Global

Nigeria, an ex-British colony had an independence date that was heralded by the discovery and gradual exploitation of oil in commercial quantity in 1956 and 1958 respectively at Oloibiri. The discovery of this product (black gold) in a number of other nations like Saudi Arabia, Kuwait and Libya among others has contributed immensely to the social, political and economic growth of those nations. For Nigeria, available daily production data shows that the nation has equally earned over $760 billion from the export and sales of crude oil. Paradoxically, this huge revenue profile has not positively impacted upon the lives and environment of majority of Nigerians as is the case in Kuwait, Libya and others, rather most of it have been siphoned into foreign accounts by corrupt government officials. To worsen matters, for more than forty years now, all other sources of revenue earnings have been virtually a bandoned. The political class has constantly fallen on one another, fighting over how the foreign revenue accruing from the sales of crude oil should be shared.
Privacy and itegrity of packets on wireless adhoc netwoks should be expected by the algorithmic mechanisms. This privacy and integrity is very much is to be mandated by regulations. In tardition the security is only based on cryptographic techniques which is not so much secure and leads to unsecure and unauthenticated information. As the packets of information is to be routed on networks so it needs some new security and digital signature based algorithm. Digital signature methods provides the solution to many of these new concerns. So in this paper we will discuss new paradigma of digital signature based techniques along with merit & demerits ,applications and isues related with it.
One of major problems in the wireless sensor networks is the barrier coverage problem. This problem deals with the ability to minimizing the probability of undetected penetration through the barrier (sensor network). The reliability and fault tolerance problems are very important for long strip barrier coverage sensor networks. Also, another design challenge in sensor networks is to save limited energy resources to prolong the lifetime of wireless sensor network. In this paper we propose the fault tolerant k-barrier coverage protocol, called APBC. The proposed protocol maintains a good balance in using nodes energy, in order to prolong the network lifetime. The proposed protocol presents a proper way to provide the k-barrier coverage at nodes fails without reexecuting the algorithm. The simulation results show that this method prolongs the lifetime of the network in comparison with RIS method.
To meet modern complex control systems communication demands, my paper presents a multi channel UART controller based on FIFO (first in first out) and FPGA (field programmable gate array).The paper presents design method of asynchronous FIFO and structure of controller.This controller is designed with FIFO circuit block and UART (universal asynchronous teceiver transmitter) circuit block with in FPGA to implement communication in modern complex control systems quickly and effectively. This controller can be used to implement communication when master equipment and slaver equipment are set at different baud rate. It can also be used to reduce synchronization error between sub systems in asystem with several sub systems. The controller is reconfigurable and scalable. The whole scenario is simulated using VHDL coding.
Educational resources constitute input into the educational systems that determine largely the implementation of educational programmes and invariable objectives attainment. Using document analysis and checklist, this study examined the extent to which resources are provided for effective implementation of National Teachers’ Institute (NTI), Kaduna, Nigeria Certificate in Education (NCE) by Distance Learning System (DLS) programme in the South- South geo-political zone, Nigeria. This was considered in terms of quantity and quality of the available human recourses and the availability, adequacy and relevance of material resources for the programme. Findings indicate that though there were enough course tutors for the programme, the quality was not commensurate to the needs of the programme. The print media (modules) used for instructional delivery were available, adequate and relevant to the demands of the programme. The study recommends more qualified course tutors to be provided by the institute for effective teaching and implementation of the NTI, NCE DLS in the South-South Zone, Nigeria.
The paper investigates the effectiveness of organisational training for the job market. It seeks to find how training influences where and when people work :in terms of type, scale, geographical spread of the business; the skills required for the purpose of training significance and dependence; access and analyse how professional training is planned and organised for the benefit and demands of the organisation ; how training relates business aims as influenced by appraisals, career development, recruitment, information dissemination, connection with experts, use and development of resources, and skills. These form the bases for the six research questions. The paper delimits professional training to the training that takes place in the tertiary institutions in Nigeria and the job market includes all sectors of the Nigerian economy that can offer employment. Literature is reviewed based on Bloom‘s theory and the Kirkpatrick model. Using the descriptive survey design, the study explores how professional training in the formal sector influences the job market.
The black hole, gravitational waves, and the Big Bang cosmology have no valid basis in science. It is demonstrated herein that Einstein’s field equations violate the usual conservation of energy and momentum and are therefore in conflict with experiment on a deep level, so that General Relativity is invalid. This fact alone proves the invalidity of the black hole, gravitational waves, the Big Bang cosmology and Einstein’s conception of the gravitational field.
This paper proves in a simple way, with minimal mathematics, that there is no black hole or close black hole binary system in Nova Scorpii, contrary to the published claims of Schmidt et al. (2002). It also consequently proves that the concept of the black hole violates the physical principles of General Relativity and is therefore invalid.
All over the world there are two sources that influence consumer buying behavior. The first is formal source, which is a kind of source which is well planned and paid for example advertising, personal selling, sale promotion and public relation. The second source is informal which is a kind of source which is not pre planned and non paid like reference group, culture etc. This research emphasizes that how formal and informal sources affect consumer buying behavior. For the research a sample of 200 students of three private universities targeted from Peshawar region. On the basis of their responses a regression and correlation analysis was conducted. Findings and results of the study shows that formal sources have more influence on consumer buying behavior. Within the formal sources advertising is the key factor which contributes more towards consumer buying behavior for telecom services. While in case of informal sources reference group contribute more in comparison of other informal sources towards consumer buying behavior for telecom services.
VoIP is born from the growing Internet infrastructure, which has over the years seen significant improvements in both bandwidth and end-to-end latency. Merging VoIP technologies with telephony infrastructures is of particular interest since it significantly reduces the costs. In this project, we are making voice calls over Intranet available on a mobile phone using Bluetooth as the access protocol. Bluetooth was selected because it is increasingly available in mobile telephones. Most modern mobile phones with a focus on wirelessly sharing data between the device and a host PC come equipped with a Bluetooth adaptor. The project mainly consists of developing a Voiceover- Bluetooth (VoB) mobile application for Android phones and a PC application to enable voice calls over Intranet and Bluetooth connection. The mobile application connects to desktop application over BT to make and receive calls. The desktop application establish/receive call with/from other mobile/phone terminals over Intranet. When in range of a PC, a wireless Bluetooth connection to the IP network is made available to the mobile phone, offering the choice of connecting to a conventional mobile GSM network or to a lower-cost IP infrastructure. The vision for the future is to make the mobile phone’s operation fully transparent to the user by making both technologies completely interchangeable.