Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

PARASITIC COMPUTING

ABSTRACT Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program. The example given can also be two computers communicating over the Internet, under disguise of a standard communications se...

RAID TECHNOLOGY

ABSTRACT RAID is now used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple physical drives. The physical drives are said to be in a RAID, which is accessed by the operating system as one single drive. The different schemes or architectures are named by the word RAID followed by a number (e.g., RAID 0, RAID 1). Each scheme provides a different balance between two key goals: increase data reliability and increase input/output performance. R...

PROSPECTS OF CLOUD COMPUTING IN NIGERIA

ABSTRACT Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, ech...

RADAR TRACKING SYSTEM CONCEPT AND APPLICATION

ABSTRACT A classical rotating air surveillance radar system detects target echoes against a background of noise. It reports these detections (known as "plots") in polar coordinates representing the range and bearing of the target. In addition, noise in the radar receiver will occasionally exceed the detection threshold of the radar's Constant false alarm rate detector and be incorrectly reported as targets (known as false alarms). The role of the radar tracker is to monitor consecutive update...

SPEECH RECOGNITION TECHNOLOGY

ABSTRACT Speech recognition (also known as automatic speech recognition or computer speech recognition) converts spoken words to text. The term "voice recognition" is sometimes used to refer to recognition systems that must be trained to a particular speaker—as is the case for most desktop recognition software. Recognizing the speaker can simplify the task of translating speech. Speech recognition is a broader solution that refers to technology that can recognize speech without being...

THE ANTIBACTERIAL ACTIVITY OF THREE TYPES OF MEDICATED SOAPS ON STARHYROCOCCUS AUREUS FORM WOULD INFECTIONS

ABSTRACT The antibacterial activity of three type of medicate soap on staphylococcus aureus isolated from wound infections was conducted. Fifty individual with would infection within the age range of 9-73 years were sampled. Swabsticks were used to collect specimens from wound infection. each swabstick was streaked separately over plates of nutrient   and  macconkey agar and later incubated at 370c. out of the fifty (50) individuals sampled 25(50%) were mostly infected with staphylococcus ...

THE PREVALENCE OF STREPTOCOCCUS PNEUMONIA IN PNEUMONIA PATIENTS IN ENUGU METROPOLI A CASE STUDY OF UNTH ENUGU.

ABSTRACT The prevalence of streptococcus pneumonia in pneumonia patients using university of Nigeria Teaching Hospital (UNTH) Enugu as a case study was carried out based on the fact of the pneumonia is one of the commonest afflictions of the aged people and children worldwide. A total of 50 samples were collected. 12 (24%) of the sample were from sputum while 38 (76%) were from nasopharyned swabs from children who can not produce sputum using sterilized disposable swab sticks. 12 (24%) of th...

UNDERSTANDING THE FILE ALLOCATION TABLE [FAT] IN WINDOWS

ABSTRACT The File Allocation Table of contents of a computer disk which tells what sectors are used for what file. The File Allocation Table ( also know as FAT, FAT16, and FAT32 ), is located in the master boot sector (first 63) of a bootable disk, floppy or hard. You visually cannot see this. The FAT follows the boot sector.  The FAT file system revolves around the File Allocation Table for which it is named. Each logical volume has its own FAT, which serves two important functions: it cont...

USEFULNESS OF AN ENTERPRISE APPLICATION

ABSTRACT Enterprise software describes a collection of computer programs with common business applications, tools for modeling how the entire organization works, and development tools for building applications unique to the organization. The software is intended to solve an enterprise-wide problem (rather than a departmental problem) and often written using an Enterprise Software Architecture. Enterprise level software aims to improve the enterprise's productivity and efficiency by providin...

Using The Computer System In Crime Investigation

ABSTRACT Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the ...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CAREER GUIDANCE INFORMATION SYSTEM

ABSTRACT Computers are known for their wide range of uses especially in scientific and mathematical fields.  However little or no thought has been given to designing a complete career guidance information system.   This system is designed in order to implement intelligence test on a computer system.  It tries as much as possible to incorporate the important aspect of intelligence on a wide scale.  It is designed to test intelligence of secondary school leavers using the Senior School Cert...

Design And Implementation Of Computerized Hotel Management Information System (Hotel)

ABSTRACT This project deals with “Hotel management information system†it deal with the system of all the management and information needs of the different section of a hotel.  Most time, the hotel I runs into problem of getting necessary information in the sections of registration of guest, guest booking and reservation, check in and check out process of a guest, and other section of the hotel use the accounts and security section. This study led to the development of “Hotel...

DESIGN AND IMPLEMENTATION OF WEB BASED RECRUITMENT PORTAL (A case study of Nigeria Civil Service Commission Enugu)

ABSTRACT Web based recruitment portal is a web based application that monitors the recruitment process of any organization online.  It has the features that allow the user to apply for job online.  When application is sent through the web portal, based on the requirement of the said job description, the portal screens the candidate and determines whether or not the applicant is qualified.  If the applicant is not qualified, the portal rejects the application and returns a feedback to the u...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED BANKING SYSTEM (A CASE STUDY OF UNITED BANK FOR AFRICA)

ABSTRACT In this world of competitive resource application and technological development, the banks have been totally computerized. This project work Design and Implementation of computerized banking system is concerned with the analysis and design of a computerized system aimed at supporting the whole banking operation provides an interface which enables the user or the customer to lodge in money into his or her account and make withdrawals as the need arises. It will also provide the basis ...

BLUETOOTH AND INFRARED TECHNOLOGY

ABSTRACT Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 15,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents is required to implement the technology and are only licensed to t...


7381 - 7395 Of 8203 Results