Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

COMPUTING FOR THE HANDICAPPED

ABSTRACT The United Nations has designated 1981 the International Year for Disabled Persons. It is therefore appropriate that Computer is dedicating its first issue of the year to computing and the handicapped. The evolution of low cost computing technology promises an unprecedented spectrum of opportunities for the developmentally disabled. From aids to independent living to flexible tools that can greatly increase the variety and quality of job opportunities, the rapidly evolving field of c...

USING CRYPTOGRAPHY IN INFORMATION TECHNOLOGY

ABSTRACT Cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote "Conjugate Coding", which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Unc...

DESIGN OF POWER SYSTEM STABILIZER USING FUZZY LOGIC

ABSTRACT Power system stabilizers (PSS) must be capable of providing appropriate stabilization signals over a broad range of operating conditions and disturbance. Traditional PSS rely on robust linear design method in an attempt to cover a wider range of operating condition. Expert or rule-based controllers have also been proposed. Recently fuzzy logic (FL) as a novel robust control design method has shown promising results. The emphasis in fuzzy control design center is around uncertainties...

BACTERIAL CONTAMINANTS ASSOCIATED WITH COMMERCIAL POULTRY FEED FROM THREE DIFFERENT COMPANIES

ABSTRACT The bacterial contaminants associated with commercial poultry feeds from three companies in Nigeria (vital, Guinea and Top) were studied using streak plate techniques.  The culture media used were Nutrient agar and Mac Cokey agar.  The aim/ objective of the study is: To ascertain the microbial safety of commercial poultry feeds produced by companies.  To isolate microorgaisms that are contaminants of poultry feeds, to identify the bacterial types and to determine the microbial lo...

CURRENT TRENDS ON PC MONITORS AND TV

ABSTRACT Various proposals, including improved analog connectors, hybrid digital-plus-analog approaches, and several all-digital interfaces have been put forth since the early 1990s. One, the Digital Visual Interface (DVI), which is available in analog plus digital and digital-only forms, has seen reasonable success in higher-end PC products, but has not managed to take the majority of the market from the VGA. Concerns over image quality, the near-complete replacement of the CRT by LCDs and ...

DESIGNING TRANSACTION PROCESSING SYSTEM FOR A BUSINESS ORGANIZATION

ABSTRACT A transaction processing system is a type of information system. TPSs collect, store, modify, and retrieve the transactions of an organization. A transaction is an event that generates or modifies data that is eventually stored in an information system. To be considered a transaction processing system the computer must pass the ACID test. The essence of a transaction program is that it manages data that must be left in a consistent state, e.g. if an electronic payment is made, the am...

DISASTER EARLY WARNING SYSTEM

ABSTRACT If warnings can be provided efficiently and reliably as input to private dissemination systems, and if the public perceives a value and desire to receive these warnings, then private enterprise has a clear mandate to justify the development of new distribution systems or modification of existing systems. The technology exists not only to add such a feature, but to have the local receiver personalize the warnings to say, for example, “Tornado two miles southwest of you. Take co...

THE EFFECT OF PESTICIDES DICHLORODIPHENYL TRICHLOROEYHANE (D.D.Y) AND BENZENE HEXACHRORIDE (BHC) ON THE MICROFLORA OF THE THREE TYPES OF SOIL.

ABSTRACT The effect of pesticides, chchlorodipheny trichloroethane (DDY) and Benzene hexaxhoride (BHc) on the  microflora of the three types of soil (loamy, clay and sandy soil) was conducted. The serial dietitian technique was employed up to 10-3 using nutrient agar, potato dextrose agar and sabourand agar plates. The isolation of both bacterial and fungal organisms were made  before treating the soil types with the two pesticides), D.D.T and BHC.  and after treating the soil types with ...

ELECTRONIC PAYMENT SYSTEM SECURITY

ABSTRACT Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The symmetric key cryptosystem RC5 can protect conventional transaction data such as account numbers, amount and other information. This process can be done elect...

EMPLOYEE MANAGEMENT SYSTEM

ABSTRACT This work entitled “Employee Management System†has been designed towards improving the Management of Employee Information in the field offices of acompany. It maintains Seniority, Leave Records, Transfer & Postings and other basic information of Employee. Various MIS reports can be generated through it Viz. Ever since man discovered the computer, attempt has been made to computerize every facet of human life. This work expresses the issue of designing and implementing an E...

ERROR DETECTION AND CORRECTION IN DATA COMMUNICATIONS USING PARITY BIT AND CYCLIC REDUNDANCY CHECK

ABSTRACT The distance over which data moves within a computer may vary from a few thousandths of an inch, as is the case within a single IC chip, to as much as several feet along the backplane of the main circuit board. Over such small distances, digital data may be transmitted as direct, two-level electrical signals over simple copper conductors. Except for the fastest computers, circuit designers are not very concerned about the shape of the conductor or the analog characteristics of signa...

FACE RECOGNITION TECHNOLOGY

ABSTRACT Recently face recognition is attracting much attention in the society of network multimedia information access. Areas such as network security, content indexing and retrieval, and video compression benefits from face recognition technology because "people" are the center of attention in a lot of video. Network access control via face recognition not only makes hackers virtually impossible to steal one's "password", but also increases the user-friendliness in human-computer interacti...

FACTORS AFFECTING THE SPEED OF INTERNET ACCESS

ABSTRACT Today’s crucial information networks are vulnerable to fast-moving attacks by Internet worms and computer viruses. These attacks have the potential to cripple the Internet and compromise the integrity of the data on the end-user machines. Without new types of protection, the Internet remains susceptible to the assault of increasingly aggressive attacks. A platform has been implemented that actively detects and blocks worms and viruses at multi-Gigabit/second rates. It uses the...

FLAT FILE DATABASE SYSTEM VS RELATIONAL DATABASE SYSTEM

ABSTRACT Determining the type of database to be deployed for a project is a combination of access requirements and preference. In an effort to make an informed decision on which to deploy, the application engineer should be familiar with the types of databases as well as the pros/cons of each. In this entry we will consider two general types of databases and explore some of their applications and key points in the decision cycle when faced with a project. A "flat file" database allows the use...

HOW TO IMPROVE SECURITY ELECTRONIC VOTING

ABSTRACT The on-line voting system ensures that each intended voter is checked whether he/she is registered or not, if he/she is not registered, the system refuses him voting.  Also it checks whether he/she has voted for that particular election.  This on-line voting system prevents a situation where a particular candidate seizes the voters’ cards, and uses them to vote for himself.  Hence the rigging associated with the manual voting systems has been completely handled.  The syste...


7306 - 7320 Of 8160 Results