TATAMA, Barka Fo(International Journal of Advanced Trends in Computer Science and Engineering, 2019-12)
Security is one of the most fundamental challenges of
mankind, providing affordable devices for apprehending
criminals. Using smart technology is on the rise and the ability
to have full surveillance records of both ...
TATAMA, Barka Fo(International Conference on Engineering for Sustainable World, 2019)
Voting is fundamental to any consensus-based society and is one of the most
critical functions of democracy. Mobile voting (m-voting) was utilized as a means
for voters to easily and conveniently cast their votes using ...
KULUGH, Victor Emmanuel(FUW Trends in Science and Technology Journal (FTSTJ), 2022-08)
The increasing adoption of ICT in traditional Critical infrastructure (CI) to improve productivity and efficiency while creating new services and functions is vital for modern society. However, CI driven by ICT is inherently ...
Kulugh, Victor Emmanuel(Journal of Information Science, Systems, Technology, 2020-11)
Critical infrastructures (CI) at the national or organizational level is nowadays seen as both inclusive of and dependent on the Information Communications Technology (ICT)
infrastructure for interconnecting and driving ...
This paper presents the characterisation of critical
infrastructures in Nigeria as an initial step towards development of
a framework for the uniform designation of an infrastructure as a
Critical National Information ...
KULUGH, Victor Emmanuel(Nigerian Computer Society, 2018-07)
The study is aimed at presenting basic inventory of
Cyber Physical Systems (CPS) vis-à-vis Internet of
Things (IoTs) and also present current research issues
and challenges in this aspect of computing and
development. ...
KULUGH, Victor Emmanuel(International Journal of Critical Infrastructure Protection, 2022-01)
This paper presents a computational model for the quantification of
critical infrastructure (CI) degree of dependency on ICT. Traditional CIs that
support modern society in providing uninterruptable vital services ...
KULUGH, Victor Emmanuel(Law and Social Justice Review (LASJURE), 2022-07)
Global indices show that Nigeria has grown tremendously over the years in technology adoption which thrives
on collection, processing, storage and transmission of huge amounts of citizens’ data. However, the absence ...
Kulugh, Victor Emmanuel(International Journal of Critical Infrastructure Protection, 2023-01)
This article presents a methodological approach for the
characterisation of critical national infrastructure (CNI). Despite several
approaches to identifying CNI, there has not been any universally acceptable
way that ...
KULUGH, Victor Emmanuel(Journal of Natural and Applied Sciences, 2023-12)
The 2023 presidential election in Nigeria presented a contest that differed from previous elections as it presented four leading candidates
that all had huge potentials to win, thus making prediction of the outcomes by ...
USMAN, Adamu Sulaiman(British Journal of Mathematics & Computer Science, 2015-01)
The Internet of Things is expected to bring a revolution in the way objects around us communicate with one another and human beings and the way this information will be gathered and distributed. This also means a resultant ...
YAKUBU, Ibrahim; ADELAIYE, Oluwasegun; YUSUF, Musa; IPOLE, Nancy; AIYEDOGBON, Sunday(FACULTY OF COMPUTING AND APPLIED SCIENCES (FCAS) BAZE UNIVERSITY, ABUJA, 2023)
This paper seeks to provide comprehensive overview of the challenges and potential developments within the realm of cybersecurity and cybercrime in Nigeria. The unintended consequence of internet’s growth in Nigeria has ...
IPOLE, Nancy; ADELAIYE, Oluwasegun; MUSA, Yusuf; USMAN, Adamu; HASSAN, Anah; MAIKIORI, Jenom; YAKUBU, Ibrahim(International Conference on Computing and Advances in Information Technology (ICCAIT 2023), 2023)
Malaria, a severe global health threat, remains a challenge despite ongoing efforts. This paper reviews various studies, highlighting disease severity and combat strategies. The substantial public health burden of malaria ...
HASSAN BIJIK, Anah(IOSR Journal of Computer Engineering, 2023)
Cloud computing security is a serious concern. There is a considerable requirement for infrastructure security
at the network, host, application, and data levels. Data is related with each level, such as network, host, ...
HASSAN BIJIK, Annah(Indonesian Journal of Computer Science, 2023)
Cloud computing is the technology used to store massive volumes of data
(Big data) on servers whose whereabouts are hidden from user of the
service. The possibility of sensitive data being accessed by cloud operators ...
LAWAL, Ibrahim(Nigerian Journal of Scientific Research, 2019-10-21)
Playfair cipher is one of the most popular poly-alphabetic ciphers that can be used suitably for wireless and mobile
devices where security requirements are high and system resources are low. The existing work uses a ...
Adelakun-Adeyemo, Oluwatoyin; Adelaiye, Olusegun I.; Ochokwunu, H(University of Ibadan Journal of Science and Logics in Computing and ICT Research (UIJSLCTR), 2017)
Mobile phones have become a vital part of our everyday activities for personal, business and educational purposes. A lot of
interaction with the mobile phone is a via text input. This research presents an empirical ...
Programming is a core skill in computing. Much of computing education and work in industry and research has programming skill is an important factor. Human subjects have varying levels of programming experience which affects ...
Automatic Speech Recognition has found
its application on various aspects of our daily lives such
as automatic phone answering service, dictating text and
issuing voice commands to computers. Speech
recognition is ...
Bioterrorism agents are mostly microorganisms with the capacity to deal explosive and lethal harm to humans, animals, and
food crops. These microorganisms spread in the form of gases, whole organisms, or products of ...