An End-User Programming Approach for Creating Virtual Innovation Labs

ABSTRACT: Virtual worlds implemented as online multi-user environments possess great potential in connecting teams collaborating on tasks such as brainstorming and idea generation. Brainstorming and idea generation for teams usually occur in innovation Labs, which is a physical purpose-built facility to support such sessions. Virtual online innovation labs provide more benefits such as connecting team

Enhanced Approach to Microprocessor Education

ABSTRACT: Owing to the need to continually provide Electrical Electronics (EE) and Computer Science (CS) students with practical, cognitive and transferable skills required in the industries, this work was done to  enhance the existing course content of Microprocessor   Application   course   (EEE438).  The adopted course enhancement process which covered the 2015 to 2018 academic sessions of

Development of an Electronics Fees Payment Gateway

ABSTRACT: Advancement in technology has made businesses shift from physical shopping, email, and cell phone demand to e-commerce. Technology advancement especially in the area of electronic commerce and the Internet enhanced the use of electronic payment globally. Unfortunately, check and cash transactions are still extensively practiced in developing countries. This study devised an alternative system

Application of Computation Control Techniques in Industrial Chemical Process: A Review

ABSTRACT: There are various methods in literatures for industrial chemical process design and control. The control processes uses computational algorithms developed with the aid of computer systems.  These computational algorithms can be a conventional control strategy, which is the Proportional, Integral and Derivative (PID) controller can easily be implemented, or an intelligent control technique in

An Investigation of Cybersecurity Vulnerability Landscape

ABSTRACT: This paper presents an investigation of contemporary Cybersecurity Vulnerability Landscape as a component of building a nation’s cybersecurity resilience. All cyber-attacks share a common characteristic of taking the advantages of inherent vulnerabilities causal to cyberspace assets. Consequently, cyberattack occurs as a result of vulnerability opportunities that can be exploited by a malicious party or

Adoption of Smart and Disruptive Technologies for Educational Development And Automation of Industry 4.0 In Nigeria

ABSTRACT: To meet the 21st century digital learning environment and requirement, Nigeria and most sub-Saharan Africa countries would require a comprehensive reworking and overhaul of their current curriculum of education to integrate technological innovations and Inventions into their main stream educational program through early adoption of scientific methodology. Such methodology will require hybridization of the

A Survey on 5G Networks In Developing Economies and Balancing the Efficacy of the Internet of Things (IoT) and the Ethics of Things (EoT): Challenges and Solutions

ABSTRACT: Over the years several mobile wireless technologies have evolved with incremental improvements in spectral efficiency, data transmission rates, capacity, latency and quality of service (QoS) metrics, however they are limited in driving a pervasive connected world of Internet of Things (IoT). To address these technical challenges, the Fifth Generation (5G) mobile technology was proposed