INTRODUCTION
Every government, particularly those in developing countries, is worried about their country's economic progress. As a result, they work hard to attain better rates of economic growth and increase the living standards of their inhabitants....
Background Of The Study
The advent of the internet in the 1990s led to major developments in the world of communication. Today the Internet has taken a firm place in people's lives. It is difficult to imagine a young man who at least once a day did...
EXCERPT FROM THE STUDY
E-commerce is referred to as electronic commerce. It means the electronic media and the internet for dealing with goods and services. E-Commerce entails a company accessing the internet as well as IT, such as the electronic data interchange (EDI). E-commerce conce...
ABSTRACT
The study investigated the awareness of e-learning and its utilization by business education students in Anambra State tertiary institutions. Four research questions were posed and four hypotheses formulated. A total of 1603 business education...
Background of the Study
Police Brutality or extreme utilization of power backed up by law is a social infringement involving the use of force by police officers against subjects of a country or specific regional area (Amnesty International, 2014). Utili...
Background to the study
Businesses, which involve individuals, groups of individuals, companies or corporations in public and private sectors play an important role in the economic development of a given country. In this era of globalization, the demand...
Background of the Study
The Internet has its origins in cold war and technological rivalry between USSR and US. In fact "while the World Wide Web was created in 1991, its origin dates back to 1957 when the Soviet Union launched the Sputnik I satellite" (Dickey...
INTRODUCTION
Clearance is a status granted individuals, typically members of the military, university graduates and employees of governments and their contractors, allowing them access to classified information, i.e. state secrets. The term "clearance” is als...
Abstract
The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...
AIM AND OBJECTIVES
The primary aim of this project work is to provide lasting solution to the problem by computerizing the maintenance of record of NOKIA users to help track down user’s services and follow up provision of wireless voice overIP. To eli...
BACKGROUND OF THE STUDY
The art of communication as we know it now has evolved over many generations. Humans have been working very hard for a very long time to improve on one of the most fundamental aspects of their existence, and this effort has resulted in the...
BACKGROUND OF THE STUDY
The evolution of communication into what it is now has taken place over a period of many centuries. The sophisticated and complex nature of human communication in the modern world is the product of a very long and sustained effort by human...
BACKGROUND TO THE STUDY
The globe is rapidly becoming a global village, and telecommunication is an essential instrument in the process of communication. The current advancement in mobile phone communication in Nigeria has completely altered people'...
Background to the Study
Because the smartphone has taken the world by storm, there are now more smartphone devices on the planet than persons. Because of the rapid rise of smartphones and their users, some marketers are struggling to keep up with both n...
BACKGROUND OF THE STUDY
Computers with Internet access have succeeded in facilitating human communication. The telephone system, which was developed some years ago as the primary communication system, has advanced significantly, to the point where we now have fix...
Background of the Study
The Internet sprang from the cold war and technical rivalry between the USSR and the US. "While the World Wide Web was formed in 1991, its origins stretch back to 1957, when the Soviet Union launched the Sputnik I satellite," according...
Background To The Study
ICT (information and communication technology) has altered the manner in which people live, study, work, and associate. According to Tambe and Hitt (2016), ICT is a means through which businesses seek out creative ways of functio...
Background Of The Study
Rapid advances in ICT as pinpointed by Okeke(2017) have led to significant changes in the way society functions and communicates in recent years. This in turn has impacted the educational institutes both in terms of content...
Background to the study
Information simply is that which informs, that from which data can be derived. It is any propagation of cause and effect within a system. Information is conveyed either as the content of a message or through the direct or indirec...
STATEMENT OF THE PROBLEM
The internet is an interconnected computer networks that use the standard internet protocol suite to serve billions of users worldwide. It consists of millions of private, public, academic, business and government networks that range from local...
Background of the study
The emergence of Information and Communication Technology (ICT) and internet facilities have drastically affected almost every facet of human life. Currently, it is greatly evident in the way of teaching and learning. Nowadays, smartphones have b...
Abstract
The study investigated the effect of social media on the academic performance of students in delta state university Abraka, to which four major questions serve as a guide. The survey design for the study was based on the used of 16 item questionnaire, distribut...
BACKGROUND OF THE STUDY
Communication as known everywhere has developed over a number of centuries. The sophisticated and complexity which characterized human communication in the modern world are the result of a very long and sustained effort by human beings to improve...
Background to study
A study by BMG et al. (2015) found that almost all SMEs used the Internet for commercial purposes, but the intensity of use varied with size. The most common use of the Internet was to be in contact with customers. Although the use o...
ABSTRACT
The advantage of cellular communication like GSM technology is a potential solution for such remote controlling activities. GSM-SMS technology can be used to control household appliances from remote places. Remotely, the system allows the home owner to monitor...
ABSTRACT
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier frequency multiplexing scheme used in broadband wireless communication systems and has advantages such as high spectral efficiency, simple channel equalization and flexibility.One of its major challenges is th...
ABSTRACT
Energy efficiency is one of the most important challenges for Wireless Sensor Networks (WSNs). This is due to the fact that sensor nodes have limited energy capacity. Therefore, the energy of sensor nodes has to be efficiently managed to provide longer lifetime for the network....
ABSTRACT
This research aimed at the development of a modified real-time fault-tolerant task allocation scheme (mRFTAS) for wireless sensor networks (WSNs), using active replication backup techniques. In WSNs, the sensor nodes are at risk of failure and malicious attacks (selective forwa...
ABSTRACT
This research work presents the development of a privacy aided trust routing model using social similarity in an Opportunistic Network (OppNet). OppNet is a delay tolerant network where link is highly unpredictable. It is an ideal solution in situations where the deployment of...
ABSTRACT
Energy conservation in wireless sensor networks (WSNs) is a key area of research aimed at addressing the challenge of efficient energy utilization. This is due to the fact that the Sensor Nodes (SNs) have limited energy. The limited energy has to be utilized efficiently in orde...
ABSTRACT
The major problems of most wireless technologies such as EDGE, HSPA, WiMax, HSPA+, WiFi G, WiFi and LTE are the imbalance of radio resources allocation as well as unfairness and difficulty to achieve unity index. These result in overstressing the networks while leaving some idl...
Background of the Study
Owing to the high rate of industrial espionage and theft, industrial security techniques need to be improved to arrest/combat pilfering in industries. This project work tries to...
ABSTRACT
Spectrum is a vital requisite for growth enhancement in this Digital Economy, and the efficient way of managing the use of the spectrum resources is very important. In recent years, wireless and mobile data traffic in Nigeria has increased dramatically and requires significant...
BACKGROUND TO THE STUDY
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices pass data to each other along network links (...
Abstract
The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle...
ABSTRACT
Mobile Ad hoc network which is known as MANET is a network communication medium that is made up of mobile wireless node. The network operates as an infrastructure-less network that doesn’t require an existing network infrastructure such as routers, switches or mounted acc...
ABSTRACT
A decentralized framework for network optimization is presented for wireless sensing nodes. The wireless sensing nodes use a dynamic programming algorithm to choose optimal routes for data transmission from any network node to a specialized ‘gateway’ node that provi...
ABSTRACT
The real-time applications and the IoT promote the need for a newer idle spectrum to support the required high traffic. This pushes toward the emergence of the millimeter-wave (mmWave) and the sub-Terahertz (sub-THz) bands in wireless communication. Albeit these higher frequenc...
ABSTRACT
As technology evolves in telecommunication, the choice of the kind of radio to be used for data transfer in a multi-radio system at a particular time remains a challenge, especially in device-to-device (D2D) communications. This is evident in devices such as phones where multip...
Abstract
The trend towards personalized ubiquitous computing has led to the advent of a new generation of wireless technologies, namely wireless body area networks (WBANs), which connect the wearable devices into the Internet-of-Things. This thesis considers the problems of relay...
Abstract
Commodity passive RFID system consisting of the reader and battery-free RFID tags proliferates the internet-of-things applications (e.g., indoor localization, gesture recognition and assets tracking) due to its low cost and small form factor. In this thesis, we propose three hu...
ABSTRACT
The growth of the telecommunication industry is fast paced with ground-breaking engineering achievements. Despite this, portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small...
Abstract
Streetlights are usually lit during all dark hours even though vehicles or other objects are not using the road. Instead of wasting energy on keeping the streetlights lit when no vehicles are using the road, the streetlights should be lit whenever vehicles are in proximity of t...
BACKGROUND OF THE STUDY
Wireless Ad hoc Networks are networks in which wireless nodes cooperate to establish network connectivity and perform routing functions in the absence of infrastructure using selforganization. Similarly, Mobile wireless Ad hoc Networks (MANETs) are networks in wh...
ABSTRACT
This study shows how to monitor the movement of cattle using wireless sensor nodes powered by a renewable energy source capable of detecting location, and incorporated in it all the available mobile networks to ensure that information about cattle location gets to the base in r...
Education has for long been recognized as a basic instrument of economic growth, social development and technological advancement of any society or nation. It is in recognition of this fact that government are required to commit immense resources to ensure the...
ABSTRACT
Wireless sensor networks (WSN) consist of micro-sensors capable of monitoring physical and environmental factors. These are often mainly made up of resource constrained sensor nodes and gateways. Networking these nodes presents several challenges because the devices have limite...
ABSTRACT
In this work, performance of four mobile network operators (MNOs) was measured, analysed, and evaluated in Shiroro Power Station and recommendation were made to improve the quality of their voice and data services. Drive test was performed using transmission environment monitor...
ABSTRACT
Power consumption is a key consideration in every Wireless Local Area Network Medium Access Control (WLAN MAC) algorithm design for wireless devices and extending battery life requires more efficient power management scheme considering that carrier sensing by WLAN modules, fals...
ABSTRACT
It has become inevitable that there would be communication and due to the inherent limitation of the human voice, the public address system came to being. A public address or “P.A SYSTEM” is an electronic amplification system with a mixer ,amplifier and loudspeakers...