Description | ABSTRACT
This work is carried out to identify and discuss the need for a computer system in hotel business billing system. A hotel business is a hospitality industry which caters for both leisure and well being of its guest. The duties of hotels are to offer accommodation to their guest and to render services to them. These services are usually personal.
The focus on this topic is to introduce computer in the allocation of rooms and billing system of a hotel. The current process of billing is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also suggest how to successfully implement the computerized procedure and to overcome the obstacle that would hinder the successful implementation of the system. The new system was designed using Microsoft visual basic 6.0 programming language. This language was chosen because of its easy syntax and features for developing windows based applications. | ABSTRACT
This project deals with the design and implementation of an expert system for car faults diagnosis. The project is motivated by the need to guide car owners and learners motor mechanics in the maintenance and trouble shooting of motor problems without having to resort to presumptions and conjectures. Particularly, it is expected that the proposed design would ensure that car owners have proper assistance in times of crisis and what?s more will save them from the clutches of exploitative roadside mechanics. For this purpose a rule- base artificial intelligence (AI) technique was utilized to obtain theoretical and practical expert system parameters, and then a conceptual expert system was designed. The expert system functioning is based on the database of car faults, symptoms and their correction, which make up its knowledge base. The new system was developed using visual basic 6.0 programming language and access database. This language was chosen because of its easy syntax and features for developing windows based application. | CHAPTER ONE
1.0 INTRODUCTION
Modern societies are technology driven thus changing their characteristics at an accelerating rate. One of the current developments in the information sector that will greatly affect business (improve business and society) is greatly increased computer literacy of leaders and general population which will make computerization transition seamless. That is, the use of computer in any process has been applied in virtually all spheres of human Endeavour. It has equally found wide application in both the private and the public sectors of the economy.
In Nigeria, today there is no gain saying revenue for government, we hear and see computerization project in NITEL, NEPA, and so on; the government has so decided on these project because of their long run advantages over current manual techniques.
In fact, no meaningful society today can exist and function efficiently without an element of computerization in the processing system. It was based on the above point and advantages inherent in computerization that the researcher decides to embark on the study.
In order to improve this revenue so as to provide essential services, the government should be encouraged to computerize its personnel income tax collection medium as well as embark on computerized audit procedures to determine or ensure actual compliance to revenue provision and standards. To achieve this task, in Abia state, the state board of internal revenue, the sole agent for revenue generation should properly equipped with modern computers and computer literate personnel needed to carry out the doctrines of assessment as well as auditing. The manual auditing procedure and techniques currently being employed in the auditing of personnel income taxes has negative effect on clients (agents) as well as employees, more especially under critical situation such as limited tune frame to computer audit exercise. The manual process can only produce reports after a long period of time that may not be less than two weeks; these delays will mean delayed revenue to the state. Also it could lead to a situation where fatigue could discourage a thorough job by the auditors. We have to note that computer is a system which is not subjects to fatigue as a human being and can perform several jobs the same dexterity as the first job executed.
The manual system of auditing also creates an opportunity for some corrupt tax officials to manipulate and falsify in order to see undue advantage. All this problem with others mentioned above generate the need for the automation of the audit procedure involved in personnel income tax system in Abia state.
Basically, the computerization components should provide technical assistance in the design, programming, listing and the complementation of a comprehensive computerized auditing system of personnel income tax administration.
1.2. HISTORICAL BACKGROUND OF THE STUDY.
This study was conceptualized on the premise that the statutory allocation formula which has remained at 24% to the state has continued to dawdle in relation terms thereby leaving the state to look inwards for internally generated revenue. That being the case efforts should be made towards changing the present manual system of tax audit so as to maximize the revenue yield available to the government. Lance the issue of misplacement of records, alteration of facts and figure and usher in improved services by tax officials. The implementation of a computerize approach could also lead to efficiency in the use of government resources as well as reducing tax evasion.
1.3. STATEMENT OF THE PROBLEM.
Auditing of personnel income system in Abia state board of internal revenue is done manually at present and stored in audit working. Sheets kept in files. The monitoring unit of the board usually stores it. The accumulation of this document in files creates low of storage problem as in lack of space, cost of fumigation to prevent attack from insect, cost of cleaning and shelving.
Equally some of the problems posed by the manual system are: - Time consumed in retrieving clients (agents) record in subsequent years (that is searching for records).
The methods of updating files making the whole exercise cumbersome and boring. There could be mistake in calculating taxpayers? income as well as taxes due from them. In order words, there could be a problem of wrong assessment; there could be delays per say in publishing audit reports due to so many processes and complicity of procedure involved (there is easy sensibility of the records of taxation other than the personnel that prepared it. There is lack of efficiently in the utilization of resource in the course of audit exercise.
1.4. OBJECTIVES OF THE STUDY
The objectives of the study are to create a new computer base system to solve problems associated with manual system. These objectives are
? To provide an efficient computer base system for easier documentation updating and retrieval of data about taxable of data about taxable employer of about in Abia state.
? To modernize the auditing system so that efficiency can be realized.
? To give a more accuracy and timely information for government decision making.
? To provide facilities for quick access to stored data giving at random in other to assist in management functions.
? To store the confidence of employer of labor in the personnel income tax system of Abia state.
? To eliminate all forms of corruption in personnel income tax auditing.
? To enhance the efficiency of the tax auditors by reducing the volume of manual operations of their disposal.
? To reduce the role of tax evasion among employers of labor.
? To eliminate piles of dusty physical files in the offices thereby keeping the office neat and a very healthy environment to work.
? Enhance the processes of auditing personnel income taxpayers and hence provide immediate result on any operation required on a tax payer?s file.
? In case of replacement or stranger personnel, it provide modern sophisticated information system which supplies both environmental and internally generated information to new personnel.
1.5. IMPORTANCE OF THE STUDY
Since the concept of the world as a global village emerged in the 90?s there has been a rapid development of computer technology in virtually all fields of human Endeavour.
An analogy between manual systems and computer systems provides a starting point for management both in private and public sector understanding of computer systems. This development has laid to the advancement of information management and hence necessitated the need to computerize that tax auditing system to meet with the present day needs of the government.
This research will equally analyze the present manual system of tax auditing and design a new system to solve the inadequacy inherent accurate and efficient means of tax auditing in Abia state.
The new system to be installed will have all the advantage of the computerize system which includes time, flexibility, interactivity and creating a good database.
1.6. SCOPE OF THE STUDY
The scope of this project is personnel income tax auditing in Abia state board of internal revenue due to the level of information technology in Nigeria, especially Abia state. There will be some manual operation to complete the auditing process area such as notification of auditing exercise will still be performed manually. Due to the time constraint as this project is for academic purpose leading to the award of national diploma (ND) after two years of academic excellence. The auditing of pay_ as_ you earn tax payers will be covered in the new system (case study).
1.7. LIMITATION OF THE STUDY.
This project work was faced with a number of restricting factors, which made the work impossible to get beyond this scope. The most pressing factors were:-
i. lack of finance
ii. epileptic power supply
iii. inadequate supply of data
iv. Inadequate time for the project work.
1.7. DEFINITION OF TERMS
AUDIT WORKING PAPERS:- these are columns sheet of paper on which records of incomes of employees of the audited companies organizations are made. They are source record documents at the top right corner of the working papers are provisions for the schedule number, name of person who prepared the working paper and the dates of the preparation. At the top left corner of the working paper is made up of serial number column 2 for names of employees, columns 3 for basic salary. Column 4-15 are for the months from January to December while column 16 is allowed two rows and handle uses of maximum of twenty (20) employees per sheet of 40 rows, the second row of the two rows per employee is used to record monthly tax deducted.
IT FORM-INCOME TAX FORM A:- according to A.C. Tabansi (2000) a. this is a form given to eligible tax payers to complete and return to the tax for their assessment on which the personnel income tax audit is based. It consists of six (6) parts named A to F. details range from personnel data of tax payers to source of income as well finally declaration and attestation to the truism of the declared income and information contained in the form.
PERSONNEL INCOME TAX:- A.C. TABANSI,(2000) explains it by saying that this represents taxes on the emoluments of employees of companies, organization and establishments. It includes the basic salary and other components such as tent, transport allowance, entertainment and other subject to a stipulated limit that is determined from government legislations. The government has been able to use tax to control; inflation and other economic problems.
SYSTEM:- this is an overused word that has several meaning to various groups of people G.D Clarke Defines a SYSTEM as an organized set of objects, elements or components that are interrelated and interdependent and have a common set of basic objective such as production and satisfaction. He opined that the elements of any system are:-
i. input.
ii. Output
iii. Process
iv. Boundaries
v. Subsystem
vi. Environment
MONITORING UNIT:- as written in the hand book this is the unit in charge of personnel income tax audit in Abia state board of internal revenue. It is headed by a principle interceptor of taxes who works in liaison with chairman board of internal revenue through the director direct taxes. He is assisted by several tax inspectors with accounting and management bias, as well as electrical officers who carry out routine assignments needed in the day to day running of the unit.
IT FORM 45:- as contained in A.C. Tabansi (2000) this is an acknowledgement slip prepared by the sender of a letter and signed by both the recipient and sender in which the recipient acknowledge the receipt of a letter requesting him to supply facts necessary for tax audit report is to be submitted as well as correspondences established between the board and outside parties.
IT FORM F3 (TAX DEDUCTION CARD):- also in A.C Tabansi (2000), the IT form f3 is a card prepared and the payer assessment section of the tax office and gives the employers of labour a guide to normal income tax deductions. The taxes deductible is based on the income declaration form. The employees gross earning, gross relief, gross tax due and monthly tax deductions are stated on the card. The tax card is given to the employee who uses it to make deductions of taxes during the year. at the end of the year, these card are batched and returned to the various tax offices in company of form H1 that is the annual return.
AUDITING:- in defining auditing it will be good to see how Ngwakwe C.1998 defines auditing; audit is a Latin word meaning ?He hears? conventionally of records and draft account produced by companies/organizations by tax auditors to enable the auditors form opinions as to the adequacy or inadequacies of the system. It also helps in ascertaining the extent of compliances to lay down rules and regulations. The end result as required by law is for the auditor to put himself in a position where he can express an opinion concerning.
? The profit and loss account of the company.
? The balance sheet gave a true fair view of the financial position at the year end.
? If the financial statement comply with the law. | CHAPTER ONE
INTRODUCTION
1.1 OVERVIEW OF THE EXISTING SYSTEM
This passenger manifest information (PMI) is a kind of records that help individual flight to organized their passenger in a flight. This record in the flight. This record help them to know the members of passenger in the flight, without their records they can known the numbers of passenger in the flight. So the passenger manifest information contained the:
(1) Full name
(2) Date of birth
(3) Social security number
(4) Emergency contact
(5) Telephone number
From passenger traveling on flight with sosoliso airline (e.g., during the sosoliso airline disaster family assistance act of December 10th 2005. this law was passed to address the difficult associated with notification of the families in the aftermath of sosoliso airline crashes). This proposal is also being issued to fulfill a recommendation contained in the initial and final report of families that has be affect in the crashes. This passenger manifest information (PMI), is used to point out identify data elements that may point to a passenger who represents a security risk. Once highlighted, analytical specialists can them manually review these records and identify those passengers who should be subjected to additional screening upon their arrival.
1.2 DESCRIPTION AND ANALYSIS OF THE EXISTING SYSTEM
This study is all about the passengers manifest information (PMI) which is a records of individual passenger in the flight.
The researcher visited sosoliso airline and find out that the passenger manifest information contained the records of passenger (e.g., full name, date of birth and or social security number, emergency contact and telephone number). Which help them to organize their flight.
The examination of the existing system to determine what must be accomplished and the best method of accomplishing the necessary operation is know as SYSTEM ANALYSIS. The stages involved in the system analysis are listed below.
(1) The type of processing to be done by the system
(2) The input data ?captured? for the system
(3) The output required
(4) The file which could be kept and used
(5) The nature of processing i.e. its logic procedure stage and frequency.
1.3 METHOD OF DATA COLLECTION
The researcher visited sosoliso airline and find out that the passenger manifest information (PMI) contained the records of passengers, which help them to organize their flight.
SOURCE OF DATA
This data is used in this research work were collected from primary and secondary source hence, they comprise of the following sources:
(1) Direct interview in (sosoliso airline)
(2) The internet
(3) Unpublished books (project)
(4) Pamphlets of general knowledge.
1.4 INTERVIEW METHOD
The researcher use the method of unstructured interview to carried out the research to know about the passenger manifest information in sosoliso airline. It ash one of the staff in the engineer department, the researcher know that the passenger manifest information contain the name, date of birth, contact address etc, of a passengers that booking for ticket to travel in a flight in the sosoliso airline company. | ABSTRACT
The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data processing and efficient information system. This will be the solution given to handle this problem by transforming the existing manual information system into an automated form and overcome the existing problems of insecurity and delay in data processing. I decided to use an automated database system to enhance
information storage and keep track of security information. Again, doing this will ensure that there is an effective security information system computerization. To achieve this, Visual Basic 6.0 is used for its implementation. | ABSTRACT
The tremendous impact of electronic technology (like computer and computer embedded devices, computer networking, artificial intelligence, multimedia among others) on the human psychological capabilities productivity, intellectuality and other human related activities are very obvious. The quest and virtual implementation of computer in all the fields of human endeavor increases with its inevitable impact, these impacts are on its increase due to the need for high quality and timely response. Therefore, this project titled, ?Design and implementation of e-learning platforms for an introduction to C++ programming language?, is aimed at exploring and incorporating some of these sophisticated technologies for the development of electronic tutorial materials. This work examines and explains the step-by-step procedure for accomplishing the development of the proposed software products, the attainment of the goals and necessary requirement for their implementation. It considers and discusses the impact of the proposed products on the targeted end-users. This project is implemented using HTML, Microsoft asp.net and SQL Server for the online learning platform tutorial application package, and an e-book |
Content | CHAPTER ONE
1.0 INTRODUCTION
Hotel is defined by British law as a place where a bonafide traveller can receive food and shelter, provided he is in a position to pay and is in a fit condition to be received. Hence, a hotel provides food and beverages, and lodging to travellers on payment. In turn, it has the right to refuse a traveller is drunk, disorderly, unkempt or is not in a position to pay for the services.
The hotel industry is perhaps, one of the oldest commercial endeavors in the world. The first inns date back to the sixth century be and were the products of the urge to travel, spurred by the invention of the wheel.
The earliest hotels were managed by husband and wife teams, who provided large halls for travelers to make their own bed and sleep on the floor. The entire cooking service and recreation were provided by the husband and wife team and his family.
It was in Europe that the birth of well managed hotel industry took place on the shape of chalets and small hotels which provided variety of services. They were mainly patronized by the aristocracy of the day.
The real growth of the modern hotel industry took place in the United State of America in 1794. the real boom in hotel building came in the early twentieth century. This period also saw the beginning of chain operation under the guidance of E.M stalker. It involved big investments, big profit and trained professional to manage the business.
The management business billing of a hotel system was virtually left in the hands of the front officers. The front office in hotels is the department responsible for the scale of hotel rooms through systematic method of reservation, followed by registration and assigning of rooms to customers, it was usually done manually. This was boring and cumbersome in hotels that still operate manually today. This development in hotel business billing system continued gradually until recently when computer was invented as an electronic method of processing data, computer can be defined as an electronic device that accept input, manipulated data and produces information which is the output, as required. Computerization of hotel business billing system: a focus on the lodging system of a hotel, therefore, the application of computer in the lodging system of a hotel. A hotel which operated a computerized system will ensure that the program carries provision for different tariffs, locations and individual guest preferences. Details of each room are stored within the memory and as a guest registers the guest list is immediately updated while that particular room is removed from the list of those which are available for letting. Because the system is so accurate, there is little chance of two people being given same room.
1.1 BACKGROUND OF THE STUDY
The lodging system of Mooted Hotels Limited Enugu started when this hotel was established in 1986. at its inception, Mooted Hotels Limited inherited three modern hotels. There were ninety three chalets at the time of its establishment. These hotels were located at Enugu, IMO, Anambra. However they have since been improved upon with additional chalets, better management and better services.
The management of Muddle Hotels Limited insists that standard obtainable in its hotels of all types compare favorably with the standards elsewhere. Each chalets is provided with a room stewards, hot and cold water tub, wall-
To-wall carpet, air conditioner, television, refrigerator and inter-com. The Cable News Network (CNN) is received in the hotels through its satellite dish. The body managing the hotel now at the apex of the management include-
1. The general manager
2. The company accountant
3. The company secretary
4. The operational managers
5. The public relations officer
6. The house keeper
7. The food and beverages manager
8. The number of staff are eighty
These are both junior and senior cadres.
1. Administration
2. Accounts
3. Restraurant
4. Bar
5. Kitchen
6. Laundry.
1.2 STATEMENT OF THE PROBLEM.
The introduction of computer in the hotel is to reduce problem encountered on arrival and event at check out time by guest?s customers and visitors to the hotel and by the reception staff on their efforts to manually attend to each guest?s requests going through the reception routine in the front office by the guest is normally frustrating and time wasting. As guest can be kept on his feet for several minutes waiting to be attended to .the billing procedures in the cashier section are similar to that of the front office. The staff at the cashier section is also limited by their human capabilities.
1.3 PURPOSE OF STUDY
The main aim of this study is design a computerized reservation entry and guest billing system for timely services. In hotel services, time is of essence.
Another objective of is to design a computerized system which will ensure that the program carries provisions for different tariffs, locations and individual guest preferences. The computer will select the best available rooms for particular reservation or offer an alternative, if the preferred room is already taken or is not yet ready. The program will be flexible enough to ensure that any special request by a guest can be catered for.
1.4 SCOPE AND LIMITATIONS OF THE STUDY
The computerization of the hotel business billing system is centered on the front office. (i.e. reception and cashier section) of the Modotel hotel limited. A lot of limitations were encounter during this study. Such limitations are:
1. Finance: this hindered my movement in the process of gathering of facts.
2. Time: this is another constraint to my undertaking a more comprehensive fact finding, since the period for this study was very small compared to the actual work.
3. Lack of textbooks: this is also another major constraint in the course of carrying out this work. One had to move one library to another.
4. Protocols: I encountered series of protocols, often called red tapism before I was granted interviews.
1.5 IMPORTANCE OF THE STUDY
There is a high hope that this project will solve those problems the reception personnel encounter on the sale of rooms in the hotel. A hotel which is computerized can, with dispatch, answer inquires and write confirmation letters for reservation, keep messages for guest?s, advice the hotel management about regular guests, improve the level of services the hotel offers to guest and monitor room services to guests. It will greatly help the reception personnel to know the number of room available and how many rooms that have been booked. This helps in updating of reservations. In a situation of efficient services, the hotel will be attractive to guest and visitors and thereby make profit.
1.6 DEFINITIONS OF PROCESSING
REAL TIME PROCESSING: Technique by which enter data for immediate processing.
ON LINE PROCESSING: Also called transaction processing,. It is the collecting and processing of data as transaction occurs.
INFORMATION: When data undergoes certain manipulations like calculation, sorting, amending etc. they eventually become useful meaningful. In other words, they become information.
DATA: Bit and pieces of fact and figures representing an idea or event needed for processing to give out information.
FIED: A unit of information containing a group of related data.
ARRIVAL: Time that a guest registers into the hotels.
ACCOMMODATION: The term simply refers to rooms.
BOOKING: Reservation of rooms.
CANCELLATION: When a room reservation is with drawn by the guest.
CHECK-IN: Arrival of a guest who has registered at the reception.
CHECK-OUT: Department of a guest who has settled his bills.
DEPARTURE: Time when a guest leaves the hotel.
DOUBLE ROOM: Room with one large- size bed.
GUEST: Person who uses the services of a hotel.
RECEPTION: Counter in a hotel that registers guests.
RESERVATION: Counter that receives documents on reservation requests.
SKIPPER: A guest who departs without paying his bill.
SINGLE ROOM: Room with one bed. | CHAPTER ONE
1.0 INTRODUCTION
In present time most households own at least one car. This figure shows that a car is very important to people?s lives as it completes the cycle of living.
This computer expert system is hoped to help those who are in need of guides to deal with their cars problems. Although it might not give a complete guide and help as a human expert, namely mechanics, at least the expert system can give temporary assistance to those who are in need of instant help, as a result of the limitation of time and distance.
1.1 BACKGROUND OF THE STUDY
With the help of a car, movement from one place to another has been made easy especially for those who are always mobile in their jobs. Cars simplify our lives and make time to be more valuable as we can save more time using the car. But at the same time, people who own cars definitely don?t want to have a problem with their cars as the troubleshooting of a car can be a nightmare to them, especially women. Some of those own a car individually don?t know how to deal with their cars whenever it has a problem. All they know is to start the engine, drag the clutch if it is not automatic, press the paddy and break when they need to. An even the worse situation is that they don?t even know how to fill the fuel tank, and that is not good. They won?t know what to do when something happens to their cars. All they can do at best is, call the mechanic for help.
So, this computer expert system is hoped to help those who are in need of guides to deal with their cars problems. Although it might not give a complete guide and help as a human expert, namely mechanics, at least the expert system can give temporary assistance to those who are in need of instant help, as a result of the limitation of time and distance.
1.2 STATEMENT OF THE PROBLEM
In dealing with problems of a car and troubleshooting, mechanics are those who can help to solve them. The use of a computer expert system is beneficial in different ways. It gives a temporary and instant guide to car owners in different situations like:
? When mechanic support is unavailable
? When we are in a hurry
? When distance to mechanics location is far
? When mechanics diagnosis wrongly, etc.
1.3 OBJECTIVES OF THE STUDY
To develop an expert system on car maintenance and troubleshooting that is capable of assisting car owners in dealing with their cars problems and troubleshooting them whenever time is limited and the human experts, also known as mechanics is not available at that very time. The development of the system surely has some significance to humans especially those who own a car and to the system developer as well. Among others, the system will perform the following functions:
? It will conclude its diagnosis based on answers of the users to specific question posed by the system to the user.
? It provides facility in order to take the user opinion on the following: does the use agree with the system?s diagnosis? Does the user disagree with the system?s diagnosis?
? It provides explanation, picture, why and fact facility.
? It stores the facts and the conclusion of the inference of the system and the facts and the conclusion of the inference of the user, for each case in data base.
? It processes the data base in order to extract rules, which complete the knowledge base.
1.4 SIGNIFICANCE OF THE STUDY
The proposed system can help inexperienced mechanics or drivers in diagnosing the fault of the car.
In addition, the system has the following benefits:
? Expert systems help in the improvement of productivity: Having this system will enable mechanics to do more work in less time.
? Expert system reduces the need for skilled mechanics: The repairs of a car require a high level of expertise. With this system, inexperienced mechanics can be guided to find the fault.
? Expert systems capture the knowledge of company experts who someday will retire, resign or die.
? Expert systems train newly lived employees to solve problem the way experienced professionals do.
? Expert system are not vulnerable to problems such as fatigue, emotion and overwork, all of which plaque human experts.
? Expert systems place expert knowledge into machine readable form, where it can be summoned at any time.
? Expert systems give consistent result.
? Expert systems can complete some tasks quicker them a human.
1.5 SCOPE OF THE STUDY
The expert system may contain certain limits and flaws, as it is only a prototype. We commonly know that a car has many parts on its body and even in the body itself. However, the system will only deal with problems that are normally or commonly found in the engine part of the car as the system is just a prototype, which means the function will be expanded through time. The system will also deal with only cars produced from the year 2000 till date.
1.6 LIMITATION OF THE STUDY
TIME: Time frame for this work is short
? Finance as a student
? Limited literature in computer to assist the researcher
? Not much work has been done in this area of computer science/ engineering.
1.8 DEFINITION OF TERMS
? Actuator: This is a device in a car that uses electricity to do sort of automated mechanical movement such as power door locks or a remote trunk opener.
? Car Sensor: This is a technological device that dictates or senses a signal or a physical condition in a car.
? Car Diagnosis: Is the identification of the nature and causes of problem in a car.
Car Brain Box: This is an electronic device that incorporates micro processors for the monitoring and control of various functions in a vehicle | | | CHAPTER ONE
1.0INTRODUCTION
National security is the requirement to maintain the survival of the state through the use of economic, security operatives especially police, political power and the exercise of diplomacy. The concept developed mostly in the United States of America after World War II focusing on the police and military might. Now, it encompasses a broad range of facets, all of which impinge on the police and military for economic security of the nation, lives property and values protected by national society. Accordingly, in order to possess national security, a nation needs to possess economic security, energy security, environmental security, etc. Security threats involve not only conventional foes such as other national states but also nonstate actors such as violent non-state actors, narcotic cartels, multinational corporations and non-governmental organizations; some authorities include natural disasters and events causing severe environmental change in this category.
The origin of the modern concept of ?national security? as a philosophy of maintaining a stable nation state can be traced to the peace of Westphalia, wherein the concept of a sovereign state, ruled by a sovereign, became the basis of a new international order of nation states.
As an academic concept, national security can be seen as a recent phenomenon which was first introduced in the United States after World War II, and has to some degree replaced other concepts that describe the struggle of states to overcome various external and internal threats. The struggle of states to overcome various external and internal threats. The earliest mention of the term national security, however, was made in Yale University in 1790 wherein was made to its relation with domestic industries.
The concept of the national security became an official guiding principle of foreign policy in the United States when the National security Act of 1947 was signed on July 26, 1947 by the U.S. President Harry S. Truman. Together with its 1949 amendment, this act create American national security d important facets for American national security as the precursor to the department of defense, subordinated the security operatives branches to the new cabinet level position of the secretary of defense, established the National Security council and the Central Intelligence Agency. The Act did not define national security which was conceivably advantageous as it?s ambiguity made it a powerful phrase to invoke whenever issues threatened by other interests of the state, such as domestic concerns, came up for discussion and decision making.
The realization that national security encompasses more than just security was present though understated, from the beginning itself.
The US National Security Act of 1947 was set up ?to advise the president on the integration of domestic security and foreign policies related to national security?.
Gen Maxwell Taylor?s essay of 1947 titled ?The Legitimate claims of
National Security? has this to say;
The national valuables in this broad sense include current assets and national interests, as well as the sources of strength upon which our future as a nation depends. Some valuables are tangible and earthly; others are spiritual or intellectual. They range widely from political assets such as the Bill of Rights, National Security and political institutions and international relations to many economic assets which radiate worldwide from a highly productive domestic economy supported by rich natural resources. It is the urgent need to protect valuables such as these which legitimizes and makes essential the role of national security.
1.1 STATEMENT OF THE PROBLEM
Security information system has always played a vital role in the stability of a nation. Keeping security information manually can hinder some defense program and delay passage of security information to the appropriate body. Manual documentation of security information can lead to exposure of the information thereby creating threat to the nation at large. Hence, there is need for an automated security information system to guaranty safety of information.
1.2 OBJECTIVES OF THE STUDY
The general objective of the study is to develop a database for security information storage and retrieval.
Specifically, the following objectives are also considered:
i. To build a database system for police security information.
ii. To develop a software for managing security information.
iii. To determine the effectiveness of Nigerian police in managing signal.
1.3 DEFINITION OF TERMS/VARIABLES
Policing: Policing is another way of depicting the police.
Anti-policing: Anti-policing is the society?s social attitude opposed to war between states and in particular countering arguments based on policism.
Databases: A systematically arranged collection of computer data, structured so that it can be automatically retrieved or manipulated. It is also called a databank.
National Security: The requirement to maintain the survival of the nation-state through the use of economic, policing, and political power and the exercise of diplomacy.
Information Security: means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.
Classified Information is sensitive information to which the access is restricted by law or regulation to particular groups of persons.
Security Management is a broad field of management related to asset management, physical security and human resource safety functions | CHAPTER ONE
1.1 Background of the study
Learning is one of the very vital human activities that require concentration blended with interactivity, clear and distinct understanding of the facts been stated or discussed, high communication skills and techniques, attractive learning qualities such as colorful pictorial presentations of information among others. Nevertheless, all not learning process is considered to be effective. Effective could be assumed to had been achieved if about hundred percent (100%), of the population lectured assimilate the knowledge and/or ideas across; this is quite different when the population size is very high and there is existences of certain un-conducive learning conditions such as noise, poor ventilation, and extreme temperatures.
For effective learning to take place, it is dependent on many factors. In most cases, these factors arise from the teachers, the students, the teaching and learning media or materials, and the learning environment with its structures. For instance, if a teacher lacks communication skills and techniques, the students, will find it difficult to comprehend, if the necessary media or materials required for teaching and learning is not provided or if the provision is inadequate, the understanding of the subject topic or issue been discussed might be impaired. In addition, the duration for teaching and learning, the rate of understanding and individual learning style effect the assimilation of knowledge by the students; and may have impact on the extent to which the teacher covers the teaching scheme. These factors will, certainly, hamper the effective teaching and learning by the teacher and by the students respectively (see figure 1 in appendix).
Most especially, the factors affecting effective learning is pronounced in learning aspects where intensive or much practical approach is required for the impacting of knowledge to the students. For example, in computer science much practical knowledge is required especially in computer networking, computer programming, and computer maintenance. The practical equipping of students are been affected by certain factors such as the duration for practical teaching and learning, inadequate computers, availability of computer laboratories, and poor power supply among others. As a result it is generally observed that most computer science students with little or no practical knowledge engages the service of the road side ?computer training institute? due to the fact that it is not financially intensive and there is great need for the services, this approach, by such student has high tendency of impacting wrong knowledge on students especially on the terms and explanation of concept s found or used in the computer science world. Therefore, there is the need to reduce this different situation and ensure that the practical standard required of the students is attained.
The progress made in the computer world through the development of sophisticated hardware, software, and other technologies could be employed for the remedy of the situation. Exploring the powerful capabilities of multimedia and implementing it on teaching and learning processes via the production of learning material and products such as e-book, computer assisted learning (CAI), computer aided instruction(CAT), computer based training(CBT), internet based training among others would go a long way towards improving the advancement of the practical and theoretical knowledge of the students. With high quality content value of the e-learning products and the captivating multimedia features embedded in them, a student can easily, assimilate such knowledge (even in the absence of a teacher and the required physical environment) through repetitive
Accessing of the e-learning materials and following the animated instructions contained therein. Finally, the case study computer science department, federal polytechnic nekede, owerri is selected due to its proximity.
1.2 STATEMENT OF THE PROBLEM
It is very obvious that it is required of the computer science students to be practically and theoretically sound so as to face the challenges to be encountered in the labor market. Disappointingly, most of the computer science students are not equipped as expected before lunching them into the labor market.
Often time, the students are found to be the highest set of customers patronizing most of the side ?computer training institute? and in turn, might not get the value of services they requested. This situation had been ascribed to many claims, in most occasions, had been made by both students and teachers on the pattern of teaching and learning respectively .for instance, the students claim the greater percentage of the teachers have poor teaching communication skills, and likewise the teachers blame the inadequate teaching and learning facilities and/ or infrastructure as the reason for ineffective learning.
Hence, the problem centers on effective teaching and learning processes for the impacting and the advancement of the students? theoretical and practical knowledge.
1.3 OBJECTIVES OF THE STUDY
owing to the difficulties experienced during teaching and learning processes, this project is aimed at implementing e-learning through the development of a web site expected to be published over the internet, a CAL application package that will be installed in a computer, and on e-book in portal document format (PDF); this is to provide different remedy platforms for the shortcoming found in the traditional teaching and learning procedures.
Focusing on the above, the objectives of the study are to develop e-learning applications that are capable of:
I. providing coherent instruction for the selected subject topics
II. Accommodating individual learning style.
III. Encouraging learning and mastering of the individual topic contained therein.
IV. Enhancing the students practical knowledge and broaden their theoretical knowledge.
V. Creating a more interacting learning process.
VI. Overcoming most factors affecting effecting learning such as noise.
VII. Promoting students concentration during learning.
VIII. Accommodation learner?s unrestricted learning schedule.
IX. Promoting quick assimilation of information.
X. Providing accurate and high quality content value.
1.4 SIGNIFICANCE OF THE STUDY
This project uses the combination of multimedia features, little artificial intelligence features, and human ?computer interaction principles for the development of a web site for an online and implementation offline implementation of e-learning. Both of the e-learning are designed for the learning of c++ programming language at its introductory level. These proposed e-learning avenues are deviations from the traditional teaching and learning procedure, and as a result have their main importance as follows:
i. Effective learning of the subject topic by the students- the traditional classroom methods have high tendencies of responding to the many factors affecting effecting learning (see table 1 in the appendix for more information). But with the adoption of e-learning, these factors may exist with little or no impact on the learner. Hence, this project is focused on developing e-learning application that will be captivating through the provision of different learning platforms and skillful use of multimedia which will lead to the enhancing of effective learning and reduction of teachers teaching work load.
ii. Cost of learning materials-could be reduced significantly when compared to the cost of traditional learning materials or the cost of conventional instructional system. This is, however, accomplished in this project by providing free access with limited content value to the user.
iii. Reduction in the duration of teaching and learning, and strengthening of teachers effort-according to some research, the training time could be reduced up to sixty percent (60%) as against the traditional classroom method using e-learning products. (khoo, 1994). These, in turn, increase the rate of knowledge assimilation and allow the teachers to direct more effort on other areas where the students are deficient. This is basically achieved in this project the use of certain technological features such as the multimedia features.
Apart from these main importance of the study, other reasons like protecting the students from assimilating wrong information passed on by the quack, the inadequate learning and teaching materials, difficulties to have access to information on time, and the general factors affecting effective learning could take care of.
1.5 SCOPE OF THE STUDY
The proposed e-learning products are targeted for the attainment of effective learning through the use of interactive presentations. Further, the products are expected to be used by computer science students with little or no pre-knowledge of c++ programming language. The product contents are structured to accommodate novice in computer programming and their usage are not limited to computer science students alone but to students of other disciplines who wish to have basic fundamental knowledge on programming using programming language.
In the development of the proposed products, certain security consciousness likes piracy where moderately considered while some security measures like password were implemented. Each of the proposed e-learning products have different security requirement. On the side of the e-learning application package, password usage was implemented for discriminating the premium users from the free users. The internet application is designed to have an open unrestricted accessibility; this is to boost products awareness and marketing. The e-book is created in portal document format (PDF) so as to ensure content authenticity. Nonetheless, the three e-learning products do not implement any strong piracy security due to the fact that day after day more sophisticated hardware and software are developed which, in the contrary reason for their development and usage, used for computer product piracy. Finally, the physiological and cognitive impact of the proposed e-learning products on their users have their scope for achieving them limited to the use of multimedia features and interface design. This is one of the most important tasks required to be embedded in the products. In this learning application package, this is accomplished through the use of help menu and help animations, the internet application accomplishes the same task through the use of hyperlinks, flash animations, and still images while the e-book made use of hyperlinks and still images.
1.6 LIMITATION AND DELIMITATION OF THE STUDY
Apart from the usual risk and limitation present in every project due to time, scope, quality and financing, a major limitation arises from the gathering of information or data from the concerned individuals with fair and un-bias judgment of the proposed e-learning products. Many of the individual, especially the expected users, were unwilling to give feedback on the impact of the proposed products on them while some other will prefer to give haphazard information which tantamount dirty data. In addition, the tendency of receiving unfair and bias information and materials (which ranges from reference materials to development support devices) required for actualizing the proposed e-learning products specifications posed a great impediment to the study. Nevertheless, in the attempt to overcome these impediments, the research work of other scholars and practitioners were used in conjunction with the result of my project research evacuation and analysis. This approach is adopted to ensure accurate and good developmental practices
Considering the multi-tasking nature of the project, much time and financial resources are required. Owing to this fact, specifications of the proposed e-learning products were adjusted to suit the available financial budget allocated to it and which is obtainable. However, efforts were made, towards retaining the e-learning products quality, accomplishing of the projects objectives and completion of the project within the specified period of time.
1.7 DEFINITION OF TERMS
Software ? a set of logical related program modules that are given to the computer for the accomplishment of a specific task or asset of task.
Program module ? this is made up of one or more program procedure, routine, function, or events that handle a definite task or set of task.
Program procedure ? a set of program codes that response to a particular action such as click or could be called for execution from another program procedure depending on its scope.
Program routine ? see program procedure.
Program function ? this is of ascribe to program procedure that is used for accomplishing a specific task, especially mathematical operations, whenever call for execution. See also program procedure.
Program event ? see program procedure.
Program- a set of logical related instruction codes that is given to the computer which enables it to perform a specific task or events.
Application ? this is synonymous to application software or application package. Application software is a class of software that runs on an operating system and its design to handle a specified task related to any human career.
Operating system ? it is a set of logical related programs which enables the computer to manage its resources. The resources which it manages are hardware components.
System software ? this is a class of software that are made up of other suit of software designed to enable the computer handle its resources and carry out some set of task. The system software comprises of operating system, program translators, editors and utility programs.
Translator ? this is synonymous to program translator or language translator or programming language translator. This is software whose function is to translate or transform program codes written in one programming language level to another (from high level programming language code to low level programming language codes). A translator could be an assembler, an interpreter or a compiler.
Dirty information ? this is also known as dirty data. It is information that does not conform to the directives for its supply. Example: supplying your date of birth as against date of employment using the title finger instead of ring finger in a finger print which requires ring finger.
High level programming language ? this is a class of programming language that is much closer to human language. It requires program translator for its codes to make meaning and be executed by the computer. Examples of high level programming language are BASIC, JAVA, HTML, C++ and PASCAL.
BASIC ? this is a high level programming language, is very simple and less difficult to learn and use. It can come in the form of command oriented programming language e.g. QBasic or could come in the form of object oriented programming language e.g. visual basic.
HTML ? this is one of the programming languages which could be used for developing web documents.HTML stands for hypertext markup language. Other languages that could be for web development are XML (extended markup language) and XHTML (extended hypertext markup language).
Programming language ? this is a set of operation of grammatical rules (syntax or protocol) use for written and developing instructional codes given to the computer for task performance.
Programming language application software ? this is application software designed to allow the user write and develop program and/or application using a particular programming language. For instance, visual Basic programming language.
Interpreter ? this is a kind language translator that translates high level programming codes equivalent and at the same time executes the program codes line after line, this is achieved if and only if the line of code is error free.
Compiler ? this is a kind of language translator that translates high level programming language code into its low level programming language codes equivalent and makes it executable only if this entire program code is error free.
Low level programming language ? this is a class of programming language that requires language translators for it to be understandable by the computer. This class of programming language has the characteristics of machine independency, easer to debug and comparatively show during program execution. Example, Basic, FORTAN, java, Pascal, C, C++ among others.
Debug ? this refers to detecting and correcting or removing errors contained in a source program.
Source program ? this is a set of program codes that contains the instructions and response to events. It is usually used in guiding the computer on the reaction to take place or the specific task to carryout for a given action. The source program codes are usually executed by the computer and are not to be seen by the user especially if the target program is application software.
User interface ? the environment that is seen by the end-user of application software which allows the end-user to make use of it.
Event ? An action that is made by the computer system though its input devices or software.
Object code ? codes that are displayed as a result of executing the sources program or the source codes. Object codes are displayed on the user interface.
Media ? these are those things, materials or tools used for storing and delivering of information or data. Media can also imply channels, links or materials that convey data or information.
Learning media ? learning materials that convey information to a student or from which a student can extract knowledge from. Example, textbooks novels, among others.
Multimedia ? as applied to this project, it is media and content that uses a combination of different content forms.
Contents ? information and experiences that may provide value for end-user.
Content form ? this refers to the way information or content is been presented. The different features of the multimedia forms its content forms. Example audio, video, text, among others.
Content value ? this refers to the usefulness of information contained in media.
End-user ? also known as user. this is an individual or an organization that make use of finished product or for whom a product is designed and developed.
Hardware ? this is a physical component of a computer that could be touched or felt. Example visual display unit (VDU).
CAL ? this stands for computer Assisted learning. It is an application package that is designed to enable the user learn a particular subject through the provision of tutorial that may or may not companied by questions. CAL is popularly called tutorial software. CAL is very close to CAI and could be used interchangeable, but in some cases, might not mean exactly the same.
CAI ? this is an abbreviation of computer aided instruction. It is an application package that is designed to enable the user learn and/or get acquainted with a specific subject or an aspect of life.CAI, in most cases, is a simulation of real life event or true appearance of the subject for which for the user is to be educated on. Most CAI comes in the form of examination preparatory tutorials like TOEFL (test of English as a foreign language) and safety training tutorials like military combat training. Computer game is not always regarded as a CAI application rather entertainment application software.
Project ? this is finite endeavor having started and completion dates undertaken to create quantifiable product. It is made up of series of job to be completed individually within the time duration allocated such a project.
Project completion time ? those resources or inputs that are required for accomplishing a project. The major project resources are human materials and financial resources.
Data collection ? the act of gathering information or data from different sources within the problem defined set. Data collected are processed and the information used for validating the proposed product of the project.
Problem defined set ? the population set for which an evaluation must be made to verify the impact of the proposed product. For instance, the problem defined set for this project are the students (especially, the computer science students) and instruction ( the instructor who wishes to introduced to C++ programming language) |