translation cannot be overemphasized because it can translate t...


1 - 15 Of 127 Results