Computer and Information Science Research Papers/Topics

ONLINE LIBRARY MANAGEMENT SYSTEM FOR BENUE STATE UNIVERSITY BY ABAH EMMANUEL CLEMENT NOU140665524

ABSTRACT Benue State University Library management system is a project which aims in developing an online system to maintain all the daily work of the library. This project has many features which are generally not available in normal library management systems like facility of user login and a facility of teachers’ login. It also has a facility of admin login through which the administrator can monitor the whole system. It also has facility of an online notice board where teachers and stud...

THE ROLE OF LIBRARY COMMITTEE IN THE DEVELOPMENT OF ACADEMIC LIBRARIES

1.0 INTRODUCTION Library Committees play a critical role in the development of academic libraries. It is, therefore, a standard practice for every academic library to have a Library Committee. These Committees are expected to be functional and vibrant thus performing advisory, regulatory, selection and de-selection, policy-formulating, and other decision-making roles. The Committees should have the powers to take far-reaching decisions regarding the development of the Academic Libraries. In ...

RSA +VIGERENE

combining RSA and Vigenère Cryptographic Algorithms to Encrypt and Decrypt Data

THE POSITIVE AND NEGATIVE IMPACTS OF ICT

As it is known from time immemorial that everything in life is like the two side of a coin, there is always a positive and negative side of every phenomenon. But whether the effect is positive or negative the effects of Information Communication Technology (ICT)  is far reaching and cannot be overemphasized. The Effects of ICT lens looks at how our lives have been changed, for better and for worse, by the impact of ICT. It includes both positive effects and negative effects and looks at how ...

DESIGN AND IMPLEMENTATION OF MOBILE ONE-TIME PASSWORD AND RIVEST CIPHER FOUR ENCRYPTION FOR CLOUD COMPUTING SECURITY

ABSTRACT The use of cloud computing in recent times has recorded remarkable growth while security and privacy issues have remained a critical challenge and a thing of concern for researchers. The reason partly is associated to the fact that most users do not have baseline knowledge of how to securely use cloud services and as such they end up becoming victims, because hackers take advantage of their inadequate knowledge. This thesis is on the Design and Implementation of Mobile One-Time Passw...

The Security Implications of Virtual Local Area Network VLAN Niger Mills Calabar Nigeria

Virtual local area network (VLAN), is a logical grouping of network users and resources connected to administratively define the operation of activated ports on a switch. The creation of VLAN is saddled with the ability to develop smaller broadcast domain within a layer-2 switching router; by assigning different ports on the switch to different sub networks. The application was a re-design project carried out on the Niger-Mills’ network to improve the operational short falls identified by t...

Modeling a low potency ipnetwork in Nigeria.

— Investigations have shown that interior places of the nation lacked capacity for high speed Internet usage; except the cosmopolitan sections. This article, therefore, conceptualizes a robust Broadband roadmap that can effectively deliver IP-wholesale and IP-retail services, through traffic convergence. The interconnect platforms are designed to ensure automatic re-routing of broadband traffic during link or node failure. The IP-wholesale services can be delivered to all main cities in Nig...

OPTIMIZING THE MOVEMENT OF PEOPLE AND GOODS IN A LOCAL COMMUNITY USING TRANSPORTATION MODEL

Transportation problem is one of the real regions of utilization of linearprogramming, in this paper, we would take a gander at how to upgrade the separation andtime taken to make a trip starting with one point then onto the next in a Local community,with Otta Local government area as our concentration, utilizing the transportation display.Having the capacity to accomplish this accomplishment would improve the developmentof individuals and merchandise inside the organization by sparing time a...

UTILIZATION OF THE BIG 6 INFORMATION LITERACY MODEL IN THE ASSESSMENT OF INFORMATION LITERACY SKILLS OF POSTGRADUATE STUDENTS OF THE DEPARTMENT OF LIBRARY AND INFORMATION SCIENCE, BAYERO

                                                           ABSTRACT This research work tends to examine “THE UTILIZATION OF THE BIG 6 INFORMATION LITERACY MODEL IN THE ASSESSMENT OF INFORMATION LITERACY SKILLS OF POSTGRADUATE STUDENTS OF THE DEPARTMENT OF LIBRARY AND INFORMATION SCIENCE, BAYERO UNIVERSITY, KANO.”             The project has been sub-divided into five main phases (chapters) which determines the find...

ENHANCING THE USE OF ICT IN TECHNICAL AND VOCATIONAL EDUCATION

Abstract Vocational and Technical Education is increasingly becoming individualised, customised and universally accessible. Its future is being shaped by current and emerging technologies that are drastically changing the way in which teaching and learning are experienced. Such changes are as a result of development in the field of educational technology to utilise project based learning, mobile learning devices, cloud computing, 3-D learning tools, blended learning and multifaceted technolog...

ATTENDANCE MANAGEMENT SYSTEM OF STAFF IN AN ORGANISATION

Abstract Attendance management is the act of managing attendance or presence in a work setting, which maximises and motivates staff attendance thereby minimising loss. Not only does it affect productivity, it can cost the organisation profits or even additional contracts. For the industrial sector attendance management system can develop alacrity among the workers to work regularly and also help them to motivate their co- worker to attend work regularly. Fingerprints are considered to be...

THE IMPACT OF EXECUTIVE DECISION SUPPORT SYSTEM ON INDUSTRY: A SYSTEMATIC LITERATURE REVIEW

Executive decision support system is a system that is intended to be used by senior managers directly to provide assistance with decision making in their management activities through decision support system in industries. Examples of these intelligent information which is often the source of executive decision support system are External databases, Technology reports like patent records etc., Technical reports from consultants, Market reports, Confidential information about competitors, Spec...

Reviewing Cyber-attack Incidents and Their Impacts on Global Oil and Gas Infrastructures: A Nigerian Perspective

ABSTRACTOil and Gas sector includes the exploration, gathering, production, processing, storage, and transportation of petroleum liquids and natural gas. With the oil and gas sector fueling every aspect of our daily life, the protection of its critical infrastructure is crucial. It is known that digitally connected oil and gas operations help to improve production (General Electric, 2018). So, in order to sustain uninterrupted energy production and for quick recovery from major cyber incident...

Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

The  tumultuous  increase  in  ATM  attacks  using  eavesdropping,  shoulder-surfing,  has  risen  great  concerns.  Attackers  often  target  the  authentication stage where a customer may be entering his login information on the ATM and  thus  use  direct  observation  techniques  by looking  over the  customer's shoulder to steal his passwords. Existing authentication mechanism employs the  traditional  password-based  authentication  system  which  fails  t...

NETWORK BASED SECURITY INFORMATION SYSTEM

CHAPTER ONE INTRODUCTION 1.1    Introduction Security on the Internet and on Local Area Networks is now at the forefront of computer network related issues.  The  evolution  of  networking  and  the  Internet,  the  threats   to   information   and   networks   have   risen   dramatically.   Many   of   these   threats   have   become   cleverly    exercised    attacks    causing    damage    or    committing   theft.   The   Internet�...


121 - 135 Of 154 Results