Flowcharting is one of the first tools used in analyzing an existing business process. The purpose of a flowchart is to document the tasks within a particular process, and their sequencing, visually.
Continue readingAuthor: Anthony-Claret Onwutalobi
Flowchart Symbols: What they Represent?
On this page, we show you a visual representation of each of these flowchart symbols along with their names and a brief description.
Continue readingAn Assessment of Commercial Real Estate Performance as an Investment Option in Nnewi, Anambra State, Nigeria
Nnewi in the past two decades has grown considerably not only in size and infrastructural development but also as a
Continue readingAir Pollution Tolerance Indices (APTI) of Some Edible Plants Exposed to Industrial Effluents at Nnewi in Anambra State, Nigeria
Abstract: Air pollution tolerance indices (APTI) were analysed in 2 plants (Telfairia occidentalis and Ocimium gratissimum) growing on farm sites
Continue readingA Review of Faults Attack on Symmetric Key Cipher and Appropriate Counter Measures
This paper looked into various fault attacks on symmetric-key ciphers and came up with solutions to counteract the attacks.
Continue readingA Novel Approach of Speedy-Highly Secured Data Transmission using Cascading of PDLZW and Arithmetic Coding with Cryptography
This
paper proposes a new system JDCE, where compression is
provided to the data twice before encrypted it for getting it
ready for transmission.
A New Image Encryption Algorithm Based Slicing and Displacement Followed By Symmetric and Asymmetric Cryptography Technique
The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image
generated by this method can be very in size as the original image due to image scaling to make 128 bits block at a time and is suitable for
practical use in the secure transmission of confidential information over the Internet.
A New Approach For Image Cryptography Techniques
Image encryption, Block cipher, Decryption
Continue readingDemonstration of the Congestion Control Algorithms Implemented by TCP
In this paper, we have set up a network in which the Transmission Control Protocol (TCP) is its
end-to-end transmission protocol. We have analyzed the congestion window size with different methods.
The purpose of this study is to examine the congestion control algorithms implemented by TCP. The article
presents a number of scenarios to examine these algorithms. We have tested the scenarios for FTP that
transfers files of 1MB and 10MB sizes. The simulation results show the performance and effect of the file’s size.
The performance parameters in this work are: Sent Segment Sequence Number, Received Segment Ack Number
and Congestion Window Size. The OPNET Modeler simulation results show a good estimation of the traffic
examined in the network.
Understanding MOST analysis
MOST analysis is a strategic planning tool that helps organizations define their mission, objectives, strategies, and tactics. It is a simple but effective way to ensure that all levels of the organization are aligned and working towards the same goals.
Continue reading