Open Access Original Research Article
O. Alabi Abdullateef, AbdulAkeem O. Otunola, A. T. Abdullateef, M. K. Lawal
The prospect behind digital transformation strategies makes the healthcare systems more safe, affordable, and accessible with remarkable opportunities. The reasons why patients decided to have negative medication adherence became a critical challenge in the healthcare system. This study presents a Digital Framework Strategy DSF for patient medication adherence to improve patient health during the treatment regime. A case study of the Federal Polytechnic Medical centre and clinical activities of Offa General Hospital examines the existing treatment of chronic diseases. The cloud-based server revolves around Convolution Neural Network (CNN) feature to perform a real-time collection of data and analytics of patient information. When thoroughly combined, the CNN of the neural network has a model of the application, which will form part of the desired output. This output presents a level of patient medication adherence within the parameters—the data around the enclosed sources. The approach data was acquired with the patient wearing a sensor and smartphone devices. The model throughputs presented detailed analytics of individual patient adherence behaviors. The result of CNN performance revealed 96.99% accuracy of medication adherence level on a tested dataset collation, and the essence of digital framework analytics helped the healthcare workers (HCW) and healthcare providers to make prompt decisions on patients’ medical conditions.
Open Access Original Research Article
Olanrewaju E. Abikoye, Y. O. Olaboye, Abdullateef O. Alabi
Climate change periodically, and one of its natural causes is solar variation. Solar energy generation is now gaining more attention in developed nations, and its usefulness is becoming acceptable in rural settings. This research focused on Centric Data Analytics Framework for Solar Energy Efficiency called DAFSEE to solve power supply deficiency in resource-limited settings in Kwara State. Statistically, resource-limited regions feature a low population with a shortfall of social amenities. Significantly, households in urban areas have more electricity consumption than rural ones, making solar energy more relevant. The researcher then determined the efficiency of solar energy in the selected regions over time using an experimental study using cloud computing to create a dataset in six geo-locations in Kwara State. A predictive model was adopted and yielded 98.99% from the recurring analytics of the installed solar cells. The outcome of this study suggested best practices to sustain renewable energy in the area across all seasons. The study provides a starting point to distil policy implications for a centric analytics framework of improving rural electrification relevant for collective resource-limited settings across Nigeria.
Open Access Original Research Article
Mboto Peter, Gilbert Gilibrays Ocen, Godliver Owomugisha, Alunyu Andrew Egwar, Matovu Davis, Twaibu Semwogerere, Rwahwire Samson
Several systematic reviews on mobile device technologies have been undertaken mostly identifying mobile security threats and challenges to corporate organisations' sensitive private information. This paper surveyed the existing level of secure authentication achieved by various mobile device-related frameworks against their listed goals. The solutions and security level of the existing authentication approaches among these categories were compared and improved on the KANYI BYOND framework by introducing a Radius server with the 802.11 authentications supported feature that provides access control to wireless routers, access points, hotspots in EAP/WPA-Enterprise/WPA2-Enterprise modes as means to achieve multiple authentications to mobile device users in corporate networks. Testing and validation of the resulting framework were done with the help of a riverbed modeler and a Denial of Service attack was simulated on all mobile devices' nodes in the designed network. The results indicated that the resulting framework provides multiple authentications and is thought to overcome self-reassuring by mobile device users on the network.
Open Access Original Research Article
M. K. Lawal, O. Abdullateef Alabi, Abdul Akeem O. Otunola, A. T. Abdullateef
Gunshot detection technologies are more applicable in many industries for the security enhancement of public places like the Federal Republic Territory FCT Abuja in Nigeria. Many factors affect the accuracy of the gun detection algorithm. This paper describes an audio-based video surveillance system in an auto pilot situational awareness to detect gunshots in Federal Polytechnic Offa. The Time Difference of Arrival (TDOA) of Shock Wave and Muzzle Blast is integrated to estimate the shooter location in the study are. The proposed design and algorithm was validated and shooter origin was resolute that was very close to theoretical values. The video camera is steering regarding the initial position to localize the acoustic source's position. Implementing an auto pilot situational awareness system is an experimental procedure with a gunshot detection algorithm in a localized environment. In the direction of the weapon, the distance between firearms, types of ammunition, types of study environment, and diffraction of audio, the standard feature for gunshot recognition are Mel frequency cepstral coefficients in terms of uniform gamma-tone filters linearly spaced over the whole frequency range from 0KHZ to 16KHZ. Experiments show that our system can detect gunshots with a precision of 93% at a false rejection rate of 5% when the SNR is 10db while proving the estimate of the source direction of the gunshot with an accuracy of one degree. The outcomes reveal that the data generated by the system can be leveraged by the firefighting department to quickly locate the whereabouts of the indoor fires, and the VR gamification scenarios can expedite the development of situational awareness for the trainees. The research recommends a real-time system implementation for protecting the Federal Polytechnic Offa against any form of treats.
Open Access Review Article
Zalialetdzinau Kanstantsin
DevOps revolutionize the software development lifecycle by providing agile and fast-paced solutions. DevOps ignores security prospects since it focuses only on increasing development and speed. DevSecOp is a notion of implanting Security into DevOps operation without distressing its agile nature by discovering contemporary security practices. This research aims to reveal a comprehensive overview of DevSecOp. Here we presented a brief overview of the research methodology. Afterward, it presented the method of gathering the required information. This research paper is distributed in the following section. Section II presented the research methodology, while section III provided results from this study. In the end, we conclude our research
In this study, we discover essential DevSecOp concepts, leverages of DevSecOp, and potential research challenges in implementing it. We used a Multivocal literature review to explore the aforementioned subjects. For this Multivocal literature review, we searched grey data and, after processed that data, found answers to our research questions. This review concluded that DevSecOp, although challenging to implement, can be a constructive addition to the DevOps paradigm.
DevSecOp is a relatively new concept that is not even fully concise in its name and definition. The key idea of DevSecOp is to implant security into DevOps procedures to make them more secure. We presented MLR on DevSecOp, keeping in mind pre-designed research questions. Since DevSecOp is not as popular and does not contain enough academic literature, we had to include grey data for our literature review. This MLR concluded that DevSecOp is mainly defined as integrating Security into DevOps