0704-883-0675     |      dataprojectng@gmail.com
1

1. INVESTIGATION ON THE RISK ATTACHED TO USING E-NAIRA IN NIGERIA

Background of the study

Connection to the financial system is very important to different economies in the world. Digital currencies have attracted strong interest in recent years and have the potential to become widely adopted for use in making payment...

Read more

2. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPANY PLC LAGOS)

ABSTRACT

With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...

Read more

3. SMART TRAFFIC CONTROL SYSTEM USING YOLO-MODEL

Background of the study

Traffic congestion is a major problem in many cities, and the fixed-cycle light signal controllers are not resolving the high waiting time in the intersection. We see often a policeman managing the movements instead of the traffi...

Read more

4. A HYBRID GENETIC-ARTIFICIAL FISH SWARM ALGORITHM FOR ECONOMIC LOAD DISPATCH WITH VALVE-POINT AND MULTIPLE FUEL EFFECTS

ABSTRACT

The restructuring of the electrical power industry has given rise to a high degree of vibrancy and competitive market, which changed many features of the power industry. Energy resources become scarce, the cost of power generation increases, environmental conce...

Read more

5. DEVELOPMENT OF A FUZZY TIME SERIES MODEL USING CAT SWARM OPTIMIZATION CLUSTERING AND OPTIMIZED WEIGHTS OF FUZZY RELATIONS

ABSTRACT

This research developed a hybrid forecasting technique that integrates Cat Swarm Optimization Clustering (CSO-C) and Particle Swarm Optimization (PSO) algorithms with Fuzzy Time Series (FTS) forecasting model. Cat Swarm Optimization Clustering (CSO-C) which is an algorithm for...

Read more

6. DEVELOPMENT OF A SMELL AGENT OPTIMIZATION ALGORITHM FOR COMBINATORIAL OPTIMIZATION PROBLEMS

Excerpt from the Study

Combinatorial optimization involves the mathematical study of arraignment, ordering, selection or grouping of discrete objects. The complexity of combinatorial problem usually increases as the problem dimension becomes very large. Solving these la...

Read more

7. DEVELOPMENT OF AN IMPROVED APPLICATION SPECIFIC TUNELLING PROTOCOL SELECTION SCHEME FOR SITE TO SITE VIRTUAL PRIVATE NETWORKS

ABSTRACT

This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...

Read more

8. DEVELOPMENT OF AN IMPROVED KEYFRAME EXTRACTION SCHEME FOR VIDEO SUMMARIZATION BASED ON HISTOGRAM DIFFERENCE AND K-MEANS CLUSTERING

ABSTRACT

The rate of increase in multimedia data necessitated the need for a large number of storage devices. Nonetheless, the stored multimedia data has a lot of redundant video frames. These redundant frames make video browsing and retrieval difficult as well as time-consuming for the...

Read more

9. DEVELOPMENT OF AN INTERNET PROTOCOL TRACEBACK SCHEME FOR DENIAL OF SERVICE ATTACK SOURCE DETECTION

ABSTRACT

This study presents the development of an Internet Protocol (IP) traceback scheme for the detection of a denial of service (DoS) attack source base on shark smell optimization algorithm (SSOA). Detection of the source of DoS attack is very important due to the serious damages t...

Read more

10. HARMONICS MITIGATION ON VARIABLE FREQUENCY DRIVE USING SINGLE PHASE SHUNT ACTIVE POWER FILTER CONTROLLED BY ARTIFICIAL NEURAL NETWORK

ABSTRACT

This research presents effect of harmonic generated by variable frequency drives (VFD).In the past, electrical power system equipment and devices were designed to produce nearly sinusoidal voltage and current waveforms. However, nowadays, with much interest and wide spreads of...

Read more

11. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

12. AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION

ABSTRACT

Image steganography is the science of hiding data for securing confidential communication and it is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images. The least significant bit algorithm (LSB) as one...

Read more

13. Data Classification Using Various Learning Algorithms

Abstract

Dimensionality reduction provides a compact representation of an original high-dimensional data, which means the reduced data is free from any further processing and only the vital information is retained. For this reason, it is an invaluable preprocessing step before the appli...

Read more

14. A DESIGN SPACE EXPLORATION METHODOLOGY TO SUPPORT DECISIONS UNDER EVOLVING UNCERTAINTY IN REQUIREMENTS AND ITS APPLICATION TO ADVANCED VEHICLES

SUMMARY Recent technological developments have resulted in the emergence of new advanced vehicles such as suborbital vehicles and personal air vehicles. These innovative vehicles have in turn opened up new markets that are characterized by a large and complex solution space that requires designer...

Read more

15. MODELING FOR INVERSION IN EXPLORATION GEOPHYSICS

Introduction and Background

Understanding the physics of our surrounding has driven science and technology for a long time and while some part of the earth is well know and understood, its subsurface is mostly unknown. The subsurface is one of today’s most important challenges. Fi...

Read more

16. AN IPV6 ROUTING TABLE LOOKUP ALGORITHM IN SOFTWARE AND ASIC BY DESIGNING A HIGH-LEVEL SYNTHESIS SYSTEM

ABSTRACT

This dissertation has two contributions. The primary contribution is to present a trie based routing table lookup algorithm named CP-Trie. The secondary contribution is to present a high-level synthesis tool named C2RTL that can generate routing table lookup implementation in A...

Read more

17. BEAM DISCOVERY AND TRACKING FOR MOBILE MIMO

ABSTRACT

The real-time applications and the IoT promote the need for a newer idle spectrum to support the required high traffic. This pushes toward the emergence of the millimeter-wave (mmWave) and the sub-Terahertz (sub-THz) bands in wireless communication. Albeit these higher frequenc...

Read more

18. COMPROMISING RANDOM LINEAR NETWORK CODING AS A CIPHER

ABSTRACT

Due to its potential improvement on network throughput, network coding has attracted considerable research interests. Random Linear Network Coding (RLNC), as a branch of research on network coding, is proposed as a cipher to protect the confidentiality of packets possibly on th...

Read more

19. CYBERBULLYING DETECTION USING WEAKLY SUPERVISED AND FULLY SUPERVISED LEARNING

ABSTRACT

Machine learning is a very useful tool to solve issues in multiple domains such as sentiment analysis, fake news detection, facial recognition, and cyberbullying. In this work, we have leveraged its ability to understand the nuances of natural language to detect cyberbullying....

Read more

20. Design, Implementation, and Applications of Fully Autonomous Aerial Systems

Abstract

Fully autonomous aerial systems (FAAS) combine edge and cloud hardware with UAVs and considerable software support to create self-governing systems. FAAS complete complicated missions with no human piloting by sensing and responding to their environment in real-time. FAAS requi...

Read more

21. Game-Theoretic Relay Selection and Power Control in Fading Wireless Body Area Networks

Abstract 

The trend towards personalized ubiquitous computing has led to the advent of a new generation of wireless technologies, namely wireless body area networks (WBANs), which connect the wearable devices into the Internet-of-Things. This thesis considers the problems of relay...

Read more

22. LEARNING FROM NATURAL HUMAN INTERACTIONS FOR ASSISTIVE ROBOTS

ABSTRACT.

In our everyday lives, we interact with agents like personal computers, search engines, cars, etc., and reveal many of our personal choices, biases, and preferences. Improving agents by analyzing their interactions with humans is an active area of research. However, the algori...

Read more

23. A System of Automated Web Service Selection

Abstract

In the modern world, service oriented applications are becoming more and more popular from year to year. To remain competitive, these Web services must provide the high level of quality. From another perspective, the end user is interested in getting the service, which fits the...

Read more

24. A THEORETICALLY LOSSLESS METHOD FOR DERIVING EMPIRICAL ORTHOGONAL FUNCTIONS FROM UNEVENLY SAMPLED DATA

ABSTRACT

The Lomb-Scargle discrete Fourier transform (LSDFT) is a fairly popular technique for analyzing time series within the astronomy community. However, this algorithm is largely unknown in many other disciplines, despite many potential applications. In particular, the atmospheric...

Read more

25. Driving Manoeuvre Recognition using Mobile Sensors

Abstract

Automobiles are integral in today’s society as they are used for transportation, commerce, and public services. The ubiquity of automotive transportation creates a demand for active safety technologies for the consumer. Recently, the widespread use and improved sensing an...

Read more

26. MITIGATING THE EFFECT OF TOPOLOGY IN CELLULAR MOBILE NETWORK USING MATLAB

BACKGROUND OF THE STUDY

Wireless Ad hoc Networks are networks in which wireless nodes cooperate to establish network connectivity and perform routing functions in the absence of infrastructure using selforganization. Similarly, Mobile wireless Ad hoc Networks (MANETs) are networks in wh...

Read more

27. DEVELOPMENT OF AN INTERNET OF THINGS BASED WATER MANAGEMENT SYSTEM USING DECISION TREE AND DEEP NEURAL NETWORK ALGORITHMS

ABSTRACT

Distribution of Water has been a major source of concern all over the world. Despite the fact that water is a scarce commodity, a lot of human activities in terms of poor management such as opening taps when not needed and careless attitudes towards broken pipes contribute to p...

Read more

28. ONE-STEP SECOND DERIVATIVE BLOCK INTRA-STEP POINTS FOR STIFF SYSTEMS OF INITIAL VALUE PROBLEMS

ABSTRACT Modified class of single-step numerical schemes were proposed to improve the order of accuracy by imposing intra-step points in the formulation process of the proposed algorithms. The behaviour of modified numerical algorithm is of great concern when varieties of countable off-grid point...

Read more

29. INHIBITION OF PLANT LEAF EXTRACTS ON ALUMINUM AND MILD STEEL IN ACIDIC AND ALKALINE MEDIA USING DIFFERENT TECHNIQUES

Statement of the Problem

The obnoxious state of the Nigerian manufacturing sector has created a dire need for accurate bankruptcy prediction models about the overall outlook of companies. This is precipitated on the overbearing consequences of corporate bankruptcy on key stakeholders. P...

Read more

30. COMPUTERIZED TRANSPORT MANAGEMENT INFORMATION SYSTEM

Introduction

The transportation community has experienced the beginnings of a cultural shift toward embedding transportation system management and operation into our culture, work ethic Manufacturers, distributors, and third-party logistics companies all have specific b...

Read more

31. EXPLORING THE APPLICATION OF NUMBER THEORY IN CRYPTOGRAPHY

Background of the study

Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...

Read more

32. DESIGN AND IMPLEMENTATION OF COMPUTER BASED SCHEDULING SYSTEM FOR A TRANSPORT COMPANY

CHAPTER ONE

INTRODUCTION

STATEMENT OF PROBLEM

A scheduling situation in a transport company develops when buses are expected to dispatch effectively. Scheduling needs the dispatch and general information about route...

Read more

33. DESIGN AND IMPLEMENTATION OF COMPUTER BASED SCHEDULING SYSTEM FOR A TRANSPORT COMPANY

CHAPTER ONE

INTRODUCTION

STATEMENT OF PROBLEM

A scheduling situation in a transport company develops when buses are expected to dispatch effectively. Scheduling needs the dispatch and general information about route...

Read more

35. THE USE OF ARTIFICIAL INTELLIGENCE AND IT'S EFFECTS ON ACADEMIC PERFORMANCE OF UNDERGRADUATES: A STUDY OF AE-FUNAI STUDENTS

​​​​​​​Background of the study

Artificial intelligence (AI) has become an integral part of many industries, revolutionizing traditional practices and offering innovative solutions to complex problems. In the context of education, AI technologies are inc...

Read more

36. THE IMPACT OF PRESCRIPTIVE ANALYTICS ON BUSINESS OUTCOMES

Abstract: THE IMPACT OF PRESCRIPTIVE ANALYTICS ON BUSINESS OUTCOMES 

This study investigates the impact of prescriptive analytics on enhancing decision-making processes and achieving favorable business outcomes within organizations. The objectives...

Read more

37. DEVELOPING VOCATIONAL EDUCATION PROGRAMS FOR CAREERS IN QUANTUM COMPUTING

ABSTRACT: Developing vocational education programs for careers in quantum computing is essential to prepare the next generation of professionals for the emerging quantum technology sector. This study aimed to design effective vocational education programs tailored to quantum computing, asses...

Read more
whatsapp