The essence of high Quality of Service
(QoS) provisioning in any network is centred on
optimization which can be approached from different
perspectives depending on the network operator’s
target and Key Performance ...
GAGA, Thomas Ali(Global Journal of Applied, Management and Social Sciences, 2022-04)
This study examined the effectiveness of computer as individualized instructional method in Education in
Ekwusigo L.G.A, Anambra State. A survey research design was used to select respondents for the study. A
total two ...
GAGA, Thomas Ali(Global Journal of Applied, Management and Social Sciences, 2022-04)
The business world has gone global making the use of computer and information communication technology
a necessity. It is based on this that this research investigated on the impact of computer on business education ...
GAGA, Thomas Ali(International Journal of Library and Information Technology (IJLIT), 2022-03)
This work involved; the opinions of teachers about students taught by qualified teachers and those taught by
non-experts, the opinions of teachers about students taught using instructional materials and those taught ...
GAGA, Thomas Ali(International Journal of Library and Information Technology (IJLIT), 2022-03)
The paper evaluates the laws which regulate and govern data protection in Nigeria and contrasts them
with that of a selected African Nation (South Africa). It then makes recommendations for improvement of
data protection ...
GAGA, Thomas Ali(International Journal of Library and Information Technology (IJLIT), 2022-03)
The Nigerian government through National Information Technology Development Agency(NITDA)put out a
cloud computing policy which is expected to ensure a 30% increase in the adoption of cloud computing by
2024 among Federal ...
TATAMA, Barka Fo(International Journal of Advanced Trends in Computer Science and Engineering, 2019-12)
Security is one of the most fundamental challenges of
mankind, providing affordable devices for apprehending
criminals. Using smart technology is on the rise and the ability
to have full surveillance records of both ...
TATAMA, Barka Fo(International Conference on Engineering for Sustainable World, 2019)
Voting is fundamental to any consensus-based society and is one of the most
critical functions of democracy. Mobile voting (m-voting) was utilized as a means
for voters to easily and conveniently cast their votes using ...
KULUGH, Victor Emmanuel(FUW Trends in Science and Technology Journal (FTSTJ), 2022-08)
The increasing adoption of ICT in traditional Critical infrastructure (CI) to improve productivity and efficiency while creating new services and functions is vital for modern society. However, CI driven by ICT is inherently ...
Kulugh, Victor Emmanuel(Journal of Information Science, Systems, Technology, 2020-11)
Critical infrastructures (CI) at the national or organizational level is nowadays seen as both inclusive of and dependent on the Information Communications Technology (ICT)
infrastructure for interconnecting and driving ...
This paper presents the characterisation of critical
infrastructures in Nigeria as an initial step towards development of
a framework for the uniform designation of an infrastructure as a
Critical National Information ...
KULUGH, Victor Emmanuel(Nigerian Computer Society, 2018-07)
The study is aimed at presenting basic inventory of
Cyber Physical Systems (CPS) vis-à-vis Internet of
Things (IoTs) and also present current research issues
and challenges in this aspect of computing and
development. ...
KULUGH, Victor Emmanuel(International Journal of Critical Infrastructure Protection, 2022-01)
This paper presents a computational model for the quantification of
critical infrastructure (CI) degree of dependency on ICT. Traditional CIs that
support modern society in providing uninterruptable vital services ...
KULUGH, Victor Emmanuel(Law and Social Justice Review (LASJURE), 2022-07)
Global indices show that Nigeria has grown tremendously over the years in technology adoption which thrives
on collection, processing, storage and transmission of huge amounts of citizens’ data. However, the absence ...
Kulugh, Victor Emmanuel(International Journal of Critical Infrastructure Protection, 2023-01)
This article presents a methodological approach for the
characterisation of critical national infrastructure (CNI). Despite several
approaches to identifying CNI, there has not been any universally acceptable
way that ...
KULUGH, Victor Emmanuel(Journal of Natural and Applied Sciences, 2023-12)
The 2023 presidential election in Nigeria presented a contest that differed from previous elections as it presented four leading candidates
that all had huge potentials to win, thus making prediction of the outcomes by ...
USMAN, Adamu Sulaiman(British Journal of Mathematics & Computer Science, 2015-01)
The Internet of Things is expected to bring a revolution in the way objects around us communicate with one another and human beings and the way this information will be gathered and distributed. This also means a resultant ...
YAKUBU, Ibrahim; ADELAIYE, Oluwasegun; YUSUF, Musa; IPOLE, Nancy; AIYEDOGBON, Sunday(FACULTY OF COMPUTING AND APPLIED SCIENCES (FCAS) BAZE UNIVERSITY, ABUJA, 2023)
This paper seeks to provide comprehensive overview of the challenges and potential developments within the realm of cybersecurity and cybercrime in Nigeria. The unintended consequence of internet’s growth in Nigeria has ...
IPOLE, Nancy; ADELAIYE, Oluwasegun; MUSA, Yusuf; USMAN, Adamu; HASSAN, Anah; MAIKIORI, Jenom; YAKUBU, Ibrahim(International Conference on Computing and Advances in Information Technology (ICCAIT 2023), 2023)
Malaria, a severe global health threat, remains a challenge despite ongoing efforts. This paper reviews various studies, highlighting disease severity and combat strategies. The substantial public health burden of malaria ...
HASSAN BIJIK, Anah(IOSR Journal of Computer Engineering, 2023)
Cloud computing security is a serious concern. There is a considerable requirement for infrastructure security
at the network, host, application, and data levels. Data is related with each level, such as network, host, ...