Pub Date : 2024-07-12DOI: 10.52589/bjcnit-vf1xxa11
Adigun, O. J., A. A. O.
Climate change has posed a lot of dangers to economic growth and development. Such dangers include hotter temperatures, severe storms, increased drought, inadequate food supply, poverty, displacement of people and many risks to human life. These dangers occur on earth through human activities which release greenhouse gas emissions. Consequently, this paper aims to look at environmental sustainability through digital transformation, in order to reduce the effect of climate change on economies, businesses, governance, and socio-political outcomes in the 21st century. It also identified how digital transformation plays an increasingly significant role in promoting environmental sustainability. The paper adopted a systematic literature review, a qualitative approach, and a historical analysis. Findings revealed that non-conformity with environmental best practices has gross adverse effects on achieving sustainable development. It was also discovered that non-enforcement of environmental laws and regulations poses a danger to environmental sustainability. The paper concluded that adopting digital transformation will be of great advantage to environmental sustainability thus reducing the impact of climate change and accelerating sustainable development in our economies. This paper recommended strict enforcement of environmental laws and regulations. There should be a paradigm shift in the approach to achieving environmental sustainability by improving the circular economy through digital devices (enabling reuse and recycling), extending the lifespan of software and devices, and promoting technologies that help reduce carbon emissions and energy consumption. Also, the importance of less usage of energy by switching to LED light bulbs and energy-efficient electric appliances in our various homes and offices should be emphasized.
气候变化给经济增长和发展带来了许多危险。这些危险包括气温升高、严重风暴、干旱加剧、粮食供应不足、贫困、人口流离失所以及人类生命面临的许多风险。这些危险都是通过人类活动排放温室气体而产生的。因此,本文旨在通过数字化转型研究环境的可持续性,以减少气候变化对 21 世纪经济、企业、治理和社会政治成果的影响。本文还确定了数字化转型如何在促进环境可持续性方面发挥日益重要的作用。论文采用了系统的文献综述、定性方法和历史分析。研究结果表明,不遵守环境最佳做法会对实现可持续发展产生严重的不利影响。研究还发现,不执行环境法律法规会对环境可持续性造成危害。本文的结论是,采用数字化转型将对环境可持续性大有裨益,从而减少气候变化的影响,加快经济的可持续发展。本文建议严格执行环境法律法规。应转变实现环境可持续性的方式,通过数字设备改善循环经济(实现再利用和再循环),延长软件和设备的使用寿命,推广有助于减少碳排放和能源消耗的技术。此外,还应强调在我们的各个家庭和办公室改用 LED 灯泡和节能电器,从而减少能源消耗的重要性。
{"title":"Curbing the Effect of Climate Change for Sustainable Development through Digital Transformation and Environmental Sustainability","authors":"Adigun, O. J., A. A. O.","doi":"10.52589/bjcnit-vf1xxa11","DOIUrl":"https://doi.org/10.52589/bjcnit-vf1xxa11","url":null,"abstract":"Climate change has posed a lot of dangers to economic growth and development. Such dangers include hotter temperatures, severe storms, increased drought, inadequate food supply, poverty, displacement of people and many risks to human life. These dangers occur on earth through human activities which release greenhouse gas emissions. Consequently, this paper aims to look at environmental sustainability through digital transformation, in order to reduce the effect of climate change on economies, businesses, governance, and socio-political outcomes in the 21st century. It also identified how digital transformation plays an increasingly significant role in promoting environmental sustainability. The paper adopted a systematic literature review, a qualitative approach, and a historical analysis. Findings revealed that non-conformity with environmental best practices has gross adverse effects on achieving sustainable development. It was also discovered that non-enforcement of environmental laws and regulations poses a danger to environmental sustainability. The paper concluded that adopting digital transformation will be of great advantage to environmental sustainability thus reducing the impact of climate change and accelerating sustainable development in our economies. This paper recommended strict enforcement of environmental laws and regulations. There should be a paradigm shift in the approach to achieving environmental sustainability by improving the circular economy through digital devices (enabling reuse and recycling), extending the lifespan of software and devices, and promoting technologies that help reduce carbon emissions and energy consumption. Also, the importance of less usage of energy by switching to LED light bulbs and energy-efficient electric appliances in our various homes and offices should be emphasized.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141652903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-12DOI: 10.52589/bjcnit-oyirlauk
Yusuf M. M., Fumlack K. G., Caleb M., Okpalaifeako L. C.
In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.
{"title":"An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer","authors":"Yusuf M. M., Fumlack K. G., Caleb M., Okpalaifeako L. C.","doi":"10.52589/bjcnit-oyirlauk","DOIUrl":"https://doi.org/10.52589/bjcnit-oyirlauk","url":null,"abstract":"In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach was adopted, integrating quantitative and qualitative research designs. Primary data were collected through surveys using Google form and network analysis tools within Cisco Packet Tracer, while secondary data is derived from a comprehensive literature review. The study employed a random sampling technique to select participants with relevant expertise in cloud security. Data analysis involved thematic analysis to identify patterns in the literature and content analysis to extract insights from survey responses. Statistical tests were used to analyze quantitative data, and network analysis was conducted on data obtained from Cisco Packet Tracer simulations. Key findings revealed that data breaches, unauthorized access, insider threats, malware, ransomware attacks, and Denial of Service (DoS) attacks were significant security concerns. The survey results indicated a consensus on the importance of specific features in efficient security routing protocols but also highlighted skepticism regarding the effectiveness of existing protocols. The proposed security measures, including the Three-Level Enabled Secret protocol, Encryption protocol, Secure Shell protocol (SSH), and various routing protocols such as EIGRP, RIP, BGP, and OSPF, Trunk protocol, switch-port security protocol were validated through simulations and showed effectiveness in mitigating security threats. The study has both theoretical and practical implications, contributing to the body of knowledge in cloud computing security and providing practical recommendations for organisations to strengthen their cloud security posture. Limitations include the simulation-based approach and the focus on specific security protocols, suggesting areas for further research in real-world implementation and integration with emerging technologies.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"35 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.52589/bjcnit-mzbts2nd
Chukwudi I. C., Ebieye N. M., Blessing R. A.
The study examined the relationship between information systems and operational efficiency of maritime firms’ in Port Harcourt, Rivers State. Three research questions and three research hypotheses were formulated to address the specific objectives of this study. The RBV theory was adopted in this study and also quantitative research design using a correlational method of investigation. The population consists of 16 maritime firms in Port Harcourt. Census sampling was applied with focus on managers. Four managers per firm were sampled; a total of 64 managers were sampled. The reliability of the instrument was determined using Cronbach alpha test and it stood at 0.88 higher than the benchmark of 0.7. The data collected for this study were analyzed through descriptive and inferential statistics. The Spearman Rank-Order Correlation Technique was employed to test the various hypotheses formulated. The result of the analysis revealed that the information system is significantly and positively related to the operational efficiency of maritime firms’ in Port Harcourt, Rivers State. The empirical results of this study confirmed this as a positive and significant relationship was found between processing transaction systems and operational efficiency of maritime firms, and between electronic data interchange and operational efficiency of maritime firms. Based on these findings, it was concluded that the information system with its dimension of processing transaction system and electronic data interchange will improve operational efficiency of maritime firms in Port Harcourt. This study recommends that maritime firms should leverage on information systems as this would ensure reduction in cost and improve operational efficiency; they should use processing transaction system in order to facilitate the recording, tracking, and management of business transactions within the organization and the port, and they should adopt electronic data interchange for processing of documents and timely delivery of same.
{"title":"Information Systems and Operational Efficiency of Maritime Firms in Port Harcourt","authors":"Chukwudi I. C., Ebieye N. M., Blessing R. A.","doi":"10.52589/bjcnit-mzbts2nd","DOIUrl":"https://doi.org/10.52589/bjcnit-mzbts2nd","url":null,"abstract":"The study examined the relationship between information systems and operational efficiency of maritime firms’ in Port Harcourt, Rivers State. Three research questions and three research hypotheses were formulated to address the specific objectives of this study. The RBV theory was adopted in this study and also quantitative research design using a correlational method of investigation. The population consists of 16 maritime firms in Port Harcourt. Census sampling was applied with focus on managers. Four managers per firm were sampled; a total of 64 managers were sampled. The reliability of the instrument was determined using Cronbach alpha test and it stood at 0.88 higher than the benchmark of 0.7. The data collected for this study were analyzed through descriptive and inferential statistics. The Spearman Rank-Order Correlation Technique was employed to test the various hypotheses formulated. The result of the analysis revealed that the information system is significantly and positively related to the operational efficiency of maritime firms’ in Port Harcourt, Rivers State. The empirical results of this study confirmed this as a positive and significant relationship was found between processing transaction systems and operational efficiency of maritime firms, and between electronic data interchange and operational efficiency of maritime firms. Based on these findings, it was concluded that the information system with its dimension of processing transaction system and electronic data interchange will improve operational efficiency of maritime firms in Port Harcourt. This study recommends that maritime firms should leverage on information systems as this would ensure reduction in cost and improve operational efficiency; they should use processing transaction system in order to facilitate the recording, tracking, and management of business transactions within the organization and the port, and they should adopt electronic data interchange for processing of documents and timely delivery of same.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"36 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140964856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.52589/bjcnit-2xztfrui
Oluwabunmi O. A., Uthman K. O., Abdullai B. A., Adeolu L. S.
The aim of this research work is to design and implement an improved system which will contribute greatly in providing solutions to evaluate the impact of RPA on the complaint-handling process in a school complaint portal. The proposed Robotic Process Automation for a complaint management system and student registration system can help in saving time and automating repetitive tasks. The complaint management system can instantly allow the admin to create different categories instead of doing it manually which takes a lot of time, compared to the automated process which will get the total number of students and complete it within a few minutes. The student registration system saves the admin the stress of opening the browser and typing the login credentials every time a task needs to be done. The 200 students’ details were generated and turned into an Excel file within 4 minutes compared to the manual method which takes hours to complete.
{"title":"Automation of a Complaint Management System Using RPA","authors":"Oluwabunmi O. A., Uthman K. O., Abdullai B. A., Adeolu L. S.","doi":"10.52589/bjcnit-2xztfrui","DOIUrl":"https://doi.org/10.52589/bjcnit-2xztfrui","url":null,"abstract":"The aim of this research work is to design and implement an improved system which will contribute greatly in providing solutions to evaluate the impact of RPA on the complaint-handling process in a school complaint portal. The proposed Robotic Process Automation for a complaint management system and student registration system can help in saving time and automating repetitive tasks. The complaint management system can instantly allow the admin to create different categories instead of doing it manually which takes a lot of time, compared to the automated process which will get the total number of students and complete it within a few minutes. The student registration system saves the admin the stress of opening the browser and typing the login credentials every time a task needs to be done. The 200 students’ details were generated and turned into an Excel file within 4 minutes compared to the manual method which takes hours to complete.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"25 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.52589/bjcnit-ioyrpy7g
Oluwabunmi O. A., Oluwaferanmi I. R., Abdullai B. A.
The purpose of this study is to design a fake news detection system with these three machine learning models, namely: Decision Tree, Random Forest, and Logistic Regression. These three different models were analysed to determine the most efficient model for accurately detecting fake news. The result obtained showcased Logistic Regression with an accuracy of 98.80%, Decision Tree with an accuracy of 99.64% and Random Forest with an accuracy of 99.23%. It is evident as deduction from the comparative analysis that our best model came out to be Decision Tree with an accuracy of 99.64%.
{"title":"Fake News Detection System Using Logistic Regression, Decision Tree and Random Forest","authors":"Oluwabunmi O. A., Oluwaferanmi I. R., Abdullai B. A.","doi":"10.52589/bjcnit-ioyrpy7g","DOIUrl":"https://doi.org/10.52589/bjcnit-ioyrpy7g","url":null,"abstract":"The purpose of this study is to design a fake news detection system with these three machine learning models, namely: Decision Tree, Random Forest, and Logistic Regression. These three different models were analysed to determine the most efficient model for accurately detecting fake news. The result obtained showcased Logistic Regression with an accuracy of 98.80%, Decision Tree with an accuracy of 99.64% and Random Forest with an accuracy of 99.23%. It is evident as deduction from the comparative analysis that our best model came out to be Decision Tree with an accuracy of 99.64%.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"11 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140962098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-08DOI: 10.52589/bjcnit-4zv3ey9s
Yeser A. A., Rami N. A.
With its great religious significance, the Holy Mosque in Makkah welcomes millions of tourists every year. The problem of misplaced objects at this holy site poses a problem for both guests and guards. In order to tackle this issue and improve worshippers' and visitors' overall experience, this study project explores the ideation, creation, and testing of a state-of-the-art mobile application called the "Lost and Found Assistance" app. This software makes use of modern technologies to expedite the process of finding misplaced items inside the Holy Mosque. The 'Lost and Found Assistance' app's main objective is to offer a workable answer to anyone who have misplaced their belongings inside the enormous Holy Mosque. It presents an easy-to-use and effective platform that enables users to report misplaced things, facilitating their prompt recovery. Additionally, it enables users to look for misplaced items, providing comfort to individuals who could have momentarily misplaced priceless items while visiting. In order to provide insight on the Holy Mosque's hallowed legacy and importance in the Islamic world, this study initiative examines the historical significance of the building. It explores the issues surrounding misplaced objects at this hallowed location, highlighting the demand for an up-to-date, technologically advanced solution. In addition, the research highlights the revolutionary role that mobile applications play in a variety of contexts as it examines the current state of lost and found services. Through an analysis of current applications and technological breakthroughs, it pinpoints chances to modify these advances to meet the particular difficulties presented by the Holy Mosque. The entire development process of the 'Lost and Found Assistance' app is described, from the first conceptualization to the design and coding stages. The project emphasizes the value of intuitive design concepts and user-friendly interfaces in making sure that the software is useful and accessible to a variety of users. An analysis of the app's usefulness in helping users find misplaced goods within the Holy Mosque completes the research endeavor. It talks about user pleasure and feedback, highlighting how the software improves users' experiences. It also looks at how widely the app might be used and offers ideas for improvements down the road. The 'Lost and Found Assistance' app helps to maintain a calm and serene atmosphere inside the Holy Mosque by utilizing contemporary technologies. The ability of technology to solve long-standing issues and improve the pilgrimage and visitor experience for millions of worshippers and tourists who visit this holy site is demonstrated by this study effort.
{"title":"Haram Lost and Found","authors":"Yeser A. A., Rami N. A.","doi":"10.52589/bjcnit-4zv3ey9s","DOIUrl":"https://doi.org/10.52589/bjcnit-4zv3ey9s","url":null,"abstract":"With its great religious significance, the Holy Mosque in Makkah welcomes millions of tourists every year. The problem of misplaced objects at this holy site poses a problem for both guests and guards. In order to tackle this issue and improve worshippers' and visitors' overall experience, this study project explores the ideation, creation, and testing of a state-of-the-art mobile application called the \"Lost and Found Assistance\" app. This software makes use of modern technologies to expedite the process of finding misplaced items inside the Holy Mosque.\u0000The 'Lost and Found Assistance' app's main objective is to offer a workable answer to anyone who have misplaced their belongings inside the enormous Holy Mosque. It presents an easy-to-use and effective platform that enables users to report misplaced things, facilitating their prompt recovery. Additionally, it enables users to look for misplaced items, providing comfort to individuals who could have momentarily misplaced priceless items while visiting.\u0000In order to provide insight on the Holy Mosque's hallowed legacy and importance in the Islamic world, this study initiative examines the historical significance of the building. It explores the issues surrounding misplaced objects at this hallowed location, highlighting the demand for an up-to-date, technologically advanced solution.\u0000In addition, the research highlights the revolutionary role that mobile applications play in a variety of contexts as it examines the current state of lost and found services. Through an analysis of current applications and technological breakthroughs, it pinpoints chances to modify these advances to meet the particular difficulties presented by the Holy Mosque.\u0000The entire development process of the 'Lost and Found Assistance' app is described, from the first conceptualization to the design and coding stages. The project emphasizes the value of intuitive design concepts and user-friendly interfaces in making sure that the software is useful and accessible to a variety of users.\u0000An analysis of the app's usefulness in helping users find misplaced goods within the Holy Mosque completes the research endeavor. It talks about user pleasure and feedback, highlighting how the software improves users' experiences. It also looks at how widely the app might be used and offers ideas for improvements down the road.\u0000The 'Lost and Found Assistance' app helps to maintain a calm and serene atmosphere inside the Holy Mosque by utilizing contemporary technologies. The ability of technology to solve long-standing issues and improve the pilgrimage and visitor experience for millions of worshippers and tourists who visit this holy site is demonstrated by this study effort.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":" 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141129265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-01DOI: 10.52589/bjcnit-jak93dun
Ogba P. O., Bello M.
One method for handling imprecise, ambiguous, and unclear data is rough set theory. Rough set theory offers a practical method for making decisions during data extraction. The practice of analyzing vast amounts of data to extract useful information from a larger collection of raw data is known as data mining. This paper discusses consistent data with rough set theory, covering blocks of attribute-value pairs, information table reductions, decision tables, and indiscernibility relations. It also explains the basics of rough set theory with a focus on applications to data mining. Additionally, rule induction algorithms are explained. The rough set theory for inconsistent data is then introduced, containing certain and potential rule sets along with lower and upper approximations. Finally, a presentation and explanation of rough set theory to incomplete data is given. This includes characteristic sets, characteristic relations, and blocks of attribute-value pairs.
{"title":"Rough Set Theory and its Applications in Data Mining","authors":"Ogba P. O., Bello M.","doi":"10.52589/bjcnit-jak93dun","DOIUrl":"https://doi.org/10.52589/bjcnit-jak93dun","url":null,"abstract":"One method for handling imprecise, ambiguous, and unclear data is rough set theory. Rough set theory offers a practical method for making decisions during data extraction. The practice of analyzing vast amounts of data to extract useful information from a larger collection of raw data is known as data mining. This paper discusses consistent data with rough set theory, covering blocks of attribute-value pairs, information table reductions, decision tables, and indiscernibility relations. It also explains the basics of rough set theory with a focus on applications to data mining. Additionally, rule induction algorithms are explained. The rough set theory for inconsistent data is then introduced, containing certain and potential rule sets along with lower and upper approximations. Finally, a presentation and explanation of rough set theory to incomplete data is given. This includes characteristic sets, characteristic relations, and blocks of attribute-value pairs.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"25 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141037497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.52589/bjcnit-qn2k6pof
Helena Kraváriková
The proposed constructions have to meet their use in terms of shape, dimensions and above all, strength. Parts of the structure are loaded by external forces. The load on the structure is examined in all parts and directions. Parts of the structure are stressed by a combination of basic types of stress. One of the basic types of stress is pull or pressure. The investigation of the part of the structure under tensile-compression stress is important because of the deformation, stability and strength of the structure as a whole. Analytical solution, classical experiment or modelling FEM can be used to predict the stress of structural parts. Currently, the most preferred solution is FEM numerical simulation. Numerical simulation has a more purposeful use in the solution of structural stability. The article contains the solution, tensile stresses for a steel rod, numerical simulation using the FEM method in the ANSYS program and analytically.
{"title":"Verification of the Analytical Solution and Numerical Simulation for Tension - Pressure","authors":"Helena Kraváriková","doi":"10.52589/bjcnit-qn2k6pof","DOIUrl":"https://doi.org/10.52589/bjcnit-qn2k6pof","url":null,"abstract":"The proposed constructions have to meet their use in terms of shape, dimensions and above all, strength. Parts of the structure are loaded by external forces. The load on the structure is examined in all parts and directions. Parts of the structure are stressed by a combination of basic types of stress. One of the basic types of stress is pull or pressure. The investigation of the part of the structure under tensile-compression stress is important because of the deformation, stability and strength of the structure as a whole. Analytical solution, classical experiment or modelling FEM can be used to predict the stress of structural parts. Currently, the most preferred solution is FEM numerical simulation. Numerical simulation has a more purposeful use in the solution of structural stability. The article contains the solution, tensile stresses for a steel rod, numerical simulation using the FEM method in the ANSYS program and analytically.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"13 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139597514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-29DOI: 10.52589/bjcnit-facsojao
Nzerue-Kenneth P.E., Onu F.U, Denis A.U., Igwe J.S., Ogbu N.H.
Human beings are naturally classified; OOP is closely aligned to how human brains work. The Mathematical functional approach is a more rigorous way to capture an idea; it is more difficult to transpose and the code is not easily readable. To overcome the limitations of procedural, structural, and functional programming, OOP was developed. Because of its versatility, it supports various programming styles which include maintenance, addition and overriding; however, modification of existing code is made easier. OOP programs prevent you from repeating code, making developers choose OOP in their python program because a class can be defined once and reused many times (Thelin, 2020). By the end of this article, you will be able to create classes, instantiate objects from them, and integrate the four methods of OOP by creating modules of Python projects. With the basic concept of OOP in Python, this article has shown how we can hide our data by making it private (abstraction), allowing for code reusability (inheritance), constraining dependency management through polymorphism and rapping data and function together to prevent data from being accessed by the code outside this shield (encapsulation).
{"title":"Detailed Study of the Object-Oriented Programming (OOP) Features in Python","authors":"Nzerue-Kenneth P.E., Onu F.U, Denis A.U., Igwe J.S., Ogbu N.H.","doi":"10.52589/bjcnit-facsojao","DOIUrl":"https://doi.org/10.52589/bjcnit-facsojao","url":null,"abstract":"Human beings are naturally classified; OOP is closely aligned to how human brains work. The Mathematical functional approach is a more rigorous way to capture an idea; it is more difficult to transpose and the code is not easily readable. To overcome the limitations of procedural, structural, and functional programming, OOP was developed. Because of its versatility, it supports various programming styles which include maintenance, addition and overriding; however, modification of existing code is made easier. OOP programs prevent you from repeating code, making developers choose OOP in their python program because a class can be defined once and reused many times (Thelin, 2020). By the end of this article, you will be able to create classes, instantiate objects from them, and integrate the four methods of OOP by creating modules of Python projects. With the basic concept of OOP in Python, this article has shown how we can hide our data by making it private (abstraction), allowing for code reusability (inheritance), constraining dependency management through polymorphism and rapping data and function together to prevent data from being accessed by the code outside this shield (encapsulation).","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139209607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-05DOI: 10.52589/bjcnit-q1mzpvwz
D. O. Egete, B. Ele, D. U. Ashishie
Women and ethnic minorities have historically been underrepresented in the cybersecurity industry. Although there are an increasing number of open opportunities in the cybersecurity industry, this pattern has not changed. There is still an imbalance in the participation of women and ethnic minorities in the cybersecurity domain. Issues that impact both Africa and the global participation of women and ethnic minorities in cyber-security include inadequate representation and awareness as well as retention problems. Further, issues such as harassment, gender bias and the idea that cybersecurity is a “man’s world” are also contributing factors. This paper provides a framework for discussing some of the skills that are available to women and underrepresented groups and argues for the necessity to solve this problem. Programs striving to increase the participation of women and ethnic minorities in cybersecurity are discussed. Lastly, some suggestions to remediate this pervasive issue are also provided.
{"title":"Unequal Culture of Women and Minorities in Cybersecurity Domain","authors":"D. O. Egete, B. Ele, D. U. Ashishie","doi":"10.52589/bjcnit-q1mzpvwz","DOIUrl":"https://doi.org/10.52589/bjcnit-q1mzpvwz","url":null,"abstract":"Women and ethnic minorities have historically been underrepresented in the cybersecurity industry. Although there are an increasing number of open opportunities in the cybersecurity industry, this pattern has not changed. There is still an imbalance in the participation of women and ethnic minorities in the cybersecurity domain. Issues that impact both Africa and the global participation of women and ethnic minorities in cyber-security include inadequate representation and awareness as well as retention problems. Further, issues such as harassment, gender bias and the idea that cybersecurity is a “man’s world” are also contributing factors. This paper provides a framework for discussing some of the skills that are available to women and underrepresented groups and argues for the necessity to solve this problem. Programs striving to increase the participation of women and ethnic minorities in cybersecurity are discussed. Lastly, some suggestions to remediate this pervasive issue are also provided.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}