Dr. Charles Okunbor | Babcock University (original) (raw)
Papers by Dr. Charles Okunbor
Computer Systems Science and Engineering, 2022
This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.
Global Journal of Engineering and Technology Advances, 2021
The internet being a major tool in the globalization of the world has made it possible for human ... more The internet being a major tool in the globalization of the world has made it possible for human beings to interact, share and access information on a very large scale without distance being a barrier. Computer systems with broad functionalities like the desktop, laptop and smart phone are connected through the internet. But going beyond just connecting computer systems to the internet, the Internet of Things connects devices and objects together and to the internet. The Internet of Things (IoT) is a developing paradigm that makes communication and gathering of data possible between electronic devices, objects and sensors through internet technology, with the aim of improving quality of life. IoT is seen to be a big player in the networking of future devices and the internet but has some challenges that needs to be addressed. This paper through extensive literature review, highlighted the progress made by IoT, its applications in different sectors, the challenges faced by this technology for its full actualization and also its future projections.
Computer Systems Science & Engineering, 2021
Knowledge propagation is a necessity, both in academics and in the industry. The focus of this wo... more Knowledge propagation is a necessity, both in academics and in the industry. The focus of this work is on how to achieve rapid knowledge propagation using collaborative study groups. The practice of knowledge sharing in study groups finds relevance in conferences, workshops, and class rooms. Unfortunately, there appears to be only few researches on empirical best practices and techniques on study groups formation, especially for achieving rapid knowledge propagation. This work bridges this gap by presenting a workflow driven computational algorithm for autonomous and unbiased formation of study groups. The system workflow consists of a chronology of stages, each made of distinct steps. Two of the most important steps, subsumed within the algorithmic stage, are the algorithms that resolve the decisional problem of number of study groups to be formed, as well as the most effective permutation of the study group participants to form collaborative pairs. This work contributes a number of new algorithmic concepts, such as autonomous and unbiased matching, exhaustive multiplication technique, twisted round-robin transversal, equilibrium summation, among others. The concept of autonomous and unbiased matching is centered on the constitution of study groups and pairs purely based on the participants’ performances in an examination, rather than through any external process. As part of practical demonstration of this work, study group formation as well as unbiased pairing were fully demonstrated for a collaborative learning size of forty (40) participants, and partially for study groups of 50, 60 and 80 participants. The quantitative proof of this work was done through the technique called equilibrium summation, as well as the calculation of inter-study group Pearson Correlation Coefficients, which resulted in values higher than 0.9 in all cases. Real life experimentation.
Computer Systems Science & Engineering - Tech Science Press, 2021
This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.
World Journal of Advanced Research and Reviews, 2021
Scientific Visualization remains an integral and inevitable part of every meaningful scientific, ... more Scientific Visualization remains an integral and inevitable part of every meaningful scientific, industrial and academic research. The focus of this study is to demystify the evolution, design and programmatic construction of scientific visualizations. Real life demonstrations have been achieved in this work using Python Programming Language. This work begins by exploring the programming environment based on a Python Integrated Development Environment (IDE)-the Anaconda. The IDE usage was shown in a chronological sequence with accompanying visual outcomes. The use of plot libraries was discussed, and implemented in real life. One of the demonstration projects is the ZigZag plot. Studies were also done on sub-plotting, and how it is used in scientific visualizations, especially where there is necessity to generate variations of outputs originating from a singular dataset. The work also explores the use of pie charts for presentations. A real-life case of how this could be used to visualize the halls of a residential university was demonstrated, with each of the data components labelled in distinct colours. It is hoped that this work will serve as a foothold and useful guide to researchers and other practitioners involved in real life scientific visualization.
Indian Journal of Computer Science and Engineering (IJCSE), 2021
The ability of a Database Management System (DBMS) to detect fraudulent activities at the earlies... more The ability of a Database Management System (DBMS) to detect fraudulent activities at the earliest possible time cannot be overemphasized. The concept of critical data surveillance is the ability of system to automatically watch over some selected database objects, and take cognizance of ensuing events. This work achieves this solution through the implementation of database triggers, which keeps track of the major database events. The focus of this work is on surveillance and protection against updates to critical database tables. The work implements real life audit-based surveillance of automated product sales enterprises database tables. The trigger was created from the scratch, and programmed to monitor the critical database object-the product pricing table, which keeps record of the price tagged on each the products in the supermarket. Thus, this work ensures that the trigger is fired accordingly, and that changes to the contents are reported to an audit table for further review by only authorized persons. This research was implemented using PostgreSQL.
Global Journal of Engineering and Technology Advances, 2021
This work is a combination of conceptual and hands on based study aimed at laying a foundation fo... more This work is a combination of conceptual and hands on based study aimed at laying a foundation for practical Object-Oriented software construction. First it presents a conceptual study of a number of backbone concepts of modern Object-Oriented Programming (OOP) languages. Secondly, it attempts to demonstrate real-life implementations of these concepts using Python Programming Language. This work touches on practical issues on Class and Object Creation, especially on the syntax and creation, and demystifies the subject matter using a simple table of rules. The OOP concept of Inheritance was studied, with focus on the three major types of inheritance. The self-argument, and constructors were studied, with focus on the three constructors-default, parameterized, and non-parameterized constructors. A brief discussion, and pictorial illustration was also made on the disparity between normal mathematical functions and OOP method calls. Further areas of studies are the concept of overriding between the parent and child class, as well as the OOP puzzle commonly known as Diamond Problem, including code segment and diagrammatic illustration of Python-based solutions. There are a number of other backbone concepts in OOP not covered in this study, such as Encapsulation, Abstraction, Meta-Programming, among others, which will form areas of focus in future studies. Effort was made to enhance the overall presentation through practical illustrations using source codes, annotated diagrams, and discussions. It is hoped that this work will be very useful to researchers and other practitioners in Object Oriented implementations.
Global Journal of Engineering and Technology Advances, 2021
Software Engineering is a branch of Computer Science that evolved as a result of urgent need to d... more Software Engineering is a branch of Computer Science that evolved as a result of urgent need to deal with decades of software crisis, characterized by low theoretical knowledge and practice of the construction of error-free and efficient software. The introduction of well-organized scientific, engineering and management strategies in the process of software development no doubt led to major breakthroughs, and solutions to software failures. One of the obvious game-changer in this regard is the evolution of Software Development Life Cycle, also known as Software Process Model for driving the different phases of software construction. A sound understanding of the process model is therefore inevitable, not just for software developers, but also to users and researchers. Such a theoretical cum practical understanding will enhance decisions on which process model is best for a particular job or perspective. This invariably, contributes immensely to the probability of success or failure of the project in question. Thus, the necessity for this research. This work presents an unambiguous expository of selected software development model variants. A total of four process model variants were studied, in a theoretical, visual and analytical manner. The variants were analyzed using strength versus weakness (SVW) tabular scenario. This work was concluded by presenting guides towards choice of these models. This research is expected to be a useful reference to software practitioners and researchers.
International Journal of Computer Trends and Technology (IJCTT), 2020
The concept and background of this research is to look at the characteristics of cellular network... more The concept and background of this research is to look at the characteristics of cellular networks amongst the wireless and social layers of complex networks.Then, focus on proximity-driven social models according to which social relations are established with respect to the geographical vicinity of nodes. In this framework, nodes were inclined to communicate with parties that are geographically closer to them more often than with ones at farther distances. When examining the scaling limits, it is often desirable to assume idealistic conditions. While making the problem more tractable, the results of the analysis based on these assumptions reflect the nominal performance of the system. The routing algorithm plays an integral part in the performance of cellular networks. By virtue of this, it is desired to adopt a routing algorithm that exhibits optimal performance.
International Journal of Engineering & Technology, 9 (2), 480-486, 2020
The necessity for adequate security of lives and properties cannot be overemphasized. Tackling in... more The necessity for adequate security of lives and properties cannot be overemphasized. Tackling insecurity in an effective manner calls for active computer-based research and solutions. Essentially a security system is designed to help detect intrusion and prevent unauthorized access. These security threats are tracked by installing various security access doors and alarm systems. Findings have shown that many access doors use either password or biometric forms of authentication separately which are easily compromised. This paper presents a two level automated access control for door security with mobile alert system, powered by a 5V, 6000mAH battery. In addition a multi-factor authentication using biometrics (fingerprint) and password was also used to enhance access control for this system. A mobile phone call alert and alarm system was uniquely included to this design to notify owners of the presence of an intruder when multiple attempts of incorrect login credentials are presented to the system over a short period of time. The program for the microcontroller was written in C language. This paper concluded that the use of multi-factor authentication with mobile phone alert will help improve the security for access doors used in banks, residential buildings, hospitals, military installations and other institutions, especially where confidentiality and restrictions are needed.
Review of Computer Engineering Studies Vol. 7, No. 3, 55-59, 2020
This paper, through critical literature review, has investigated the application of smart transpo... more This paper, through critical literature review, has investigated the application of smart transportation system in handling traffic congestion with the aim of enhancing traffic flow in overcrowded cities. It has been discovered that the movement of people to urban areas in search of infrastructures and livelihood has drastically increased the population of people in such areas. This has resulted in traffic congestion, and created mobility challenges as people move from one place to another to carry out their daily activities. Many people have tried a number of traffic congestion avoidance techniques in order to meet-up with their daily appointments, one of which is moving at odd hours such as very early in the morning or late at night. This is far from being a reliable solution to the problem of traffic congestion. This research therefore, proposes an IT-based solution for traffic congestion through the concept of smart transportation systems also known as Intelligent Transport System (ITS). Its usage has given rise to the proliferation of smart systems in different urban sectors and it is projected to cover more areas of human endeavour because of its ability to proffer solutions through its adoption.
International Journal of Computer Applications Technology and Research Volume 9–Issue 04, 133-138, 2020
The goal of financial institutions is to improve customers experience by making transactions safe... more The goal of financial institutions is to improve customers experience by making transactions safer, faster, easier, and more convenient. The use of electronics and computing has been a reliable and fast way of achieving these goals. One of such improvement is contactless payment. Contactless payments is the use of mobile phones, electronic cards, and other devices with Near Field Communication(NFC) technology to conduct transactions that do not require a physical connection between the Point of Sales (POS) terminal and the device of the consumer. NFC is the wireless technology that is used to transfer card payment data from the device to the payment terminal via radio waves. Electronic cards has been the most popular means of payment around the world but financial institution want these cards to be emulated by NFC enabled mobile devices which is perceived to be more fashionable, convenient and more secure due to their computing capabilities. Despite the auspicious features of contactless payment using NFC enabled device, its adoption has been slow due to some challenges associated with their models. Host Card Emulation(HCE) and Secure Element(SE) models for contactless payment on NFC enabled devices were reviewed in this paper and its challenges were highlighted.
International Journal of Scientific & Engineering Research Volume 9, Issue 12, 2018
Near Field Communication (NFC) is a radio frequency short range wireless communication technology... more Near Field Communication (NFC) is a radio frequency short range wireless communication technology used by electronic devices to communicate with other electronic NFC enabled devices in close proximity of 10cm to 20cm depending on the mode of transmission. NFC is based on and is a subset of Radio Frequency Identification (RFID) transmitting at 13.56 MHz. Devices with NFC technology have enabled users to perform contactless payments, data transfers, access digital contents, security pass/access. NFC emerged lately and a lot of research is still on going to improve this technology. This paper is an overview of NFC technology as regards data transfer, contactless transactions, mode of operation and its security.
Drafts by Dr. Charles Okunbor
As humans, We are constantly demanding new things and new ways to do things. Research is what has... more As humans, We are constantly demanding new things and new ways to do things. Research is what has brought about these new ways of getting things done and has led to developments in every aspect of life. Government, organisations and institutions are aware of the role research play in national development and therefore sponsor lots of research projects. This paper concentrates on research proposal and formulation which is said to be the foundation to which every other structures and constructions of the research is anchored on. There are different formats for research proposals and formulation as Most institutions, organisation and agencies provide instructions or guidelines concerning theirs but this paper gives some basic components of research proposals and formulation.
Computer Systems Science and Engineering, 2022
This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.
Global Journal of Engineering and Technology Advances, 2021
The internet being a major tool in the globalization of the world has made it possible for human ... more The internet being a major tool in the globalization of the world has made it possible for human beings to interact, share and access information on a very large scale without distance being a barrier. Computer systems with broad functionalities like the desktop, laptop and smart phone are connected through the internet. But going beyond just connecting computer systems to the internet, the Internet of Things connects devices and objects together and to the internet. The Internet of Things (IoT) is a developing paradigm that makes communication and gathering of data possible between electronic devices, objects and sensors through internet technology, with the aim of improving quality of life. IoT is seen to be a big player in the networking of future devices and the internet but has some challenges that needs to be addressed. This paper through extensive literature review, highlighted the progress made by IoT, its applications in different sectors, the challenges faced by this technology for its full actualization and also its future projections.
Computer Systems Science & Engineering, 2021
Knowledge propagation is a necessity, both in academics and in the industry. The focus of this wo... more Knowledge propagation is a necessity, both in academics and in the industry. The focus of this work is on how to achieve rapid knowledge propagation using collaborative study groups. The practice of knowledge sharing in study groups finds relevance in conferences, workshops, and class rooms. Unfortunately, there appears to be only few researches on empirical best practices and techniques on study groups formation, especially for achieving rapid knowledge propagation. This work bridges this gap by presenting a workflow driven computational algorithm for autonomous and unbiased formation of study groups. The system workflow consists of a chronology of stages, each made of distinct steps. Two of the most important steps, subsumed within the algorithmic stage, are the algorithms that resolve the decisional problem of number of study groups to be formed, as well as the most effective permutation of the study group participants to form collaborative pairs. This work contributes a number of new algorithmic concepts, such as autonomous and unbiased matching, exhaustive multiplication technique, twisted round-robin transversal, equilibrium summation, among others. The concept of autonomous and unbiased matching is centered on the constitution of study groups and pairs purely based on the participants’ performances in an examination, rather than through any external process. As part of practical demonstration of this work, study group formation as well as unbiased pairing were fully demonstrated for a collaborative learning size of forty (40) participants, and partially for study groups of 50, 60 and 80 participants. The quantitative proof of this work was done through the technique called equilibrium summation, as well as the calculation of inter-study group Pearson Correlation Coefficients, which resulted in values higher than 0.9 in all cases. Real life experimentation.
Computer Systems Science & Engineering - Tech Science Press, 2021
This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.
World Journal of Advanced Research and Reviews, 2021
Scientific Visualization remains an integral and inevitable part of every meaningful scientific, ... more Scientific Visualization remains an integral and inevitable part of every meaningful scientific, industrial and academic research. The focus of this study is to demystify the evolution, design and programmatic construction of scientific visualizations. Real life demonstrations have been achieved in this work using Python Programming Language. This work begins by exploring the programming environment based on a Python Integrated Development Environment (IDE)-the Anaconda. The IDE usage was shown in a chronological sequence with accompanying visual outcomes. The use of plot libraries was discussed, and implemented in real life. One of the demonstration projects is the ZigZag plot. Studies were also done on sub-plotting, and how it is used in scientific visualizations, especially where there is necessity to generate variations of outputs originating from a singular dataset. The work also explores the use of pie charts for presentations. A real-life case of how this could be used to visualize the halls of a residential university was demonstrated, with each of the data components labelled in distinct colours. It is hoped that this work will serve as a foothold and useful guide to researchers and other practitioners involved in real life scientific visualization.
Indian Journal of Computer Science and Engineering (IJCSE), 2021
The ability of a Database Management System (DBMS) to detect fraudulent activities at the earlies... more The ability of a Database Management System (DBMS) to detect fraudulent activities at the earliest possible time cannot be overemphasized. The concept of critical data surveillance is the ability of system to automatically watch over some selected database objects, and take cognizance of ensuing events. This work achieves this solution through the implementation of database triggers, which keeps track of the major database events. The focus of this work is on surveillance and protection against updates to critical database tables. The work implements real life audit-based surveillance of automated product sales enterprises database tables. The trigger was created from the scratch, and programmed to monitor the critical database object-the product pricing table, which keeps record of the price tagged on each the products in the supermarket. Thus, this work ensures that the trigger is fired accordingly, and that changes to the contents are reported to an audit table for further review by only authorized persons. This research was implemented using PostgreSQL.
Global Journal of Engineering and Technology Advances, 2021
This work is a combination of conceptual and hands on based study aimed at laying a foundation fo... more This work is a combination of conceptual and hands on based study aimed at laying a foundation for practical Object-Oriented software construction. First it presents a conceptual study of a number of backbone concepts of modern Object-Oriented Programming (OOP) languages. Secondly, it attempts to demonstrate real-life implementations of these concepts using Python Programming Language. This work touches on practical issues on Class and Object Creation, especially on the syntax and creation, and demystifies the subject matter using a simple table of rules. The OOP concept of Inheritance was studied, with focus on the three major types of inheritance. The self-argument, and constructors were studied, with focus on the three constructors-default, parameterized, and non-parameterized constructors. A brief discussion, and pictorial illustration was also made on the disparity between normal mathematical functions and OOP method calls. Further areas of studies are the concept of overriding between the parent and child class, as well as the OOP puzzle commonly known as Diamond Problem, including code segment and diagrammatic illustration of Python-based solutions. There are a number of other backbone concepts in OOP not covered in this study, such as Encapsulation, Abstraction, Meta-Programming, among others, which will form areas of focus in future studies. Effort was made to enhance the overall presentation through practical illustrations using source codes, annotated diagrams, and discussions. It is hoped that this work will be very useful to researchers and other practitioners in Object Oriented implementations.
Global Journal of Engineering and Technology Advances, 2021
Software Engineering is a branch of Computer Science that evolved as a result of urgent need to d... more Software Engineering is a branch of Computer Science that evolved as a result of urgent need to deal with decades of software crisis, characterized by low theoretical knowledge and practice of the construction of error-free and efficient software. The introduction of well-organized scientific, engineering and management strategies in the process of software development no doubt led to major breakthroughs, and solutions to software failures. One of the obvious game-changer in this regard is the evolution of Software Development Life Cycle, also known as Software Process Model for driving the different phases of software construction. A sound understanding of the process model is therefore inevitable, not just for software developers, but also to users and researchers. Such a theoretical cum practical understanding will enhance decisions on which process model is best for a particular job or perspective. This invariably, contributes immensely to the probability of success or failure of the project in question. Thus, the necessity for this research. This work presents an unambiguous expository of selected software development model variants. A total of four process model variants were studied, in a theoretical, visual and analytical manner. The variants were analyzed using strength versus weakness (SVW) tabular scenario. This work was concluded by presenting guides towards choice of these models. This research is expected to be a useful reference to software practitioners and researchers.
International Journal of Computer Trends and Technology (IJCTT), 2020
The concept and background of this research is to look at the characteristics of cellular network... more The concept and background of this research is to look at the characteristics of cellular networks amongst the wireless and social layers of complex networks.Then, focus on proximity-driven social models according to which social relations are established with respect to the geographical vicinity of nodes. In this framework, nodes were inclined to communicate with parties that are geographically closer to them more often than with ones at farther distances. When examining the scaling limits, it is often desirable to assume idealistic conditions. While making the problem more tractable, the results of the analysis based on these assumptions reflect the nominal performance of the system. The routing algorithm plays an integral part in the performance of cellular networks. By virtue of this, it is desired to adopt a routing algorithm that exhibits optimal performance.
International Journal of Engineering & Technology, 9 (2), 480-486, 2020
The necessity for adequate security of lives and properties cannot be overemphasized. Tackling in... more The necessity for adequate security of lives and properties cannot be overemphasized. Tackling insecurity in an effective manner calls for active computer-based research and solutions. Essentially a security system is designed to help detect intrusion and prevent unauthorized access. These security threats are tracked by installing various security access doors and alarm systems. Findings have shown that many access doors use either password or biometric forms of authentication separately which are easily compromised. This paper presents a two level automated access control for door security with mobile alert system, powered by a 5V, 6000mAH battery. In addition a multi-factor authentication using biometrics (fingerprint) and password was also used to enhance access control for this system. A mobile phone call alert and alarm system was uniquely included to this design to notify owners of the presence of an intruder when multiple attempts of incorrect login credentials are presented to the system over a short period of time. The program for the microcontroller was written in C language. This paper concluded that the use of multi-factor authentication with mobile phone alert will help improve the security for access doors used in banks, residential buildings, hospitals, military installations and other institutions, especially where confidentiality and restrictions are needed.
Review of Computer Engineering Studies Vol. 7, No. 3, 55-59, 2020
This paper, through critical literature review, has investigated the application of smart transpo... more This paper, through critical literature review, has investigated the application of smart transportation system in handling traffic congestion with the aim of enhancing traffic flow in overcrowded cities. It has been discovered that the movement of people to urban areas in search of infrastructures and livelihood has drastically increased the population of people in such areas. This has resulted in traffic congestion, and created mobility challenges as people move from one place to another to carry out their daily activities. Many people have tried a number of traffic congestion avoidance techniques in order to meet-up with their daily appointments, one of which is moving at odd hours such as very early in the morning or late at night. This is far from being a reliable solution to the problem of traffic congestion. This research therefore, proposes an IT-based solution for traffic congestion through the concept of smart transportation systems also known as Intelligent Transport System (ITS). Its usage has given rise to the proliferation of smart systems in different urban sectors and it is projected to cover more areas of human endeavour because of its ability to proffer solutions through its adoption.
International Journal of Computer Applications Technology and Research Volume 9–Issue 04, 133-138, 2020
The goal of financial institutions is to improve customers experience by making transactions safe... more The goal of financial institutions is to improve customers experience by making transactions safer, faster, easier, and more convenient. The use of electronics and computing has been a reliable and fast way of achieving these goals. One of such improvement is contactless payment. Contactless payments is the use of mobile phones, electronic cards, and other devices with Near Field Communication(NFC) technology to conduct transactions that do not require a physical connection between the Point of Sales (POS) terminal and the device of the consumer. NFC is the wireless technology that is used to transfer card payment data from the device to the payment terminal via radio waves. Electronic cards has been the most popular means of payment around the world but financial institution want these cards to be emulated by NFC enabled mobile devices which is perceived to be more fashionable, convenient and more secure due to their computing capabilities. Despite the auspicious features of contactless payment using NFC enabled device, its adoption has been slow due to some challenges associated with their models. Host Card Emulation(HCE) and Secure Element(SE) models for contactless payment on NFC enabled devices were reviewed in this paper and its challenges were highlighted.
International Journal of Scientific & Engineering Research Volume 9, Issue 12, 2018
Near Field Communication (NFC) is a radio frequency short range wireless communication technology... more Near Field Communication (NFC) is a radio frequency short range wireless communication technology used by electronic devices to communicate with other electronic NFC enabled devices in close proximity of 10cm to 20cm depending on the mode of transmission. NFC is based on and is a subset of Radio Frequency Identification (RFID) transmitting at 13.56 MHz. Devices with NFC technology have enabled users to perform contactless payments, data transfers, access digital contents, security pass/access. NFC emerged lately and a lot of research is still on going to improve this technology. This paper is an overview of NFC technology as regards data transfer, contactless transactions, mode of operation and its security.
As humans, We are constantly demanding new things and new ways to do things. Research is what has... more As humans, We are constantly demanding new things and new ways to do things. Research is what has brought about these new ways of getting things done and has led to developments in every aspect of life. Government, organisations and institutions are aware of the role research play in national development and therefore sponsor lots of research projects. This paper concentrates on research proposal and formulation which is said to be the foundation to which every other structures and constructions of the research is anchored on. There are different formats for research proposals and formulation as Most institutions, organisation and agencies provide instructions or guidelines concerning theirs but this paper gives some basic components of research proposals and formulation.