0704-883-0675     |      dataprojectng@gmail.com
1

1. DESIGN AND IMPLEMENTATION OF RADIO CONTROLLED CAR LOCK WITH 5MIN IGNITION DEACTIVATION

Abstract

The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...

Read more

2. AN ASSESSMENT OF FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

Background of the Study

A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...

Read more

3. DESIGN AND IMPLEMENTATION OF AN AUTOMATED CAR PLATE NUMBER RECOGNITION SYSTEM

Background of the study

Massive integration of information technology into all aspects of modern life caused demand for processing vehicles as conceptual resources in information systems. Because a standalone information system without any data has no sense, there was a...

Read more

4. DESIGN AND IMPLEMENTATION OF PASSWORD BASED ACCESS CONTROL WITH INTRUDER ALERT SYSTEM

ABSTRACT

The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...

Read more

5. D AND I OF RADIO CONTROLLED CAR LOCK WITH 5MIN IGNITION DEACTIVATION

Abstract

The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...

Read more

6. Understanding and Exploiting Design Flaws of AMD Secure Encrypted Virtualization

Abstract

Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...

Read more

7. HYBRID CONTENTION-ADDRESSING ALGORITHM FOR ENERGY EFFICIENCY IN IEEE 802.11 WAKE-UP BASED RADIO NETWORK UPLINK

ABSTRACT

Power consumption is a key consideration in every Wireless Local Area Network Medium Access Control (WLAN MAC) algorithm design for wireless devices and extending battery life requires more efficient power management scheme considering that carrier sensing by WLAN modules, fals...

Read more

8. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more
whatsapp