ABLE OF CONTENTS APPROVAL PAGE i DECLARATION ii ACKNOWLEDGEMENTS iii DEDICATION iv TABLE OF CONTENTS v ABSTRACT vii CHAPTER ONE 1 1.1 BACKGROUND OF THE STUDY 1 1.2 STATEMENTS OF THE PROBLEM 2 1.3 AIM AND OBJECTIVES 3 1.4 SIGNIFICANCE OF THE STUDY 3 1.5 SCOPE AND LIMITATION OF THE STUDY 4 CHAPTER TWO 5 LIT... Continue Reading
ABSTRACT This project deals with developing a secure online forum website for computer Science Students of the University of Port Harcourt it provides students with plat form for communication with their fellow students and staff. In order to facilitate security a user privileges right was implemented. The system was implemented using a 3-tier app... Continue Reading
ABSTRACT This project is about the process and the way used to design and implement of personnel collaboration solution for computer science department. It also discusses other areas of application which is highly influencing the information communication technology world. It is apparent that more and more organizations are embarking on collaborat... Continue Reading
ABSTRACT This project is about the process and the way used to design and implement of personnel collaboration solution for computer science department. It also discusses other areas of application which is highly influencing the information communication technology world. It is apparent that more and more organizations are embarking on collaborat... Continue Reading
ABSTRACT This project is about the process and the way used to design and implement of personnel collaboration solution for computer science department. It also discusses other areas of application which is highly influencing the information communication technology world. It is apparent that more and more organizations are embarking on collaborat... Continue Reading
ABSTRACT Tax is any form charge levied on a person or an institution by a governing body or its equivalent such that defaulted payment is punishable by law. The imposition of taxes and the institution of taxing is as old as civilization itself cutting across religion, race and continental borders. Prompt tax payment and reduced tax evasion is alw... Continue Reading
CHAPTER ONE 1.0 INTRODUCTION Products are created by brand owners and handed to third parties (contract manufacturer, shipping company, distributor…) for delivery to merchants for later sale to consumers. These products can range from commodity items (e.g., flour) to limited quantity “luxury” items (e.g., designer handbags) to one-of-... Continue Reading
ABSTRACT Artificial intelligence has enabled the development of more sophisticated and more efficient student models which represent and detect a broader range of student behavior than was previously possible. In this research, the implementation of a user-friendly software tool for predicting the students’ performance in course which is based o... Continue Reading
ABSTRACT A Text-to-speech application is a synthesizer software that converts text into spoken word, by analyzing and processing the text using Natural Language Processing (NLP) and then using Digital Signal Processing (DSP) technology to convert this processed text into synthesized speech representation of the text. The vision impaired students... Continue Reading
DESIGN AND IMPLEMENTATION OF STUDENT ATTENDANCE MONITORING SYSTEM USING FINGERPRINT CHAPTER ONE INTRODUCTION 1.1 Background of the Study Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning h... Continue Reading
CHAPTER ONE INTRODUCTION Before Education, in the beginning for many years, children taught themselves using everything around them (surrounding, friends, themselves etc.), they taught themselves by being self-directed, playing and exploration. Regardless, if parents did not force children to go to school, they would not be competent adults whe... Continue Reading
CHAPTER ONE INTRODUCTION 1.O BACKGROUND OF THE STUDY The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of s... Continue Reading
ABSTRACT This research work focuses on the design and development of computer assisted tutor used for the teaching/training of students in the absence of a qualified professional or teacher in the field of BASIC programming language. The motivation behind the concept and realization of this project is based on the difficulty faced by students wh... Continue Reading
ABSTRACT Handling of cargo has been a circular task all these while in our various ports. And Nigerian Ports Authority (N.P.A) being an organization responsible for seeing to the affairs of our various sea ports in Nigeria, have worked endlessly to make sure cargoes are properly handled without much complain of damage or misplacement. To ease th... Continue Reading
ABSTRACT Drug procurement and distribution tracking system is a set of computer programs that obtains the supplies of drugs distribute the drugs and monitors the inventory control of the drugs. Using the pharmaceutical department of Port Harcourt University teaching hospital as a case study the department use manual method to operate lacks good ... Continue Reading