Obafemi Awolowo University

Displaying 1-9 of 9 results

  • White Papers // Oct 2013

    Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows Platforms

    Internet is increasingly being used to support collaborative applications such as voice and video-conferencing, replicated servers and databases of different types. Since most communication over the Internet involves the traversal of insecure open networks, basic security services such as data privacy, integrity and authentication are necessary. One of the levels...

    Provided By Obafemi Awolowo University

  • White Papers // Oct 2012

    Probabilistic Credit Card Fraud Detection System in Online Transactions

    This paper discussed the past works on fraud detection system and highlights their deficiencies. A probabilistic based model was proposed to serve as a basis for mathematical derivation for adaptive threshold algorithm for detecting anomaly transactions. The model was optimized with Baum-Welsh and hybrid posterior-Viterbi algorithms. A credit card transactional...

    Provided By Obafemi Awolowo University

  • White Papers // May 2012

    Solving Web-Based Applications Architectural Problems in the Cloud: The Way Forward

    Highly-available and scalable software systems can be a complex and expensive proposition. Traditional scalable software architectures have not only needed to implement complex solutions to ensure high levels of reliability, but have also required an accurate forecast of traffic to provide a high level of customer service. This traditional software...

    Provided By Obafemi Awolowo University

  • White Papers // Apr 2012

    Indigenous Technologies and Innovation in Nigeria: Opportunities for SMEs

    The aim of this paper is to advance the position that Nigeria's indigenous technologies present significant opportunities for local economic transformation and, to some extent, for global competitiveness. An analysis of three major indigenous technology clusters in Nigeria, as well as a review of three successful country cases was performed....

    Provided By Obafemi Awolowo University

  • White Papers // Feb 2011

    A User Identity Management Protocol for Cloud Computing Paradigm

    Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, the authors propose user identity management protocol for cloud computing customers and cloud service providers. This protocol...

    Provided By Obafemi Awolowo University

  • White Papers // Sep 2010

    The Types and Intensity of Innovation in Developing-Country SMEs: Evidences From a Nigerian Sub-Sectoral Study

    Understanding the types of innovations that SMEs currently undertake, and their commitment to innovation, is especially useful for policy making in developing countries. This paper, therefore, addressed two main questions: What types of innovation occur in SMEs? How intense is innovation in SMEs? The authors have used empirical information from...

    Provided By Obafemi Awolowo University

  • White Papers // Apr 2010

    Computer Crimes and Counter Measures in the Nigerian Banking Sector

    An increase in the use of the Information and Communication Technology (ICT) facilities such as computers and the Internet in the perpetration of criminal activities like spamming, credit card frauds, ATM frauds, phishing, identity theft, denial-of-service, and a host of others has lent credence to the view that ICT is...

    Provided By Obafemi Awolowo University

  • White Papers // Sep 2009

    Predictors of Java Programming Self - Efficacy Among Engineering Students in a Nigerian University

    The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming...

    Provided By Obafemi Awolowo University

  • White Papers // May 2009

    SMS User Interface Result Checking System

    This paper presents a way to bring information to students by leveraging the availability of phones with SMS capability, especially cell phones. The authors review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious...

    Provided By Obafemi Awolowo University

  • White Papers // Apr 2010

    Computer Crimes and Counter Measures in the Nigerian Banking Sector

    An increase in the use of the Information and Communication Technology (ICT) facilities such as computers and the Internet in the perpetration of criminal activities like spamming, credit card frauds, ATM frauds, phishing, identity theft, denial-of-service, and a host of others has lent credence to the view that ICT is...

    Provided By Obafemi Awolowo University

  • White Papers // May 2009

    SMS User Interface Result Checking System

    This paper presents a way to bring information to students by leveraging the availability of phones with SMS capability, especially cell phones. The authors review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious...

    Provided By Obafemi Awolowo University

  • White Papers // Sep 2009

    Predictors of Java Programming Self - Efficacy Among Engineering Students in a Nigerian University

    The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming...

    Provided By Obafemi Awolowo University

  • White Papers // Oct 2012

    Probabilistic Credit Card Fraud Detection System in Online Transactions

    This paper discussed the past works on fraud detection system and highlights their deficiencies. A probabilistic based model was proposed to serve as a basis for mathematical derivation for adaptive threshold algorithm for detecting anomaly transactions. The model was optimized with Baum-Welsh and hybrid posterior-Viterbi algorithms. A credit card transactional...

    Provided By Obafemi Awolowo University

  • White Papers // Sep 2010

    The Types and Intensity of Innovation in Developing-Country SMEs: Evidences From a Nigerian Sub-Sectoral Study

    Understanding the types of innovations that SMEs currently undertake, and their commitment to innovation, is especially useful for policy making in developing countries. This paper, therefore, addressed two main questions: What types of innovation occur in SMEs? How intense is innovation in SMEs? The authors have used empirical information from...

    Provided By Obafemi Awolowo University

  • White Papers // Apr 2012

    Indigenous Technologies and Innovation in Nigeria: Opportunities for SMEs

    The aim of this paper is to advance the position that Nigeria's indigenous technologies present significant opportunities for local economic transformation and, to some extent, for global competitiveness. An analysis of three major indigenous technology clusters in Nigeria, as well as a review of three successful country cases was performed....

    Provided By Obafemi Awolowo University

  • White Papers // Feb 2011

    A User Identity Management Protocol for Cloud Computing Paradigm

    Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, the authors propose user identity management protocol for cloud computing customers and cloud service providers. This protocol...

    Provided By Obafemi Awolowo University

  • White Papers // May 2012

    Solving Web-Based Applications Architectural Problems in the Cloud: The Way Forward

    Highly-available and scalable software systems can be a complex and expensive proposition. Traditional scalable software architectures have not only needed to implement complex solutions to ensure high levels of reliability, but have also required an accurate forecast of traffic to provide a high level of customer service. This traditional software...

    Provided By Obafemi Awolowo University

  • White Papers // Oct 2013

    Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows Platforms

    Internet is increasingly being used to support collaborative applications such as voice and video-conferencing, replicated servers and databases of different types. Since most communication over the Internet involves the traversal of insecure open networks, basic security services such as data privacy, integrity and authentication are necessary. One of the levels...

    Provided By Obafemi Awolowo University