Open Access Original Research Article
Ibrahim Goni, Christopher U. Ngene, Manga I., Auwal Nata’ala, Sunday J. Calvin
Tuberculosis is a contiguous disease that is causing death both in developed and developing countries. The main aim of this research work was to a developed an intelligent system for diagnosing Tuberculosis using adaptive neuro-fuzzy methodology. Eleven symptoms of tuberculosis which are persistent cough for more than two weeks, cough with blood, weight loss, tiredness, chest pain, fever, difficulty in breathing, loss of appetite, lymph node enlargement, history of TB contact and night Sweat are assigned with weights which are categorize best on severity level as mild, moderate, severe and very severe, yes and no which serve as inputs to the adaptive neuro-fuzzy inference system (ANFIS). MATLAB 7.0 is used to implement this experiment, Trapezoidal Membership function was used, back propagation algorithm was used for training and testing, the error obtain is 0.41777 at epoch 2 which shows that the training performance is exactly 99.58223 and testing performance of the system are 99.58197 at epoch 2.
Open Access Original Research Article
Nobo Chowdhury, K. M. Aslam Uddin, Sadia Afrin, Apurba Adhikary, Fazly Rabbi
Cloud computing is an information technology archetype which has been used significantly for providing various services through Internet. It ensures easier access to resources and high-level services. The working procedure of cloud systems must be scheduled, so as to efficiently provide services to people. The goal of task scheduling is to acquire best system throughput and to allocate various computing resources to applications. The unpredictable situation increases with the size of the task and becomes high potential to solve effectively. Numerous intellectual methods are recommended to clarify this situation in the territory of scheduling of cloud computing. In this research, a comparative analysis has been conducted for different types of existing scheduling algorithms in the cloud environment with their respective parameters.
Open Access Original Research Article
Fractal dimension is mathematically defined as a ratio of statistical complexity of network traffic; its significant manifestation can affect the network performance. In this work, two models of corporate computer networks have been developed using optimized network engineering tool (OPNET) technology. Raw packet generator (RPG) traffic was imposed on the corporate networks and modeled using H = 0.7 and D = 1.3, under the influence of Pareto distribution. Autocorrelation function and power law were used to confirm the presence of fractal traffic on the networks. Average Hurst index (H) of 50 and 100 workstations were estimated using aggregate of variance, absolute moment, periodogram and R/S methods as 0.627, 0.608 and its corresponding fractal dimensions (D) were obtained as 1.371 and 1.391 respectively. These results obtained mean, there is a manifestation of fractal traffic and delay is minimised on the network.
Open Access Original Research Article
Kadima Victor Chitechi, Samuel Mbugua, Kelvin Omieno
Globally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a number of challenges in terms of vulnerabilities and other cybersecurity risks. This paper sought to identify the key facilitators of cybersecurity vulnerabilities in Kenyan County Governments only. The exploratory research design was used as a methodology. Questionnaires and interview schedules were the main instruments of data collection. The data was analysed using descriptive and inferential statistics. The findings indicate that there is a need for County Governments in Kenya to prepare for cybersecurity related challenges through policy formulations, End-users and ICT experts awareness on cybersecurity-attacks, Management support through resources funding and cybersecurity infrastructure is key to any system controls. The solutions to cybersecurity vulnerabilities in Kenyan County governments can be solved when these keys are implemented.
Open Access Original Research Article
Abdulkareem Suleiman, Nathan Nachandiya
The examination is one of the most broadly used strategies for assessing learning and capacity of a student. Adamawa State University is engulfed in a lot of irregularities during examination and also delays of results after the examination. These and another manual method of processing results give room for errors during results compilation. The utilisation of Information and Communication Technology in directing examinations can enhance proficiency and decrease the delay of student's result after examination. A Computer Based Testing System (CBT) was designed and implemented to diminish the delay of student's examination result. The CBTS was designed using the Agile model of the Software Development Life Cycle (SDLC). Implementation was done utilising the open source technologies, like XAMPP server, MySQL, PhP, JavaScript, Cascading Style Sheet and Hypertext Markup Language. The CBT presents notice of student's outcome quickly in the wake of taking the examination, enable the student to retake the exam (where necessary), and furthermore give diverse kinds of questions. The utilisation of CBT system can enhance the productivity and gainfulness of scholarly establishments as it diminishes the cost of stationeries and work associated with conducting examination manually. This by implication can reduce the cost of buying examination materials (papers, printers, turners etc) and students can have their results immediately after the examination. The developed system proved to be efficient and can be enhanced by adding other forms of questions like diagrammatic question to make the test address more diverse areas.