Full Issue

View or download the full issue PDF

Table of Contents

Articles

Mary Ogbuka Kenneth, Stephen Michael Olujuwon

Views - 161  (Abstract) PDF - 24  (Download)
Abstract: Alphanumerical usernames and passwords are the most used computer authentication technique. This approach has been found to have a number of disadvantages. Users, for example, frequently choose passwords that are simple to guess. On the other side, if a password is difficult to gu...
Read more >>
PDF
Uttam U. Deshpande, Aditya Barale, V. S. Malemath

Views - 526  (Abstract) PDF - 19  (Download)
Abstract: The prime reason for proposing the work is designing and developing a low-cost guided wireless Unmanned Ground Vehicle (UGV) for use in hospitals for assistance in contactless drug delivery in COVID-19 wards. The Robot is designed as per the requirements and technical specifications required for ...
Read more >>
PDF
Wokili Abdullahi, Mary Ogbuka Kenneth, Morufu Olalere

Views - 82  (Abstract) PDF - 22  (Download)
Abstract: Features in educational data are ambiguous which leads to noisy features and curse of dimensionality problems. These problems are solved via feature selection. There are existing models for features selection. These models were created using either a single-level embedded, wrapper...
Read more >>
PDF
Uttam U. Deshpande, Pooja Hulajatti, Shraddha Suryavanshi, Vrunda Balgi

Views - 136  (Abstract) PDF - 20  (Download)
Abstract: In the evolving situation of highly infectious coronavirus, the number of confirmed cases in India has largely increased, which has resulted in a shortage of health care resources. Thus, the Ministry of Health and Family Welfare- Government of India issued guidelines for the ‘Home isolation of CO...
Read more >>
PDF
Fatima Isiaka, Zainab Adamu

Views - 44  (Abstract) PDF - 14  (Download)
Abstract: In network settings, one of the major disadvantages that threaten the network protocols is the insecurity. In most cases, unscrupulous people or bad actors can access information through unsecured connections by planting software or what we call malicious software otherwise anomal...
Read more >>
PDF