Search Results

Secondary School Design for Enugu State University of Science and Technology (ESUT) A Study on Using Architectural Elements to Combat Security Problems

ABSTRACT  Security is a very vital factor for human growth and development. It has also become a major recent issue in buildings and especially, school buildings. Ensuring security in buildings is a collective endeavour with each individual, government, organization, and community having its own role to play. The architect, who is the master builder, is chiefly responsible in ensuring that the built environment meets requirements of security. This report studied the various techniques of ach...

Design and Construction of Enhanced Security Door

ABSTRACT  Security is one thing human should not joke with, especially in today’s world where crime is at a higher rate. One of the ways of providing security is the introduction of security doors in houses, companies, offices and warehouses. Security doors may prevent or control entry or exit, or they may be merely decorative. Larger doors can be used for a whole building, such as a castle or fortified town, or the actual doors that block entry through the gatehouse. Today many doors are ...

COMPARATIVE STUDY ON THE PRODUCTION OF WOOD PELLETS FROM SAWDUST USING LOCALLY SOURCED BINDERS.

ABSTRACT   Attempt was made to produce wood pellets from sawdust using locally sourced binders as an alternative binder, to wood lignin which is a natural binding agent. Wood pellets were produced by manual moulding with starch concentration of cassava and potato starch as the process variable. Results show similar behavior between pellets bonded by cassava, and potato starch, But differs slightly in the case of calorific value and smoke analysis, it shows that smouldering produce the highes...

ELECTRONIC PAYMENT SYSTEM SECURITY

ABSTRACT Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The symmetric key cryptosystem RC5 can protect conventional transaction data such as account numbers, amount and other information. This process can be done elect...

EVALUATION OF MOBILE NETWORK SECURITY IN GHANA

Abstract Mobile technology is one of the most successful technologies on the African continent. Personal and professional communication as well as critical services like banking and remittances are widely made through mobile networks and platforms in Ghana. However, little is known about the security of the underlying infrastructure and devices consumers use to interact with the mobile network. The focus of this project is to determine if the core systems of the mobile network operators, the ...

The impact of Village Savings and Lending Associations on Rural Livelihoods: A case of Vheneka Village: Chipinge district

Abstract Village savings and lending associations have become a strength to consider in regards to the reduction of worldwide rural poverty. The popular proposition is that by enabling poor rural households access to loans and other microfinance services, the rural populace can then embark on income generating activities which will help them in dealing with numerous adversities that the rural populace face such as unemployment, lack of access to health services, low household food consumptio...

Fermentation of Plantain Peel

TABLE OF CONTENT Title Page                                                                       i Certification                                                                   ii Dedication                                                                    iii Acknowledgement         �...

ELECTRONIC PAYMENT SECURITY SYSTEM

ABSTRACT Electronic commerce and electronic business are the inevitable mediums of exchange in an increasingly wired world. To better understand the problems and perspectives of electronic payment systems, it is wise to look at not only the current systems in place, but to also examine what the future may hold. This research work describes the characteristics of current systems in place and provides a brief analysis of how each works.  Secure electronic payment system is presented in this pa...

The Refugee Influx and Security in Uganda: A Case Study of Kiryandongo Refugee Settlement

TABLE OF CONTENTSDECLARATIONAPPROVALDEDICATION iiiACKNOWLEDGEMENT ivABSTRACTLIST OF TABLES ixCHAPTER ONE 1INTRODUCTION 11.1 Introduction1 .2 Background of the Study1.3 Statement of the Problem 21.4 Purpose of the study 31.5 Research objectives 31.6 Research question 31.7 Hypothesis 41.8 Scope ofthe study 41.8.1 Content scope 41.8.2 Geographical Scope 41.8.3 Time scope 41 .9 Significance of the study s1.10 The Conceptual Framework 6CHAPTER TWOLITERATURE REVIEW 72,1 Introduction 72.1.lTheoretic...


151 - 159 Of 159 Results