1 |
Author(s):
Komolafe T.A., Oladimeji O.A., Adiamo O.O., Oyebode O.O., Oyeniyi R.O.A..
Page No : 1-10
|
A Simulation-Based Comparative Study of Controlled Delay (CoDel) with Random early Detection (Red) for Network Performance Evaluation
Abstract
The rising need to use the internet for time/delay-sensitive applications with different Quality of Service (QOS) requirements has made network management and control even more challenging. The current congestion avoidance and control mechanisms for Transport Control Protocol (TCP) are insufficient to offer good service in all circumstances. A few decades ago, the TCP successfully regulated Internet congestion control. However, it is already widely acknowledged that TCP has reached its limits and that new congestion control protocols will be required in the near future. This has prompted a significant amount of research on novel congestion control designs that will meet the demands of the future Internet. With widespread public attention and study, the full buffer problem has not gone away, but rather worsened. As a result, there has been a surge in interest in using Active Queue Management (AQM) in Internet routers to minimize queue latency. The effectiveness of a recently developed AQM, Controlled Delay (CoDel) algorithm, designed to work in today’s network setups and can be deployed as a main part of the bufferbloat solution, is evaluated in this research study. CoDel's effectiveness is evaluated by running simulations in ns-3 and comparing its results to that of Random Early Detection (RED), another promising network queue management technique.
2 |
Author(s):
D. O. Egete, B. I. Ele, D. U. Ashishie.
Page No : 11-19
|
Unequal Culture of Women and Minorities in Cybersecurity Domain
Abstract
Women and ethnic minorities have historically been underrepresented in the cybersecurity industry. Although there are an increasing number of open opportunities in the cybersecurity industry, this pattern has not changed. There is still an imbalance in the participation of women and ethnic minorities in the cybersecurity domain. Issues that impact both Africa and the global participation of women and ethnic minorities in cyber-security include inadequate representation and awareness as well as retention problems. Further, issues such as harassment, gender bias and the idea that cybersecurity is a “man’s world” are also contributing factors. This paper provides a framework for discussing some of the skills that are available to women and underrepresented groups and argues for the necessity to solve this problem. Programs striving to increase the participation of women and ethnic minorities in cybersecurity are discussed. Lastly, some suggestions to remediate this pervasive issue are also provided.
3 |
Author(s):
Oluwafemi Oriola.
Page No : 20-34
|
Collaborative-Based Dynamic Trust Model for Bring-Your-Own-Device Access Control Management in Cloud Environment
Abstract
The operation of bring-your-own-device (BYOD) in the cloud has not only opened cloud servers to more threats but inflicted additional costs on cloud security as it would have to monitor employee devices and their operations. Many organizations therefore have adopted zero trust scheme for BYOD access control management in cloud environment. However, zero trust model introduces extra cost and hostility against internal employees, who have a certain level of trust, as against outsiders. This paper posits that trust quantification for BYOD access control management should be determined by cloud service providers and employers in a dynamic and continuous manner based on session and information values. The paper therefore presents a collaborative-based dynamic trust model that fuses the perspectives of BYOD employer and cloud service provider agents (trustees) for BYOD Nodes (trustors) access control management. The trustees provide prior evidences about the BYOD requests from which plausible inferences are drawn. Three framing of trusts including employee, device and program trusts are formulated based on reliable trust metrics. Dempster-Shafer Belief Function is used to evaluate the belief scores of the trustors’ requests from the probabilities assigned by the trustees. The model is applied to two BYOD nodes, with varying session and information values. The outcomes reveal that the collaborative-based dynamic trust model ensures reduced cost and improved usability compared to zero trust model.
4 |
Author(s):
Mohamed Bangura.
Page No : 35-51
|
Sociological Appraisal of Cultural Digital Skills Gap in Freetown, Sierra Leone
Abstract
The current technological and social panorama brings current benefits and threats that depend upon skills to conduct and achieve. Cultural digital skill is a call for benefiting from technology, and foremost cultural digital skills are imperative because they grant folks the ability to utilise technology in a transient’s manner. Sierra Leonean universities and technical and vocational institutions endure advancing an Information Communications Technology labour pool that is neither modelled by policy nor well assigned to the industry requirements, exclusively at the great point. The Municipal’s graduates are underprepared to accommodate the appeal of the current organisational structure and are incapable of establishing impressive results, progressing to a dearth of proficient and skilled labour pool appropriate for the Freetown cultural digital revolution. The paper anticipates appraising the foremost cultural digital skills evolvement procedure in higher learning institutions, the social reality of the process, and identifies possible challenges leading to the cultural digital skills gap. The paper utilised an archival research strategy and applied the design social reality gap framework with its optimistic record of social dimensions to appraise curriculum, staff, equipment, student enrollment, laboratory and graduation at the higher learning institutions in Freetown Sierra Leone that teach Information Communications Technology programmes. The research findings communicate that there is a low student enrolment in Information Communication Technology programmes resulting in a low number of graduates joining the municipal industry. The appeal for Information Communications Technology skills continues to expand while the industry complains that graduates are not well prepared to undertake projects from the industry forcing the Freetown municipality to rely on foreign expertise. The curriculum utilised in the learning institutions is mismatched, leading to inappropriate competencies to be evolved among the graduates. In spite of the prevalence of standards and protocols from the university regulator (Sierra Leone Tertiary Education Commission), they are not enthusiastically sanctioned due to challenges faced by the regulator and the institutions. A recommended operation strategy was evolved to bridge Freetown's cultural digital skills gap among government agencies, educators or trainers, and employers. The paper spotlighted skills evolvement in higher learning institutions, excluding the technology hubs and complementary programmes offering training programmes for advanced cultural digital skills in the Freetown Municipality. The paper confirmed that inappropriate competencies are being evolved among the graduates, making them unqualified for meeting the requirement of the industry and the Freetown municipality. The paper responds to the policies related to Information Communications Technology labour pool evolvement in the Freetown municipality. The paper will trigger the evolvement of current thinking or thought and social interactions among the learning institutions, academic staff or trainers, employers and government agencies to link the cultural skills gap leading to an empowered municipality competent of upspringing the economic expansion.
5 |
Author(s):
John Asibuo Boakye, Vincent Kofi Akwensi.
Page No : 52-65
|
Challenges Associated with E-Learning and Measures to Curb them on Colleges of Education Students’ in the Upper West Region
Abstract
The aim of the study was to assess the challenges of e-learning on the Colleges of Education students in Ghana using the Nusrat Jahan Ahmadiyya and Mccoy College of Education. The research design was a descriptive survey; the study used a structured questionnaire guide as its main tools for data gathering. A total of 100 students were recruited for the study. The study found that there is a lack of computers, mobile phones, etc., and the necessary skills for e-learning programs among most of the students. Also, the study results showed that students sometimes get lost or confounded about course exercises and deadlines. Again, the study revealed that students sometimes feel distant or disengaged from the instructor. The study found that ensuring a friendly user interface will help solve the challenges in e-learning. The study also found that computer games can be used adequately as a learning resource by educators. It was also revealed that starting e-learning with a mix of both online and offline learning will help eliminate the e-learning challenges. The study finally recommended that, since students perceive e-learning as not being self-motivating, the tutors need to develop assignments that create effective feedback and have interactive elements included within them.
6 |
Author(s):
Umoh Enoima Essien, None, None, None.
Page No : 66-82
|
Design of Question Generator System (QPGS) Using Fisher-Yates Shufling Algorithm
Abstract
The process of generating question papers for educational assessments is a crucial task in the field of academia. The traditional manual approach to question paper creation is time-consuming and prone to human error. In response to this challenge, the Question Paper Generation System (QPGS) has emerged as a powerful solution that leverages technology to automate and streamline the question paper generation process. The Question Paper Generation System has a profound impact on the education sector by enhancing the quality and efficiency of assessments. It empowers educators to create assessments that align with educational goals and standards, ultimately benefiting both teachers and students. Moreover, it contributes to the overall modernization of educational practices by integrating technology seamlessly into the assessment process. This paper provides an overview of the Question Paper Generation System, highlighting its key features, benefits, and impact on educational institutions. QPGS combines advanced algorithms, database management, and user-friendly interfaces to efficiently produce high-quality question papers tailored to specific subjects, courses, and assessment levels. For efficient randomization and shuffling of the questions in the question bank, the Fisher-Yates shuffle algorithm, also known as the Knuth shuffle or the Durstenfeld shuffle, was used. A hybrid of the Object-Oriented Analysis and Design (OOAD) together with the Structured System Analysis Methodology (SSADM) with Unified Modeling Language (UML) was adopted for the design of the system. The system was implemented using HTML, CSS and JavaScript as the front end, while the back end which deals with the system’s logic was implemented using PHP and MySQL. The results obtained were tested using several test strategies.
7 |
Author(s):
Nzerue-Kenneth Peace Ezinne, Onu Fergus Uchenna, Denis Ashishie Undiukeye, Igwe Joseph Sunday, Ogbu Nwani Henry.
Page No : 83-93
|
Detailed Study of the Object-Oriented Programming (OOP) Features in Python
Abstract
Human beings are naturally classified; OOP is closely aligned to how human brains work. The Mathematical functional approach is a more rigorous way to capture an idea; it is more difficult to transpose and the code is not easily readable. To overcome the limitations of procedural, structural, and functional programming, OOP was developed. Because of its versatility, it supports various programming styles which include maintenance, addition and overriding; however, modification of existing code is made easier. OOP programs prevent you from repeating code, making developers choose OOP in their python program because a class can be defined once and reused many times (Thelin, 2020). By the end of this article, you will be able to create classes, instantiate objects from them, and integrate the four methods of OOP by creating modules of Python projects. With the basic concept of OOP in Python, this article has shown how we can hide our data by making it private (abstraction), allowing for code reusability (inheritance), constraining dependency management through polymorphism and rapping data and function together to prevent data from being accessed by the code outside this shield (encapsulation).