COMPUTER SCIENCE EDUCATION PROJECT TOPICS AND MATERIALS
A wireless sensor network is presented for monitoring the energy use of electric appliances in a home environments and aquatic environments such as lakes, ponds, drinking water reservoirs, or rivers. The aquatic sensor network consists of an array of submerged nodes distributed throughout the area of interest. As dependent upon the desired application, each node of the network can be equipped with different types of sensors, enabling measurement of physical, chemical, or biological parameters of interest. Each node contains an acoustic transducer for underwater node-to-node communication, with node communication protocols and sensor data processing overseen by a programmable microcontroller. Network information is collected by an uplink node floating on the surface of the water, which is then transmitted via radio waves to a host node, located on shore, which uploads network data to a computer for display and evaluation.
This paper describes the design, implementation, and testing of a wireless sensor network for monitoring the energy use of electric appliances in a home environment. The network includes energy measurement nodes and a central server, where the nodes read the energy use of connected appliance, and wirelessly report their readings to the central server for processing. The server displays the readings from these nodes via a user visual interface in real time. Through this system, users can easily understand their electricity usage patterns and adapt their be
Read full post »
The research provides a survey of data base management in enhancing the work performance of OTM graduates in selected organization in Abuja.it provides a conceptual and theoretical appraisal of data base management and its significance in enhancing the work performance of OTM graduates.
Read full post »
This research work was conducted to ascertain the comparative analysis of academic performance in English language and computer science in junior secondary school, Enugu North Educational Zone. A survey design was adopted for the study. A sample of 42 teachers both English language and computer science 110 students were drawn from 7 (seven) junior secondary schools in Enugu North. A structured Questionnaire was used to collect data and data collected were analyzed using frequency and percentage. The finding of the study showed that lack of quality instructional materials in the school can cause poor performance of students, inability of a teacher to give test and assignment to student will make student dull in their study, effectiveness of note making and note taking by the student will activate their attitude of learning, continuous assessment tasks practicing will embark on the academic performance and government should make incentive regular payment of salaries and allowances to the teacher to motivate them into effective teaching.
Read full post »
Software produced within Nigeria by its citizens is in other words referred to as Made-in-Nigeria software. There is a big need for Nigeria to produce its own software being a third world developing country. This will drive the development, growth and stability in every sector of her economy and give her a platform for global competition.
Read full post »
This study reports on the negative effects of Information and Communication Technologies (ICT) within Early Childhood Education (ECE). Traditionally the bulk of the literature pertaining to ICT was predominantly focused on the compulsory sector, with any reference to early childhood education reporting on debates surrounding the pros and cons of young children’s use of computers.
Read full post »
Through the widespread use of computer technology, a large number of devices have become interconnected with other systems. Day by day the threat landscape is evolving fast and with humanity’s increasing dependency on computerized equipment and networks, securing these systems became highly important.
With the aim to learn more about attack patterns and behavior, decoy systems under the name of honeypots have been deployed. In terms of computer security, a honeypot is a mechanism set to detect, deflect, or counteract attempts that aim at the unauthorized use of production systems. Through the use of honeypots, valuable information can be learned about the attacker proceedings and motives as well as their technical knowledge and abilities.
As computer networks are frequently targeted by various hostile activities independently of their scale, honeypots became subject to intensive research for quite some time. One of the widely used honeypot solutions was Honeyd. Honeyd is a framework that allows the creation of virtual network hosts, which can be configured to mimic the network stack of different operating systems (OS).
The configured virtual systems can be arranged in complex network topologies, where Honeyd can simulate the routing of network traffic. Honeyd is capable of handling many network connections and it allows monitoring activity on a wide Internet Protocol (IP) address space instead of the usual single IP address for other honey-pots.
As Honeyd’s development ha
Read full post »
Quality assurance in the education system is a concept consisting of lot of activities that are designed to improve the quality of input, process and output of the educational system. (Okebukola 2012) quality assurance in the education system involves the process of monitoring, assessing and evaluating all aspects of the education activities and communicating the outcome to all concerned with a view of improving the products of the education system.
Read full post »
A computer can be defined as an electronic machine used for accepting data and instruction from an input unit and processes the data in the processing unit and transfers data for our use through the output unit (Esquire, 2003).
A computer is a machine or an apparatus that manipulates data according to a list of instructions, whose end product (output) may be expressible in numerical or logical terms.
Read full post »
This study was intended to analyze data mining techniques of telecommunication companies in Nigeria. This study was guided by the following objectives; to provide an overview on data mining. To examine the various data mining techniques of telecommunication companies in Nigeria; to identify the challenges of data mining faced by telecommunication companies in Nigeria.
Read full post »
The convergence of information and communication technologies as typified by the Internet is increasingly having more influence on all aspects of the society as it has become an integral part of the
daily lives of many people.
Read full post »