Background of the Study
As a watchdog and a mirror of the country, the media plays an important role in society and has a significant effect on editorial policy. We will include not only the mechanical devices that transmit and sometimes, messages (TV c...
Background of the Study
Media as a watchdog and the mirror of the nation perform crucial roles in the society and as well it is influence in its editorial policy. Lazar field and Kendal (2002,p.32), insist that mass is truly applicable to the medium of...
Water can be said to be polluted when there is an introduction of a harmful substances in such a way that its natural qualities are so altered as to impure its usefulness or render i...
Background of the study
The role of law can be reactionary, progressive, or neutral depending on how it is applied, what interests it seeks to serve, and how it interacts with the full range of other factors that influence individuals ’decisions....
Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...
INTRODUCTION
As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...
Background of the Study
Travel behaviour refers to how individuals travel in public spaces using all modes of transportation and for all purposes. Some of the things that individuals desire to do are separated by space, which necessitates travel. They make travel decisi...
Background of the study
Technology has been the success story of our century and has opened doors for beneficial inventions. Technology has countries interconnected and the world has now become a global village (Ojo 2019). he information of...
Introduction
An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...
ABSTRACT
Marriage is a sacred institution that must be well prepared for. Failure to plan before entering the union is planning to fail after entering the union. Every wedlock is bound to fail depending on the attitudes and inputs of the spouses involved. Divorce...
ABSTRACT
The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...
Statement of the Problem
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:
Introduction
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...
ABSTRACT
This study was carried out on security challenges and coping strategies of university libraries for effective service delivery in Enugu state using University of Nsukka as a case study. To achieve this, seven significant research objectives wer...
ABSTRACT
Aeromagnetic data was analysed and used to delineate the structural features of the upper part of Nasarawa State of Nigeria which consists of Kuje, Keffi and Akwanga. These structural features include: lineaments, faults and folds which are channels for the accumulation of soli...
ABSTRACT
With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...
ABSTRACT This study present the results of the analysis and interpretation of aeromagnetic data over part of Adamawa trough with the aim of investigating the hydrocarbon potential of the study area. The study area covers an area of 12,000 km2 located between latitude 8.50oN and 9.50oN and longitu...
Background to the Study
The African continent is a society that has experienced patriarchy, colonialism and racial segregation and these reflect in African literature. The intrusion of Europe into the African continent in the 19th century brought about the upturning of lives and activit...
ABSTRACT.
One way to investigate the physics of a medium is to study the forces on intruders moving through the media. A special case of intruders moving in media is the locomotion of organisms. Locomotion within fluids (flying in air and swimming in water) has been extensively studied...
General Introduction
Generally, time series is defined as a collection of observations made sequentially over time or data that are collected at regular interval of time. Although the ordering is usually through time, particularly in terms of some equally spaced time in...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
ABSTRACT
This study was carried out to investigate the causes, effects and remedies to roof failure in Owerri West L.G.A Imo State. Specifically, the study aims to find out the causes of roof failure in Owerri West local government area, assess th...