Computer Science Research Papers/Topics

Design and Implementation of Optimized Features in A Local Area Network for Improved Enterprise

TABLE OF CONTENTSACKNOWLEDGEMENTS ......................................................................................................... ivLIST OF FIGURES ....................................................................................................................... vTABLE OF CONTENTS ............................................................................................................. viABSTRACT ..................................................................................

Asynchronies Distributed Real Estate Property Profile Management System of Eastland’s Agency

TABLE OF CONTENTSDECLARATIONAPPROVALACKNOWLEDGEMENTTABLE OF CONTENTS ivLIST OF FIGURESLIST OF TABLESABSTRACTCHAPTER ONEINTRODUCTION1.1 Background1.2 Problem statenient 21.3 Objectives 31.3.1 General objects 31.3.2 Specific objectives 31.4 Justifications1.5 Scope ofthe st~idy 3CHAPTER TWOLITERATURE REVIEW2.0 Introduction2.1 Tn formation systei~s 4Related systei~s2.2 Management Information Systems 62.2.1 Benefits of management information system 72.2.2 Barrier of management information system 7...

Teacher Motivation and Academic Performance of Pupils in Universal Primary Education Schools in Baitambogwe Sub County, Mayuge District Uganda

TABLE OF CONTENTSDEDICATIONAPPROVAL .IiACKNOWLEDGEMENT ivTABLE OF CONTENTS vLIST OF TABLES viiiLIST OF FIGURES ixDEFINITION OF TERMS xABSTRACT xiCHAPTER ONE 11 .0 Introduction 1I . I Background of the study 11.1 .1 Historical perspective 11 .1 .2 Theoretical perspective 2.1 .3 Conceptual perspective 21 .1 .4 Conceptual frame work 3I .2 Problem statement 31.3 Purpose of the study 41.4 Objectives of the study 41.4.1 General objectives 41.4.2 Specific objectives 41 .5 Research questions 41.6 Hyp...

Computer Based Information System Of Patient’s Medical Records Case Study: Webuye District Hospital

TABLE OF CONTENTSDECLARATIONAPPROVALDEDICATIONACKNOWLEGEMENTS ivACRONYMS/ABBREVIATIONS vLIST OF TABLESLIST OF FIGURESTABLE OF CONTENTSDEFINITIONS AND TERMSAbstract1.0 Introduction 11.1 Background to the study 11.2 Statement of the problem 31.3 Objectives 31.3.1 General (main) objective 31.3.2 Specific objectives 31.4 Justification of the project 31.5 Scope of the project 41.6 Conclusion 4CHAPTER 2 5LITERATURE REVIEW 52.0 Introduction 52.1 Issues related to the study title 52.1.1 Information s...

Design and Implementation of an Information System for A Transport Company Using Visual Basic and Microsoft Access 2003 Case Study: Uganda Taxi Operators and Driver's Association (Utoda)

ABSTRACT This Uganda Taxi Operators and Drivers Association (UTODA) database is developed to show the efficiency of the company to the employees or staff. It's again developed with an aim of enhancing its activities such as file management. The database is involved in access of vital information about the company. Compilation of views from users who get access to use it and this facilitates the decision making process. Hence increasing chances of donors to facilitate the company. Transpmt In ...

An Analysis of Computer Forensic Activates in Data Network

ABSTRACT The report summarizes that in this Information Technology age, the needs of law enforcement are changing. Some traditional crimes, especially those concerning finance and commerce, continue to be upgraded technologically. Paper trails have become electronic trails. Crimes associated with the theft and manipulations of data are detected daily. According to the website w~~v.cyber crime.com~ an attack is defined as any kind of malicious activity targetted against computer system resourc...

Impacts of Information and Communication Technology On Students’ Learning (A Case Study of Gulu University)

ABSTRACT The study investigated the effect of ICT on students’ learning by taking the case of Gulu University. It sought to establish the relationship between ICT and student’s learning particularly looking at the availability, accessibility and user-ability of the ICT resources in Gulu University. The study was prompted due to the persistent report that students in Gulu Universi~ are getting difficulties in their studies due to limited access and use of ICT resources It was conducted thr...

ANALYZING THE HOUSING ALLOCATION PROCEDURE OF KWARA STATE POLYTECHNIC

CHAPTER ONEGENERAL INTRODUCTION1.1 INTRODUCTIONHousing generally refers to the social problem of ensuring that members of a society have a home to live in, whether it is a house, or some other kind of dwelling, lodging or shelter. Many government sector have a department that deals with housing, such as the United State Department of Housing and Urban Department.Public Housing is a form of housing tenure in which the property is owned by a government authority, which may be central or local. ...

MOBILE WALLET WITH MERCHANT PAYMENT USING ANDROID

AbstractQR Based Merchant Payment using android as the name states is used for QR code scanning for the transactions between a consumer and a merchant go Cashless.  This System deals with the liquid cash transactions between a merchant and consumer enhancing the reliability and the quick monitory transactions on both the ends. This System works in a different fashion when the Merchant scans the QR code from the consumers app the amount is transferred into the merchant’s wallet and he c...

Design And Implementation of Android Crime Reporting System

AbstractAny member of the society who is found guilty of breaking the law has measurable penalties in an ideal society ruled by laws. Members of society are traditionally expected to report any instances of law and order violations to the proper law enforcement authorities. Reporting crimes in the society (Nigeria) used to need visiting to any of the law enforcement agencies' offices (e.g., police, neighborhood corps) to file a report, which made anonymity nearly impossible. However, as techn...

DESIGN AND IMPLEMENTATION OF SIMULATING A VOICE AIDED ATM SYSTEM FOR BLIND AND VISUAL IMPARED CUSTOMERS OF NIGERIAN BANKS

ABSTRACT This project aimed at creating a simulated ATM for blind customers to enhance the quality of service these customers get from their banks. It also targeted at breaching the barrier that prevented blind Nigerians, and persons with visual impairments to utilize the ATM. This simulated voice aided ATM makes use of audible instructions that allow the user to conduct transactions with a degree of security. The research methodology used in this project research is the SSADM (Structured Sys...

DESIGN AND IMPLEMENTATION OF AN AUTOMATED CAR PLATE NUMBER RECOGNITION SYSTEM

AbstractAndroid platform has gained popularity in recent years in terms of market share and number of available applications. Android operating system is built on a modified Linux kernel with built-in services such as email, web browser, and map applications. In this paper, automatic number plate recognition (ANPR) was designed and implemented on Android mobile phone platform. First, the graphical user interface (GUI) for capturing image using built-in camera was developed to acquire car plat...

Design & Implementation of Electronic logbook for Student’s Industrial Work Experience Scheme

ABSTRACT This project, Electronic logbook for Student’s Industrial Work Experience Scheme was designed to minimize the problems associated with the paper logbook such as susceptibility to manipulation or forgery, wearing, and storage problem and retrieval problems. The top down approach was used for the software development and the tools used for this project are Dart programming language.

DESIGNING AND IMPLEMENTING SECURITY SOFTWARE USING CRYPTOGRAPHY METHOD

ABSTRACTIt is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a mess...

EXAMINATION VERIFICATION SYSTEM USING BIOMETRIC (A CASE STUDY OF WAEC)

ABSTRACTMy research Project is to develop fingerprint biometrics systems that assist in the elimination of examination impersonation. Up till now, the WAEC examination board (WAEC) is not using fingerprint as mode of identification, this has resulted in people sitting for WAEC examinations for others who collect the result at the end. With the adoption of fingerprint, this will be eliminated as fingerprint; this will be eliminated as fingerprint identification will also be employed during col...


76 - 90 Of 953 Results