ABSTRACT This research work is in respect to the development of an Information Retrieval System for the Federal Road Safety Corps in Benue State. An Information Retrieval System is a system that is capable of storage, retrieval and maintenance of information, the general objective of this System is to minimize the overhead of a user locating needed information, overhead can be expressed as the time a user spends in all of the steps leading to reading an item containing the needed informati...
CHAPTER ONE INTRODUCTION 1.0 Introduction This chapter presents the introduction to the research study under the following headings: - Theoretical Background - Statement of the problem - Aim and objectives of the study - Significance of the study - Scope of the study - Organization of Research - Definition of Terms 1.1 Theoretical Background The technologies adopted to imple...
AIM OF STUDY The real value of Mobile learning lies not in accessing knowledge at any time, any placeand for anyone, but helping the right students to acquire the right skills and knowledge atthe right time in order to function as active and collaborative participants in theinformation based society. Thus, the aim of this project is to design a web-based learningsystem, which would provide the right students with�...
Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. The open-...
Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communication...
The use of metaheuristic search technique for generation of test data has been a burgeoning interest for many researchers in recent times. There has been a previous attempt to automate the test data generation process has been limited, having been constrained by the size and complexity of software, and the fundamental facts that in totality test data generation is an undecideable problem. Metaheuristic search technique is high level frameworks, which utilizes heuristic to seek solution for co...
ABSTRACT Biometrics is a technique of using characteristics and behavioral traits for identification of people this is more effective that common personal identification number(PIN) for an improved security technique. The basic procedure in a biometric system is the collection of biometric data through a sensor elements, the module extracted bares biometric data which is compared to its templates in a database to identify the data subject. In this work, the design of DNA (Deoxyribonucleic a...
ABSTRACT This project was centered on database management system for student registration system. The current process of registration is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also sugg...
Computer is a machine that is invented and developed by mimicking the functionality of the human brains. Several human abilities are utilized in writing the programs that run this excellent device. As a result the computer could be applied to solve virtually all problems of man (except spiritual problems).My question is: "Would it not be very beneficial to be educated on how to use this problem solving device?"
ABSTRACT This project is aimed at automating the process involved in generating students examination result that would ensure speedy processing and release of the student’s results, eliminate error due to manual processing, prohibit doctoring of results and prevent lost of examination results. The software system was developed within the Microsoft Visual Studio environment. ASP.NET is used to create the pages. The database is generated and managed using MySQL. The codes were scripted usin...
ABSTRACT Tourism as being a great source of revenue in so many countries like Britain, Australia, Malaysia and many other countries. Seeing the viability of the sector in these countries where tourism as served as one of the life wire of the country economy, has stirred other country government to invest vastly in the sector. The tourism sector of the above named countries has served as a source of employment for the citizenry in various capacity. In reflection of the above statement, th...
- Elections are the bedrock of democracy and voting is one of the electoral processes that ensure the sustenance of democracy, political growth and democratic stability of any society. We have designed an Enhanced Electronic Voting System (EnEVoS) with a Hybrid Authentication Technique, which will reduce electoral malpractices and manipulation of results to its barest minimum. The implementation of this Enhanced Electronic Voting System (EnEVoS) in Nigeria will boost the integrity and image o...
ABSTRACT The research work was conducted with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state by using Network Activity Monitory System. The activity monitoring system was designed, tested and found to achieve the following: It monitored the daily activities of the clients, has a great impact on memory management of the server, Detected active users, Provided accurate evidence on corporate fraud when investigation is being carried ou...
ABSTRACT The objective of this research is to design and implement a computerized Online Bank Verification Number System for Nigerian Bank Customers in the Diaspora. This project was motivated because of the fact that Nigerian bank customers in the Diaspora are barred from having access to their fund in Nigerian banks without BVN, therefore they are required to come back for biometric capture before they can operate on those accounts. The methodology adopted for this research is Structured S...