Nowadays, the application or acceptance of mobile learning in teaching and conducting research and other academic activities have been successful in developed and some developing countries of the world and have proven to be more efficient than the customary learning systems. Most of students and academia in these developed nations have embraced mobile technology because of its simplicity, flexibility and also provide opportunity for students and academia to collaborate with one another irrespective of their geographical location for research purposes. Few literatures suggest that the level of technology acceptance in the country is still very low compared to other parts of European and some Asian countries. However, findings of the quantitative analysis and collected works have also shown that students and academia hesitant to embrace mobile computing technology is one of the most significant factors that affect the level of mobile learning in most African countries. Keywords: Mobile learning, digital natives, autodidact, e-learning.
Privacy and security are the two major concerns of keeping and accessing data on the internet. The rate of intruding organisation’s database by unauthorised users is on the increase. Thus, the affected organisation’s data confidentiality is lost; it can be viewed, modified, deleted and/or make it inaccessible to authorised users. Intrusion detection and tolerance techniques help in recognising malicious attacks as well as supports the websites to survive the attack. A quantitative approach was used in this study even though numerous attempts of quantitative evaluation of the survivability of intrusion tolerant systems, especially in database field have been made. Study on survivability of intrusion tolerant systems has being done, taking behaviour of attack, prediction of scale, speed of database damage propagation and its degree of spreading as facilitators. This paper provides the intrusion tolerant database system as a series of state transition model (Zumkas Model) based on the hidden Markov model. Keywords: Intrusion, survivability, model, patterns
YAMUGAG-20 Exploder is a Radio Frequency (RF)-based wireless exploder system designed and constructed specially for the Nigerian Air Force (NAF) to overcome the challenges associated with the existing wired exploders used for the disposal of unserviceable ordnances. The Exploder system has three main parts namely, the master transmitter unit, the master receiver/slave transmitter unit, and the slave receiver unit. Each of these units is made up of transceiver module, microcomputer and power source. The microcomputers were programmed using C and C++ programming language of the Integrated Development Environment (IDE) software. The exploder is portable and easy to operate. For a typical demolition exercise, the operation of the exploder is such that signals are relayed from the master transmitter unit to the master receiver/slave transmitter unit onto the slave receiver unit to initiate an electric detonator leading to the detonation of the unserviceable ordnances. Functionality, range, power consumption, and system reliability tests were conducted on the exploder to establish its performance and efficiency. The results obtained from the tests indicated that the exploder transmitting at a frequency of 2.4GHz performed satisfactorily up to a range of 1000 meters. Therefore, the exploder has the potential of not only meeting the demolition demands of the NAF but can also be applied for other nonmilitary purposes like mining and related activities.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.