An Integrated Project Evaluation System
Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0
Abstract
Many a time business administrators and even government officials face a lot of challenges trying to coordinate projects. The process of allocating, evaluating or monitoring projects and even generating or keeping project reports is very tasking and that is why it is common these days to see a good number of individual, corporate or government projects being uncompleted or even abandoned. To achieve integrated development therefore, it is imperative that an easily accessible application be developed to tackle this area of concern. The essence of this application is to automate the whole process of project management and evaluation, simplify the work of a project manager, improve the workflow and thereby reduce the number of uncompleted or abandoned projects. The Structured Systems Analysis and Design Methodology was adopted, and also PHP and MYSQL were used to build the model. The result is a simple web based integrated project management software that has the capacity to help a project manager to plan, allocate projects to clients, monitor, organize, evaluate and manage resource pool and generate online real time overall reports with ease, hence making project coordination process more robust and efficient.
Authors and Affiliations
Odii J N. , Onwuama T. U. , Adibe F. O
Cloud Pricing - A Concern in Cloud Computing
Cloud computing is emerging as a promising field offering a variety of computing services to end users. These services are offered at different prices using various pricing schemes and techniques. End users will favor th...
Application Design to Diagnosis of Bone Fracture (Traditional) using Forward Chaining Methods
In this expert system will be created an expert system that will be used to diagnose diseases of bone fractures in humans using forward chaining and it is an application designed with engineering reasoning and tracking f...
Duplicate File Analyzer using N-layer Hash and Hash Table
with the advancement in data storage technology, the cost per gigabyte has reduced significantly, causing users to negligently store redundant files on their system. These may be created while taking manual backups or by...
A Novel Approach for Cryptography using Modified Substitution Cipher and Triangulation
In this paper a novel approach to encryption and decryption is presented, which will include two new techniques, namely, Rounded Cipher, a modified version of the substitution cipher, and Triangulation. This approach als...
Cooperative Receiving Scheme for Down link of Cellular Systems
In wireless mobile cellular systems, it has been popular for mobiles to support some short-range wireless communication protocols (SRWCPs)−Bluetooth, Zigbee, NFC (near field communication), etc. In this paper, we introdu...