Research Papers/Topics in Computer And Information Science

The Security Implications of Virtual Local Area Network VLAN Niger Mills Calabar Nigeria

Virtual local area network (VLAN), is a logical grouping of network users and resources connected to administratively define the operation of activated ports on a switch. The creation of VLAN is saddled with the ability to develop smaller broadcast domain within a layer-2 switching router; by assigning different ports on the switch to different sub networks. The application was a re-design project carried out on the Niger-Mills’ network to improve the operational short falls identified b...

Modeling a low potency ipnetwork in Nigeria.

— Investigations have shown that interior places of the nation lacked capacity for high speed Internet usage; except the cosmopolitan sections. This article, therefore, conceptualizes a robust Broadband roadmap that can effectively deliver IP-wholesale and IP-retail services, through traffic convergence. The interconnect platforms are designed to ensure automatic re-routing of broadband traffic during link or node failure. The IP-wholesale services can be delivered to all main citie...

OPTIMIZING THE MOVEMENT OF PEOPLE AND GOODS IN A LOCAL COMMUNITY USING TRANSPORTATION MODEL

Transportation problem is one of the real regions of utilization of linearprogramming, in this paper, we would take a gander at how to upgrade the separation andtime taken to make a trip starting with one point then onto the next in a Local community,with Otta Local government area as our concentration, utilizing the transportation display.Having the capacity to accomplish this accomplishment would improve the developmentof individuals and merchandise inside the organization by sparing time a...

Reviewing Cyber-attack Incidents and Their Impacts on Global Oil and Gas Infrastructures: A Nigerian Perspective

ABSTRACTOil and Gas sector includes the exploration, gathering, production, processing, storage, and transportation of petroleum liquids and natural gas. With the oil and gas sector fueling every aspect of our daily life, the protection of its critical infrastructure is crucial. It is known that digitally connected oil and gas operations help to improve production (General Electric, 2018). So, in order to sustain uninterrupted energy production and for quick recovery from major cyber incident...

Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

The  tumultuous  increase  in  ATM  attacks  using  eavesdropping,  shoulder-surfing,  has  risen  great  concerns.  Attackers  often  target  the  authentication stage where a customer may be entering his login information on the ATM and  thus  use  direct  observation  techniques  by looking  over the  customer's shoulder to steal his passwords. Existing authenticatio...

Quantifying the Value of Open Source Hard-ware Development

With the maturation of digital manufacturing technologies like 3-D printing, a new paradigm is emerging of distributed manufacturing in both scientific equipment and consumer goods. Hardware released under free licenses is known as free and open source hardware (FOSH). The availability of these FOSH designs has a large value to those with access to digital manufacturing methods and particularly for scientists with needs for highly-customized low-volume production products. It is challenging t...

Need a Professional researcher to work on your project? Click Here to Submit a Writing Request