Review of the meaning and concept of reality for Nietzsche
The issue of truth and reality is one of the main conscientious issues in philosophy. The propagators and interpreters are different in reality over the historical period. For example, in the ancient times, philosophers such as Plato were interpreted as truth by Elisa that is what reveals itself. But most philosophers have assumed the truth to be true but Nietzsche has a different interpretation of the truth, in his opinion, the truth is myth.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Rough fuzzy ideals in near-rings
The purpose of this paper is to introduce the idea of rough fuzzy sets in nearrings. We introduce the notion of rough fuzzy sets with respect to an ideal of a nearring which is an extended notion of an ideal of a ring and we derive some properties of the lower and upper approximations in a nearring.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure and Robust Cloud Storage with Cryptography and Access Control
Cloud computing is a new evolving paradigm to a wide range of users like individuals, businesses and governments to provide resources in an on-demand environment. Enterprises store their incredible abundance of data on cloud to reduce data management cost. In addition, an emerging class of entrepreneurs is taking advantage of clouds as they might not have enough finance to purchase resources or ensure the necessary security. As the data is stored on cloud service providers' servers, confidentiality, authentication and access control are the most challenging factors in data security. Cloud providers should provide adequate security measures on their data and applications. Cryptography access control architecture overcomes the issue of data security in cloud environment. In this paper, we illustrate a secure and robust cloud storage architecture by combining cryptography and access control with two layered encryption.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security of Data in the Utilization of E-Government
Both the computer and the software and data essential elements of a system of information in the digital environment associated with e-government. Computer may be associated with devices and services in the communication network terminal ends or other accounts or specific network facilities. Computing network may be a LAN or private network extended the scope of the government department or ministry concerned as a network intranet, or wide area WAN network as extranet or international information network such as the Internet, may also be linked to external contact is open to any individual provider technological means that enable access to her. The aim of this research is the security of information systems, protection and availability of resources and its components and work their confidentiality and integrity. Where in the absence of adequate security systems and information and communication technologies, do not use all their capacities and energies. The absence or lack of security in a loss of confidence in the system to stop and not to make the most of it, making it a burden on the organization. On this basis it must protect the system and information from damage that can lead to system failures and loss dating back to their organizations and their staff. You can identify three main dimensions of the target of various information in security systems, (I) definition: who is allowed to enter the system? Must check it out through three main entrances (II) dependence: once you learn the rules of the real user, the natural next question is what allowed for this person? Thus, an accreditation process based access to resources for this user (iii) Management: representing management saving the user attributes, in addition to the security of a given resource definition. It includes on activities such as the exclusion of the advantages of the arrival of the user or employee leaving the service. The search results are in four axes task, first (Security Policy: The purpose of information security policy relates to provide appropriate guidance and administrative support to the security of the information and recommendation (II) Security organization: This dimension aims information security management focus in the organization (iii) the security of individuals: the purpose of the after the security of individuals to reduce the risk of human error, theft, embezzlement or misuse of facilities (iv) control of access to information). Concludes research is the establishment of political, regulatory and legal frameworks to address the matters relating to the dangers of security such as piracy and management of domain names and the protection of citizens, the development of information security policy and encourage the application and adaptation programs and records of e-government, strengthen the expertise and Practice better for the security of information systems through the development of guidance and technical standards on a large scale and use including is a global developer, organize public campaigns to raise awareness aims to improve public knowledge and understanding of the importance of information and intellectual property rights and the protection of security software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Self awareness curiculum activities and effectiveness to youth
This article discusses the self-consciousness of youth in co-curricular activities forming their personality. In addition, this article also discussed the core curriculum which has been outlined by the Ministry of Education (MOE) to adolescents who are still studying in higher education institutions as well as the effectiveness of the curriculum in shaping the personality of adolescents including studies that have been done in connection with extra-curricular activities. This article also touched on the education system nowadays.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Sequence Stratigraphic Analysis of the Xp Field, Onshore Niger Delta, Nigeria
Sequence stratigraphic analysis carried out on the XP field, Greater Ughelli Depobelt, Niger Delta, revealed three sedimentary sequences within the intervals penetrated by three wells studied in the field. Well logs and biostratigraphic data integrated helped in the identification of three major Maximum Flooding Surfaces (MFS1, MFS2, MFS3) recognized between the intervals of 3840- 3080m (aged 31.3- 26.2Ma) and three sequence boundaries designated SB1, SB2 and SB3, between 4232m and 3140m (aged 32.4 – 27.3Ma). The Maximum Flooding Surfaces were recognized using intervals containing high abundance and diversities of three index fossils (Uvigerinella 8, Bolivina 27 and Alabamina 1) which represent the three regional marker shales identified in the field. The erosional surface coincides with intervals that are barren in faunal activity and also corresponds with the coastal deltaic paleobathymetric depth interpreted as Sequence Boundaries. The sequences depict sediments that were deposited between Early to Late Oligocene period in water depth ranging from coastal deltaic to neritic environments. Three depositional patterns resulting from regression and transgression recognized include progradation, retrogradation and aggradational packages with associated systems tracts. The systems tracts form good reservoirs with prospects in the field.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Spatial information for determination of irrigable lands in Eastern Rwanda
The present study aimed to map irrigable lands in Bugesera Agro Ecological Zone (AEZ) in the Eastern Province of Rwanda, using spatial information’s. The related Concerns were to determine the suitable area for irrigation that can include all different parameters which influence irrigation. The methodological approach consisted of processing Aster Landsat and DEM; gathered by Radar Satellite acquired at CGIS/NUR, using appropriate packages-software ILWIS 3.3, Erdas8.7 and ArcGIS 9.2. Satellite image was used to determine land use and land cover classification of the study area and the DEM to determine slope classification. The results showed maps that are describing different type of layers classified according to purpose of irrigation, slope, water proximity, percentage of clay and sand and type of land use. Those maps helped to produce a model design that conducts us to determine the most suitable area for irrigation. The model designed would be used as a planning tool to optimize agriculture in the Eastern Region of Rwanda.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Spatial variation of Physico-chemistry and Heavy metals profile of Woji creek, Upper Reaches of Bonny Estuary, Niger-Delta, Nigeria.
Studies on the physico-chemical properties and selected heavy metal profiles namely; Temperature, pH, Dissolved oxygen (DO), Total suspended solids (TSS), Total dissolved solids (TDS), Turbidity, hardness, Nitrate (NO-3), Chloride (Cl-), salinity and Cadmium (Cd), Lead (Pb), Manganese (Mn), Chromium (Cr), Nickel (Ni) and Zinc (Zn) in the water of Woji Creek respectively were investigated. Samples of the water were collected from five sampling stations along the creek on a monthly basis, for twelve months (October, 2012-September, 2013). Water samples were collected at 4-5cm depth below the water surface using clean, well-labelled 50cl plastic bottles and taken to the laboratory for further analysis. The metals in the water were extracted and their concentrations determined by flame Atomic Absorption Spectrophotometry, (AAS). The mean total values for the physico-chemistry were as follows: Temperature 28.1±0.140C, pH 6.95±0.01, DO 2.72±0.1, TSS 8.23±0.81,TDS 5432.027±401.23, Turbidity 6.042±0.0.20, hardness 4158.40±342.80, Nitrate 4.268±0.40, Chloride 8790.143±693.38 and Salinity 7.36±0.30. The mean total dissolved solids (TDS), hardness and chloride levels were very high and above the permissible limits recommended by the World Health Organisation (WHO). The mean total values for TDS, hardness and chloride were 5432.027mg/l, 4158.400mg/l and 8790.143mg/l respectively. The mean total Dissolved Oxygen (DO) level (2.720mg/l) was low and well below the permissible limits according to WHO. The mean total concentrations of Cd (0.002mg/l), Mn(0.026mg/l), Ni(0.059mg/l) and Zn(0.009mg/l) in the water were within the permissible limits as recommended by Federal Environmental Protection Agency (FEPA)(1991) and U.S.Environmental Protection Agency, (USEPA) (1986), while those of Cr(0.408mg/l) and Pb (0.163mg/l) were higher than the permissible limits. The presence of these pollutants in the water indicates that the water is polluted and under stress. Fish from this creek are therefore not very safe for human consumption. Bioremediation and regular monitoring of the water body in order to restore and maintain the water quality of the creek and ensure the safety of the organisms for human consumption is recommended.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Spectroscopy studies on conductive polyaniline – polyimide blend films
Conducting films of ±10 camphorsulfonic acid (CSA)-doped polyaniline / polyimide (PANI/PI) blends with various compositions were prepared by solvent casting process. The molecular level interaction in these blend films were experimentally characterized by Fourier transform infrared (FTIR), Raman, UV-Vis and X-ray diffraction (XRD) spectroscopic techniques. The interacting structure and observed red shift confirm the presence of hydrogen bonding between the carbonyl group of PI with the amine of PANI that affects the optical band gap (Eg), electrical conductivity (?) as well as the morphology of the blends. The disappearance of the characteristic peaks of PANI-CSA after blends with PI suggests some kind of molecular mixing between the two components and compatibility between the conducting and non-conducting polymers.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Spray pyrolysised tin disulphide thin films at different precursor concentration ratios
Thin films of tin disulphide on glass substrates were prepared by spray pyrolysis technique using precursor solutions of SnCl2.2H2O (0.04 M) and n-n dimethyl thiourea (0.02 M - 0.12 M) at different precursor concentration ratios varied in the range 1:0.5 – 1:3, keeping other deposition parameters are constant. The films are found to be n type electrical conduction using hot probe technique. X ray diffraction analysis revealed the polycrystalline nature of tin disulphide thin film with hexagonal structure and a preferential orientation along (002) plane. The size of the tin disulphide crystallites was determined using the Full Width at Half Maximum values of Bragg peaks. The surface morphology had been observed on the surface of these films using scanning electron microscope. The optical absorption and transmittance have been recorded for the films in the wavelength range 400 - 800 nm. From the analysis of the absorption region data both allowed and forbidden optical transition nature was determined for the films in the above wavelength range. The electrical resistivity values in dark and light were determined with respect to the precursor concentration ratio.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]