Papers by chibuisi iroegbu

Apart from natural mineral resources, another important sector to the economy of Nigeria as a cou... more Apart from natural mineral resources, another important sector to the economy of Nigeria as a country is Agriculture. Nigerian Agricultural sector is one of the major backbones of the national income. Also, majority of her citizens earns their living from Agriculture. These include agronomy, horticulture, forestry, aquaculture, animal husbandry, livestock science, veterinary medicine, and food processing etc. Electronic Agriculture is an area focusing on the development of agricultural and rural improvement through enhanced information and communication methods. It plays a central role in facilitating the exposure of farmers to a variety of information. In view of the importance of agriculture to the society, it became paramount to develop different computer software packages to enhance the knowledge of the farmers and empower the rural community by fostering participatory communications.
The purpose of this paper is to analyze Internet network Security breaches as it affects computer... more The purpose of this paper is to analyze Internet network Security breaches as it affects computer systems. As cost-effective and quick-to-deploy as the Internet is, there is one fundamental problemsecurity. Some of the -vehicles‖ that hackers use to conduct these illegitimate activities are Trojan horse programs , Backdoor and Remote administration , Unprotected Windows shares , Mobile Code , Cross-Site Scripting, Email Spoofing , Email-born Virus , Hidden File Extensions, Packet sniffing etc. To lessen the vulnerability of the internet network Security breaches, there are many products available. These tools include Encryption, IPSec, Identification and Access Anti-Malware Software, Secure Socket Layer, intrusion-detection, firewalls.
This research is on the analysis of data security approach for digital computers.
Due to the increase demand nowadays to connect to internal networks from distant locations, the i... more Due to the increase demand nowadays to connect to internal networks from distant locations, the important of establishing secure links across the network cannot be overemphasized. Employees often need to connect to internal private networks over the Internet which is by nature insecure, thus, security becomes a major consideration. This research is on the implementation of Virtual Private Network (VPN). Virtual Private Network(VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to establish a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.
This paper is on the analysis of Reed-Solomon (RS) Codes as an efficient code for error detection... more This paper is on the analysis of Reed-Solomon (RS) Codes as an efficient code for error detection and correction. Reed-Solomon codes are examples of error correcting codes in which redundant information is added to data so that it can be recovered reliably despite errors in transmission or storage and retrieval. They describe a systematic way of building codes that can detect and correct multiple errors. It can be used in any communication system where a significant power saving is required and where the operating signal-to-noise ratio is very low. Deep space communications, mobile satellite/cellular communications, microwave links, paging, error correction system used on CD's and DVD's and other communications systems are based on a Reed-Solomon code.
This paper evaluates the advantages of both microwave and infrared technology and examines some c... more This paper evaluates the advantages of both microwave and infrared technology and examines some crucial issues where each technology provides added value. Both Microwave and Infrared transmission systems are use for short distance network connections. They need line-of-sight and have its merits and demerits. The evaluation of the two transmission systems were in the areas of frequency spectrum, bandwidth, technical issues, confidentiality, security issues, distance coverage etc. From the research, it was found that when frequency spectrum licensing is difficult and expensive to obtain, infrared transmission systems have a good advantage, and infrared transmission system is less inclined to be intercepted. Microwave transmission systems are advantageous in areas that are foggy and are extensively use when distance is less than four (4) miles.
This research paper is on the technical performance evaluation between Global System for Mobile C... more This research paper is on the technical performance evaluation between Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA) technology. GSM and CDMA are the two dominant technologies for mobile communication. Both technologies have the same goal of dividing the finite Radio Frequency (RF) spectrum between the multiple users. The technical performance evaluation of the two technologies are done based on the information obtained from research works, reports, journals, with more emphases on global reach, data transfer speed, security factors, clarity, traffic, capability, compatibility, spectrum frequencies, radiation exposure etc. GSM uses timesharing protocol techniques, while CDMA uses spread spectrum techniques for its transmission. The outcome of this technical evaluation shows that CDMA is a better technology as compared to GSM.
This research is on the analysis of data security approach for digital computers.
Uploads
Papers by chibuisi iroegbu