Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats ne xt to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load ...
The study assessed the state of health of residential building facilities for students and faculty in a private university in Nigeria. The study utilized 490 maintenance job request forms (MJRFs) in addition to 120 questionnaire on use r’s satisfaction about their home buildings to generate data from respondents drawn from students and faculty. The results obtained revealed that ...
Leadership succession planning is a sine qua non for any organization desiring sustainable performance, growth and internal efficiency, and avoiding vulnerability to retrogression and collapse. The study sought to determine the planning strategies for leadership succession in some construction companies in north east of Nigeria. A modified questionnaire was...
A frontier has a significant role of national boundary and security which is discussable matter for any country. Bangladesh and India share international border which is the fifth-longest land border in the world. In the Indian part, Assam, Tripura, Mizoram, Meghalaya, and West Bengal on the other hand Dhaka, Khulna, Rajshahi, Rangpur, Sylhet and Chattagram (Chittagong) are...
The objective of this work is to study the possibility of eliminating both dyes Methylene Blue (MB) and Congo Red (CR) by adsorption on natural clay of the region of Agadir and determine the different reaction parameters effect on the proceeds. Orientation tests have been carried out in distilled water solutions. The results of the kinetics of adsorption showed that optimal contact time...