Call us Now for Inquiries on 08168759420 and 08068231953

DESIGN AND IMPLEMENTATION OF AN ON-LINE VEHICLE REGISTRATION(A CASE STUDY OF MOTOR LICENSING OFFICE, ENUGU SOUTH)

ABSTRACT

 

Today, computer has been discovered as a very efficient instrument which ahs played a very significant role in adequate management of information. Beside, it has played more roles in government services and operation especially in all traffic matters in the country.

However, computerization has helped in many areas of life and due to indispensability of motor vehicle registration as it concerns the government and vehicle owners, the thought of computerization of this operation become of great important in orders to wipe out the manual data processing system from which many problem have emanated.

The problems which have engulfed the objective of motor vehicles registration and extensively discussed in this project together with the new method which was innovated.

This work is conducted towards the computerization of the various problems progressing data in order to identify the various problems that is been encountered in the registration of vehicles manually. This theory also compares the existing system with the new system which is exact and a faster way of processing data and the problem faced by customers when they are registering their vehicles.

This work concludes with the implementation, programming, test run, change over progress of the new system.

TABLE OF CONTENTS

 

Title page

Certification

Acknowledgment

Abstract

Table of Contents

 

CHAPTER ONE: INTRODUCTION

1.1     Statement of Problem

1.2     Purpose of Study

1.3     Aims and Objectives of the Study

1.4     Scope of Study

1.5     Limitation of Study

1.6     Assumption

1.7            Definition of Terms

 

 

CHAPTER TWO: LITERATURE REVIEW

 

CHAPTER THREE: DESCRIPTION OF THE EXISTING SYSTEM

3.1            Fact Finding Method

3.2            Organizational Structure of Motor Licensing Office Enugu

3.3            Objective of the Existing System

3.4            Input, Process, Output Analysis

3.5            Information Flow Diagram

3.6            Problem of the Existing System

3.7            Justification of the New System

 

CHAPTER FOUR: DESIGN OF THE NEW SYSTEM

4.1            Output Specification

4.2            Input Specification and Design

4.3            File Design

4.4            Procedure Chart

 

 

CHAPTER FIVE: IMPLEMENTATION

Program Design

Pseudo Code

Source Program

Test Run

 

CHAPTER SIX: DOCUMENTATION

 

CHAPTER SEVEN:

Recommendation and Conclusion

References

Appendix

 

 

 

CHAPTER ONE

 

INTRODUCTION

          Computer plays vital role in the development of any company it also saves some of its complex problem that is been faced by man and processes voluminous data within a short period of time or at a fantastic speed.

Recent emphasis on information and data processing in most of our business has grown adversely as in the case of motor vehicle registration. In as much as motor vehicle registration has been in existent for ages now, the old system of registration has been in adoption which did not play a significant role on highway safety until the development of the new system of vehicle registration where a reflective sheeting which is more visible to read even in the dark.

This new system of motor vehicle registration which is the main focus of this project came into existent on the 19th March 1997 and handled by the motor licensing officer. It introduced to enforce strict compliance to traffic rules and regulation as well as providing a proper data as to the behaviour of road users. The roles which the introduction of computer system will play in the function in order to bring about more efficiency, effectiveness and improve competence and discussed in this project. This work is segmented into chapters which will be seen as we move on.

Motor vehicle registration is done by two offices, namely local government licensing offices for personal vehicles and the cabinet office or any military office. Since motor vehicle registration is absolutely essential traffic matters, it is vital to establish and sustain an information system using a reliable device like computer system in order to maintain and provide proper data/record concerning the road users in the aspect of traffic function.

In order to eliminate most hardship encountered in most of our licensing offices, the need for computerization with designing and implementation of a state motor vehicle registration and its advantages to the licensing office.

 

STATEMENT OF PROBLEM

These are the problems that are being encountered in the manual system of vehicle registration. And the problems goes thus:

(i)      PARTICIPATION OF UNAUTHORIZED OFFICERS

Unauthorized offices according to my observation are involved in this work especially in the registration of illegal vehicles which can encourage fraud.

 

(ii)     WRONG CHARGING OF FEES

The officer in-charge is bound to charge a wrong bill to vehicle owners which may be as a result of underassessment or over assessment of vehicles. This could be with motive to commit fraud or as a result of mistake on the part of the officer at work.

(iii)    WRONG SALES ALLOCATION

Staff under a particular state motor vehicle licensing office indulge in registering of vehicles that does not belong to their state.

(iv)    IMPROPER ACCOUNTING

There is the tendency of the cashier involved in the handling of income generated to make mistake during this process, thus having some measures of inaccuracy in the work.

(v)     There is difficulty at times in tracing a record/information cautioning a vehicle owner due to improper information keeping as a result of carelessness or volume in the size of record kept.

 

1.2     PURPOSE OF STUDY

          The purpose of this study is to design and implement a state motor vehicle registration since it is important in providing sanity on roads and yielding revenue for the government. In as much as this problems still exists in the manual operation, we intend to carve out a technique which will serve as means of providing solution to the problems

 

1.3     AIMS AND OBJECTIVES OF THE STUDY

As we have seen from the statement of the problems, the things that stands as puzzle in the manual system of motor vehicle registration aims at introducing a better system which is the computerized system which will contribute on providing solution to the problems.

 

 

i.        AUTOMATIC ASSIGNING OF FEES

Since each vehicle is charged based on the amount was bought. This work aims at automatic assigning of correct amount once the above mentioned assessment is done thus preventing the error of wrong assessment.

ii.       PROPER ACCOUNTING

This also aims at giving an up-to-date report of the revenue generate from vehicle registration within a defined period.

iii.      RESTRICTION OF ILLEGAL ACCESS

The told number of users that will have access to this program will be limited therefore password will be created for the application software. This password will just be limited to the officer in charge of the work.

iv.      EASY RETRIEVAL OF INFORMATION

This work will help on using the registration of a particular vehicle to call up the information record concerning the owner of the vehicle.

 

 

 

1.4     SCOPE OF STUDY

          Motor vehicle registration since it is two different offices namely local government motor licensing office and cabinet office, and having used motor licensing office Enugu South as my case study which is only involves in registering of personal vehicle just like any other local government. Motor licensing office (L.G.M.L.D) I limited my studies to private vehicles within Enugu.

 

1.5     FINANCE

In as much as I have so many areas where one could have covered for a wider generalization of result some factors ahs posed as an obstacle to this. And some of these constraints are as follows.

i.        FINANCE

This contributed in limiting my work since there is money involvement in moving to and fro to gather facts for this work.

ii.       TIME

As students whoa re probably involved in school work like writing of assignment quizzes and other engagement, there is a limited time between this time of approval and submission, thus there isn’t enough room for further research.

iii.      DIFFERENT REGISTRATION POINTS

This is another factor that contributed in limitation of this my work to just private vehicles since government vehicles are registered at cabinet which is not part of my work.

 

1.6     ASSUMPTION

I will assume that the company will like the new system to be introduced. I also assumed that they will have money to finance the new introduced system.

I assume that the office will employ or even their literate employees that will act as programmers, analyst for maintaining the system.

I also believe that the facts and observation got from the office are all reliable for the study to be a very successful one.

 

 

 

1.7     DEFINITION OF TERMS

SOFTWARE: This is a set or series of instruction which is arranged in a sequence written for the computer, machine to carryout, in order for a task which is a solution to a problem to be done.

COMPUTERIZATION: Introduction of the use of computer in an application area by writing a program that will suit the work.

VEHICLE: A mechanically propelled and wheeled object used for conveyance.

HARDWARE: This is the physical components of a computer machine which can be seen and touched.

M.L.O: This stands for motor licensing office.

M.L.A.: This stands for motor Licensing authorities.

PASSWORD: This is a device used to a program or system in order to deny access to it.

PROCESSING: This is the operation whereby the computer is carrying out order for a task to be performed.

OUTPUT: This is the result or information that is gotten after the computer has conducted a particular task.

INPUT: This is the data or instruction needed for the computer to work on or carryout a task.

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

 

Tags: ,

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF A COMPUTER BASED PHARMACEUTICAL CENTRE (A CASE STUDY OF OSCO PHARMACEUTICAL CENTRE WARRI, DELTA STATE)

ABSTRACT

 

The need to develop a system that would improve the management of stocked pharmaceutical items in the pharmacy became beatable due to some set backs experienced by the current operations of pharmaceutical establishment.

The information got from the staff of the pharmacy and head of Osco pharmaceutical centre, Warri, Delta State, has been most useful in developing a program that would achieve the aim of this project.

This project would be useful to both large and small pharmacy establishments and other private business that deals with managing stock items.

 

 

 

 

 

 

 

 

TABLE OF CONTENTS

 

Title page

Dedication

Acknowledgement

Abstract

Tables of contents

List of table, List of figures

Table of symbols

 

CHAPTER ONE

1.1    Aim of pharmacy stock control

1.2           Scope of study

1.3           Objective

1.4           Statements of the problems

1.5           Assumptions

1.6           Definition of terms

 

CHAPTER TWO

Literature Review: Non- Computer approach based stock control

2.2        Computer as aid to stock control system

 

CHAPTER THREE

3.1    System Analysis

3.2    Why stock control

3.3    Manual Approach to stock control

3.4    Manual ordering of goods

3.5    Flowchart of the manual ordering of goods

3.6    Placing an order and values of goods manually

3.7    Flowcharts of placing an order and sales of goods

3.8    How goods are received into store

3.9    Flowchart of how goods are received in store

3.10  Weakness of existing system

Organisation  chart

 

 

CHAPTER FOUR

4.1    System design

4.2    The input system

4.3    The processing system

4.4    The description and organisation

4.5           Physical data mode

 

CHAPTER FIVE

System Implementation

4.1    Menu processing

4.2    File maintenance

4.3    Transactions

4.4           Reports

 

CHAPTER SIX

Documentation

 

CHAPTER SEVEN

Recommendation and Conclusion

INTRODUCTION

 

          This project is based on the pharmacy control of private practitioners. Pharmacy is an establishment, which takes the responsibility of manufacturing and trading drugs and medical related products. The designing and implementation of a computerized pharmacy stock control involves a critical analysis of the existing system, discover where the problems is.

The aim of any study is to design a system, which keeps and controls the movement of stocked items in the pharmacy. The system produces various reports of the information of stocked-items, the suppliers and various dispensaries.

However procedures towards achieving the aim are not with free especially the hierarchical analysis. To be able to manage information adequately does not imply that they are efficient. The centre of interest would be surrounded by the computerized according system full of tediousness in their prolonged procedure in coveting raw date into human and material resources. Time is also lavished. Notwithstanding, the results of this processing are hardly reliable sometimes due to possible errors, which sets in a result of human nature of inconsistency.

The problem also extends to storage and retrieved. From the research done about the problem, it has been found that the manual problems and obstacles could be totally eliminated or at least reduced to a very large extent by using a well designed modern system such as computer. With computer programmes, this elongated procedure could be automated to avoid duplication and redundancy.

 

 

 

 

 

 

 

 

 

 

CHAPTER ONE

 

1.1    AIM OF PHARMACY STOCK CONTROL

          In any single country, the pharmaceutical industry operates in a multifaceted and highly intricate environment, which becomes extremely complex when viewed in an international context. This highly involved operating environment has in itself created some of the misunderstandings, misconceptions of the pharmaceutical industry and its activities and has precipitated many enquires into the operations of the industry.

To computerize the present and to plan adequately for the future, it is “Sina qua non” to know how the industry involved and the complex interrelated environments within which the industry currently operates and trends of these environment. This study, which is necessary, has a historical and morphological analysis to support the evaluation.

Almost all the industries depend on plant, animals and internals for raw material. The pharmaceutical industry today uses in addition synthesized chemicals from natural occurring product as well as completely synthetic product as a basic of producing ingredient that will be computerized for a better active production.

Performance in growth vectors is extremely difficult to measure since few comparies produces growth and profitability data for public consumption because those few comparies are good quality drugs which has price controls, direct and costly consumer promotions and long product.

Firms diversify when their objectives can no longer be met within the product. This project or work is basically defensive and designed to avoid declares in demand, competitive pressures and product the obsolesce.

 

1.2    SCOPE OF STUDY

The scope of this stuffy gives an overview of the role of pharmaceutical industries to the community and to the needy. We therefore intend to carry out a library method and focus interview on pharmaceutical industries and area managers of pharmaceutical industries.

 

 

 

1.3    OBJECTIVES

Pharmacy stock control helps in the development of pharmaceutical industries and to their customers but to what extent. We are therefore going to make people understand the importance of computerized pharmacy stock control. This study will also contribute to the improvement of the pharmaceutical industries.

I shall be able to arrive at a definite and concise conclusion about the importance of pharmacy stock control. To pharmaceutical industries and to consumer.  We shall also see how pharmaceutical industries produce active and good quality drugs, which has control without much stress and mistakes.

 

1.4    STATEMENT OF THE PROBLEMS

          After the description of the manual system the following problem areas were discovered which has been remedied in the computerized system.

a.       Item location

b.      Check for expired items

c.       Re-ordering level

d.      Fraud by employee

ITEM LOCATION:   As a result of the large quality of stock items involved. It is difficult to locate items in the store needed for patients and customers.

CHECK FOR EXPIRED ITEMS:       Due to the fact that tracks of the expired date of items are not kept, expired items are occasionally dispatched to the dispensary unity and to patients.

RE-ORDERING LEVEL:  In most vases, it is when a item is needed by patients or customers that the management realize it is out of stock.

FRAUD BY EMPLOYEE:         It was noticed that some of the staff of the pharmacy take away items from the store illegally, thereby hindering the profit of the establishment.

 

1.5    ASSUMPTIONS

During the process of the study I assumed that the workers are computer literature. I also assume that they are using stock control system that is not computerized. There is also this assumption in me that they have not started implementing computerized stock control system.

My assumption includes that they are aware of software on stock control system but they have not used it.

 

1.6    DEFINITION OF TERMS

In a write up like this there are going to be some definitions of terms. The terms considered important to explain because it with make it easy for other people who are not in this field used in this project. They are the following.

Computer:         An electronic device capable of accepting data as input and proves it to give the information as an output.

Program:  A list of instruction that tells the computer what to do.

Data:         The basic facts on which computer process is performed. It is also a raw fact in which an information can be derived form after processing by a computer.

File: A collection of related records stored in a specified sequence.

Record:     It is a data structure that contains a number of related fields in a predefined fixed order where each field has a distinct identifies and contains an item of information of a predefined type.

Input:        Data supplied to the computer

Output:     Result of processed date

Flowchart:         This is a diagrammatic representation of the steps required solving a problem.

System:     This is a group of inter related, inter connecting activities that work together to achieve a specific objectives.

Storage Device:          This is a device used for storage

Application Program:         This is a program, which proves data for a particular function e.g. pay roll sales, ledger etc.     

Audit Trail:        A visible means of backing items of data from output to the original source date and vice-versa.

Directory:           A list of the content of a program library or the files contained on a magnetic disk, floppy disk or hard disk.

Check Digit:      An additional digit included in a code number, which provides a means of checking for errors in that code.

Compatibility:   The ability of a computer to handle  the file devices and program of another computer installation  is different platforms.

Hard Copy:        A printed record of computer based information oir output.

Hard wares:       All the part of a computer components system that is visible to the eye and can be touched.

Soft ware: These are written programs that enable the computer to work. It can also be defined as the component of the computer system that one cannot see a touch.

Implementation:         The stage in system development in which there is putting into practice the design so developed to work in an organization.

Input-Output control:          It is a control that reconciles input and output to establish accuracy of processing.

Real-Time system:     An on line system in which transaction updates the relevant master file as it entered.

Record Account:        It is a control total produced by a computer program of a number of records processed during a given run.

Retail:       This is the process of selling commodities in small quantities directly to the ultimate consumers.

Wholesale:         The act of buying and selling of commodities in large quantities usually for re-sale or by retail.

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

 

 

Tags: ,

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF COMPUTERIZED DATA ENCRYPTION AND DECRYPTION SYSTEM

ABSTRACT

The use of manual system of data encryption and decryption has a damaging implication resultant on the images in some companies and the negative impact this trend has had on the users of such system. Much resource is lost annually by firms due to the uncontrolled and unscientific nature of this system.

In this traditional system, to guarantee privacy of information / communications between any two subscribes in a network consisting of 1000 members, 499,500 secret keys would be necessary, one for each possible combination of sender and receivers. Keys have been distributed by a secure channel such as a trusted courier with an attached case manual led to a wrist, a costly and time consuming method.

This particular project is set to appraise already existing system by designing a better one which will facilitate the level of satisfaction and competence in the challenges in information technology.

 

 

CHAPTER ONE

INTRODUCTION

 

 

The ongoing dilemma of digital age is balancing convenience against security. Security is a system of safeguards for protecting information technology against disasters, system failure, and unauthorized access that can result in damage or loss. There are several reports of the spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data.  These have posed greater challenges on people who use database, transact online and internet users.

This project work is design to embark on a security mechanism using computerized data encryption and decryption system to resolve this problem.

Data encryption is the process of altering readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are virtually impossible to break. As one article point out,  it is  easy to encrypt a message on a simple pc so that the biggest computer in the world couldn’t decipher it without spending far more time on the problem that exists in the life span of the entire universe.

 

 

 

There are two basic form of encryption      

Private Key and public key

Private key: Private key (symmetric) encryption means that the same secret key is used by sender and receiver to encrypt and decrypt a message. The encryption system (for “Data Encryption Standard”) was adopted as a federal standard for private key encryption in 1976.

Public key: Public key encryption means that two keys used a public key, which the receiver has made known before hand to the sender who uses it to encrypt message, and a private key, which only the receiver knows and

 

1.1                                STATEMENT OF PROBLEM

          Most networks or organizations database inclined. For effective and conducive working atmosphere, their data must be safeguarded to a reasonable extent. Data should be protected from unauthorized alteration.

The manual method of ensuring orderliness of movement of goods and information within the firm waste time, consume large resource, high man-power utilization and slow decision support. The result achieved is redundant, inaccurate and les satisfactory.

The use of a computerized system has shown a complete balance for a security management in our contemporary age.

 

 

 

1.2                AIMS AND OBJECTIVE

The aims and objectives of this study are as follows:

–          To reduce stress, time consumption and cost of operation involved in the manual system.

–          To design a system to restrict unauthorized access to its data usage.

–          To appraise the standard of computer programming to greater height of sophisticated and general comprehensibility.

–          To suggest security techniques which can create conducive working atmosphere for organizations who are having   data threatened.

 

1.3                PURPOSE OF THE STUDY

This project work is aimed at:

–          Investigating into the old system procedures and specifications so as to appreciate their problem routines and finally design automated system.

–          Improving the response time and main output requirement in the security

–          Management.

–          Conversion of all the various system specifications obtained during the period of investigation and analysis into series of instructions that can be carried out by the system.

–          Preparing gross estimation of probable overall and direct benefit for each possible alternatives.

–          Documenting the feasibility study in a report for users and system management.

 

1.4               SIGNIFICANT OF STUDY

The significant of this project work is to, solve the problem, the world are facing in the manual system of data encryption and decryption.

It is also to serve as an area of reference for future project work for people intending to write on a related scope of study.

To introduce the larger society the service of the computer thereby giving for more efficient and effective data encryption and decryption system.

 

1.5       SCOPE/ DELIMITATION

This particular work is limited to the following:

–          Data encryption.

–          Data decryption.

–          Visual basic design.

–          Window platform.

 

1.6         LIMITATION/ CONSTRAINTS

During the study, I was confronted with a lot of constraints that inadvertently posed some sort of inconvenience on me during the project work.

I was financially incapacitated, time, poor response and inadequate of pre-existing literature on data encryption and decryption.

 

1.7         ASSUMPTIONS

It is assumed that encryption is done at the transmitter ie the while decryption is done at the individual receiver.

The program is in a window platform.

1.8                   DEFINITION OF TERMS

Encryption is the processing of altering readable data to unreadable form to prevent unauthorized access.

Decryption is the act of altering the unreadable form so that you can have access to the data using the correct procedure.

Data is unprocessed information which cannot be used for decision making.

Security is the process or system of safeguarding or protecting information technology against disaster, system failures, and unauthorized access that can result in damage or loss.

Manual system ÷ manual system is an old method and procedure of using human physical capabilities to achieve result.

Information – This is the meaningful processed data that an individual can gain knowledge for the purpose of making a decision.

Design – is the structuring construct of a system.

Implementation ÷ Implementation consist of detailed time table (using scientific aids), details conversion procedures and changeover procedure, including system testing.

 

 

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF COMPUTERIZED DATA ENCRYPTION AND DECRYPTION SYSTEM.

ABSTRACT

The use of manual system of data encryption and decryption has a damaging implication resultant on the images in some companies and the negative impact this trend has had on the users of such system. Much resource is lost annually by firms due to the uncontrolled and unscientific nature of this system.

In this traditional system, to guarantee privacy of information / communications between any two subscribes in a network consisting of 1000 members, 499,500 secret keys would be necessary, one for each possible combination of sender and receivers. Keys have been distributed by a secure channel such as a trusted courier with an attached case manual led to a wrist, a costly and time consuming method.

This particular project is set to appraise already existing system by designing a better one which will facilitate the level of satisfaction and competence in the challenges in information technology.

 

 

CHAPTER ONE

INTRODUCTION

 

 

The ongoing dilemma of digital age is balancing convenience against security. Security is a system of safeguards for protecting information technology against disasters, system failure, and unauthorized access that can result in damage or loss. There are several reports of the spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data.  These have posed greater challenges on people who use database, transact online and internet users.

This project work is design to embark on a security mechanism using computerized data encryption and decryption system to resolve this problem.

Data encryption is the process of altering readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are virtually impossible to break. As one article point out,  it is  easy to encrypt a message on a simple pc so that the biggest computer in the world couldn’t decipher it without spending far more time on the problem that exists in the life span of the entire universe.

 

 

 

There are two basic form of encryption      

Private Key and public key

Private key: Private key (symmetric) encryption means that the same secret key is used by sender and receiver to encrypt and decrypt a message. The encryption system (for “Data Encryption Standard”) was adopted as a federal standard for private key encryption in 1976.

Public key: Public key encryption means that two keys used a public key, which the receiver has made known before hand to the sender who uses it to encrypt message, and a private key, which only the receiver knows and

 

1.1                                STATEMENT OF PROBLEM

          Most networks or organizations database inclined. For effective and conducive working atmosphere, their data must be safeguarded to a reasonable extent. Data should be protected from unauthorized alteration.

The manual method of ensuring orderliness of movement of goods and information within the firm waste time, consume large resource, high man-power utilization and slow decision support. The result achieved is redundant, inaccurate and les satisfactory.

The use of a computerized system has shown a complete balance for a security management in our contemporary age.

 

 

 

1.2                AIMS AND OBJECTIVE

The aims and objectives of this study are as follows:

–          To reduce stress, time consumption and cost of operation involved in the manual system.

–          To design a system to restrict unauthorized access to its data usage.

–          To appraise the standard of computer programming to greater height of sophisticated and general comprehensibility.

–          To suggest security techniques which can create conducive working atmosphere for organizations who are having   data threatened.

 

1.3                PURPOSE OF THE STUDY

This project work is aimed at:

–          Investigating into the old system procedures and specifications so as to appreciate their problem routines and finally design automated system.

–          Improving the response time and main output requirement in the security

–          Management.

–          Conversion of all the various system specifications obtained during the period of investigation and analysis into series of instructions that can be carried out by the system.

–          Preparing gross estimation of probable overall and direct benefit for each possible alternatives.

–          Documenting the feasibility study in a report for users and system management.

 

1.4               SIGNIFICANT OF STUDY

The significant of this project work is to, solve the problem, the world are facing in the manual system of data encryption and decryption.

It is also to serve as an area of reference for future project work for people intending to write on a related scope of study.

To introduce the larger society the service of the computer thereby giving for more efficient and effective data encryption and decryption system.

 

1.5       SCOPE/ DELIMITATION

This particular work is limited to the following:

–          Data encryption.

–          Data decryption.

–          Visual basic design.

–          Window platform.

 

1.6         LIMITATION/ CONSTRAINTS

During the study, I was confronted with a lot of constraints that inadvertently posed some sort of inconvenience on me during the project work.

I was financially incapacitated, time, poor response and inadequate of pre-existing literature on data encryption and decryption.

 

1.7         ASSUMPTIONS

It is assumed that encryption is done at the transmitter ie the while decryption is done at the individual receiver.

The program is in a window platform.

1.8                   DEFINITION OF TERMS

Encryption is the processing of altering readable data to unreadable form to prevent unauthorized access.

Decryption is the act of altering the unreadable form so that you can have access to the data using the correct procedure.

Data is unprocessed information which cannot be used for decision making.

Security is the process or system of safeguarding or protecting information technology against disaster, system failures, and unauthorized access that can result in damage or loss.

Manual system ÷ manual system is an old method and procedure of using human physical capabilities to achieve result.

Information – This is the meaningful processed data that an individual can gain knowledge for the purpose of making a decision.

Design – is the structuring construct of a system.

Implementation ÷ Implementation consist of detailed time table (using scientific aids), details conversion procedures and changeover procedure, including system testing.

 

 

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND SIMULATION OF A BILLING SYSTEM FOR GSM OPERATOR

ABSTRACT

The application of computer in various fields has eased a lot of problems encountered in the use of manual system in the various disciplines of life, including productions. In terms of billing system for GSM operators.

It is as measure towards addressing this issue that this project is primarily designed to come out with the automated billing system that will get rid of all the shortfalls.

In this project, the researcher have analyzed the manual system and also identified some of the problems and limitation, which seems to hinder the realization of the goals of the existing system.

With regard to this, the researcher has designed a billing system to help in minimizing some of the problems inherent in the manual system. To bring the subject matter to pictorial form for the user to appreciate more, flowchart and flow diagrams are to be seen in sequent chapters.

More so, this write-up is mainly to introduce the reader to what main frame can do especially in telephone billing system using Vmobile Nigeria PLC, as a case study.

ORGANIZATION OF WORK

It is a measure towards addressing this situation that this project is primarily designed to come out an automated GSM billing system that get rid of all the shortfalls. On the former billing system.

The project is made up of seven chapters. Chapter one deals with introduction, the statement of the problem, purpose of study, aims and objectives, scope of study, limitation, assumption and definition of terms. Chapter two describes how to review the related literature. The third chapter discusses the description and analysis of the existing system, its methods encountered and their objective etc. chapter four explains the design of the new system and its specification etc. chapter five explains the method of system implementation. Chapter six discusses the Documentation of the system. Chapter seven is the recommendation and conclusion.

TABLE OF CONTENTS

TITLE

CERTIFICATION

DEDICATION

ACKNOWLEDGE

ABSTRACT

ORGANIZATION OF WORK

TABLE OF CONTENTS

CHAPTER ONE

1.0     INTRODUCTION                                                                            1

1.1     STATEMENT OF THE PROBLEM                                                 2

1.2     PURPOSE OF STUDY                                                                              3

1.3     AIMS AND OBJECTIVES                                                               4

1.4     SCOPE OF STUDY                                                                         5

1.5     LIMITATIONS                                                                                 5

1.6     ASSUMPTION                                                                                 6

1.7            DEFINITION                                                                                    7

 

CHAPTER TWO                                                                                     

2.0     LITERATURE REVIEW                                                                  10

 

 

CHAPTER THREE                                                                                 

3.0     DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM                   19

3.1     FACT FINDING AND METHOD USED                                         19

3.2     ORGANIZATIONAL STRUCTURE                                                         21

3.3     OBJECTIVE OF THE EXISTING SYSTEM                                   23

3.4     INPUT, PROCESS, OUTPUT ANALYSIS                                               23

3.5     INFORMATION FLOW PROCESS                                                          24

3.6     INFORMATION FLOW DIAGRAM                                                         26

3.7     PROBLEMS OF THE EXISTING SYSTEM                                   26

3.8     JUSTIFICATION FOR A NEW SYSTEM                                                27

 

 

CHAPTER FOUR       

4.0     DESIGN OF THE NEW SYSTEM                                                   31

4.1     OUTPUT SPECIFICATION AND DESIGN                                    32

4.2     INPUT SPECIFICATION AND DESIGN                                        33

4.3     FILE DESIGN                                                                                  34

4.4     METHOD OF ACCESSING FILES                                                           35

4.5     SYSTEM REQUIREMENT                                                             35

4.6     PROGRAM FLOWCHART                                                             38

4.7     SYSTEM FLOWCHART                                                                 39

 

CHAPTER FIVE                                                                                     

5.0     IMPLEMENTATION                                                                       40

5.1     PROGRAM DESIGN                                                                       42

5.2     FLOWCHART                                                                                  42

5.3     PROGRAM FLOWCHART                                                             44

CHAPTER SIX                                                                                        

DOCUMENTATION                                                                                 52

 

CHAPTER SEVEN

7.0     RECOMMENDATION AND CONCLUSION                                 53

7.1     RECOMMENDATION                                                                              53

7.2     CONCLUSION                                                                                 53

REFERENCES                                                                                 55

 

 

 

 

CHAPTER ONE

1.0     INTRODUCTION

          The utmost speed at which the Universe is being turned into a global world is attributed to the sophisticated in the development of the telecommunication industry. These radical changes have been made possible by the invention of digital technology in electronics and telecommunication analogue. This means that the signal been handled, processed or transmitted are presented by voltages whose amplitude and frequency vary. Continuously with time.

Consequently, in the telephone system, the transmitted signals are direct representation of the speech waveforms. This did not sound waves in the system.

This project is aimed at developing a system that will help in the billing section of Vmobile to enable it to serve its customer effectively. Also, able to bill them accurately and also give the customers detail of how they are been billed either in PMB or PSB.

The PMB is the old order by which the network operator bills you for a minute when your calls lasted for a few seconds, these rounds up your call cost to the next minute white the PSB is the current order that gives subscribers the opportunity to pay for the exact call duration.

Today, most Vmobile products like Vecgo, Vstep, Vbusinss and Bumpa come with the PsB Option. Infact, Veego, Vstep and BUMPa now have PsB option as default.

Although the billing processing system has been in existence in many organizations though in a traditional approach and in anticipation.

Introducing the computer system will greatly improve materials requirement planning in the following aspects:

1.       Reliability

2.       Variability

3.       Accuracy

4.       Appropriate storage of data

5.       Timeliness

 

1.1     STATEMENT OF THE PROBLEM

The quest for a more sophisticated and effective system that can handle the GSM bills of the customers in telecommunication companies has led the researcher to the designing and development of a software to handle the GSM billing system of customers in Vmobile Nigeria Plc.

In our society today, if we take a close look at NEPA, NITEL etc. we will discover their billing systems that was formally manual, has been computerized, because most times, many telephone subscribers do complain of excessive billing and this has often be traced to the carelessness or otherwise on the part of the staff that prepare the bills and yet still collect their revenue. In these GSM Billing system the design will look at your balance before allowing the customers to make call. The calls is been checked by both parties and at the end both of them are been certified of every transaction.

 

1.2     PURPOSE OF STUDY

          The purpose which this project work is carried out is to identify and eliminate all the drawback that are encountered in the manual techniques through the introduction of computers to carry out basic clerical duties. By computerizing call billing system, this operation will become easy to reach prospective customers scattered all over the nation.

Another purpose of this project work is to ensure accuracy in the daily operations or activities. Again, file and other documents are protected from non – authorized user and from environment hazards.

 

1.3     AIMS AND OBJECTIVES

The aim of the researcher is to set an all round criteria for GSM operators especially Vmobile Nigeria Plc. If the new system is well utilized, the great organisation must surely achieve greater heights.

The objective of the study is critically looked into existing billing system with a view of locating any loop hold and subsequently design a system that integrate the existing one and which should be suitable for use in the Vmobile Nigeria Plc. The new system will be able to take care of the most of the problem experienced with the system already in place. Also this project will evaluate the perceived notion of this type of GSM operator. The researcher intends to design and stimulate a software that will depict the billing system as regards Vmobile Nigeria Plc.

 

 

1.4     SCOPE OF STUDY

          The system is intended to take care of every aspect that relates to the control and operation of the GSM billing system for Vmobile Nigeria Plc. The final information provided will be used for improved customers services, financial control and operation. This reports so far should be generated at a regular and continuous manner as not to mis-lead the company and the subscribers.

The report will delve into the existing system of Vmobile with the view of finding out their usefulness and short comings and this should be made to find a suitable approach to accomplished the desired goal.

 

1.5     LIMITATION

          There are number of factors which complied the researcher to limit her studies in Vmobile Nigeria Plc amidst numerous communication companies.

These factors include the following:

(a)     Lack of finance for transportation to the case study and library.

(b)     Unwillingness of the staff in Vmobile Nigeria Plc to give the researcher enough information.

(c)      Lack of time due to the short semester and moreover other m examination.

(d)     Lack of sophisticated telecommunication books.

Further more, the same constraints made for the enhancement of the intended new system.

 

1.6     ASSUMPTION

The researcher made the following assumptions:-

(a)     She assume that the staff in the billing or account department of Vmobile Nigeria Plc for which the program is basically designed are computer literate and therefore could conveniently operate the system when implemented.

(b)     She assumes that the management will give the new system the support and supervision and effectively.

(c)      Finally, the assumption is made that at the cumber some task of retrieving and updating records in packs of books would be eliminate and easy process of retrieving, updating and searching for the bills as it affects Vmobile Nigeria Plc would have been adequately taken are of.

1.7     DEFINITION OF TERMS

          GSM:- This means Global system for mobile communications as defined in the European Technical standards institute of specifications.

Vmobile:- This means Victory mobile communication Nigeria Plc where V stands for Victory.

Veego:- This is Vmobile pre-paid packages for phone users who want total control of their call costs as the user only pays for air time whenever they need to make a call.

Vstep:- This is also pre-paid packages offering basically the same freedom as veego but with added advantages. It helps those who make a lot of calls reduce their tariff as they make more calls within a 30 day time period.

BILL: These are changes made to subscribers on using the GSM line.

BUMPA CARD: This is a value card which gives bumpa airtime discounts to its user.

PMB: This is per minute Billing which enables the operators to bill the subscribers for a full minute (60 sees) even when they spent a few or lesser seconds on the phone.

PSB: This is per seconds Billing. It give the subscribers the opportunity to pay for the exact call duration

ICC: This means international card configuration being an identity humber unique to each SIM CARD by the manufacturer of such SIM card.

MSISDN: This means the mobile subscriber International Directory Number (otherwise known as the mobile telephone number) programmed into each SIM card.

PACK OR KIT: Means the package containing an information sheet describing the network services and SIM card which the subscriber will receive upon purchasing terminal Equipment or a SIM card.

 

TERMINAL EQUIPMENT: Means terminal and accessories thereto which are used by the subscriber to send and or / receive messages Via the network (commonly referred to as a cell phone).

SIM CARD: This is a subscriber Identification module (incorporating as ICC and MSISDN) which when activated by Vmobile and used in conjunction with compatible Terminal Equipment enables the subscriber to operate such terminal Equipment on the network.

AIRTIME:- Means the refill voucher/card credits to a subscriber based on the applicable all charge.

DESIGN:  This is creating task of constructing figures that should represent a real event or action.

WAP: This is short for wireless application protocol and it is a secure specification that allows users to access information instantly Via hand wireless devices such as mobile phones, pagers, two – way radios, smart- phone and communications.

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM

 

TABLE OF CONTENTS

Cover page

Title page

Certification

Dedication

Acknowledgement

Abstract

Table of contents

 

1.0            INTRODUCTION

1.1     Security information

1.2            Objectives

1.3            Justification

 

CHAPTER TWO

2.0            Security concept

2.1     Definition of security

2.2            Security threats

2.3            Security & Information

 

CHAPTER THREE

3.0            Description of the exiting security information system

3.1     Organizational structure

3.2            Fact finding method

3.3            Objective of the existing system

3.4            Programs of the existing system

3.5            Equipment of the existing system

3.6            Forms

 

CHAPTER FOUR

4.0            Design of the network-based security information system

4.1     Method of data collection

4.2            System design – input, processing, output, information storage and retrieval

 

CHAPTER FIVE

5.0            Implementation of the new system

5.1     Choice of programming language

5.2            Program flowchart of security record system

 

CHAPTER SIX

6.0            Output interpretation

 

CHAPTER SEVEN

7.0            Conclusion

7.1     Recommendation

 

 

 

 

 

 

 

ABSTRACT

The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.

It also airs the different machines used in information processing system to reduce the much-engaged manual efforts.  The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization.  The proposed system is a network based expert system.

All the work in the system will at the end achieve:

–        Data security

–        Handling of files

–        Speedy collection of information for security analysis

–        Storage of information for subsequent usage.

–        A forecast for the future security

–        A dependable standard for decision taking on security matters as well as planning and control measures.

–        Existing equipment for security information listed and known.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CHAPTER ONE

1.0            INTRODUCTION

Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects.  To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.  In this work “DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM” I will take a case study of “B’ OPS COMMUNICATION OF POLICE SHQ ENUGU” as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output.

 

1.1     OBJECTIVE OF THE STUDY

The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of the executive and law enforcement management system.  Another objective of this work is to make an improvement in the existing data security system.  To create a way of speedy data collections for security analysis.  For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs.

 

1.2            JUSTIFICATION

The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.

This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs.

 

Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of some of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy.

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF A WEB-BASED LEGAL PRACTITIONER APPLICATION SYSTEM

 ABSTRACT

The legal practitioner is a research and law teaching, where Lawyers & Judges study about cases on-line.  They insert in any newspaper, periodical or any other publications and advertisement offering as a member of the Bar to undertake confidential inquiries; to write for publication or give an interview to the press or otherwise cause or permit to be published, except in a legal periodical, any particulars of his practice or earnings in the profession or of cases pending on the courts or cases where the time for appeal has not expired on any matter in which he has been engaged as a member of the Bar, to answer questions on legal subjects in the press or any periodical on in wireless or television broadcast where his name or initials are directly or indirectly disclosed or likely or be disclosed.

The maintenance of a respectful attitude towards the court is been made.  It is unprofessional on the part of a member of the Bar to promote a case, which to his own knowledge is false.

Referring on different cases by some judges and lawyers, considering the fact-finding information displayed on related cases on web.

The situations where cases are adjourned are made known to the public who are interested in those involved in the case.  The aim of the disciplinary committee is to consider and determine any case where it is alleged that a person whose name is on the roll of legal practitioners has misbehaved in his capacity as a legal practitioner or should for any other reason be the subject of proceedings under the Decree to hear appeals from any direction given by the disciplinary committee.  Preparing and from time to time, revising a statement as to the kind of conduct if considered to be infamous conduct in a professional respect.  This is to say that if the case is being adjourned, they will automatically know about the information on-line.

Judgment is being concluded to be available to other practitioners on-line, either in favour or against, depending on the crime committed.

The introduction of a computer application is a great change in a legal practitioner based on the web site through browsing, which helps them to make references on different cases from the files documented.  As a machine, it is faster, accurate, easy to be used.  By the available data, it involves writing a program of instructions.

A lawyer maintains a respectful attitude towards the court.  They have to engage in public prosecutions, to see that justice is done.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE OF CONTENTS

Title page                                                                                i

Certification                                                                                      ii

Dedication                                                                               iii

Acknowledgement                                                                             iv

Abstract                                                                                  vi

Table of contents                                                                     ix

 

CHAPTER ONE

1.0  Introduction                                                                       1

1.1 Statement of problems                                                      2

1.2 Aims and objectives                                                          3

1.3 Scope of the study                                                             6

1.4 Limitations of the study                                                    6

1.5 Definition of terms                                                            7

CHAPTER TWO

2.0  Literature Review                                                              12

CHAPTER THREE

3.0  Description and Analysis of Existing System                    17

3.1  Fact finding method                                                           19

3.2  Background of case study                                                 21

3.3  Objectives of existing system                                            23

3.4  Input process, output analysis                                          24

3.5  Information flow diagram                                                  28

3.6  Problems of existing system                                                        29

3.7  Justification of existing system                                          31

 

CHAPTER FOUR

4.0  Design of new system                                                        33

4.1  Output specification and design                                        36

4.2  Input specification and design                                           41

4.3  File design                                                                         44

4.4  Procedure chart                                                                 48

4.5  System requirement                                                           50

 

CHAPTER FIVE

5.0  Implementation                                                                  53

5.1  Program design                                                                  54

5.2  Program flow chart                                                           56

5.3  Test Run                                                                            64

 

CHAPTER SIX

6.0  Documentation                                                                            65

 

CHAPTER SEVEN

7.0  Recommendation                                                               68

7.1  Conclusion                                                                        71

References                                                                         72

 

 

 

 

CHAPTER ONE

1.0            INTRODUCTION

To understand the web-based legal practitioner application system, it includes not merely the profession, which is practiced in courts but also covers law teaching, law research, administration in different branches where law plays a role and in fact, commercial and industrial employment and all other activities, which postulates and requires the use of legal knowledge and skill and which adopts legal process also fall within its scope.  The wed based legal practitioner comprises all those who use technical legal knowledge through net in performing their various occupational roles.  These will include such categories as practitioners of law and legal advisers, judges and magistrates, Area court Judges and Islamic Court Judges, academic lawyers and scholars, legal technicians (e.g. consultants) etc.

A legal practitioner is a person entitled to practice as a barrister (advocate) or as a barrister and solicitor.  In Nigeria, every legal practitioner is a barrister and solicitors.  For exam plc, an advocate practicing in a country whose legal system is similar to that of Nigeria may be permitted by the chief justice of Nigeria to practice as a barrister.  The chief justice has no power to permit him to practices as a solicitor.  Further more, a senior Advocate of Nigeria is not entitled to practice as a solicitor.

 

1.1     STATEMENT OF PROBLEM

The problem statement is mainly centralised on the existing method of wed-based legal practitioner application system.  The information obtained on-line, shows that a legal practitioner is entitled to recover his charges by action in a court of competent jurisdiction.  In General, before a legal practitioner brings such action, a bill for the charges containing particulars of the principal items included in the bill and signed by him, or in the case of a firm by one of the partners or in the name of the firm, must have been served on the client personally or left for him at his last address as known to the practitioner or sent by post addressed to the client at that address.

In addition, the period of one month beginning with the date of delivery of the bill must have expired.  There are provisions in the legal practitioners for taxation of bills of charges delivered by legal practitioner to his clients.

The council is to be consulted by the Attorney-General  of the federation before making regulations for the enrolment as legal practitioners in Nigeria, Court of  Appeal Enugu as a case study, members of the legal profession in any other country on a reciprocal basis.

The Attorney – General of the federation is also required to hold consultations with the council before varying the rates of practicing fees specified.

 

1.2            AIMS AND OBJECTIVES

The web-based legal practitioner application system has an increasingly important role in a modern state not only in dispensation of justice but also in the formulation of a just legal order and in the preservation of an efficient juristic order.

The characteristics of the on-line legal practitioner such as independence, integrity, official administration of courts and administration of justice.

There is a roll of legal practitioners kept as a roll of court and maintained by the chief Registrar of the Supreme Court of Nigeria.   In general, a person is entitled to be enrolled if and only if:

(a)  He has been called to the bar by the body of Benchers; and

(b)  He produces a certificate of his call to the Bar to the Chief Registrar of Supreme Court.

In general, persons whose names are on the roll of legal practitioners kept as a roll of court and maintained by the chief Register of the Supreme Court are entitled to practice as barristers and solicitors.  However, the chief justice of Nigeria may, by warrant under his hand authorise a person, whose name is not on the roll, on payment to the Chief Registrar of the Supreme Court of such fee not exceeding 50 Naira as may be specified in the warrant, to practice as a barrister for the purpose of specified proceedings and of any appeal brought in connection with those proceedings.

The power of the chief justice to authorise a person to practise as a barrister under this provision is exercisable where:

(a)   an application for permission to practise as a barrister is made to the chief justice by or on behalf of any person who is the opinion of the chief justice is entitled to practise as an advocate in any country where the legal system is similar to that of Nigeria; and

(b)  the chief justice is of the opinion that it is expedient to permit the person to practice as a barrister for the purpose of proceedings with respect to which the application is brought.

Furthermore, a person for the time being exercising the functions of any of the following offices is entitled to practise as a barrister and solicitor for the purposes of the office:

(a)   The office of the Attorney-General, solicitor-General or Director of public prosecutions of the federation or of a state; and

(b)   Such offices in the public service of the federation or a state as the Attorney-General of the federation or of the state, as the may be.

 

1.3            SCOPE OF THE STUDY

Reference could be made from different parts of the world about a case on-line.  Considering the fact that information are displayed on the web because, some Judges and Lawyers could be able to make reference on how related cases are being handled.

For instance, somebody is having a case of murder in the court and you want to search, to know how the case was treated or how it was judged.  As a lawyer, you may go on net, to search for a related case to the case you are handling and how it was treated, in order to know or for easy decision on your own cases.

 

1.4            LIMITATIONS

Although a person has been enrolled as a legal practitioner, his right to practise as a legal practitioner may be limited where:

(a)  he is a senior Advocate of Nigeria; or

(b)  he has not paid a practising fee: or

(c)   he is a legal practitioner of less than seven years standing.

The rank of legal practitioners known as Senior Advocates of Nigeria is Equivalent to that of Queen’s Counsel which has been abolished in Nigeria.  The Amendment provides that the legal practitioners privileges committee may by instrument confer the rank of senior advocate of Nigeria on a legal practitioner who has been qualified to practice as a legal practitioner is Nigeria for not less than 10 years and who has achieved distinction in the legal profession in such manner as the committee may from time to time determine.

 

1.5            DETERMINATION OF TERMS

The Council: This is established by the legal education, and is responsible for the legal education of persons seeking to become members of the legal profession.

The Chief Justice: He is to autorise a person whose name is not on the roll, on payment to the Chief Registrar of the supreme court of such fee not exceeding 50 naira as may be specified in the warrant.

A Barrister: His purpose is to specify proceedings and of any appeal brought in connection with those proceedings.

The Disciplinary Committee: They consider and determines any case here it is alleged that a person whose name is on the roll of legal practitioner has misbehaved in his capacity as a legal practitioner or should for any other reason be the subject of proceedings.

Appeal Committee: Hear appeals from any direction given by the disciplinary committee.

General Council of the Bar: Prepares and from time to time, revising a statement as to the kind of conduct it considers to be infamous conduct in a professional respect.

A Lawyer: A lawyer maintains a respectful attitude towards the court.  He s trained and qualified to advice people about the law and represent them in a court of law.

The Judiciary: He settles and decides controversies between he citizens inter se and between the state and the citizens.

The Nigerian Courts: Are the supreme court of Nigeria, the court of Appeal, (and of recent a constitutional court); the federal High Court, a High Court of a state, a sharia Court of Appeals of a state; a customary court of Appeal of a state and such court as may be authorised by law to exercise jurisdiction on matters with respect to which the National Assembly or State House of Assembly (as the case may be) are authorised to make laws.  A law court is a statutory place for proper interpretation of law to resolve disputes and conflict.

Judges: They should indeed move in the direction of the jurisprudence of welfare and adopt a judicial approach that identifies the political, social and economic problems facing the country and using the law to provide solutions to these problems.  They lead in the proceedings.  He has the authority to decide on offenders.

Litigation: This is a process of making or defending a claim in a court of law.

Appellant: Is one who takes a case to the court.  He is the complainant.

Respondent: This is one who is defending in a claim; he is responding to the complaint.

Case list: These are scheduling of cases to be heard by the court on the following day.

Appeal: This can be a formal request to a court of law for a judgment to be passed on an issue.

Motion: In a court, it is application to a court or judge for a ruling or order.

Proceedings: This is an activity carried in a law court in a bid to settle a dispute.

The Registrar: This is a person in the law court that makes entries in the file ie what happens in the court each day.  He signs as the commissioner of oats, compile record or appeals, and access documents and certify them.

Clerk: This can be a person in the court who is in charge of the records of the court.

Court Bailiff: This is a person in the court that serve processes like messengers.

Case Book: Is a book where all cases are recorded, details of each case like names of parties involved in the case, case number (charge number), the name of the high court where the case came from, etc. are recorded in this book-including writ of summon.

Writ of Summon: Is like a form of details of the names of the litigants, the case number etc. it is served to the defendant letting him to know that he has a case and asking him to enter for an appearance.

 

 

 

 

 

 

 

\ HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF A WEB BASED SIWES INFORMATION SYSTEM (A CASE STUDY OF ITF ENUGU)

ABSTRACT

This study was carried out to verify all the manual processes involved in ITF especially in processing of students industrial Training Information keeping SIWES information and to seek for a way of automating the system for effective Operations.

Since, there is a continues moves towards technological advances that enhanced productivity of labour and free human beings of task done more economically by machines. Computer applications have become indispensable vital tools in economic, industrial and socio- development of the advance countries of the world. Nigeria as a developing country cannot afford to lay too far behind in this kind of revolution. Therefore there is every need to know in energy discipline the areas which attracts computerization and why they need it.

In this project, the software engineering principles were applied in the analysis, design, coding, testing of software serious attention was also give to the design of user interface.

In the development of the software, visual basic programming language was used due to its support for all the features desired. A brief user’s guide I also provided. The end result is software that is very effective and efficient in meeting its objectives and at the same time user friendly.

CHAPTER ONE

1.0    INTRODUCTION

Industrial training refers to work experience that is relevant to professional development prior to graduation. One of the requirements for the award of higher national diploma or bachelor degree is that students must complete at least 11months for the weeks of industrial training for polytechnic and 12 weeks for universities across the nation. Industrial training is normally accumulated during the semester breaks at the end of the third or fourth year. For the purpose of the work, we will restrict our study to the polytechnic education.

The national board for technical education or NBTE, which is the organization that accredits all polytechnic programs in Nigeria, strongly advocates that an industrial experience component of at least 12 weeks duration is included in all undergraduate courses.

All students should make consi8derable efforts and give sufficient thought into obtaining the most relevant and effective industrial training. Whilst difficult, it is desirable to obtain experience in a range of activities, such as e.g. Design office, laboratory and on-site situation. It should also be noted that developing an awareness of general workplace behavior and interpersonal skills are important objectives of the industrial training experience. All students who are registered for a higher National Diploma must have completed an 11 months compulsory.

1.1    STATEMENT OF PROBLEM.

Among the reasons underlying the slow economic convergence of some regions towards the national average, the strong gap in technological endowment and innovation capacity has been indicated as one of the most important factors. The requirements of the current ‘ Knowledge- based economy’ and the contribution of information and communication technology (ICT) to socio-economic change are very likely to have a significant impact upon regional differentials in the European union, so far, however, it is rather unclear whether the new paradigm will spur greater socio-economic cohesion or, on the contrary, stronger territorial polarization. The first question addressed in the study considered whether a company (called the institute in this study) has been using performances appraisal as a tool for organizational development or for employee career development. The second question raised has been whether performance appraisal could be used for both organizational development and student’s development. The third question raised has been whether the use of performance appraisal being used for developmental purposes made students more effective thus making the organization more efficient. The fourth question raised has been whether or not a web based SIWES information system can assist the management of ITF to improve student appraisal.

1.2    AIMS AND OBJECTIVES

The study is aimed at providing software based solution(s) to the managements lapses identified with the present productivity measurements system. Other Objectives includes-:

Eliminate the prospects of error due top omission and / or commission during productivity measurement service recording.

Reduction by more than 80% the over reliance on mental paper work and save more physical space,

Increase by over 70% the system response time,

Produce a real-time online reporting mechanism for the system, and

Produce a framework for maintaining huge and reliable, efficient and effective as well as easy to use but highly secured database system for the agency.

1.3    PURPOSE OF STUDY

the purpose of this study is to carry out a verifiable research on the need for and importance of an information system for measuring labour productivity in government institutions with a view to recommend the most efficient, effective and reliable system or tool to achieve the above objectives.

1.4    SIGNIFICANCE OF STUDY.

The significance of this study is that it will provide the institute with an opportunity to introduce this new technology, which will also serve as the basis for future research into the topic.

1.5    SCOPE OF STUDY

Like every research projects, this projects has its scope and limits within which a verifiable, acceptable, efficient, effective and erelaible solution to the problems investigated can be found. Therefore this research covered areas as identified and grouped into -:

Data capturing

Information processing, and

Reporting.

1.6    LIMITATIONS

During the research process, some difficulties and limitations where encountered. They include-:

High proximity to resources areas from my home

Limited time in the gathering of facts and findings

Inadequate funds,

Insufficient local literature and/ or resources.

1.7    ASSUMPTIONS

Sequels to insufficient information, the following assumption were made:-

Full automation will not lead to job loses,

The cost of equipping government institutions with WSIS though huge, is not beyond the government, private sector

Full automation will help minimize unnecessary expenses, and

The personal required to man the new system are already being recruited.

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF A COMPUTER BASED IDENTITY-CARD PROCESSING SYSTEM (A CASE STUDY OF IMT ENUGU)

  ABSTRACT

 

          This project is aimed at improving a long lasting processing system on identity card. It is also aimed at keeping records of all identity card processing with view of modify it into a few Computer system.

The study covers the area of application entry, record verification list generation, code number and maintenance of the managed information. The new system developed is very easy to use and gives answers to report generation. Problems, which evolved from the existing system as a result of implemented. During the analysis examination of written documents, oral interviews as well as textbooks, journals will be used for data collection and also a source of information. Also, it is expected that a program will be produced in order to help the students process and also document identity cards with references to the rapid growth in the information technology, it is necessary to develop a fully identity cards processing system through this project.

                                    TABLE OF CONTENTS

 

Title Page

Certification

Dedication

Acknowledgement

Abstract

Table of Contents

 

CHAPTER ONE

1.0    Introduction

1.1    Background of study

1.2    Statement of Problem

1.3    Purpose of study

1.4    Significance of study

1.5    Scope of the study

1.6    Limitation of the study

1.7    Assumptions

1.8           Definitions of terms

 

CHAPTER TWO

2.0           Literature Review

 

CHAPTER THREE

3.0    Description and Analysis of the existing system

3.1    Organization structure

3.2    Objectives of the existing system

3.3    Input analysis

3.4    Output analysis

3.5    Process analysis

3.6    Information flow diagram

3.7           Problems of the existing system

 

CHAPTER FOUR

4.0    Design of the new system

4.1    Output specification and design

4.2    Input specification and design

4.3    Procedure chart

4.4    System requirements

4.4.1 Software requirements

4.4.2   Hardware requirements

 

CHAPTER FIVE

5.0    Implementation of the new system

5.1    Source code/module

5.2    Program flowchart

5.3           Test run

 

CHAPTER SIX

6.0    Recommendation and Conclusion

6.1    Recommendation

6.2    Conclusion

 

CHAPTER ONE

 

1.0    INTRODUCTION

1.1    BACKGROUND OF THE STUDY

          “The traveler has to knock at every alien door to come to his own and one has to wander through all the outer world to come to the inner most at the end” (Tagore…)

Man as a wanderer, is not settled with what he sees on what surrounds him. Unless he moves round the world knowing fully well that the world is a spherical shaped object. He sis not satisfied with what he has, unless he sees other superior objects on being. Therefore, in a bid to satisfy the mind or conscience on what they desire, men tend to know more as a stronger apart from his country home. The storage after all journey or may be at a later age tries to speak either in writing or orally his adventures either to his descendants or hiss friends, relations and neighbours. New man, (year of publication) says “I may be accused of laying stress on letter things, of being based, the mark of going into impediment or ridiculous details, of sounding my own praise, if giving scandal; but this is a case above all others, in which I am bound to follow my own light and to speak out my heart”.

Also, man in a bid to create awareness of running for his dear life, paying visits to friends, engagement in business transactions leaves his geographical area, it is necessary to been a mark. Mark her does not really means facial mark rather an identity showing your name, country, every single information about you and also purpose of your visit. This therefore boils down to what we know as identity card.

The question is “What is identity card” As defined by author surname (year). It is a national document certifying nationality issued by the government of a country, to a citizen intending to travel abroad from the definition, identity card can also be called a true image of an individual, because it tells well about a person coming into a country. Citizens in a country have the right to apply for issuance of an international passport. There is a need for the maintenance and processing of students records in order to maintain current data concerning an individual in the institute of management and technology Enugu, the unit, which takes the responsibility of producing an identity card for student, has many sections.

The identity card processing unit has different sections such as:

(a)     Registration unit

(b)     Passport section

(c)     Documentation section

(d)     Printing section

REGISTRATION UNIT:    Registration is a process where by student obtain campus form to fill and sign by the head of department to enable the registrar have the information pertaining to each department of the students in Institute of management and technology Enugu.

PASSPORT SECTIONS:   This is the section that takes change of snapping and processing passport photograph of the intending students and staff.

DOCUMENTATION SECTION:         It is section where all necessary particulars about the person to be issued an I.D Card is documented department by department.
PRINTING SECTION:       This is the section that prints out the identity cards.

 

1.2    STATEMENT OF THE PROBLEM
          The identity card processing system is not an easy task. The reason is because it involves networking all the computers in that organization and as well as to present forgery and avoid the dangers of duplication of multiple passports for one particular person. The system in question can also depict how lose a tight the security department is change of the passports section.
          Scanning through for a with definite information can be a tedious and time wasting work because of the large volumes of record to be scanned. Also, to change a particular information may be as a result of marriage, change of name and loss of passport in other words known, as update is also a tag of war for the individual in charge. It is also a big task detecting who and who were given or issued with a passport thereby creating space for duplication of passport and for a person. It results to weariness and loss of dedication to duties by the staff.
1.3    PURPOSE OF THE STUDY
          The primary purpose of the study is to critically analyze the activities of identify card processing, in other to produce our identity that will process one, to student of the school. Also proffering a lating solution to any problem that will rise.
1.4    SIGNIFICANCE OF THE STUDY
          This research is geared forwards having a comprehensive review of the manual system for the production of identity card in the institute of management and technology Enugu with a view to replacing it with a computerized system. This work apart from being of great help to academics and future researchers who may wish to go into research or know more about this subject matter will also be of immense benefits in that it will; consideration, to the following:
(i)      Deprive undesirable elements of the opportunity of obtaining I.M.T I.D. cards.
(ii)    Ensure proper accountability of the proceed from I.D. Card, and provide appropriate database about the customers.
(iii)   Ensure accurate update of the holders record.

 

 

 

1.5    SCOPE OF THE STUDY

          This study caller the activities involved in identity card processing system and its effectiveness in inventory control and account management for profit and loss in Institute of management and technology Enugu.

 

1.6    IMITATION

          Towards the end of this study, the researcher battled with time due to the fact that examination was in progress but among all odds, the researcher were able to produce a detailed study.

 

1.7    ASSUMPTION

          It is assumed that, the system is fully implemented; it will prove the activity of the identity card and help in maximization of profit. It will also help the staff to be computer literate.

 

1.8    DEFINITION OF TERMS

          As we go into this work, some words will need precise definition to enable the readers assimilate the entire content;

COMPUTER:   An electronic machine capable of accepting data in the form of input, processes it under a set of complete condition, stores information or request and generate result in the form of output.

 

CITIZEN: Under the provision of the amended constitution decree N0. 32 of 1974, Citizen is any person who becomes a citizen of any country either by birth, descrendant, registration or nationalization.

PROGRAMMING:    This is the act of designing and testing program logic.

 

PASSPORT PROCESSINGS:   The procedure involved in processing of passports.

RETRIEVING: This is the act of getting back information stored in the computer system.

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

DESIGN AND IMPLEMENTATION OF INTERACTIVE WEBSITE FOR INTERNET/MOBILE BANKING (A CASE STUDY OF ALL STATES TRUST BANK PLC ENUGU)

ABSTRACT

          This project work is concerned with the use of the Internet in banking operations, a case study of the All State Trust Bank Plc Enugu.

The Internet in acts over evolving state is becoming a serious method of business communication and data transfer worldwide.  As such banks and other financial institutions are beginning to use the Internet as new vehicle for doing business.  The Internet allows banks to offer both new services and level of convenience for existing services and allowing the consumers and customers to interact from any computer capable of making appropriate connections.

The technological developments have made most banks and other financial institutions to be more responsive to change and it is imperative to adopt the latest technology in order to maintain operational efficiency as a means of warding off competitive threat, to increase speed of transaction, improvement of customer’s convenience by reducing barriers to entry into payment systems and retail banking.

TABLE OF CONTENTS

Title page

Approve

Dedication

Acknowledgement

Abstract

Table of contents

 

CHAPTER ONE

1.0           Introduction

1.1           Statement of the problem

1.2           Purpose of the study

1.3           Delimitation of the study

1.4           Limitation of the study

1.5           Significance of the study

1.6           Definition of terms

1.7           Assumption

CHAPTER TWO

2.0           Review of related literature

CHAPTER THREE

3.0           Description and analysis of the existing system

3.1           Fact finding

3.2           Organization structure

3.3           Objective of the existing system

3.4           Input/output analysis

3.5           Analysis of the existing system

3.6           Information flow diagram

3.7           Problem of the existing system

3.8           Justification of the new system

CHAPTERF FOUR

4.0           Design of the new system

4.1           Output/input specification and design

4.2           Database design

4.3           Procedure chart

4.4           System flowchart

4.5           System requirement

CHAPTER FIVE

5.0           Implementation

6.0           Documentation

7.0           Recommendation and conclusion

CHAPTER ONE

 

1.0    INTRODUCTION

          The greatest innovation that has taken place in the twenties century is in the realm of information technology. This is currently made possible by the introduction of the digital computers, which has been observed in the field of communication to be increasingly inseparable from communication to be increasingly from communication. This linkages often referred to as convergence is risen driven by technology and amplified by business trends the technology and business, foster growth in network systems that use communication links to connect subsidiary system (nodes) which may send, receive, direct and redirect information to, fro, sender and receiver.

Taking of the Internet a couple of years ago would have sound link a fair table but today the Internet is pervasive in almost every field of human endeavor changing the fundamentals of how are conduct national as well as international businesses. Few years of existence, the internet has shown that it can sliver the long sought after goal of electronic commerce.

It is worth noting that companies in developed countries world – wide have recognized the business potential of the internet and are getting connected to the network of networks in their million.

The financial Institution (Bank) is one of such organizations. Banking constitutes one of the most prominent life wire for socio – economic growth and development in any given nation. It support and assists in the supply of long and short term loan accept both current saving and fired deposits both foreign transaction, advice and facilitates transactions between client, workers, agents, firms, buyers, and sellers by providing payment services not excluding the issue of undertaking risk on behalf of their client, only to mention but few.

The Internet housing founds its application and acceptance in the banking profession has particularly put the banking industry on an accelerating pace of development. The Technological high may (Internet) has become an enable in achieving high level productivity and in handling volumes of transaction which would have been impossible without the use of On – line banking (E – Commerce)

This technology facilities linkage with clients both through the provision of information and quality service delivery as well in reducing barriers to entry into payment system and retail banking. Internet banking allows clients to engage in formal transaction relationship, which would have taken long distance travel or movement of document with the attendant risk of loss. With the On – line banking (Internet) you can at your convenience at home and at any time, review balances and transaction services and contact customer services but just to mention but few. An over view of the benefit and prospects of the On – line banking suggest that for banks to be relevant to their customers in terms of the services they provide in the twenty first century and in the future most append this services provide by E – Commerce in the banking system in order to stay in competition. Now that an on –line banking is the on thing bank should get up and invest in internet Technology to reap bounteously the benefit accruing from Internet banking.

 

 

 

1.1    STATEMENT OF PROBLEM.

The advances in the world of information technology it is almost recorded on a daily basics, consequently, rendering former communication equipment obsolete as people tilt towards the use of improved electronics that support E – commerce made possible through the use of the internet in the banking sector.

Although a significant improvement has been recorded in the use and development technology in the banking industry over the last decade. Most banks are still far from implementing technology-based strategies able to see them through competition in banking markets. This may be as a result of lack of awareness, the inability to evaluate the benefit derived from the use of the recent technological development (Internet) and capital shortage that may hamper the design and subsequent implementation of the technological tool hence denying customer of this advances services and their flexibility choice and convenience associated with the Internet banking.

The advantages offered by these toll calls for a review of an existing automated system and subsequent design and implementation of interactive web-site to improve the existing system

 

1.2    PURPOSE OF THE STUDY

  • To investigate the lacks of the current automated system in term of modern technology appliances that support Internet banking services and suggest ways of updating them.
  • To design a friendly web site that graphically advents goods and services provide by the institute on web pages.
  • To improve in the speed effectiveness, efficiency and convenience in business transaction.
  • To carry out a feasibility study on the organization for the purpose of installing an on link banking.
  • To design and implement a computer software to solve this problems and rendering the services.

 

 

1.3    DELIMITATION

This study and subsequent design of the computer software is limited to the  (All State Trust Bank) Enugu. Although limited to the above organization. The finding design and implementation of the software is likely to be applicable to other owned organization.

 

1.4    LIMITATION OF THE STUDY

Hard time is not new phenomena to an ordinary Nigeria but to the student researcher, it is even worse time and finance posed a lot of constraints to the work..

Consequently, difficulties were encountered during the collection of primary data. Most of the administration system engineers and clerk visited reluctantly refused interview for one reason or the other and being referred to and fro, the organization from one personnel to the other not excluding even security men.

Books related to this topic are relatively scarce and could only be gotten from the Internet, which took a lot of time and money.

However with persistence and perseverance reasonable facts were finally obtained.

 

1.5    SIGNIFICANCE OF THE STUDY

The study and subsequent design and implementation of this program will be of immense use to the organization, the administration and the customers in realizing the long south goal of speed, efficiency, effectiveness and convenience the program take care of those factors that militated against the smooth running operation of the organization using the on-line services. Provided by the web.

Better still scholars who intend to carry out subsequent research could have this as base from where improvement could be made.

 

1.6    DEFINITION OF TERMS

INTERNET                  The Internet is global network of computers.

LAN                    Local Area Network

MAN                             Metropolitan Area Network

WAN                            Wide Area Network

NT                       Network Termination

PIN                      Positive Intrinsic Negative

WEB                   The nearest and friendliest face of the Internet made of pages of information.

Virtual World     As electronic stimulation experience all a head mounted eye goggle and wire dating enabling the end use to internet in realistic these dimensional situation.

ANALYSIS:       The methodically investigation of a problem involving the separation of the problem into smaller related unit for further solving

Computer Base:  Computer oriented problem solving

FORMAL:          The arrangement of data

SOFTWARE:     A set of logical instruction designed for the computer.

FILE:                   Is made up of fields and records

DATA BASE:    Set of several permanent files integrated into a single file, which is available for many different uses.

PROCESS:                   A systematic sequence of operation

PROGRAM:       Series of instruction that is given to the computer.

COMPUTER:     Is an electronic device capable of accepting inputs, processing, storing and outputting information.

NETWORK:       The inter-connection of computers.

WINDOWS:       A type of operating system

REAL TIME:     A computer that gives immediate result of the process data

ON – LINE:                  That can be access at any given time.

PASSWORD:     A set of codes that give you access to a computer resources..

E-BANKING:    Banking does with the computer means of transferring data.

TELE METRIC  The use of telephone line couple with the computer in providing services.

CD ROM            Compact disk read only memory.

 

1.7    ASSUMPTION

Having completed the study the following assumption was made in running the program.

  • That the customer has account 10
  • The password
  • The card pin and other relevant data for E – commerce validation.

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL