Computer Science Research Papers/Topics

Midlands State University Skill Bundle System

ABSTRACT Midlands’s State University Skill Bundle is a system documented in this project file, which deals with the bundling of student with skills in one web application. Skill Bundle exist to take advantage of the skills in the university from all parts of world through faculties and departments for students to share resources and skills instead without the involvement of any kind of currency. This document explains that the system will offer users a form of digital currency or points fo...

Trevor Dollar Real Estate Android Application

ABSTRACT Trevor Dollar Real Estate Android Application is a mobile based software that helps people to sell or rent properties. The android application has a searching facility where people can search for a specific property utilizing different particulars, for example, that of value, location and so forth. Moreover the android application will send notifications of when a payment is expected and when there is another posting inside the firm. Aside from that the android application additional...

Training Time Scheduler For Zimasco Shurugwi And South Dyke Division

ABSTRACT ThebasisofthisprojectwastodevelopaTrainingtimeSchedulerforZimasco ShurugwiandSouthdykedivision(Trainingdepartment).Themainfocusofthe system istotrytocurbproblemsthatareassociatedwithschedulingofcourses, facilitatorsandvenuesthroughoutthewholeyear.Everyyearendthedepartment gathersnecessarytraining information from the training needsand begin the schedulingprocess.Thisisdoneonaspreadsheetonrowsandcolumns.Toderive anannualtrainingplanitdemandsadedicatedthreeweeks(workinghourbasis)at mos...

A Framework for Implementing Mobile Enterprise Resource Planning (m-ERP) System to improve healthcare services in Zimbabwe.

ABSTRACT This study sought to develop a framework for the implementation of mobile Enterprise Resource Planning (m-ERP) System to improve healthcare services in Zimbabwe: A case of Chitungwiza central hospital. Information was gathered using a case study research strategy accompanied with interviews, questionnaire, records review and observation approaches. In recent years, due to the development of cloud computing and portable devices, a new mobility era is starting. The popularity of smart...

Data Center Watchdog

ABSTRACT The past decade has been characterised by many firms migrating to clouding services which are powered by data centres. This led to a vast growth rate in the number of data centres in the world and as a result data centers became the most energy-consuming facilities. Researches conducted by different scholars reflected that these energy consumptions can be reduced by using free cooling in data centers and raising the data center operating temperatures but however both methods result ...

Arduino Based Infrared Intrusion Detection And Motion Sensor Device With Android App

ABSTRACT Intrusion detection is a series of processes which involves the detection, warning and notification of the arrival of an unwanted entity within the vicinity of installed sensors and the execution of necessary actions required to be performed so as to alert the members of the asset to be monitored and increase the security of the building simultaneously. The growth of intrusion detection systems is largely attributable to a decrease in costs plus enhancements to the technology in term...

Intelligent Zebra Crossing System

ABSTRACT The purpose of this study is to design an Intelligent Zebra Crossing system using Arduino. The main objective of the study is to manage and prioritise a smooth flow of the road users without causing any accidents at the zebra crossings, and to enforce the road rule to all those who have been vandalizing it. The system incorporates the concept of passive pedestrian detection to sense the presence of pedestrians and in turn automatically controls the traffic lights. It also makes use o...

An investigation into the use of computers by teachers in schools in Zaka District under Masvingo Province.

ABSTRACT The study sought to establish the use of computers by teachers in schools in Zaka District under Masvingo Province. The research would also find possible solutions to effective use of computers in schools by teachers. The study have adopted the descriptive survey design which permitted the researcher to use questionnaires, interviews and observation to collect data. The design assisted the researcher to find valuable knowledge about opinions, attitudes and practices in the use of com...

Ministry Of Women Affairs Gender Based Violence Monitoring System

ABSTRACT The purpose of the gender based violence monitoring system is to have accumulative statistics on the cases reported in each province for the purpose of eradicating the challenges which cause the gender based violence. The objectives of the system are that there should be easy allocation of officers to the relevant provinces and to provide the sufficient funding for each program. The data collected is then aggregated to sum up the totals per province and have a collective figure of a...

Zetdc Inspect To Connect Mobile Application

ABSTRACT The need to develop an Inspect to Connect Mobile Application (ZETDC ITC) was necessitated by the lack of a facility that was convenient in the operations of electrical inspection to the connection procedures. Clients had to incur expenses of travelling from one point to another for them to get inspection and connection services, despite having to travel long distances to ZETDC offices they also had to wait for hours in queues waiting to be attended to. Employees also ended up having...

A Unifying Domain-Specific Language To Abstract Containerization And Orchestration In Complex Applications

Abstract Application containerisation has been introduced to mitigate the discrepancies of the execution environment conguration and set up a complex application goes through from development to production, including other steps such as testing, staging, etc. Through an isolation mechanism, containers bundle into one package (binaries plus all their dependencies) the entire runtime environment required for an application or any of its components. Depending on the complexity of the adopted arc...

Security And Integrity Of Result Computations In Cloud Computing Environment

ABSTRACT There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of servicing consumers. The focus of this research is on the development of a proof-ofconcept system for security and integrity of result computations in a cloud computing environment by implementing a four level cloud based application security gateway methodology for r...

Electronic Stamp Duty Payment System

Abstract The purpose of this research was to develop a computerized process of applying for and paying for stamp duty. This is simply a change in the process of assessing, that is, knowing what you supposed to pay and for what instrument and actually paying for stamp duty. The study critically analyses the manual method of collecting stamp duty in Nigeria and uses ideas so gathered to design a new site (Electronic Stamp Duty Payment System) for use by the Tax Administrators in Federal Inland ...

Multicore Specification Generation System

ABSTRACT Performance analysis is the task of monitoring the behaviour of a program execution. The main goal is to find out the possible adjustments that might be done in order to improve the performance of the computer system in use. To be able to get that improvement, it is necessary to find the different causes/contributors of overhead. Today, we are already in the multicore era, but there is a gap between the level of development of the two main divisions of multicore technology (hardware ...

Comparison Of Gsm Promotion Subscribers’ Application Services

ABSTRACT The degree of confusion/illusion and domestic revenue wastages by GSM subscribers due to GSM promotional products increase annually. The GSM network operators are often ingenious and are typically motivated by money, anonymity or both. Due to the rising competition in the GSM promotion, network operators are becoming more collaborative, and as a result, more ingenious. Because of this, comparison of GSM promotion subscribers’ application services is required as an advisor to keep p...


511 - 525 Of 1654 Results