Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
BACKGROUND OF STUDY
The notion of auditing data dates back to ancient times, with the oldest signs of its existence discovered among major landowners of the Middle Ages in Italy and Egypt.
However, according to afounka (1993), statutory auditi...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the Study
Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...
OBJECTIVE OF THE STUDY
The aim of this study is to design and implement a database driven online virtual marketplace with a particular reference to Ogbete main market. The web based program developed in this research essentially provides all the necessary marketing serv...
Background of the Study
A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...
Abstract
The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform t...
ABSTRACT
The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...
ABSTRACT
In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the le...
ABSTRACT
Solanum incanum Linn. and Solanum melongena Linn (Solanaceae) are both shrubs or trees found in the sub-Saharan Africa and the Middle East. Both are called „gauta‟ among the Hausa community of Northern Nigeria and „Tarku‟ among the Bura/Babar speaking people of Sout...
ABSTRACT
Depression is a heterogeneous mood disorder that has been treated with a number of synthetic drugs. These drugs have adverse effects and delayed onset of action that compromise their therapeutic benefits. This makes it worthwhile to search for new antidepressant agents with pro...
Statement of the Problem
The existing system is plagued with the following problems;
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...
Statement of the Problem
The existing system is plagued with the following problems;
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...
ABSTRACT
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...
Introduction
This chapter introduces the dissertation by describing its context, the identified challenges, how the chosen challenge was met, the achieved impact, relevant publications, and how the thesis is structured. 1.1 Context In science data is the essential focal point in todays...
ABSTRACT
Digital images continue to be ever-present in our daily lives as means of conveying information. With the availability of image editing software, now more than ever our ability to trust the images we see have been brought into question; the field of digital ima...
Abstract
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the Study
Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...
Background of Study
Electronic commerce, also known as e-commerce, has developed rapidly in recent years. More and more and more consumers prefer to shop online for convenience and other benefits. E-commerce and auctions are also attracting attention. Many internet companies like eBay a...