0704-883-0675     |      dataprojectng@gmail.com
1

1. A SURVEY OF THE INCREASE AND USAGE OF CRYPTOCURRENCIES IN AFRICA

Background of the study

Throughout history, people have exchanged products and services via a number of techniques and channels. Many of these methods and materials, such as metal coins or paper money, are typically physical.

Without a questio...

Read more

2. INVESTIGATION ON THE RISK ATTACHED TO USING E-NAIRA IN NIGERIA

Background of the study

Connection to the financial system is very important to different economies in the world. Digital currencies have attracted strong interest in recent years and have the potential to become widely adopted for use in making payment...

Read more

3. AN EXAMINATION ON THE CAUSES OF EMPLOYEE DISENGAGEMENT

BACKGROUND OF THE STUDY

Employee disengagement is one very serious unnerving issue that results in anxiety for the employee. Oftentimes the situation is unforeseen and doesn’t necessarily lie in the hands of the employer, other times it is even ve...

Read more

4. CHALLENGES OF POLICY IMPLEMENTATION IN NIGERIA

Background Of The Study

In every society, there must exist some problems. These problems could be in the areas of politics, commerce, education, agriculture, communication, housing, transportation, health etc. In order to solve these problems as they mi...

Read more

5. EFFECT OF CRYPTOCURRENCY BAN POLICY ON UNEMPLOYMENT RATE IN NIGERIA

BACKGROUND OF STUDY

The global financial system is no doubt embracing the current transition from physical currency to almost virtual currencies through the medium of technology. This wave has ushered in the birth of crypto currencies. In the light of t...

Read more

6. DESIGN AND IMPLEMENTATION OF FACE DETECTION AND RECOGNITION SYSTEM

INTRODUCTION

Face recognition system is an application for identifying someone from image or videos. Face recognition is classified into three stages ie)Face detection,Feature Extraction ,Face Recognition. Face detection method is a difficult task in image analysis. Fac...

Read more

7. RELIABILITY AND PROTECTION IN DISTRIBUTION POWER SYSTEM CONSIDERING CUSTOMER BASED INDICES

BACKGROUND OF THE STUDY

Electricity is a component that cannot be overlooked in any contemporary economy. It is essential for the expansion of a nation's economy and its overall development that the nation have access to an affordable and dependable...

Read more

8. ANALYSIS OF TEXT – TO- SPEECH/AUDIO SYSTEM VIA DESIGN AND IMPLEMENTATION

BACKGROUND OF THE STUDY

The capacity to convey one's thoughts through a set of signs (text), gestures, and noises is referred to as language. It is a distinguishing property of humans, who are the only organisms with such a system. Speech is the oldest and most exte...

Read more

9. INFORMATION HIDING USING DIGITAL STEGANOGRAPHY

ABSTRACT

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency...

Read more

10. DATA MINING TECHNIQUES IN ANALYSIS OF STUDENT COURSE OF STUDY

Abstract

 

Data mining has a great deal of attention in the information industry in recent year due to the wide availability of high amount of data and the useful information and knowledge. This project is based on the Application of Data mining technique...

Read more

11. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPANY PLC LAGOS)

ABSTRACT

With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...

Read more

12. SMART TRAFFIC CONTROL SYSTEM USING YOLO-MODEL

Background of the study

Traffic congestion is a major problem in many cities, and the fixed-cycle light signal controllers are not resolving the high waiting time in the intersection. We see often a policeman managing the movements instead of the traffi...

Read more

13. A HYBRID GENETIC-ARTIFICIAL FISH SWARM ALGORITHM FOR ECONOMIC LOAD DISPATCH WITH VALVE-POINT AND MULTIPLE FUEL EFFECTS

ABSTRACT

The restructuring of the electrical power industry has given rise to a high degree of vibrancy and competitive market, which changed many features of the power industry. Energy resources become scarce, the cost of power generation increases, environmental conce...

Read more

14. APPLICATION OF BAT ALGORITHM-BASED METHOD FOR MULTI-OBJECTIVE OPTIMAL NETWORK RECONFIGURATION AND DISTRIBUTED GENERATION PLACEMENT IN RADIAL DISTRIBUTION NETWORK

ABSTRACT

This study presents an Application of Bat Algorithm-Based Method (BA) forMultiObjective Optimal Network Reconfiguration andDistributed Generation placement in Radial Distribution Network. The BA approach presented in this work enables the reconfiguration of the network as well...

Read more

15. APPLICATION OF AN OPTIMAL TUNING TECHNIQUE OF ON-LOAD TAPCHANGING TRANSFORMER FOR POWER QUALITY IMPROVEMENT IN TRANSMISSION LINE NETWORK

ABSTRACT

For reliable and efficient operation of power system, voltage level and reactive power flow along transmission lines has to be adequately regulated. To control reactive power flow over transmission lines and compensate for varying voltage drops, tap changing transformers are re...

Read more

16. A CUCKOO SEARCH BASED CO-ORDINATION OF DISTRIBUTED GENERATION UNITS AND SHUNT CAPACITOR BANK IN RADIAL DISTRIBUTION NETWORKS

ABSTRACT

This research work presents the Application of Cuckoo Search Algorithm for the simultaneous placement of distributed generation units and shunt capacitor banks in radial distribution networks. The approaches used in most literatures for determining the optimal allocation of DG...

Read more

17. DESIGN AND IMPLEMENTATION ONLINE SMS EXAMINATION TIMETABLE ALERT SYSTEM

ABSTRACT

This project designs and implements an algorithm which creates a semester course timetable by assigning time-slots and exam halls to a given set of courses to be run that semesterunder given constraints. The constraints include avoiding clashes of time-slots an...

Read more

18. DESIGN AND IMPLEMENTATION OF EXAMINATION SCHEDULING AND ALLOCATION SYSTEM

ABSTRACT

          Scheduling lectures and practical timetables for a large array of courses is a very complex problem which often has to be solved manually by the center staff even though results are not always fully optimal...

Read more

19. LINE LOSSES MINIMIZATION IN ELECTRICAL POWER NETWORK USING PARTICLE SWARM OPTIMIZATION

Abstract

This study examines how line losses can be minimized using particle swarm optimization. Three research objective were formulated to give direction towards this work, this study describes theoretical and practical issues concerning line losses minimization in el...

Read more

20. BACTERIAL FORAGING ALGORITHM BASED TUNING OF ON-LOAD TAP CHANGING TRANSFORMER FOR VOLTAGE REGULATION IN POWER TRANSMISSION NETWORK

ABSTRACT

The control of voltage level has been identified as one of the most important operational

needs for efficient and reliable operation of power system equipment. Due to the fact

that both the utility and customer equipment are designed to ope...

Read more

21. DEVELOPMENT OF A CLONAL SELECTION ALGORITHM BASED SYSTEM FOR AUTOMATIC DETECTION OF MULTIPLE SHAPES

ABSTRACT

In this dissertation a Clonal Selection Algorithm (CSA) based system that detected multiple instances of circles, quadrilaterals and triangles in an image scene was developed. CSA models how B-cell antibodies of the immune system protect the body from invading...

Read more

22. DEVELOPMENT OF A DISCRETE-FIREFLY ALGORITHM BASED FEATURE SELECTION SCHEME FOR IMPROVED FACE RECOGNITION

ABSTRACT

This research presents the development of a Discrete Firefly Algorithm (DFA) based feature selection scheme for improved face recognition. Discrete Cosine Transform (DCT) and Haar wavelet based Discrete Wavelet Transform (DWT) were used for feature extraction, and Nearest Neigh...

Read more

23. DEVELOPMENT OF A FUZZY TIME SERIES MODEL USING CAT SWARM OPTIMIZATION CLUSTERING AND OPTIMIZED WEIGHTS OF FUZZY RELATIONS

ABSTRACT

This research developed a hybrid forecasting technique that integrates Cat Swarm Optimization Clustering (CSO-C) and Particle Swarm Optimization (PSO) algorithms with Fuzzy Time Series (FTS) forecasting model. Cat Swarm Optimization Clustering (CSO-C) which is an algorithm for...

Read more

24. DEVELOPMENT OF A MODIFIED ARTIFICIAL FISH SWARM ALGORITHM PARTIAL TRANSMIT SEQUENCE TECHNIQUE FOR PEAK TO AVERAGE POWER RATIO REDUCTION IN ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING

ABSTRACT

Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier frequency multiplexing scheme used in broadband wireless communication systems and has advantages such as high spectral efficiency, simple channel equalization and flexibility.One of its major challenges is th...

Read more

25. DEVELOPMENT OF A MODIFIED FRUIT FLY OPTIMIZATION ALGORITHM BASED LINEAR QUADRATIC REGULATOR CONTROLLER FOR AIRCRAFT PITCH CONTROL SYSTEM

ABSTRACT

This research is aimed at the development of a modified fruit fly optimization algorithm (mFFOA) for the determination of optimized weighting matrices (Q which is a positive definite matrix that penalizes the states and R which is also a positive definite matrix that penalizes...

Read more

26. DEVELOPMENT OF A MODIFIED TOKEN BASED CONGESTION CONTROL SCHEME WITH ADAPTIVE FORWARDING FOR OPPORTUNISTIC NETWORK

ABSTRACT

This research presents the development of a modified token-based congestion control scheme with adaptive forwarding mechanism (mTBCC) algorithm for addressing congestion problems in opportunistic networks (OppNets). The algorithm addresses the limitations associated with the st...

Read more

27. DEVELOPMENT OF A PRIVACY AIDED TRUST ROUTING ALGORITHM BASED ON SOCIAL SIMILARITY IN OPPORTUNISTIC NETWORK

ABSTRACT

This research work presents the development of a privacy aided trust routing model using social similarity in an Opportunistic Network (OppNet). OppNet is a delay tolerant network where link is highly unpredictable. It is an ideal solution in situations where the deployment of...

Read more

28. DEVELOPMENT OF A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE IN DISCRETE ORTHONORMAL STOCKWELL TRANSFORM DOMAIN BASED ON PHOTON POLARIZATION

Excerpt from the Study

This study focused on the development of novel digital image watermarking technique in DOST domain in conjunction with DWT and SVD based on the principle of photon polarization using optimal scaling factor. The developed algorithm is applied on co...

Read more

29. DEVELOPMENT OF A SMELL AGENT OPTIMIZATION ALGORITHM FOR COMBINATORIAL OPTIMIZATION PROBLEMS

Excerpt from the Study

Combinatorial optimization involves the mathematical study of arraignment, ordering, selection or grouping of discrete objects. The complexity of combinatorial problem usually increases as the problem dimension becomes very large. Solving these la...

Read more

30. DEVELOPMENT OF AN IMPROVED FORCED ISLAND AND LOAD SHEDDING SCHEME TO PREVENT SYSTEM COLLAPSE

ABSTRACT

This research work presents a scheme that identifies line outage and generator outage using contigency analysis and effectively splits the network into a set of predefined islands, with a load shedding strategy to minimise the adverse effect of each outage and to ensure system...

Read more

31. DEVELOPMENT OF AN ADAPTIVE TRACKING AREA LIST LOCATION MANAGEMENT SCHEME IN LONG TERM EVOLUTION (LTE) NETWORKS

ABSTRACT

High signaling load due to location management (LM) scheme in Long Term Evolution (LTE) Networks is a major quality of service issue due to the significant amount of resources consumed by this scheme. This scheme needs to be managed efficiently to guarantee seamless connection...

Read more

32. DEVELOPMENT OF AN IMPROVED ALGORITHM FOR POWER LINE DETECTION IN OPTICAL IMAGES USING FRANGI FILTER AND FIRST ORDER DERIVATIVE OF GAUSSIAN

ABSTRACT

This research presents the development of a Frangi filter and first-order derivative of Gaussian (FF-FDOG) based power line detection (PLD) algorithm as an improvement to the standard PLD algorithm. Vision-based PLD is important in obstacle avoidance in low-altitude flight and...

Read more

33. DEVELOPMENT OF AN IMPROVED APPLICATION SPECIFIC TUNELLING PROTOCOL SELECTION SCHEME FOR SITE TO SITE VIRTUAL PRIVATE NETWORKS

ABSTRACT

This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...

Read more

34. DEVELOPMENT OF AN OPTIMAL EXTRACTED FEATURE CLASSIFICATION SCHEME IN VOICE RECOGNITION SYSTEM USING DYNAMIC CUCKOO SEARCH ALGORITHM

ABSTRACT

This research work is aimed at the development of an optimal extracted feature classification scheme in a voice recognition system using dynamic cuckoo search algorithm. This minimized error mismatch in the recognition process and increased accuracy of recognition. Standard voi...

Read more

35. DEVELOPMENT OF AN IMPROVED KEYFRAME EXTRACTION SCHEME FOR VIDEO SUMMARIZATION BASED ON HISTOGRAM DIFFERENCE AND K-MEANS CLUSTERING

ABSTRACT

The rate of increase in multimedia data necessitated the need for a large number of storage devices. Nonetheless, the stored multimedia data has a lot of redundant video frames. These redundant frames make video browsing and retrieval difficult as well as time-consuming for the...

Read more

36. DEVELOPMENT OF AN IMPROVED SHORT-TERM PEAK LOAD FORECASTING MODEL BASED ON SEASONAL AUTOREGRESSIVE INTEGRATED MOVING AVERAGE AND NONLINEAR AUTOREGRESSIVE NEURAL NETWORK FOR NIGERIA POWER SYSTEM GRID

ABSTRACT

Electricity demand forecasting is a central and integral process for planning periodical operations and facility expansion in the electricity sector. Demand pattern is very complex due to the highly unpredictable behavior of consumers load consumption. Therefore, finding an app...

Read more

37. DEVELOPMENT OF AN INTERNET PROTOCOL TRACEBACK SCHEME FOR DENIAL OF SERVICE ATTACK SOURCE DETECTION

ABSTRACT

This study presents the development of an Internet Protocol (IP) traceback scheme for the detection of a denial of service (DoS) attack source base on shark smell optimization algorithm (SSOA). Detection of the source of DoS attack is very important due to the serious damages t...

Read more

38. DEVELOPMENT OF AN OPTIMIZED ROUTING SCHEME FOR A CAPACITATED VEHICLE MODEL

ABSTRACT

This dissertation presents the development of an optimized routing scheme for a capacitated vehicle model using Firefly Algorithm (FFA). The conventional model is a formal description involving mathematical equations formulated to simplify a more complex structure of logistic p...

Read more

39. DEVELOPMENT OF FIREFLY ALGORITHM BASED METHOD FOR DISTRIBUTED GENERATION PLANNING IN AN UNBALANCED THREE-PHASE DISTRIBUTION NETWORK USING VOLTAGE STABILITY INDEX

ABSTRACT

This research work presents development of Firefly algorithm (FA) and application of voltage stability index (VSI) for optimal planning of Distribution Generation (DG) in an unbalanced threephase distribution network. The VSI was used to find the DG location while the FA was us...

Read more

40. DEVELOPMENT OF MONARCH BUTTERFLY OPTIMIZATION ALGORITHM FOR ECONOMIC LOAD DISPATCH SOLUTION

ABSTRACT

The generation of electric power using different fuel resources to meet load demand and losses while satisfying various constraints on the system involves high running cost (cost of fuel). Therefore, it requires electric utilities to minimize the cost of production of electric...

Read more

41. DEVELOPMENT OF THREE DEGREE OF FREEDOM CONTROLLER FOR SHELL AND TUBE HEAT EXCHANGER USING NON-DOMINATED SORTING GENETIC ALGORITHM II

ABSTRACT

This thesis presents the development of a Three Degree of Freedom (3DoF) based outlet fluid temperature controller for Shell and Tube Heat Exchanger (STHX). Shell and Tube Heat Exchangers are classes of heat exchangers being used in industries for heat transfer between fluids....

Read more

42. DEVELOPMENT OF TRANSITIONAL PROBABILITY MATRIX MODEL FOR PAVEMENT DESIGN

ABSTRACT

A model of transitional probability matrix for Mechanistic-Empirical Pavement Design was developed with the aim of tarnishing the traditional method obtained from the judgment of an expert panel. The model was developed using fatigue and rutting as the critical factors in pavem...

Read more

43. IMPROVING FAIRNESS IN LOAD BALANCING AMONG RADIO ACCESS TECHNOLOGIES IN HETEROGENEOUS WIRELESS NETWORK

ABSTRACT

The major problems of most wireless technologies such as EDGE, HSPA, WiMax, HSPA+, WiFi G, WiFi and LTE are the imbalance of radio resources allocation as well as unfairness and difficulty to achieve unity index. These result in overstressing the networks while leaving some idl...

Read more

44. HARMONICS MITIGATION ON VARIABLE FREQUENCY DRIVE USING SINGLE PHASE SHUNT ACTIVE POWER FILTER CONTROLLED BY ARTIFICIAL NEURAL NETWORK

ABSTRACT

This research presents effect of harmonic generated by variable frequency drives (VFD).In the past, electrical power system equipment and devices were designed to produce nearly sinusoidal voltage and current waveforms. However, nowadays, with much interest and wide spreads of...

Read more

45. DEVELOPMENT OF AN IMPROVED EXTENDED DIJKSTRA ALGORITHM FOR SOFTWARE DEFINED NETWORKS

ABSTRACT

This research presents the development of an improved Extended Dijkstra Algorithm (mED-SDN) for Software Defined Networks (SDN) using Representational State Transfer (REST). The original Extended Dijkstra Algorithm for SDN (ED-SDN) cannot handle shortcomings associated with the...

Read more

46. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

47. DESIGN AND IMPLEMENTATION OF A STEGANOGRAPHIC SYSTEM- SECURTITY ENCRYPTION SYSTEM

ABSTRACT

Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...

Read more

48. AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION

ABSTRACT

Image steganography is the science of hiding data for securing confidential communication and it is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images. The least significant bit algorithm (LSB) as one...

Read more

49. CATEGORIZATION OF DATA USING HIERARCHICAL CLUSTERING

ABSTRACT

In this project, we shall implement the hierarchical clustering algorithm and apply it to various data sets such as the weather data set, the student data set, and the patient data set. We shall then reduce these datasets using the following dimensionality reduction approaches:...

Read more

50. DESIGN AND IMPLEMENTATION OF A TRANSPORT SYSTEM USING SEARCH ALGORITHM

ABSTRACT

 

            Transportation is a basic requirement for every nation, regardless of its industrial capacity, it has been a difficult task for individuals to locate their transport route,...

Read more
whatsapp