Postpositions –Ro and –Lan As Clitics In Kanuri (Published)
This paper examines the syntactic morphological functions of the postpositions –ro and –lan as clitics in Kanuri within the framework of descriptive linguistics adopting the works of zwicky and pullum (1983) and Spencer and Luis (2012) as theoretical framework. In conducting the research, primary sources of data collection was employed that is Kanuri written text: Sǝmonǝm wuro sarusǝgǝne and Nyariwa Kanuribe. These two texts are collection of stories written in Yerwa dialect of Kanuri. All the various places where the postpositional particles –ro and –lan occurred are identified and extracted for presentation and analysis. The outcome of the study reveals that the postpositions –ro and –lan function as clitics can be attached to both lexical and functional categories in Kanuri. Syntactically, it can be cliticized to nouns, verbs, adverbs, adjectives, pronouns, relativizers ‘dǝ’, dependent possessive pronoun ‘-nzǝ’ (his/her) and the genitive marker ‘-be’ to express different semantic functions.
Comparison Study of 3g and 4g Mobile Technology (Published)
Third generation and fourth generation are standards for mobile communication. Standards specify how the airwaves must be used for transmitting information (voice and data). 3G networks were a significant improvement over 2G networks, offering higher speeds for data transfer. The improvement that 4G offers over 3G is often less pronounced. The objective of this paper is to compare 3G and 4G mobile technology using descriptive analysis and previous study.
This research paper examined the security threat issues against agents/multi-agent based system platform by malicious agent attackers in a network environment. Several techniques like fault isolation or sandboxing, access control to host resources, digital signatures, strong authentication, proof carrying code and message encryption were suggested by different research scholars as a means of mitigating the menace but however, no strong evidence on their application / implementation were mentioned. This research work used a 2 Factor or Double Data Encryption Standard (DES) approach to encrypt / decrypt messages between agents in our proposed network monitoring platform to prevent malicious agent from hijacking the exact network data content during communication. Java programming language was used to implement the 2DES algorithm in the security mechanism proposed. The system was tested for its effectiveness and efficiency in both non-production and production network environment. Results revealed detection rate to be high and with a very minimal false alarm rate. The proposed system is highly recommended for usage in any local area network environment.
The Mechanism of Congestion between the Server and Clients in a Local Area Network Solutions (Published)
Cause congestion in the server and so we designed a program that uses dequeues program which avoids congestion , I have been using the premise of first come first served and the philosophy of this method depends on who arrives first of and network layer and the transport layer have we got to where good results have been easing broad measure of congestion the operations is to enter first into one router and be in the data transfer integer associated with each process and if the number is high, the priority is low and vice versa We have also used in We searched the we are in the College of Nursing at especially computer lab use over 45 computer and cause stumbled Internet line.