Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

Internet Security

ABSTRACT This chapter describes security threats that systems face when they are connected to the Internet. We discuss their security requirements, potential security threats and di erent mech-anisms to combat these. In addition, the text presents the two most popular protocols (SSL and its successor TLS) to secure data transmitted over the Internet. Finally, we describe well-known applications such as Secure Shell (ssh) and Secure File Transfer Protocol (sftp) that provide a reasonable level...

TIME SERIES ANALYSIS ON PATIENT ATTENDANCE (A CASE STUDY OF GENERAL HOSPITAL KOFAR GAYAN, ZARIA)

INTRODUCTION  Hajia Gambo Sawaba General Hospital since its inception in 1975 has received considerable amount of people, for treatment medical advice, family planning and a host of other reason. Different categories of people have patronized the hospital for its efficiency. It is therefore in the best interest of the researcher to use his or her knowledge of statistic application is the attendance of ill health (patients) attending the hospital. It does not and here the research as will lo...

IMPACT OF COMPUTERIZED PHYSICIAN DOCUMENTATION IN SOME SELECTED GOVERNMENT AND PRIVATE HOSPITALS IN KANO STATE

ABSTRACTThe objective of this research is to find out the impacts of computer usage by physicians in Kano State and this is likely to increasingly replace handwritten documentation in other institutions. The population consisted of the physicians in Kano state hospitals. A questionnaire was designed and administered among 26 physicians using a simple random sampling technique. Simple percentage was used to analyze the research questions.The study found out that the physicians in Kano state ne...

Recycling of water sachet

ABSTRACT Wastes generally render our environment unfriendly and the worst of them all are those wastes that are non-biodegradable and as such, wastes of these forms (non-biodegradable) pose a serious threat to our environment. One of these categories of non-biodegradable wastes is pure water sachets. They are found in virtually every part of Nigeria and various attempts have been made to biodegrade these pure water sachets. One of these attempts was carried out by Nwachukwu S.et al (2010) in...

DESIGN AND IMPLEMENTATION OF DISTRIBUTED SYSTEM SIMULATOR FOR PUBLISH-SUBSCRIBE MODEL

ABSTRACT The characteristics of publish/subscribe technology are of synchronism and loosely coupled. This phenomenon makes producers and consumers are de-communicated in temporal and spatial domains during processing. It requires develop a dynamic integration in today's large-scale, distributed information system. This paper introduces a Semantic Integration Data Model (SIDM) for publish/subscribe systems, within which model subscription module is designed. The model contains a matching algor...

DISTRIBUTED METADATA MANAGEMENT FOR LARGE CLUSTER-BASED STORAGE SYSTEMS

ABSTRACT An efficient and distributed scheme for file mapping or file lookup is critical in decentralizing metadata management within a group of metadata servers. This paper presents a novel technique called Hierarchical Bloom Filter Arrays (HBA) to map filenames to the metadata servers holding their metadata. Two levels of probabilistic arrays, namely, the Bloom filter arrays with different levels of accuracies, are used on each metadata server. One array, with lower accuracy and representin...

DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT-GENERATION MOBILE NETWORK

ABSTRACT The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. However, the nongeographic PTNs coupled with the anticipated large number of mobile user’s in future mobile networks may introduce very large centralized databases. This necessitates research into the desig...

DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOL FOR DYNAMIC PEER GROUP

ABSTRACT We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic natu...

DISTRIBUTED CHANNEL MANAGEMENT SYSTEM

ABSTRACT Wireless hotspots are typically implemented using 802.11 APs. Each AP typically operates on a single, administrator-configured wireless channel. Each client associates with a single AP and subsequently interacts with this AP alone, on the AP’s configured channel. As a basic design rule, APs within radio frequency (RF) range of each other are set to different ‘non-overlapping’ channels. Proper assignment of channels to APs is important so that the network can take full advantage...

DIGITAL WATER MARKING FOR VIDEO PIRACY

ABSTRACT Digital watermarking is the process by which identifying data is woven into media content such as images, movies, music or programming, giving those objects a unique, digital identity that can be used for a variety of valuable applications. Imperceptible to the human senses yet easily recognized by special software detectors, a digital watermark remains constant even through recording, manipulation and editing, compression and decompression, encryption, decryption and broadcast witho...

DESIGN AND SIMULATION OF PROBABILISTIC TECHNIQUES FOR CACHE REPLACEMENT

ABSTRACT We analyze a class of randomized Least-Recently-Used (LRU) cache replacement algorithms under the independent reference model with generalized Zipf’s law request probabilities. The randomization was recently proposed for Web caching as a mechanism that discriminates between different document sizes. In particular, a requested document that is not found in the cache either replaces a necessary number of least recently used documents with probability depending on its size or the cach...

DESIGN AND SIMULATION OF CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL

ABSTRACT On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology changes are unpredictable. In this paper, we propose proactively disseminating the broken link information to the nodes that have that link in their c...

DESIGN AND SIMULATION OF A DIGITAL CIRCUIT SIMULATION

ABSTRACT Electronic circuit simulation uses mathematical models to replicate the behavior of an actual electronic device or circuit. Simulation software allows for modeling of circuit operation and is an invaluable analysis tool. Due to its highly accurate modeling capability, many Colleges and Universities use this type of software for the teaching of electronics technician and electronics engineering programs. Electronics simulation software engages the user by integrating them into the lea...

DESIGN AND SIMULATION OF ACADEMIC PEER TO PEER NETWORK

ABSTRACT File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books. It may be implemented through a variety of storage, transmission, and distribution models and common methods of file sharing incorporate manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of ...


8611 - 8625 Of 8851 Results