This paper was designed to provide Intranet traffic monitoring by sniffing the packets at the local Area Network (LAN) server end to provide security and control. It was implemented using five computer systems configured with static Internet Protocol (IP) addresses used in monitoring the IP traffic on the network by capturing and analyzing live packets from various sources and destinations in the network. The LAN was deployed on windows 8 with a D-link 16-port switch, category 6 Ethernet cable and other LAN devices. The IP traffics were captured and analyzed using Wireshark Version 2.0.3. Four network instructions were used in the analysis of the IP traffic and the results displayed the IP and Media Access Control (MAC) address sources and destinations of the frames, Ethernet, IP addresses, User Datagram Protocol (UDP) and Hypertext Transfer Protocol (HTTP). The outcome can aid network administrators to control Intranet access and provide security.
This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org. The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals.
This paper examines the electric power distribution network system of the Port Harcourt Electricity Distribution Company (PHEDC); its shortcomings, costs and voltage loss in distribution with a view to finding optimal solution through determination of optimal power flow path. The Modified Dijsktra’s Algorithm was applied to generate optimal flow path model of the distribution network with seven (7) nodes from Afam Thermal Power Station (source) to the Calabar Distribution Centre (destination) via the interconnected substations. The structural design of the PHEDC distribution network and a review of relevant literatures on shortest path problems were adopted. The modified Dijkstra’s algorithm was simulated using JavaScript and is able to run on any web browser (Google Chrome, Mozilla Firefox, etc). It was applied to a practical 330kV network using the relevant data obtained from the company and the result shows the negative effect of distance on voltage quality. It was observed that the Modified Dijkstra’s Algorithm is suitable for determining optimal power flow path with up to 98 percent level of accuracy because of its suitability for determining the shortest route in both transportation and power energy distribution as well as its overall performance with minimal memory space and fast response time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.