0704-883-0675     |      dataprojectng@gmail.com
1

1. DESIGN AND IMPLEMENTATION OF RADIO CONTROLLED CAR LOCK WITH 5MIN IGNITION DEACTIVATION

Abstract

The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...

Read more

2. AN ASSESSMENT OF FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

Background of the Study

A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...

Read more

3. DESIGN AND IMPLEMENTATION OF AN AUTOMATED CAR PLATE NUMBER RECOGNITION SYSTEM

Background of the study

Massive integration of information technology into all aspects of modern life caused demand for processing vehicles as conceptual resources in information systems. Because a standalone information system without any data has no sense, there was a...

Read more

4. DESIGN AND IMPLEMENTATION OF PASSWORD BASED ACCESS CONTROL WITH INTRUDER ALERT SYSTEM

ABSTRACT

The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...

Read more

5. D AND I OF RADIO CONTROLLED CAR LOCK WITH 5MIN IGNITION DEACTIVATION

Abstract

The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...

Read more

6. Understanding and Exploiting Design Flaws of AMD Secure Encrypted Virtualization

Abstract

Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...

Read more

7. HYBRID CONTENTION-ADDRESSING ALGORITHM FOR ENERGY EFFICIENCY IN IEEE 802.11 WAKE-UP BASED RADIO NETWORK UPLINK

ABSTRACT

Power consumption is a key consideration in every Wireless Local Area Network Medium Access Control (WLAN MAC) algorithm design for wireless devices and extending battery life requires more efficient power management scheme considering that carrier sensing by WLAN modules, fals...

Read more

8. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

9. A Review of Digital Identity Management Solutions and Their Security Risks: A Study of Banks in Bauchi State

Background of the Study

Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...

Read more

10. An evaluation of the effectiveness of cybersecurity policies in preventing data breaches: A case study of fintech firms in Niger State.

Background of the Study: Cybersecurity has become an essential concern for businesses, particularly in the fintech sector, where digital transactions and sensitive data are integral to daily operations (Olson & Morris, 2023). The increase in cybercrime, such as data breaches and ransomware at...

Read more

11. An Assessment of Safety Concerns in Hotel Security Management in Abuja

Background of the Study

Safety and security are critical components of the hospitality industry, influencing tourists' choices of accommodation. In Abuja, Nigeria’s capital city, the growth of the hospitality sector has been accompanied by increased safety con...

Read more

12. An Examination of Warehouse Security Measures and Their Effect on Operational Effectiveness in Dangote Flour Mills, Adamawa State

Background of the Study

Warehouse security plays an essential role in ensuring the smooth flow of goods and materials in manufacturing and distribution processes. The effectiveness of warehouse security measures directly affects operational efficiency, inventory management, and the over...

Read more

13. Design of a Secure Campus Network Infrastructure for Ahmadu Bello University, Zaria, Kaduna State

Background of the Study
Campus networks are integral to the smooth operation of universities, providing the backbone for academic and administrative services. Secure and efficient network infrastructure is essential in safeguarding sensitive data and maintaining operationa...

Read more

14. Evaluation of Network Security Policies in Federal University, Dutse, Jigawa State

Background of the Study
Network security policies are fundamental to protecting digital resources in any organization, especially in universities, where sensitive data such as student records, research findings, and financial information is regularly transmitted and stored...

Read more

15. Evaluation of Network Access Control Mechanisms in Federal University, Lafia, Nasarawa State

Background of the Study
Network access control is a crucial component of network security, especially in institutions with large and diverse user bases like Federal University, Lafia, Nasarawa State. Network access control mechanisms are designed to ensure that only author...

Read more

16. Design and Implementation of a Secure File Sharing System for Federal University, Kashere, Gombe State

Background of the Study
In educational institutions like Federal University, Kashere, Gombe State, secure file sharing is essential to protect sensitive academic, administrative, and research data. The university’s network is used extensively for file transfers betwe...

Read more

17. Implementation of Network Access Control Lists (ACLs) in Federal University, Kashere, Gombe State

Background of the Study
Network Access Control Lists (ACLs) are crucial components of network security used to regulate access to resources and restrict unauthorized traffic. ACLs are widely deployed in routers and firewalls to control inbound and outbound traffic based on...

Read more

18. Comparative Study of Network Authentication Methods in Federal University, Lokoja, Kogi State

Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...

Read more

19. Evaluation of Network Security Threats Associated with Cloud Computing in Federal University, Birnin Kebbi, Kebbi State

Background of the study:
Cloud computing has revolutionized the way academic institutions manage and store data, enabling universities to scale their resources efficiently and cost-effectively. With cloud computing, Federal University, Birnin Kebbi, Kebbi State, has been a...

Read more

20. Implementation of Secure Network Access Control Using Biometric Authentication in Federal University, Kashere, Gombe State

Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...

Read more

21. Optimization of Virtual Local Area Networks (VLANs) for Network Security in Federal University, Lafia, Nasarawa State

Background of the Study

As academic institutions expand their network infrastructure, security becomes a primary concern. Virtual Local Area Networks (VLANs) have emerged as an effective technique for improving network security by segmenting network tra...

Read more

22. Investigation into the Effectiveness of Cybersecurity Policies in Federal University, Lokoja, Kogi State

Background of the Study

Cybersecurity policies play a crucial role in protecting institutional networks, ensuring compliance, and safeguarding sensitive information. These policies outline best practices for network security, access control, data protec...

Read more

23. Evaluation of Secure Cloud Storage Solutions in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

Cloud storage solutions have revolutionized data management in academic institutions, offering scalability, remote access, and cost-effectiveness (Ogunleye & Okon, 2024). However, concerns over data security, unauthorized acc...

Read more

24. Enhancing Network Security Through AI-Powered Access Control in Federal University, Dutsin-Ma, Katsina State

Background of the Study

Network security is a critical concern for universities as cyber threats continue to evolve. Traditional access control mechanisms, such as passwords and manual authentication processes, are often insufficient in preventing unaut...

Read more

25. Design of a Secure Video Conferencing System for Online Learning in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

The shift to online learning in universities has become more prominent, especially in the wake of the global pandemic, necessitating the development of reliable, secure, and efficient video conferencing systems. Federal Universit...

Read more

26. Design of a Secure Video Conferencing System for Online Learning in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

The shift to online learning in universities has become more prominent, especially in the wake of the global pandemic, necessitating the development of reliable, secure, and efficient video conferencing systems. Federal Universit...

Read more

27. Development of a Blockchain-Based Digital Identity System in Federal University, Gashua, Yobe State

Background of the Study

Digital identity systems have become integral to the management of student and faculty records in universities. Federal University, Gashua, Yobe State, requires a reliable method to manage and verify the identities of its student...

Read more

28. Development of a Blockchain-Based Digital Identity System in Federal University, Gashua, Yobe State

Background of the Study

Digital identity systems have become integral to the management of student and faculty records in universities. Federal University, Gashua, Yobe State, requires a reliable method to manage and verify the identities of its student...

Read more

29. Implementation of Secure File Sharing Protocols in University Networks: A Case Study of Federal University, Kashere, Gombe State

Background of the Study

With the increasing reliance on digital tools for collaboration and data sharing, universities face significant challenges in ensuring the security and privacy of sensitive academic and administrative information. File sharing is...

Read more

30. Analysis of Insider Threats and Network Security Measures in Federal University, Wukari, Taraba State

Background of the Study

Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. A...

Read more

31. Analysis of Insider Threats and Network Security Measures in Federal University, Wukari, Taraba State

Background of the Study

Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. A...

Read more

32. Comparative Study of Network Access Control Mechanisms in Federal University, Gashua, Yobe State

Background of the Study

Network Access Control (NAC) mechanisms are essential for securing university networks by ensuring that only authorized users and devices can access network resources. Federal University, Gashua, Yobe State, like many higher educ...

Read more

33. Design and Implementation of a Digital Identity Verification System in Federal University, Dutsin-Ma, Katsina State

Background of the Study

In modern educational institutions, the need for secure and efficient identity verification systems is increasingly important due to the growing use of digital platforms for administrative, academic, and financial purposes. Feder...

Read more

34. An Investigation into the Challenges of Securing Wireless Campus Networks in Federal University, Gusau, Zamfara State

Background of the Study

Wireless networks have become a vital component of modern university campuses, offering students, faculty, and staff the flexibility to access the internet and internal systems from anywhere on campus. However, securing wireless...

Read more

35. Comparative Study of Internet Censorship and Access Control Mechanisms in Federal University, Lokoja, Kogi State

Background of the Study

Internet censorship and access control mechanisms are critical components in managing and securing digital information within academic institutions. Universities implement these measures to regulate the flow of information, protect sensitive data...

Read more

36. Comparative Study of Internet Censorship and Access Control Mechanisms in Federal University, Lokoja, Kogi State

Background of the Study

Internet censorship and access control mechanisms are critical components in managing and securing digital information within academic institutions. Universities implement these measures to regulate the flow of information, protect sensitive data...

Read more

37. Design and Implementation of a Secure Peer-to-Peer File Sharing Network in Federal University, Kashere, Gombe State

Background of the Study

Peer-to-peer (P2P) file sharing has become an essential tool for students and staff in academic environments like Federal University, Kashere, Gombe State, as it facilitates the easy exchange of research materials, academic documents, and other r...

Read more

38. Evaluation of Data Loss Prevention Strategies in Campus Networks in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

In academic institutions like Federal University, Birnin Kebbi, the protection of sensitive data, including student records, research findings, and faculty communications, is crucial. With the increasing amount of data being stored, shared, and t...

Read more

39. Design of a Secure Wireless Network for Federal University, Lafia, Nasarawa State

Background of the Study
In today’s digital age, universities rely heavily on wireless networks to provide seamless connectivity for students, staff, and faculty. At Federal University, Lafia, Nasarawa State, the demand for mobile devices and portable computing has re...

Read more

40. Development of a Network Access Control System for Federal University, Lokoja, Kogi State

Background of the Study
Network access control (NAC) is a critical component of network security, especially in academic institutions where sensitive data and intellectual property are handled on a daily basis. Federal University, Lokoja, Kogi State, has an expansive netwo...

Read more

41. Implementation of a Zero-Trust Network Model in Federal University, Dutsin-Ma, Katsina State

Background of the Study
The traditional security model based on perimeter defenses is no longer sufficient to protect modern networks against evolving cyber threats. The Zero-Trust Network model shifts away from assuming trust based on location and requires continuous auth...

Read more

42. Design and Implementation of a Secure Cloud Storage Solution for Federal University, Kashere, Gombe State

Background of the Study
The increasing demand for efficient data storage and management in educational institutions has led to the widespread adoption of cloud storage solutions. Cloud storage enables universities to securely store and access academic resources, administra...

Read more

43. An Investigation of Network-Based Attacks and Their Mitigation Strategies in Federal University, Wukari, Taraba State

Background of the Study
Network security is a critical concern for academic institutions, as they are frequently targeted by cybercriminals seeking to exploit vulnerabilities in their IT infrastructure. Network-based attacks, such as Distributed Denial of Service (DDoS), M...

Read more

44. Comparative Study of Traditional and Next-Generation Firewalls in Federal University, Gashua, Yobe State

Background of the Study
Firewalls play a critical role in securing university networks by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Traditional firewalls primarily function at the network and transport layers of...

Read more

45. Implementation of Blockchain for Secure Data Transactions in Federal University, Kashere, Gombe State

Background of the Study
Blockchain technology is revolutionizing data security by providing a decentralized, tamper-proof system for secure transactions. Unlike traditional databases that rely on centralized control, blockchain distributes data across multiple nodes, makin...

Read more

46. Design and Implementation of a Secure Internet of Things (IoT) Framework for Federal University, Dutsin-Ma, Katsina State

Background of the Study

The proliferation of Internet of Things (IoT) devices in academic institutions has transformed the way students, faculty, and staff interact with technology. IoT devices such as smart cameras, biometric access control systems, sm...

Read more

47. An Investigation of the Role of Internet of Things (IoT) in School Safety in Secondary Schools in Jalingo Local Government Area, Taraba State

Background of the study
The Internet of Things (IoT) refers to the interconnection of everyday physical devices to the internet, allowing them to collect and exchange data. In the context of education, IoT applications have gained increasing importance in...

Read more

48. Enhancing School Security Through Biometric Authentication Systems in Secondary Schools in Katsina Local Government Area, Katsina State

Background of the Study

School security is a critical concern in contemporary education systems, with institutions facing increasing threats such as unauthorized access, kidnapping, student impersonation, and theft. Ensuring a safe learning environment...

Read more

49. Design of a Digital Student Identification System for Universities in Ilorin East Local Government Area, Kwara State

Background of the study
Student identification is a fundamental component of university operations, ensuring security, access control, and accurate record-keeping. Traditional methods of student identification, such as physical ID cards, have limitations, including the ris...

Read more

50. Enhancing Data Security in School Management Systems in Secondary Schools in Zaria Local Government Area, Kaduna State

Background of the Study

Data security in educational institutions is crucial, as schools handle a vast amount of sensitive information, including students' personal details, academic records, and financial transactions. In Zaria Local Government Area, Kaduna State,...

Read more
whatsapp