091-2230-8145     |      dataprojectng@gmail.com
1

1. AN ASSESSMENT OF FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY

Background of the Study

A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...

Read more

2. ASSESSMENT OF DESIGN AND IMPLEMENTATION OF DOCUMENT VERIFICATION SYSTEM FOR ONLINE STUDENT ADMISSION (A CASE STUDY OF UNIVERSITY OF UYO)

STATEMENT OF PROBLEM

The epidemic of fake admission is ravaging the Nigerian tertiary institution as victims to such fraud are often left frustrated. Students are sometimes offered fake admission with fake documentations from fraudulent persons posing as University Offi...

Read more

3. DESIGN AND IMPLEMENTATION OF ONLINE STUDENT ADMISSION AND DOCUMENT VERIFICATION SYSTEM (A CASE STUDY OF UNIVERSITY OF UYO)

ABSTRACT

Forgery has long crept into our educational system and, counterfeit and forged admission status / certificate and document have upper hand in various certificate and degrees awarding institution. Invalid studentship has become greater than valid studentship. Th...

Read more

4. design and implementation of drug verification system using gsm

ABSTRACT

          Establishing the authenticity of a product’s origin is a problem facing brand owners, merchants and consumers of products of all rang. Counterfeit, or “knock-off”, merchandise misleads...

Read more

5. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

6. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

7. IMPLEMENTATION OF ASSET AUDITING GUIDELINES IN FINANCIAL REPORTING OF TERTIARY EDUCATION INSTITUTIONS IN SOUTH-EAST NIGERIA

Background to the Study

Tertiary education institutions are institutions of higher learning where knowledge is imparted to its seekers and researches are undertaken in various fields of human endeavour. They are at the post-secondary level of the national education system, which inclu...

whatsapp