1. A FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY
Abstract: The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform that will allow the bankers... Read More
2. AN EVALUATION OF AUDITING AND ITS IMPORTANCE IN THE AUTHENTICATION OF FINANCIAL STATEMENT OF BUSINESS ORGANISATION IN NIGERIA
ABSTRACT: In an attempt to analysis the importance attached to auditing as a tool for certifying the financial statement of business enterprise, the researcher had to be very briefly re-cap the origin of auditing and above all those factors that in the first inst... Read More
3. DESIGN AND IMPLEMENTATION OF DOCUMENT VERIFICATION SYSTEM FOR ONLINE STUDENT ADMISSION
INTRODUCTION: There are many different ways to define a system, but one method that may be understood literally in the context of computers is as a collection of the many pieces of hardware and software that make up a computer. According to Byron (2021), a system... Read More
4. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPANY PLC LAGOS)
ABSTRACT: In light of the expeditious advancement in Computer Technology, a multitude of organisations have wholeheartedly embraced the utilisation of computer resources within their operational framework, thereby facilitating the attainment of their predetermined objectives. Ele... Read More
5. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATABASE SYSTEM
INTRODUCTION: Historically, ensuring security mostly involved employing rudimentary measures such as securing physical access through door locks or safeguarding sensitive documents within secured filing cabinets or safes. In contemporary times, paper h... Read More
6. FINGERPRINT BASED STUDENT ATTENDANCE MONITORING SYSTEM
Background of the Study: Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in classes,... Read More
7. IMPACT OF SOCIAL MEDIA TRENDS ON THE BEHAVIORAL PATTERN OF YOUTHS
Background of the study: Social media is the integration of digital media, which includes combinations of electronic text, graphics, moving pictures and sounds in a structured computerized environment that allows users to interact with the data for appropriate pu... Read More
8. EFFECT OF AUTOMATED TELLER MACHINE ON THE PERFORMANCE OF NIGERIAN BANKS
Background of the Study: In today’s business world, globalization and international experience has become critically important. Banking industries can no longer get away with operating loosely connected groups of businesses that happen to be located around the world, but mu... Read More
9. THE IMPACT OF PRIVATIZATION ON THE ECONOMY DEVELOPMENT
CHAPTER ONE
INTRODUCTION
BACKGROUND OF THE STUDY: In the era of post colonialism, Nigeria has at one time or another, embarked upon certain policies that have political economic implications. For instance, from 1960 to date, N... Read More
10. COMPARATIVE STUDY OF DRAFTING STYLES OF THE UNITED NATIONS (UN) AND EUROPEAN UNION (EU)
ABSTRACT: This study was one of the aspects of law that is had relatively few literature. This was a problem for the researcher and this made it difficult for many researchers and drafters to have uniform standards on legislative drafti... Read More
11. BIOMETRIC AUTHENTICATION OF AN AUTOMATED TELLER MACHINE USING FINGER PRINT AND PASSWORD
BIOMETRIC AUTHENTICATION OF AN AUTOMATED TELLER MACHINE USING FINGER PRINT AND PASSWORD
-
Click on the download button
-
Make payment using your card
-
You will automatically download a document co... Read More
12. FINGERPRINT BIOMETRICS ATTENDANCE SYSTEM
Background to the project: While not prehistoric, biometrics have been around for thousands of years. Biometrics have progressed from crude means of categorization to being authenticators of identification employing a variety of modalities throughout the previous few millennia. S... Read More
13. DESIGN AND IMPLEMENTATION OF AN ONLINE AUCTION SYSTEM
Background of Study
Electronic commerce, also known as e-commerce, has developed rapidly in recent years. More and more and more consumers prefer to shop online for convenience and other benefits. E-commerce and auctions are also attracting attention. Many internet companies like eBay a... Read More
14. COMPARATIVE PHARMACOGNOSTIC STUDIES OF THE LEAVES OF SOLANUM INCANUM LINN AND SOLANUM MELONGENA LINN (SOLANACEAE)
ABSTRACT
Solanum incanum Linn. and Solanum melongena Linn (Solanaceae) are both shrubs or trees found in the sub-Saharan Africa and the Middle East. Both are called „gauta‟ among the Hausa community of Northern Nigeria and „Tarku‟ among the Bura/Babar speaking people of Sout... Read More
15. DEVELOPMENT OF A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE IN DISCRETE ORTHONORMAL STOCKWELL TRANSFORM DOMAIN BASED ON PHOTON POLARIZATION
ABSTRACT
This thesis presents the development of novel digital image watermarking technique for the shielding of intellectual property rights of digital images. Because of their digital nature, multimedia data can be duplicated, modified, and transformed. In this context, it is essentia... Read More
16. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of... Read More
17. DEVELOPMENT OF A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE IN DISCRETE ORTHONORMAL STOCKWELL TRANSFORM DOMAIN BASED ON PHOTON POLARIZATION
ABSTRACT
This thesis presents the development of novel digital image watermarking technique for the shielding of intellectual property rights of digital images. Because of their digital nature, multimedia data can be duplicated, modified, and transformed. In this context, it is essentia... Read More
18. DEVELOPMENT OF BIOMETRIC FACIAL RECOGNITION SYSTEM
ABSTRACT
This study demonstrates the development of a biometric facial recognition system that is intended to optimise user authentication processes and improve security. Due to its high accuracy and non-invasive nature, face recognition has become a po... Read More