Faculty of Computing
Permanent URI for this communityhttps://repository.nileuniversity.edu.ng/handle/123456789/13
Browse
Item Content Management System (CMS) Evaluation and Analysis(Journal of Technical Science and Technologies, 2012-02-02) Moussa Mahamat BoukarContent management systems (CMS) provide an optimal solution by organizing information and, mostly, creating and managing an enterprise’s knowledge. Nevertheless there is a big confusion about the functionalities that characterize CMS and about the differences with less performing products such as web content management systems, document and records management systems and enterprise content management systems. This paper aims to show the mismatches between companies’ needs and those information management products, which are often called CMS even if they are not. For this reason I first made a theoretical comparison between the functionalities of CMS and those of the systems that are often confused with. Then I showed the results of an empirical research on 22 products offered by international vendors. By using an original scheme, enterprises’ needs in terms of information collection, management and publication of knowledge management are compared with the functionalities of the aforementioned systems. The result consists of performing definitions for CMS and the other systems for managing information. Content Management products are analyzed, compared and evaluated by using a special table created to point out the actual functionalities of the products offered on the market, despite vendors’ declarations. The paper conclusions show how, on the demand side, companies’ needs are growing in a confused framework; at the same time the supply side keeps on feeding this confusion, reducing company satisfaction in regard to knowledge and information managementItem Developing Interactive Course Material for Volterra Integral Equations of Second Kind(IEEE, 2014-02-02) Moussa Mahamat BoukarThe main purpose of this paper is to propose a developed interactive course material which is contained course materials, solution methods with examples and interactive environment for Volterra Integral Equations (VIEs) of Second Kind. It is possible to learn what VIE of Second Kind is, to make practice with interactive part of the material and, also how a VIE can be converted to an equivalent Initial Value Problem (IVP).Item WEB Services(IEEE, 2014-02-02) Moussa Mahamat BoukarWEB Services convert the applications into a WEB application, which can publish its function or message to the rest of world. The basic WEB Services platform is XML + HTTP. The types of WEB Services have been explained. WEB Services platform elements are illustrated. The ScalabelVector Graphics (SVG) is explained in detail. The advantages of SVG are illustrated using practical examples, such as SVG-Ellipse, SVG-Line, SVG-Rect.Item An Interactive Application (Maplet) for II-Order Ordinary Differential Equations(IEEE, 2014-02-02) Moussa Mahamat BoukarThe main purpose of this paper is to propose a Maplet interactive application that is used to find general solutions, to find Initial Value Problems (IVPs) and to depict 2-D and 3-D graphics as well of the II-Order Ordinary Homogeneousl Non-homogeneous Differential Equations (ODEs). Furthermore, to make 2-D, 3-D graphing of solutions and how they can be used as effective educational tools for both students and instructors.Item Design and Implementation of a Mobile Students’ Course Registration Platform(International Journal of Advanced Technology and Engineering Exploration, 2015-08-08) Adigun Abimbola Adebisi; Akande Oluwatobi Noah; Ajagbe Oluwafemi AdeolaThis paper describes a Mobile Application Based Course Registration Platform (MABCRP) designed and implemented to facilitate the process of students' course registration within a University system. This was designed to serve as an alternative to web based and online course registration system being currently used by most universities. This intends to bring course registration closer to the students who are vastly great users of mobile devices. The developed mobile application will enable students to automatically register expected courses per semester, view all registered courses and also to add or delete registered courses. Result of user evaluation of the developed MABCRP shows that it has a good usability in terms of usefulness and ease of use. The results also indicate that the developed MABCRP is capable to help students register their academic courses more easily without location being a barrier.Item SIDELOBE REDUCTION USING WAVELET NEURAL NETWORK FOR BINARY CODED PULSE COMPRESSION(ARPN Journal of Engineering and Applied Sciences, 2016-01-02) Ibrahim Anka SalihuPulse compression technique is a popular technique used for improving waveform in radar systems. Series of undesirable sidelobes usually accompany the technique that may mask small targets or create false targets. This paper proposed a new approach for pulse compression using Feed-forward Wavelet Neural Network (WNN) with one input layer, one output layer and one hidden layer that consists of three neurons. Networks of 13-bit Barker code and 69-bit Barker code were used for the implementation. WNN-based back-propagation (BP) learning algorithm was used in training the networks. These networks used Morlet and sigmoid activation functions in hidden and output layer respectively. The simulation results from the proposed method shows better performance in sidelobe reduction where more than 100 dB output peak sidelobe level (PSL) is achieved, compared to autocorrelation function (ACF). Furthermore, the results show that WNN approach has significant improvement in noise reduction performance and Doppler shift performance compared to Recurrent Neural Network (RNN) and Multi-Layer Perceptron (MLP).Item Reverse Engineering Mobile Apps for Model Generation Using a Hybrid Approach(Journal of Telecommunication, Electronic and Computer Engineering, 2016-02-02) Ibrahim Anka SalihuThe popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. Model-Based testing can improve the quality of mobile application but the models are not always available or are of inadequate quality. Reverse engineering approaches are used to automatically generate model from the GUI of mobile applications for model-based testing. This paper proposes a hybrid approach for reverse engineering mobile applications which exploit the capabilities of both static and dynamic approaches while trying to maximize the quality of the generated models. The insight of this approach is to use static analysis on app’s source to identify supported events. The generated events can be used to dynamically explore an app at run-time to generate a state model of the app’s GUI. The preliminary results from our approach indicated that the technique can generate high quality models from android apps.Item Systematic Exploration of Android Apps’ Events for Automated Testing(ACM, 2016-11-16) Ibrahim Anka SalihuThe popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. GUI testing has been an effective means of validating Android apps. However, it still suffers a strong challenge about how to explore event sequence in the GUIs. This paper proposes a hybrid approach for systematic exploration of mobile apps which exploit the capabilities of both static and dynamic approaches while trying to improve app’s state exploration. Our approach is based static analysis on app’s bytecode to extract events supported by an app. The generated events are used to dynamically explore an app at run-time. The experimental results show that our approach can explore significant number of app’s state for the generation of high quality test case.Item BASIC DEPENDENCY PARSING IN NATURAL LANGUAGE INFERENCE(IEEE, 2017-02-02) Aleshinloye Abass Yusuf; Nnanna Agwu Nwojo; Moussa Mahamat BoukarParsing is the process of analyzing a sentence for it structure, content and meaning, this process uncover the structure, articulate the constituents and the relation between the constituents of the input sentence. This paper described the importance of parsing strategy in achieving entailment in natural language inference. Parsing is the basic task in processing natural language and it is also the basis for all natural language applications such as machine learning, question answering and information retrieval. We have used the parsing strategy in natural language inference to achieve entailment through an approach called normalization approach where entailment is achieved by removing or replacing some nodes as well as relations in a tree. This process requires a detailed understanding of the dependency structure, in order to generate a tree that does not contain nodes and relations that are irrelevant to the inference procedure. In order to achieve this, the dependency trees are transformed by applying some rewrite rules to the dependency treeItem Medical Tool for Assisting Patients in Kazakhstan Polyclinics(IEEE, 2017-02-02) Moussa Mahamat BoukarThe healthcare system in developing countries facing many challenges due to factors such as lack of doctors, medical equipment, overwhelmed hospitals, and increased number of refugees. The World Health Organization annually announces reports related to patients per doctor ratios, and according to reports even in many developed countries, it is low. The aim of this work was to develop a medical tool that will try to solve various issues and help assist patients as well as doctors. The tool is based on two machine learning algorithms for disease diagnosis which are rule-based method and decision tree algorithm. The tool also has several useful functionalities that help patients with their conditions. Using scikit-learn framework we were able to develop and integrate algorithms inside the tool. During the benchmarking study, the implemented machine learning algorithms achieved the following performance: an accuracy of 75% for the rule-based classifier, and 89% for the ID3 decision tree classifier.Item Data Dissemination via web Services for Distributed and Heterogeneous Data sources: An Enhancement of the Nigerian University Certificate Verification System(IEEE, 2017-02-02) Salisu Ibrahim Yusuf; Moussa Mahamat BoukarHarmonization of academic records between institutions will ease information sharing among institutions and reduce forgery of certifications and other academic qualifications. A solutions was proposed which collect relevant certificate information from Nigerian Universities’ databases via web service and make it publically available across all platforms via web service as a means for verifying certificate authenticity. One of the limitations of the proposed system is the limitation imposed on the data that can be retrieved from institutions by the defines JSON template, more relevant data might be neglected, also it was assumed that all universities use relational database, with the current trend it is possible in the nearest future a good number of institutions might move to NoSQL platform. In this study we proposed an enhancement of the initially proposed system to accommodate diversity of data and databases provided by institutions by using NoSQL platform and allowing institutions modify the template for the web service they will share their data, this improves the parsing time as data will not need to be structured as relational database. Hence an enhancement of the Nigerian Universities’ Certificate Verification was proposed.Item A Hybrid Approach for Reverse Engineering GUI Model from Android Apps for Automated Testing(Journal of Telecommunication, Electronic and Computer Engineering, 2017-02-02) Ibrahim Anka SalihuNowadays, smartphone users are increasingly relying on mobile applications to complete most of their daily tasks. As such, mobile applications are becoming more and more complex. Therefore, software testers can no longer rely on manual testing methods to test mobile applications. Automated model-based testing techniques are recently used to test mobile applications. However, the models generated by existing techniques are of insufficient quality. This paper proposed a hybrid technique for reverse engineering graphical user interface (GUI) model from mobile applications. It performs static analysis of application’s bytecode to extract GUI information followed by a dynamic crawling to systematically explore and reverse engineer a model of the application under test. A case study was performed on real-world mobile apps to evaluate the effectiveness of the technique. The results showed that the proposed technique can generate a model with high coverage of mobile apps behaviour.Item An Error Analysis Algorithm for Approximate Solution of Linear Fredholm-Stieltjes Integral Equations with Generalized Trapezium Method(IEEE, 2017-02-02) Moussa Mahamat BoukarIntegral equations and their solutions are very important for various areas like physics, engineering, biology and other. Fredholm-Stieltjes integral equations are some of the integral equations. Sometimes it is possible to find exact solutions for some of the integral equations.The main purpose of this paper is to propose an error analysis algorithm for approximate solution of linear Fredholm-Stieltjes integral equations of second kind with Generalized Trapezium Method. Firstly, the theory of error analysis is given. Then the implementation of algorithm is done with Maple software and examples are given with graphics.Item User Define Time Based Change Pattern Dynamic Password Authentication Scheme(IEEE, 2017-02-02) Salisu Ibrahim Yusuf; Moussa Mahamat BoukarIn this paper a novel time based dynamic password was presented to the overcome challenge of using a third party such as one-time password email, test and token device system for authentication in dynamic password authentication systems, user will set an initial password define how the password will be changing over a defined time, we found that the system retains the strength of the dynamic password and improves the usability of the system in terms of availability.Item Comparative Study of Mobile Applications Testing Techniques for Context Events(American Scientific Publisher, 2018-02-02) Ibrahim Anka SalihuThe increase of mobile devices with rich innovative features has become an enabler for developing mobile applications (mobile apps) that offer users an advance and extremely-localized context-aware content. Mobile apps receive and process events from both internal and external sources due to the changing context to produce the appropriate output. These events need to be tested to ensure that an application behaves correctly. The goal of this study is to present a comparative study of mobile apps testing approaches focusing on context events. We defined the comparison criteria that comprise six key points, events identification, method of analysing mobile apps, the testing technique, classification of context event, validation method and evaluation metrics to enable us answer the research questions. Several approaches from the literature were analysed to evaluate their effectiveness. Results from our study show that the popular approaches offer limited coverage of mobile app context events. This is because they consider only a few selected context events in mobile apps for test case generation. This study identifies the limitations and the possibilities for improving context events coverage for effective testing of mobile apps.Item A Static-dynamic Approach for UI Model Generation for Mobile Applications(IEEE, 2018-02-02) Ibrahim Anka SalihuNowadays, smartphone users are increasingly relying on mobile applications to complete most of their daily tasks. To ensure acceptable quality and to meet its specifications, mobile apps need to be tested thoroughly. As testing mobile apps becomes challenging and tedious, test automation can alleviate this process. Model-based testing is an approach for test automation that is popularly used to test mobile applications. In order to benefit from model-based testing, there is a need for technique and tool for automated model generation. Therefore, this paper presents a hybrid approach for automated User Interface (UI) model generation for mobile applications. It performs static analysis of application’s bytecode to extract UI information, followed by a dynamic crawling to systematically explore and reverse engineer a model of the application under test. We then evaluate our approach on several open-source mobile applications. The results showed that our approach can generate a high-quality model from mobile applications.Item Test Case Generation from Android Mobile Applications Focusing on Context Events(Association for Computing Machinery, 2018-02-02) Ibrahim Anka SalihuNowadays mobile apps are developed to address more critical areas of people’s daily computing needs, which bring concern on the applications’ quality. Today’s Mobile apps processed not only the traditional GUI events but also accept and react to constantly varying context events which may have an impact on the application’s behaviour. To build high quality and more reliable applications, there is a need for effective testing techniques to test apps before release. Most of recent testing technique focuses on GUI events only making it difficult to identify other defects in the changes that can be inclined by the context in which an application runs. This paper proposed an approach for testing mobile apps considering the two sets of events: GUI events which we identified through static analysis of bytecode and context events obtained from analysis of manifest.xml file. Results from the experimental evaluation indicated that our approach is effective in identifying and testing context events.Item Comprehensive Evaluation Of Appearance-Based Techniques For Palmprint Features Extraction Using Probabilistic Neural Network, Cosine Measures And Euclidean Distance Classifiers(UNIVERSITY OF PITESTI SCIENTIFIC BULLETIN, 2018-08-08) Akande Oluwatobi Noah; Abikoye O. C; Adeyemo I. A; Ogundokun R. O; Aro T. OMost biometric systems work by comparing features extracted from a query biometric trait with those extracted from a stored biometric trait. Therefore, to a great extent, the accuracy of any biometric system is dependent on the effectiveness of its features extraction stage. With an intention to establish a suitable appearance based features extraction technique, an independent comparative study of Independent Component Analysis (ICA), Linear Discriminant Analysis (LDA) and Principal Component Analysis (PCA) algorithms for palmprint features extraction is reported in this article. Euclidean distance, Probabilistic Neural Network (PNN) and cosine measures were used as classifiers. Results obtained revealed that cosine metrics is preferable for ICA features extraction while PNN is preferable for LDA features extraction. Both PNN and Euclidean distance yielded a better recognition rate for PCA. However, ICA yielded the best recognition rate in terms of FAR and FRR followed by LDA then PCAItem AMOGA: A Static-Dynamic Model Generation Strategy for Mobile Apps Testing(IEEE, 2019-01-31) Ibrahim Anka SalihuIn the past few years, mobile devices have been increasingly replacing traditional computers, as their capabilities, such as CPU computation, memory, RAM size, and many more, are being enhanced almost to the level of conventional computers. These capabilities are being exploited by mobile apps developers to produce apps that offer more functionalities and optimized performance. To ensure acceptable quality and to meet their specifications (e.g., design), mobile apps need to be tested thoroughly. As the testing process is often tedious, test automation can be the key to alleviating such laborious activities. In the context of the Android-based mobile apps, researchers and practitioners have proposed many approaches to automate the testing process mainly on the creation of the test suite. Although useful, most existing approaches rely on reverse engineering a model of the application under test for test case creation. Often, such approaches exhibit a lack of comprehensiveness, as the application model does not capture the dynamic behavior of the applications extensively due to the incompleteness of reverse engineering approaches. To address this issue, this paper proposes AMOGA, a strategy that uses a hybrid, static-dynamic approach for generating a user interface model from mobile apps for model-based testing. AMOGA implements a novel crawling technique that uses the event list of UI element associated with each event to dynamically exercise the events ordering at the run time to explore the applications’ behavior. An experimental evaluation was performed to assess the effectiveness of our strategy by measuring the code coverage and the fault detection capability through the use of mutation testing concept. The results of the experimental assessment showed that AMOGA represents an alternative approach for model-based testing of mobile apps by generating comprehensive models to improve the coverage of the applications. The strategy proved its effectiveness by achieving high code coverage and mutation score for different applicationsItem Time Series Analysis and prediction of bitcoin using Long Short Term Memory Neural Network(International Conference on Electronics Computer and Computation, 2019-02-02) Temiloluwa I. Adegboruwa; Steve Adeshina; Moussa Mahamat BoukarBitcoin is the first digital currency that uses decentralization to solve the issue of trust in performing the functions of a digital currency successfully. This digital currency has shown extraordinary growth and intermittent plunge in value and market capitalization over time. This makes it important to understand what determines the volatility of bitcoin and to what extent they are predictable. Long Short Term Memory Neural Networks (LSTM-NN) have recently grown popular for time series prediction systems but there has been no consensus on methods to model time series inputs for LSTMs, this paper proposes the need for this problem to be solved by conducting an experimental research on the efficacy of an LSTM-NN given the form of its time-series input features.