Abstract: The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate...
Abstract: In the current technology driven era, the use of devices that connect to the internet has increased significantly. Consequently, there has been a significant increase in internet traffic. Some of the challenges that arise from the increased traffic include, but are not limited to, multiple clients on a single server (which can result in denial of service (DoS)), difficulty in network scalability, and poor service availability. One of the solutions proposed in literature, to mitigat...
Abstract: We propose a novel face recognition using Dual Tree Complex Wavelet Transform (DTCWT), which is used to extract features from face images. The Complex Wavelet Transform is a tool that uses a dual tree of wavelet filters to find the real and imaginary parts of complex wavelet coefficients. The DT-CWT is, however, less redundant and computationally efficient. CWT is a relatively recent enhancement to the discrete wavelet transform (DWT). We show that it is a well-suited basis for thi...
Abstract: Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with analytical methods data can be extracted. An association rule expresses the dependence of a set of attribute-value pairs, called items, upon another set of items (item set). . The association rule mining algorithms can be classified into two main groups: the level-wise alg...
Abstract: The cloud computing offers dynamically scalable resources provided as a service over the Internet. It promises the drop in capital expenditure. But practically speaking if this is to become reality there are still some challenges which is to be still addressed. Amongst, the main issues are related to security and trust, since the user's data has to be released to the Cloud and thus leaves the secured area of the data owner. The users must trust the providers. There must be a str...
Abstract: In recent days possible attacks on the networks has been increased and causing huge financial loss for the various organization due to lack of proper security standards. Modern networks have several services and zones like Voice, Data, ISP networks, Access control, surveillance, DMZ zones and hosting websites etc. Proper planning and access control within each zone are important to avoid network compromise. This research details on how the network can be security standards can...
Abstract: Over the past thirty years, “Network Cyber Attacks” has been an increasing problem in the cyber world affecting organizations and individuals – everyone in one way or the other has been exploited. Ethical hacking and network security can be used to prevent network cyber-attacks in organizations irrespective of their size. Research has proven that cyber-attacks comes as a result of network attacks that are done unauthorized without the system administrators or users of th...
Abstract: Cloud computing is one of latest computing paradigms where computing resources like processors, hard-drives, data warehouses, servers, operating system and applications are rented to the users in pay-per-use manner and are accessed through the Internet. Cloud computing is one of Information Technology solutions that reduces infrastructure costs for governments and small to medium businesses, and enable them to access latest software versions and hardware resources. Government ...
Abstract: The purpose of the study was to establish the level Information Security among End User in order to address the Human issue and its impacts on Information Security (IS) in organizations. Human errors likely to result into excessive security breaches than technical vulnerabilities (Hinson, 2003). Notable human errors include, deleting wrong file by mistake, entering wrong value, pull out the wrong plug by mistake and configuration mistakes can leave the network ports open, firew...
A computer network comprises of a group of computers connected to each other for different purposes. In this way, resources and data can be exchanged between computers. Recent years have seen a rapid advancement in computer technology, which has led organisations to look for more resilient networks that can support both their present and future applications (Al-Bayati, 2013). Strong networking and thoughtful office building design go hand in hand in today's workplace to enhance organisational...
Abstract: Prudence is one of the important features of software quality, as it can affect the stability of software. The cost and reuse of software is also likely to make sense. To maintain software, programmers have to understand the source code. The understanding of source code depends on the psychological complexity of the software, and cognitive abilities are required to understand the source code. The understanding of source code is influenced by so many factors, here we have taken var...
Recruiters’ decisions in the selection of candidates for specific job roles are not only dependent on physical attributes and academic qualifications but also on the fitness of candidates for the specified tasks. In this paper, we propose and develop a simple neuro-fuzzy-based task performance and fitness model for the selection of candidates. This is accomplished by obtaining from Kaggle (an online database) samples of task performance-related data of employees in various firms. Data were ...
DBMS (SQL, MySQl) Transaction management, concurrency control, Object Oriented Databases, client/server systems, dataware house, databases in electronic commerce, web database development and database administration. Single table database Relational Database System of related tables Minimum redundancy, Referential integrity, Database keys, The ACID model (guarantee of successful transactions): –Atomicity („all or nothing” rule), Consistency Enforcing referential integrity, Indexing fiel...
ABSTRACT Overtime, manual approach of managing house allocation is being employed which has resulted in a lot of problems in Abdu Gusau Polytechnic Talata Mafara zamfara State. These problems to mention few are, allocation of already allocated apartment due to lack of proper record, difficulty in calculating the general statistics, poor data security and integrity among others. These aforementioned problems are talked with this new system by providing accuracy in general statistics, proper ke...