Plant transformation mediated by Agrobacterium tumefaciens, a soil plant pathogenic bacterium, has become the most used method for the introduction of foreign genes into plant cells and the subsequent regeneration of transgenic plants. This review focuses on the host recognition and the process of gene transfer from Agrobacterium tumefaciens to plant cells which implies several essential steps.
ABSTRACT Electric energy needs to be transported to the distribution lines through cords. One of the major issue in power transmission is the losses occurs during transmission and distribution process of electrical power due to the energy dissipation in the conductor and equipment used for transmission. As the demand increase day by day, the power generation and power loss are also increased. In addition, the cost of making electricity is harmful to the environment. Reducing transmission lo...
ABSTRACT Food poisoning is one of the common health problems globally especially in African countries usually due to the inability to enforce food safety principles. When disease-causing bacteria, viruses or parasites contaminate food, they can cause food- related diseases. Such a bacterium, virus or parasite is known as pathogen. Food poisoning is the diseases caused by these pathogens when a contaminated food or drink is consumed. Other contaminants include natural occurring toxins and he...
TABLE OF CONTENTS CHAPTER ONE INTRODUCTION CHAPTER TWO LITERATURE REVIEW CHAPTER THREE MATERIALS AND METHODS
INTRODUCTION Of all the plant on which man has depended for his food, cereal grains are by far the most important. Since recorded history, cereals grains are the seed by cultivated grasses that include wheat, corn, 0at, barley, rye, rice, sorghum and millet. There are a number of reasons why cereals have been important in man’s diet. They can be grown in areas with diverse climatic and soil conditions. They give yield peracre (0.4ha) as compared to most other crops and once har...
ABSTRACT "Biometrics" means "life measurement" but the term is usually associated with the use of unique physiological characteristics to identify an individual. The application which most people associate with biometrics is security. However, biometrics identification has eventually a much broader relevance as computer interface becomes more natural. Knowing the person with whom you are conversing is an important part of human interaction and one expects computers of the future to have the s...
ABSTRACT In the higher institution, it is the duty of the management to provide the students with conducive environment for learning. In a country like Nigeria, the number of students in higher institutions is quite massive. In a situation like this, the management of the some of these higher institutions may be tempted to admit more students than can manage. This may put the welfare of the students of risk. Over the years, the students’ welfare/affairs departments of most schools in N...
ABSTRACT A high-level programming language developed by Sun Microsystems. Java was originally called OAK, and was designed for handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take advantage of the burgeoning World Wide Web. Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are...
ABSTRACT Debugging is a necessary process in almost any new software or hardware development process, whether a commercial product or an enterprise or personal application program. For complex products, debugging is done as the result of the unit test for the smallest unit of a system, again at component test when parts are brought together, again at system test when the product is used with other existing products, and again during customer beta test, when users try the product out in a real...
ABSTRACT Interest is a fee paid by a borrower of assets to the owner as a form of compensation for the use of the assets. It is most commonly the price paid for the use of borrowed money, or money earned by deposited funds. When money is borrowed, interest is typically paid to the lender as a percentage of the principal, the amount owed to the lender. The percentage of the principal that is paid as a fee over a certain period of time (typically one month or year) is called the interest rate...
ABSTRACT This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations. This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer...
ABSTRACT The United Nations has designated 1981 the International Year for Disabled Persons. It is therefore appropriate that Computer is dedicating its first issue of the year to computing and the handicapped. The evolution of low cost computing technology promises an unprecedented spectrum of opportunities for the developmentally disabled. From aids to independent living to flexible tools that can greatly increase the variety and quality of job opportunities, the rapidly evolving field of c...
ABSTRACT Cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote "Conjugate Coding", which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Unc...
ABSTRACT Power system stabilizers (PSS) must be capable of providing appropriate stabilization signals over a broad range of operating conditions and disturbance. Traditional PSS rely on robust linear design method in an attempt to cover a wider range of operating condition. Expert or rule-based controllers have also been proposed. Recently fuzzy logic (FL) as a novel robust control design method has shown promising results. The emphasis in fuzzy control design center is around uncertainties...
ABSTRACT Various proposals, including improved analog connectors, hybrid digital-plus-analog approaches, and several all-digital interfaces have been put forth since the early 1990s. One, the Digital Visual Interface (DVI), which is available in analog plus digital and digital-only forms, has seen reasonable success in higher-end PC products, but has not managed to take the majority of the market from the VGA. Concerns over image quality, the near-complete replacement of the CRT by LCDs and ...