0704-883-0675     |      dataprojectng@gmail.com
1

1. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...

Read more

2. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...

Read more

3. A SURVEY INTO THE ACCEPTANCE AND ADOPTION OF THE CBN CASHLESS POLICY IN NIGERIA

BACKGROUND TO THE STUDY

According to Ajayi et al. (2006), supporting a secure, convenient, and inexpensive payment system is one of the criteria for the growth of the national economy. Today's world is shifting away from paper payment systems and to...

Read more

4. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...

Read more

5. A CRITICAL EXAMINATION OF VIOLENT FILM AND ITS EFFECTS ON NIGERIA FEMALE CHILDREN

EXCERPT FROM THE STUDY

The goal of this study was to examine the effect of violent film on Nigerian female children in Oshodi-Isolo Local Government Area of Lagos State. The study's specific goals was to figure out why people make violent movies, determine the...

Read more

6. FRAUD IN FINANCIAL INSTITUTION AND THE AUDITORS LIABILITY

BACKGROUND OF THE STUDY

The problem of fraud in financial institution in Nigeria has remained one of the disturbing features of the banking sector.  The menace is of the great concern to regulatory authorities the government and the general public...

Read more

7. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

8. DESIGN AND IMPLEMENTATION OF ELECTRONIC TICKETING SYSTEM

Background of the Study

In the advanced world like China, Britain, Australia and the United State of America, ticketing system are usually automated with the use of internet and e-commerce. Smart cards are usually used to make payment and ticket genera...

Read more

9. DESIGN AND IMPLEMENTATION OF A COMPUTERIZED VISA PROCESSING INFORMATION SYSTEM

DOCUMENTATION

This study details the manual guide on how to run the program effectively.  All steps that will help in the smooth running and operation or using the program are all documented.

CHOICE OF LANGUAGE;

Read more

10. DESIGN AND IMPLEMENTATION OF STUDENT EVALUATION PROGRAM

Abstract

Student achievement is profoundly influenced by the evaluation practice used by teachers in the classroom. Research in education has consistently shown achievement monitoring and feedback to be extremely important factors in the teaching learning process. This project is design...

Read more

11. FINGERPRINT BASED STUDENT ATTENDANCE MONITORING SYSTEM

Background of the Study

Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...

Read more

12. DESIGN AND IMPLEMENTATION OF ACCOUNT HOLDERS INFORMATION SYSTEM FOR A MICROFINANCE BANK

OBJECTIVE OF THE STUDY

The main objective of this study is to design an account holder’s information system for Micro finance banks. The aim is to ensure efficient user account management in banks. To achieve the stated objective, the following specific objectives...

Read more

13. A DESIGN AND IMPLEMENTATION OF AN ONLINE TRADING COMMUNITY WEBSITE

INTRODUCTION

The Internet has become a widely recognised method of technology for doing daily activities. The Internet's rise since the beginning of the new century has been amazing, and it has generated a new sort of commerce: Buyi...

Read more

14. DESIGN AND IMPLEMENTATION OF A COMPUTERISED TRANSCRIPT GENERATING SYSTEM (A CASE STUDY OF COMPUTER SCIENCE DEPARTMENT, UNICAL)

INTRODUCTION

A system is a collection of interconnected and linked components that operate together to perform or carry out a certain activity in order to achieve a specified objective as established by Eteng (2016). Security is the most important consideration for...

Read more

15. A FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

 

Abstract

The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to  provide a platform that will allow the bankers to collect customers’ finger print,  provide a platform t...

Read more

16. UTILIZATION OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IN USER SERVICES OF FEDERAL UNIVERSITY LIBRARIES IN SOUTH EAST NIGERIA

Background to the study

The university plays a central role in the development of a nation; it provides the intellectual force and manpower needed to sustain the socio-economic and political aspiration of the nation. According to Wikipedia, the free online  encyclo...

Read more

17. DESIGN AND IMPLEMENTATION OF MOBILE APPLICATION RESULT CHECKER

ABSTRACT

In this project work, we present a way to bring information to students by leveraging the availability of phones (with SMS capability). We review the use of mobile phones for delivering examination results via Mobile Application Result Checker in a universi...

Read more

18. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPANY PLC LAGOS)

ABSTRACT

With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...

Read more

19. DESIGN AND IMPLEMENTATION OF A REAL ESTATE MANAGEMENT SYSTEM

ABSTRACT

This research project is aimed at the development of an Estate Agent and Property Management System for real estate professionals. It will save time and enable estate managers sell more by empowering them to easily keep track of leads, manage listings, and...

Read more

20. DESIGN AND IMPLEMENTATION OF A RESULT PROCESSING AND TRANSCRIPT GENERATION SYSTEM (A CASE STUDY OF FEDERAL POLYTECHNIC NEKEDE)

ABSTRACT

 

Result processing can be a continuous process of converting data (scores, grade points credit units etc) into definite meaningful information (statement of result, transcript etc). These results are used to check the performance of...

Read more

21. DESIGN AND IMPLEMENTATION OF HUMAN RESOURCE MANAGEMENT SYSTEM

ABSTRACT

          The research work “Human resource Management System” includes staff registration, task registration, task allocation, and staff leaves application, leave approver and rejection by admin, add lea...

Read more

22. DESIGN AND IMPLEMENTATION OF A TWO FACTOR AUTHENTICATION LOGIN SYSTEM USING ONE TIME PASSWORD (OTP) WITH SMS

ABSTRACT

The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...

Read more

23. DEVELOPMENT OF DOCUMENT ROUTING SYSTEM ONLINE APPLICATION AND APPROVAL OF LOAN

     ABSTRACT

An online loan website would allow AccionMFB to access online application, website, application information from any convenient location, using a single user ID and password. They would be able to do transactions online. The central go...

Read more

24. DESIGN AND IMPLEMENTATION OF PASSWORD BASED ACCESS CONTROL WITH INTRUDER ALERT SYSTEM

ABSTRACT

The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...

Read more

25. DESIGN AND IMPLEMENTATION OF AN ONLINE STORE MANAGEMENT SYSTEM

ABSTRACT

The research work “Online Store Management System” includes sales, stock keeping, warehouse management, staff update, vendors update, clients management and point of sales (POS). This work was done as a result to solve the problems usually encounter...

Read more

26. DESIGN AND IMPLEMENTATION OF STUDENT EVALUATION PROGRAM (A CASE STUDY OF DAUGHTERS OF DIVINE LOVE JUNIORATE)

ABSTRACT

Student achievement is profoundly influenced by the evaluation practice used by teachers in the classroom. Research in education has consistently shown achievement monitoring and feedback to be extremely important factors in the teaching learning process. This...

Read more

27. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

28. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

29. DESIGN AND IMPLEMENTATION OF A STEGANOGRAPHIC SYSTEM- SECURTITY ENCRYPTION SYSTEM

ABSTRACT

Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...

Read more

30. design and implementation of a web base office management system

STATEMENT OF THE PROBLEM

 

The current student’s registration process of Obasanjo collage of...

Read more

31. DESIGN AND IMPLEMENTATION OF OFFICE MANAGEMENT SYSTEM

ABSTRACT

The research work “design and implementation of office management system” includes registration of staff, storing their details into the system, and also computerized billing in the office. Our system has the facility to give unique id for every sta...

Read more

32. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

33. New Password Authenticated Key Exchange Based on the Ring Learning with Errors

Abstract

Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...

Read more

34. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

35. AN ASSESSMENT OF THE UTILIZATION OF DATAPROJECTNG PLATFORM AMONG POST-GRADUATE STUDENTS IN NIGERIA.

Background of the Study

Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...

Read more

36. The Role of Artificial Intelligence-based Biometric Systems in Enhancing User Authentication: A Case Study of Access Bank, Plateau State

1.1 Background of the Study

Biometric authentication systems, which include technologies like fingerprint recognition, facial recognition, and voice identification, have revolutionized user security in digital platforms. As cyber threats continue to increase, traditional password-based...

Read more

37. THE ROLE OF ARTIFICIAL INTELLIGENCE-DRIVEN PHISHING DETECTION IN NIGERIAN COMPANIES: A CASE STUDY OF IT FIRMS IN ABUJA, FCT

CHAPTER ONE

1.1 Background of the Study

Cybersecurity threats, including phishing attacks, are a growing concern for organizations worldwide. Phishing involves the use of deceptive emails or websites to steal sensitive information such as pass...

Read more

38. A Study of the Role of Digital Identity Systems in Fraud Prevention: A Case Study of Fintech Firms in Kano State

Background of the Study

Digital identity systems are technologies that authenticate and verify an individual’s identity online through biometric data, credentials, or digital certificates (Kim & Lee, 2023). These systems have become a vital tool in preventing...

Read more

39. An Examination of the Effectiveness of Biometric Authentication in Financial Transactions: A Study of Fintech Firms in Niger State

Background of the Study

Biometric authentication has emerged as a key technology in securing financial transactions by verifying the identity of users through unique physical characteristics such as fingerprints, facial recognition, and retinal scans (Bose & Jayapal...

Read more

40. A Review of Digital Identity Management Solutions and Their Security Risks: A Study of Banks in Bauchi State

Background of the Study

Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...

Read more

41. An Evaluation of AI-Driven Voice Recognition in Financial Transactions: A Case Study of Banks in Kano State

Background of the Study

Artificial intelligence (AI)-driven voice recognition technologies are increasingly being utilized to enhance customer experiences and operational efficiency in various industries, including banking. In the context of financial t...

Read more

42. An Examination of the Effectiveness of Biometric Authentication in Financial Transactions: A Study of Fintech Firms in Niger State

Background of the Study

Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...

Read more

43. A Study on Data Security Awareness Among Employees: A Case Study of Corporate Organizations in Katsina State

Background of the Study

Data security has become a critical concern for organizations worldwide, given the increasing prevalence of cyberattacks and data breaches. Employees play a vital role in safeguarding organizational data, as their awareness and adherence to security protocols sig...

Read more

44. A Study on Data Security Awareness Among Employees: A Case Study of Corporate Organizations in Katsina State

Background of the Study

Data security has become a critical concern for organizations worldwide, given the increasing prevalence of cyberattacks and data breaches. Employees play a vital role in safeguarding organizational data, as their awareness and adherence to security protocols sig...

Read more

45. Investigation into Cybersecurity Awareness among Staff and Students of Federal University of Technology, Minna, Niger State

Background of the Study
Cybersecurity awareness has become an essential component of protecting university networks from external and internal threats. The Federal University of Technology, Minna (FUTMINNA), like other academic institutions, faces a growing need to safegua...

Read more

46. Development of a Network Security Awareness Program for Federal University, Lokoja, Kogi State

Background of the Study
As cyber threats become increasingly sophisticated, universities must ensure that both their staff and students are equipped with the knowledge and skills to safeguard sensitive information. Federal University, Lokoja, Kogi State, faces growing conc...

Read more

47. Comparative Study of Network Authentication Methods in Federal University, Lokoja, Kogi State

Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...

Read more

48. Development of a Network-Based Multi-Factor Authentication System for Federal University, Lokoja, Kogi State

Background of the Study:
As cyber threats continue to evolve, securing user authentication processes has become a top priority for institutions like Federal University, Lokoja, Kogi State. Multi-factor authentication (MFA) is an effective strategy for enhancing the securit...

Read more

49. Implementation of Secure Network Access Control Using Biometric Authentication in Federal University, Kashere, Gombe State

Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...

Read more

50. Enhancing Network Security Through AI-Powered Access Control in Federal University, Dutsin-Ma, Katsina State

Background of the Study

Network security is a critical concern for universities as cyber threats continue to evolve. Traditional access control mechanisms, such as passwords and manual authentication processes, are often insufficient in preventing unaut...

Read more
whatsapp