As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology. The good news is... more
As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology. The good news is that, the complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime, aids crime prevention and assist investigation when positively utilized. Authentication plays a critical in security related applications like e-commerce websites. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention in e-commerce and security systems at large. Having realized the values of biometrics for two basic purposes namely to verify (authenticate) and identify (recognize). There are numbers of biometrics and different system (application) needs different biometrics. In this research, how to maximize e-commerce security is considered using different biometrics. Also, e-commerce application and systems that has implemented biometrics technology is reviewed.
In the context of spaceflight, a satellite is an object which has been placed into orbit by human endeavour. Satellites are sometimes called artificial satellites in order to distinguish them from natural satellites such as the Moon which... more
In the context of spaceflight, a satellite is an object which has been placed into orbit by human endeavour. Satellites are sometimes called artificial satellites in order to distinguish them from natural satellites such as the Moon which is the earth original satellite. Spaceflight or space flight is a ballistic flight into or through outer space. Spaceflight can occur with spacecraft with or without humans on board. Artificial satellites which are also called man-made satellite and are usually closer to the earth; originate from more than 50 countries and have used the satellite launching capabilities of ten nations. A few hundred satellites are currently operational, whereas thousands of unused satellites and satellite fragments orbit the Earth as space debris. Satellites are used for a large number of purposes, notably military and civilian Earth observation satellites, communications satellites, navigation satellites, weather satellites, and research satellites. Space stations and human spacecraft in orbit are also satellites. Satellites are usually semi-independent computer-controlled systems. Satellite subsystems attend many tasks, such as power generation, thermal control, telemetry, attitude control and orbit control. Cyberwar (also known as Cyberterrorism or Cyberwarfare) refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare, and in 2013 was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. This seminar work, outline the benefits of satellite and how it can be used (or how it is used) to prevent, track and monitor the activities of cyberterrorist.
Climate shocks are more on the way. We have already spewed so much carbon into the atmosphere arising from the way we use energy (oil exploration, gas flaring and fuel combustion from transportation, industrial and mechanical equipments),... more
Climate shocks are more on the way. We have already spewed so much carbon into the atmosphere arising from the way we use energy (oil exploration, gas flaring and fuel combustion from transportation, industrial and mechanical equipments), that a cascade of worsening crop failure, drought, flood and so on is virtually guaranteed. We all feel the effect, hence this call for resilience building in our societies. Building resilience means helping society to work more like the ecosystem.
With the risen quest for the acquisition of knowledge, the edge cutting technological advancement of this era has a magnified role to play. The availability of the internet all over the world though a negligible not connected yet, online... more
With the risen quest for the acquisition of knowledge, the edge cutting technological advancement of this era has a magnified role to play. The availability of the internet all over the world though a negligible not connected yet, online lecturing and educating systems have gotten a boost. Irrespective of the distance or the location of the learner and source of information, learning is made not just easier but also convenient and interactive via electronic sharing of information and virtual classroom. However, ONLINE LECTURING SYSTEM is a system design to help student gain access to and acquire knowledge in any university of their choice. It has different modules notably, the lecture module, questioning module etcetera. This method of learning will not enhance face-to-face instruction on campus but the use of computer in classrooms and elicitation of information with the World Wide Web (WWW), enhanced distance education (on or off campus) and Individual and group learning with both print and computer based materials. Thus students or staff must not travel to acquire knowledge. Also information can be send to students abroad through online. This research work is a web based system designed with Microsoft Visual studio (ASP.Net) 2008 as its front end and Microsoft SQL management server studio 2005 as its back end. The basic methodology used was the Dynamic System Development Method.
Where there is no archive civilization has no memory and no mechanism to learn from its successes and failures. Knowledge is on the decrease due to the unpleasant nature of manual archive among other reasons. The antidote to this... more
Where there is no archive civilization has no memory and no mechanism to learn from its successes and failures. Knowledge is on the decrease due to the unpleasant nature of manual archive among other reasons. The antidote to this phenomenon is a digitalized good record keeping. Good record-keeping is the breath of history. Any entity without a history is liken to a plant without a root. The digitalization process of human kick not away the record keeping, rather it didn’t only imbedded it but also enhanced record keeping digitally so that record kept are properly preserved and easily accessed. The re-occurrence of issues though in different dimension can be solved with the aid of archive because roots of similarities to the issue can be seen in an archive. Hence, a this research system helps to automate the manual archive with books as the only content, and it is designed to easily locate any archive that is sought for by a user. The concept of digital library and digital diary are employed into this research and the Integrated Development Environments used are Microsoft Visual Studio 2010 using ASP.net alongside HTML tags, VB.net as its programming language and Microsoft SQL Management Studio 2008 for the backend (database work). Structured Analysis and Design Technique (SADT) and Rapid Application Development (RAD) are used as methodology.
The advancement of technology and the rapid implementation of advanced technology have made many physical walls and boundaries of insignificant effect. Online E-Library (Electronic Library) is a wall breaking and boundaries cutting... more
The advancement of technology and the rapid implementation of advanced technology have made many physical walls and boundaries of insignificant effect. Online E-Library (Electronic Library) is a wall breaking and boundaries cutting technology that allows users to have access to information resources electronically and conduct research anywhere they are and want without actually stepping into a library using the internet service. This applies rapidly advancing data processing technology as well as networking technology with an expectation to be highly convenient. ONLINE E-LIBRARY SYSTEM is web-based; MS Visual Studio 2008 and MS SQL Management Studio 2005 were used for its front end and back end design respectively. This system (the proposed model) automates the primarily aspect of manual library advantageously by the implementation of a search module amongst others. The Structured System Analysis and Design Methodology (SSADM) is use for the implementation of this project.
When a person is diagnosed with leukaemia. There will be need for blood. If a person has sickle cell disease. He or she needs blood on a regular basis. When a relative of ours needs open heart surgery. He will need blood. While nobody... more
When a person is diagnosed with leukaemia. There will be need for blood. If a person has sickle cell disease. He or she needs blood on a regular basis. When a relative of ours needs open heart surgery. He will need blood. While nobody likes to be involved in any scenarios that will require blood donation, it is an everyday reality for many people in the United States. Every two seconds, someone in the US needs blood (Lindsey Cant, 2006). Aggregated, thirty Americans each minute, 1,800 each hour, will require blood transfusions (American Red Cross, 2005). There is a 97% chance that in your lifetime, someone you know will need blood (Badger-Hawkeye). Web based blood bank management information system keeps accurate records, provides a centralised blood donation information and gives blood donors an informative blood donation tips, importance and benefits of donating blood. The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of MS-SQL Server and all the user interfaces have been designed using the ASP.Net technologies.
The rapid development of internet technologies alongside the technological advancement in information and communication technology have made malware a major cyber threat at the moment. Malwares are software or files that cause harm to the... more
The rapid development of internet technologies alongside the technological advancement in information and communication technology have made malware a major cyber threat at the moment. Malwares are software or files that cause harm to the legitimate computer files or the computer system itself and as such are frequently used as tools by hackers to breach cyber security techniques. Different techniques had been applied at various times to detect malwares but malware developers always bypassed these techniques by their various concealment strategies. Notably, traditional malware detection using signature technique cannot detect polymorphic viruses while behavioural technique cannot also detect metamorphic viruses. Whereas the heuristic detection techniques which employ machine learning and data mining algorithms are relatively efficient but they mostly have high rate of false positive. This research therefore comparatively analyses these three different malware detection techniques stating their upsides and downsides with a conclusion that no single detection technique is good enough for the detection of recent time malwares but a combination of two or three of them.
Certificate Authority (CA) has played a major role in our modern digital economy. Most businesses using the internet rely on trusted third party. It can be a mobile banking App platform telling us that transaction is secured; it can be a... more
Certificate Authority (CA) has played a major role in our modern digital economy. Most businesses using the internet rely on trusted third party. It can be a mobile banking App platform telling us that transaction is secured; it can be a mobile telecommunication service provider telling us that our calls, text has been delivered to intended party or a social media platform such as WhatsApp saying our chats and posts are end to end encrypted. It can also be Facebook telling us that post regarding life events can be seen only by those we want to see it; these third party can also be encrypted. With distributed ledger technology (also known as blockchain technology), we can have a better feel of the internet and participant in block can check and verify every transaction since the blockchain offer a more transparent environment. This paper focused on few strategic applications of Blockchain technology as reviewed by other authors. The study answered the following questions i. How does the blockchain technology work? ii. Where can blockchain technology be applied? and iii. What are the benefits of blockchain technology?
Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed... more
Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed the two basic data security techniques-cryptography and steganography used for securing information and identified their flaws and strengths. A hybridized model of the cryptography and steganography was then developed by embedding cryptography in image steganography. The system was implemented using Microsoft Visual Studio 2012 as the Integrated Development Environment (IDE) and was programmed with C# (csharp) which is a .NET language. With this model therefore, the security of transmitted data is assured since any information transmitted is invisible and hence remains hidden to the physical eyes even to the suspecting hacker.
This research introduces a hybrid model for image encryption using pixel scrambling technique and chaotic function. The recent increase in multimedia hacking using brute force attack resulting from the use of weak/inadequate cipher keys... more
This research introduces a hybrid model for image encryption using pixel scrambling technique and chaotic function. The recent increase in multimedia hacking using brute force attack resulting from the use of weak/inadequate cipher keys has led to the proposal for this more secure dencryption technique. The model is designed such that the acquired image pixels are firstly scrambled using secret key generated at random by chaotic logistic function. Thereafter, these encrypted images are then used as initial population from which the best cipher image is selected. Then the correlation coefficient of pixel values between adjacent pixels and histogram are used to determine the randomness of the selected image. Hereafter, the image having lowest correlation coefficient and highest disorderliness is selected as the best cipher image. The model has been simulated using C-Sharp (C#) programming language and tested real time on a web platform using Hypertext Pre-processor (Php). This model is mostly applicable in safeguarding the confidentiality accustomed to medical records most especially when reporting classified scanned medical images.
Aging and estrogen-deprivation induce deleterious effects on body composition and vascular function in females. On the other hand, growth hormone (GH), whose production is reduced by age, exerts several vascular effects. The aim of this... more
Aging and estrogen-deprivation induce deleterious effects on body composition and vascular function in females. On the other hand, growth hormone (GH), whose production is reduced by age, exerts several vascular effects. The aim of this study was to investigate the effect of long-term estrogen deprivation and GH administration on body composition, vascular function and structure in aged female rats. Methods: Twelve female Wistar rats were ovariectomized at 10 months of age. At 20 months of age, half of the ovariectomized rats were treated with GH for 4 weeks. The remaining ovariectomized rats animals and one group of six intact females were used as control groups. After the treatment period, animals were sacrificed and Specific Gravity Index (SGI) and periuterine fat weigh, as well as vascular reactivity and morphometry in aortic rings, were studied. Results: No significant differences were found in SGI and periuterine fat weigh between ovariectomized and intact control rats. SGI was significantly increased by GH, and periuterine fat was reduced by the treatment. Dose-dependent relaxing responses to acetylcholine and isoproterenol were significantly diminished in ovariectomized rats as compared with intact animals, and GH treatment improved these responses. Ovariectomized animals showed significantly higher contracting responses to phenylephrine, acetylcholine + L-NAME and angiotensin-I than intact rats, and treatment with GH reduced them significantly. Media cross-sectional area was increased in ovariectomized rats as compared to intact animals, and GH reduced this area, but differences did not reach significance. Conclusion: GH has beneficial effects in body composition and endothelial function in old ovariectomized female rats.