The rising need to use the internet for time/delay-sensitive applications with different Quality of Service (QOS) requirements has made network management and control even more challenging. The current congestion avoidance and control mechanisms for Transport Control Protocol (TCP) are insufficient to offer good service in all circumstances. A few decades ago, the TCP successfully regulated Internet congestion control. However, it is already widely acknowledged that TCP has reached its limits and that new congestion control protocols will be required in the near future. This has prompted a significant amount of research on novel congestion control designs that will meet the demands of the future Internet. With widespread public attention and study, the full buffer problem has not gone away, but rather worsened. As a result, there has been a surge in interest in using Active Queue Management (AQM) in Internet routers to minimize queue latency. The effectiveness of a recently developed AQM, Controlled Delay (CoDel) algorithm, designed to work in today’s network setups and can be deployed as a main part of the bufferbloat solution, is evaluated in this research study. CoDel's effectiveness is evaluated by running simulations in ns-3 and comparing its results to that of Random Early Detection (RED), another promising network queue management technique.
{"title":"A Simulation-Based Comparative Study of Controlled Delay (Codel) with Random early Detection (Red) for Network Performance Evaluation","authors":"Komolafe T.A., Oladimeji O.A., Adiamo O.O., Oyebode O.O., Oyeniyi R.O.A.","doi":"10.52589/bjcnit-nmhj4s4q","DOIUrl":"https://doi.org/10.52589/bjcnit-nmhj4s4q","url":null,"abstract":"The rising need to use the internet for time/delay-sensitive applications with different Quality of Service (QOS) requirements has made network management and control even more challenging. The current congestion avoidance and control mechanisms for Transport Control Protocol (TCP) are insufficient to offer good service in all circumstances. A few decades ago, the TCP successfully regulated Internet congestion control. However, it is already widely acknowledged that TCP has reached its limits and that new congestion control protocols will be required in the near future. This has prompted a significant amount of research on novel congestion control designs that will meet the demands of the future Internet. With widespread public attention and study, the full buffer problem has not gone away, but rather worsened. As a result, there has been a surge in interest in using Active Queue Management (AQM) in Internet routers to minimize queue latency. The effectiveness of a recently developed AQM, Controlled Delay (CoDel) algorithm, designed to work in today’s network setups and can be deployed as a main part of the bufferbloat solution, is evaluated in this research study. CoDel's effectiveness is evaluated by running simulations in ns-3 and comparing its results to that of Random Early Detection (RED), another promising network queue management technique.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-28DOI: 10.52589/bjcnit-uanjiun2
Helena Kraváriková
Analysis of the beam load must be paid great attention. The external loads determine the resultant force of internal forces in the cross-section. An important task in practice is to determine the properties of the deflection line and the maximum stresses at a crucial point of the beam to assess its functional capability. The magnitude of deflection and stress can be solved both analytically and by numerical simulation. The obtained results allow us to predict critical points of the structure, thus avoiding the accumulation of maximum stresses and deflection, possibly leading to the failure and loss of the structure stability.
{"title":"Prediction of the Beams Under Bending Load","authors":"Helena Kraváriková","doi":"10.52589/bjcnit-uanjiun2","DOIUrl":"https://doi.org/10.52589/bjcnit-uanjiun2","url":null,"abstract":"Analysis of the beam load must be paid great attention. The external loads determine the resultant force of internal forces in the cross-section. An important task in practice is to determine the properties of the deflection line and the maximum stresses at a crucial point of the beam to assess its functional capability. The magnitude of deflection and stress can be solved both analytically and by numerical simulation. The obtained results allow us to predict critical points of the structure, thus avoiding the accumulation of maximum stresses and deflection, possibly leading to the failure and loss of the structure stability.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127470350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.52589/bjcnit-uwjybtex
Nwafor Chinyere Rose
This study examined deposit money banks’ computerization and financial inclusion in Nigeria covering the period 2013Q1 to 2019Q4. Data for the study were extracted from the Central Bank of Nigeria (CBN). The investigation employed the Ex Post Facto design given that it is targeted at analyzing the impact of some independent variables on a specified dependent variable. The Vector Error Correction Model (VECM) was used to estimate the structural parameters of the model. The major findings of the study were that point on sales contributes positively and significantly to financial inclusion in Nigeria (β = 0.004101, t* = 5.76845), automated teller machines contributes positively and significantly to financial inclusion in Nigeria (β = 0.000405, t* = 2.49681), web Pay contributes negatively and significantly to financial inclusion in Nigeria (β = -0.006088, t* = -5.27666), mobile Pay (MOP) contributes negatively and significantly to financial inclusion in Nigeria (β = -0.001506, t* = -5.79714) and financial deepening contributes negatively and insignificantly to financial inclusion in Nigeria (β = -0.028889, t* = -0.32843). It is therefore the recommendation of the study that the monetary authorities should develop more reliable technological checks to eradicate the possibility of fraud taking over the technological payment channels and the Central Bank of Nigeria should intensify its campaign for the acceptance of web pay by the bankable population since it has been identified as one of the major drivers of financial inclusion.
{"title":"Deposit Money Banks' Computerization and Financial Inclusion in Nigeria","authors":"Nwafor Chinyere Rose","doi":"10.52589/bjcnit-uwjybtex","DOIUrl":"https://doi.org/10.52589/bjcnit-uwjybtex","url":null,"abstract":"This study examined deposit money banks’ computerization and financial inclusion in Nigeria covering the period 2013Q1 to 2019Q4. Data for the study were extracted from the Central Bank of Nigeria (CBN). The investigation employed the Ex Post Facto design given that it is targeted at analyzing the impact of some independent variables on a specified dependent variable. The Vector Error Correction Model (VECM) was used to estimate the structural parameters of the model. The major findings of the study were that point on sales contributes positively and significantly to financial inclusion in Nigeria (β = 0.004101, t* = 5.76845), automated teller machines contributes positively and significantly to financial inclusion in Nigeria (β = 0.000405, t* = 2.49681), web Pay contributes negatively and significantly to financial inclusion in Nigeria (β = -0.006088, t* = -5.27666), mobile Pay (MOP) contributes negatively and significantly to financial inclusion in Nigeria (β = -0.001506, t* = -5.79714) and financial deepening contributes negatively and insignificantly to financial inclusion in Nigeria (β = -0.028889, t* = -0.32843). It is therefore the recommendation of the study that the monetary authorities should develop more reliable technological checks to eradicate the possibility of fraud taking over the technological payment channels and the Central Bank of Nigeria should intensify its campaign for the acceptance of web pay by the bankable population since it has been identified as one of the major drivers of financial inclusion.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.52589/bjcnit-pm3cre7i
Moko A., Victor-Ikoh M.
Diabetes mellitus is a disease of the human body that is caused by high blood sugar levels and inactivity, poor eating habits, being overweight etc. This paper reviewed, and analyzed diabetes mellitus Type 1, Type 2, and Gestational diabetes diverse risk prediction models and algorithms employed. In this study, the methodology adopted is the exploratory descriptive approach, which clearly describes the various deep learning and machine learning risk prediction model used for diabetes mellitus classification and forecasting problems. The Deep Neural Network Model algorithms given in this work have the highest score in terms of accuracy and outperformed machine learning models in terms of performance, there is also the issue of other various algorithms' precision. It is recommended that when conducting a classification and risk prediction survey on the different variants of diabetes mellitus, researchers consider using the algorithms explicitly described while paying close attention to their advantages and disadvantages, as well as their potential outcomes. It is also possible to combine deep learning techniques and machine learning algorithms to create ensemble models, which can improve prediction performance.
{"title":"Existential Risk Prediction Models for Diabetes Mellitus","authors":"Moko A., Victor-Ikoh M.","doi":"10.52589/bjcnit-pm3cre7i","DOIUrl":"https://doi.org/10.52589/bjcnit-pm3cre7i","url":null,"abstract":"Diabetes mellitus is a disease of the human body that is caused by high blood sugar levels and inactivity, poor eating habits, being overweight etc. This paper reviewed, and analyzed diabetes mellitus Type 1, Type 2, and Gestational diabetes diverse risk prediction models and algorithms employed. In this study, the methodology adopted is the exploratory descriptive approach, which clearly describes the various deep learning and machine learning risk prediction model used for diabetes mellitus classification and forecasting problems. The Deep Neural Network Model algorithms given in this work have the highest score in terms of accuracy and outperformed machine learning models in terms of performance, there is also the issue of other various algorithms' precision. It is recommended that when conducting a classification and risk prediction survey on the different variants of diabetes mellitus, researchers consider using the algorithms explicitly described while paying close attention to their advantages and disadvantages, as well as their potential outcomes. It is also possible to combine deep learning techniques and machine learning algorithms to create ensemble models, which can improve prediction performance.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.52589/bjcnit-uotndxk5
Abdulkadir D.U., Mukail N.U., B. A.
The study focused on design and implementation of a web-based lecturer evaluation system. To accomplish this, the structured system analysis and design methodology (SSDAM) was adopted. The software development tools used were PhP, CSS5, HTML, and MYSQL. The application has the Admin, Student and Lecturer modules. The admin manages students, courses, evaluation questions and criteria. The student module manages students’ ratings of their lecturers while the lecturer module manages lecturers and enables a lecturer to view his mean rating report at the end of a semester.
{"title":"Design and Implementation of a Web-Based Lecturers’ Evaluation System (A Case Study of Computer Science Department, Isa Mustapha Agwai I Polytechnic, IMAP, Lafia)","authors":"Abdulkadir D.U., Mukail N.U., B. A.","doi":"10.52589/bjcnit-uotndxk5","DOIUrl":"https://doi.org/10.52589/bjcnit-uotndxk5","url":null,"abstract":"The study focused on design and implementation of a web-based lecturer evaluation system. To accomplish this, the structured system analysis and design methodology (SSDAM) was adopted. The software development tools used were PhP, CSS5, HTML, and MYSQL. The application has the Admin, Student and Lecturer modules. The admin manages students, courses, evaluation questions and criteria. The student module manages students’ ratings of their lecturers while the lecturer module manages lecturers and enables a lecturer to view his mean rating report at the end of a semester.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-12DOI: 10.52589/bjcnit-eexoqvpg
Onyema S.C., Onyeka I.F., Mukail N.U.
The study investigated the effect of multimedia instruction on students’ academic performance in Data Structures and Algorithms (DSA) in two public Polytechnics in Nasarawa State. The population of the study comprised one hundred and twenty (120) National Diploma one (NDI) students of Computer Science from Nasarawa State Polytechnic, Lafia (now Isa Mustapha Agwai I Polytechnic, Lafia) and Federal Polytechnic, Nasarawa. The study adopted a quasi-experimental research approach using the non-randomized control group pretest-posttest design. Intact classes were maintained and an experiment of two equivalent groups was designed—one was the experimental group while the other was the control group. The group was determined using a simple random sampling technique. Sixty eight (68) students in Nasarawa State Polytechnic, Lafia constituted the experimental group while fifty two (52) students in Federal Polytechnic Nasarawa constituted the control group. The experimental group was exposed to multimedia instruction (MI) on DSA while the control group was exposed to conventional instruction. The instrument for data collection was a DSA performance test titled ‘Data Structure PerfTest (DPT)’. The DPT contained 20 objective items from the topics treated. The reliability of the instrument was determined using the test-retest approach and a correlation coefficient of .87 was attained. Inferential statistics such as t-test was used to test the null hypothesis at 0.05 alpha level of significance. Data analysis was done using the statistical package for social science (SPSS). The finding showed that the treatment group (MI) performed significantly better than its counterpart in the control group which was exposed to conventional instruction. The study recommended expansive use of multimedia instruction in teaching and learning of Data Structures and Algorithms in tertiary institutions.
{"title":"Effect of Multimedia Instruction (MI) on Students’ Performance in Data Structures and Algorithms in Public Polytechnics in Nasarawa State","authors":"Onyema S.C., Onyeka I.F., Mukail N.U.","doi":"10.52589/bjcnit-eexoqvpg","DOIUrl":"https://doi.org/10.52589/bjcnit-eexoqvpg","url":null,"abstract":"The study investigated the effect of multimedia instruction on students’ academic performance in Data Structures and Algorithms (DSA) in two public Polytechnics in Nasarawa State. The population of the study comprised one hundred and twenty (120) National Diploma one (NDI) students of Computer Science from Nasarawa State Polytechnic, Lafia (now Isa Mustapha Agwai I Polytechnic, Lafia) and Federal Polytechnic, Nasarawa. The study adopted a quasi-experimental research approach using the non-randomized control group pretest-posttest design. Intact classes were maintained and an experiment of two equivalent groups was designed—one was the experimental group while the other was the control group. The group was determined using a simple random sampling technique. Sixty eight (68) students in Nasarawa State Polytechnic, Lafia constituted the experimental group while fifty two (52) students in Federal Polytechnic Nasarawa constituted the control group. The experimental group was exposed to multimedia instruction (MI) on DSA while the control group was exposed to conventional instruction. The instrument for data collection was a DSA performance test titled ‘Data Structure PerfTest (DPT)’. The DPT contained 20 objective items from the topics treated. The reliability of the instrument was determined using the test-retest approach and a correlation coefficient of .87 was attained. Inferential statistics such as t-test was used to test the null hypothesis at 0.05 alpha level of significance. Data analysis was done using the statistical package for social science (SPSS). The finding showed that the treatment group (MI) performed significantly better than its counterpart in the control group which was exposed to conventional instruction. The study recommended expansive use of multimedia instruction in teaching and learning of Data Structures and Algorithms in tertiary institutions.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-05DOI: 10.52589/bjcnit-7lst204k
E. K., V. B.
SQL injection attack is now the most common server-side attack in web applications whereby malicious codes are injected into the database through user input fields by unauthorized users and this could lead to data loss or in the worst case, to database hijacking. The utilization of Blockchain technology in e-voting applications is not a new thing. Many systems have been proposed using cryptography and other security techniques. In those systems, minimal involvement of third party is observed, a problem of coercion resistance and transparency maintenance at the same time is observed and most processes have not been implemented to evaluate the systems further. This paper applies the cryptographic signatures to validate the origin and integrity of the votes by preserving the voter’s choices during the election process. Furthermore, authors provide several possible extensions and improvements that can be made as an addition to the scope of this research.
{"title":"Blockchain Based Electronic Voting Protocol","authors":"E. K., V. B.","doi":"10.52589/bjcnit-7lst204k","DOIUrl":"https://doi.org/10.52589/bjcnit-7lst204k","url":null,"abstract":"SQL injection attack is now the most common server-side attack in web applications whereby malicious codes are injected into the database through user input fields by unauthorized users and this could lead to data loss or in the worst case, to database hijacking. The utilization of Blockchain technology in e-voting applications is not a new thing. Many systems have been proposed using cryptography and other security techniques. In those systems, minimal involvement of third party is observed, a problem of coercion resistance and transparency maintenance at the same time is observed and most processes have not been implemented to evaluate the systems further. This paper applies the cryptographic signatures to validate the origin and integrity of the votes by preserving the voter’s choices during the election process. Furthermore, authors provide several possible extensions and improvements that can be made as an addition to the scope of this research.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-14DOI: 10.52589/bjcnit-alqqmeee
Edison K., S. U.
This research aimed at studying the current methods of attendance used at higher institutions of learning in Uganda and the feasibility of using facial biometrics as a new method of capturing attendance. Facial biometrics is distinct from other biometrics because it can be carried out without the consent of the person involved. As a result, the researcher developed a face recognition attendance system using OpenCV and Microsoft Azure CS. Questionnaires, interviews, and observations were used to capture data for the research. The data were analyzed using SPSS to get the requirements and systems functionalities. Object-Oriented Design tools were used to model the architecture of the system. Data Flow Diagram, Use-Case Diagram, Activity Diagram, and Flow Chart were used for processing whereas Entity Relation Diagram was used for data modeling. The system was designed to facilitate attendance management of a large number of attendees with ease. Efficiency and reliability were essential features of the system. Data visualization was provided to help management make informed and timely decisions on management matters that are related to attendance. The system was developed using python Tkinter, OpenCV, and Azure CS as mentioned above. The data (images) used by the system were stored in the cloud for accessibility by multiple users. The system was tested thoroughly using various testing types to uncover and fix errors and to minimize the severity of failures.
{"title":"Students’ Attendance Management in Higher Institutions Using Azure Cognitive Service and Opencv Face Detection & Recognition Attendance System","authors":"Edison K., S. U.","doi":"10.52589/bjcnit-alqqmeee","DOIUrl":"https://doi.org/10.52589/bjcnit-alqqmeee","url":null,"abstract":"This research aimed at studying the current methods of attendance used at higher institutions of learning in Uganda and the feasibility of using facial biometrics as a new method of capturing attendance. Facial biometrics is distinct from other biometrics because it can be carried out without the consent of the person involved. As a result, the researcher developed a face recognition attendance system using OpenCV and Microsoft Azure CS. Questionnaires, interviews, and observations were used to capture data for the research. The data were analyzed using SPSS to get the requirements and systems functionalities. Object-Oriented Design tools were used to model the architecture of the system. Data Flow Diagram, Use-Case Diagram, Activity Diagram, and Flow Chart were used for processing whereas Entity Relation Diagram was used for data modeling. The system was designed to facilitate attendance management of a large number of attendees with ease. Efficiency and reliability were essential features of the system. Data visualization was provided to help management make informed and timely decisions on management matters that are related to attendance. The system was developed using python Tkinter, OpenCV, and Azure CS as mentioned above. The data (images) used by the system were stored in the cloud for accessibility by multiple users. The system was tested thoroughly using various testing types to uncover and fix errors and to minimize the severity of failures.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121240958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-14DOI: 10.52589/bjcnit_fveuh8tc
Edison K., Timothy I.
To eradicate fetal deaths and stillbirths, the World Health Organization (WHO) set up antenatal care guidelines to help expectant mothers through this period. In Uganda today, it is estimated that at least 90% of the expectant mothers receive antenatal care, and with such a large number of people receiving this service, data is collected manually with pen, which makes it a long process and cumbersome to search specific records during emergencies and analysis of data for proper decision making. Therefore, there is a need for an antenatal management information system. The software is sectioned into registration, triage and consultation. The records officer handles registration of patients, patient visits, viewing and printing patient statistics. The senior clinical officer handles triaging the patient and capturing their vitals, viewing and printing patient statistics. The head midwife handles the monthly progress examination, and views and prints patient statistics. All these processes happen in real time. This system is designed to overcome the problems identified in the current antenatal management information system. The interfaces for the new system were implemented using JSP, Bootstrap and Javascript. PostgreSQL was also used for implementing the system database while Spring was used to create interactivity with the database. After the implementation, the new system was then tested and validated. When developing the system, the focus was on making the whole process of information management in the antenatal department faster, more convenient and efficient.
{"title":"Antenatal Management Information System (Case Study: China-Uganda Friendship Hospital, Naguru)","authors":"Edison K., Timothy I.","doi":"10.52589/bjcnit_fveuh8tc","DOIUrl":"https://doi.org/10.52589/bjcnit_fveuh8tc","url":null,"abstract":"To eradicate fetal deaths and stillbirths, the World Health Organization (WHO) set up antenatal care guidelines to help expectant mothers through this period. In Uganda today, it is estimated that at least 90% of the expectant mothers receive antenatal care, and with such a large number of people receiving this service, data is collected manually with pen, which makes it a long process and cumbersome to search specific records during emergencies and analysis of data for proper decision making. Therefore, there is a need for an antenatal management information system. The software is sectioned into registration, triage and consultation. The records officer handles registration of patients, patient visits, viewing and printing patient statistics. The senior clinical officer handles triaging the patient and capturing their vitals, viewing and printing patient statistics. The head midwife handles the monthly progress examination, and views and prints patient statistics. All these processes happen in real time. This system is designed to overcome the problems identified in the current antenatal management information system. The interfaces for the new system were implemented using JSP, Bootstrap and Javascript. PostgreSQL was also used for implementing the system database while Spring was used to create interactivity with the database. After the implementation, the new system was then tested and validated. When developing the system, the focus was on making the whole process of information management in the antenatal department faster, more convenient and efficient.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-03DOI: 10.52589/bjcnit-mwcmjkcy
Imasuen K., Abinuomo P.M.
Record-keeping in every organization including the educational system is a vital tool in school administration. It is indispensable since it plays a role in the day to day running of the school. However, the ICT facilities are not used effectively even though most schools have invested heavily in them. It is in the light of the above that this study sought to examine the role of ICT application on school record-keeping in secondary schools in Benin City, Edo State. Two research questions were raised to guide the study. The study adopted a descriptive research design. The population of the study consisted of all the public and private secondary schools in Benin City. The sample for the study consisted of eight hundred (800) respondents. The research instrument for the study was a structured questionnaire. The data collected were analyzed using mean and standard deviation. The findings that emanate from the study revealed that the level of ICT application in school record keeping in public and private secondary schools in Benin City, Edo State was to a low degree, and the prevalent record-keeping facilities were: attendance register, admission register, scheme of work, school time table, lesson notes, individual pupil’s files, and staff movement book. It, therefore, recommended that Government and other education stakeholders should invest in ICT applications for school management and record keeping.
{"title":"Analysis of the Application of Information and Communication Technology (ICT) on School Record-Keeping, in Secondary Schools in Benin City, Nigeria","authors":"Imasuen K., Abinuomo P.M.","doi":"10.52589/bjcnit-mwcmjkcy","DOIUrl":"https://doi.org/10.52589/bjcnit-mwcmjkcy","url":null,"abstract":"Record-keeping in every organization including the educational system is a vital tool in school administration. It is indispensable since it plays a role in the day to day running of the school. However, the ICT facilities are not used effectively even though most schools have invested heavily in them. It is in the light of the above that this study sought to examine the role of ICT application on school record-keeping in secondary schools in Benin City, Edo State. Two research questions were raised to guide the study. The study adopted a descriptive research design. The population of the study consisted of all the public and private secondary schools in Benin City. The sample for the study consisted of eight hundred (800) respondents. The research instrument for the study was a structured questionnaire. The data collected were analyzed using mean and standard deviation. The findings that emanate from the study revealed that the level of ICT application in school record keeping in public and private secondary schools in Benin City, Edo State was to a low degree, and the prevalent record-keeping facilities were: attendance register, admission register, scheme of work, school time table, lesson notes, individual pupil’s files, and staff movement book. It, therefore, recommended that Government and other education stakeholders should invest in ICT applications for school management and record keeping.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":"130 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132192728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}