Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
BACKGROUND TO THE STUDY
According to Ajayi et al. (2006), supporting a secure, convenient, and inexpensive payment system is one of the criteria for the growth of the national economy. Today's world is shifting away from paper payment systems and to...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...
EXCERPT FROM THE STUDY
The goal of this study was to examine the effect of violent film on Nigerian female children in Oshodi-Isolo Local Government Area of Lagos State. The study's specific goals was to figure out why people make violent movies, determine the...
BACKGROUND OF THE STUDY
The problem of fraud in financial institution in Nigeria has remained one of the disturbing features of the banking sector. The menace is of the great concern to regulatory authorities the government and the general public...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the Study
In the advanced world like China, Britain, Australia and the United State of America, ticketing system are usually automated with the use of internet and e-commerce. Smart cards are usually used to make payment and ticket genera...
DOCUMENTATION
This study details the manual guide on how to run the program effectively. All steps that will help in the smooth running and operation or using the program are all documented.
CHOICE OF LANGUAGE;
Abstract
Student achievement is profoundly influenced by the evaluation practice used by teachers in the classroom. Research in education has consistently shown achievement monitoring and feedback to be extremely important factors in the teaching learning process. This project is design...
Background of the Study
Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...
OBJECTIVE OF THE STUDY
The main objective of this study is to design an account holder’s information system for Micro finance banks. The aim is to ensure efficient user account management in banks. To achieve the stated objective, the following specific objectives...
INTRODUCTION
The Internet has become a widely recognised method of technology for doing daily activities. The Internet's rise since the beginning of the new century has been amazing, and it has generated a new sort of commerce: Buyi...
INTRODUCTION
A system is a collection of interconnected and linked components that operate together to perform or carry out a certain activity in order to achieve a specified objective as established by Eteng (2016). Security is the most important consideration for...
Abstract
The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform t...
Background to the study
The university plays a central role in the development of a nation; it provides the intellectual force and manpower needed to sustain the socio-economic and political aspiration of the nation. According to Wikipedia, the free online encyclo...
ABSTRACT
In this project work, we present a way to bring information to students by leveraging the availability of phones (with SMS capability). We review the use of mobile phones for delivering examination results via Mobile Application Result Checker in a universi...
ABSTRACT
With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...
ABSTRACT
This research project is aimed at the development of an Estate Agent and Property Management System for real estate professionals. It will save time and enable estate managers sell more by empowering them to easily keep track of leads, manage listings, and...
ABSTRACT
Result processing can be a continuous process of converting data (scores, grade points credit units etc) into definite meaningful information (statement of result, transcript etc). These results are used to check the performance of...
ABSTRACT
The research work “Human resource Management System” includes staff registration, task registration, task allocation, and staff leaves application, leave approver and rejection by admin, add lea...
ABSTRACT
The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...
ABSTRACT
An online loan website would allow AccionMFB to access online application, website, application information from any convenient location, using a single user ID and password. They would be able to do transactions online. The central go...
ABSTRACT
The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...
ABSTRACT
The research work “Online Store Management System” includes sales, stock keeping, warehouse management, staff update, vendors update, clients management and point of sales (POS). This work was done as a result to solve the problems usually encounter...
ABSTRACT
Student achievement is profoundly influenced by the evaluation practice used by teachers in the classroom. Research in education has consistently shown achievement monitoring and feedback to be extremely important factors in the teaching learning process. This...
Statement of the Problem
The existing system is plagued with the following problems;
STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in...
ABSTRACT
Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...
STATEMENT OF THE PROBLEM
The current student’s registration process of Obasanjo collage of...
ABSTRACT
The research work “design and implementation of office management system” includes registration of staff, storing their details into the system, and also computerized billing in the office. Our system has the facility to give unique id for every sta...
Statement of the Problem
The existing system is plagued with the following problems;
Abstract
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the Study
Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...
1.1 Background of the Study
Biometric authentication systems, which include technologies like fingerprint recognition, facial recognition, and voice identification, have revolutionized user security in digital platforms. As cyber threats continue to increase, traditional password-based...
CHAPTER ONE
1.1 Background of the Study
Cybersecurity threats, including phishing attacks, are a growing concern for organizations worldwide. Phishing involves the use of deceptive emails or websites to steal sensitive information such as pass...
Background of the Study
Digital identity systems are technologies that authenticate and verify an individual’s identity online through biometric data, credentials, or digital certificates (Kim & Lee, 2023). These systems have become a vital tool in preventing...
Background of the Study
Biometric authentication has emerged as a key technology in securing financial transactions by verifying the identity of users through unique physical characteristics such as fingerprints, facial recognition, and retinal scans (Bose & Jayapal...
Background of the Study
Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...
Background of the Study
Artificial intelligence (AI)-driven voice recognition technologies are increasingly being utilized to enhance customer experiences and operational efficiency in various industries, including banking. In the context of financial t...
Background of the Study
Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...
Background of the Study
Data security has become a critical concern for organizations worldwide, given the increasing prevalence of cyberattacks and data breaches. Employees play a vital role in safeguarding organizational data, as their awareness and adherence to security protocols sig...
Background of the Study
Data security has become a critical concern for organizations worldwide, given the increasing prevalence of cyberattacks and data breaches. Employees play a vital role in safeguarding organizational data, as their awareness and adherence to security protocols sig...
Background of the Study
Cybersecurity awareness has become an essential component of protecting university networks from external and internal threats. The Federal University of Technology, Minna (FUTMINNA), like other academic institutions, faces a growing need to safegua...
Background of the Study
As cyber threats become increasingly sophisticated, universities must ensure that both their staff and students are equipped with the knowledge and skills to safeguard sensitive information. Federal University, Lokoja, Kogi State, faces growing conc...
Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...
Background of the Study:
As cyber threats continue to evolve, securing user authentication processes has become a top priority for institutions like Federal University, Lokoja, Kogi State. Multi-factor authentication (MFA) is an effective strategy for enhancing the securit...
Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...
Background of the Study
Network security is a critical concern for universities as cyber threats continue to evolve. Traditional access control mechanisms, such as passwords and manual authentication processes, are often insufficient in preventing unaut...