091-2230-8145     |      dataprojectng@gmail.com
1

1. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...

Read more

2. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...

Read more

3. AN EVALUATION OF AUDITING AND ITS IMPORTANCE IN THE AUTHENTICATION OF FINANCIAL STATEMENT OF BUSINESS ORGANISATION IN NIGERIA

BACKGROUND OF STUDY

The notion of auditing data dates back to ancient times, with the oldest signs of its existence discovered among major landowners of the Middle Ages in Italy and Egypt.

However, according to afounka (1993), statutory auditi...

Read more

4. MANAGEMENT AND USE OF LEGAL DEPOSIT MATERIALS BY LIBRARIES FOR EFFECTIVE USER SUPPORT IN THE NATIONAL LIBRARY OF NIGERIA

Background Of The Study

Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...

Read more

5. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

6. FINGERPRINT BASED STUDENT ATTENDANCE MONITORING SYSTEM

Background of the Study

Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...

Read more

7. DESIGN AND IMPLEMENTATION OF E-COMMERCE WEBSITE

OBJECTIVE OF THE STUDY

The aim of this study is to design and implement a database driven online virtual marketplace with a particular reference to Ogbete main market. The web based program developed in this research essentially provides all the necessary marketing serv...

Read more

8. AN ASSESSMENT OF FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

Background of the Study

A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...

Read more

9. A FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

 

Abstract

The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to  provide a platform that will allow the bankers to collect customers’ finger print,  provide a platform t...

Read more

10. DESIGN AND IMPLEMENTATION OF A TWO FACTOR AUTHENTICATION LOGIN SYSTEM USING ONE TIME PASSWORD (OTP) WITH SMS

ABSTRACT

The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...

Read more

11. DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

ABSTRACT

 

 In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the le...

Read more

12. COMPARATIVE PHARMACOGNOSTIC STUDIES OF THE LEAVES OF SOLANUM INCANUM LINN AND SOLANUM MELONGENA LINN (SOLANACEAE)

ABSTRACT

Solanum incanum Linn. and Solanum melongena Linn (Solanaceae) are both shrubs or trees found in the sub-Saharan Africa and the Middle East. Both are called „gauta‟ among the Hausa community of Northern Nigeria and „Tarku‟ among the Bura/Babar speaking people of Sout...

Read more

13. MEDICINAL PLANTS USED IN THE MANAGEMENT OF DEPRESSIVE ILLNESSES: ANTIDEPRESSANT ACTIVITY OF METHANOL STEM BARK EXTRACT OF ADANSONIA DIGITATA L. IN MICE

ABSTRACT

Depression is a heterogeneous mood disorder that has been treated with a number of synthetic drugs. These drugs have adverse effects and delayed onset of action that compromise their therapeutic benefits. This makes it worthwhile to search for new antidepressant agents with pro...

Read more

14. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

15. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

 

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...

16. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

17. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more

18. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...

Read more

19. Generic Metadata Handling in Scientific Data Life Cycles

Introduction

This chapter introduces the dissertation by describing its context, the identified challenges, how the chosen challenge was met, the achieved impact, relevant publications, and how the thesis is structured. 1.1 Context In science data is the essential focal point in todays...

Read more

20. Holmes: An Open-source Image Forensics Toolkit

ABSTRACT

 

Digital images continue to be ever-present in our daily lives as means of conveying information. With the availability of image editing software, now more than ever our ability to trust the images we see have been brought into question; the field of digital ima...

Read more

21. New Password Authenticated Key Exchange Based on the Ring Learning with Errors

Abstract

Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...

Read more

22. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

23. AN ASSESSMENT OF THE UTILIZATION OF DATAPROJECTNG PLATFORM AMONG POST-GRADUATE STUDENTS IN NIGERIA.

Background of the Study

Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...

Read more

24. DESIGN AND IMPLEMENTATION OF AN ONLINE AUCTION SYSTEM

Background of Study

Electronic commerce, also known as e-commerce, has developed rapidly in recent years. More and more and more consumers prefer to shop online for convenience and other benefits. E-commerce and auctions are also attracting attention. Many internet companies like eBay a...

Read more
whatsapp