American Journal of Engineering and Technology Management

Volume 7, Issue 3, June 2022

  • Interactions Between Mega-Events and Tourist Destinations, the 50th Edition of Marrakech Festival of Popular Arts 2019 as an Example

    Fatima Zahra Guertaoui, Si Mohamed Ben Massou

    Issue: Volume 7, Issue 3, June 2022
    Pages: 36-47
    Received: 20 May 2022
    Accepted: 14 June 2022
    Published: 27 June 2022
    DOI: 10.11648/j.ajetm.20220703.11
    Downloads:
    Views:
    Abstract: Nowadays, globalization has forced cities, in the north and south, to compete fiercely for tourists. The identity and uniqueness of the traditions of each venue are differentiating factors for the image that tourists have of the venue, which can be a powerful marketing tool for managers if it is integrated into a broader approach that includes the ... Show More
  • Coffee (Coffea arabica L.) Field Establishment and Management Practices in Ethiopia

    Habtamu Gudisa Megersa

    Issue: Volume 7, Issue 3, June 2022
    Pages: 48-58
    Received: 6 June 2022
    Accepted: 6 July 2022
    Published: 12 July 2022
    DOI: 10.11648/j.ajetm.20220703.12
    Downloads:
    Views:
    Abstract: Coffee is one of the most important beverage crops, ranked the second most traded commodity next to oil globally, and grown for its health values, economic and socio-political benefits for several countries including Ethiopia. The arabica type is a highly produced coffee in different countries and dominates 70% of the world coffee trade for its qua... Show More
  • Enhanced Efficiency of Advanced Encryption Standard (EE-AES) Algorithm

    Nahom Gebeyehu Zinabu, Samuel Asferaw

    Issue: Volume 7, Issue 3, June 2022
    Pages: 59-65
    Received: 4 May 2022
    Accepted: 30 May 2022
    Published: 12 July 2022
    DOI: 10.11648/j.ajetm.20220703.13
    Downloads:
    Views:
    Abstract: Encryption is a method of coding information or sensitive data or asset, to prevent unauthorized users from accessing it. Currently, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several of cryptographic techniques are being used to preserve security and could be classified as: symmetric a... Show More