ABSTRACT This paper presents a graph-coloring-based algorithm for the exam scheduling application, with the objective of achieving fairness, accuracy, and optimal exam time period. Through the work, we consider few assumptions and constraints, closely related to the general exam scheduling problem, and mainly driven from accumulated experience a... Continue Reading
ABSTRACT This paper presents a graph-coloring-based algorithm for the exam scheduling application, with the objective of achieving fairness, accuracy, and optimal exam time period. Through the work, we consider few assumptions and constraints, closely related to the general exam scheduling problem, and mainly driven from accumulated experience a... Continue Reading
ABSTRACT Face recognition and detection is one of the most important fields of the modern applications. Face recognition system uses two sub-systems named face detection system and image database system. Face recognition can be of feature based and image based. Feature based method uses features like skin color, eyes, nose and mouth to detect... Continue Reading
CHAPTER ONE INTRODUCTION 1.1Background of the Study The importance of computer and its application have been recognized globally. The impact computers to the society have been felts in hotels booking system. Computer booking system (CBS) has brought a lot of change improvement and efficiency in hotel operation. Continue Reading
ABSTRACT This study examined critically evaluate student’s perception on online registration in Sokoto State University. In order to realize the objective of the work, some research questions with corresponding hypotheses were formulated. A total of 101 students in the Department of Computer science, Guidance and Counselling were used from a p... Continue Reading
DESIGNING AND IMPLEMENTING A TRANSACTING SYSTEM OR AN ATM MACHINE ABSTRACT This project is aimed at designing and implementing a transacting system or an ATM machine for Eco Bank Plc, Obosi Onicha. Specially, this study covered the activities of financial institutions in mobilizing cash payments and given the larger part of it to customers who ... Continue Reading
Computer based security and monitoring system for forensic experts CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY The world is becoming a smaller place in which to live and work. A technological revolution in communications and information exchange has taken place within business, industry and homes. Most developed and developing ... Continue Reading
ABSTRACT This project work is aimed at studying the procedure for NYSC mobilizing and posting system for the purpose of automating the system for effectiveness and efficiency. Nigerian University students are sent on a one year National youth service corps after their graduation from the university Continue Reading
ABSTRACTS The means through which Otukpo local government water board funds its corporation leaves much to be desired. This result has called for research study to be carried out on automated revenue computation software for Water Corporation with the local government as a case study. Continue Reading
ABSTRACT Hospital Management Information System (HMIS) is refers to a computer based system that provides hospital with the tools to organize evaluate and efficiently manage departments within the hospital. MIS has five parts namely: hardware, software, procedure, people and data. The method adapted in carrying out this work is the “structures... Continue Reading
ABSTRACT Hospital Management Information System (HMIS) is refers to a computer based system that provides hospital with the tools to organize evaluate and efficiently manage departments within the hospital. MIS has five parts namely: hardware, software, procedure, people and data. Continue Reading
ABSTRACT Computing has been a major aspect of the computer science that deal with the operational sector of the computer device, its compilation has been the essential and integral part of the whole system, the sequential procedure must be analyze, and its algorithm flexible. The researcher embarked on this study to practically analyze its techn... Continue Reading
ABSTRACT Images are the most populous cover files for steganography algorithm because of their large amount of redundant bits that are suitable in the transmission of information over the internet. The joint photographic Expert Group (JPEG) is example of images formats that uses the compression techniques. The JPEG is the most populous image fil... Continue Reading
The research work is motivated by the challenges of transmitting sensitive information from the sender to a targeted recipient with an interception of a third party or adversary considering the security challenges of confidentiality, integrity and availability of data in Nigeria. Continue Reading
Abstract The study was about the effect of computerization on service delivery in Airtel Uganda. The study was carried out in Nakawa division, Kampala district. Both primary and secondary data was collected using the questionnaires and review of the existing literature respectively. A questionnaire was designed which covered the employe... Continue Reading