ABSTRACT A small and medium enterprise is a business started by few individuals on a small scale. An enterprise can be of any kind but this time we are dealing about Kagodo feeds limited meaning pigs. This kagodo feeds limited is located in Makindye along salama road. The project about monitoring and managing data in a small or medium enterprise setting Kagodo feeds limited as a case study. The technologies employed are selected according to availability and edse of use. This computerized sys...
ABSTRACT The study Online Hotel Reservation System is the design of an electronically driven system that will enable travelers to book hotel from anywhere in the world at their convenience. This is prompted by the fact that the cost of booking a hotel accommodation is becoming increasingly high with low information of where one can get a good hotel. The main objective in this study is to design a website that is user friendly, has a secured payment system and can provide information to custo...
ABSTRACT Implementing Distributed Database Management System is often difficult due to the disruption of highly coordinated, interdependent processes (e.g.) information exchange, communications, relationships) of providing care in Road Safety. Thus, this system creates and maintains all offender data electronically. The system captures accident victim data, vehicle registration, driving license, and offenders, at its source at the time of entry using a graphical user interface having touch s...
ABSTRACT Liberalization of Telecommunication Industry was established in 2001 by the Olusegun Obasanjo administration and since then, it is a common knowledge that Nigeria’s Tele-density have improved. However, it is the researcher’s intention to put this level of improvement in quantifiable terms vis-a-viz certain factors and distribution pattern. This study span for ten years [2001-2011] and four leading telecommunication firms were selected to represent the entire Telecommunication In...
ABSTRACT To Plagiarise is to include another person’s work, idea, method or results without due acknowledgement. In this work, we developed an innovative algorithm to detect external plagiarism in documents, using a combination of Word-n-gram and string matching technique. The suspicious document was split into sentences and further split into word n-gram and each n-gram was used to perform a pattern match on a standard PAN-09 corpora. We discovered that the best plagiarism detection occur...
ABSTRACT Like the developing and developed countries in the world, Bayelsa State has also embraced and is involved in the processing of various aspects of e-government, particularly in its ministries, agencies and departments.The study is based on jugdemental methodology in using to solve the thesis problem,whose objectives are to know the main obstacles in implementing e-government in Bayelsa State, to know which obstacle have the most effect in implementing e-government in Bayelsa State, a...
ABSTRACT This study focuses on a model for reengineering and optimization of legacy file database which are in decay and have faced mutilation in most institutions and organizations in Nigeria. The model provides a systematic method to optimize a legacy file using open source database management system software which transforms the optimized data into digital format which now can be migrated using a designed network platform on a fiber optics backbone. This study is therefore necessitated by...
ABSTRACT In Cloud Computing, users connect to the ’Cloud’, appearing as a single entity as opposed to multiple servers. This work seeks to solve resource managerial problems ranging from server maintenance cost, risk of loss of data, internal security issues, and availability of data for proper decision making. This work presents to tertiary institutions a model for designing a scalable and cost effective platform for institutional resource management on the cloud. The platform is called...
Abstract In urban transportation or freight distribution, the use of an initial distribution plan, although necessary, is by no means sufficient to address unexpected events such as mechanical failures, vehicle breakdown, total loss of transaction records that are likely to occur during delivery execution and may have adverse effects on system performance. These events cause deviations between the actual and desired state during the execution of the schedule or even after the schedule. Recen...
ABSTRACT Wireless Sensor Networks (WSNs) usually consist of sensor nodes and gateways with limited resources such as memory, power and size. As a result, WSNs require bandwidth-efficient, memory-efficient and energy-efficient application protocols for data transmission. If data transmission at the application layer is not efficient, more re-transmissions will occur across the network which consumes limited resources of the WSN. Therefore a careful and extensive performance evaluation is need...
ABSTRACT E-government is a kind of governmental administration which is based on electronic information technology. One of the key factors that realizes integration and information sharing to the inter-governmental administrations is the trust level. Information security contributes directly to the increased level of trust and confidence between the government departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. The main...
ABSTRACT National roaming is an important service that Facilitates can lead us to do the best utilization of available resources between different telecommunication providers in the same country. Vehicle tracking services are important for vehicle protection in different businesses. But this service is limited with the limitation of cellular coverage area especially in rural areas. As a result, the vehicle is disconnected from the tracking server until it enters an area where cellular covera...
Abstract Network security is becoming more crucial as the volume of data being exchanged on the internet. A more practical way to protect information is to alter it so that only an authorized receiver can understand it. Security of data and telecommunication can be done by a technique called cryptography. In this thesis Data Encryption Standard algorithm has been improved. Improved algorithm uses input data 512bit and key of 256bit length to encrypt the data. It uses S-boxes similar to those...
Abstract Development of students' performance is significant in educational environments because it plays an essential role in making the best quality graduates and post-graduates who will become great leaders in the future and sources of the workforce for the country. A recommendation system is an intelligent system that proposes different suggestions to students, based on the previous actions from other students who faces the same environment, such as academic performance. One of the m...
The growing complexity of modern software systems makes the prediction of performance a challenging activity. Many drawbacks incurred by using the traditional performance prediction techniques such as simulation, guessing, and depending on previous experience. Moreover, performance assessment and prediction is time consuming activity and may produce inaccurate results especially in complex and large scale software applications. To contribute to solving these problems, we adopt a model-ba...