Information Technology Research Papers/Topics

Improve Data Encryption Standard using 256Bit key Length

Abstract Network security is becoming more crucial as the volume of data being exchanged on the internet. A more practical way to protect information is to alter it so that only an authorized receiver can understand it. Security of data and telecommunication can be done by a technique called cryptography. In this thesis Data Encryption Standard algorithm has been improved. Improved algorithm uses input data 512bit and key of 256bit length to encrypt the data. It uses S-boxes similar to those...

Proposing a Framework for Applying Project Based Learning in Sudanese Institutions

Abstract Project Based Learning (PBL) is about giving students a real projects and asking them to come up with solutions to it as an academic task. Studies pointed out some problems associated to PBL approach, such as social loafing, that is when some students hide themselves behind active students, doing less or no works within the team and put the effort on other team members. Another problem is unfair assessment which result in giving all the students the same marks in spite of their effor...

A Comparative Study for Two Stemming Algorithms for Arabic Wikipedia Documents Classification Based on Similarity Measures

Abstract Text mining is an important field in information retrieval; it organize a large number of text documents that available on the internet to facilitate the retrieved processing and increase efficiency. Text classification is automatically determining the category to new or unseen documents that depends on content of document itself. In text classification, text preprocessing is a fundamental step to obtained a better result. The Arabic text processing depends on stemming algorithms to ...

Microfinance Data Analysis in Banking Sector Using Data Mining Techniques )Case Study : Agricultural Bank of Sudan)

ABSTRACT Banks face lots of challenges associated with the bank loan, Nowadays there are many risks related to microfinance in bank sector. Every year, we face number of cases where people do not repay most of the microfinance amount to the banks which they cause huge losses. The risk associated with making decision on microfinance request approval is massive. In this study a classification model was built based on the microfinance data obtained from an agricultural bank of Sudan to predict ...

Internet Of Things Based Model For Preeclampsia Monitoring In Antenatal Care

In the health sector, the health of women is a significant public health issue, which impacts the personal well-being, family reproduction, and societal development. Therefore, knowledge about the health of women has led to an emerging requirement for healthcare sectors to obtain the real-time status and data of various applications that can improve the performance and accuracy of the health production. Globally, it has been found that women die due to pregnancy and childbirth consequences. T...

Model For Improving Performance Of Network Intrusion Detection Based On Machine Learning Techniques

Digital crimes have increased in number and sophistication affecting the networks quality of services parameters like confidentiality, integrity and availability of resources. Network Intrusion Detection Systems (NIDS) are deployed to optimize detection and provide comprehensive view of intrusion activities. However, NIDSs generates large volumes of alerts mixed with false positives, and repeated warnings for the same attack, or alert notifications from erroneous activity. This prevents ...

Investigating Selected Egocentric Users On Social Media Platforms Using Social Network Analysis In Mining Forensic Evidence For Law Enforcement In Kenya

Investigation of social media using social network theory is a new powerful tool that will aid and ease law enforcement agencies in multi-faceted ways in this ever evolving digital landscape. It is against this backdrop that this study focused on identifying and investigating selected individuals on Facebook and Twitter social media platforms. In particular, selected respondents from University of Eldoret, Kibabii, Moi, Kisii and Rongo Universities were involved in the study. The objecti...

A Web-based Model To Determine Security Risk Exposure Index Among Savings And Credit Cooperative Societies

Savings and Credit Cooperative Societies (SACCOs), like other financial institutions, own critical assets that must be protected against attackers even as the threat landscape continue to persist. This study provides a solution to SACCOs by determining security risk exposure index (SREI) based on ISO/ 27001 standards. The objectives of the study were to determine the critical security risks factors affecting Selected SACCOs based on ISO 27001 standards, to design a model for computing th...

Blockchain Based Smart Contract Model For Real Estate Management

Industries worldwide are facing a technological revolution where there is a need for technologies that can speed up business processes with more safety and transparency. The real estate industry is among many other industries that would benefit from such technologies due to the magnitude of financial transactions handled. The current management strategy employed by real estate owners depends on a number of intermediaries, including brokers, agents and banking service providers. This strategy ...

A Fused Machine Learning Intrusion Detection Model In Manets.

Mobile Ad-Hoc Networks – MANETs are prevalent in healthcare monitoring of high blood pressure, high cholesterol levels and various heart conditions and cardiac misnomers like syncope, third murmurs and atrial fibrillation. These irregularities that cause mysterious fainting, unexplained stroke, heart palpitations and atrial fibrillation need to be monitored remotely, accurately and effortlessly. However, the growth and provision of MANETs in smart healthcare monitoring has faced variou...

Sms-based Authentication Framework For A Joint Account Atm Transaction.

Information and Communication Technology (ICT) has transformed the way people conduct business today. The banking industry has not been left behind in the utilization of ICT to provide alternative banking channels. Competition for customers and customer expectations have pushed various industry players to acclimatize emerging technologies, as well as innovative alternative service delivery channels, to gain a competitive advantage in the provision of financial services beyond the tradit...

Adoptability Model For Digital Forensic Evidence In Kenya

The traditional techniques used by forensic investigators through the incident response operations include mostly pulling out the power cable of the suspected machines. This method normally causes a major interference of the evidence gathering process, hence the need for a better investigation method. The purpose of the study was to provide a means for the Kenya Police in evaluating their forensic adoptability in digital forensic evidence. This study was intended for those who were opera...

Developing A Threat Matrix For Smart Mobile Devices In A University Network Towards A Secure Local Area Network Ecosystem

The need by staff and students to use smart mobile devices in university network is indisputable. This is because they help them to work and study more effectively as well as achieve better work-life balance. However smart mobile devices pose a security challenge as they continue toexpand the corporate  network unchecked thus increasing the attack surface. This creates a major security burden to security professionals who are supposed to ensure that smart mobile devices’ adherence to t...

A Model For An Integrated And Secure Personal Identification System (Ispis)

Personal Identification Systems are implemented to assist in identifying, authenticating and authorizing the right persons to the right entitlements. Criminals have however discovered ways of by-passing them in order to perpetrate identity fraud. As a result, the problem of identity fraud has become one of the fastest growing crimes in the world today, and a key facilitator of terrorism, money laundering and trafficking (of people, drugs, weapons and illicit material). In this study, an ...

Reducing Road Carnage Using A Web Based Model For Monitoring Road Traffic Crime

Road traffic accidents have been a major cause of deaths in Kenya. The effort by Kenya police to enforce traffic laws has done little to salvage the situation. Although there has been other remedies towards curbing road accidents such as; improvements in vehicle design and licensing to skill the situation calls for further solution particularly targeting driver behavior since careless driving has been identified as a major cause of road accidents. The research provides a solution by designing...


46 - 60 Of 105 Results