ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
DESIGN AND IMPLEMENTATION OF A COMPUTERISED FACE DETECTION AND RECOGNITION SYSTEM ABSTRACT A society with accurate and updated database of her citizens will face less crime. Imagine a society where citizens know that their faces and personal details are kept somewhere by the police or other relevant security agencies. The individual will... Continue Reading
PREDICTING STUDENTS ACADEMIC PERFORMANCE USING ARTIFICIAL NEURAL NETWORK CHAPTER ONE INTRODUCTION 1.1 BACKGROUND TO THE STUDY Predicting student academic performance has long been an important research topic. Among the issues of education system, questions concerning admissions into academic institutions (secondary and tertiary level) remain... Continue Reading
DESIGN AND IMPLEMENTATION OF A COMPUTERISED OFFICE MANAGEMENT SYSTEM CHAPTER ONE INTRODUCTION BACKGROUND OF THE STUDY An Office was described as a place where all the official or paper work are done or performed. But in this era of information technology, office is no longer referred to a place but it as set of function for doing office work or... Continue Reading
A Centralized Student Information Database System (CSIDS) (A Case study of Elizade University) ABSTARCT Student centralized database system is a system designed to computerize the process of student information records considering the problems faced by doing this manually. The system was studied and relevant officials were interview to acquire... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 GENERAL OVERVIEW Supermarket management system is the system where all the aspects related to the proper management of supermarket is done. These aspects involve managing information about the various products, staff, managers, customers, billing etc. This system provides an efficient way of managing the... Continue Reading
CHAPTER ONE BACKGROUND OF STUDY 1.1 INTRODUCTION Computer household inventory system today encompasses either directly or indirectly ; A field of activity both private and public that taxes the imagination, it revolves around the ownership possession and use of the system. The term “computer household inventory” includes... Continue Reading
: A CASE STUDY OF SOME SELECTED IMMIGRATION OFFICE IN ABEOKUTA SOUTH LOCAL GOVERNMENT, AREA OF OGUN STATE. CHAPTER ONE BACKGROUND OF THE STUDY 1.1 INTRODUCTION In this project, design and implementation of a computerize visa processing information system is based... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 Background of the Study E-Voting is an election system that allows a voter to record his or her secure and secret ballot electronically. In 2004; it's estimated that approximately 30 percent of the... Continue Reading
CHAPTER ONE 1.1 INTRODUCTION There is an outgrowing need for electronic accessories in a world where there is great necessity for speed, efficiency and perfection of work. Information factors efficiency, access to electronic... Continue Reading
CHAPTER ONE INTRODUCTION 1.1.0 GENERAL INTRODUCTION It is safe to say that most activities such as hostel allocation carried out in most universities in Nigeria are done manually. Therefore, there is a lot of strain on the individuals running the hostels. An E-Hostel system is simply software developed for managing most activities that take... Continue Reading
CHAPTER ONE 1.0 Introduction The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2011] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in... Continue Reading
CHAPTER ONE 1.1 INTRODUCTION Paying of fee in school especially in tertiary institutions is an indispensable responsibility on students, parents, guardians, government or organizations offering scholarship grants. The fee charged is used in providing a conducive learning... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION The advents of wireless technology have had great impact on globalization of the Nigeria economy since its inception in 2001. But the tremendous growth in subscription have brought some challenges to the operators on how to... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION According to a world bank economic report on Nigeria published on the 1st of May 2013, it was stated that 95% of the government’s budgeted expenditure... Continue Reading
CHAPTER ONE 1.1 INTRODUCTION BACKGROUND TO THE STUDY Establishments like IT firm, school, hospitals, government secretarial, financial institutions etc. which have large numbers of customers or client received enormous amount of complaints per day, and these complain has to be... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 B ac k ground of study Traffic laws and regulations in Nigeria were inherited from colonial administration. The first Edith is the 1920 Road Traffic Ordinance of Lagos Colony and Southern... Continue Reading
CHAPTER ONE 1.1 Introduction Attendance Management System is software developed for daily student attendance in schools, colleges and institutes. If facilitates to access the attendance information of a particular Employee in a particular industry. The information is sorted by the... Continue Reading
CHAPTER ONE INTRODUCTION 1.O BACKGROUND OF THE STUDY The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in... Continue Reading
CHAPTER ONE 1.1 Introduction I shall discuss on the techniques that will be employed by me on accomplishing this research work, its limitation and scope will be highlighted. 1.1 Background of Study Criminality is part and parcel of human nature and society... Continue Reading
CHAPTER ONE Introduction 1.1 Background of the Research Because of the increasing threat to computer system and the information they store and process are valuable resources which need to be protected. Authentication refers to the techniques where users have... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION Information systems have become the backbone of most organizations. Banks could not process payments, governments could not collect taxes, hospitals could not treat patients, and supermarkets could not stock... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION Renting, also known as hiring or letting, is an agreement where a payment is made for the temporary use of a good, service or property owned by another. A video rental shop/store is a physical business that rents home videos such as... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION One of the recent advances in the world of information technology is the rapid development of communication which has turned the world into a global village, we can send mails electronically (e-mail),... Continue Reading