Natural & Applied Sciences

Research Papers/Topics in Natural & Applied Sciences

REMOTE ELECTRICITY BILLING SYSTEM AUTOMATION AND IMPLEMENTATION -EJB (A CASE STUDY OF NEPA)

ABSTRACTWith the advance in technology more in particular in the field of computer related organization, a lot of things are now automated. As a matter of fact, Information technology has a vital role in the design and implementation of water billing system.Almost all the big organization are developing their billing system because of the extraordinary benefit resulting from information technology. Information technology has enabled water billing system to work successfully.  To ease the...

DESIGN AND IMPLEMENTATION OF A COMPUTER BASED BILL OF MATERIAL PROCESSING SYSTEM.

ABSTRACT It has become very necessary to computerize the bill of material processing system in Nigeria due to the impact it has on the overall efficiency of the organization. This project undertakes the computer-based bill of material processing system of Nigeria. An in-depth study of the existing manual system is done and the problems encountered are noted.  The need for a system is justified. The new system is designed to solve the problems encountered in the old system. Informati...

REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY (CASE STUDY OF PRESSURE WORLD CAFEE )

ABSTRACTMany techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multigrade authenticat...

READING AND WRITING AVI FILE USING STEGANOGRAPHY

ABSTRACTThe video stream in an AVI file is nothing more than a sequence of bitmaps. This article is about extracting these bitmaps and re-building the stream, in order to hide a message in the video. Before reading this article, you should have read at least part one, Steganography - Hiding messages in the Noise of a Picture. This one uses the application described in parts 1-3, but you don’t need the extended features to understand it. TABLE OF CONTENTSTitle page ...

Microbial Profile of Vegetable "Daucus carota"

ABSTRACTFresh healthy carrot promote good health but harbour a wide range of contaminants. To assess the microbial quality of carrots sold in Ibadan, a total of fifteen samples were purchased from five vendors. Samples were analyzed to study the density of microorganisms by standard plate count.                                                         &nbs...

QUIEVE: CONSISTENT OBJECT SHARING FOR EDGE SERVICE

ABSTRACTWe present Quiver, a system that coordinates service proxies placed at the edge of the Internet to serve distributed clients accessing a service involving mutable objects. Quiver enables these proxies to perform consistent accesses to shared objects by migrating the objects to proxies performing operations on those objects. These migrations dramatically improve performance when operations involving an object exhibit geographic locality, since migrating this object into the vicinity of...

DESIGN AND IMPLEMENTATION OF AN ONLINE OBJECTIVE TEST

ABSTRACTComputers are known for their wide range of uses especially in scientific and mathematical fields.  However little or no thought has been given to designing a complete and through intelligence test on a computer system in out immediate environment.  Although in advanced countries, where computerized games have been developed, computers have proved that they constitute of ways of indirectly testing intelligence. This system is designed in order to implement intelligence test ...

DESIGN AND IMPLEMENTATION OF A PROTOCOL SEQUENCER AND SUBSYSTEM INTERFACE: ADMINISTRATOR TOOL WHICH WILL MONITOR APPLICATION ON A LAN PROVIDE FUNCTIONS (CASE STUDY OF NETWORKING TRAINING)

ABSTRACTA local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) or...

Night vision technology

ABSTRACTThis seminar describes the various Night vision techniques. hence "Night Vision" is referenced to as technology that provides us with the miracle of vision in total darkness and the improvement of vision in low light environments. This technology is an amalgam of several different methods each having its own advantages and disadvantages. The most common methods described here are Low-Light Imaging, Thermal Imaging and Illumination’s. This paper also give brief idea about various nig...

PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSIONS

ABSTRACTThe deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This paper compares three potential approaches to DNS key validation. A tree based approach utilizes the existing structure of the DNS tree to form highly structured key signing rules. This makes following chains of trust simple, but it allows no flexibility for individual zones and makes incremental deployment impossible. A pure web of trust based approach impose...

PROTOCOL SCRUBBING NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION (CASE STUDY OF PRESSURE WORLD CAFE)

ABSTRACTThis work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network flows into well-behaved flows that are unequivocally interpreted by all downstream end-points. The fingerprint scrubber restricts an attacker&#03...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED PROPERTY MANAGEMENT SYSTEM (A CASE STUDY OF ENUGU NORTH LOCAL GOVERNMENT AREA)

ABSTRACTThis project lays emphasis on the contribution a computerized property management system in Enugu North Local Government Area and how the computer can be programmed to record property management system and computations so as to eliminate the abuse and fraudulent activities associated with manual methods of property management system. The study of this project is to design a new system that will be more efficient and will provide timely information and a special data input or enquiry. ...

OPTIMAL MULTICAST ROUTING IN MOBILE AD HOC NETWORK

ABSTRACTMulticast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack of redundancy, multiple paths and multicast tree structure. Tree graph optimization problems (GOP) are usually difficult and time consuming NP-hard o...

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED FINANCIAL MANAGEMENT SYSTEM FOR PUBLIC INSTITUTIONS (A CASE STUDY OF UNTH, ENUGU)

ABSTRACT The proper management and utilization of financial resources has over the years been the bed rock of growth, expansion and continual existence of the world most popular industries and business organizations. In contrast, the liquidation of once popular organizations is dependent on the allocation and improper utilization of financial resources used in the running of these organization. However, due to the inadequacies and imperfection of human beings, a lot of problems such as misa...


1381 - 1395 Of 1729 Results