ABSTRACT A significant part of Inventory Management is inventory monitoring. In recent years, many inventory management systems have been created. These frameworks allow stocks of products and items put away in amasses be taken up. It is important to track the inventory and that is where control systems for inventory come in. The inventory information management systems and inventory monitoring systems are coordinated and sent together at a fixed point at store locations in some of the curren...
ABSTRACT With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to this problem at hand, an uninformed person can have his private information endangered to getting exposed to other unknown persons. Such act is called “Sniffing” and mostly occurs on networks. By sniffing the...
ABSTRACT Monsters Within is a fun 3D FPS horror survival game on the Windows platform that demands its players to have fast reflexes, quick thinking and deductive skills to survive in the game environment they have been thrust into; distorted humanoid creatures have overrun the city and continue to rapidly multiply. The player’s main objective is to circumvent this by destroying all nests in the vicinity. The quantitative research methodology was used to analyse the feasibility for the succ...
ABSTRACT The proposed thesis is designed to be an online Baze University past question archiving system. The use of technologies has become critically important in the era of the Coronavirus pandemic which has required off-campus distance learning by students of Baze university. With no access to staff and on-campus facilities, the availability of easily accessible online study material has become critical. This project aims to provide students with the necessary materials needed to aid with ...
ABSTRACT Assistive technologies to aid the visually impaired have evolved over time from screenreading software, magnification programs and daisy book readers, there are a plethora of devices to aid the visually impaired in their daily activities. Despite the established utility of such devices they face certain limitations that have hindered their widespread adoption, such as cost, stigma attached to using the product in public, and lack of continued support for the product. In this time sma...
ABSTRACT Facial recognition plays a significant role in different applications such as human computer communication, video surveillance, face tracking and face recognition. Efficient face recognition algorithm is required to accomplish such task. Face recognition is one of the most active research areas in computer vision and pattern recognition with practical applications. In present networked world, the need to conserve the security of information is becoming both increasingly significant a...
ABSTRACT child daycare system is the care of a child during the day by a person other than the child’s legal guardian, basically performed by someone outside the child’s immediate family. it is typically ongoing for a specific period, such as parents work time. the system will be used to register a child, monitor and verify who drops and picks the child, log of child’s activity, parents/guardian details, parents will be able to update a child’s details (e.g. record allergy, drug admin...
ABSTRACT Online Social Networks (OSN) provides active space for digital human interaction and are used daily. Human engagement is reflected by exploiting the dynamics of OSN, where the fundamental problem is to infer future interactions on the network, called link prediction. Most studies have employed classical algorithms which consider node similarity but neglected the link analysis algorithms which consider topological structure. This study focused on the comparative study of predicting r...
ABSTRACT This study was carried out to determine the effect of learning objects in teaching and learning computer appreciation. The study was based on a mixed research design comprising quasi-experimental, descriptive survey, and interview using a focus group discussion guide. The area of the study is Enugu state. Data were collected from 66 students, 34 in the experimental group, 32 in the control group and 6 computer studies teachers. The Computer Appreciation Achievement Test (CAAT) was u...
ABSTRACT The major purpose of this study was to determine the teacher initiatives for utilizing ICTs in teaching and learning in Colleges of Education in Delta State. Four research questions were answered and four null hypotheses were tested at 0.05 level of significance. The population for the study consisted of 2035 made up of 610, 723 and 702 teaching staff from Federal College of Education (Technical), Asaba, College of Education, Agbor and College of Education, Warri respectively, the t...
ABSTRACT This study assessed the dimensions of e-learning programmes of Technical and Vocational Education and Training (TVET) in South East Universities of Nigeria. The study adopted a survey research design. The population for the study is comprised of 112 TVET lecturers in all the Federal and State Universities in the South-East Zone of Nigeria that offer TVET programme. Eight research questions and four hypotheses formulated to guide the study. A structured questionnaire titled extent of...
Abstract This work reports on the Web-based undergraduate mathematics tutor developed by the author for use by the undergraduates of the Computer science department in higher educational institution. It briefly analyses the traditional method of teaching undergraduates mathematics and uses ideas so gathered to design a new one. The new method allows students to learn mathematics interactively, and at their own pace via technologically-based system. Their understanding in mathematics will inc...
Teaching indigenous knowledge (IK) to African youth has become more complicated due to a variety of reasons such as urban migration, loss of interest in it, the dominance of scientific knowledge and the technological revolution. Therefore, there is a considerable movement towards using technologies to safeguard IK before it becomes obsolete. It is noteworthy that research conducted and software development perspectives being used are mainly based on Western worldviews that are inappropriate f...
Abstract Wide varieties of trading methods are rapidly being replaced by the use of computers and communications networks the world over. This new concept of trading is known as Electronic Commerce (e-commerce). Great potentials exist for saving costs and improving services by utilizing this technology. Examples of phenomenal successes and staggering cost savings are just too many. Profits in millions of dollars are mentioned with ease, as a result of applying e-commerce. It is apparent that...