CHAPTER ONE GENERAL INTRODUCTION 1.1 Introduction It seems quite a safe bet to assert that the Internet and mobile Communication have had a preponderant influence on the way the world relates today. On the other hand, education remains a sine qua non fact of life for the overwhelming majority of human society In Nigeria; the educational secto... Continue Reading
CHAPTER ONE 1.1 INTRODUCTION Over the year the leading cause of death in women aged between 35-54 years is breast cancer and second to cardio vascular disease in order women (Logan 1975). Mortality and incidence rate vary throughout the world with England and wale making first and us fourteen developing countries like Nigeria not left. In fa... Continue Reading
CHAPTER ONE 1.1 INTRODUCTION Over the year the leading cause of death in women aged between 35-54 years is breast cancer and second to cardio vascular disease in order women (Logan 1975). Mortality and incidence rate vary throughout the world with England and wale making first and us fourteen developing countries like Nigeria not left. In fa... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 Background of Study The state of the traffic system is influenced by travel demand and traffic supply characteristics. Travel demand is defined by Roess et al. (1998) as the number of vehicles or people that desire to travel past a point during a specified period. The main traffic supply characteristic that ... Continue Reading
ABSTRACT A number of problems associated with student registration number which include include improper course registration, late release of students’ results, and inaccuracy due to manual and tedious calculation and retrieval difficulties/inefficiency due to Lack of Student Registration number. In most cases the data generated by academic ins... Continue Reading
CHAPTER ONE GENERAL INTRODUCTION 1.0 INTRODUCTION A system is a collection of inter-related and inter-connected components that work together to perform or carryout a specific task in order to accomplish a particular goal. For every system, security is a paramount issue. Due to multiple security incidents around the world and the loss of se... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION Data matching process enables an analyst to reduce data duplication and improve data source. Matching analyses the degree of duplication in all records of a single data sources, returning weighted probabilities of a match between each set of records compared. You can then decide which records are matched ... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY A household inventory is a documentation of every item in your home so that you have this in the event of disaster, such as burglary or fire outbreak. It usually consists of a list of the items and/or a videotaped walk through of your home which captures images of the items. Household inv... Continue Reading
CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY This project is principally designed for BRITISH AIR LINE. Air transport can be said to have been conceived when the first controlled and sustained flight with a prove red heavier than air machine was achieved by the writer on December 17, 1903 this earned America the birth p... Continue Reading
ABSTRACT This project is aimed at developing a web-based system, which manages the activity of “Student Project Management” and allocation. This system will manage the database and maintain a list of all student or groups of student that have registered as a finalist in this site, and for those students that been shortlisted who have passed t... Continue Reading
The Internet today is commonly used as a medium to share large size multimedia content. This sharing is carried out, a number of times, through the Peer to Peer sharing architecture rather than the conventional server-client model. The paucity of network addresses in the Internet has led to the emergence of private and global networks. Because ... Continue Reading
Almost ten years have passed since the expression “peer-to-peer” reached the large internet population. It has had considerable success, but there still seems to be a long way ahead. In these ten years, a wealth of peer-to-peer systems has been proposed by the research institutions, but only few have made it commercially. While the research ... Continue Reading
ABSTRACT Cloud Computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing systems can be easily threatened by various cyber-attacks, because most of Cloud Computing systems provide services to so many people who are not proven to be trustworthy.Therefore, a Cloud Computing system needs to con... Continue Reading
ABSTRACT Telemonitoring during the golden hour of patient transportation helps in improved Medicare. Presently there are different physiological data acquisition and transmission systems using cellular network and radio communication links. Location monitoring systems and video transmission systems are also commercially available. The emergency p... Continue Reading
CHAPTER ONE INTRODUCTION A car rental or car hire agency is a company that rents automobiles for short period of time for a fee whether in a few hours or a few days or week. It is an elaborate form of a rental shop, often organized with numerous local branches (which allow a user to return a vehicle to a different location), and primarily 'loc... Continue Reading