The use of mobile applications for healthcare has become a focal point of innovation that could aid patients in their everyday healthcare management. Mobile applications can contribute to increasing the effectiveness ...The use of mobile applications for healthcare has become a focal point of innovation that could aid patients in their everyday healthcare management. Mobile applications can contribute to increasing the effectiveness and reducing the costs of healthcare delivery as well as preventing illnesses through behaviour change. This paper presents model of an interactive mobile healthcare application that facilitates the needs between doctors and patients. The proposed mobile application will provide optimal communication to several parties in the healthcare sector such as patients, doctors and pharmacists for better healthcare services and delivery. The software development methodology adopted was Object Oriented Analysis and Design Methodology (OOADM). Our mobile application is developed for Android platform and HTML, CSS and JS were used at the front-end while Angula JS, PHP and MYSQL powered the back-end.展开更多
Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like s...Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor;that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.展开更多
This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of network administrators to access their virtual servers from ...This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of network administrators to access their virtual servers from a remote location without worrying about the security implications, inaccurate and unreliable reports from a third party whenever he is out of town. The cloud server can be monitored and administered because various task such as creating users, manage users (grant access, block or delete users), restart server and shutdown server can be handled by the remote system administrator. This will involve of securing the system with a one-way hashing of encrypted password and a device ID for only whitelisted devices to be granted access. It will be observed that remote access for system administration can be implemented using a smartphone app based on a Point-to-Point Protocol and also reveal the advantages of PPP protocol, therefore making the enormous responsibilities of a remote system administrator much easier to accomplish.展开更多
文摘The use of mobile applications for healthcare has become a focal point of innovation that could aid patients in their everyday healthcare management. Mobile applications can contribute to increasing the effectiveness and reducing the costs of healthcare delivery as well as preventing illnesses through behaviour change. This paper presents model of an interactive mobile healthcare application that facilitates the needs between doctors and patients. The proposed mobile application will provide optimal communication to several parties in the healthcare sector such as patients, doctors and pharmacists for better healthcare services and delivery. The software development methodology adopted was Object Oriented Analysis and Design Methodology (OOADM). Our mobile application is developed for Android platform and HTML, CSS and JS were used at the front-end while Angula JS, PHP and MYSQL powered the back-end.
文摘Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor;that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.
文摘This research attempts the implementation of an improved smartphone application for remote system administration. The work was motivated by the inability of network administrators to access their virtual servers from a remote location without worrying about the security implications, inaccurate and unreliable reports from a third party whenever he is out of town. The cloud server can be monitored and administered because various task such as creating users, manage users (grant access, block or delete users), restart server and shutdown server can be handled by the remote system administrator. This will involve of securing the system with a one-way hashing of encrypted password and a device ID for only whitelisted devices to be granted access. It will be observed that remote access for system administration can be implemented using a smartphone app based on a Point-to-Point Protocol and also reveal the advantages of PPP protocol, therefore making the enormous responsibilities of a remote system administrator much easier to accomplish.