Downloads
IMPROVED ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHMS
ABSTRACT The recent popularity of Elliptic Curve Digital Signature Algorithm (ECDSA) has been attributed to its capability of providing good security using shorter key size. Although ECDSA is secure based on the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP) and it is being used to ensure users’ authentication, transactions non-repudiation, and data integrity,
A UML APPROACH TO DESIGNING A FAIR DATA POINT REPOSITORY
ABSTRACT Academic projects generate vast amounts of valuable data that can greatly benefit the research community if properly managed and shared. However, the lack of structured and standardized design processes for creating fair data repositories hinders data accessibility and reuse. In response to this challenge, this study presents a UML (Unified Modelling Language) approach to
CYBER-SECURITY CONSCIOUSNESS AND EDUCATION STRATEGY IN NIGERIA
ABSTRACT Cybersecurity consciousness and education are critical to a cyber-user’s safety when utilizing the internet. The aim of this paper is to determine the level of user cybersecurity consciousness and education in Nigerians and develop a sustainable strategy to close the knowledge gap and, as a result, advance better cyber-hygiene and security. This study
ELECTROENCEPHALOGRAM-BASED DEPRESSION CLASSIFICATION USING DEEP NEURAL NETWORK
ABSTRACT Plants like human are affected by numerous diseases which retard their growth. The result of this retarred growth is not only very detrimental to the plants but also to the human and the nation at large. A major challenge towards forestalling the effect of different diseases on plants is the inability of farmers to
USE OF TRANSFER LEARNING AND MACHINE LEARNING FOR DISEASE PRONE DETECTION IN WATERMELON FRUIT
ABSTRACT Given that consumption has increased as a result of medical advice, watermelon crop disease detection is essential for maintaining its health. The Jupyter IDE, libraries, Kaggle dataset, preprocessing, constructing CNN model, training, and testing steps of a deep learning-based technique were suggested. The pre-selected box setting method used by the CNN model was enhanced
TOWARDS A BLOCKCHAIN-BASED PARTIAL COMPUTATION OFFLOADING FOR THE METAVERSE IN IN-NETWORK COMPUTING
ABSTRACT The Metaverse is anticipated to offer an immersive experience to many simultaneous users. Therefore, it is critical to optimally allocate computing resources to meet the massive users’ demand. Meanwhile, the In-network computing (COIN) paradigm has emerged to reduce delay and meet quality of experience (QoE) by using unused network resources for performing some tasks.
SMART IoT DRONE SYSTEMS FOR NEWS AND INTELLIGENCE GATHERING IN DIGITAL JOURNALISM
ABSTRACT The adoption of Internet of Things (IoT) Drones in journalism had signalled a digital revolution that altered news reporting, intelligence gathering, and the management of journalistic information processing in accordance with disruptive technology paradigm shift, which epitomizes information communication technologies(ICTs) digital ascendancy. The ICTs embedment are steadily changing how information are gathered and disseminated
SMART AGRICULTURE: REVOLUTIONIZING FOOD PRODUCTION THROUGH SMART FARMING TECHNOLOGY IN NIGERIA
ABSTRACT With and anticipated increase in global population to nearly 9 billion by 2050, and the impact on climate and our environment, there is need to rethink agriculture in a way that will boost food production for human sustainability in the near future. The need for farmers to change their approach towards farming is therefore
REVIEW OF E-COMMERCE APPLICATIONS IN NIGERIA: BENEFITS AND CHALLENGES
ABSTRACT E-commerce is a profit-making transaction strategy that enables faster and wider business transactions in wider contexts of economic value and value creation via the Internet. The paper studies the current situation of e-commerce applications in Nigeria, with an emphasis on the drawbacks and advantages of online shopping in Nigeria. A review of the literature
More Downloads
EDGE AND CLOUD COMPUTING: A REVIEW IN TECHNOLOGY
1 file(s) 36.00 KB
Predicting Cloud Computing Adoption in IoMT Using Deep Learning Approach
1 file(s) 1,002.72 KB
A Cyber Persecution: Classification Using Ensemble Learning
1 file(s) 1.37 MB
CYBER-SECURITY CONSCIOUSNESS AND EDUCATION STRATEGY IN NIGERIA
1 file(s) 497.66 KB