Works Under Computer Science

Design and implementation Online ex-convict file maintenance system

ABSTRACTEx-convict can be defined as someone that uses to be in prison, someone that has being convicted for a particular crime. Online ex-convict file maintenance system is an online system developed to manage and maintain the records of an ex-convict individual. This software will enhance the proper and accurate, management and maintenance of ex-convict files. It will keep tracks and records of when an ex-convict is being released, the accurate date and time, it will als...

Save
Ikuejawa Abiola Premium 42 PAGES (800 WORDS) Computer Science Project 364 Views
Real Time Application

AbstractThis research report mainly focus on real time application in real analogy, its classification, difference application areas of real time application and functionality. Special emphasis is placed on hard and soft real time application. Typical examples of real time applications include Air Traffic Control System, Air Bag System, Anti-Lock Brakes, Network Multimedia System and Mobile Phone Embedded System.  Real time application is becoming pervasive....

College Management System

ABSTRACTThis project “COLLEGE MANAGEMENT SYSTEM” deals with the maintenance of all college information starting from the principal to the students.CMS is an automation system, which is used to store the departments, student, courses and other information of a college. Starting from registration of a new student in the department, it maintains all the details regarding the courses offered, staff members, bursary etc. The project deals with retrieval of information through an INTRANET ...

THE IMPACT OF ICT ON STUDENTS’ ACADEMIC ACHIEVEMENTS IN COMPUTER STUDIES; A CASE STUDY OF SECONDARY SCHOOLS IN OGBA/ EGBEMA/ NDONI LOCAL GOVERNMENT AREA OF RIVER STATE.

ABSTRACT This research work investigated into the impact of ICT on student’s academic performance in computer studies: a case study of secondary schools in Ogba/Egbema/Ndoni Local Government Area of Rivers State. The study sample comprised of 100 students drawn from the 10 selected secondary schools based on random sampling technique. A self-structured achievement test of 20 items was designed and administere...

PROBLEMS MILITATING AGAINST TEACHING AND LEARNING OF COMPUTER STUDIES IN JUNIOR SECONDARY SCHOOLS IN NSUKKA LOCAL GOVERNMENT AREA OF ENUGU STATE.

INTRODUCTIONThe use of the electronic sophisticated and automatic machine called computer has justified the saying of our time that the world is global village. The computer make work done conveniently and faster, Adedapo (2010). Large volumes of data with the aid of  computers are processed automatically into information and distributed across the globe in few seconds. Individuals, organization and governments communicate with one another, transact business and share ideas without incur...

Save
OGIRI REUBEN Premium 60 PAGES (867 WORDS) Computer Science Seminar 600 Views
DEVELOPMENT OF A MOBILE HANDBOOK

ABSTRACTThe ability to send and receive information is a powerful tool, which can mar or make a situation. Its striking feature is timeliness, failure to send or retrieve information at a particular time, could render such information useless.  In a university community the use of mobile phones is common, this therefore forms the bases of the project which is aimed at developing a mobile application which helps students of the college to quickly access, process and send information. An e...

Save
Kasim Ridwan Premium 78 PAGES (14098 WORDS) Computer Science Project 369 Views
Design and implementation of a point of sales system

ABSTRACTThe global community especially the technologically advanced world is striving to attain what has been the global information age. It is an age that is envisaged to go beyond the use of computers as a mere tool for fast information processing, rather they will also become medium for processing and transferring such information from one location to another at equal fast rate. As a result, its appalling that sales in developing country like Nigeria have not been able to benefit much fro...

DESIGN AND IMPLEMENTATION OF COMPUTERIZED PHARMACY MANAGEMENT SYSTEM

TABLE OF CONTENT COVER PAGE CERTIFICATION ACKNOWLEDGMENT ABSTRACT TABLE OF CONTENT CHAPTER ONE INTRODUCTION 1 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY 1.2 STATEMENT OF THE PROBLEM 1.3 AIMS AND OBJECTIV...

DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACTNetwork Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language. For the first few decades of their existence, computer\ networks were primarily used b...

Save
Okafor Endurance Premium 48 PAGES (10256 WORDS) Computer Science Project 731 Views
SURVEY OF WIRELESS POWER TRANSFER TECHNIQUES IN CHARGING MOBILE DEVICES

ABSTRACTWireless power transmission is the transmission of electrical energy from one point to another without using any conductor or wire through vacuum or atmosphere. It is useful to transfer electrical energy to those places where it is hard to transmit energy using conventional wires. The advent of various wireless technologies have revolutionized the communication infrastructure and consequently changed the entire world into a global village. Use of wireless technology has also been made...

Java Ring Technology

AbstractA Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem´s Java Ring was introduced at their Java One Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor. Workstations at th...

Save
ERC RESOURCES Premium 24 PAGES (5939 WORDS) Computer Science Essay/Paper 449 Views
ANALYSIS OF ONLINE EXAMINATION REGISTRATION SYSTEM

ABSTRACTThe process of examination pre-registration is aimed to obtain accurate information on the intended candidates individually and collectively. These information are used to make a multitude of decisions such as the nature and structure of examination questions, categories and number of expected candidates, and other information which might be personal such as bio information. Unless a sufficiently accurate and efficient methods are used for  the data ...

Save
ERC RESOURCES Premium 27 PAGES (6258 WORDS) Computer Science Seminar 233 Views
DESIGN AND IMPLEMENTATION OF E-LEARNING SYSTEM

ABSTRACTThe project critically looks into the design and implementation of an e-Learning system for Lagos State Polytechnic, Nigeria. The project discussed various kinds of e-Learning platforms such as teleconferencing, virtual reality and video-conferencing. It also addresses the impact of resource materials on the design and implementation of e-Learning platform as well as the awareness creation of the technology. At the end, the system was able to complement the various activities in the t...

Save
ALAKETU OLAMILEKAN Premium 51 PAGES (7899 WORDS) Computer Science Project 708 Views
SEMINAR PRESENTATION ON CARNIVORE SOFTWARE

ABSTRACTA carnivore is controversial program that is developed by the Federal Bureau of Investigation in US (United State) by which they are able to access the email activities of the person suspected. It was the third generation software of online detection. The FBI (Federal Bureau of Investigation) uses to configure the hardware with IP (Internet Protocol) address of software through which carnivore captures packets from a particular location. A carnivore is used to work on a phenomena of s...

Save
ALAKETU OLAMILEKAN Premium 22 PAGES (5499 WORDS) Computer Science Seminar 581 Views

91 - 105 Of 514 Results