Asian Journal of Research in Computer Science http://www.journalajrcos.com/index.php/AJRCOS <p style="text-align: justify;"><strong>Asian Journal of Research in Computer Science (ISSN: 2581-8260 )&nbsp;</strong>aims to publish high-quality papers in all areas of 'computer science, information technology,&nbsp;and related subjects'. The journal also encourages the submission of useful reports of negative results. This is a quality controlled,&nbsp;OPEN&nbsp;peer-reviewed, open access INTERNATIONAL journal.</p> SCIENCEDOMAIN international en-US Asian Journal of Research in Computer Science 2581-8260 Smart Vehicle Tracking System through IoT http://www.journalajrcos.com/index.php/AJRCOS/article/view/30106 <p>This study evaluates the importance of connecting objects through the concept of the Internet of things (IoT). There has been an increasing trend in the topic of the Internet of Things in various sectors. Almost all, such as area, devices, the software is connected which all can be accessed remotely or virtually through smart devices. The most typical invention is the smartphone which that acts like the computer and sometimes even smatter smarter when connected with web &amp; internet. But the new term smart homes where all the devices and machinery are connected to ensure that all smart processes are smart. This can be extended to a smart village, smart city and smart industry. Here we introduce a vehicle tracking system by using the concept IoT. Message Queuing Telemetry Transport (MQTT) is a protocol commonly used in the IoT platform to share information.&nbsp; It can be used for both publishings and subscribe subscribing data from one end to another. Here we have used the same technique has been used in the present work to design a simulation to track the exact location of a given vehicle. IOT broker and the smart devices were integrated into the middleware enterprise service bus the middleware (ESB) architecture and the simulation was run with numerous geolocations.</p> S. Sriashalya Y. Kalyani ##submission.copyrightStatement## 2019-09-27 2019-09-27 1 5 10.9734/ajrcos/2019/v4i130106 Mobile Phones: A Panacea for the Implementation of E-voting in Nigeria http://www.journalajrcos.com/index.php/AJRCOS/article/view/30102 <p>Mobile phones have become the most ubiquitous telecommunication technology in developing countries and indeed, the world over, with its penetration rate outstripping those for internet users, fixed phone lines and broadband subscriptions. Services that are offered through mobile phones sometimes referred to as “m-services” could increase the utility of mobile phones to enhance human capabilities. One of such services is mobile voting (m-voting). However, owing to factors such as digital divides, low literacy level, deficits in communication infrastructures, poverty, poor capacity to develop and so on, providing such services&nbsp; except in a highly localized nature, maybe an attendant problem in Nigeria and most developing countries. In this paper, an m-Voting framework was proposed using two of the communication channels of basic phones which are Short Message Service (SMS) and Unstructured Supplementary Service Data (USSD). Basic phones are easy to use and are increasingly able to bypass the barriers of illiteracy and affordability, and they provide access to a wide range of very useful services. The paper investigated the prospects of voting through mobile phones as a substantive voting platform in Nigeria with a view to foster enhanced participation and convenience of voters during electioneering processes.</p> Oladotun O. Okediran ##submission.copyrightStatement## 2019-09-03 2019-09-03 1 15 10.9734/ajrcos/2019/v4i130102 Enhancing PIGPEN Image Steganography Method by Using Zigzag Scanning http://www.journalajrcos.com/index.php/AJRCOS/article/view/30103 <p>Steganography is the art and science of writing hidden messages in such a way that no one suspects the existence of the message, a form of security through obscurity. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. In this paper explains the PIGPEN image steganography technique which modifies the secret message itself not the technique of embedding. This technique represents the secret message characters by two decimal digits only not three decimal digits as ASCII encoding. So, it can save one third of the required space for embedding the message in an image. The PIGPEN technique will be enhanced by using the zigzag scanning to increase the security and achieves higher visual quality as indicated by the high peak signal-to-noise ratio (PSNR) in spite of hiding a large number of secret bits in the image.</p> A. A. Abdelmgeid A. A. Bahgat Al-Hussien Seddik Saad Maha Mohamed Gomaa ##submission.copyrightStatement## 2019-09-07 2019-09-07 1 10 10.9734/ajrcos/2019/v4i130103 The Probabilistic State of Computer in Secondary School Education: A Case Study of Oredo Local Government Area, Edo State http://www.journalajrcos.com/index.php/AJRCOS/article/view/30104 <p>Computer education around the globe has taken a new dimension and countries that have integrated computer into class room teaching have succeeded in reducing the deficit of traditional classroom education of late 80s and 90s. 21st century children have a different educational mentality to that of 19th century children and the advancement in technology has indeed changed the narrative. However, the 21<sup>st</sup> century has some setbacks in computer class rooms’ integration and this seems to be a similar problem with the developing countries. To a great extent, the quest to make the secondary school students use computer in class room has yielded no result in Oredo Local Government Area. This paper examined and conducted a survey on the use of computer in Oredo Local Government Area Secondary School through structured questionnaires. From the survey, it was observed that the Secondary Schools in Oredo Local Government Area of Edo State are yet to comply with the 1987 initiative of the then Federal Government of Nigeria to make computer available in all school which in turn, led to the National Computer Policy of 1988. As at today, the Secondary school students are still being taught computer classes without having computer to demonstrate the nitty-gritty.&nbsp;</p> Maxwell Scale Uwadia Osagie Ogbebor Samuel Onoyake Racheal IfoghaleEfeturi . Omoigiawei Evelyn Ekinadose Otoibhi O. Juliana Okeke Grace Igbogbo Mary Blessing Saratu David Ajayi ##submission.copyrightStatement## 2019-09-19 2019-09-19 1 11 10.9734/ajrcos/2019/v4i130104 Improvement of E-learning Based via Learning Management Systems (LMS) Using Artificial Neural Networks http://www.journalajrcos.com/index.php/AJRCOS/article/view/30105 <p>E-Learning nowadays is one of the learning system which uses the latest technologies in the field of innovative learning, it has been an extension of traditional education. The effectiveness of E-Learning lies in achievement of education and improving the student's performance and its reflection on the demands of students by discovering the weaknesses and strengths of the factors affecting distance learning. In this research we have used the multilayered neural networks (feedforward neural network) with an input of five neurons which represent the five criteria (virtual class presence, Discussion during semester, Solving Quiz, Mid-term examination, Assignment), hidden layer has two neurons and the output layers have one neuron. to estimate the performance of the students attending an E-Learning course, feedforward neural network was&nbsp; applied to real data )400 student records (80%) are used for training data and the remaining 100 records (20%) are used as test data, performance = 0.0699), to&nbsp; predict the performance of&nbsp; the students&nbsp;&nbsp; that reflect their real grades.</p> Khaled . M. G Noama Ahmed Khalid Arafat A. Muharram Ibrahim A. Ahmed ##submission.copyrightStatement## 2019-09-24 2019-09-24 1 9 10.9734/ajrcos/2019/v4i130105