首页 > 最新文献

British Journal of Computer, Networking and Information Technology最新文献

英文 中文
Curbing the Effect of Climate Change for Sustainable Development through Digital Transformation and Environmental Sustainability 通过数字化转型和环境可持续性遏制气候变化影响,促进可持续发展
Pub Date : 2024-07-12 DOI: 10.52589/bjcnit-vf1xxa11
Adigun, O. J., A. A. O.
Climate change has posed a lot of dangers to economic growth and development. Such dangers include hotter temperatures, severe storms, increased drought, inadequate food supply, poverty, displacement of people and many risks to human life. These dangers occur on earth through human activities which release greenhouse gas emissions. Consequently, this paper aims to look at environmental sustainability through digital transformation, in order to reduce the effect of climate change on economies, businesses, governance, and socio-political outcomes in the 21st century. It also identified how digital transformation plays an increasingly significant role in promoting environmental sustainability. The paper adopted a systematic literature review, a qualitative approach, and a historical analysis. Findings revealed that non-conformity with environmental best practices has gross adverse effects on achieving sustainable development. It was also discovered that non-enforcement of environmental laws and regulations poses a danger to environmental sustainability. The paper concluded that adopting digital transformation will be of great advantage to environmental sustainability thus reducing the impact of climate change and accelerating sustainable development in our economies. This paper recommended strict enforcement of environmental laws and regulations. There should be a paradigm shift in the approach to achieving environmental sustainability by improving the circular economy through digital devices (enabling reuse and recycling), extending the lifespan of software and devices, and promoting technologies that help reduce carbon emissions and energy consumption. Also, the importance of less usage of energy by switching to LED light bulbs and energy-efficient electric appliances in our various homes and offices should be emphasized.
气候变化给经济增长和发展带来了许多危险。这些危险包括气温升高、严重风暴、干旱加剧、粮食供应不足、贫困、人口流离失所以及人类生命面临的许多风险。这些危险都是通过人类活动排放温室气体而产生的。因此,本文旨在通过数字化转型研究环境的可持续性,以减少气候变化对 21 世纪经济、企业、治理和社会政治成果的影响。本文还确定了数字化转型如何在促进环境可持续性方面发挥日益重要的作用。论文采用了系统的文献综述、定性方法和历史分析。研究结果表明,不遵守环境最佳做法会对实现可持续发展产生严重的不利影响。研究还发现,不执行环境法律法规会对环境可持续性造成危害。本文的结论是,采用数字化转型将对环境可持续性大有裨益,从而减少气候变化的影响,加快经济的可持续发展。本文建议严格执行环境法律法规。应转变实现环境可持续性的方式,通过数字设备改善循环经济(实现再利用和再循环),延长软件和设备的使用寿命,推广有助于减少碳排放和能源消耗的技术。此外,还应强调在我们的各个家庭和办公室改用 LED 灯泡和节能电器,从而减少能源消耗的重要性。
{"title":"Curbing the Effect of Climate Change for Sustainable Development through Digital Transformation and Environmental Sustainability","authors":"Adigun, O. J., A. A. O.","doi":"10.52589/bjcnit-vf1xxa11","DOIUrl":"https://doi.org/10.52589/bjcnit-vf1xxa11","url":null,"abstract":"Climate change has posed a lot of dangers to economic growth and development. Such dangers include hotter temperatures, severe storms, increased drought, inadequate food supply, poverty, displacement of people and many risks to human life. These dangers occur on earth through human activities which release greenhouse gas emissions. Consequently, this paper aims to look at environmental sustainability through digital transformation, in order to reduce the effect of climate change on economies, businesses, governance, and socio-political outcomes in the 21st century. It also identified how digital transformation plays an increasingly significant role in promoting environmental sustainability. The paper adopted a systematic literature review, a qualitative approach, and a historical analysis. Findings revealed that non-conformity with environmental best practices has gross adverse effects on achieving sustainable development. It was also discovered that non-enforcement of environmental laws and regulations poses a danger to environmental sustainability. The paper concluded that adopting digital transformation will be of great advantage to environmental sustainability thus reducing the impact of climate change and accelerating sustainable development in our economies. This paper recommended strict enforcement of environmental laws and regulations. There should be a paradigm shift in the approach to achieving environmental sustainability by improving the circular economy through digital devices (enabling reuse and recycling), extending the lifespan of software and devices, and promoting technologies that help reduce carbon emissions and energy consumption. Also, the importance of less usage of energy by switching to LED light bulbs and energy-efficient electric appliances in our various homes and offices should be emphasized.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141652903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer 使用思科数据包跟踪器的云网络高效安全路由协议
Pub Date : 2024-07-12 DOI: 10.52589/bjcnit-oyirlauk
Yusuf M. M., Fumlack K. G., Caleb M., Okpalaifeako L. C.
In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.
鉴于云计算的使用日益增多,本研究利用思科数据包跟踪器(Cisco Packet Tracer)为基于云的网络设计并实施了一种高效的安全路由协议。云计算的共享资源和动态可扩展性使基于云的网络很容易受到不受欢迎的访问、数据泄露和内部攻击的影响,从而引发了这项研究。研究目标是识别安全威胁并对其进行分类,评估现有的安全解决方案,提出增强的安全措施,并通过在 Cisco Packet Tracer 中进行模拟来验证这些解决方案。研究采用混合方法,将定量和定性研究设计相结合。主要数据通过使用谷歌表格和 Cisco Packet Tracer 中的网络分析工具进行调查收集,而辅助数据则来自全面的文献综述。研究采用了随机抽样技术,以选择具有云安全相关专业知识的参与者。数据分析包括主题分析和内容分析,主题分析用于识别文献中的模式,内容分析用于从调查回复中提取见解。统计测试用于分析定量数据,而网络分析则是通过思科 Packet Tracer 仿真获得的数据进行的。主要调查结果显示,数据泄露、未经授权的访问、内部威胁、恶意软件、勒索软件攻击和拒绝服务(DoS)攻击是重要的安全问题。调查结果表明,人们对高效安全路由协议中特定功能的重要性达成了共识,但也强调了对现有协议有效性的怀疑。建议的安全措施包括三层启用保密协议、加密协议、安全外壳协议(SSH)和各种路由协议(如 EIGRP、RIP、BGP 和 OSPF)、中继协议、交换机端口安全协议,这些措施通过模拟进行了验证,并显示出在减轻安全威胁方面的有效性。这项研究具有理论和实践意义,有助于丰富云计算安全知识,并为企业加强云安全态势提供实用建议。研究的局限性包括基于模拟的方法和对特定安全协议的关注,建议在现实世界的实施和与新兴技术的整合方面开展进一步研究。
{"title":"An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer","authors":"Yusuf M. M., Fumlack K. G., Caleb M., Okpalaifeako L. C.","doi":"10.52589/bjcnit-oyirlauk","DOIUrl":"https://doi.org/10.52589/bjcnit-oyirlauk","url":null,"abstract":"In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems and Operational Efficiency of Maritime Firms in Port Harcourt 信息系统与哈科特港海运公司的运营效率
Pub Date : 2024-05-17 DOI: 10.52589/bjcnit-mzbts2nd
Chukwudi I. C., Ebieye N. M., Blessing R. A.
The study examined the relationship between information systems and operational efficiency of maritime firms’ in Port Harcourt, Rivers State. Three research questions and three research hypotheses were formulated to address the specific objectives of this study. The RBV theory was adopted in this study and also quantitative research design using a correlational method of investigation. The population consists of 16 maritime firms in Port Harcourt. Census sampling was applied with focus on managers. Four managers per firm were sampled; a total of 64 managers were sampled. The reliability of the instrument was determined using Cronbach alpha test and it stood at 0.88 higher than the benchmark of 0.7. The data collected for this study were analyzed through descriptive and inferential statistics. The Spearman Rank-Order Correlation Technique was employed to test the various hypotheses formulated. The result of the analysis revealed that the information system is significantly and positively related to the operational efficiency of maritime firms’ in Port Harcourt, Rivers State. The empirical results of this study confirmed this as a positive and significant relationship was found between processing transaction systems and operational efficiency of maritime firms, and between electronic data interchange and operational efficiency of maritime firms. Based on these findings, it was concluded that the information system with its dimension of processing transaction system and electronic data interchange will improve operational efficiency of maritime firms in Port Harcourt. This study recommends that maritime firms should leverage on information systems as this would ensure reduction in cost and improve operational efficiency; they should use processing transaction system in order to facilitate the recording, tracking, and management of business transactions within the organization and the port, and they should adopt electronic data interchange for processing of documents and timely delivery of same.
本研究探讨了信息系统与河流州哈科特港海运公司运营效率之间的关系。针对本研究的具体目标,提出了三个研究问题和三个研究假设。本研究采用了 RBV 理论,并使用相关调查法进行定量研究设计。研究对象包括哈科特港的 16 家海运公司。采用普查抽样法,重点是管理人员。每家公司抽取四名经理,总共抽取了 64 名经理。使用 Cronbach alpha 检验确定了问卷的可靠性,其结果为 0.88,高于 0.7 的基准值。本研究通过描述性和推论性统计对收集到的数据进行了分析。斯皮尔曼秩相关技术(Spearman Rank-Order Correlation Technique)被用来检验各种假设。分析结果表明,信息系统与里弗斯州哈科特港海运公司的运营效率呈显著正相关。本研究的实证结果证实了这一点,因为在处理交易系统与海运公司的运营效率之间,以及电子数据交换与海运公司的运营效率之间,都发现了显著的正相关关系。基于这些研究结果,本研究得出结论,信息系统的处理交易系统和电子数据交换将提高哈科特港海运公司的运营效率。本研究建议,海运公司应充分利用信息系统,因为这将确保降低成本和提高运营效率;海运公司应使用处理交易系统,以促进组织和港口内部业务交易的记录、跟踪和管理;海运公司应采用电子数据交换来处理文件和及时交付文件。
{"title":"Information Systems and Operational Efficiency of Maritime Firms in Port Harcourt","authors":"Chukwudi I. C., Ebieye N. M., Blessing R. A.","doi":"10.52589/bjcnit-mzbts2nd","DOIUrl":"https://doi.org/10.52589/bjcnit-mzbts2nd","url":null,"abstract":"The study examined the relationship between information systems and operational efficiency of maritime firms’ in Port Harcourt, Rivers State. Three research questions and three research hypotheses were formulated to address the specific objectives of this study. The RBV theory was adopted in this study and also quantitative research design using a correlational method of investigation. The population consists of 16 maritime firms in Port Harcourt. Census sampling was applied with focus on managers. Four managers per firm were sampled; a total of 64 managers were sampled. The reliability of the instrument was determined using Cronbach alpha test and it stood at 0.88 higher than the benchmark of 0.7. The data collected for this study were analyzed through descriptive and inferential statistics. The Spearman Rank-Order Correlation Technique was employed to test the various hypotheses formulated. The result of the analysis revealed that the information system is significantly and positively related to the operational efficiency of maritime firms’ in Port Harcourt, Rivers State. The empirical results of this study confirmed this as a positive and significant relationship was found between processing transaction systems and operational efficiency of maritime firms, and between electronic data interchange and operational efficiency of maritime firms. Based on these findings, it was concluded that the information system with its dimension of processing transaction system and electronic data interchange will improve operational efficiency of maritime firms in Port Harcourt. This study recommends that maritime firms should leverage on information systems as this would ensure reduction in cost and improve operational efficiency; they should use processing transaction system in order to facilitate the recording, tracking, and management of business transactions within the organization and the port, and they should adopt electronic data interchange for processing of documents and timely delivery of same.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140964856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of a Complaint Management System Using RPA 使用 RPA 实现投诉管理系统自动化
Pub Date : 2024-05-17 DOI: 10.52589/bjcnit-2xztfrui
Oluwabunmi O. A., Uthman K. O., Abdullai B. A., Adeolu L. S.
The aim of this research work is to design and implement an improved system which will contribute greatly in providing solutions to evaluate the impact of RPA on the complaint-handling process in a school complaint portal. The proposed Robotic Process Automation for a complaint management system and student registration system can help in saving time and automating repetitive tasks. The complaint management system can instantly allow the admin to create different categories instead of doing it manually which takes a lot of time, compared to the automated process which will get the total number of students and complete it within a few minutes. The student registration system saves the admin the stress of opening the browser and typing the login credentials every time a task needs to be done. The 200 students’ details were generated and turned into an Excel file within 4 minutes compared to the manual method which takes hours to complete.
这项研究工作的目的是设计和实施一个改进的系统,该系统将极大地有助于提供解决方案,以评估 RPA 对学校投诉门户网站投诉处理流程的影响。针对投诉管理系统和学生注册系统提出的机器人流程自动化方案可以帮助节省时间,实现重复性任务的自动化。投诉管理系统可以立即让管理员创建不同的类别,而不是手动创建,手动创建需要花费大量时间,相比之下,自动化流程可以在几分钟内获得学生总数并完成创建。学生注册系统为管理员省去了每次需要完成任务时打开浏览器并输入登录凭证的压力。与需要数小时才能完成的手动方法相比,200 名学生的详细信息在 4 分钟内就能生成并转化为 Excel 文件。
{"title":"Automation of a Complaint Management System Using RPA","authors":"Oluwabunmi O. A., Uthman K. O., Abdullai B. A., Adeolu L. S.","doi":"10.52589/bjcnit-2xztfrui","DOIUrl":"https://doi.org/10.52589/bjcnit-2xztfrui","url":null,"abstract":"The aim of this research work is to design and implement an improved system which will contribute greatly in providing solutions to evaluate the impact of RPA on the complaint-handling process in a school complaint portal. The proposed Robotic Process Automation for a complaint management system and student registration system can help in saving time and automating repetitive tasks. The complaint management system can instantly allow the admin to create different categories instead of doing it manually which takes a lot of time, compared to the automated process which will get the total number of students and complete it within a few minutes. The student registration system saves the admin the stress of opening the browser and typing the login credentials every time a task needs to be done. The 200 students’ details were generated and turned into an Excel file within 4 minutes compared to the manual method which takes hours to complete.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection System Using Logistic Regression, Decision Tree and Random Forest 使用逻辑回归、决策树和随机森林的假新闻检测系统
Pub Date : 2024-05-17 DOI: 10.52589/bjcnit-ioyrpy7g
Oluwabunmi O. A., Oluwaferanmi I. R., Abdullai B. A.
The purpose of this study is to design a fake news detection system with these three machine learning models, namely: Decision Tree, Random Forest, and Logistic Regression. These three different models were analysed to determine the most efficient model for accurately detecting fake news. The result obtained showcased Logistic Regression with an accuracy of 98.80%, Decision Tree with an accuracy of 99.64% and Random Forest with an accuracy of 99.23%. It is evident as deduction from the comparative analysis that our best model came out to be Decision Tree with an accuracy of 99.64%.
本研究的目的是利用这三种机器学习模型,即决策树、随机森林和逻辑回归,设计一个假新闻检测系统:决策树、随机森林和逻辑回归。我们对这三种不同的模型进行了分析,以确定准确检测假新闻的最有效模型。结果显示,逻辑回归的准确率为 98.80%,决策树的准确率为 99.64%,随机森林的准确率为 99.23%。从比较分析中可以明显看出,我们的最佳模型是决策树,准确率为 99.64%。
{"title":"Fake News Detection System Using Logistic Regression, Decision Tree and Random Forest","authors":"Oluwabunmi O. A., Oluwaferanmi I. R., Abdullai B. A.","doi":"10.52589/bjcnit-ioyrpy7g","DOIUrl":"https://doi.org/10.52589/bjcnit-ioyrpy7g","url":null,"abstract":"The purpose of this study is to design a fake news detection system with these three machine learning models, namely: Decision Tree, Random Forest, and Logistic Regression. These three different models were analysed to determine the most efficient model for accurately detecting fake news. The result obtained showcased Logistic Regression with an accuracy of 98.80%, Decision Tree with an accuracy of 99.64% and Random Forest with an accuracy of 99.23%. It is evident as deduction from the comparative analysis that our best model came out to be Decision Tree with an accuracy of 99.64%.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140962098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Haram Lost and Found 哈拉姆失物招领处
Pub Date : 2024-05-08 DOI: 10.52589/bjcnit-4zv3ey9s
Yeser A. A., Rami N. A.
With its great religious significance, the Holy Mosque in Makkah welcomes millions of tourists every year. The problem of misplaced objects at this holy site poses a problem for both guests and guards. In order to tackle this issue and improve worshippers' and visitors' overall experience, this study project explores the ideation, creation, and testing of a state-of-the-art mobile application called the "Lost and Found Assistance" app. This software makes use of modern technologies to expedite the process of finding misplaced items inside the Holy Mosque.The 'Lost and Found Assistance' app's main objective is to offer a workable answer to anyone who have misplaced their belongings inside the enormous Holy Mosque. It presents an easy-to-use and effective platform that enables users to report misplaced things, facilitating their prompt recovery. Additionally, it enables users to look for misplaced items, providing comfort to individuals who could have momentarily misplaced priceless items while visiting.In order to provide insight on the Holy Mosque's hallowed legacy and importance in the Islamic world, this study initiative examines the historical significance of the building. It explores the issues surrounding misplaced objects at this hallowed location, highlighting the demand for an up-to-date, technologically advanced solution.In addition, the research highlights the revolutionary role that mobile applications play in a variety of contexts as it examines the current state of lost and found services. Through an analysis of current applications and technological breakthroughs, it pinpoints chances to modify these advances to meet the particular difficulties presented by the Holy Mosque.The entire development process of the 'Lost and Found Assistance' app is described, from the first conceptualization to the design and coding stages. The project emphasizes the value of intuitive design concepts and user-friendly interfaces in making sure that the software is useful and accessible to a variety of users.An analysis of the app's usefulness in helping users find misplaced goods within the Holy Mosque completes the research endeavor. It talks about user pleasure and feedback, highlighting how the software improves users' experiences. It also looks at how widely the app might be used and offers ideas for improvements down the road.The 'Lost and Found Assistance' app helps to maintain a calm and serene atmosphere inside the Holy Mosque by utilizing contemporary technologies. The ability of technology to solve long-standing issues and improve the pilgrimage and visitor experience for millions of worshippers and tourists who visit this holy site is demonstrated by this study effort.
麦加圣寺具有重要的宗教意义,每年都会迎来数百万游客。在这一圣地,错放物品的问题给游客和警卫都带来了困扰。为了解决这一问题,改善朝拜者和游客的整体体验,本研究项目探讨了一款名为 "失物招领援助 "的先进移动应用程序的构思、创建和测试。失物招领帮助 "应用程序的主要目的是为在清真寺内遗失物品的人提供一个可行的解决方案。它提供了一个简单易用的有效平台,使用户能够报告丢失物品的情况,便于及时找回。此外,用户还可以通过该平台寻找丢失的物品,为那些在参观时不慎将无价之宝遗失的人提供安慰。为了深入了解清真寺在伊斯兰世界的神圣遗产和重要性,这项研究计划对清真寺的历史意义进行了考察。此外,在研究失物招领服务的现状时,研究还强调了移动应用在各种情况下发挥的革命性作用。通过对当前应用和技术突破的分析,它指出了修改这些进步的机会,以满足神圣清真寺提出的特殊困难。"失物招领援助 "应用程序的整个开发过程,从最初的概念设计到设计和编码阶段都有描述。该项目强调了直观设计概念和用户友好界面的价值,以确保该软件对各种用户都有用且易于使用。对该应用程序在帮助用户寻找清真寺内遗失物品方面的实用性进行了分析,从而完成了研究工作。研究还谈到了用户的愉悦感和反馈,强调了软件如何改善用户体验。失物招领帮助 "应用程序利用现代技术帮助保持清真寺内平静安宁的氛围。这项研究工作表明,技术有能力解决长期存在的问题,改善数百万朝拜者和游客的朝圣和参观体验。
{"title":"Haram Lost and Found","authors":"Yeser A. A., Rami N. A.","doi":"10.52589/bjcnit-4zv3ey9s","DOIUrl":"https://doi.org/10.52589/bjcnit-4zv3ey9s","url":null,"abstract":"With its great religious significance, the Holy Mosque in Makkah welcomes millions of tourists every year. The problem of misplaced objects at this holy site poses a problem for both guests and guards. In order to tackle this issue and improve worshippers' and visitors' overall experience, this study project explores the ideation, creation, and testing of a state-of-the-art mobile application called the \"Lost and Found Assistance\" app. This software makes use of modern technologies to expedite the process of finding misplaced items inside the Holy Mosque.\u0000The 'Lost and Found Assistance' app's main objective is to offer a workable answer to anyone who have misplaced their belongings inside the enormous Holy Mosque. It presents an easy-to-use and effective platform that enables users to report misplaced things, facilitating their prompt recovery. Additionally, it enables users to look for misplaced items, providing comfort to individuals who could have momentarily misplaced priceless items while visiting.\u0000In order to provide insight on the Holy Mosque's hallowed legacy and importance in the Islamic world, this study initiative examines the historical significance of the building. It explores the issues surrounding misplaced objects at this hallowed location, highlighting the demand for an up-to-date, technologically advanced solution.\u0000In addition, the research highlights the revolutionary role that mobile applications play in a variety of contexts as it examines the current state of lost and found services. Through an analysis of current applications and technological breakthroughs, it pinpoints chances to modify these advances to meet the particular difficulties presented by the Holy Mosque.\u0000The entire development process of the 'Lost and Found Assistance' app is described, from the first conceptualization to the design and coding stages. The project emphasizes the value of intuitive design concepts and user-friendly interfaces in making sure that the software is useful and accessible to a variety of users.\u0000An analysis of the app's usefulness in helping users find misplaced goods within the Holy Mosque completes the research endeavor. It talks about user pleasure and feedback, highlighting how the software improves users' experiences. It also looks at how widely the app might be used and offers ideas for improvements down the road.\u0000The 'Lost and Found Assistance' app helps to maintain a calm and serene atmosphere inside the Holy Mosque by utilizing contemporary technologies. The ability of technology to solve long-standing issues and improve the pilgrimage and visitor experience for millions of worshippers and tourists who visit this holy site is demonstrated by this study effort.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141129265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough Set Theory and its Applications in Data Mining 粗糙集理论及其在数据挖掘中的应用
Pub Date : 2024-05-01 DOI: 10.52589/bjcnit-jak93dun
Ogba P. O., Bello M.
One method for handling imprecise, ambiguous, and unclear data is rough set theory. Rough set theory offers a practical method for making decisions during data extraction. The practice of analyzing vast amounts of data to extract useful information from a larger collection of raw data is known as data mining. This paper discusses consistent data with rough set theory, covering blocks of attribute-value pairs, information table reductions, decision tables, and indiscernibility relations. It also explains the basics of rough set theory with a focus on applications to data mining. Additionally, rule induction algorithms are explained. The rough set theory for inconsistent data is then introduced, containing certain and potential rule sets along with lower and upper approximations. Finally, a presentation and explanation of rough set theory to incomplete data is given. This includes characteristic sets, characteristic relations, and blocks of attribute-value pairs.
粗糙集理论是处理不精确、模糊和不清晰数据的一种方法。粗糙集理论为数据提取过程中的决策提供了一种实用方法。对海量数据进行分析,以便从大量原始数据中提取有用信息的做法被称为数据挖掘。本文讨论了使用粗糙集理论的一致数据,包括属性值对块、信息表还原、决策表和不可辨关系。本文还解释了粗糙集理论的基础知识,并重点介绍了粗糙集理论在数据挖掘中的应用。此外,还解释了规则归纳算法。然后介绍了不一致数据的粗糙集理论,其中包含确定规则集和潜在规则集以及下近似和上近似。最后,介绍和解释不完整数据的粗糙集理论。这包括特征集、特征关系和属性值对块。
{"title":"Rough Set Theory and its Applications in Data Mining","authors":"Ogba P. O., Bello M.","doi":"10.52589/bjcnit-jak93dun","DOIUrl":"https://doi.org/10.52589/bjcnit-jak93dun","url":null,"abstract":"One method for handling imprecise, ambiguous, and unclear data is rough set theory. Rough set theory offers a practical method for making decisions during data extraction. The practice of analyzing vast amounts of data to extract useful information from a larger collection of raw data is known as data mining. This paper discusses consistent data with rough set theory, covering blocks of attribute-value pairs, information table reductions, decision tables, and indiscernibility relations. It also explains the basics of rough set theory with a focus on applications to data mining. Additionally, rule induction algorithms are explained. The rough set theory for inconsistent data is then introduced, containing certain and potential rule sets along with lower and upper approximations. Finally, a presentation and explanation of rough set theory to incomplete data is given. This includes characteristic sets, characteristic relations, and blocks of attribute-value pairs.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141037497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of the Analytical Solution and Numerical Simulation for Tension - Pressure 张力-压力的分析求解和数值模拟验证
Pub Date : 2024-01-25 DOI: 10.52589/bjcnit-qn2k6pof
Helena Kraváriková
The proposed constructions have to meet their use in terms of shape, dimensions and above all, strength. Parts of the structure are loaded by external forces. The load on the structure is examined in all parts and directions. Parts of the structure are stressed by a combination of basic types of stress. One of the basic types of stress is pull or pressure. The investigation of the part of the structure under tensile-compression stress is important because of the deformation, stability and strength of the structure as a whole. Analytical solution, classical experiment or modelling FEM can be used to predict the stress of structural parts. Currently, the most preferred solution is FEM numerical simulation. Numerical simulation has a more purposeful use in the solution of structural stability. The article contains the solution, tensile stresses for a steel rod, numerical simulation using the FEM method in the ANSYS program and analytically.
所建议的结构必须在形状、尺寸,尤其是强度方面满足使用要求。结构的各个部分都受到外力的加载。对结构各部分和各方向的荷载进行检查。结构的各个部分受到各种基本应力的综合作用。基本应力类型之一是拉力或压力。由于结构整体的变形、稳定性和强度,因此对处于拉压应力下的结构部分进行研究非常重要。可以使用分析方法、经典实验或有限元建模来预测结构部件的应力。目前,最常用的方法是有限元数值模拟。数值模拟在结构稳定性求解中具有更高的用途。这篇文章包含在 ANSYS 程序中使用有限元方法和分析方法对钢棒拉伸应力进行数值模拟的解决方案。
{"title":"Verification of the Analytical Solution and Numerical Simulation for Tension - Pressure","authors":"Helena Kraváriková","doi":"10.52589/bjcnit-qn2k6pof","DOIUrl":"https://doi.org/10.52589/bjcnit-qn2k6pof","url":null,"abstract":"The proposed constructions have to meet their use in terms of shape, dimensions and above all, strength. Parts of the structure are loaded by external forces. The load on the structure is examined in all parts and directions. Parts of the structure are stressed by a combination of basic types of stress. One of the basic types of stress is pull or pressure. The investigation of the part of the structure under tensile-compression stress is important because of the deformation, stability and strength of the structure as a whole. Analytical solution, classical experiment or modelling FEM can be used to predict the stress of structural parts. Currently, the most preferred solution is FEM numerical simulation. Numerical simulation has a more purposeful use in the solution of structural stability. The article contains the solution, tensile stresses for a steel rod, numerical simulation using the FEM method in the ANSYS program and analytically.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139597514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detailed Study of the Object-Oriented Programming (OOP) Features in Python 详细研究 Python 中的面向对象编程 (OOP) 功能
Pub Date : 2023-11-29 DOI: 10.52589/bjcnit-facsojao
Nzerue-Kenneth P.E., Onu F.U, Denis A.U., Igwe J.S., Ogbu N.H.
Human beings are naturally classified; OOP is closely aligned to how human brains work. The Mathematical functional approach is a more rigorous way to capture an idea; it is more difficult to transpose and the code is not easily readable. To overcome the limitations of procedural, structural, and functional programming, OOP was developed. Because of its versatility, it supports various programming styles which include maintenance, addition and overriding; however, modification of existing code is made easier. OOP programs prevent you from repeating code, making developers choose OOP in their python program because a class can be defined once and reused many times (Thelin, 2020). By the end of this article, you will be able to create classes, instantiate objects from them, and integrate the four methods of OOP by creating modules of Python projects. With the basic concept of OOP in Python, this article has shown how we can hide our data by making it private (abstraction), allowing for code reusability (inheritance), constraining dependency management through polymorphism and rapping data and function together to prevent data from being accessed by the code outside this shield (encapsulation).
人类天生就会分类;OOP 与人类大脑的工作方式密切相关。数学函数式方法是一种更严谨的捕捉思想的方法;它更难以移植,代码也不容易阅读。为了克服过程式、结构式和函数式编程的局限性,OOP 应运而生。由于其多功能性,它支持各种编程风格,包括维护、添加和覆盖;不过,修改现有代码变得更加容易。OOP 程序避免了代码重复,这使得开发人员在 Python 程序中选择了 OOP,因为一个类可以定义一次并重复使用多次(Thelin,2020)。本文结束时,您将能够创建类、从类中实例化对象,并通过创建 Python 项目模块整合 OOP 的四种方法。有了 Python OOP 的基本概念,本文展示了我们如何通过将数据私有化(抽象)来隐藏数据,允许代码重用(继承),通过多态性约束依赖管理,以及将数据和函数封装在一起以防止数据被屏蔽外的代码访问(封装)。
{"title":"Detailed Study of the Object-Oriented Programming (OOP) Features in Python","authors":"Nzerue-Kenneth P.E., Onu F.U, Denis A.U., Igwe J.S., Ogbu N.H.","doi":"10.52589/bjcnit-facsojao","DOIUrl":"https://doi.org/10.52589/bjcnit-facsojao","url":null,"abstract":"Human beings are naturally classified; OOP is closely aligned to how human brains work. The Mathematical functional approach is a more rigorous way to capture an idea; it is more difficult to transpose and the code is not easily readable. To overcome the limitations of procedural, structural, and functional programming, OOP was developed. Because of its versatility, it supports various programming styles which include maintenance, addition and overriding; however, modification of existing code is made easier. OOP programs prevent you from repeating code, making developers choose OOP in their python program because a class can be defined once and reused many times (Thelin, 2020). By the end of this article, you will be able to create classes, instantiate objects from them, and integrate the four methods of OOP by creating modules of Python projects. With the basic concept of OOP in Python, this article has shown how we can hide our data by making it private (abstraction), allowing for code reusability (inheritance), constraining dependency management through polymorphism and rapping data and function together to prevent data from being accessed by the code outside this shield (encapsulation).","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139209607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unequal Culture of Women and Minorities in Cybersecurity Domain 网络安全领域女性和少数民族的不平等文化
Pub Date : 2023-09-05 DOI: 10.52589/bjcnit-q1mzpvwz
D. O. Egete, B. Ele, D. U. Ashishie
Women and ethnic minorities have historically been underrepresented in the cybersecurity industry. Although there are an increasing number of open opportunities in the cybersecurity industry, this pattern has not changed. There is still an imbalance in the participation of women and ethnic minorities in the cybersecurity domain. Issues that impact both Africa and the global participation of women and ethnic minorities in cyber-security include inadequate representation and awareness as well as retention problems. Further, issues such as harassment, gender bias and the idea that cybersecurity is a “man’s world” are also contributing factors. This paper provides a framework for discussing some of the skills that are available to women and underrepresented groups and argues for the necessity to solve this problem. Programs striving to increase the participation of women and ethnic minorities in cybersecurity are discussed. Lastly, some suggestions to remediate this pervasive issue are also provided.
女性和少数族裔在网络安全行业的代表性一直不足。尽管网络安全行业的开放机会越来越多,但这种模式并没有改变。在网络安全领域,女性和少数民族的参与仍然存在不平衡。影响非洲和全球妇女和少数民族参与网络安全的问题包括代表性不足、意识不足以及保留问题。此外,骚扰、性别偏见以及认为网络安全是“男人的世界”等问题也是影响因素。本文提供了一个框架,用于讨论妇女和代表性不足的群体可以获得的一些技能,并论证了解决这一问题的必要性。讨论了旨在提高妇女和少数民族参与网络安全的项目。最后,对解决这一普遍存在的问题提出了一些建议。
{"title":"Unequal Culture of Women and Minorities in Cybersecurity Domain","authors":"D. O. Egete, B. Ele, D. U. Ashishie","doi":"10.52589/bjcnit-q1mzpvwz","DOIUrl":"https://doi.org/10.52589/bjcnit-q1mzpvwz","url":null,"abstract":"Women and ethnic minorities have historically been underrepresented in the cybersecurity industry. Although there are an increasing number of open opportunities in the cybersecurity industry, this pattern has not changed. There is still an imbalance in the participation of women and ethnic minorities in the cybersecurity domain. Issues that impact both Africa and the global participation of women and ethnic minorities in cyber-security include inadequate representation and awareness as well as retention problems. Further, issues such as harassment, gender bias and the idea that cybersecurity is a “man’s world” are also contributing factors. This paper provides a framework for discussing some of the skills that are available to women and underrepresented groups and argues for the necessity to solve this problem. Programs striving to increase the participation of women and ethnic minorities in cybersecurity are discussed. Lastly, some suggestions to remediate this pervasive issue are also provided.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
British Journal of Computer, Networking and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1