Background to Study
The mass media comprises the means by which a society disseminates and receives information. The traditional instruments of the mass media to the modern man are the newspapers, magazines, radio and television. The Journalist is...
Background Of The Study
Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...
Background Of The Study
Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...
INTRODUCTION
The interconnection of computer with other related office equipments are finding increasing application in almost all field of human endeavour most especially the financial
sector. More and more banks are introducing the us...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
INTRODUCTION
A student’s result is the criteria for the measurement of the student’s capability in terms of academic work in the school. It is also used to measure a student’s capability in each subject offered by the student. Without an adequate resul...
Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...
Background of Study
Environmental, home and office security against intruders has become a thing of individual, national and international concern. The essence of this project is to provide a cost effective and more efficient security system in areas li...
INTRODUCTION
As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...
INTRODUCTION
The integration of computers with other relevant office equipment is finding growing use in virtually every aspect of human endeavor, but particularly in the realm of finance. The usage of computer networks is becoming increasingly commonp...
Introduction
An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...
BACKGROUND OF THE STUDY
In recent times, there has been a high level of unprecedented insecurity across developing economies. This is one of the most problems existing in communities, even in low crime rate zones. Insecurity has been established to...
BACKGROUND OF THE STUDY
The world is becoming a smaller place in which to live and work. A technological revolution in communications and information exchange has taken place within business, industry and homes. Most developed and developing countries are substantially more invested in...
ABSTRACT
The main objective of this project was to ensure a proper security to car being parked in garage against theft or an intruder. The circuit uses three NE555 timers; one of the NE555 was wired as a monostable oscillator and remaining two were wired as tone genera...
ABSTRACT
The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...
ABSTRACT
This project report is a thesis written specifically to cover the design analysis construction, test and packaging of a multipurpose security system from electric component that can be easily be obtainable from the market.
The report discusses the var...
Statement of the Problem
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:
Introduction
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...
ABSTRACT.
One way to investigate the physics of a medium is to study the forces on intruders moving through the media. A special case of intruders moving in media is the locomotion of organisms. Locomotion within fluids (flying in air and swimming in water) has been extensively studied...
Background to the Study
The importance of marital adjustment cannot be over-emphasized; the adjustment of each marriage or family is eventually the growth of the nation at large. Marital adjustment as referred to in this study as individual‟s subjective experience of ma...
General Introduction
Generally, time series is defined as a collection of observations made sequentially over time or data that are collected at regular interval of time. Although the ordering is usually through time, particularly in terms of some equally spaced time in...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...