Computer Science Research Papers/Topics

Development of a Web Based Human Right Violation Reporting System for National Human Rights Commission

This project intends to solve the problem of petition report submission to public government  agencies by the members of the general public through the design and implementation of a  Proposed Human Rights Violation Act Online Reporting Portal System for case submissions to the Office of the National Human Rights Commission (NHRC). The system will be developed to be an online web-based platform that will allow petition reporters to submit their  cases. The submitted documents will be aut...

Design and Implementation of a Student Chat Information System

ABSTRACT Basically, it has been observed over the years that number of students live far away from the educational institutions as well as the lecturer who are few times occupied. Thus the main objective of this research work is to develop a general purpose interactive information system where information becomes easier and feedback faster, course materials and assignments also gotten at any location regardless of the time. The student chat information system makes use of Object Oriented Anal...

Design and Implementation of a Blood Bank Management System

3.About Project Blood Bank Management System 3.1 Introduction The BLOOD BANK MANAGEMENT SYSTEM  is great project. this project is designed for successful completion of project on blood bank management system. the basic building aim is to provide blood donation service to the city recently. Blood Bank Management System (BBMS) is a browser based system that is designed to store, process, retrieve and analyze information concerned with the administrative and inventory management within a blo...

Uploadchapter1

ABSTRACT In recent years, electronic commerce of agricultural products has developed rapidly. In the development process of agriculture, with the help of some agricultural research institutes putting up websites for their various institutes, where farmers can read up how to improve productivity or some improved varieties (seedlings, cassava stems etc) to use in their farms but a platform has not been laid for the implementation of the sale of agricultural produce. The author discussed some f...

DESIGN AND IMPLEMENTATION OF AN ATTENDANCE SYSTEM USING FINGERPRINT SCANNER

This research work, Design and Implementation of an Attendance System using fingerprint scanner, focuses on computerizing and managing the attendance of students during lecture or event periods. This is very imperative as the cons of the traditional pen to paper attendance system far outweigh the pros as management of student attendance has become a hassle due to increasing number of students during various lecture periods. This study would discuss in detail, how the inconveniences posed by t...

DESIGN AND IMPLEMENTATION OF A HOSPITAL MEDICAL INFORMATION SYSTEM USING FEDERAL MEDICAL CENTER, ABUJA AS A CASE STUDY

Computer and data have become an integral part of every enterprise and business today. Accurate data which is transformed to information is required for any industry to perform at optimal level as such is used in decisive management and decision making processes. This therefore makes such organisations critically dependent on the use of a database system to help in accessing such data and information. However, many hospitals are found to be somewhat “stuck” on the present manual paper bas...

Development Of An Information Retrieval System Using Tree-Structured Clustering: Case Study Of FRSC Benue State

ABSTRACT This research work is in respect to the development of an Information Retrieval System for the Federal Road Safety Corps in Benue State. An Information Retrieval System is a system that is capable of storage, retrieval and maintenance of information, the general objective of this  System is to minimize the overhead of a user locating needed information, overhead can be expressed as the time a user spends in all of the steps leading to reading an item containing the needed informati...

DESIGN AND IMPLEMENTATION OF AN ONLINE SUPERMARKET SHOPPING SYSTEM, A CASE STUDY OF BEVERLY HILLS SUPERMARKET IKOT EKPENE

CHAPTER ONE INTRODUCTION 1.0 Introduction This chapter presents the introduction to the research study under the following headings: -         Theoretical Background -         Statement of the problem -         Aim and objectives of the study -         Significance of the study -         Scope of the study -         Organization of Research -         Definition of Terms   1.1 Theoretical Background The technologies adopted to imple...

DESIGN OF A MOBILE LEARNING SYSTEM

AIM OF STUDY The real value of Mobile learning lies not in accessing knowledge at any time, any placeand for anyone, but helping the right students to acquire the right skills and knowledge atthe   right   time   in   order   to   function   as   active   and   collaborative   participants   in   theinformation based society. Thus, the aim of this project is to design a web-based learningsystem,   which   would   provide   the   right   students   with�...

OPEN SOURCE SOFTWARE

Open-Source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements. The open-...

SIXTH SENSE TECHNOLOGY

Sixth Sense Technology is a mini-projector coupled with a camera and a cell phone—which acts as the computer and connected to the Cloud, all the information stored on the web. Sixth Sense can also obey hand gestures. The camera recognizes objects around a person instantly, with the micro-projector overlaying the information on any surface, including the object itself or hand.

PARASITIC COMPUTING

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communication...

A genetic model for Test Data Generation

The use of metaheuristic search technique for generation of test data has been a burgeoning interest for many researchers in recent times. There has been a previous attempt to automate the test data generation process has been limited, having been constrained by the size and complexity of software, and the fundamental facts that in totality test data generation is an undecideable problem. Metaheuristic search technique is high level frameworks, which utilizes heuristic to seek solution for co...

Design of DNA Based Biometric Security System for Examination Conduct

ABSTRACT  Biometrics is a technique of using characteristics and behavioral traits for identification of people this is more effective that common personal identification number(PIN) for an improved security technique. The basic procedure in a biometric system is the collection of biometric data through a sensor elements, the module extracted bares biometric data which is compared to its templates in a database to identify the data subject. In this work, the design of DNA (Deoxyribonucleic a...

DESIGN AND DEVELOPMENT OF A DATABASE MANAGEMENT SYSTEM FOR STUDENT REGISTRATION

ABSTRACT This project was centered on database management system for student registration system. The current process of registration is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also sugg...


946 - 960 Of 1645 Results