Technology

Technology Research Papers/Topics

CSS 413- Security Strategies for Web Applications and Social Networks

Philosophy of the Department The departmental philosophy is in line with the national philosophy of Nigerian educational information technological aspirations, as it is in line with the establishment of universities of technology in the Country. Our philosophy is to develop high manpower needs that would meet the Nigerian ICT aspirations in such areas as business establishments, through web networking, cybercrimes and terrorism overcoming at both local and international scenes, alleviate fra...

Darknet - C vs SAST

In security testing much like other things technical there are two very contrary methods, Dynamic Application Security Testing ( DAST) and Static Application Security Testing (SAST)

NIGERIAN COMMUNICATIONS ACT, 2003

TABLE OF CONTENTS Table of contents...............................................................................................................................2 Part I .................................................................................................................................................3 General Provision .............................................................................................................................3 Part II General Mandates on Disast...

Ethical Hacking and Countermeasures

Hacking means to attack systems, networks and applications by exploiting their weaknesses, in order to gain unauthorized access to data and systems. • What are the goals of hacking? • Ethical hacking is the use of hacking knowledge, skills tools and techniques to demonstrate the true exploitable vulnerabilities of a system for the purpose of better securing it. 

INVESTIGATING COMPUTER-RELATED CRIME A HANDBOOK FOR CORPORATE INVESTIGATORS

The introduction of the IBM Personal Computer in 1982 fostered a technology revolution that has changed the way the world does business. Prior to that historic milestone, several personal computers existed, e.g., Apple, TRS 80, but they were primarily used by individuals, schools, and small businesses. When computer mainframe giant, International Business Machines (IBM) entered the personal computer market in 1982, the event quickly captured the attention of corporations and government agenci...

Introduction to Linear Programming.

What is Linear Programming? A typical optimization problem is to find the best element from a given set. In order to compare elements, we need a criterion, which we call an objective function f(x). The given set is called the feasible set which is usually defined by {x ∈ Rn | gi (x) ≤ 0, i = 1, . . . , m}.

Linear Programming

One of the major applications of linear algebra involving systems of linear equations is in finding the maximum or minimum of some quantity, such as profit or cost. In mathematics the process of finding an extreme value (maximum or minimum) of a quantity (normally called a function) is known as optimization . Linear programming (LP) is a branch of Mathematics which deals with modeling a decision problem and subsequently solving it by mathematical techniques. The problem is presented in a form...

Research Problem

Cloud computing, grid computing, digital forensic, bring your own devices, biometrics technology, internet of things, data mining, data science, big data analytics, software engineering, social networking, smart grid, bioinformatics, intrusion detection, human factor in information security and so on.

Social Network Sites: Definition, History, and Scholarship

Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are hundreds of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of preexi...

The Ten Most Critical Web Application Security Risks

Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our software becomes increasingly complex, and connected, the difficulty of achieving application security increases exponentially. The rapid pace of modern software development processes makes the most common risks essential to discover and resolve quickly and accurately. We can no longer afford to tolerate relatively simple security problems like those presented in this OWASP T...

Application Threat Modeling - OWASP

Threat modelling is an approach for anazlying the security of an application. It is a structured approach that enables you to identify, quantify and address the security risk with an application.

CIT 415: Research Tool

We need tools to facilitate research tasks • Some researchers need special tools indigenous to particular discipline • The concern here is with the general tools of research that the majority of researchers, regardless of discipline and situation, typically need to help carrying out research activities which finally derive meaningful and insightful conclusions from the research. • Be careful not to equate tools of research with the research methodology.

Causes of blood culture contamination at Nelson Mandela Academic Hospital

Phlebotomy has been practiced for centuries and is still one of the most common invasive procedures in health care. Each step in the process of phlebotomy affects the quality of the specimen and is thus important for preventing laboratory error, patient injury and even death. For example, the touch of a finger to verify the location of a vein before insertion of the needle increases the chances that a specimen will be contaminated. This causes false blood culture results, prolonged hospitaliz...

CPT 512-ML Algorithms Real-World Applications

Abstract In the current age of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data, business data, social media data, health data, etc. To intelligently analyze these data and develop the corresponding smart and automated applications, the knowledge of artifcial intelligence (AI), particularly, machine learning (ML) is the key. Various types of machine learning algorithms such ...

An Introduction to Deep Learning. During recent years, deep learning has _ by James Liang _ Towards Data Science

An Introduction to Deep Learning Building the Intuition How Do Deep Learning algorithms “learn”? So why is it called “Deep” Learning? Conclusions and Takeaways


106 - 120 Of 1080 Results