There is great scope for livestock development in agricultur where it is one of the fastest growing sectors. If properly managed,there can be good scope for economic growth. The first approach was …
This study investigated the internet access and usage among students of Godfrey Okoye University Enugu. It sought to find out the extent at which they use the internet,the impact of internet on the…
The problem of designing a set of routes with minimum cost to serve a collection of customers with a fleet of vehicles is a fundamental challenge,when the number of customers to be dropped or picke…
The increasing demand on digitixation of human activities accompanied with developments in interactive technologies between human and computer,have led to an increase in interest of research for th…
Cloud computing is a technology which has witnessed spread after using widely the Internet, and the big brand comparies has introduted this type of industry, which ius a pioneerr technology in deli…
Information Retrieval can be defined as the activity of obtaining information or data relevant to information needs from a collection of information resources. In general,resources are available in…
This exploratory study examines the characteristic attributes that predispose patrons to commit cyber-crimes. Cyber-crime is nicknamed as "Sakawa" in Gahana,which involves the use of Internet-enabl…
Recent advacement in wireless communication technologied and automobilies have enabled the evolution of Intelligent Transport System (ITS) which addresses various vehicular issues like trafic conge…
Managing digitl documents has become a time consuming process due to sheer scale. Most users manage their personal documents by creating logical hierarachical folder structures. This logical struct…
Phising website are fake websites that are created by dishonest people to mimic webpages of real websites. Victims of phising attacks may expose their financial sensitive information to the attacke…
In real life,users of most of the database systems face problems related to missing values,wheter these values are unknown to the users or inapplicable. The Database is an image of the real life an…
Mobile robot localization is an important operation used in several applications. For instance,the location of the mobile robot can be used to associate environment data capturated by the robot wit…
During the last two decades various cahotic image encryption algorithms have been proposed. but most of them encountured some defects like small key space,low speed,lack of robustnees nd weak secur…
Managing realtionship with customers is a strategy that is currently required by each egency as a strategic part of the business in order to increase customer loyalty,in this case including both th…
Zakat management in Indonesia is one of the interesting things to be studied in order to alleviate poverty and improve the walfer of the community, this can be seen from the potential IDR 217 trill…
This work deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connecte…
To adjust future medical information technology use it, our medical staff s knowledge and skills on PC and Internet, have to be improved. Knowledge and skills of all level of students should be det…
Automatic separation of detective eggs from qualifed would lead to a great reduction on the graders visual stress as well as to an improvement on the quality control process. This paper presents im…
This paper shows the implementation of different algorithms that ure used to detect audio patterns. The present work focuses on the detection of fundamental pitch, a pattern found in the voice,dete…
Researches in computer science and computer engineering devote now a significant part of their efforts in communication and interaction between human and machine. Indeed,with the edvent of rel-time…
In semantic technologies,the shared common understanding of the structure of information among artifacts(people or software agents) can be realized by building an ontology. To do this,it is imperat…
In today's commercial world,accouting software are of great importance for purposes of collecting, classfying and yielding financial reports;thus, it is essential necessity for every firm to select…
Big Data is relatively a new concept which refers to datasets whose size is beyond the ability of typical database software tools to capture, store,manage and analyze. The accumulated huge amount o…
IN this paper, the notion of partial compatibility relation on a finite set whose non-empty subset is endowed with a compatibility relation is introduced. Moreover, some new properties and results …
Building secure software is about taking security into account during all phases of software development. However,the major problem in agile methods is the lack of basic security elements in their …