Abstract
The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...
Background of the Study
A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...
Background of the study
Massive integration of information technology into all aspects of modern life caused demand for processing vehicles as conceptual resources in information systems. Because a standalone information system without any data has no sense, there was a...
ABSTRACT
The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...
Abstract
The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...
Abstract
Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...
ABSTRACT
Power consumption is a key consideration in every Wireless Local Area Network Medium Access Control (WLAN MAC) algorithm design for wireless devices and extending battery life requires more efficient power management scheme considering that carrier sensing by WLAN modules, fals...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the Study
Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...
Background of the Study: Cybersecurity has become an essential concern for businesses, particularly in the fintech sector, where digital transactions and sensitive data are integral to daily operations (Olson & Morris, 2023). The increase in cybercrime, such as data breaches and ransomware at...
Background of the Study
Safety and security are critical components of the hospitality industry, influencing tourists' choices of accommodation. In Abuja, Nigeria’s capital city, the growth of the hospitality sector has been accompanied by increased safety con...
Background of the Study
Warehouse security plays an essential role in ensuring the smooth flow of goods and materials in manufacturing and distribution processes. The effectiveness of warehouse security measures directly affects operational efficiency, inventory management, and the over...
Background of the Study
Campus networks are integral to the smooth operation of universities, providing the backbone for academic and administrative services. Secure and efficient network infrastructure is essential in safeguarding sensitive data and maintaining operationa...
Background of the Study
Network security policies are fundamental to protecting digital resources in any organization, especially in universities, where sensitive data such as student records, research findings, and financial information is regularly transmitted and stored...
Background of the Study
Network access control is a crucial component of network security, especially in institutions with large and diverse user bases like Federal University, Lafia, Nasarawa State. Network access control mechanisms are designed to ensure that only author...
Background of the Study
In educational institutions like Federal University, Kashere, Gombe State, secure file sharing is essential to protect sensitive academic, administrative, and research data. The university’s network is used extensively for file transfers betwe...
Background of the Study
Network Access Control Lists (ACLs) are crucial components of network security used to regulate access to resources and restrict unauthorized traffic. ACLs are widely deployed in routers and firewalls to control inbound and outbound traffic based on...
Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...
Background of the study:
Cloud computing has revolutionized the way academic institutions manage and store data, enabling universities to scale their resources efficiently and cost-effectively. With cloud computing, Federal University, Birnin Kebbi, Kebbi State, has been a...
Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...
Background of the Study
As academic institutions expand their network infrastructure, security becomes a primary concern. Virtual Local Area Networks (VLANs) have emerged as an effective technique for improving network security by segmenting network tra...
Background of the Study
Cybersecurity policies play a crucial role in protecting institutional networks, ensuring compliance, and safeguarding sensitive information. These policies outline best practices for network security, access control, data protec...
Background of the Study
Cloud storage solutions have revolutionized data management in academic institutions, offering scalability, remote access, and cost-effectiveness (Ogunleye & Okon, 2024). However, concerns over data security, unauthorized acc...
Background of the Study
Network security is a critical concern for universities as cyber threats continue to evolve. Traditional access control mechanisms, such as passwords and manual authentication processes, are often insufficient in preventing unaut...
Background of the Study
The shift to online learning in universities has become more prominent, especially in the wake of the global pandemic, necessitating the development of reliable, secure, and efficient video conferencing systems. Federal Universit...
Background of the Study
The shift to online learning in universities has become more prominent, especially in the wake of the global pandemic, necessitating the development of reliable, secure, and efficient video conferencing systems. Federal Universit...
Background of the Study
Digital identity systems have become integral to the management of student and faculty records in universities. Federal University, Gashua, Yobe State, requires a reliable method to manage and verify the identities of its student...
Background of the Study
Digital identity systems have become integral to the management of student and faculty records in universities. Federal University, Gashua, Yobe State, requires a reliable method to manage and verify the identities of its student...
Background of the Study
With the increasing reliance on digital tools for collaboration and data sharing, universities face significant challenges in ensuring the security and privacy of sensitive academic and administrative information. File sharing is...
Background of the Study
Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. A...
Background of the Study
Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. A...
Background of the Study
Network Access Control (NAC) mechanisms are essential for securing university networks by ensuring that only authorized users and devices can access network resources. Federal University, Gashua, Yobe State, like many higher educ...
Background of the Study
In modern educational institutions, the need for secure and efficient identity verification systems is increasingly important due to the growing use of digital platforms for administrative, academic, and financial purposes. Feder...
Background of the Study
Wireless networks have become a vital component of modern university campuses, offering students, faculty, and staff the flexibility to access the internet and internal systems from anywhere on campus. However, securing wireless...
Background of the Study
Internet censorship and access control mechanisms are critical components in managing and securing digital information within academic institutions. Universities implement these measures to regulate the flow of information, protect sensitive data...
Background of the Study
Internet censorship and access control mechanisms are critical components in managing and securing digital information within academic institutions. Universities implement these measures to regulate the flow of information, protect sensitive data...
Background of the Study
Peer-to-peer (P2P) file sharing has become an essential tool for students and staff in academic environments like Federal University, Kashere, Gombe State, as it facilitates the easy exchange of research materials, academic documents, and other r...
Background of the Study
In academic institutions like Federal University, Birnin Kebbi, the protection of sensitive data, including student records, research findings, and faculty communications, is crucial. With the increasing amount of data being stored, shared, and t...
Background of the Study
In today’s digital age, universities rely heavily on wireless networks to provide seamless connectivity for students, staff, and faculty. At Federal University, Lafia, Nasarawa State, the demand for mobile devices and portable computing has re...
Background of the Study
Network access control (NAC) is a critical component of network security, especially in academic institutions where sensitive data and intellectual property are handled on a daily basis. Federal University, Lokoja, Kogi State, has an expansive netwo...
Background of the Study
The traditional security model based on perimeter defenses is no longer sufficient to protect modern networks against evolving cyber threats. The Zero-Trust Network model shifts away from assuming trust based on location and requires continuous auth...
Background of the Study
The increasing demand for efficient data storage and management in educational institutions has led to the widespread adoption of cloud storage solutions. Cloud storage enables universities to securely store and access academic resources, administra...
Background of the Study
Network security is a critical concern for academic institutions, as they are frequently targeted by cybercriminals seeking to exploit vulnerabilities in their IT infrastructure. Network-based attacks, such as Distributed Denial of Service (DDoS), M...
Background of the Study
Firewalls play a critical role in securing university networks by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Traditional firewalls primarily function at the network and transport layers of...
Background of the Study
Blockchain technology is revolutionizing data security by providing a decentralized, tamper-proof system for secure transactions. Unlike traditional databases that rely on centralized control, blockchain distributes data across multiple nodes, makin...
Background of the Study
The proliferation of Internet of Things (IoT) devices in academic institutions has transformed the way students, faculty, and staff interact with technology. IoT devices such as smart cameras, biometric access control systems, sm...
Background of the study
The Internet of Things (IoT) refers to the interconnection of everyday physical devices to the internet, allowing them to collect and exchange data. In the context of education, IoT applications have gained increasing importance in...
Background of the Study
School security is a critical concern in contemporary education systems, with institutions facing increasing threats such as unauthorized access, kidnapping, student impersonation, and theft. Ensuring a safe learning environment...
Background of the study
Student identification is a fundamental component of university operations, ensuring security, access control, and accurate record-keeping. Traditional methods of student identification, such as physical ID cards, have limitations, including the ris...
Background of the Study
Data security in educational institutions is crucial, as schools handle a vast amount of sensitive information, including students' personal details, academic records, and financial transactions. In Zaria Local Government Area, Kaduna State,...