Nnewi in the past two decades has grown considerably not only in size and infrastructural development but also as aContinue reading
Abstract: Air pollution tolerance indices (APTI) were analysed in 2 plants (Telfairia occidentalis and Ocimium gratissimum) growing on farm sitesContinue reading
This paper looked into various fault attacks on symmetric-key ciphers and came up with solutions to counteract the attacks.Continue reading
paper proposes a new system JDCE, where compression is
provided to the data twice before encrypted it for getting it
ready for transmission.
The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image
generated by this method can be very in size as the original image due to image scaling to make 128 bits block at a time and is suitable for
practical use in the secure transmission of confidential information over the Internet.
Image encryption, Block cipher, DecryptionContinue reading
The research draws from past/recent concerns that
have negatively impacted archaeology and its practice in the country. Much of the data for
this research has been elicited from primary and secondary sources.
In this paper, we have set up a network in which the Transmission Control Protocol (TCP) is its
end-to-end transmission protocol. We have analyzed the congestion window size with different methods.
The purpose of this study is to examine the congestion control algorithms implemented by TCP. The article
presents a number of scenarios to examine these algorithms. We have tested the scenarios for FTP that
transfers files of 1MB and 10MB sizes. The simulation results show the performance and effect of the file’s size.
The performance parameters in this work are: Sent Segment Sequence Number, Received Segment Ack Number
and Congestion Window Size. The OPNET Modeler simulation results show a good estimation of the traffic
examined in the network.
Data Security Using Private Key Encryption System Based on Arithmetic Coding -The problem faced by today’s communicators is not only security but also the speed of communication and size of content. In the present paper, a scheme has been proposed which uses the concept of compression and data encryptionContinue reading
Teaching methods at the University level are supposed to emanate from the Nigerian National Policy on Education and stated curriculum, which have been found to affect learning outcomes significantly.Continue reading