Design and Development of Internet of Things-Based Physical Office Security System

ABSTRACT Traditionally, physical-security measures in offices relied on keys, burglary-proof and security men especially in underdeveloped countries. These lacked continuous and reliable real-time monitoring and intrusion detection abilities. Recently, the rise of technology, particularly Internet of Things (IoT) has initiated the use of automated security systems that ensure real-time monitoring and intrusion detection. IoT-based physical

A Real-Time Data Collection System of Visual, Auditory, Read/Write, Kinaesthetic (VARK) Learning Preferences for Personalized Adaptive E-Learning System Model

ABSTRACT Visual, Auditory, Read/Write, and Kinaesthetic (VARK) offers a widely accepted framework for capturing learner learning preferences. Research has indicated that Traditional VARK data capture system provides a rapid method of classifying learning types and a basic understanding of learner tendencies. However, there are limitations in the areas of accuracy, scalability, and adaptability. Hence, this

SAFETYNET: A COLLABORATIVE AND PRIVACY-PRESERVING MOBILE SAFETY APPLICATION SYSTEM

ABSTRACT Personal safety concerns continue to rise globally, with increasing incidents of assault, domestic violence, and kidnappings highlighting the limitations and inefficiencies of current safety applications. This paper presents a collaborative, robust and privacy-preserving mobile safety application system. The system explores a community-driven approach to emergency response. Developed using Agile development methodology with the Flutter

ADVANCING HEALTHCARE THROUGH EMERGING TECHNOLOGIES: A SYSTEMATIC REVIEW OF BENEFITS, CHALLENGES, METHODOLOGIES, AND RESEARCH DIRECTIONS

 ABSTRACT Healthcare is rapidly evolving with advanced technology improving operations, early diagnosis, and medical procedures. Integrating these innovations enhances accuracy, efficiency, and speed, ultimately transforming patient care and medical practices. These advancements contribute to a safer, more effective, and accessible healthcare system for both patients and professionals. A comprehensive review of 1,008 research articles on

EXPLORING CO-DESIGN CHALLENGES AND INSIGHTS FOR CO-DESIGNING AN MHEALTH INTERVENTION FOR MALARIA PREVENTION AND CONTROL IN MARGINALIZED COMMUNITIES IN NIGERIA

ABSTRACT Our research investigated the issues and benefits inherent with conducting co-design research in marginalized/ hard-to-reach communities in Nigeria, using Ebonyi State as a case study. The study concentrated on creating a design framework for health intervention creators to enable them to create culturally relevant and community -oriented interventions system that will help them to

SOFTWARE ENGINEERING FOR THE INDEPENDENT NATIONAL ELECTORAL COMMISSION’S (INEC) ELECTION VIEWING PORTAL (IREV)

ABSTRACT Free and fair elections are central to democratic governance. Nonetheless, many developing democracies continue to struggle with perfecting their election processes to enhance fairness and transparency. Even if elections are fair, the processes must be seen by citizens as transparent. Election technologies have been introduced to improve effectiveness and transparency in many countries. In

A SURVEY ON TRADITIONAL AND DEEP LEARNING TECHNIQUES FOR CYBER ATTACK DETECTION IN INTERNET OF MEDICAL THINGS

ABSTRACT Apparently, connected devices on Internet has grown astronomically to about 18.8 billion globally in the year 2024. IoT is the network of physical devices equipped with sensors and applications to generate and transmit data over the internet. Internet of Medical Things (IoMT) is an emerging subset of IoT and it involves integration of health

DISTRIBUTED LEDGER TECHNOLOGIES (DLTS): RECONCILING THE TRADE-OFF BETWEEN TRANSACTION EFFICIENCY AND FINANCIAL REGULATIONS

ABSTRACT One aspect of human society that has set us apart is our unwillingness to trust others. This difficulty has led to a situation known as the prisoner’s dilemma, in which trust can only be earned by frequent exchanges, a good reputation, or third-party enforcement. The requirement for more effectively enabled societies that can coordinate

CROSS-PARTITION ATTENTION (CPA): A PROPOSED SCALABLE TRANSFORMER FRAMEWORK FOR SMART CONTRACT VULNERABILITY DETECTION

ABSTRACT Blockchain’s decentralized trust model relies heavily on secure smart contracts. However, vulnerabilities such as reentrancy and integer overflow persist due to the limitations of existing detection tools. While transformer-based models (e.g., CodeBERT) offer improvements over traditional rule-based methods, they struggle with context truncation and token-level bias, often failing to capture cross-function vulnerabilities in lengthy