ABSTRACT For schools to be effective, computer literacy should be demonstrated through computer availability as well as student’s awareness and usage of library related website. The research design is a descriptive survey which comprises a sample of 383 students randomly selected from a population of YABATECH students. The research instrument is a well-designed questionnaire for students. The statistical tools employed in to analyze the data are frequency and percentage distribution; t...
Abstract: This study was aimed at determining the antibacterial effect of the leaf extract of Buchholzia coriacea (Wonderful Kola) on nasal isolates. Nasal isolates were collected from one hundred students of the Delta State Polytechnic, Ogwash-uku, Delta State. The antimicrobial activity of the methanolic extract of the leaves was assessed against nasal isolated microorganisms (E.coli, Citrobacter species, Klebsiella species, and Proteus species) using the agar well diffusion method. Inh...
Abstract Polycyclic aromatic hydrocarbons, heavy metals and physiochemical parameters were measured in water samples from zaakpon community. The results shows that most of the parameters in water were within safe limits except turbidity, potassium and Phosphate while PAHs concentrations in water were below detection limit
The author proposes to build a unique and easy to use train ticketing system with QR code for my final year project using cloud infrastructure. The system allows users to register and as soon as they register an account with unique id is created in the system. User may book or buy tickets and fare is calculated according to station distance. The cloud server allows for handling a large number of users using efficient computing power. It allows for efficient and fast computing for ticket costs...
Abstract Weight loss and Density Functional Theory (DFT) methods were used to study the corrosion inhibition of 5-methyl-2H-imidazol-4-carboxaldehyde and 1H-Indole-3-carboxaldehyde on mild steel in acid medium. The values of thermodynamic parameters such as free energy of adsorption (ΔGºads), adsorption equilibrium constant (Kads), adsorption entropy (ΔSºads), adsorption enthalpy (ΔHºads) and activation energy (Ea) were calculated and discussed. The adsorption process on mild steel surf...
Radiation exposures from mining and mineral processing industries can lead to high incidence of disease conditions like nausea, lung cancer, sterility, fatigue, and diarrhoea among mine workers. The concentration of primodial radionuclides (238U, 232Th and 40K) in some selected mining sites in Nasarawa State, Nigeria, was examined in this study. Soil and rock samples from eight different mining sites were collected and analyzed for radionuclides activity concentration by gamma ray...
Ab overview of the Uber business model
Tsire is a popular Nigerian stick meat commonly produced by grilling of sliced and spicedbeef meat hanged on tips of sharpened sticks. The process of grilling initiatescharacteristic flavour development in the product, making it appealing to consumers.Unfortunately, sellers of the product do not usually exhaust their sales and product may beleft over till second day or more. This may adversely affect the flavour appeal andacceptability of the product. In the present study, the flavour compoun...
The study of traffic models has given rise to many models with the aim of realistically determining the behavior of traffic. The dynamics of the macroscopic traffic flow is modeled by a partial differential equation, where the object of study is to determine the density of traffic flow. We derived a second order macroscopic traffic flow model equation from a first order one using the Fick’s law of diffusion. We formulated second order macroscopic traffic flow model equation with a sourc...
ABSTRACT The study investigated the Use of Information and Communication Technology (ICT) in Management of Students’ Academic Records in Federal University of Technology, Minna, Niger State. The study was guided by five research objectives and five research questions. Survey research design was used for the study. The study consists of a total population of 16,934 students and staff of F.U.T, Minna; a sample size of 376 was used based on the Krejice and Morgan table for determining sample...
ABSTRACT Sunflower (Helianthus annuus L.) is a genus of plants comprising about 70 species. It is famous for its unique nature of heliotropism and is the world’s most important source of oil. Around the world, sunflower production is 31.1m tons,with more than 26 ha under sunflower cultivation. Sunflower stalks have been used as fuel, fodder for livestock, food for poultry, and ensilage. Sunflower seeds were and still are eaten raw, roasted, cooked, ...
ABSTRACT The evaluation of the anti malarial properties of the essential oil extract of Tithoniadiversifolia was carried out using the standard tests suppressive tests in laboratorymice. The Swiss albino mice were infected with rodent malaria parasite(Plasmodium berghei berghei) and were treated with 300mg/kg, 600mg/kg and1200mg/kg dose of the oil extracts. The result showed that the oil extract ofTithonia divers...
ABSTRACT Ebola virus, a member of the Filoviridae virus family, is still an untamed, highly lethal viral pathogen that represents a nightmare for much of central Africa, which is the site of the majority of EBOV outbreaks (Geisbert et al.2010). Unfortunately there has not been a large push in the search for a vaccine as this virus, as deadly as it is, has not impacted a large portion of the world’s population with only 2,300 reported cases of hemmorraghic fever caused by filoviruses. On a...
ABSTRACT A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years. The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special equipment and infrastructure needed to support network mobility management, it is difficult to deploy such networks beyond the local network co...
Abstract One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studi...