A B-S Model for Online Integrated Information System for Bayero University Kano Nigeria
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : An online integrated information system for Bayero University Kano, is a web-based application that provides inputs and outputs information support to admin/users in order to access and update university student record. Bayero University Kano is one of the most recognized conventional universities in Nigeria with a large number of students both undergraduate and post graduate. Papers and pens is the usual method use in student registration and record which is time consuming and waste of resources. In view of the availability of new technologies, this paper mainly concentrates on improving the manual methods by adopting a Browser Server structure which was used to design an online integrated information system for Bayero University Kano. The entire application was developed in java myeclipse environment using servlets and java server pages (JSP) technologies and SQL 2005 serve as the database backend. The system designed was generally accepted and it has proven it is importance in academic usage.
Authors and Affiliations
Abubakar Sulaiman Gezawa , Ahmed Aliyu , Abduarra’uf Garba , Saifullahi Aminu Bello , Usman Joda
Model of Computation-Turing Machine
: In theoretical computer science and mathematics , the theory of computation is the branch that deals with how efficiently problems can be solved on a model of computation, using an algorithm. The field is &nbs...
Privacy Security of Multiuser on Multilevel System using XOR
Abstract: Privacy security of multiuser on multilevel system is considered in this work. On communication there is a chance for the eavesdropper’s to secretly listen to the conversation. In order to confuse the eavesdrop...
Virtual image rendering with stationary RGB color correction for mirror image
Digital image processing which concurrently process the stationary images, and RGB colour corrections in our proposed framework.In this paper we introduce two kind of algorithms.The first one is contour algorithm.Th...
Chaos Encryption and Coding for Image Transmission Over Noisy Channel
Abstract: The security and reliability of image transmission over wireless noisy channels are a big challenge. Ciphering techniques achieve security, but don’t consider the effect of errors occurring during wireless tran...
An Enhanced Password-Username Authentication System Using Cryptographic Hashing and Recognition Based Graphical Password
Abstract: Password-username authentication is a critical component of today’s web application technology that is commonly used to control access to restricted resources. However, poor design, coding flaws and weakuser lo...