0704-883-0675     |      dataprojectng@gmail.com
1

1. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...

Read more

2. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...

Read more

3. AN EVALUATION OF AUDITING AND ITS IMPORTANCE IN THE AUTHENTICATION OF FINANCIAL STATEMENT OF BUSINESS ORGANISATION IN NIGERIA

BACKGROUND OF STUDY

The notion of auditing data dates back to ancient times, with the oldest signs of its existence discovered among major landowners of the Middle Ages in Italy and Egypt.

However, according to afounka (1993), statutory auditi...

Read more

4. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...

Read more

5. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

6. FINGERPRINT BASED STUDENT ATTENDANCE MONITORING SYSTEM

Background of the Study

Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...

Read more

7. DESIGN AND IMPLEMENTATION OF E-COMMERCE WEBSITE

OBJECTIVE OF THE STUDY

The aim of this study is to design and implement a database driven online virtual marketplace with a particular reference to Ogbete main market. The web based program developed in this research essentially provides all the necessary marketing serv...

Read more

8. AN ASSESSMENT OF FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

Background of the Study

A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...

Read more

9. A FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

 

Abstract

The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to  provide a platform that will allow the bankers to collect customers’ finger print,  provide a platform t...

Read more

10. DESIGN AND IMPLEMENTATION OF A TWO FACTOR AUTHENTICATION LOGIN SYSTEM USING ONE TIME PASSWORD (OTP) WITH SMS

ABSTRACT

The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...

Read more

11. DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

ABSTRACT

 

 In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the le...

Read more

12. COMPARATIVE PHARMACOGNOSTIC STUDIES OF THE LEAVES OF SOLANUM INCANUM LINN AND SOLANUM MELONGENA LINN (SOLANACEAE)

ABSTRACT

Solanum incanum Linn. and Solanum melongena Linn (Solanaceae) are both shrubs or trees found in the sub-Saharan Africa and the Middle East. Both are called „gauta‟ among the Hausa community of Northern Nigeria and „Tarku‟ among the Bura/Babar speaking people of Sout...

Read more

13. MEDICINAL PLANTS USED IN THE MANAGEMENT OF DEPRESSIVE ILLNESSES: ANTIDEPRESSANT ACTIVITY OF METHANOL STEM BARK EXTRACT OF ADANSONIA DIGITATA L. IN MICE

ABSTRACT

Depression is a heterogeneous mood disorder that has been treated with a number of synthetic drugs. These drugs have adverse effects and delayed onset of action that compromise their therapeutic benefits. This makes it worthwhile to search for new antidepressant agents with pro...

Read more

14. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

15. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

 

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...

16. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

17. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more

18. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...

Read more

19. Generic Metadata Handling in Scientific Data Life Cycles

Introduction

This chapter introduces the dissertation by describing its context, the identified challenges, how the chosen challenge was met, the achieved impact, relevant publications, and how the thesis is structured. 1.1 Context In science data is the essential focal point in todays...

Read more

20. Holmes: An Open-source Image Forensics Toolkit

ABSTRACT

 

Digital images continue to be ever-present in our daily lives as means of conveying information. With the availability of image editing software, now more than ever our ability to trust the images we see have been brought into question; the field of digital ima...

Read more

21. New Password Authenticated Key Exchange Based on the Ring Learning with Errors

Abstract

Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...

Read more

22. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

23. AN ASSESSMENT OF THE UTILIZATION OF DATAPROJECTNG PLATFORM AMONG POST-GRADUATE STUDENTS IN NIGERIA.

Background of the Study

Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...

Read more

24. DESIGN AND IMPLEMENTATION OF AN ONLINE AUCTION SYSTEM

Background of Study

Electronic commerce, also known as e-commerce, has developed rapidly in recent years. More and more and more consumers prefer to shop online for convenience and other benefits. E-commerce and auctions are also attracting attention. Many internet companies like eBay a...

Read more

25. Enhancing Financial Inclusion Through Artificial Intelligence Tools: A Case Study of Microfinance Banks in Jigawa State

1.1 Background of the Study

Financial inclusion is a critical driver of economic growth, aiming to provide affordable and accessible financial services to underserved populations. In Nigeria, a significant portion of the population remains unbanked or underbanked, particularly in rural...

Read more

26. The Role of Artificial Intelligence-based Biometric Systems in Enhancing User Authentication: A Case Study of Access Bank, Plateau State

1.1 Background of the Study

Biometric authentication systems, which include technologies like fingerprint recognition, facial recognition, and voice identification, have revolutionized user security in digital platforms. As cyber threats continue to increase, traditional password-based...

Read more

27. The Impact of Cybersecurity Measures on Data Security in Financial Institutions: A Case Study of Microfinance Banks in Sokoto State

Background of the Study

In an era of digital banking, the security of data is paramount, especially for financial institutions like microfinance banks that deal with sensitive customer information and financial transactions. Cybersecuri...

Read more

28. A Study of the Role of Digital Identity Systems in Fraud Prevention: A Case Study of Fintech Firms in Kano State

Background of the Study

Digital identity systems are technologies that authenticate and verify an individual’s identity online through biometric data, credentials, or digital certificates (Kim & Lee, 2023). These systems have become a vital tool in preventing...

Read more

29. An Examination of the Effectiveness of Biometric Authentication in Financial Transactions: A Study of Fintech Firms in Niger State

Background of the Study

Biometric authentication has emerged as a key technology in securing financial transactions by verifying the identity of users through unique physical characteristics such as fingerprints, facial recognition, and retinal scans (Bose & Jayapal...

Read more

30. An Examination of Cybersecurity Investment and Risk Mitigation Strategies: A Case Study of Banks in Kogi State

Background of the Study

As the frequency and sophistication of cyber-attacks continue to rise globally, cybersecurity has become a critical concern for financial institutions, particularly banks. In Kogi State, where digital banking adoption is increasing, cybersecurity...

Read more

31. A Review of Digital Identity Management Solutions and Their Security Risks: A Study of Banks in Bauchi State

Background of the Study

Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...

Read more

32. An Exploration of E-commerce Security Vulnerabilities and Fraud Prevention Techniques: A Study of Online Retailers in Kano State

Background of the Study

E-commerce platforms have experienced significant growth in recent years, providing consumers with convenient ways to shop online. However, this growth has also attracted cybercriminals seeking to exploit security vulnerabilities, leading to frau...

Read more

33. An Evaluation of AI-Driven Voice Recognition in Financial Transactions: A Case Study of Banks in Kano State

Background of the Study

Artificial intelligence (AI)-driven voice recognition technologies are increasingly being utilized to enhance customer experiences and operational efficiency in various industries, including banking. In the context of financial t...

Read more

34. An Examination of the Effectiveness of Biometric Authentication in Financial Transactions: A Study of Fintech Firms in Niger State

Background of the Study

Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...

Read more

35. A Review of Digital Identity Management Solutions and Their Security Risks: A Study of Banks in Bauchi State

Background of the Study

Digital identity management involves the use of technology to authenticate and manage individuals’ identities in digital environments. Banks rely heavily on digital identity management solutions to enhance security, ensure regulatory compliance, and provide...

Read more

36. An Examination of Cybersecurity Investment and Risk Mitigation Strategies: A Case Study of Banks in Kogi State

Background of the Study

As financial institutions increasingly rely on digital platforms, the need for robust cybersecurity measures has become more critical. Cybersecurity investments and risk mitigation strategies are essential for protecting sensitive data and ensuring the integrity...

Read more

37. An Exploration of E-Commerce Security Vulnerabilities and Fraud Prevention Techniques: A Study of Online Retailers in Kano State

Background of the Study

The growth of e-commerce has revolutionized retail, providing convenience and accessibility to consumers. However, it has also exposed online retailers to security vulnerabilities, including phishing attacks, payment fraud, and data breaches (Ibrahim & Olayem...

Read more

38. A Case Study of Cyber Resilience Strategies in Nigerian Banks: A Study of Commercial Banks in Sokoto State

Background of the Study

Cyber resilience refers to an organization's ability to anticipate, withstand, recover from, and adapt to cyberattacks. In the banking sector, where sensitive financial information is stored and processed, implementing effective cyber resilience strategies is...

Read more

39. A Study of the Role of Digital Identity Systems in Fraud Prevention: A Case Study of Fintech Firms in Kano State

Background of the Study

The proliferation of digital identity systems is reshaping fraud prevention strategies in the financial technology (fintech) industry. Digital identity systems leverage advanced technologies such as biometrics, cryptography, and blockchain to authenticate users,...

Read more

40. Evaluation of Network Access Control Mechanisms in Federal University, Lafia, Nasarawa State

Background of the Study
Network access control is a crucial component of network security, especially in institutions with large and diverse user bases like Federal University, Lafia, Nasarawa State. Network access control mechanisms are designed to ensure that only author...

Read more

41. Design and Implementation of a Secure File Sharing System for Federal University, Kashere, Gombe State

Background of the Study
In educational institutions like Federal University, Kashere, Gombe State, secure file sharing is essential to protect sensitive academic, administrative, and research data. The university’s network is used extensively for file transfers betwe...

Read more

42. Comparative Study of Network Authentication Methods in Federal University, Lokoja, Kogi State

Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...

Read more

43. Implementation of Secure Remote Access Solutions in Federal University, Dutsin-Ma, Katsina State

Background of the Study
The need for secure remote access to university networks has grown with the increasing trend of remote learning, telecommuting, and the digitalization of university services. Federal University, Dutsin-Ma, Katsina State, has seen a rise in the numbe...

Read more

44. Design and Implementation of a Secure Network Infrastructure for E-Library Services in Federal University, Kashere, Gombe State

Background of the study:
In the digital age, e-libraries have become essential components of academic institutions, providing easy and efficient access to educational resources. However, ensuring the security of these e-libraries is paramount due to the increasing risks po...

Read more

45. An Investigation into the Use of Virtual Private Networks (VPN) for Secure Remote Access in Federal University, Wukari, Taraba State

Background of the study:
The use of Virtual Private Networks (VPNs) has grown significantly in recent years as organizations and institutions look for secure methods of enabling remote access to their network resources. In the context of universities, VPNs are particularly...

Read more

46. Development of a Network-Based Multi-Factor Authentication System for Federal University, Lokoja, Kogi State

Background of the Study:
As cyber threats continue to evolve, securing user authentication processes has become a top priority for institutions like Federal University, Lokoja, Kogi State. Multi-factor authentication (MFA) is an effective strategy for enhancing the securit...

Read more

47. Implementation of Secure Network Access Control Using Biometric Authentication in Federal University, Kashere, Gombe State

Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...

Read more

48. Comparative Study of Secure Data Transmission Techniques in Federal University, Lokoja, Kogi State

Background of the Study

Data transmission security is a critical aspect of modern network infrastructure, particularly in academic institutions that handle vast amounts of sensitive data, including student records, research outputs, and administrative c...

Read more

49. Enhancing Network Security Using Blockchain Technology in Federal University, Kashere, Gombe State

Background of the Study

With the increasing reliance on digital platforms for research, administration, and communication, universities are prime targets for cyberattacks. Traditional security measures often fail to prevent sophisticated attacks such as...

Read more

50. Design of a Secure Data Storage Network for Research Institutions in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

Research institutions generate and store large volumes of sensitive data, including experimental results, intellectual property, and confidential academic records. The security of this data is paramount to maintaining research in...

Read more
whatsapp