Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
BACKGROUND TO THE STUDY
According to Ajayi et al. (2006), supporting a secure, convenient, and inexpensive payment system is one of the criteria for the growth of the national economy. Today's world is shifting away from paper payment systems and to...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...
EXCERPT FROM THE STUDY
The goal of this study was to examine the effect of violent film on Nigerian female children in Oshodi-Isolo Local Government Area of Lagos State. The study's specific goals was to figure out why people make violent movies, determine the...
BACKGROUND OF THE STUDY
The problem of fraud in financial institution in Nigeria has remained one of the disturbing features of the banking sector. The menace is of the great concern to regulatory authorities the government and the general public...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the Study
In the advanced world like China, Britain, Australia and the United State of America, ticketing system are usually automated with the use of internet and e-commerce. Smart cards are usually used to make payment and ticket genera...
DOCUMENTATION
This study details the manual guide on how to run the program effectively. All steps that will help in the smooth running and operation or using the program are all documented.
CHOICE OF LANGUAGE;
Abstract
Student achievement is profoundly influenced by the evaluation practice used by teachers in the classroom. Research in education has consistently shown achievement monitoring and feedback to be extremely important factors in the teaching learning process. This project is design...
Background of the Study
Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...
OBJECTIVE OF THE STUDY
The main objective of this study is to design an account holder’s information system for Micro finance banks. The aim is to ensure efficient user account management in banks. To achieve the stated objective, the following specific objectives...
INTRODUCTION
The Internet has become a widely recognised method of technology for doing daily activities. The Internet's rise since the beginning of the new century has been amazing, and it has generated a new sort of commerce: Buyi...
INTRODUCTION
A system is a collection of interconnected and linked components that operate together to perform or carry out a certain activity in order to achieve a specified objective as established by Eteng (2016). Security is the most important consideration for...
Abstract
The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform t...
Background to the study
The university plays a central role in the development of a nation; it provides the intellectual force and manpower needed to sustain the socio-economic and political aspiration of the nation. According to Wikipedia, the free online encyclo...
ABSTRACT
In this project work, we present a way to bring information to students by leveraging the availability of phones (with SMS capability). We review the use of mobile phones for delivering examination results via Mobile Application Result Checker in a universi...
ABSTRACT
With the rapid development in Computer Technology, most organization have embraced the use of computer resources in its activities to enable them achieve its set down objectives. Electronic data processing is a wonderful tool which is used extensively in financ...
ABSTRACT
This research project is aimed at the development of an Estate Agent and Property Management System for real estate professionals. It will save time and enable estate managers sell more by empowering them to easily keep track of leads, manage listings, and...
ABSTRACT
Result processing can be a continuous process of converting data (scores, grade points credit units etc) into definite meaningful information (statement of result, transcript etc). These results are used to check the performance of...
ABSTRACT
The research work “Human resource Management System” includes staff registration, task registration, task allocation, and staff leaves application, leave approver and rejection by admin, add lea...
ABSTRACT
The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...
ABSTRACT
An online loan website would allow AccionMFB to access online application, website, application information from any convenient location, using a single user ID and password. They would be able to do transactions online. The central go...
ABSTRACT
The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...
ABSTRACT
The research work “Online Store Management System” includes sales, stock keeping, warehouse management, staff update, vendors update, clients management and point of sales (POS). This work was done as a result to solve the problems usually encounter...
ABSTRACT
Student achievement is profoundly influenced by the evaluation practice used by teachers in the classroom. Research in education has consistently shown achievement monitoring and feedback to be extremely important factors in the teaching learning process. This...
Statement of the Problem
The existing system is plagued with the following problems;
STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in...
ABSTRACT
Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...
STATEMENT OF THE PROBLEM
The current student’s registration process of Obasanjo collage of...
ABSTRACT
The research work “design and implementation of office management system” includes registration of staff, storing their details into the system, and also computerized billing in the office. Our system has the facility to give unique id for every sta...
Statement of the Problem
The existing system is plagued with the following problems;
Abstract
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the Study
Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...