Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

A Sedimentologic And Stratigraphic Study Of The Maastrichtian-Pateocene Sediments In Yuil Area, Bauchi State

ABSTRACT The Maastrichian-Paleocene sediments in Yuli area me composed of the Gombe Sandstone and the Kerri-Kerri Formation. They cover 400 square kilometres have a thickness of more than 100 metres. Six stratigraphic sections were studied, representing the entire stratigraphic succession of the Gombe Sandstone in the Yuli area, The formation has a thickness of about 30 metres in the studied area. The Gombe Sandstone consists of folded beds of sandstone, siltstone and mudstone. The sandstone ...

Determination Of Total Petroleum Hydrocabon In Sediment From Qua Iboe River Estuary

ABSTRACT The petroleum hydrocarbon composition of sediments from Qua Iboe River Estuary, Ibeno, South-Eastern Nigeria, was studied to determine the levels of these hydrocarbons in the marine environment. Ten sediment sites were sampled using a van veen Grab sampler. Chemical parameter, such as total organic carbon (TOC), was assessed using Blackey-walkey titration method. Soluble organic matter (SOM) was assessed using sohxlet extraction method and total petroleum hydrocarbon (TPH) was asses...

Catalyst Development From Locally Available Resources - (A Case Study Of Nickel-Silica Catalyst)

ABSTRACT The efficacy of silica obtained from our local sand as a carrier in synthesis of Nickel-Silica catalyst was investigated. Six samples of soil were collected from two different sites (comprising five white coloured samples collected from Iva valley, lower part of Milliken hill, namely: pottery 2 (P2), down iva (DI), run-off iva (ROI), pottery rock (POR), white chalk (WTC) and one brown coloured sample (UdS) collected from Udi Siding) in Enugu, Nigeria. Prior to treatment by flotation...

Synthesis And Characterization Of Some Core-Shell Oxide Materials

ABSTRACT Core-shell oxide thin films of TiO2/MnO, TiO2/CoO, TiO2/NiO and TiO2/CuO have been successfully synthesized and deposited on glass substrates, using the chemical bath deposition [CDB] technique. To ensure uniform coating, surface pre-treatment was carried out by cleaning slides with detergent, deionised water, ammonia acid and rinsed with acetones. The core of the films was synthesized from TiCl3, NaOH and PVA while the shells were synthesized from MnCl2.4H2O, CoCl2.6H2O, NiSO4 and ...

Optimal Allocation Of Farm Tractors: A Case Study Of Benue State Tractor Hiring Agency (BENTHA)

ABSTRACT Benue State Tractor Hiring Agency (BENTHA) is usually confronted with the problem of determining the optimum number of tractors to be allocated to different zones in the state. The number of tractors allocated to a zone is normally decided without any proper study of tractor needs of the zones. Sometimes allocation is based on merely political considerations. The problem of allocation is formulated and heuristic procedures are applied to optimally allocate the limited tractors.

Total Alkaloids, Total Tannins Content And Antiulcer Assay Of Four Selected Medicinal Plants.

ABSTRACT The total alkaloid, tannins contents and antiulcer activity of the extracts from four selected medicinal plants were investigated. The total alkaloids content (TAC) was evaluated according to the chloride colometric method in which atropine was used as standard. While the total tannins content (TTC) was also determined using Folin Ciocalteau assay in which gallic acid was used as a standard. The antiulcer activity of the extracts was investigated using the ethanol induced model in w...

University Student Project Tracker (USPT)

Abstract Over the years, we have had complaints of people copying someone else’s project directly as his/her own. Therefore, this project is aimed at solving the problem of copyright as identified during seminar presentations, project defense etc in schools. To solve the above mentioned problem, this application is developed to capture relevant information of all project works undertaken and completed in the department. The application is an off-line tracking system; it will be installed o...

An Investigation On The Techno-human Influence On Examination Information Security Management A Case Of Three Kenyan Universities

The use of and reliance on information systems for business has been on the rise especially in recent years. This has had a serious impact on the security of business information. Previous studies have identified two areas that must be considered when creating a secure information system: technology and human compliance to policies. Many researchers have stated that technology vulnerabilities are a key source of weakness and data loss in many information systems in organizations. Additio...

Crime Reporting And Intelligence System: Case Of Buruburu Police Division-nairobi

Security problems have become a major concern in most urban settlements across the globe. The use of technology can be incorporated into the security systems to enhance operational measures that have been deployed. The aim of this study was to examine the challenges stakeholders face in crime reporting and develop a mobile-based system that would support intelligence collection and real-time reporting. The study employed design science to develop the proposed system. Primary data was col...

Acquisition Of Cloud Data Remnants In Android Smart Phones

Smart phones are powerful minicomputers characterized by high performance, large memory capacity and enhanced applications that enable various ways of communication. They are widely used for other purposes besides making phone calls, for instance browsing the internet, reading and responding to emails, road navigation, editing documents, video conferencing, playing music, taking videos and photo, to mention but a few. The problem at hand is that forensic investigators often encounter diff...

An Investigation Of The Factors That Influence The Adoption Of Secure Cryptographic Qr In Counterfeit Goods Authentication: A Case Of Nairobi

The purpose of this study was to investigate the factors influencing adoption of secure cryptographic QR application by focusing on alcohol vendors who engage in the business of selling alcoholic beverages in Nairobi and its environs. This research was based on four specific objectives which were: to study the influence of cryptographic embedded QR code characteristics on the adoption of secure QR technology; influence of merchant attitudes; government factors on adoption of secure QR; a...

A Low Cost System For Logon Anomaly Detection Based On Time And Location Of Users

The purpose of this research was to develop a low cost system for identifying logon anomalies based on the time a user provides login credentials and also the physical location of the workstation on the LAN. The specific objectives of the project were (i) to evaluate how logon anomalies based on physical locations have been addressed in the literature (ii) to develop specifications, design and implement a solution to address the problem of determining the physical location of a logon eve...

Multi-tiered Security Architecture For Information Infrastructure Protection In Selected Commercial Banks In Kenya.

Information technology evolution and the spread of internet connectivity have enabled globalization which allows communication and transaction of businesses across different countries. To ensure information infrastructure protection, understanding how the organizational, individual and technical aspects all together affect the outcome in information security is important. Having the necessary skill required to be able know how to react or what action to take in the event of a security in...

Developing An Ipv6 Adoption Measurement Model: A Case Of Selected Internet Service Providers In Kenya

With the growth of the Internet and the increase in number of online devices, IPv4 address space approaches exhaustion. This has led to the deployment of IPv6. However, IPv6 has not been widely adopted, particularly in Kenya. According to Akamai (2016) IPv6 has an adoption rate of 0.02% in Kenya despite recent studies showing that adoption is increasing in some parts of the world. Some of the shortcomings of the current methods of measuring IPv6 adoption are: (a) There is limited informa...

The Adoption Of Data Visualization Techniques In Humanitarian Organizations

The aim of the study was to investigate the influence of data visualization techniques on the overall adoption of data visualizations in humanitarian organizations with reference to Danish Refugee Council, UNOCHA, IOM, IFRC, and DDG. The study established the influence of data visualization techniques, user’s requirements as well as the important features of data visualization in humanitarian organizations. The research design adopted by the study was descriptive where through a purpos...


541 - 555 Of 1999 Results