Natural & Applied Sciences

Research Papers/Topics Natural & Applied Sciences

The antibacterial effect of the leaf extract of buchhozia coriacea

Abstract: This study was aimed at determining the antibacterial effect of the leaf extract of Buchholzia coriacea (Wonderful Kola) on nasal isolates. Nasal isolates were collected from one hundred students of the Delta State Polytechnic, Ogwash-uku, Delta State. The antimicrobial activity of the methanolic extract of the leaves was assessed against nasal isolated microorganisms (E.coli, Citrobacter species, Klebsiella species, and Proteus species) using the agar well diffusion method. Inh...

Evaluation of polycyclic Aromatic Hydrocarbons and Selected Heavy Metals Levels in Water around Zaakpon, Rivers State

                      Abstract Polycyclic aromatic hydrocarbons, heavy metals and physiochemical parameters were measured in water samples from zaakpon community. The results shows that most of the parameters in water were within safe limits except turbidity, potassium and Phosphate while PAHs concentrations in water were below detection limit

CLOUD BASED TRAIN TICKETING SYSTEM FOR NIGERIAN RAILWAY

The author proposes to build a unique and easy to use train ticketing system with QR code for my final year project using cloud infrastructure. The system allows users to register and as soon as they register an account with unique id is created in the system. User may book or buy tickets and fare is calculated according to station distance. The cloud server allows for handling a large number of users using efficient computing power. It allows for efficient and fast computing for ticket costs...

Corrosion Inhibition of 5-Methyl-2H-imidazol-4-carboxaldehyde and 1H-Indole-3-carboxyaldehyde on Mild Steel in 1.0 M HCl: Gravimetric Method and DFT Study

Abstract Weight loss and Density Functional Theory (DFT) methods were used to study the corrosion inhibition of 5-methyl-2H-imidazol-4-carboxaldehyde and 1H-Indole-3-carboxaldehyde on mild steel in acid medium. The values of thermodynamic parameters such as free energy of adsorption (ΔGºads), adsorption equilibrium constant (Kads), adsorption entropy (ΔSºads), adsorption enthalpy (ΔHºads) and activation energy (Ea) were calculated and discussed. The adsorption process on mild steel surf...

Excess lifetime Cancer risk and Radiation Pollution hazard indices in rocks and soil of some selected mining sites in Nasarawa State, Nigeria

Radiation exposures from mining and mineral processing  industries can lead to high incidence of disease conditions like  nausea, lung cancer, sterility, fatigue, and diarrhoea among mine workers. The concentration of primodial radionuclides (238U,  232Th and 40K) in some selected mining sites in Nasarawa State,  Nigeria, was examined in this study. Soil and rock samples from  eight different mining sites were collected and analyzed for  radionuclides activity concentration by gamma ray...

How Uber works

Ab overview of the Uber business model

A Preliminary Study on the Effect of Storage Period on Flavour Profile and Consumers’ Acceptability of Tsire, a Nigerian Stick Meat

Tsire is a popular Nigerian stick meat commonly produced by grilling of sliced and spicedbeef meat hanged on tips of sharpened sticks. The process of grilling initiatescharacteristic flavour development in the product, making it appealing to consumers.Unfortunately, sellers of the product do not usually exhaust their sales and product may beleft over till second day or more. This may adversely affect the flavour appeal andacceptability of the product. In the present study, the flavour compoun...

Numerical Solution of a One-Dimensional Second Order Macroscopic Traffic Flow Model with a Source Term.

The study of traffic models has given rise to many models with the aim of realistically determining the behavior of traffic. The dynamics of the macroscopic traffic flow is modeled by a partial differential equation, where the object of study is to determine the density of traffic flow. We derived a second order macroscopic traffic flow model equation from a first order one using the Fick’s law of diffusion. We formulated second order macroscopic traffic flow model equation with a sourc...

Use of Information and Communication Technology (ICT) in Management of Students Academic Records: Case Study of Federal University of Technology Minna, Niger State Nigeria

ABSTRACT The study investigated the Use of Information and Communication Technology (ICT) in Management of  Students’ Academic Records in Federal University of Technology, Minna, Niger State. The study was guided by five research objectives and five research questions. Survey research design was used for the study. The study consists of a total population of 16,934 students and staff of F.U.T, Minna; a sample size of 376 was used based on the Krejice and Morgan table for determining sample...

A Review on the Medicinal Uses of Sunflower (Helianthus Annuus) Oil

ABSTRACT Sunflower   (Helianthus   annuus  L.)   is   a   genus   of   plants   comprising   about   70 species. It is famous for its unique nature of heliotropism and is the world’s most important source of oil. Around the world, sunflower production is 31.1m tons,with more than 26 ha under sunflower cultivation. Sunflower stalks have been used as fuel, fodder for livestock, food for poultry, and ensilage. Sunflower seeds were and still are eaten raw, roasted, cooked, ...

EVALUATION OF THE SUPPRESSIVE EFFECT OF THE ESSENTIAL OIL OF TITHONIA DIVERSIFOLIA ON PLASMODIUM BERGHEI IN LABORATORY MICE

ABSTRACT The evaluation of the anti malarial properties of the essential oil extract of Tithoniadiversifolia was carried out using the standard tests suppressive tests in laboratorymice.   The   Swiss   albino   mice   were   infected   with   rodent   malaria   parasite(Plasmodium berghei berghei) and were treated with 300mg/kg, 600mg/kg and1200mg/kg   dose   of the   oil   extracts.   The  result   showed   that   the  oil  extract  ofTithonia divers...

Pathophysiology of Ebola virus

ABSTRACT  Ebola virus, a member of the Filoviridae virus family, is still an untamed, highly lethal viral pathogen that represents a nightmare for much of central Africa, which is the site of the majority of EBOV outbreaks (Geisbert et al.2010). Unfortunately there has not been a large push in the search for a vaccine as this virus, as deadly as it is, has not impacted a large portion of the world’s population with only 2,300 reported cases of hemmorraghic fever caused by filoviruses. On a...

ENHANCING MOBILITY CAPACITY AND NETWORK PERFORMANCE OF CLIENT-SERVER ARCHITECTURES USING MIPV6 HOST-BASED NETWORK PROTOCOL

  ABSTRACT A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years.  The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special equipment and infrastructure needed to support network mobility management, it is difficult to deploy such networks beyond the local network co...

Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network

Abstract One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studi...

Computer Malware Propagation and Control

A major grief of network and data security experts and consultants universally is about the capabilities of infectious malicious proxies (Malware) to overrun the whole systems on networks stations in order to inflict mayhem encompassing identity theft, financial scam and systemic digital assault on infrastructures and national resources. In this work, we studied the interactions of two vulnerable classes with the infected and recovered terminals on the systems network and the active use of an...


7486 - 7500 Of 8855 Results
@