Abstract This study is aimed at determining the concentration of gold in the gold ore in lujinjimubende district. Currently investing in gold mining is taken as a riskyinvestmentbecause people are not sure of the concentration of gold in lujinji and also the depth where gold concentration is high. The results of this research gave the concentration of gold in lujinji and also the depth of high concentration from the surface, which eased the mining activity by extracting gold at a known height...
Cyber security is a fast growing pace in the society today and as a result of that, its growth is becoming more and more widespread. According to the 2015 (ISC) Global Information Security Workforce Study, a shortfall of 1.8 million cybersecurity jobs will happen by 2022 cite mat 1. Allegedly, the most common reason for this fact is the lack of qualified personnel. As a consequence of this trend even in education sector, Information Technology (IT), Cyber space, Online platform, medical field...
SYNOPSIS Quality control can be seen as the activities that sustain the quality of a product in order to satisfy a given requirement or meet certain standards. (McGraw-Hill Dictionary, 2003). It is applicable in all phases of the production cycle. In food products, qualities such as composition, structure (molecular, microscopic and macroscopic), physicochemical and sensory attributes are all analyzed. These analyses are carried out both to satisfy customers’ and meet regulatory stan...
ABSTRACT Tree Based Integrated Food-energy System is a farming system that combines food crops and trees for wood energy production on the same farm. This farming system aims at producing both food and wood energy on the same piece of land through sustainable crop integration and agro-systems. Therefore, this study was aimed at examining how this system can promote the livelihoods of small-holder farmers in Kenya, with particular focus on Chuka Igambang’ombe Sub-county in Tharaka Nithi Cou...
ABSTRACTIt is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a mess...
Abstract It is a fact that all people need food and cannot live long without eating enough of it. It is this fact that the researcher has decided to establish the Impact on Health and Nutrition on the Performance of Pre-Primary School in Thegu location Kieni East District; the research is based on finding out the relationship that exist between feeding and the academic performance of the ECE children. The researcher based her research in children Thegu location randomly selected schools and ...
ABSTRACT The recent irregular trends in weather patterns have brought about challenges and opportunities in key sectors of the economy especially in developing countries. Agriculture and tourism are just but examples of these sectors that have been widely impacted by climate variability. Countries as Kenya where agriculture and tourism are the leading earners of the economy has seen a downhill scale in the recent years and climate variability is one of the factors that can held responsible. ...
Abstract/Overview Conditional cash transfers are increasingly becoming a best practice in the social sector for developing countries. In 2004, Orphans and Vulnerable Children Cash Transfer was introduced on pilot basis in Kenya. This was in response to the impact of HIV/Aids on children. A study carried out by Kenya National Bureau of Statistics (2006) show poverty rates tend to be higher among vulnerable groups such as children (53.5%), including orphans and vulnerable children (54.1%). Ken...
Abstract/Overview Conditional cash transfers are increasingly becoming best practice in the social sector for developing countries. In 2004, Orphans and Vulnerable Children Cash Transfer was introduced on pilot basis in Kenya. This was in response to the impact of HIV/Aids on children. A study carried out by Kenya National Bureau of Statistics (2006) show poverty rates tend to be higher among vulnerable groups such as children (53.5%), including orphans and vulnerable children (54.1%). Kenya...
Abstract The 21st century has seen a world where almost everything is carried out by digital or electronic means—signalling an end to the traditional approaches. People nowadays transact businesses over the internet due to convenience and accessibility. Taking full advantage of the internet, most institutions especially the financial institutions have also digitalized their services. For this reason, there has been a dramatic increase in the number of online banking and shopping customers....
ABSTRACT With the advent of digital age, it is inevitable for Real estate’s organizations to reinforce securitr measures to protect data form loss, unauthorized viewing or corruption. The need to secure stored data and data on transit in a nenvork birthed, and also to ensure data is managed and controlled with efficient measures, to avoid redundancy, inconsistency, mcompatible file formats and fixed queries among other limitations of paperwork. The gist of this project revolves around data...
ABSTRACT This research work structured in five chapters is centered on the effects of small scale enterprises on socioeconomic development of Vandeikya town of Benue state, Nigeria. Findings have revealed that individual and group enterprises are the common types of small scale enterprises operated in Vandeikya town. It also showed that the start up capital of these enterprises mostly come from personal savings, loan from banks and support from the government. Findings had discovered proble...
Background to the study Globally, the issue of security, peace and development is at the centre stage of local,national and international discourse. States, especially developing ones are constantly insearch for security, (Barry, 1983). Nigeria is post-colonial state in its form and Post – colonialstate is tied to the offshoot of imperialism. Over the years, different governments, individualsand institutions in Nigeria have systematically�...
ABSTRACT Trans-border co-operation in the mitigation of maritime insecurity has remained a veritable and time-honoured measure for the control of illicit maritime activities the world over. Essentially, this is because of the trans-boundary character of such criminal activities. The resource-laden Gulf of Guinea region has remained largely under-utilized because of the high incidence of piracy, sea banditry and illegal, unreported and unregulated (IUU) fishing within the maritime domain. Thi...
ABSTRACTSafety of food is a basic requirement of food quality. A total of 25 street food samples (Jollof rice, egwusi soup, ugu, water leaf and green), were randomly purchased from five different vendors in Ogbete main market Enugu. The samples were transported in ice to the laboratory. The samples were bacteriologically analyzed using pour plate technique and sub-culture. Pour plate techniques was done by carrying out serial dilution of the sample after which the first tube and the last tube...