Credit Card Fraud Detection

Credit Card Fraud Detection Project Report : Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online...

Vehicle Management System

Vehicle Management System is software which is helpful for bus operators, who wants to operate many bus trips in a day. Vehicle Management...

Java Applet Technology

Web design has moved to the next level with the introduction of java technology in the computing and programming industry. This introduction has made a tremendous impact in the...

Smartshader Technology

SMARTSHADER™ technology brings a new level of graphical effects to personal computers. It allows software developers to use techniques that, until recently, were only available...

Artificial Neural Network

The simplest definition of a neural network, more properly referred to as an 'artificial' neural network (ANN), is provided by the inventor of one of the first neurocomputers...

Digital Piracy

Information technology has advanced greatly with the use of computers to perform different task, including Digital piracy which is an illegal duplication and distribution...

Bank Account Management System Project

A bank is a financial institution and a financial intermediary that accepts deposits and channels those deposits into lending activities, either directly by loaning or indirectly...

Google Glass

Project Glass is a research and development program by Google to develop an augmented reality Head-Mounted Display (HMD). The intended purpose of Project Glass products would...

Computer Crimes in Nigeria

The understanding of crime is very paramount in the understanding of computer crime. Crime is a component of deviance, the other component being delinquency. Haralambos, Holborn...

Anonymizing Networks of Blocking Misbehaving Users

Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s...

Global Positioning System

The GPS ( Global Positioning System ) is a “constellation” of 24 well-spaced satellites that orbit the Earth and make it possible...

Biometrics

Biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based...

Data Recovery

Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are...

Cyber and Social Terrorsim

Cyber and Social terrorism is a new different type of Technic that makes use of information systems or digital technology, especially the Internet, the internet is now the basic...

Space Mouse

The predecessor of the spacemouse was the DLR controller ball. Spacemouse has its origins in the late seventies when the DLR (German Aerospace Research Establishment) started...

Pill Camera

The aim of technology is to make products in a large scale for cheaper prices and...

Sky X Technology

The Sky X system replaces TCP over satellite link with a protocol optimized for...

Touch Screens

Touch-screens are typically found on larger displays, in phones with integrated...

Digital Investigation Process

Digital forensics has been defined as the use of scientifically derived and proven...

Face Recognition Technology

Wouldn’t you love to replace password based access control to avoid having to reset forgotten password and worry about the integrity of your...