Deborah Aleburu - Academia.edu (original) (raw)

Papers by Deborah Aleburu

Research paper thumbnail of Algorithmic Narration for Demystifying Computer Science and Engineering Undergraduate Projects

Journal of critical reviews, 2021

Research paper thumbnail of Electronic Health Records in Developing Countries: The Role Of Intelligent Devices

Journal of Computer Science and Its Application, 2020

The collection and storing of medical records pertaining to the health status of patients in an e... more The collection and storing of medical records pertaining to the health status of patients in an electronic form so as to allow; easy access, information sharing and making better medical decisions among other things is known as an Electronic Health Record (EHR). Data generated by health care providers from patient‟s diagnosis, prescription, health monitoring and other health related issues were basically kept on paper. However, the rapid proliferation of data has led to the advancement of effective management of these data to help bring about better decision making and also improvement in health care delivery. This paper highlights the importance of EHR, its role in delivering better health care and the development of a nation, taking cognizance of its adoption level in both the developed and developing countries. Strategic solution of integrating intelligent devices (Chatbots and glass) to burgeon the implementation of EHR so as to improve the overall health care of the populace of...

Research paper thumbnail of Data Sets on Instructional Technology

Research paper thumbnail of PROSPECTS AND CHALLENGES OF DIGITAL PARENTING IN FAMILY COMMUNICATION IN NIGERIA CHAPTER ONE INTRODUCTION 1.1 Background to the Study

Research paper thumbnail of Programming Triggers for Critical Data Surveillance

The ability of a Database Management System (DBMS) to detect fraudulent activities at the earlies... more The ability of a Database Management System (DBMS) to detect fraudulent activities at the earliest possible time cannot be overemphasized. The concept of critical data surveillance is the ability of system to automatically watch over some selected database objects, and take cognizance of ensuing events. This work achieves this solution through the implementation of database triggers, which keeps track of the major database events. The focus of this work is on surveillance and protection against updates to critical database tables. The work implements real life audit-based surveillance of automated product sales enterprises database tables. The trigger was created from the scratch, and programmed to monitor the critical database object-the product pricing table, which keeps record of the price tagged on each the products in the supermarket. Thus, this work ensures that the trigger is fired accordingly, and that changes to the contents are reported to an audit table for further review by only authorized persons. This research was implemented using PostgreSQL.

Research paper thumbnail of A survey on security and privacy issues in the use of wireless sensor networks for health care monitoring

Development in wireless sensor Networks (WSNs) has led to the increase in its applications in hea... more Development in wireless sensor Networks (WSNs) has led to the increase in its applications in healthcare. Wireless Sensor Network application in health care is divided into two (2) wearable and implantable sensor devices. These devices allows for the monitoring and tracking of patients’ health status. Security and privacy are issues that arise from the use of these applications. The use of sensor networks for healthcare monitoring has a lot of benefits; so therefore, it is of necessity that these issues are addressed. This paper gives a survey on the security and privacy issues faced with the use of WSNs for healthcare monitoring.

Research paper thumbnail of Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

Computer Systems Science and Engineering

This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.

Research paper thumbnail of Application of Blockchain Technology to HealthCare Sector: A Review

International Journal of Computer Trends and Technology

Blockchain can be described as a distributed ledger technology capable of recording safe and cont... more Blockchain can be described as a distributed ledger technology capable of recording safe and continuous transactions between parties. It is an emerging technology that has drawn considerable interest financial institutions, energy supply firms, academic community and also the healthcare industry. Blockchain promises transparent, tamper-proof and secure systems that can enable novel solutions especially when combined with smart contracts. Decentralization is a significant characteristic of blockchain that can benefit healthcare applications, making it possible to implement distributed healthcare apps that do not depend on a centralized authority. In addition, the fact that the information in the blockchain is duplicated among all the nodes in the network creates an environment of transparency and openness that allows healthcare stakeholders, and patients in particular, to understand how their data is used, by whom, when and how. This paper presents a review on the application of blockchain to the health care sector.

Research paper thumbnail of Mobile Ad Hoc Networks: An Overview

International Journal of Computer Trends and Technology

Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of mobile nodes (Smart p... more Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.) that self-configure to reconstruct their topology and route table information for the exchange of data packets. In MANET there is no central administration framework for design obligation. Every versatile node uninhibitedly moves, enter and detach with no pre information. The wireless links in this network are highly unsecure and can go down frequently due to mobility of nodes, interference and less infrastructure. In this research paper an attempt has been made to discuss the characteristics, limitations and comparative analysis of routing protocols in MANETS.

Research paper thumbnail of Impact of Black Hole Attack on Reactive and Proactive Routing Protocols in MANET

Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disco... more Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disconnect from the other nodes in the network automatically at any point in time. MANETs are vulnerable to various security attacks due to its characteristics of flexibility, distributed operation, node to node connectivity and so on. The focus of this work is on determining the effect of Black hole attack on MANET using Reactive routing Protocols Ad-hoc On-Demand Routing protocol (AODV), and Temporally Ordered Routing (TORA); and Proactive routing Protocol Optimized Link State Routing (OLSR) and Destination-Sequenced DistanceVector (DSDV). Two network scenarios were simulated (with Black hole and without Black hole) using Network Simulator (NS-2.35) and the performance metrics considered are throughput, Packet Delivery Rate (PDR), and End to End Delay. The result showed that there were decrease in the throughput, Packet Delivery Rate and Endto-End Delay, when the network is under blackhole ...

Research paper thumbnail of Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

Computer Systems Science & Engineering - Tech Science Press, 2021

This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programmi...

Research paper thumbnail of Programming Triggers for Critical Data Surveillance

Indian Journal of Computer Science and Engineering (IJCSE), 2021

The ability of a Database Management System (DBMS) to detect fraudulent activities at the earlies... more The ability of a Database Management System (DBMS) to detect fraudulent activities at the earliest possible time cannot be overemphasized. The concept of critical data surveillance is the ability of system to automatically watch over some selected database objects, and take cognizance of ensuing events. This work achieves this solution through the implementation of database triggers, which keeps track of the major database events. The focus of this work is on surveillance and protection against updates to critical database tables. The work implements real life audit-based surveillance of automated product sales enterprises database tables. The trigger was created from the scratch, and programmed to monitor the critical database object-the product pricing table, which keeps record of the price tagged on each the products in the supermarket. Thus, this work ensures that the trigger is fired accordingly, and that changes to the contents are reported to an audit table for further review...

Research paper thumbnail of Application of Blockchain Technology to HealthCare Sector: A Review

Blockchain can be described as a distributed ledger technology capable of recording safe and cont... more Blockchain can be described as a distributed ledger technology capable of recording safe and continuous transactions between parties. It is an emerging technology that has drawn considerable interest financial institutions, energy supply firms, academic community and also the healthcare industry. Blockchain promises transparent, tamper-proof and secure systems that can enable novel solutions especially when combined with smart contracts. Decentralization is a significant characteristic of blockchain that can benefit healthcare applications, making it possible to implement distributed healthcare apps that do not depend on a centralized authority. In addition, the fact that the information in the blockchain is duplicated among all the nodes in the network creates an environment of transparency and openness that allows healthcare stakeholders, and patients in particular, to understand how their data is used, by whom, when and how. This paper presents a review on the application of blockchain to the health care sector.

Research paper thumbnail of A Survey on Security and Privacy Issues in the Use of Wireless Sensor Networks for Health Care Monitoring

Development in wireless sensor Networks (WSNs) has led to the increase in its applications in hea... more Development in wireless sensor Networks (WSNs) has led to the increase in its applications in healthcare. Wireless Sensor Network application in health care is divided into two (2) wearable and implantable sensor devices. These devices allows for the monitoring and tracking of patients' health status. Security and privacy are issues that arise from the use of these applications. The use of sensor networks for healthcare monitoring has a lot of benefits; so therefore, it is of necessity that these issues are addressed. This paper gives a survey on the security and privacy issues faced with the use of WSNs for healthcare monitoring. I.

Research paper thumbnail of Impact of Black Hole Attack on Reactive and Proactive Routing Protocols in MANET

International Journal of Scientific & Engineering Research, 2018

Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disco... more Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disconnect from the other nodes in the network automatically at any point in time. MANETs are vulnerable to various security attacks due to its characteristics of flexibility, distributed operation, node to node connectivity and so on. The focus of this work is on determining the effect of Black hole attack on MANET using Reactive routing Protocols-Ad-hoc On-Demand Routing protocol (AODV), and Temporally Ordered Routing (TORA); and Proactive routing Protocol-Optimized Link State Routing (OLSR) and Destination-Sequenced Distance-Vector (DSDV). Two network scenarios were simulated (with Black hole and without Black hole) using Network Simulator (NS-2.35) and the performance metrics considered are throughput, Packet Delivery Rate (PDR), and End to End Delay. The result showed that there were decrease in the throughput, Packet Delivery Rate and End-to-End Delay, when the network is under blackhole attack; this is more evident in AODV as compared to other routing protocols.

Research paper thumbnail of Mobile Ad-Hoc Networks: An Overview

International Journal of Scientific & Engineering Research, 2018

Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that is formed without the support ... more Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that is formed without the support of any existing network infrastructure. It is a self-configurable network where nodes connect and disconnect from the other nodes in the network automatically at any point in time. The characteristics of MANETs such as flexibility, distributed operation, node to node connectivity make it vulnerable to various security attacks such as wormhole attacks, grey-hole attacks, black-hole attacks and so on. This paper presents an overview of the characteristics, applications, challenges, security goals, limitations, routing protocols and security attacks of MANETs.

Research paper thumbnail of Blockchain: A Possible Alternative to Achieving Health Information Exchange (HIE

International Journal of Innovative Research in Computer Science & Technology (IJIRCST), 2020

A patient may have access to one or more healthcare organizations, meaning that their health info... more A patient may have access to one or more healthcare organizations, meaning that their health information is spread across separate EHR systems, resulting in data fragmentation. Thus, the medical history of a patient may not be complete, consistent or comprehensive if the records cannot be combined into a single consistent overview that may not be efficient for the future diagnosis of the patient. Health Information Exchange (HIE) relates to the electronic transfer of health care information between institutions and practitioners within a specific group, region or hospital. However, HIE is surrounded with various challenges such as data insecurity, threat to patient privacy, dependency on third parties and so on. Blockchain through its characteristics such as safety, privacy, decentralization, and immutability has the ability to transform health care, putting the patient at the core of the health care ecosystem, and enhancing health data security, privacy, and interoperability thereby offering HIE with excellent potential. In this paper Health Information Exchange (HIE) and Blockchain Technology are discussed and the possibility of using blockchain technology to achieve HIE is presented.

Research paper thumbnail of PROSPECTS AND CHALLENGES OF DIGITAL PARENTING IN FAMILY COMMUNICATION IN NIGERIA

The increase in the field of technology had burgeoned to a level where it is applicable in every ... more The increase in the field of technology had burgeoned to a level where it is applicable in every field and area of life and this increase is happening at a very rapid pace. This advancement had been significant especially digital and mobile technology. The advent of digital devices has affected the way of life of this present generation. In fact, people of this generation are being referred to as digital natives. Digital devices are devices that electronic and can be used to receive, store, send and process information. They include (smartphones, laptops, personal digital assistants, smart devices that can perform computational tasks); these devices help provide quick access to reliable and meaningful information thus making life more bearable and improvement in decision making. In the digital era we are, there has been a wide adoption of these digital devices across all age groups (Accenture, 2017). It is no surprise to see a kid of less than two (2) years handling and operating properly a digital device. This can be due to the fact that digital devices have permeated our daily activities ranging from reading devotionals and bibles, reading the newspaper, getting latest updates and trends in our area of interest, playing games, videos and music, learning to mention a few.

Research paper thumbnail of Algorithmic Narration for Demystifying Computer Science and Engineering Undergraduate Projects

Journal of critical reviews, 2021

Research paper thumbnail of Electronic Health Records in Developing Countries: The Role Of Intelligent Devices

Journal of Computer Science and Its Application, 2020

The collection and storing of medical records pertaining to the health status of patients in an e... more The collection and storing of medical records pertaining to the health status of patients in an electronic form so as to allow; easy access, information sharing and making better medical decisions among other things is known as an Electronic Health Record (EHR). Data generated by health care providers from patient‟s diagnosis, prescription, health monitoring and other health related issues were basically kept on paper. However, the rapid proliferation of data has led to the advancement of effective management of these data to help bring about better decision making and also improvement in health care delivery. This paper highlights the importance of EHR, its role in delivering better health care and the development of a nation, taking cognizance of its adoption level in both the developed and developing countries. Strategic solution of integrating intelligent devices (Chatbots and glass) to burgeon the implementation of EHR so as to improve the overall health care of the populace of...

Research paper thumbnail of Data Sets on Instructional Technology

Research paper thumbnail of PROSPECTS AND CHALLENGES OF DIGITAL PARENTING IN FAMILY COMMUNICATION IN NIGERIA CHAPTER ONE INTRODUCTION 1.1 Background to the Study

Research paper thumbnail of Programming Triggers for Critical Data Surveillance

The ability of a Database Management System (DBMS) to detect fraudulent activities at the earlies... more The ability of a Database Management System (DBMS) to detect fraudulent activities at the earliest possible time cannot be overemphasized. The concept of critical data surveillance is the ability of system to automatically watch over some selected database objects, and take cognizance of ensuing events. This work achieves this solution through the implementation of database triggers, which keeps track of the major database events. The focus of this work is on surveillance and protection against updates to critical database tables. The work implements real life audit-based surveillance of automated product sales enterprises database tables. The trigger was created from the scratch, and programmed to monitor the critical database object-the product pricing table, which keeps record of the price tagged on each the products in the supermarket. Thus, this work ensures that the trigger is fired accordingly, and that changes to the contents are reported to an audit table for further review by only authorized persons. This research was implemented using PostgreSQL.

Research paper thumbnail of A survey on security and privacy issues in the use of wireless sensor networks for health care monitoring

Development in wireless sensor Networks (WSNs) has led to the increase in its applications in hea... more Development in wireless sensor Networks (WSNs) has led to the increase in its applications in healthcare. Wireless Sensor Network application in health care is divided into two (2) wearable and implantable sensor devices. These devices allows for the monitoring and tracking of patients’ health status. Security and privacy are issues that arise from the use of these applications. The use of sensor networks for healthcare monitoring has a lot of benefits; so therefore, it is of necessity that these issues are addressed. This paper gives a survey on the security and privacy issues faced with the use of WSNs for healthcare monitoring.

Research paper thumbnail of Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

Computer Systems Science and Engineering

This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.

Research paper thumbnail of Application of Blockchain Technology to HealthCare Sector: A Review

International Journal of Computer Trends and Technology

Blockchain can be described as a distributed ledger technology capable of recording safe and cont... more Blockchain can be described as a distributed ledger technology capable of recording safe and continuous transactions between parties. It is an emerging technology that has drawn considerable interest financial institutions, energy supply firms, academic community and also the healthcare industry. Blockchain promises transparent, tamper-proof and secure systems that can enable novel solutions especially when combined with smart contracts. Decentralization is a significant characteristic of blockchain that can benefit healthcare applications, making it possible to implement distributed healthcare apps that do not depend on a centralized authority. In addition, the fact that the information in the blockchain is duplicated among all the nodes in the network creates an environment of transparency and openness that allows healthcare stakeholders, and patients in particular, to understand how their data is used, by whom, when and how. This paper presents a review on the application of blockchain to the health care sector.

Research paper thumbnail of Mobile Ad Hoc Networks: An Overview

International Journal of Computer Trends and Technology

Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of mobile nodes (Smart p... more Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.) that self-configure to reconstruct their topology and route table information for the exchange of data packets. In MANET there is no central administration framework for design obligation. Every versatile node uninhibitedly moves, enter and detach with no pre information. The wireless links in this network are highly unsecure and can go down frequently due to mobility of nodes, interference and less infrastructure. In this research paper an attempt has been made to discuss the characteristics, limitations and comparative analysis of routing protocols in MANETS.

Research paper thumbnail of Impact of Black Hole Attack on Reactive and Proactive Routing Protocols in MANET

Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disco... more Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disconnect from the other nodes in the network automatically at any point in time. MANETs are vulnerable to various security attacks due to its characteristics of flexibility, distributed operation, node to node connectivity and so on. The focus of this work is on determining the effect of Black hole attack on MANET using Reactive routing Protocols Ad-hoc On-Demand Routing protocol (AODV), and Temporally Ordered Routing (TORA); and Proactive routing Protocol Optimized Link State Routing (OLSR) and Destination-Sequenced DistanceVector (DSDV). Two network scenarios were simulated (with Black hole and without Black hole) using Network Simulator (NS-2.35) and the performance metrics considered are throughput, Packet Delivery Rate (PDR), and End to End Delay. The result showed that there were decrease in the throughput, Packet Delivery Rate and Endto-End Delay, when the network is under blackhole ...

Research paper thumbnail of Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

Computer Systems Science & Engineering - Tech Science Press, 2021

This work demonstrates in practical terms the evolutionary concepts and computational application... more This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programmi...

Research paper thumbnail of Programming Triggers for Critical Data Surveillance

Indian Journal of Computer Science and Engineering (IJCSE), 2021

The ability of a Database Management System (DBMS) to detect fraudulent activities at the earlies... more The ability of a Database Management System (DBMS) to detect fraudulent activities at the earliest possible time cannot be overemphasized. The concept of critical data surveillance is the ability of system to automatically watch over some selected database objects, and take cognizance of ensuing events. This work achieves this solution through the implementation of database triggers, which keeps track of the major database events. The focus of this work is on surveillance and protection against updates to critical database tables. The work implements real life audit-based surveillance of automated product sales enterprises database tables. The trigger was created from the scratch, and programmed to monitor the critical database object-the product pricing table, which keeps record of the price tagged on each the products in the supermarket. Thus, this work ensures that the trigger is fired accordingly, and that changes to the contents are reported to an audit table for further review...

Research paper thumbnail of Application of Blockchain Technology to HealthCare Sector: A Review

Blockchain can be described as a distributed ledger technology capable of recording safe and cont... more Blockchain can be described as a distributed ledger technology capable of recording safe and continuous transactions between parties. It is an emerging technology that has drawn considerable interest financial institutions, energy supply firms, academic community and also the healthcare industry. Blockchain promises transparent, tamper-proof and secure systems that can enable novel solutions especially when combined with smart contracts. Decentralization is a significant characteristic of blockchain that can benefit healthcare applications, making it possible to implement distributed healthcare apps that do not depend on a centralized authority. In addition, the fact that the information in the blockchain is duplicated among all the nodes in the network creates an environment of transparency and openness that allows healthcare stakeholders, and patients in particular, to understand how their data is used, by whom, when and how. This paper presents a review on the application of blockchain to the health care sector.

Research paper thumbnail of A Survey on Security and Privacy Issues in the Use of Wireless Sensor Networks for Health Care Monitoring

Development in wireless sensor Networks (WSNs) has led to the increase in its applications in hea... more Development in wireless sensor Networks (WSNs) has led to the increase in its applications in healthcare. Wireless Sensor Network application in health care is divided into two (2) wearable and implantable sensor devices. These devices allows for the monitoring and tracking of patients' health status. Security and privacy are issues that arise from the use of these applications. The use of sensor networks for healthcare monitoring has a lot of benefits; so therefore, it is of necessity that these issues are addressed. This paper gives a survey on the security and privacy issues faced with the use of WSNs for healthcare monitoring. I.

Research paper thumbnail of Impact of Black Hole Attack on Reactive and Proactive Routing Protocols in MANET

International Journal of Scientific & Engineering Research, 2018

Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disco... more Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disconnect from the other nodes in the network automatically at any point in time. MANETs are vulnerable to various security attacks due to its characteristics of flexibility, distributed operation, node to node connectivity and so on. The focus of this work is on determining the effect of Black hole attack on MANET using Reactive routing Protocols-Ad-hoc On-Demand Routing protocol (AODV), and Temporally Ordered Routing (TORA); and Proactive routing Protocol-Optimized Link State Routing (OLSR) and Destination-Sequenced Distance-Vector (DSDV). Two network scenarios were simulated (with Black hole and without Black hole) using Network Simulator (NS-2.35) and the performance metrics considered are throughput, Packet Delivery Rate (PDR), and End to End Delay. The result showed that there were decrease in the throughput, Packet Delivery Rate and End-to-End Delay, when the network is under blackhole attack; this is more evident in AODV as compared to other routing protocols.

Research paper thumbnail of Mobile Ad-Hoc Networks: An Overview

International Journal of Scientific & Engineering Research, 2018

Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that is formed without the support ... more Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that is formed without the support of any existing network infrastructure. It is a self-configurable network where nodes connect and disconnect from the other nodes in the network automatically at any point in time. The characteristics of MANETs such as flexibility, distributed operation, node to node connectivity make it vulnerable to various security attacks such as wormhole attacks, grey-hole attacks, black-hole attacks and so on. This paper presents an overview of the characteristics, applications, challenges, security goals, limitations, routing protocols and security attacks of MANETs.

Research paper thumbnail of Blockchain: A Possible Alternative to Achieving Health Information Exchange (HIE

International Journal of Innovative Research in Computer Science & Technology (IJIRCST), 2020

A patient may have access to one or more healthcare organizations, meaning that their health info... more A patient may have access to one or more healthcare organizations, meaning that their health information is spread across separate EHR systems, resulting in data fragmentation. Thus, the medical history of a patient may not be complete, consistent or comprehensive if the records cannot be combined into a single consistent overview that may not be efficient for the future diagnosis of the patient. Health Information Exchange (HIE) relates to the electronic transfer of health care information between institutions and practitioners within a specific group, region or hospital. However, HIE is surrounded with various challenges such as data insecurity, threat to patient privacy, dependency on third parties and so on. Blockchain through its characteristics such as safety, privacy, decentralization, and immutability has the ability to transform health care, putting the patient at the core of the health care ecosystem, and enhancing health data security, privacy, and interoperability thereby offering HIE with excellent potential. In this paper Health Information Exchange (HIE) and Blockchain Technology are discussed and the possibility of using blockchain technology to achieve HIE is presented.

Research paper thumbnail of PROSPECTS AND CHALLENGES OF DIGITAL PARENTING IN FAMILY COMMUNICATION IN NIGERIA

The increase in the field of technology had burgeoned to a level where it is applicable in every ... more The increase in the field of technology had burgeoned to a level where it is applicable in every field and area of life and this increase is happening at a very rapid pace. This advancement had been significant especially digital and mobile technology. The advent of digital devices has affected the way of life of this present generation. In fact, people of this generation are being referred to as digital natives. Digital devices are devices that electronic and can be used to receive, store, send and process information. They include (smartphones, laptops, personal digital assistants, smart devices that can perform computational tasks); these devices help provide quick access to reliable and meaningful information thus making life more bearable and improvement in decision making. In the digital era we are, there has been a wide adoption of these digital devices across all age groups (Accenture, 2017). It is no surprise to see a kid of less than two (2) years handling and operating properly a digital device. This can be due to the fact that digital devices have permeated our daily activities ranging from reading devotionals and bibles, reading the newspaper, getting latest updates and trends in our area of interest, playing games, videos and music, learning to mention a few.