Full Issue

View or download the full issue PDF

Table of Contents


Mary Ogbuka Kenneth, Stephen Michael Olujuwon

Article ID: 3535
Views - 374  (Abstract) PDF - 39  (Download)
Abstract: Alphanumerical usernames and passwords are the most used computer authentication technique. This approach has been found to have a number of disadvantages. Users, for example, frequently choose passwords that are simple to guess. On the other side, if a password is difficult to guess, it is also difficult to remember. Graphical passwords h...
Uttam U. Deshpande, Aditya Barale, V. S. Malemath

Article ID: 3489
Views - 692  (Abstract) PDF - 34  (Download)
Abstract: The prime reason for proposing the work is designing and developing a low-cost guided wireless Unmanned Ground Vehicle (UGV) for use in hospitals for assistance in contactless drug delivery in COVID-19 wards. The Robot is designed as per the requirements and technical specifications required for the healthcare facility. After a detailed survey and tests o...
Wokili Abdullahi, Mary Ogbuka Kenneth, Morufu Olalere

Article ID: 3534
Views - 171  (Abstract) PDF - 31  (Download)
Abstract: Features in educational data are ambiguous which leads to noisy features and curse of dimensionality problems. These problems are solved via feature selection. There are existing models for features selection. These models were created using either a single-level embedded, wrapperbased or filter-based methods. However single-level filter-b...
Uttam U. Deshpande, Pooja Hulajatti, Shraddha Suryavanshi, Vrunda Balgi

Article ID: 3487
Views - 261  (Abstract) PDF - 30  (Download)
Abstract: In the evolving situation of highly infectious coronavirus, the number of confirmed cases in India has largely increased, which has resulted in a shortage of health care resources. Thus, the Ministry of Health and Family Welfare- Government of India issued guidelines for the ‘Home isolation of COVID-19 positive patients’ methodology for asymptomatic patie...
Fatima Isiaka, Zainab Adamu

Article ID: 3578
Views - 122  (Abstract) PDF - 22  (Download)
Abstract: In network settings, one of the major disadvantages that threaten the network protocols is the insecurity. In most cases, unscrupulous people or bad actors can access information through unsecured connections by planting software or what we call malicious software otherwise anomalies. The presence of anomalies is also one of the disadvanta...