BACKGROUND TO THE STUDY
“The more outré and grotesque an incident is the more carefully it deserves to be examined, and the very point which appears to complicate a case, is, when duly considered and scientifically handled, the one which is...
INTRODUCTION
Face recognition system is an application for identifying someone from image or videos. Face recognition is classified into three stages ie)Face detection,Feature Extraction ,Face Recognition. Face detection method is a difficult task in image analysis. Fac...
Background of the Study
Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...
Objective of the study
This study is aimed at developing a staff attendance system using fingerprint biometrics.
The specific objectives of this study are to:
Background of the Study
A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...
Abstract
The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform t...
ABSTRACT
The implementation of the biometric based attendance system constrained by our scope and objectives was successfully achieved using the waterfall approach through the help of my supervisor and expert advice. We built a handheld device which was...
ABSTRACT
This project is on the design and development of portable and reliable fingerprint based student attendance monitoring system that can be used to monitor attendance of the student. It will eliminate the problems of manual method. The new system utilizes a porta...
ABSTRACT
In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the le...
ABSTRACT
7 Securinega virosa (Roxb ex Willd) Baill (Euphorbiaceae) is a small, deciduous, graceful shrub that is widely distributed in Africa. It is used to treat snakebites, syphilis, rheumatism and malaria. Plant based medicines are limited in use because of inadequate standardization...
ABSTRACT
Ficus thonningii Blume is a popular medicinal plant used in Nigeria for the treatment of various ailments including diarrhoea, pneumonia, sore throat and typhoid. Physicochemical, macroscopic, microscopic, phytochemical and antimicrobial evaluations of the stem bark of the plan...
ABSTRACT
In this project, the development of an attendance management system using biometrics is proposed. Managing student attendance during lecture periods has become a difficult challenge. The ability to compute the attendance percentage becomes a major task as manua...
ABSTRACT
Website fingerprinting is a passive network traffic analysis technique which enables an adversary to identify the website a user visited despite encryption and the use of privacy services such as Tor. Several website fingerprinting defenses built on top of Tor have been put for...
1.1 Background of the Study
Financial inclusion is a critical driver of economic growth, aiming to provide affordable and accessible financial services to underserved populations. In Nigeria, a significant portion of the population remains unbanked or underbanked, particularly in rural...
1.1 Background of the Study
Biometric authentication systems, which include technologies like fingerprint recognition, facial recognition, and voice identification, have revolutionized user security in digital platforms. As cyber threats continue to increase, traditional password-based...
Background of the Study
Biometric authentication has emerged as a key technology in securing financial transactions by verifying the identity of users through unique physical characteristics such as fingerprints, facial recognition, and retinal scans (Bose & Jayapal...
Background of the Study
Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...
Background of the Study
Multiple voting is one of the most pernicious forms of electoral fraud, where individuals cast more than one vote in an election, often by using fraudulent or stolen identification. This practice undermines the legitimacy of elec...
Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...
Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...
Background of the Study
Network security is a critical concern for universities as cyber threats continue to evolve. Traditional access control mechanisms, such as passwords and manual authentication processes, are often insufficient in preventing unaut...
Background of the Study
The growing reliance on digital transactions in academic institutions necessitates secure payment solutions to facilitate seamless financial operations. University campuses increasingly depend on digital payment systems for tuiti...
Background of the Study
Network authentication plays a crucial role in securing campus networks, ensuring that only authorized users and devices are granted access to the university's resources. In educational institutions like Federal University, Lafia, where a divers...
Background of the Study
Biometric authentication has emerged as one of the most secure and convenient methods of verifying user identities for network access. Unlike traditional password-based systems, biometrics offer a higher level of security since they rely on unique p...
Background of the Study
School security is a critical concern in contemporary education systems, with institutions facing increasing threats such as unauthorized access, kidnapping, student impersonation, and theft. Ensuring a safe learning environment...
Background of the study
Student identification is a fundamental component of university operations, ensuring security, access control, and accurate record-keeping. Traditional methods of student identification, such as physical ID cards, have limitations, including the ris...
Background of the Study
Attendance management is a critical aspect of school administration as it directly influences student performance, discipline, and overall academic success. Traditional methods of attendance tracking, such as manual roll calls or...
Background of the Study
E-learning platforms have revolutionized education by providing flexible and accessible learning environments for students and educators. With the increasing adoption of online learning, the security of these platforms has become...
Background of the Study
Student attendance monitoring is an essential aspect of school administration, as it directly impacts academic performance, discipline, and overall school management. Traditionally, attendance tracking has been conducted manually...
Background of the Study
School security has become a growing concern globally, necessitating the adoption of advanced security measures to ensure the safety of students, staff, and school property. Traditional security systems, such as manual attendance...
Background of the Study
School security is a growing concern worldwide, with increasing reports of unauthorized access, violence, and theft in educational institutions. In Katsina Local Government Area, Katsina State, secondary schools are facing similar security challe...
Background of the Study
Biometric attendance systems have gained significant popularity in schools as an efficient and accurate means of tracking student attendance. These systems use unique biological traits, such as fingerprints or facial recognition, to identify stud...
Background of the Study
In an increasingly digital world, the security of school premises is becoming a critical concern. In secondary schools in Makurdi, Benue State, security systems are often inadequate, with traditional methods such as security personnel and manual...
Background of the Study
Student attendance is a critical metric used in higher education institutions to track student participation, but traditional attendance methods often face challenges like manual errors, inaccuracies, or student manipulation. Usmanu Danfodiyo University, Sokoto,...
Background of the Study
University admission fraud, including falsified documents, identity theft, and unauthorized access to admission portals, poses significant challenges to the integrity and security of academic institutions. Traditional fraud detection methods typical...
Background of the Study
Student identification and access management are critical elements of security in academic institutions. Traditionally, student ID systems have relied on physical cards or simple barcode scanners, but these methods can be easily compromised (Chen &a...
Background of the Study
Attendance monitoring in universities has traditionally relied on manual systems such as paper-based registers, sign-in sheets, and biometric methods, all of which present various challenges in terms of accuracy, efficiency, and time management. With the increasing...
Background of the Study
The need for secure authentication systems in academic institutions has become increasingly critical as the volume of digital interactions, sensitive data, and cybersecurity threats grows. Federal University, Lokoja, like many other institutions, fa...
Background of the Study
Biometric security systems, which use unique physical characteristics like fingerprints, facial recognition, or iris scans to verify identities, are crucial for protecting sensitive information and ensuring the security of various national servic...
Background of the Study
Lecture attendance is a critical aspect of academic engagement, but it is often challenging to monitor efficiently in large university settings. Traditional attendance systems, such as sign-in sheets and roll calls, have proven ineffective in ensuri...
Background of the Study
Student registration in universities is a critical process that involves the collection of various data points, including personal information, academic records, and biometric data. Traditional registration systems, while effective, are often cumber...
Background of the Study
Biometric authentication is increasingly used in academic institutions for securing access to university portals, which store sensitive information such as student records, grades, and financial details. While biometric systems, such as fingerprint...
Background of the Study
Biometric authentication systems have become integral to enhancing security and streamlining identity verification processes in government institutions. At the Nigerian Immigration Service in Abuja, the need for robust and tamper-proof authenticatio...
Background of the Study
The evolution of digital technologies has revolutionized various administrative processes in education. In secondary schools within Sokoto South LGA, Sokoto State, maintaining accurate attendance records is crucial for academic performance monitori...
Background of the study
In Maiduguri LGA, Borno State, ensuring the security of hostel accommodations is a significant concern due to issues such as unauthorized access, theft, and safety breaches. Traditional key‑based or card‑based entry systems are increasingly vulnera...
Background of the Study:
Biometric authentication has emerged as a transformative technology in the banking industry, offering enhanced security and streamlined customer verification processes. In Gombe State, Access Bank has adopted biometric solutions such as fingerprint and facial re...
Background of the Study:
Biometric authentication, which uses unique biological traits such as fingerprints or facial features, is emerging as a robust solution for reducing bank fraud. FCMB in Oyo State has implemented biometric systems as part of its efforts to enhance security and re...
Background of the Study
Biometric authentication is increasingly recognized as a robust security measure in retail banking, offering enhanced accuracy and user convenience over traditional methods such as passwords and PINs. Fidelity Bank in Kogi State has adopted biometri...
Background of the Study:
Biometric authentication represents a significant leap forward in enhancing security and preventing fraud in retail banking. At First Bank in Abuja, biometric systems such as fingerprint scanning and facial recognition are being deployed to verify customer ident...
Background of the Study
Accurate attendance tracking is crucial for academic accountability and operational efficiency in higher education. At Federal University, Dutse, the implementation of a biometric‑based attendance system is being investigated as a means to eliminat...