Computer Science Research Papers/Topics

DESIGN AND IMPLEMENTATION OF A WINDOW BASED FRONT-DESK INFORMATION SYSTEM (A CASE STUDY OF MAY FRESH SAVINGS AND LOAN LIMITED ONITSHA

ABSTRACT In account form analysis, a lot of discrepancies causes by manual aspect of the form such as: lost of form, inability to correct intakes, poor storage facilities have been a problem in the May fresh savings and loan limited account form. But in recent times, the computer has come to the aid of our banks, May fresh in particular.The introduction of computer into the banking operation has to a great extent affected the mode of operation of banks in diverse ways. Computer has touched a...

DESIGN AND IMPLEMENTATION OF AN ON LINE ENTRANCE EXAMINATION ADMINISTRATION SYSTEM.

ABSTRACT Computers are known for their wide range of uses especially in scientific and mathematical fields.  However little or no thought has been given to designing a complete and through intelligence test on a computer system in out immediate environment.  Although in advanced countries, where computerized games have been developed, computers have proved that they constitute of ways of indirectly testing intelligence.This system is designed in order to implement intelligence test on a co...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CARGO TRANSPORTATION MANAGEMENT SYSTEM (A CASE STUDY OF SUPER MARITIME SHIPPING AGENCY, LAGOS)

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CARGO TRANSPORTATION MANAGEMENT SYSTEM (A CASE STUDY OF SUPER MARITIME SHIPPING AGENCY, LAGOS) A PROJECT PRESENTED TO THE DEPARTMENT OF COMPUTER SCIENCE  ABSTRACT This project was out of the necessity to address the inherent problems encountered by members of staff of super maritime shipping Agency and their customers. The manual process involved in the management of cargo were critical examined and the flows noted.  The software so designed ...

DESIGN AN IMPLEMENTATION OF A COMPUTER BASED SEAPORT BILLING SYSTEM (A CASE STUDY OF NIGERIAN PORT AUTHORITY LAGOS)

ORGANISATION OF THE WORK This work is organized in seven chapters and appendices as follows: CHAPTER ONE: Deal with the introduction of cargo handling, statement of the problem, aims/objectives, purpose of study, importance of study, definition of terms, assumptions. CHAPTER TWO: Gives review of related literature researched. CHAPTER THREE: Method of data collection, Organization structures, objectives of the existing system, input process, output analysis, information flow diagram, problem ...

DESIGN AND IMPLEMENTATION OF A DIGITAL LIBRARY SYSTEM

ABSTRACT Libraries have been an important part of educational and information sector of any school.  The success of any library largely depends on proper management. Several libraries have suffered failure as a result of inadequate management and incapacitations in handling sensitive information as regards members of the library.   This research therefore, aimed at developing a digital library system, which will help direct and position library to meets its ever increasing demands. In the c...

THE IMPACT OF COMPUTER INNOVATION ON COMMERCIAL BANK IN NIGERIA (CASE STUDY OF UBA PLC)

ABSTRACT This study was conducted to examine the impact of computer innovation on commercial banks in Nigeria a case study of United Bank for Africa. This research work has become necessary to investigate the issue in all ramifications, with the view to identify changes in the level of activities of commercial bank as a result of computer innovation in business organizations and commercial banking services. Although, computer have tendency to reduce labour force but it makes banking operation...

CIVIL INTELLIGENCE GATHERING SYSTEM

ABSTRACTCrime and insecurity are threats to physical, human and social development. Crime has negative impact (disincentive) on foreign direct investment. Public insecurity impedes domestic and international tourism. Whereas, lack of investment hinders economic development with the result that majority of the citizenry become poor and marginalized. The purpose of this phase is to carry out intelligence gathering with the proposed system, to be used in Security / intelligence agencies. The sys...

MOBILE TELECOMMUNICATION BASE STATIONS MONITORING SYSTEM

ABSTRACT With the technological advancement in wireless communications, the industry demands better and more reliable technology for transmission equipment. One of the most important requirements for the wireless communications industry is to manage base stations effectively for communication purpose. In order to provide the best transmission service to customers, base stations have to be spread over a large area. A large network of base stations requires a secured, stable and effective mana...

SIMULATION OF A NETWORK MONITORING SYSTEM

ABSTRACT This project topic “Simulation of a Network Monitoring System” was carried out with a view to deploying effective monitoring for computers in a local Area Network. The project developed a system that lets administrators remotely monitor computers in a network. Our aim is to show how user interface can be applied to provide a complete solution for monitoring networks. Securing and  monitoring a network is an important issue since computers connected in a network can be faulty a...

CRYPTOGRAPHY IN INFORMATION TECHNOLOGY

ABSTRACTCryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerc...

IMPORTANCE OF COMPUTER IN AUTOMOBILE MANUFACURING

ABSTRACT It is not uncommon nowadays to see computers entrusted with functions upon which human life are dependent, examples of such functions are embedded computers in heart pace-makers, anti-lock braking systems in cars, and fly-by-wire flight control systems for civil airliners. In recent times, the manufacturing industry has witnessed remarkable modernization in technology as well as the adoption of information technology and computer science on a massive scale. Automobile design and man...

SEMINAR PRESENTATION ON CARNIVORE SOFTWARE

ABSTRACT A carnivore is controversial program that is developed by the Federal Bureau of Investigation in US (United State) by which they are able to access the email activities of the person suspected. It was the third generation software of online detection. The FBI (Federal Bureau of Investigation) uses to configure the hardware with IP (Internet Protocol) address of software through which carnivore captures packets from a particular location. A carnivore is used to work on a phenomena of ...

DESIGN AND IMPLEMENTATION OF E-LEARNING SYSTEM

ABSTRACT The project critically looks into the design and implementation of an e-Learning system for Lagos State Polytechnic, Nigeria. The project discussed various kinds of e-Learning platforms such as teleconferencing, virtual reality and video-conferencing. It also addresses the impact of resource materials on the design and implementation of e-Learning platform as well as the awareness creation of the technology. At the end, the system was able to complement the various activities in the...

ANALYSIS OF ONLINE EXAMINATION REGISTRATION SYSTEM

ABSTRACT The process of examination pre-registration is aimed to obtain accurate information on the intended candidates individually and collectively. These information are used to make a multitude of decisions such as the nature and structure of examination questions, categories and number of expected candidates, and other information which might be personal such as bio information. Unless a sufficiently accurate and efficient methods are used for  the data collection,  the data retr...

Java Ring Technology

Abstract A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem´s Java Ring was introduced at their Java One Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor. Workstations at t...


1246 - 1260 Of 1652 Results