PROMOTING YOUTH EMPLOYMENT THROUGH THE WEAPON OF INFORMATION AND COMMUNICATION TECHNOLOGY

ABSTRACT This study explores the role of Information and Communication Technology (ICT) in promoting and opening up career prospects for the Nigerian youth. In many countries, youth empowerment aims to give young people the skills necessary for self-employment and nation-building. The unemployment and underemployment rates among Nigerian graduates and young people are on the high

PREDICTION OF STOCK MARKET RETURNS IN NIGERIA USING LONG-SHORT TERM MEMORY RECURRENT NEURAL NETWORK MODEL

ABSTRACT Accurate forecasting of the stock market returns is a challenging task due to the volatile and nonlinear nature of the stock return values. Prediction of financial time series using different models in machine learning and deep learning have gained some degree of notable accuracy. The recurrent neural networks (RNN) have bases on deep learning

PERFORMANCE EVALUATION OF ENSEMBLE LEARNING ALGORITHMS AND CLASSICAL MACHINE LEARNING ALGORITHMS FOR PHISHING DETECTION

ABSTRACT The advancement in technology and subsequent prevalence of electronic commerce in world trade has resulted in the migration of the majority of banks’ customers to e-banking for their day- to-day financial transactions. This advent of e-commerce has also attracted the attention of fraudsters to defraud bank customers, therefore making e-commerce platforms to be prone

ONLINE LEARNING EXPERIENCES DURING SCHOOLS LOCKDOWN: CASE OF STUDENTS IN A NIGERIAN HIGHER EDUCATION INSTITUTION

ABSTRACT Recently, learning experiences have taken on a new dimension in Nigeria and worldwide, resolving into a virtual learning method representing real classroom scenarios. As a result, students are required to learn in a unique dimension that adopts the use of technology. This article, therefore, investigated a case of polytechnic students’ experiences of learning in

MODELLING CYBERSECURITY KNOWLEDGE AND ATTITUDES OF ONLINE USERS

ABSTRACT Individuals and organizations are persistently being exploited by cybercriminals. With the increased dependence on the Internet, cyberattacks have become even more prominent. However, many of the Internet users under-prioritize their online safety, and fall victims. Their unawareness and negligence of cybersecurity poses devastating consequences. It is thus essential to analyze the factors affecting the

LINEAR CLASSIFICATION MODELS AND TREE CLASSIFIER APPROACH IN THE DETECTION OF ANDROID MALWARE WITH HYPER-PARAMETER TUNING

ABSTRACT The increasing sophistication and amount of malicious activities on users by mobile malware has resulted from the continued global adoption of smartphones, subverting what has become the largest range of targets with the most lucrative rewards. Malware detection is critical because of the types of harm that can be caused, such as unauthorized data

INVESTIGATING PERFORMANCE OF LIGHTWEIGHT MESSAGE AUTHENTICATION CODE ON INTERNET OF THINGS DEVICES

ABSTRACT Data security remains a serious challenge in every IoT setting. Recently the NIST called for submission of proposals for lightweight cryptographic algorithms for IoT devices and other resource constrained enviroment. This work investigates the implementation of the LightWeight Message Authentication Code on two Single Board Computers (SBCs) namely Raspberry Pi B+ and Orange Pi