Information Technology Research Papers/Topics

Online Hotel Booking System

ABSTRACT The study Online Hotel Reservation System is the design of an electronically driven system that will enable travelers to book hotel from anywhere in the world at their convenience. This is prompted by the fact that the cost of booking a hotel accommodation is becoming increasingly high with low information of where one can get a good hotel. The main objective in this study is to design a website that is user friendly, has a secured payment system and can provide information to custo...

Distributed Database System For Road Safety Information Management

ABSTRACT Implementing Distributed Database Management System is often difficult due to the disruption of highly coordinated, interdependent processes (e.g.) information exchange, communications, relationships) of providing care in Road Safety. Thus, this system creates and maintains all offender data electronically. The system captures accident victim data, vehicle registration, driving license, and offenders, at its source at the time of entry using a graphical user interface having touch s...

Assessment And Evaluation Of Factors Affecting Teledensity Growth In Nigeria [2001 To 2011]

ABSTRACT Liberalization of Telecommunication Industry was established in 2001 by the Olusegun Obasanjo administration and since then, it is a common knowledge that Nigeria’s Tele-density have improved. However, it is the researcher’s intention to put this level of improvement in quantifiable terms vis-a-viz certain factors and distribution pattern. This study span for ten years [2001-2011] and four leading telecommunication firms were selected to represent the entire Telecommunication In...

An Improved Algorithm For Plagiarism Detection Using N-Gram And String Matching

ABSTRACT To Plagiarise is to include another person’s work, idea, method or results without due acknowledgement. In this work, we developed an innovative algorithm to detect external plagiarism in documents, using a combination of Word-n-gram and string matching technique. The suspicious document was split into sentences and further split into word n-gram and each n-gram was used to perform a pattern match on a standard PAN-09 corpora. We discovered that the best plagiarism detection occur...

An Assessment Of The Constraints In Implementing E-Government In Bayelsa State

ABSTRACT Like the developing and developed countries in the world, Bayelsa State has also embraced and is involved in the processing of various aspects of e-government, particularly in its ministries, agencies and departments.The study is based on jugdemental methodology in using to solve the thesis problem,whose objectives are to know the main obstacles in implementing e-government in Bayelsa State, to know which obstacle have the most effect in implementing e-government in Bayelsa State, a...

A Re-Engineering In Database Optimization And Migration

ABSTRACT This study focuses on a model for reengineering and optimization of legacy file database which are in decay and have faced mutilation in most institutions and organizations in Nigeria. The model provides a systematic method to optimize a legacy file using open source database management system software which transforms the optimized data into digital format which now can be migrated using a designed network platform on a fiber optics backbone. This study is therefore necessitated by...

A Model Of Tertiary Institutions’ Resource Management Platform Using Cloud Computing (TIRMP)

ABSTRACT In Cloud Computing, users connect to the ’Cloud’, appearing as a single entity as opposed to multiple servers. This work seeks to solve resource managerial problems ranging from server maintenance cost, risk of loss of data, internal security issues, and availability of data for proper decision making. This work presents to tertiary institutions a model for designing a scalable and cost effective platform for institutional resource management on the cloud. The platform is called...

A Fleet Information Management System

Abstract In urban transportation or freight distribution, the use of an initial distribution plan, although necessary, is by no means sufficient to address unexpected events such as mechanical failures, vehicle breakdown, total loss of transaction records that are likely to occur during delivery execution and may have adverse effects on system performance. These events cause deviations between the actual and desired state during the execution of the schedule or even after the schedule. Recen...

Performance Evaluation Of Coap And Http On Tsch Minimal Schedule

ABSTRACT Wireless Sensor Networks (WSNs) usually consist of sensor nodes and gateways with limited resources such as memory, power and size. As a result, WSNs require bandwidth-efficient, memory-efficient and energy-efficient application protocols for data transmission. If data transmission at the application layer is not efficient, more re-transmissions will occur across the network which consumes limited resources of the WSN. Therefore a careful and extensive performance evaluation is need...

A Proposed Design Of A Framework For Sudanese E-Government Security Model

ABSTRACT E-government is a kind of governmental administration which is based on electronic information technology. One of the key factors that realizes integration and information sharing to the inter-governmental administrations is the trust level. Information security contributes directly to the increased level of trust and confidence between the government departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. The main...

The Effect Of National Roaming For Service Availability (Case Study: Tracking Service In Sudan)

ABSTRACT National roaming is an important service that Facilitates can lead us to do the best utilization of available resources between different telecommunication providers in the same country. Vehicle tracking services are important for vehicle protection in different businesses. But this service is limited with the limitation of cellular coverage area especially in rural areas. As a result, the vehicle is disconnected from the tracking server until it enters an area where cellular covera...

Improve Data Encryption Standard using 256Bit key Length

Abstract Network security is becoming more crucial as the volume of data being exchanged on the internet. A more practical way to protect information is to alter it so that only an authorized receiver can understand it. Security of data and telecommunication can be done by a technique called cryptography. In this thesis Data Encryption Standard algorithm has been improved. Improved algorithm uses input data 512bit and key of 256bit length to encrypt the data. It uses S-boxes similar to those...

Improving Students Academic Performance Using Hybrid Recommendation Techniques

Abstract Development of students' performance is significant in educational environments because it plays an essential role in making the best quality graduates and post-graduates who will become great leaders in the future and sources of the workforce for the country. A recommendation system is an intelligent system that proposes different suggestions to students, based on the previous actions from other students who faces the same environment, such as academic performance. One of the m...

Model-Based Prediction of Resource Utilization and Performance Risks

The growing complexity of modern software systems makes the prediction of performance a challenging activity. Many drawbacks incurred by using the traditional performance prediction techniques such as simulation, guessing, and depending on previous experience. Moreover, performance assessment and prediction is time consuming activity and may produce inaccurate results especially in complex and large scale software applications. To contribute to solving these problems, we adopt a model-ba...

ICT Integration in Teaching and Learning in Secondary Schools in Tanzania: Readiness and Way Forward

Abstract —The use of Information and Communication Technologies (ICTs) in teaching and learning has brought new teaching and learning experience to both teachers and students in many countries. Tanzania has made several efforts to achieve this but little has been done to determine the readiness of our schools and teachers in terms of ICT infrastructure and possession of other gadgets to help in the integration of ICT in education. This study aimed at looking into the readiness of Secondary ...


181 - 195 Of 395 Results