ABSTRACT This work is carried out to identify and discuss the need for a computer system in hotel business billing system. A hotel business is a hospitality industry which caters for both leisure and well being of its guest. The duties of hotels are to offer accommodation to their guest and to render services to them. These services are usually personal. The focus on this topic is to introduce computer in the allocation of rooms and billing system of a hotel. The current process of billing is...
ABSTRACT This study was undertaken to assess the contributions of teachers’ knowledge of Curriculum Characteristics, value internalization and commitment, perception of adequacy of facilities, equipment and materials, and degree of performance of implementation roles/behaviours to achievements in Junior Secondary Certificate Examination in Home Economics. Effect of state and teachers’ qualification on achievement in the same examination was also assessed. The study employed ex-post facto ...
INTRODUCTION Hajia Gambo Sawaba General Hospital since its inception in 1975 has received considerable amount of people, for treatment medical advice, family planning and a host of other reason. Different categories of people have patronized the hospital for its efficiency. It is therefore in the best interest of the researcher to use his or her knowledge of statistic application is the attendance of ill health (patients) attending the hospital. It does not and here the research as will lo...
ABSTRACT The characteristics of publish/subscribe technology are of synchronism and loosely coupled. This phenomenon makes producers and consumers are de-communicated in temporal and spatial domains during processing. It requires develop a dynamic integration in today's large-scale, distributed information system. This paper introduces a Semantic Integration Data Model (SIDM) for publish/subscribe systems, within which model subscription module is designed. The model contains a matching algor...
ABSTRACT An efficient and distributed scheme for file mapping or file lookup is critical in decentralizing metadata management within a group of metadata servers. This paper presents a novel technique called Hierarchical Bloom Filter Arrays (HBA) to map filenames to the metadata servers holding their metadata. Two levels of probabilistic arrays, namely, the Bloom filter arrays with different levels of accuracies, are used on each metadata server. One array, with lower accuracy and representin...
ABSTRACT The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. However, the nongeographic PTNs coupled with the anticipated large number of mobile user’s in future mobile networks may introduce very large centralized databases. This necessitates research into the desig...
ABSTRACT We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic natu...
ABSTRACT Wireless hotspots are typically implemented using 802.11 APs. Each AP typically operates on a single, administrator-configured wireless channel. Each client associates with a single AP and subsequently interacts with this AP alone, on the AP’s configured channel. As a basic design rule, APs within radio frequency (RF) range of each other are set to different ‘non-overlapping’ channels. Proper assignment of channels to APs is important so that the network can take full advantage...
ABSTRACT Digital watermarking is the process by which identifying data is woven into media content such as images, movies, music or programming, giving those objects a unique, digital identity that can be used for a variety of valuable applications. Imperceptible to the human senses yet easily recognized by special software detectors, a digital watermark remains constant even through recording, manipulation and editing, compression and decompression, encryption, decryption and broadcast witho...
ABSTRACT We analyze a class of randomized Least-Recently-Used (LRU) cache replacement algorithms under the independent reference model with generalized Zipf’s law request probabilities. The randomization was recently proposed for Web caching as a mechanism that discriminates between different document sizes. In particular, a requested document that is not found in the cache either replaces a necessary number of least recently used documents with probability depending on its size or the cach...
ABSTRACT On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology changes are unpredictable. In this paper, we propose proactively disseminating the broken link information to the nodes that have that link in their c...
ABSTRACT Electronic circuit simulation uses mathematical models to replicate the behavior of an actual electronic device or circuit. Simulation software allows for modeling of circuit operation and is an invaluable analysis tool. Due to its highly accurate modeling capability, many Colleges and Universities use this type of software for the teaching of electronics technician and electronics engineering programs. Electronics simulation software engages the user by integrating them into the lea...
ABSTRACT File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books. It may be implemented through a variety of storage, transmission, and distribution models and common methods of file sharing incorporate manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of ...