Federal University of Technology

Displaying 1-15 of 15 results

  • White Papers // Nov 2013

    A Fingerprint-Based Authentication Framework for ATM Machines

    The security of the transactions on the Automated Teller Machine (ATM) has been raising many concerns in some parts of the world. These concerns are due to series of limitations in the existing designs of the various service points. The current use of Personal Identification Number (PIN) for ATM user's...

    Provided By Federal University of Technology

  • White Papers // Aug 2013

    Hybrid Spread-Spectrum TCP for Combating Fraudulent Cyber Activities Against Reconnaissance Attacks

    The inefficiencies of current intrusion detection system against fraudulent cyber activities attract the attention of computer gurus, also known as \"Hackers\" to exploit known weakness on a particular host or network. In this paper, a system that opens ports on a firewall by generating a connection attempt on a set...

    Provided By Federal University of Technology

  • White Papers // Jun 2013

    Enterprise Cloud Adoption: Leveraging on the Business and Security Benefits

    The impact of globalization coupled with the pressure t of the recent economic downturn have stirred increased customers outlook on availability, scalability and efficiency to enterprise Information Technology (IT) solutions. The increasing interest in cost-effective Information Technology deployment by leaders and organizations centre on how best cloud computing can contain...

    Provided By Federal University of Technology

  • White Papers // Mar 2013

    Elliptic Curve Cryptography for Securing Cloud Computing Applications

    Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way Information Technology (IT) and computing services are being delivered and purchased results in the development of cloud computing. The out...

    Provided By Federal University of Technology

  • White Papers // Sep 2012

    A Simulated Enhancement of Fisher-Yates Algorithm for Shuffling in Virtual Card Games using Domain-Specific Data Structures

    Generally stated Algorithms are often preferred because of their wider horizon of applications owing to their freedom from any underlying language specification - they are not tied to any language and are easily implemented by anybody on any machine. This advantage becomes a hitch in applications where optimal implementation is...

    Provided By Federal University of Technology

  • White Papers // Sep 2012

    Comparative Analysis of Public-Key Encryption Schemes

    The introduction of public-key cryptography is an important watershed in the history of cryptography. The work sparked off interest in the cryptographic research community and soon several public-key schemes were proposed and implemented. This abstract model is the most widely used public-key scheme today. However, increased processing power and availability...

    Provided By Federal University of Technology

  • White Papers // Aug 2012

    An Expert System for Automated Essay Scoring (AES) in Computing Using Shallow NLP Techniques for Inferencing

    In this paper, the authors present the report of the development of an Expert System (ES) that; acquires the knowledge of Subject Matter Experts (SMEs) in a specific computing field, "Software Engineering", uses a built-in inference engine designed with shallow natural language processing techniques (Information extraction using tokenization, statistical keyword...

    Provided By Federal University of Technology

  • White Papers // Jul 2012

    Security Threats Prediction on Local Area Network Using Regression Model

    Vulnerability scanners now play a major role in identifying vulnerabilities or threats that exist across organisations Local Area Network. When an organisation becomes aware of vulnerabilities that can be exploited on its LAN, the organisation becomes prepared on how to maintain and prevent further exploitation by malicious users. This paper...

    Provided By Federal University of Technology

  • White Papers // Jul 2012

    The Adaptability of Decision Tree Method in Mining Industry Safety Data

    Data Mining nowadays is extensively applied in researches and business fields. The choice of data mining tools is practically dependent on the nature of the data to be mined. Studies have shown that certain tools perform better in certain types of dataset. This paper x-rays a typical real life incident...

    Provided By Federal University of Technology

  • White Papers // Dec 2011

    Enhanced Physical Layer Security Through Transmit Antenna Selection

    The authors analyze the physical layer security of a communication scheme with a multiple antenna legitimate transmitter, employing Transmits Antenna Selection (TAS), and a single antenna legitimate receiver in the presence of a single antenna eavesdropper. They developed closed-form expressions for the analysis of the secrecy outage probability supposing independent...

    Provided By Federal University of Technology

  • White Papers // Jan 2011

    Syenthesis of Literature on Small & Medium Entreprise (SME) Start-Up Financing

    This paper aims to identify the critical determinants of start-up capital structure for SMEs. It observed that due to high information asymmetries outsiders are averse to providing start-up financing to SMEs, while entrepreneurs often prefer the benefits of self control to the extent that they are averse to outside funds...

    Provided By Federal University of Technology

  • White Papers // Mar 2010

    Investigation on Quality of Service Provided by Third Tier Internet Service Providers in Nigeria: Akure Cybercaf?s as Case Study

    This paper presents an investigation into the Quality of Service (QoS) of cybercaf?s networks in Nigeria using five different cybercaf?s in Akure metropolis as a case study. The study was carried out in three stages. In the first stage, Distributed Internet Traffic Generator (D-ITG V. 2.4) was used to measure...

    Provided By Federal University of Technology

  • White Papers // Dec 2009

    Financial Deepening And Economic Development Of Nigeria: An Empirical Investigation

    The central focus of this paper is that a high level of financial deepening is a necessary condition for accelerating growth in an economy. This is because of the central role of the financial system in mobilizing savings and allocating same for the development process. This paper makes use of...

    Provided By Federal University of Technology

  • White Papers // Jul 2009

    State Government Finances And Real Asset Investments: The Nigerian Experience

    State governments in Nigeria are saddled with a lot of responsibilities that are geared towards the development of their areas. To do this, they engage in real asset investments that are at times overwhelming, especially when compared with their limited financial resources. This problem of insufficient funding sources and over-dependence...

    Provided By Federal University of Technology

  • White Papers // Feb 2009

    Network Security: Policies and Guidelines for Effective Network Management

    In order to maintain the integrity of a system or network, protect its data and immediate environment, network security and management in Information and Computer Technology (ICT) plays a crucial role. With the growing need of computers in each and every field be it banking, insurance, hospital, education, manufacturing, etc...

    Provided By Federal University of Technology

  • White Papers // Feb 2009

    Network Security: Policies and Guidelines for Effective Network Management

    In order to maintain the integrity of a system or network, protect its data and immediate environment, network security and management in Information and Computer Technology (ICT) plays a crucial role. With the growing need of computers in each and every field be it banking, insurance, hospital, education, manufacturing, etc...

    Provided By Federal University of Technology

  • White Papers // Jul 2009

    State Government Finances And Real Asset Investments: The Nigerian Experience

    State governments in Nigeria are saddled with a lot of responsibilities that are geared towards the development of their areas. To do this, they engage in real asset investments that are at times overwhelming, especially when compared with their limited financial resources. This problem of insufficient funding sources and over-dependence...

    Provided By Federal University of Technology

  • White Papers // Dec 2009

    Financial Deepening And Economic Development Of Nigeria: An Empirical Investigation

    The central focus of this paper is that a high level of financial deepening is a necessary condition for accelerating growth in an economy. This is because of the central role of the financial system in mobilizing savings and allocating same for the development process. This paper makes use of...

    Provided By Federal University of Technology

  • White Papers // Sep 2012

    A Simulated Enhancement of Fisher-Yates Algorithm for Shuffling in Virtual Card Games using Domain-Specific Data Structures

    Generally stated Algorithms are often preferred because of their wider horizon of applications owing to their freedom from any underlying language specification - they are not tied to any language and are easily implemented by anybody on any machine. This advantage becomes a hitch in applications where optimal implementation is...

    Provided By Federal University of Technology

  • White Papers // Dec 2011

    Enhanced Physical Layer Security Through Transmit Antenna Selection

    The authors analyze the physical layer security of a communication scheme with a multiple antenna legitimate transmitter, employing Transmits Antenna Selection (TAS), and a single antenna legitimate receiver in the presence of a single antenna eavesdropper. They developed closed-form expressions for the analysis of the secrecy outage probability supposing independent...

    Provided By Federal University of Technology

  • White Papers // Jul 2012

    Security Threats Prediction on Local Area Network Using Regression Model

    Vulnerability scanners now play a major role in identifying vulnerabilities or threats that exist across organisations Local Area Network. When an organisation becomes aware of vulnerabilities that can be exploited on its LAN, the organisation becomes prepared on how to maintain and prevent further exploitation by malicious users. This paper...

    Provided By Federal University of Technology

  • White Papers // Aug 2012

    An Expert System for Automated Essay Scoring (AES) in Computing Using Shallow NLP Techniques for Inferencing

    In this paper, the authors present the report of the development of an Expert System (ES) that; acquires the knowledge of Subject Matter Experts (SMEs) in a specific computing field, "Software Engineering", uses a built-in inference engine designed with shallow natural language processing techniques (Information extraction using tokenization, statistical keyword...

    Provided By Federal University of Technology

  • White Papers // Jul 2012

    The Adaptability of Decision Tree Method in Mining Industry Safety Data

    Data Mining nowadays is extensively applied in researches and business fields. The choice of data mining tools is practically dependent on the nature of the data to be mined. Studies have shown that certain tools perform better in certain types of dataset. This paper x-rays a typical real life incident...

    Provided By Federal University of Technology

  • White Papers // Mar 2013

    Elliptic Curve Cryptography for Securing Cloud Computing Applications

    Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way Information Technology (IT) and computing services are being delivered and purchased results in the development of cloud computing. The out...

    Provided By Federal University of Technology

  • White Papers // Mar 2010

    Investigation on Quality of Service Provided by Third Tier Internet Service Providers in Nigeria: Akure Cybercaf?s as Case Study

    This paper presents an investigation into the Quality of Service (QoS) of cybercaf?s networks in Nigeria using five different cybercaf?s in Akure metropolis as a case study. The study was carried out in three stages. In the first stage, Distributed Internet Traffic Generator (D-ITG V. 2.4) was used to measure...

    Provided By Federal University of Technology

  • White Papers // Sep 2012

    Comparative Analysis of Public-Key Encryption Schemes

    The introduction of public-key cryptography is an important watershed in the history of cryptography. The work sparked off interest in the cryptographic research community and soon several public-key schemes were proposed and implemented. This abstract model is the most widely used public-key scheme today. However, increased processing power and availability...

    Provided By Federal University of Technology

  • White Papers // Jan 2011

    Syenthesis of Literature on Small & Medium Entreprise (SME) Start-Up Financing

    This paper aims to identify the critical determinants of start-up capital structure for SMEs. It observed that due to high information asymmetries outsiders are averse to providing start-up financing to SMEs, while entrepreneurs often prefer the benefits of self control to the extent that they are averse to outside funds...

    Provided By Federal University of Technology

  • White Papers // Nov 2013

    A Fingerprint-Based Authentication Framework for ATM Machines

    The security of the transactions on the Automated Teller Machine (ATM) has been raising many concerns in some parts of the world. These concerns are due to series of limitations in the existing designs of the various service points. The current use of Personal Identification Number (PIN) for ATM user's...

    Provided By Federal University of Technology

  • White Papers // Jun 2013

    Enterprise Cloud Adoption: Leveraging on the Business and Security Benefits

    The impact of globalization coupled with the pressure t of the recent economic downturn have stirred increased customers outlook on availability, scalability and efficiency to enterprise Information Technology (IT) solutions. The increasing interest in cost-effective Information Technology deployment by leaders and organizations centre on how best cloud computing can contain...

    Provided By Federal University of Technology

  • White Papers // Aug 2013

    Hybrid Spread-Spectrum TCP for Combating Fraudulent Cyber Activities Against Reconnaissance Attacks

    The inefficiencies of current intrusion detection system against fraudulent cyber activities attract the attention of computer gurus, also known as \"Hackers\" to exploit known weakness on a particular host or network. In this paper, a system that opens ports on a firewall by generating a connection attempt on a set...

    Provided By Federal University of Technology