i-manager's Journal on Computer Science (JCOM)


Volume 8 Issue 2 June - August 2020

Research Paper

Covid-19 Pandemic Recovery Strategy: The Role of Information Technology (IT) in Nigeria

Raphael Olufemi Akinyede*
Department of Information Systems, The Federal University of Technology, Akure, Nigeria.
Akinyede, R. O. (2020). Covid-19 Pandemic Recovery Strategy: The Role of Information Technology (IT) in Nigeria. i-manager's Journal on Computer Science, 8(2), 1-15. https://doi.org/10.26634/jcom.8.2.17758
World Health Organization : COVID-19 - Global literature on coronavirus disease
https://pesquisa.bvsalud.org/global-literature-on-novel-coronavirus-2019-ncov/resource/en/covidwho-1097601
ProQuest Central | ID: covidwho-1097601

Abstract

As countries of the world are facing unimaginable challenges from the novel coronavirus COVID-19 pandemic, the strains on governments are extreme; and these have greatly impacted people everywhere. In response to the pandemic, captains of industries have implemented pandemic/communicable disease response plans, assessed and/or initiated business continuity plans, and widespread telework operations. Nigeria's government has also implemented lots of guidelines and these include, social distancing, shutting or locking down of restaurants, bars, movie theaters, gyms, and even worship centres. As a nation, Nigeria has been affected in many areas, for example, the educational system has been truncated, activities of manufacturing industries halted, and technologically, the nation is not moving forward. As a result, this paper aims to examine the role of Information Technology (IT) in the COVID-19 pandemic recovery strategy in Nigeria. The paper carried out a thorough analysis of the COVID-19 pandemic, its economic impact; and how government and private sectors can help in restoring the nation's economy by maximizing the use of Information Technology (IT) in Nigeria. Studies were carried out on the pandemic spread with emphasis on attributes, such as, confirmed, recovered, and death cases. Data was extracted from UNDP and WHO recorded data of December 12, 2020. The study shows that the growth of IT has increased steadily in the past nine (9) months with an appreciable increase in its teledensity, info density, and compudensity.

Review Paper

Survey of Various Simulator Tools for Wireless Sensor Network

Jaya Mishra * , Jaspal Bagga **, Amith***, Mohammad****
*-**** Department of Electronics & Telecommunication, Shri Shankaracharya Technical Campus, Junwani, Bhilai, Chhattisgarh, India.
Mishra, J., Bagga, J., Choubey, S., and Choubey, A. (2020). Survey of Various Simulator Tools for Wireless Sensor Network. i-manager's Journal on Computer Science, 8(2), 16-23. https://doi.org/10.26634/jcom.8.2.17743

Abstract

Wireless Sensor Network (WSN) is a developing area of research. In this development of sensor network applications, monitoring data volume, monitoring the well-being of the wireless sensor node, data manipulation and representation demonstrates a range of challenges and has become a critical component of sensor networks. Wireless Sensor Networks (WSNs), which comprise of spatially distributed self-configurable sensors, impeccably meet the prerequisite. Since running real experiments is expensive and tedious, recreation is basic to contemplate WSNs, being the normal method to test new applications and conventions in the field, it requires a reasonable model dependent on strong assumptions and a suitable framework to ease usage. Moreover, recreation results depend on the specific situation under investigation (environment), equipment and physical layer, which are not typically exact enough to catch the real behavior of a WSN, accordingly, risking the validity of results. In any case, because of the enormous number of hubs that need to be replicated depending on the application, identified models must be evaluated for scalability and execution problems. The goal of this study is to present a definite review of various simulator tools for WSNs which will help further research in the field.

Review Paper

Performance Analysis of Real-Time Operating System (RTOS) on Information Models

Adegbenjo Aderonke A. Y. * , Adekunle Y. A.**
*,** Department of Computer Science & Information Technology, Babcock University, Ilishan-Remo, Ogun State, Nigeria.
Aderonke, A. Y. A., and Adekunle, Y. A. (2020). Performance Analysis of Real-Time Operating System (RTOS) on Information Models. i-manager's Journal on Computer Science, 8(2), 24-31. https://doi.org/10.26634/jcom.8.2.17792

Abstract

The design of the real-time operating system (RTOS) is quite critical, particularly if any unique systems choose to use it. Since they are capable of facilitating the application of multiple requirements, including clustering, cohesion, and substitute programs. Many publications were reviewed in this paper to track the efficiency of the RTOS Various restrictions as it is exposed to. The research concentrates on a play analysis of RTOS Models for research on different computer devices and operating systems. The magazines We also gathered it for a rigorous analysis leading to the setup. Many variables that impact device features. Statistics and findings are equally relevant to Encourage the implementation of a more oriented RTOS strategy. During this phase The software classifies clustering and performance for all applications as the highest RTOS standards, This was viewed as the least significant by alternative programs. Thus, the preference of parameters is a major problem to contend with.

Review Paper

An Analysis on Scalable and Faster Iptables in Linux Operating System

Alishbah Khan Niazi* , Muhammad Ahmed Ather Usmani **
*-** Department of Computer Science, Bahria University, Karachi, Pakistan.
Niazi, A. K., and Usmani, M. A. A. (2020). An Analysis on Scalable and Faster Iptables in Linux Operating System. i-manager's Journal on Computer Science, 8(2), 32-44. https://doi.org/10.26634/jcom.8.2.17759

Abstract

Linux is a well-known operating system (os) in today's world. It has not only created a name but has also created a whole market for itself. It is today competing with Microsoft Windows which is in fact a giant, os in the computer world. Linux finds its utility in many machines other than computers for example: Servers, Routers, automation controls, etc. Every operating system that existed always needed and always had a way of securing the data that was entrusted to it. Commonly, this kind of security is referred to as a 'Firewall'. Firewalls come with different settings to ensure maximum security and to put up a defense against getting hacked or if considering a server, to fight against a Denial-of-Service attack (DoS). Linux provides such security in the form of a firewall. Firewall filters out the data packets using the rules that were created by the administrator. In firewall, the component that handles the filtering is the net filter/iptables. iptables assist in filtering the packets into different hooks which basically belong to three different categories either input, forward or output. This study discusses the implementations that were devised and would discuss in particular implementations that were able to provide a notable increase in fulfilment of securing and handling data packets at a faster pace while dealing with a high number of rules for packet handling.

Review Paper

Applications of Cluster Computing in Data Centers Along with its Advantages and Disadvantages

Abdul Rehman* , M. Shoaib Omer **
*-** Department of Computer Science, Bahria University, Karachi, Pakistan.
Rehman, A., and Omer, M. S. (2020). Applications of Cluster Computing in Data Centers Along with its Advantages and Disadvantages. i-manager's Journal on Computer Science, 8(2), 45-51. https://doi.org/10.26634/jcom.8.2.17767

Abstract

We have conducted a survey in the filed of cluster computing with intention to see its applications in data centers, advantages and disadvantages. Although the field of cluster computing is not novel, however a brief and comprehensive survey is conducted to help novice users to get a fair idea about data centers, cluster computing its applications, advantages and disadvantages. A thorough study was carried out from available resources, i.e., journals, conferences and websites to help conclusion. A number of free COTS (Commercial-Off-The-Shelf) software are also available to get cluster computing done in any given environment. There is still a need to produce more middle-ware software for cluster computing to overcome the heterogeneous hardware environment.