The modern African is caught in a predicament. On the one hand, they are heirs to a rich and vibrant culture that has stood the test of time.Continue reading
What is the sense in telling our children not to speak in Igbo languages? Is that not stupid and self-defeating?Continue reading
Restructuring is not an emotional issue, but a political imperative for NigeriaContinue reading
Most of the life-changing inventions and discoveries that have propelled mankindContinue reading
Flowcharting is one of the first tools used in analyzing an existing business process. The purpose of a flowchart is to document the tasks within a particular process, and their sequencing, visually.Continue reading
On this page, we show you a visual representation of each of these flowchart symbols along with their names and a brief description.Continue reading
Nnewi in the past two decades has grown considerably not only in size and infrastructural development but also as aContinue reading
Abstract: Air pollution tolerance indices (APTI) were analysed in 2 plants (Telfairia occidentalis and Ocimium gratissimum) growing on farm sitesContinue reading
This paper looked into various fault attacks on symmetric-key ciphers and came up with solutions to counteract the attacks.Continue reading
paper proposes a new system JDCE, where compression is
provided to the data twice before encrypted it for getting it
ready for transmission.
The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image
generated by this method can be very in size as the original image due to image scaling to make 128 bits block at a time and is suitable for
practical use in the secure transmission of confidential information over the Internet.
Image encryption, Block cipher, DecryptionContinue reading
The research draws from past/recent concerns that
have negatively impacted archaeology and its practice in the country. Much of the data for
this research has been elicited from primary and secondary sources.
In this paper, we have set up a network in which the Transmission Control Protocol (TCP) is its
end-to-end transmission protocol. We have analyzed the congestion window size with different methods.
The purpose of this study is to examine the congestion control algorithms implemented by TCP. The article
presents a number of scenarios to examine these algorithms. We have tested the scenarios for FTP that
transfers files of 1MB and 10MB sizes. The simulation results show the performance and effect of the file’s size.
The performance parameters in this work are: Sent Segment Sequence Number, Received Segment Ack Number
and Congestion Window Size. The OPNET Modeler simulation results show a good estimation of the traffic
examined in the network.