Volume 4 Issue 3

1: Development of Smart CNN-Based Facial Recognition System for Students’ Attendance Record


This paper presents smart Convolutional Neural Network (CNN) based facial recognition system for students’ attendance record. Most Universities in Nigeria still adopt the manual process of attendance taken, which has made lecturing job strenuous. To resolve this problem, smart attendance management system is proposed. The target system would provide a portable Internet of Things (IoT) device that makes use of facial recognition approach to capture students’ attendance and update record automatically. The faces of registered students are captured, labeled and stored in the database. The IoT device consists of High-definition Raspberry Pi camera for capturing facial images, Raspberry Pi 4 microcontroller for processing images via written codes. The microcontroller instructions were written in Python IDE with the help of imported Open CV, Openface and dlib libraries. When tested with the IoT device, an average

recognition accuracy of 99.38% is achieved, which outperformed the facial recognition models reviewed. The system automatically captures and recognizes faces of registered students before they are allowed to enter lecture hall. It is done by matching the captured face with the existing faces in the dataset and predicts the face of the student. The IoT CNN device calculates the cumulative attendance of each student at the end of a semester and select qualified students

for the exams.

Keywords: Openface, Attendance, Facial recognition, IoT

2: The Concept of Name/Noun in Antiquity and Late Antiquity


In this article, an attempt is made to explain some obscure points in ancient texts by analyzing the different views of philosophers in Antiquity and Late Antiquity, as well as by analyzing the name category in the context of Plato’s, Aristotle’s, the Stoics’ and the Neoplatonist’s concepts of noun/name. Also discussed is a commentary to Aristotle’s “Categories” written by an anonymous author (probably one of Ammonius’ students). A number of logical and grammatical aspects of Ammonius’ interpretation of certain passages of “Categories” will be considered.

Keywords: The concept of Name, Noun in antiquity, late antiquity, in philosophy, logic, grammar


3: Experimental Investigation of the Storage the Solar Thermal Energy in Spiral Strip Fin Heat Exchanger with PCM


This current experimental work contributes to the improvement of the thermal solar energy storage capacity of the solar water heater by combining it, firstly with phase change material (PCM) without fins, and secondly with phase changing material with fins. Experemental results show the thermal energy storage performance is enhanced when using spiral fins. The enhancement for the thermal solar energy storage,

improved 37.5% compared to the case without fins. The reason for this is due to the presence of fins that increase the heat transfer surface area. The results illustrated that with spiral strip fins made the change in temperature distribution through the paraffin faster, as it gave the highest temperatures compared to model without fins, and narrowed the difference in paraffin temperatures between the bottom and top of the storage.

Keywords: Heat Exchanger; PCM; Spiral-Wired Tube; Latent Heat Storage System; Thermal Performanc.


4: Multipurpose block cipher Algorithm


In this research, a new block cipher algorithm is designed to be used for 2048 bits (256 bytes) input and output block length. The secret key is of a variable length and up to 256 bytes. although it is operated on large block length, the Long Block Cipher (LBC) is relatively fast compared to the traditional block cipher algorithms because it is operated on bytes rather than bits and a new non-linear function (called the bomb function) is designed to be fast, reversible, simple and more complex than s-boxes used in traditional algorithms. LBC algorithm is of Feistel cipher fashion with 16 rounds used for encryption and reversibly for decryption. LBC is a multipurpose algorithm that is suitable to be used for securing database management systems and satellite traffic and can be used as a hash function.