Global

Corruption is a universal crime that pervades every human society. The “inseparable” relationship between mankind and corruption is akin to that of a goat and a yam. The distasteful and unpleasant practice that entails the use of entrusted powers for private gain compromises justice; impedes the rule of law and act antithetically to good governance. Though, corruption is a universal social vice, it has of recent acquired an inglorious reputation in Nigeria since the commencement of our present democratic experiment1 I. Introduction . Only recently, Transparency International, the global corruption watchdog released its 2011 report wherein it ranked Nigeria as the 35th most corrupt nation in the world. This unenviable record needs redemption because, corruption is not a way of life, or a passing phase that Nigerians should indulge in; rather, it should be recognized as a problem that demand an urgent attention and resolution because of its attendant negative consequences on the rule of law. This article seeks to briefly explain the term corruption with a view to showing how it determines the rule of law. At the end, the article provides useful solutions as to how corruption can be curbed or brought, to the barest minimum in Nigeria.
In cloud environment the role based access control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users might be prohibited to consider respective roles only at certain defined time periods. Additionally, these roles can be invoked only on after pre-defined time intervals which depend on the permission of certain action or event. In order to incarcerate this kind of dynamic aspects of a role, numerous models like temporal RBAC (TRBAC) was proposed, then while this approach could not deliver anything else except the constraints of role enabling. Here in this paper, we have proposed robust and an optimum scheme called Dynamic expiration enabled role based access control (DEERBAC) model which is efficient for expressing a broad range of temporal constraints. Specifically, in this approach we permit the expressions periodically as well as at certain defined time constraints on roles, user-role assignments as well as assignment of role-permission. According to DEERBAC model, in certain time duration the roles can be further restricted as a consequence of numerous activation constraints and highest possible active duration constraints. The dominant contributions of DEERBAC model can the extension and optimization in the existing TRBAC framework and its event and triggering expressions. The predominant uniqueness of this model is that this system inherits the expression of role hierarchies and Separation of Duty (SoD) constraints that specifies the fine-grained temporal semantics. The results obtained illustrates that the DEERBAC system provides optimum solution for efficient user-creation, role assignment and security management framework in cloud environment with higher user count and the simultaneous rolepermission, e
The paper deals with the problem concerning the substantiation and development of special programs to improve sports technique of skilled female gymnasts in «Handspring» vault with an apparatus «vaulting table».
Networks are being used in various areas and the demand of user’s nowadays has motivate the emergence of the mobile adhoc network (MANET). In this age of network, most challenging task is to deliver the packet successfully with dynamic network, delay, node and links fails restraint. And to fulfill the above required task, protocol should be used effectively and efficiently .In this paper, we had successfully design the Enhanced-AODV routing protocol which had improvised the performance of AODV and its other several factors like throughput, number of packets delivered, load delay,overhead, packet delivery even in case of frequent path breaks due to nodes or links failure ,dynamic nature etc.
High peak-to-average power ratio (PAPR) of the transmitted signal is a major drawback of orthogonal frequency division multiplexing (OFDM). Selected mapping (SLM) technique is one of the promising PAPR reduction techniques for OFDM. In the SLM technique, statistically independent data blocks are generated from an OFDM data block using a set of phase sequences and one with the lowest PAPR is chosen and transmitted. In this paper, we propose an SLM technique which gives sizable reduction of nearly 2dB. The paper elaborates the hardware implementation of the generated block using FPGA. The test benches and the RTL schematic are generated.
Present world is moving fast towards development of civilization. Industries, factories, power plants, various government institutions, scientific institutions, private organizations are growing up on the basis of available natural energy sources. However, these sources are limited and expensive. CO2, CFC and other harmful gases are being produced through the utilization of these sources. Air is being polluted through these gases. So renewable energy will be the best solution. Developed countries are searching for newly alternative energy sources to minimize the pressure on natural sources like gas, oil, coal etc. Developing countries like Bangladesh are also trying to utilize different renewable energy sources to fulfill their growing demand. Bangladesh is a small country with a vast population. People have been suffering from insufficient electricity for many years. To meet the energy crisis Bangladesh has been experienced to renewable sources like biogas, bio-fuel, solar energy, wind energy, tidal energy, geothermal power, hydro power etc. In this paper we have tried to analyze about renewable sources of the country. Here we have identified the utilization of renewable sources and their benefits. This paper also belongs to subject that how far renewable energy can be treated as an ideal solution of economic development.
Demand for modifications is increasing throughout the world parallel to develop the existing highway materials to fulfill the increasing demand of vehicles. Some materials produce good effect and enhance the strength as well as qualities of bitumen. On the other hand, some materials are responsible for adverse effect on the bitumen. In saline areas like coastal regions, the salt plays a significant role on the bituminous pavement. In this area, the most of the highways come to contact with salts content materials. In present study, the focus was given to find the various effects of salts on bitumen and bituminous mixers. A number of samples were prepared with addition of sodium chloride with respect to 2%, 4%, 6%, 8%, and 10% weight of bitumen. To determine its behavior and suitability, a variety of tests such as penetration test, softening point test, flash point and fire point test, ductility test, specific gravity test, solubility test etc. were conducted by standard ASTM method. It was observed from laboratory test that the penetration and specific gravity value are gradually increased and ductility, flash point, fire point, and softening point was gradually decreased due to the increase of salts content in a bituminous mix. To observe the effect of salt on stability of flexible pavement Marshall Mix design method was used with varying percentage of salt content. The stability value of bituminous mixes was decreased with increase the salt content in bitumen. From the consideration of stability, maximum 2% salt in bitumen can be allowed for road construction.
Protecting important data is of utmost concern to the organizations or multiple transceiver based communication systems and, cryptography is one of the primary ways to do the job. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. Many cryptographic protocols and attacks on these protocols make use of the fact that the order in which encryption is performed does not affect the result of the encryption, i.e., encryption is commutative. On the other hand, the need of a security feature encompassing data authentication among multiple MIMO or transceivers has become very critical. This paper presents the implementation of a cryptography core based on Commutative RSA public key cryptography algorithm for accomplishing data security and authentication in environment comprising multiple FPGA cores without any key exchange overheads. In spite of considering conventional two terminal communications, we have implemented a scalable architecture for multi distributed FPGA based systems and realizes commutative RSA algorithm for verifying data security among multiple transceiver terminals. In this approach, a sophisticated RSA cryptographic technique based on commutative Encryption methodology has been implemented for distributed FPGA terminals. The proposed system architecture has used the Montgomery multiplication algorithm with exponential modular multiplication and Radix-2 multiplication based multiparty cryptography.
Simple, rapid and sensitive spectrophotometric procedure was developed for the analysis of atomoxetine hydrochloride (ATH) in pure form as well as in pharmaceutical formulations. The method was based on the reaction of ATH with gold (III) chloride in the pH range 3.5-4.5 forming violet colored complex solution, showing absorption maxima at 550 nm. The linear plot indicates that Beer’s law is obeyed in the range of 5 – 80 μg/ml of atomoxetine hydrochloride. The molar absorptivity and Sandell’s sensitivity are 3.77 x 103M and 0.0774 μg cm-2 respectively. The standard deviation of the method for ten determinations ATH is 9.9827 x 103. The correlation coefficient (r2) of the experimental data of the calibration plot is 0.9997. The effective range of concentration for accurate determination of ATH as ascertained from Ringbom’s plot and it is 10 – 80 μg/ml.
One of the most natural approaches to the problem of origins of natural languages is the study of hidden intelligent "communications" emanating from their historical forms. Semitic languages history is especially meaningful in this sense. One discovers, in particular, that Biblical Hebrew, BH, the best preserved fossil of the Semitic protolanguage, is primarily a verbal language, with an average verse of the Hebrew Bible containing no less than three verbs and with the biggest part of its vocabulary representing morphological derivations from verbal roots, almost entirely triliteral – the feature BH shares with all Semitic and a few other Afro- Asiatic languages. For classical linguists, more than hundred years ago, it was surprising to discover that verbal system of BH is, as we say today, optimal from the Information Theory’s point of view and that its formal topological morphology is semantically meaningful. These and other basic features of BH reflect, in our opinion, the original design of the Semitic Protolanguage and suggest the indispensabilityof IIH – Inspirational Intelligence Hypothesis, our main topic, – for the understanding of origins of natural languages. Our project is of vertical nature with respect to the time, in difference with the vastly dominating today horizontal linguistic approaches.