In the past two decades, Nnewi has grown considerably, not only in size and infrastructural development but also as a commercial town to reckon with…
Abstract: Air pollution tolerance indices (APTI) were analysed in 2 plants (Telfairia occidentalis and Ocimium gratissimum) growing on farm sites surrounding three industries: Lead-acid battery…
This paper looked into various fault attacks on symmetric-key ciphers and came up with solutions to counteract the attacks.
This paper proposes a new system JDCE, where compression is provided to the data twice before encrypted it for getting it ready for transmission.
The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image generated by this method can be…
Image encryption, Block cipher, Decryption
The research draws from past/recent concerns that have negatively impacted archaeology and its practice in the country. Much of the data for this research has…
In this paper, we have set up a network in which the Transmission Control Protocol (TCP) is its end-to-end transmission protocol. We have analyzed the…
MOST analysis is a strategic planning tool that helps organizations define their mission, objectives, strategies, and tactics. It is a simple but effective way to…
The modern African is caught in a predicament. On the one hand, they are heirs to a rich and vibrant culture that has stood the…