Research Papers/Topics in Computer / Mathematics

Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network

AbstractOne major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it bec...

Computer Malware Propagation and Control

A major grief of network and data security experts and consultants universally is about the capabilities of infectious malicious proxies (Malware) to overrun the whole systems on networks stations in order to inflict mayhem encompassing identity theft, financial scam and systemic digital assault on infrastructures and national resources. In this work, we studied the interactions of two vulnerable classes with the infected and recovered terminals on the systems network and the active use of an...

Variations Iteration Method for Solving Delay Differential Equation/Numerical Analysis

ABSTRACT   A  powerful  and  effective  numerical  tool  called  the  Variational  Iteration Method  has  been  used  to  solve  various  kinds  of  differential  equations  over  the years. Though the Variational Iteration Method has not been used solely to solve various  kinds  of  differential  equations  as  it  has  always  been&n...

INFORMATION TECH

An  article on Information Technology

R Program to Calculate Mathematical Interest Theory

R program that calculate mathematical interest theory such as dollar weighted yield rate, time weighted yield rate, simple and compound interest  and all others.

Design and Implementation of Human Resource Management System

ABSTRACT The Employee Human Resource Management and Payroll System is an integrated system that encompasses managing all resources associated to employee such as recruitment details, payment and issues pertaining employee records processing. It is develop to eradicate the errors emanating from manual processing of staff record. Moreover, it provide employee Bio data, staff voucher preparation.TABLE OF CONTENTTitle              &...

COMPUTER MADE EASSIER: DIAMOND COMPUTERS

What is computer?Computer can be defined as an electronic device that operates under the control of instruction that is installed in its memory units.It can also mean an electronic device that receive data as an input, process and bring out the result as an output.With the definition above, one can understand that computer is just a device (electronic device) which operate and control other parts.What is computer system?Computer system like any other system is the combination of internal that...

THE EFFECTS OF ICT AND ITS APPLICATION

BACKGROUND OF STUDY Chandrasekhar (2001). Information Communication Technology are defined, for the purposes of this primer, as a “diverse set of technological tools and resources used to communicate, and to create, disseminate, store, and manage information.” These technologies include computers, the Internet, broadcasting technologies (radio and television), and telephony.Information and communications technology is often used as an extended synonym for information technology , &nb...