CAPACITY BUILDING FRAMEWORK FOR DEVELOPING RESEARCH IN TERTIARY INSTITUTIONS IN AFRICA

ABSTRACT Tertiary institutions often called Higher education institutions (HEIs) have been experiencing a growing demand for research that can contribute to the continent’s socio-economic development, especially in African society. However, these HEIs are facing significant challenges in building the necessary capacity for research development. The lack of resources, expertise, and institutional support has resulted in

Building Trust in the Smart Economy: Addressing Cybersecurity and Data Privacy Concerns

ABSTRACT: The smart economy offers vast opportunities for innovation and growth, but also brings substantial challenges, in cybersecurity and data privacy. Cyber threats, such as unauthorized access and data breaches jeopardize system integrity, while concerns about data privacy rise with increased cyberattacks. This study investigated the gap between the potential provided by the smart economy

BLOCKCHAIN COLLABORATIVE INTEGRITY VERIFICATION CONSENSUS MECHANISM FOR AVOIDING REPUDIATION IN e-VOTING SYSTEM

ABSTRACT Democracy is a form of governance that gives citizens the opportunity to choose their preferred leader through election. Dissatisfied politicians do turn to court to claim victory. Data captured in an e-voting system is used for forensic analysis to extract evidence for resolving election disputes. Therefore, it must be accurately captured and properly stored.

A Web-Based Collaborative Learning System: Case Study of Enugu State Polytechnic, Iwollo

ABSTRACT Collaborative learning is an educational method of enhancing learning through groups working together. This educational forum addresses the idea of multiple people gathering to share knowledge and engage in conversation. Students typically collaborate in groups to study, look for answers, understanding, or meanings. Different viewpoints and resources can be brought together in a computer-supported

A SMART VALIDATION ARCHITECTURE FOR COMPUTER-BASED EXAMINATION

ABSTRACT Computer-based tests are now one of the prominent methods of administering examinations of various kinds due to their preciseness, predictability and ease of grading especially when multiple-choice methods are used. Despite these motivations, multiple choice-based systems are often fraught with problems such as repeated questions, repeated options for responses in certain cases, questions containing

A SECURED ARTIFICIAL INTELLIGENCE-BASED CONVERSATION AGENT FOR ENTREPRENEURIAL EDUCATION DELIVERY

ABSTRACT Artificial Intelligence-based conversational agent technology such as automatic Chabot responders now used widely in most establishments such as healthcare, education and banking services. Although entrepreneurship education is increasingly becoming popular, the application of AI pedagogical tools has been largely insufficient in disseminating knowledge in this field of study. To bridge this research gap, a

A NOVEL DEEP BELIEF-BASED MODEL FOR THE INTRUSION DETECTION OF NETWORK TRAFFIC

ABSTRACT: The fast expansion of networked systems, combined with the pervasive reliance on the internet, has raised worries about network security, needing new defense methods. Intrusion Detection Systems (IDS) use a variety of ways to distinguish between legitimate and malicious network traffic, including rule-based, signature-based, anomaly detection, and machine learning approaches. While signature-based IDS excel

A NOVEL DEEP BELIEF-BASED MODEL FOR THE INTRUSION DETECTION OF NETWORK TRAFFIC

ABSTRACT The fast expansion of networked systems, combined with the pervasive reliance on the internet, has raised worries about network security, needing new defense methods. Intrusion Detection Systems (IDS) use a variety of ways to distinguish between legitimate and malicious network traffic, including rule-based, signature-based, anomaly detection, and machine learning approaches. While signature-based IDS excel

A Long Short-Term Memory-based Phishing Detection on URL

ABSTRACT The rapid evolution of cyberspace and the advent of new technologies have greatly impacted our daily lives. However, these advancements also present vulnerabilities that malicious actors exploit. Phishing, a common cyber threat, involves creating deceptive traps that can lead to severe consequences like financial loss and blackmail. Traditional detection methods, such as blacklisting, whitelisting,