TABLE OF CONTENTS Title Page Approval Page………………………………………………………………..i Certification Page…………………………………………………………… ii Dedication……………………………………………………………………iii... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Traditionally, high control in home and office environments takes place through switches (on/off), deals and sliders (dimmers) and sometimes motion sensors. These controls can be incorporated in the built environment such as walls, or attached to lights that people place themselves (desk lamps,... Continue Reading
CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the... Continue Reading
ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of... Continue Reading
ABSTRACT Online clearance system is a research work that will help build an effective information management for schools. It is aimed at developing a system for making clearance after graduation hitch free. The designed software will serve as a more reliable and effective means of undertaking students clearance, remove all forms of delay and... Continue Reading
ABSTRACT Computers are known for their wide range of uses especially in scientific and mathematical fields. However little or no thought has been given to designing a complete and thorough intelligence entrance examination on a computer system in our immediate environment. This entrance examination system is designed to assist university... Continue Reading
Abstract Registration for the Unified Tertiary Matriculation Examination, UTME, is organised by the Joint Admission and Matriculation Board, JAMB, for admission into tertiary institutions in Nigeria. This registration is conducted in all the states in Nigeria in a given period of the year. Many a times, the process is cumbersome, not organized and... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY The online food ordering system is one of the latest servicers most fast food restaurants in the western world are adopting. With this method, food is ordered online and delivered to the customer. This is made possible through the use of electronic payment system. Customers pay with their credit... Continue Reading
ABSTRACT Computer Software Based online clearance system is an internet base research work that will help build an effective information management for schools. It is aimed at developing a computer software system that replaces the manual method of clearance for graduating students. The designed software will serve as a more reliable and effective... Continue Reading
ABSTRACT This study investigated online hospital management system as a tool to revolutionize medical profession. With many writers decrying how patients queue up for hours in order to receive medical treatment, and some end-up being attended to as „spillover‟, the analyst investigated the manual system in detail with a view to finding out the... Continue Reading
ABSTRACT This project is aimed at improving along lasting processing and administration system on National Identity card. It is also aimed at keeping records of all processing and administration system for national Identity card with view of modifying it into a full computerized system. The study covers the areas of application entry, record... Continue Reading
Table of content Title page……………………………………………………………………………....i Approval page……………………………………………………………………….ii Dedication……………………………………………………………………………..iii... Continue Reading
ABSTRACT The basic aim of this project is to provide a simplified method of discount rate for manufacturing company using Mount Olive Company as a case study. Due to the rapid improvement in modern science and technology in ratifications of life there is need for the management of the company to apply computer in their transaction of the discount... Continue Reading
ABSTRACT My research Project is to develop fingerprint biometrics systems that assist in the elimination of examination impersonation. Up till now, the WAEC examination board (WAEC) is not using fingerprint as mode of identification, this has resulted in people sitting for WAEC examinations for others who collect the result at the end. With the... Continue Reading
ABSTRACT It is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user... Continue Reading
ABSTRACT This project, Electronic logbook for Student’s Industrial Work Experience Scheme was designed to minimize the problems associated with the paper logbook such as susceptibility to manipulation or forgery, wearing, and storage problem and retrieval problems. The top down approach was used for the software development and the tools used... Continue Reading
Abstract Android platform has gained popularity in recent years in terms of market share and number of available applications. Android operating system is built on a modified Linux kernel with built-in services such as email, web browser, and map applications. In this paper, automatic number plate recognition (ANPR) was designed and implemented on... Continue Reading
ABSTRACT This project aimed at creating a simulated ATM for blind customers to enhance the quality of service these customers get from their bank s. It also targeted at breaching the barrier that prevented blind Nigerian s , and persons with visual impairments to utilize the ATM . This simulated voice aided ATM mak es use of audible instructions... Continue Reading
Abstract Any member of the society who is found guilty of breaking the law has measurable penalties in an ideal society ruled by laws. Members of society are traditionally expected to report any instances of law and order violations to the proper law enforcement authorities. Reporting crimes in the society (Nigeria) used to need visiting to any of... Continue Reading
Abstract QR Based Merchant Payment using android as the name states is used for QR code scanning for the transactions between a consumer and a merchant go Cashless. This System deals with the liquid cash transactions between a merchant and consumer enhancing the reliability and the quick monitory transactions on both the ends. This System works in... Continue Reading
CHAPTER ONE GENERAL INTRODUCTION 1.1 INTRODUCTION Housing generally refers to the social problem of ensuring that members of a society have a home to live in, whether it is a house, or some other kind of dwelling, lodging or shelter. Many government sector have a department that deals with housing, such as the United State Department of Housing... Continue Reading
ABSTRACT The study investigated the effect of ICT on students’ learning by taking the case of Gulu University. It sought to establish the relationship between ICT and student’s learning particularly looking at the availability, accessibility and user-ability of the ICT resources in Gulu University. The study was prompted due to the persistent... Continue Reading
ABSTRACT The report summarizes that in this Information Technology age, the needs of law enforcement are changing. Some traditional crimes, especially those concerning finance and commerce, continue to be upgraded technologically. Paper trails have become electronic trails. Crimes associated with the theft and manipulations of data are detected... Continue Reading
ABSTRACT This Uganda Taxi Operators and Drivers Association (UTODA) database is developed to show the efficiency of the company to the employees or staff. It's again developed with an aim of enhancing its activities such as file management. The database is involved in access of vital information about the company. Compilation of views from users... Continue Reading
TABLE OF CONTENTS DECLARATION APPROVAL DEDICATION ACKNOWLEGEMENTS iv ACRONYMS/ABBREVIATIONS v LIST OF TABLES LIST OF FIGURES TABLE OF CONTENTS DEFINITIONS AND TERMS Abstract 1.0 Introduction 1 1.1 Background to the study 1 1.2 Statement of the problem 3 1.3 Objectives 3 1.3.1 General (main) objective 3 1.3.2 Specific objectives 3 1.4 Justification... Continue Reading