Computer and Information Science Research Papers/Topics

Online Learning compared to Face-to-face Learning

online learning has become widespread; COVID-19 forced the world to apply the online learning system at all levels for more than two years. It has become an important alternative to face-to-face education, even after returning to face-to-face learning, online learning has remained alongside online learning and become an approved method for learning in most countries even after the COVID-19 pandemic. Online learning was welcomed and comfortable for some students and was efficient in some cases...

A Blockchain Based E-Wallet 2020

Abstract— Payment methods using digital currencies are increasing in the current period, and it is considered one of the fastest and safest ways to manage the financial system around the world. Therefore, e-wallets have become an integral part of individuals' lives in many societies, because the user does not have to use credit card numbers or bank accounts in An unknown commercial platform, it is possible to deposit from a credit card or bank account to the e-wallet, which in turn will ...

Defining Data Science: Beyond the Study of the Rules of the Natural World as Reflected by Data

INTRODUCTION Data science has received widespread attention in academic and industrial circles. New data science research institutes and organizations have continued to emerge on the scene, such as the Columbia University Institute for Data Sciences and Engineering and New York University Center for Data Science. The University of California at Berkeley, Columbia University, Fudan University, and other universities have launched data science courses and degree programs. Cleveland and Smith pr...

HDFS+: Erasure Coding Based Hadoop Distributed File System

Abstract : A simple replication-based mechanism has been used to achieve high data reliability of Hadoop Distributed File System (HDFS). However, replication based mechanisms have high degree of disk storage requirement since it makes copies of full block without consideration of storage size. Studies have shown that erasure-coding mechanism can provide more storage space when used as an alternative to replication. Also, it can increase write throughput compared to replication mechanism. To i...

THE POSITIVE AND NEGATIVE IMPACTS OF ICT

As it is known from time immemorial that everything in life is like the two side of a coin, there is always a positive and negative side of every phenomenon. But whether the effect is positive or negative the effects of Information Communication Technology (ICT)  is far reaching and cannot be overemphasized. The Effects of ICT lens looks at how our lives have been changed, for better and for worse, by the impact of ICT. It includes both positive effects and negative effects and looks at how ...

The Security Implications of Virtual Local Area Network VLAN Niger Mills Calabar Nigeria

Virtual local area network (VLAN), is a logical grouping of network users and resources connected to administratively define the operation of activated ports on a switch. The creation of VLAN is saddled with the ability to develop smaller broadcast domain within a layer-2 switching router; by assigning different ports on the switch to different sub networks. The application was a re-design project carried out on the Niger-Mills’ network to improve the operational short falls identified by t...

Modeling a low potency ipnetwork in Nigeria.

— Investigations have shown that interior places of the nation lacked capacity for high speed Internet usage; except the cosmopolitan sections. This article, therefore, conceptualizes a robust Broadband roadmap that can effectively deliver IP-wholesale and IP-retail services, through traffic convergence. The interconnect platforms are designed to ensure automatic re-routing of broadband traffic during link or node failure. The IP-wholesale services can be delivered to all main cities in Nig...

OPTIMIZING THE MOVEMENT OF PEOPLE AND GOODS IN A LOCAL COMMUNITY USING TRANSPORTATION MODEL

Transportation problem is one of the real regions of utilization of linearprogramming, in this paper, we would take a gander at how to upgrade the separation andtime taken to make a trip starting with one point then onto the next in a Local community,with Otta Local government area as our concentration, utilizing the transportation display.Having the capacity to accomplish this accomplishment would improve the developmentof individuals and merchandise inside the organization by sparing time a...

Reviewing Cyber-attack Incidents and Their Impacts on Global Oil and Gas Infrastructures: A Nigerian Perspective

ABSTRACTOil and Gas sector includes the exploration, gathering, production, processing, storage, and transportation of petroleum liquids and natural gas. With the oil and gas sector fueling every aspect of our daily life, the protection of its critical infrastructure is crucial. It is known that digitally connected oil and gas operations help to improve production (General Electric, 2018). So, in order to sustain uninterrupted energy production and for quick recovery from major cyber incident...

Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

The  tumultuous  increase  in  ATM  attacks  using  eavesdropping,  shoulder-surfing,  has  risen  great  concerns.  Attackers  often  target  the  authentication stage where a customer may be entering his login information on the ATM and  thus  use  direct  observation  techniques  by looking  over the  customer's shoulder to steal his passwords. Existing authentication mechanism employs the  traditional  password-based  authentication  system  which  fails  t...

Quantifying the Value of Open Source Hard-ware Development

With the maturation of digital manufacturing technologies like 3-D printing, a new paradigm is emerging of distributed manufacturing in both scientific equipment and consumer goods. Hardware released under free licenses is known as free and open source hardware (FOSH). The availability of these FOSH designs has a large value to those with access to digital manufacturing methods and particularly for scientists with needs for highly-customized low-volume production products. It is challenging t...