Walter Anyanwu
My work is in the fields of big data, integrated skills informatics, education procedures, and data collections and I'm currently interested in data analytics / big data, focus matrix in business informatics modeling, and integrated skills in colleges, universities, and operation management. A term project research on "encryption in electronic commerce" sources for understanding how data is being secured in the global world today (February 2013). The research intends on big data leading to more paper outlines.
I graduated with an MSc. in Management Information Systems with detailed written papers, articles, conference papers, and business to business, to the consumer for product designs in e-commerce and operational organizations.
I'm an academician, and informatics working for Private Colleges and Universities, I've been tutoring Academic Skills Development in Europe for more than 7 years.
Supervisors: Prof. Bahar TEKIN, Asst. Prof. Dr. Ahmet ADALIER, and Prof. Dr. Ezgi SAATÇI
Address: Okan University
Tepeören Mahallesi
Tuzla Kampüsü,
İstanbul Okan Üniversitesi,
34959 Tuzla,
İstanbul, Turkey.
I graduated with an MSc. in Management Information Systems with detailed written papers, articles, conference papers, and business to business, to the consumer for product designs in e-commerce and operational organizations.
I'm an academician, and informatics working for Private Colleges and Universities, I've been tutoring Academic Skills Development in Europe for more than 7 years.
Supervisors: Prof. Bahar TEKIN, Asst. Prof. Dr. Ahmet ADALIER, and Prof. Dr. Ezgi SAATÇI
Address: Okan University
Tepeören Mahallesi
Tuzla Kampüsü,
İstanbul Okan Üniversitesi,
34959 Tuzla,
İstanbul, Turkey.
less
InterestsView All (18)
Uploads
Papers
The initial rollout of the new product will start in Lefkosia to a mass target market; to anyone who needs to energize. Strategies deployed will include POP display promotions at retail stores as well as sporting events, celebrity endorsements, and print ad advertisements in sport, fitness, and university magazines. Utilizing a push strategy aimed at channel distributors and a pull strategy aimed at customer segments.
Incorporating necessary controls to monitor monthly and annual sales (by channels), monthly and annual revenue, customer satisfaction, and R&D of new product development will play a key role in keeping PowerTrip’s competitive advantage. Having a contingency plan will allow PowerTrip to continually grow in this emerging market.
Marketing effectiveness is defined as the optimizing quality of spending to achieve the desired results in a period of time. (Solcansky & Simberova, 2010, p.755). The introduction of the marketing measurement is a process that is often criticized because it only focuses on short-term objectives. But in fact, by definition, is focused on marketing activities that can be implemented to improve short-term and long-term results.
Short-term improvements are measured in terms of profit and long-term improvements are focused on the improvement of the brand equity in the minds of company customers and improvement of the image. Marketing does not have standardized techniques for measuring performance. There are various techniques for measuring performance which is under these two main categories: Financial and non Financial Analysis.
Among the 4G technologies that successfully managed to impose, is Mobile WOBAN (Wireless-Optical Broadband Access Network), a technology developed according to the specifications of the IEEE 802.11b/g and 802.11astandard.In a typical scenario, this technology is expected to provide a data rate of 125 Mbps
– 1.25Gbps, considering fiber optics, and at vehicular speeds higher than 100 km/h, with the need of a mesh between the transmitter and the end-users [1].
In order to accomplish these goals and to overcome the problems that might appear due to multipath propagation, the phenomenon of great importance especially in the case of mobile environments, WOBAN aggregates techniques like ONU (Optical Network Units) and Base Stations (BS) [2].
Also, as a result of the large delay spreads induced by the complete WOBAN, a joint optimization algorithm (called the combined heuristic), which considers design aspects of both the wireless front end, such as avoiding interference among neighboring BSs/APs and the optical back end; such as minimizing expensive fibrelayout[3].
Keywords-component; Integrated optical wireless network; EPON (Ethernet Passive Optical Network); WiMAX (worldwide interoperability for Microwave Access).
Keynotes: IETF, PIN, LDP, LRS, LER,SDH/SONET.
Keywords: Arbitrage, LNG, Barriers.
‘turquoise’ was derived in the 16th Century from the French language and either comes from the word for Turkish (Turquoise) or for ‘dark -blue stone’. The precious stone, turquoise, is found around the world–including China, the US, the Middle East, Australia, Africa, and SouthAmerica.
Fayrouz is a non-alcoholic, natural beverage. "The big difference between Fayrouz and a regular carbonated soft drink is that Fayrouz is a malt-based soft drink, so there are no chemicals or concentrate in it." it comes in two different flavors “Apple and Pineapple.”
However, In 2002, Heineken purchased ABC (Fayrouz International) for LE 1.3 billion but El-Zayat retained management control for another three years. Nigerian Breweries, a subsidiary of Heineken N.V of the Netherlands with 54.10% interest in the company is primarily involved in the brewing, marketing, and distribution of lager, stout, non-alcoholic malt drinks, and non-alcoholic premium soft drinks (Fayrouz). Fayrouz was Introduced in Nigeria in 2006 and has greatly gained market because of its noncarbonated soft drink.
Term Project Research
This project will discuss the relevant network and computer security issues and will present some of the threats to the e-commerce site itself. A straightforward comparison could be made of security weaknesses in the postal systems. security weakness on the Net. The vulnerable spots in both cases are at the endpoints. Information flowing in the conduit (traits, places, and wires) is relatively immune to everyday break (s). In this project, electronic commerce occupied an important role in the online shopping business in the mid–19th century; eCommerce could not be further developed without sufficient security. To deal with daily rampant hackers security to encryption now comes in place.
The role draws on such technologies as electronic fund transfer, supply chain management, internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated collection systems, and automated data collection systems. However, to ensure a strong and effective lock, the design, the material from which it is constructed and the key must satisfy criteria appropriate to the application to which it will be put. The key must also be protected from unauthorized use. Encryption should be considered with prevention issues so that eCommerce sites could be insured towards protecting systems and personal and secret information such as payment systems and credit card information.
Keywords: Encryption, decryption, electronic commerce, private & public keys
Teaching Documents
The obnoxious problem of under-development in sub-Saharan Africa, Southern Asia, SouthernEastern Asia, Eastern Asia (China), Latin America and the Caribbean, West Asia and Northern Africa, (characterized by the huge challenge to achieve the UN Millennium Development Goals -MDGs), has a knowledge imperative, and the need for structured ICT infrastructure capacity in these regions. Today, Information has become a strategic resource, a commodity, and the foundation of every activity. The emergence and convergence of ICTs have emerged as the nucleus and catalyst for global socioeconomic transformation. If properly implemented, these technologies could eliminate the imbalance between rich and poor, and the powerful and marginalized.
Presently, the world is experiencing a major shift from an economy and society based on mass production towards knowledge creation by 2020 (Sha. Z, (2012)). This shift has significant implications for the development of human resources and for changes in all components of the global development system, not just the use of ICTs alone. Within this context, the drive-questions that frame ICT policy are;
What is the global vision of how core sectors can support economic, social, and political progress?
What are the potential roles of ICT in supporting these core sectors, transforming the same to reflect UN Millennium Development goals?
This recommendation is based on the results of work developed by the Working Group on Development, Environment, Agriculture, Governance, and Democracy at the Global Issues Department of the International Youth Council (IYC), USA.1
Finally, the recommendation has been designed in a malleable manner, as a strategy, which countries can easily adopt or embed into existing ICT policies. Also, the aim here is to demonstrate the efficacy of ICTs as a powerful tool for invoking sustainable socio-economic development in third-world countries.
The initial rollout of the new product will start in Lefkosia to a mass target market; to anyone who needs to energize. Strategies deployed will include POP display promotions at retail stores as well as sporting events, celebrity endorsements, and print ad advertisements in sport, fitness, and university magazines. Utilizing a push strategy aimed at channel distributors and a pull strategy aimed at customer segments.
Incorporating necessary controls to monitor monthly and annual sales (by channels), monthly and annual revenue, customer satisfaction, and R&D of new product development will play a key role in keeping PowerTrip’s competitive advantage. Having a contingency plan will allow PowerTrip to continually grow in this emerging market.
Marketing effectiveness is defined as the optimizing quality of spending to achieve the desired results in a period of time. (Solcansky & Simberova, 2010, p.755). The introduction of the marketing measurement is a process that is often criticized because it only focuses on short-term objectives. But in fact, by definition, is focused on marketing activities that can be implemented to improve short-term and long-term results.
Short-term improvements are measured in terms of profit and long-term improvements are focused on the improvement of the brand equity in the minds of company customers and improvement of the image. Marketing does not have standardized techniques for measuring performance. There are various techniques for measuring performance which is under these two main categories: Financial and non Financial Analysis.
Among the 4G technologies that successfully managed to impose, is Mobile WOBAN (Wireless-Optical Broadband Access Network), a technology developed according to the specifications of the IEEE 802.11b/g and 802.11astandard.In a typical scenario, this technology is expected to provide a data rate of 125 Mbps
– 1.25Gbps, considering fiber optics, and at vehicular speeds higher than 100 km/h, with the need of a mesh between the transmitter and the end-users [1].
In order to accomplish these goals and to overcome the problems that might appear due to multipath propagation, the phenomenon of great importance especially in the case of mobile environments, WOBAN aggregates techniques like ONU (Optical Network Units) and Base Stations (BS) [2].
Also, as a result of the large delay spreads induced by the complete WOBAN, a joint optimization algorithm (called the combined heuristic), which considers design aspects of both the wireless front end, such as avoiding interference among neighboring BSs/APs and the optical back end; such as minimizing expensive fibrelayout[3].
Keywords-component; Integrated optical wireless network; EPON (Ethernet Passive Optical Network); WiMAX (worldwide interoperability for Microwave Access).
Keynotes: IETF, PIN, LDP, LRS, LER,SDH/SONET.
Keywords: Arbitrage, LNG, Barriers.
‘turquoise’ was derived in the 16th Century from the French language and either comes from the word for Turkish (Turquoise) or for ‘dark -blue stone’. The precious stone, turquoise, is found around the world–including China, the US, the Middle East, Australia, Africa, and SouthAmerica.
Fayrouz is a non-alcoholic, natural beverage. "The big difference between Fayrouz and a regular carbonated soft drink is that Fayrouz is a malt-based soft drink, so there are no chemicals or concentrate in it." it comes in two different flavors “Apple and Pineapple.”
However, In 2002, Heineken purchased ABC (Fayrouz International) for LE 1.3 billion but El-Zayat retained management control for another three years. Nigerian Breweries, a subsidiary of Heineken N.V of the Netherlands with 54.10% interest in the company is primarily involved in the brewing, marketing, and distribution of lager, stout, non-alcoholic malt drinks, and non-alcoholic premium soft drinks (Fayrouz). Fayrouz was Introduced in Nigeria in 2006 and has greatly gained market because of its noncarbonated soft drink.
This project will discuss the relevant network and computer security issues and will present some of the threats to the e-commerce site itself. A straightforward comparison could be made of security weaknesses in the postal systems. security weakness on the Net. The vulnerable spots in both cases are at the endpoints. Information flowing in the conduit (traits, places, and wires) is relatively immune to everyday break (s). In this project, electronic commerce occupied an important role in the online shopping business in the mid–19th century; eCommerce could not be further developed without sufficient security. To deal with daily rampant hackers security to encryption now comes in place.
The role draws on such technologies as electronic fund transfer, supply chain management, internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated collection systems, and automated data collection systems. However, to ensure a strong and effective lock, the design, the material from which it is constructed and the key must satisfy criteria appropriate to the application to which it will be put. The key must also be protected from unauthorized use. Encryption should be considered with prevention issues so that eCommerce sites could be insured towards protecting systems and personal and secret information such as payment systems and credit card information.
Keywords: Encryption, decryption, electronic commerce, private & public keys
The obnoxious problem of under-development in sub-Saharan Africa, Southern Asia, SouthernEastern Asia, Eastern Asia (China), Latin America and the Caribbean, West Asia and Northern Africa, (characterized by the huge challenge to achieve the UN Millennium Development Goals -MDGs), has a knowledge imperative, and the need for structured ICT infrastructure capacity in these regions. Today, Information has become a strategic resource, a commodity, and the foundation of every activity. The emergence and convergence of ICTs have emerged as the nucleus and catalyst for global socioeconomic transformation. If properly implemented, these technologies could eliminate the imbalance between rich and poor, and the powerful and marginalized.
Presently, the world is experiencing a major shift from an economy and society based on mass production towards knowledge creation by 2020 (Sha. Z, (2012)). This shift has significant implications for the development of human resources and for changes in all components of the global development system, not just the use of ICTs alone. Within this context, the drive-questions that frame ICT policy are;
What is the global vision of how core sectors can support economic, social, and political progress?
What are the potential roles of ICT in supporting these core sectors, transforming the same to reflect UN Millennium Development goals?
This recommendation is based on the results of work developed by the Working Group on Development, Environment, Agriculture, Governance, and Democracy at the Global Issues Department of the International Youth Council (IYC), USA.1
Finally, the recommendation has been designed in a malleable manner, as a strategy, which countries can easily adopt or embed into existing ICT policies. Also, the aim here is to demonstrate the efficacy of ICTs as a powerful tool for invoking sustainable socio-economic development in third-world countries.