Topics
Project TopicsThe ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is...
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is... read more
Criminality is part and parcel of human nature and society [Alemika, E. 2004]. That is why no society can claim to be completely crime free. But the types of criminal behavior tend to follow the pattern of social and economic development of a given society [Sohnen, E. 2012]. It is therefore not unexpected that a society at a low level of development and as Madden and Chiu (1998) mentioned, uneven distribution of income (and wealth) [Madden, P. and W.H. Chiu. 1998], tends to experience an upsurge...
Criminality is part and parcel of human nature and society [Alemika, E. 2004]. That is why no society can claim to be completely crime free. But the types of criminal behavior tend to follow the pattern of social and economic development of a given society [Sohnen, E. 2012]. It is therefore not unexpected that a society at a low level of development and as Madden and Chiu (1998) mentioned, uneven distribution of income (and wealth) [Madden, P. and W.H. Chiu. 1998], tends to experience an upsurge... read more
Because of the increasing threat to computer system and the information they store and process are valuable resources which need to be protected. Authentication refers to the techniques where users have to prove the claim of their identity to the identifier. There are many techniques through which users can be authenticated. Some of the password authentication techniques are knowledge based, token based, and biometric. Text password based technique and graphical password based technique comes un...
Because of the increasing threat to computer system and the information they store and process are valuable resources which need to be protected. Authentication refers to the techniques where users have to prove the claim of their identity to the identifier. There are many techniques through which users can be authenticated. Some of the password authentication techniques are knowledge based, token based, and biometric. Text password based technique and graphical password based technique comes un... read more
Information systems have become the backbone of most organizations. Banks could not process payments, governments could not collect taxes, hospitals could not treat patients, and supermarkets could not stock their shelves without the support of information systems. In almost every sector—education, finance, government, health care, manufacturing, and businesses large and small—information systems play a prominent role. Every day work, communication, information gathering, and decision making...
Information systems have become the backbone of most organizations. Banks could not process payments, governments could not collect taxes, hospitals could not treat patients, and supermarkets could not stock their shelves without the support of information systems. In almost every sector—education, finance, government, health care, manufacturing, and businesses large and small—information systems play a prominent role. Every day work, communication, information gathering, and decision making... read more
Renting, also known as hiring or letting, is an agreement where a payment is made for the temporary use of a good, service or property owned by another. A video rental shop/store is a physical business that rents home videos such as movies and prerecorded TV shows. Typically, a rental shop conducts business with customers under conditions and terms agreed upon in a rental agreement or contract, which may be implied, explicit, or written. Many video rental stores also sell previously-viewed mo...
Renting, also known as hiring or letting, is an agreement where a payment is made for the temporary use of a good, service or property owned by another. A video rental shop/store is a physical business that rents home videos such as movies and prerecorded TV shows. Typically, a rental shop conducts business with customers under conditions and terms agreed upon in a rental agreement or contract, which may be implied, explicit, or written. Many video rental stores also sell previously-viewed mo... read more
design and implementation of software for tracking student profile...
design and implementation of software for tracking student profile
“SIM Card Registration System” is a system which is usedby the user for the purpose of managing and saving different SIM Card holders of different service providers. This project provides very sincere way of keeping totaldetails of any Card holders of any service providers andtheir details.Detailed .net programming with web application has beenused to design this project. The aim or objective of thisproject is to handle the all the data of card holders as liketheir address, phone no., pin co...
“SIM Card Registration System” is a system which is usedby the user for the purpose of managing and saving different SIM Card holders of different service providers. This project provides very sincere way of keeping totaldetails of any Card holders of any service providers andtheir details.Detailed .net programming with web application has beenused to design this project. The aim or objective of thisproject is to handle the all the data of card holders as liketheir address, phone no., pin co... read more
One of the recent advances in the world of information technology is the rapid development of communication which has turned the world into a global village, we can send mails electronically (e-mail), search for information (www), buy goods online (e-commerce), withdraw/ transfer money (e-banking), school online (e-learning); this has affected the society positively to a great extent, as a result, computerization of project management should not be exempted in this revolution....
One of the recent advances in the world of information technology is the rapid development of communication which has turned the world into a global village, we can send mails electronically (e-mail), search for information (www), buy goods online (e-commerce), withdraw/ transfer money (e-banking), school online (e-learning); this has affected the society positively to a great extent, as a result, computerization of project management should not be exempted in this revolution.
The importance of electricity in the higher institutions of learning cannot be overemphasized. However, Electrical Power Generation in many universities in Nigeria is self generated by the institutions as the inadequate national power supply by the countries’ power generation company is insufficient to handle the electrical needs of the institution. To this end power generating plants are purchased and utilized in these institutions for the purpose of generating electric power. A power plan...
The importance of electricity in the higher institutions of learning cannot be overemphasized. However, Electrical Power Generation in many universities in Nigeria is self generated by the institutions as the inadequate national power supply by the countries’ power generation company is insufficient to handle the electrical needs of the institution. To this end power generating plants are purchased and utilized in these institutions for the purpose of generating electric power. A power plan... read more
Reliable criminal suspects’ recognition is an important problem in crime investigation process. Biometrics recognition is becoming an irreplaceable part of many identification systems. While successful in some niche markets, the biometrics technology has not yet delivered its promise of full proof automatic crime suspects’ recognition, especially in a developing country like Nigeria. The study proposes and implements a biometrics-based crime investigation system using a fingerprint verificat...
Reliable criminal suspects’ recognition is an important problem in crime investigation process. Biometrics recognition is becoming an irreplaceable part of many identification systems. While successful in some niche markets, the biometrics technology has not yet delivered its promise of full proof automatic crime suspects’ recognition, especially in a developing country like Nigeria. The study proposes and implements a biometrics-based crime investigation system using a fingerprint verificat... read more
ngineering, applied science and pure science. Algorithm : A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order. Application: The final combination of software and hardware which performs the data matching. Data matching database: A structured collection of records or data that is stored in a computer system. Data cleansing: The proactive i...
ngineering, applied science and pure science. Algorithm : A set of logic rules determined during the design phase of a data matching application. The ‘blueprint’ used to turn logic rules into computer instructions that detail what step to perform in what order. Application: The final combination of software and hardware which performs the data matching. Data matching database: A structured collection of records or data that is stored in a computer system. Data cleansing: The proactive i... read more
This method is strenuous because it involves cost, time, and efforts (Sekaran, 1992; Hair et al., 2006). A preliminary study involving 12 lecturers found that they agree to implement any tool that can assist them in administering Opinion Poll practice. Currently, a lot of commercial web-based opinion management systems exist, but users have to pay for its usage as well as register. Such opinion management systems include: Opinion PollGizmo1, Opinion PollMonkey2, and QuestionPro3. When the lectur...
This method is strenuous because it involves cost, time, and efforts (Sekaran, 1992; Hair et al., 2006). A preliminary study involving 12 lecturers found that they agree to implement any tool that can assist them in administering Opinion Poll practice. Currently, a lot of commercial web-based opinion management systems exist, but users have to pay for its usage as well as register. Such opinion management systems include: Opinion PollGizmo1, Opinion PollMonkey2, and QuestionPro3. When the lectur... read more
The development of banking ATMs (Automatic Teller Machines) industry has received much attention in recent years, mainly due to growing ATM networks. Recent scholarship has studied whether its growth has maximized consumer welfare. The concern is rooted in the network effects that depend on total number of users or customers patronizing banking ATMs. Because the form of banking ATMs of both banking cards for depositors and differentiated banking ATMs can be regarded as network effects. Online AT...
The development of banking ATMs (Automatic Teller Machines) industry has received much attention in recent years, mainly due to growing ATM networks. Recent scholarship has studied whether its growth has maximized consumer welfare. The concern is rooted in the network effects that depend on total number of users or customers patronizing banking ATMs. Because the form of banking ATMs of both banking cards for depositors and differentiated banking ATMs can be regarded as network effects. Online AT... read more
here are many online businesses on the internet. People have many choices to buy products through the internet. These products include household equipment, electronics, clothing books and many more. Now a day's people are so busy that they have no time to go to shopping malls and buy the things they want. This was the problem primarily intended for online shopping to solve. That's why importance of online shopping is increasing with the passage of time and one cannot deny this fact. Online shops...
here are many online businesses on the internet. People have many choices to buy products through the internet. These products include household equipment, electronics, clothing books and many more. Now a day's people are so busy that they have no time to go to shopping malls and buy the things they want. This was the problem primarily intended for online shopping to solve. That's why importance of online shopping is increasing with the passage of time and one cannot deny this fact. Online shops... read more
importance of texts cannot be overemphasized. Hardly can anyone pass a message without including one form of text or the other. This is a problem for the visually impaired. They find it hard to read through the texts especially when the font-size is small. This has led to the development of a text to speech conversion system. For those with learning disabilities, some in literary levels, they often get frustrated trying to browse the internet because so much of it is in text form. Also in so...
importance of texts cannot be overemphasized. Hardly can anyone pass a message without including one form of text or the other. This is a problem for the visually impaired. They find it hard to read through the texts especially when the font-size is small. This has led to the development of a text to speech conversion system. For those with learning disabilities, some in literary levels, they often get frustrated trying to browse the internet because so much of it is in text form. Also in so... read more
he primary goal of this project is to implement a stadium management information system with an online interface between the supposed customer and the administrative body for the Godswill Akpabio international stadium, Uyo. The specific objectives include: To design an online system for the stadium for ticket sales/ booking, and payment. To design a system that manages customer information and details of previous transactions. To design an administrative system that handles crowd contr...
he primary goal of this project is to implement a stadium management information system with an online interface between the supposed customer and the administrative body for the Godswill Akpabio international stadium, Uyo. The specific objectives include: To design an online system for the stadium for ticket sales/ booking, and payment. To design a system that manages customer information and details of previous transactions. To design an administrative system that handles crowd contr... read more
OMPUTER:-Computer is an electronic device that accepts data as Input, processes data and gives out information as output to the user. SOFWARE:-Software is set of related programs that are designed by the manufacturer to control the hardware and to enable the computer perform a given task. HARDWARE: - Hardware is a physical part of a computer that can be touched, seen, feel which are been control by the software to perform a given task. DATABASE: - Database is the collection of related data in...
OMPUTER:-Computer is an electronic device that accepts data as Input, processes data and gives out information as output to the user. SOFWARE:-Software is set of related programs that are designed by the manufacturer to control the hardware and to enable the computer perform a given task. HARDWARE: - Hardware is a physical part of a computer that can be touched, seen, feel which are been control by the software to perform a given task. DATABASE: - Database is the collection of related data in... read more
ternet: It is a method for interfacing a Personal Computer to whatever other Personal Computer on the planet through devoted switches and servers. These interconnected machines work by exchanging information by means of a specific sort of parcel exchanging known as the Internet Protocol (IP). HCD: Human Capital Development HR: Human Resource Website: It is a webpage that entails documents accessed via the internet....
ternet: It is a method for interfacing a Personal Computer to whatever other Personal Computer on the planet through devoted switches and servers. These interconnected machines work by exchanging information by means of a specific sort of parcel exchanging known as the Internet Protocol (IP). HCD: Human Capital Development HR: Human Resource Website: It is a webpage that entails documents accessed via the internet.
This study is developed under five chapters. The first chapter introduces the research topic, stating the background of the intended project, statement of the problems, project objectives, its significance to the society and overall scope. The second chapter reviews related literature on national identity card management system. It analyses previous research works, their limitations and need for the development of better system. The third chapter discusses the methodology used for the project de...
This study is developed under five chapters. The first chapter introduces the research topic, stating the background of the intended project, statement of the problems, project objectives, its significance to the society and overall scope. The second chapter reviews related literature on national identity card management system. It analyses previous research works, their limitations and need for the development of better system. The third chapter discusses the methodology used for the project de... read more
. So what happens if you move around sometimes very late in the night in search of a room and all close by hotels are fully booked? Other times you may be lucky to have the contact number of the hotel to reach them to book for a room. But do the hotel attendants really ensure to keep a room for you? You would be lucky to go and get a room booked for you. They are quick to serve those who walk in rather than those who may get access to them on phone to book a room. On other times too, if you have...
. So what happens if you move around sometimes very late in the night in search of a room and all close by hotels are fully booked? Other times you may be lucky to have the contact number of the hotel to reach them to book for a room. But do the hotel attendants really ensure to keep a room for you? You would be lucky to go and get a room booked for you. They are quick to serve those who walk in rather than those who may get access to them on phone to book a room. On other times too, if you have... read more
Testimonials
TestimonialsHad my work delivered on time.
Exactly what my supervisor wanted. Thanks for helping me out.
I had a hard time interpreting my data. Thank you for making it easy.
Your assistance helped mprove my grades. Thank you.