This paper describes the sedimentation rate and the productivity of hydropower. Sedimentation of reservoirs has become a serious threat to the operation of the reservoir and hydroelectric power in Indonesia. Sedimentatio...
" The aim of this paper is to introduce a new class of normal spaces called pi g beta-normal spaces, by using pi g beta-open
sets. We prove that pi g beta-normality is a topological property and it is...
Human interactions with the environment are identified as one of the leading causes of climate change and variation. Modification, conversion and maintenance of land cover are all forms of anthropogenic interactions with...
Data sharing is an important functionality in cloud storage.I show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage.I describe new public-key cryptosystems which produce...
The Impact of Sedimentation in Reservoirs on Performance Operation of Hydropower: A Case Study Sutami Hydropower Indonesia
This paper describes the sedimentation rate and the productivity of hydropower. Sedimentation of reservoirs has become a serious threat to the operation of the reservoir and hydroelectric power in Indonesia. Sedimentatio...
A Survey on Global System of Mobile Communication (GSM) on Academic Performance in Nigeria Senior Secondary Schools
This paper examines access to various activities student do with their GSM (social network and browsing) and its effects on students
Alpha beta pi g-Normal Spaces in Topological Spaces
" The aim of this paper is to introduce a new class of normal spaces called pi g beta-normal spaces, by using pi g beta-open sets. We prove that pi g beta-normality is a topological property and it is...
Effects of Vegetation Change and Land Use/ Land Cover Change on Land Surface Temperature in the Mara Ecosystem
Human interactions with the environment are identified as one of the leading causes of climate change and variation. Modification, conversion and maintenance of land cover are all forms of anthropogenic interactions with...
A Review of Secure Data Sharing in Cloud using Key Aggregate Cryptosystem and Decoy Technology
Data sharing is an important functionality in cloud storage.I show how to securely, efficiently, and flexibly share data with Decoy technology in secure cloud storage.I describe new public-key cryptosystems which produce...