The modern African is caught in a predicament. On the one hand, they are heirs to a rich and vibrant culture that has stood the test of time.
Continue reading
This blog will explore the progress, politics, economy, social issues, education, poverty, and empowerment of Africa. It will provide a platform for discussion and debate on these important issues. The goal of this blog is to promote understanding and awareness of Africa, and to contribute to the development of a more prosperous and equitable continent.
What is the sense in telling our children not to speak in Igbo languages? Is that not stupid and self-defeating?
Continue readingRestructuring is not an emotional issue, but a political imperative for Nigeria
Continue readingMost of the life-changing inventions and discoveries that have propelled mankind
Continue readingFlowcharting is one of the first tools used in analyzing an existing business process. The purpose of a flowchart is to document the tasks within a particular process, and their sequencing, visually.
Continue readingOn this page, we show you a visual representation of each of these flowchart symbols along with their names and a brief description.
Continue readingNnewi in the past two decades has grown considerably not only in size and infrastructural development but also as a
Continue readingAbstract: Air pollution tolerance indices (APTI) were analysed in 2 plants (Telfairia occidentalis and Ocimium gratissimum) growing on farm sites
Continue readingThis paper looked into various fault attacks on symmetric-key ciphers and came up with solutions to counteract the attacks.
Continue readingThis
paper proposes a new system JDCE, where compression is
provided to the data twice before encrypted it for getting it
ready for transmission.
The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image
generated by this method can be very in size as the original image due to image scaling to make 128 bits block at a time and is suitable for
practical use in the secure transmission of confidential information over the Internet.
Image encryption, Block cipher, Decryption
Continue readingThe research draws from past/recent concerns that
have negatively impacted archaeology and its practice in the country. Much of the data for
this research has been elicited from primary and secondary sources.
In this paper, we have set up a network in which the Transmission Control Protocol (TCP) is its
end-to-end transmission protocol. We have analyzed the congestion window size with different methods.
The purpose of this study is to examine the congestion control algorithms implemented by TCP. The article
presents a number of scenarios to examine these algorithms. We have tested the scenarios for FTP that
transfers files of 1MB and 10MB sizes. The simulation results show the performance and effect of the file’s size.
The performance parameters in this work are: Sent Segment Sequence Number, Received Segment Ack Number
and Congestion Window Size. The OPNET Modeler simulation results show a good estimation of the traffic
examined in the network.