ABSTRACTCrime and insecurity are threats to physical, human and social development. Crime has negative impact (disincentive) on foreign direct investment. Public insecurity impedes domestic and international tourism. Whereas, lack of investment hinders economic development with the result that majority of the citizenry become poor and marginalized. The purpose of this phase is to carry out intelligence gathering with the proposed system, to be used in Security / intelligence agencies. The sys...
ABSTRACT With the technological advancement in wireless communications, the industry demands better and more reliable technology for transmission equipment. One of the most important requirements for the wireless communications industry is to manage base stations effectively for communication purpose. In order to provide the best transmission service to customers, base stations have to be spread over a large area. A large network of base stations requires a secured, stable and effective mana...
ABSTRACT This project topic “Simulation of a Network Monitoring System” was carried out with a view to deploying effective monitoring for computers in a local Area Network. The project developed a system that lets administrators remotely monitor computers in a network. Our aim is to show how user interface can be applied to provide a complete solution for monitoring networks. Securing and monitoring a network is an important issue since computers connected in a network can be faulty a...
ABSTRACTCryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerc...
ABSTRACT It is not uncommon nowadays to see computers entrusted with functions upon which human life are dependent, examples of such functions are embedded computers in heart pace-makers, anti-lock braking systems in cars, and fly-by-wire flight control systems for civil airliners. In recent times, the manufacturing industry has witnessed remarkable modernization in technology as well as the adoption of information technology and computer science on a massive scale. Automobile design and man...
ABSTRACT A carnivore is controversial program that is developed by the Federal Bureau of Investigation in US (United State) by which they are able to access the email activities of the person suspected. It was the third generation software of online detection. The FBI (Federal Bureau of Investigation) uses to configure the hardware with IP (Internet Protocol) address of software through which carnivore captures packets from a particular location. A carnivore is used to work on a phenomena of ...
ABSTRACT The project critically looks into the design and implementation of an e-Learning system for Lagos State Polytechnic, Nigeria. The project discussed various kinds of e-Learning platforms such as teleconferencing, virtual reality and video-conferencing. It also addresses the impact of resource materials on the design and implementation of e-Learning platform as well as the awareness creation of the technology. At the end, the system was able to complement the various activities in the...