Volume 8 Issue 7 2021

Investigating the Security Implications of the Internet of Things (IoT)

Mohammed Mustafa Khan

Page No.: 1-6


Retracted

Retracted

Page No.: 7-9

Financial Feasibility Study of Methanol Refinery from Natural Gas Plant Project using Monte Carlo Simulation

Satrio Irawan Prayogo and Andy Noorsaman Sommeng

DOI: https://doi.org/10.5281/zenodo.10650392

Page No.: 10-16

Assessment of Adherence to Health and Safety Regulations on Construction Sites: A Case of Edo State

Uwadia E.F., Amiebenomo, M.I., Ojeh P.A.P, and Usman D.D.M.

DOI: https://doi.org/10.5281/zenodo.10650427

Page No.: 17-24

Assessment of Awareness Level of Quantity Surveying Profession: A Case Study of Secondary School Students in Auchi, Nigeria

Uwadia E.F., Sumanu S.O., Usman D.D.M. and Amiebenomo M.I.

DOI: https://doi.org/10.5281/zenodo.10650626

Page No.: 25-31

The Impacts of Foreign Constructions Companies on Indigenous Companies: Nigeria as a Case Study

Uwadia E.F., Jimoh B.A., Ojeh P.A.P., and Usman D.D.M.

DOI: https://doi.org/10.5281/zenodo.10650648

Page No.: 32-38

Comparison of Reference Evapotranspiration Estimation Models

Olotu Y., Ufuah E.J., Jerome S.S., Yusuf I. and Rodiya A.A.

DOI: https://doi.org/10.5281/zenodo.10650663

Page No.: 39-46

Determination of Water Poverty Index Using Composite and Real-Time Analysis in Ondo State, Nigeria

Olotu Y., Abudu M., Adoga E.A., Jimoh B.A. and Eguaoje S.O.

DOI: https://doi.org/10.5281/zenodo.10650685

Page No.: 47-52

Application of Information Technology for Reducing Greenhouse Gases Emission, Nigeria

Olotu Y., Ufuah, E.J., Ayegbo, O.J., Eremiokhale, J.I. and Uduiguomen, U.C

DOI: https://doi.org/10.5281/zenodo.10650709

Page No.: 53-57

Data Engineering in Healthcare: A Case Study

Paraskumar Patel

DOI: https://doi.org/10.5281/zenodo.11077741

Page No.: 58-63

Enhancing Security in Containerized Environments: A Review of Vulnerability Threats, Risks, Detection and Mitigation Strategies

Arun Pandiyan Perumal

DOI: https://doi.org/10.5281/zenodo.11104739

Page No.: 64-71

Dynamic Schema Evolution and Data Ingestion with PySpark : Techniques for handling dynamic schema evolution and schema-on-read scenarios in data ingestion processes using PySpark

Sree Sandhya Kona

DOI: https://doi.org/10.5281/zenodo.12770467

Page No.: 72-78

Automated Object Deletion in Google Cloud Storage: Introducing the Clean-up-gcs-bucket Library

Preyaa Atri

DOI: https://doi.org/10.5281/zenodo.11408114

Page No.: 79-83

User Management Security: Best Practices and Strategies

Pavan Navandar

DOI: https://doi.org/10.5281/zenodo.11907037

Page No.: 84-86

Personalized Nutrition: Generating Tailored Diet Plans for Individuals with Specific Health Goals Using the Zig-Zag Method and Indian Food Composition Data

Durga Prasad Amballa

DOI: https://doi.org/10.5281/zenodo.11908585

Page No.: 87-92

Leveraging AWS and Azure for Cloud-Based Test Automation: Techniques, Challenges, and Future Prospects

Narendar Kumar Ale

DOI: https://doi.org/10.5281/zenodo.12754762

Page No.: 93-95

Optimizing Cap Screw Performance in Fuel Injector Pilot Valves: A Finite Element Analysis

Aneesh Kaliyanda

DOI: https://doi.org/10.5281/zenodo.13622996

Page No.: 96-99

The DevOps Automation Imperative: Enhancing Software Lifecycle Efficiency and Collaboration

Ramakrishna Manchana

DOI: https://doi.org/10.5281/zenodo.13789734

Page No.: 100-112

Cloud Identity and Access Management

Venkata Soma

Page No.: 113-117

Automatic Update of Kubernetes Pods When ConfigMap is Updated

Pallavi Priya Patharlagadda

Page No.: 118-123

Comprehensive Security Strategies for Linux in Cloud

Ratnangi Nirek

Page No.: 124-131