Faculty of Computing
Permanent URI for this communityhttps://repository.nileuniversity.edu.ng/handle/123456789/13
Browse
Item Content Management System (CMS) Evaluation and Analysis(Journal of Technical Science and Technologies, 2012-02-02) Moussa Mahamat BoukarContent management systems (CMS) provide an optimal solution by organizing information and, mostly, creating and managing an enterprise’s knowledge. Nevertheless there is a big confusion about the functionalities that characterize CMS and about the differences with less performing products such as web content management systems, document and records management systems and enterprise content management systems. This paper aims to show the mismatches between companies’ needs and those information management products, which are often called CMS even if they are not. For this reason I first made a theoretical comparison between the functionalities of CMS and those of the systems that are often confused with. Then I showed the results of an empirical research on 22 products offered by international vendors. By using an original scheme, enterprises’ needs in terms of information collection, management and publication of knowledge management are compared with the functionalities of the aforementioned systems. The result consists of performing definitions for CMS and the other systems for managing information. Content Management products are analyzed, compared and evaluated by using a special table created to point out the actual functionalities of the products offered on the market, despite vendors’ declarations. The paper conclusions show how, on the demand side, companies’ needs are growing in a confused framework; at the same time the supply side keeps on feeding this confusion, reducing company satisfaction in regard to knowledge and information managementItem Developing Interactive Course Material for Volterra Integral Equations of Second Kind(IEEE, 2014-02-02) Moussa Mahamat BoukarThe main purpose of this paper is to propose a developed interactive course material which is contained course materials, solution methods with examples and interactive environment for Volterra Integral Equations (VIEs) of Second Kind. It is possible to learn what VIE of Second Kind is, to make practice with interactive part of the material and, also how a VIE can be converted to an equivalent Initial Value Problem (IVP).Item WEB Services(IEEE, 2014-02-02) Moussa Mahamat BoukarWEB Services convert the applications into a WEB application, which can publish its function or message to the rest of world. The basic WEB Services platform is XML + HTTP. The types of WEB Services have been explained. WEB Services platform elements are illustrated. The ScalabelVector Graphics (SVG) is explained in detail. The advantages of SVG are illustrated using practical examples, such as SVG-Ellipse, SVG-Line, SVG-Rect.Item An Interactive Application (Maplet) for II-Order Ordinary Differential Equations(IEEE, 2014-02-02) Moussa Mahamat BoukarThe main purpose of this paper is to propose a Maplet interactive application that is used to find general solutions, to find Initial Value Problems (IVPs) and to depict 2-D and 3-D graphics as well of the II-Order Ordinary Homogeneousl Non-homogeneous Differential Equations (ODEs). Furthermore, to make 2-D, 3-D graphing of solutions and how they can be used as effective educational tools for both students and instructors.Item SIDELOBE REDUCTION USING WAVELET NEURAL NETWORK FOR BINARY CODED PULSE COMPRESSION(ARPN Journal of Engineering and Applied Sciences, 2016-01-02) Ibrahim Anka SalihuPulse compression technique is a popular technique used for improving waveform in radar systems. Series of undesirable sidelobes usually accompany the technique that may mask small targets or create false targets. This paper proposed a new approach for pulse compression using Feed-forward Wavelet Neural Network (WNN) with one input layer, one output layer and one hidden layer that consists of three neurons. Networks of 13-bit Barker code and 69-bit Barker code were used for the implementation. WNN-based back-propagation (BP) learning algorithm was used in training the networks. These networks used Morlet and sigmoid activation functions in hidden and output layer respectively. The simulation results from the proposed method shows better performance in sidelobe reduction where more than 100 dB output peak sidelobe level (PSL) is achieved, compared to autocorrelation function (ACF). Furthermore, the results show that WNN approach has significant improvement in noise reduction performance and Doppler shift performance compared to Recurrent Neural Network (RNN) and Multi-Layer Perceptron (MLP).Item Reverse Engineering Mobile Apps for Model Generation Using a Hybrid Approach(Journal of Telecommunication, Electronic and Computer Engineering, 2016-02-02) Ibrahim Anka SalihuThe popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. Model-Based testing can improve the quality of mobile application but the models are not always available or are of inadequate quality. Reverse engineering approaches are used to automatically generate model from the GUI of mobile applications for model-based testing. This paper proposes a hybrid approach for reverse engineering mobile applications which exploit the capabilities of both static and dynamic approaches while trying to maximize the quality of the generated models. The insight of this approach is to use static analysis on app’s source to identify supported events. The generated events can be used to dynamically explore an app at run-time to generate a state model of the app’s GUI. The preliminary results from our approach indicated that the technique can generate high quality models from android apps.Item Systematic Exploration of Android Apps’ Events for Automated Testing(ACM, 2016-11-16) Ibrahim Anka SalihuThe popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. GUI testing has been an effective means of validating Android apps. However, it still suffers a strong challenge about how to explore event sequence in the GUIs. This paper proposes a hybrid approach for systematic exploration of mobile apps which exploit the capabilities of both static and dynamic approaches while trying to improve app’s state exploration. Our approach is based static analysis on app’s bytecode to extract events supported by an app. The generated events are used to dynamically explore an app at run-time. The experimental results show that our approach can explore significant number of app’s state for the generation of high quality test case.Item BASIC DEPENDENCY PARSING IN NATURAL LANGUAGE INFERENCE(IEEE, 2017-02-02) Aleshinloye Abass Yusuf; Nnanna Agwu Nwojo; Moussa Mahamat BoukarParsing is the process of analyzing a sentence for it structure, content and meaning, this process uncover the structure, articulate the constituents and the relation between the constituents of the input sentence. This paper described the importance of parsing strategy in achieving entailment in natural language inference. Parsing is the basic task in processing natural language and it is also the basis for all natural language applications such as machine learning, question answering and information retrieval. We have used the parsing strategy in natural language inference to achieve entailment through an approach called normalization approach where entailment is achieved by removing or replacing some nodes as well as relations in a tree. This process requires a detailed understanding of the dependency structure, in order to generate a tree that does not contain nodes and relations that are irrelevant to the inference procedure. In order to achieve this, the dependency trees are transformed by applying some rewrite rules to the dependency treeItem Medical Tool for Assisting Patients in Kazakhstan Polyclinics(IEEE, 2017-02-02) Moussa Mahamat BoukarThe healthcare system in developing countries facing many challenges due to factors such as lack of doctors, medical equipment, overwhelmed hospitals, and increased number of refugees. The World Health Organization annually announces reports related to patients per doctor ratios, and according to reports even in many developed countries, it is low. The aim of this work was to develop a medical tool that will try to solve various issues and help assist patients as well as doctors. The tool is based on two machine learning algorithms for disease diagnosis which are rule-based method and decision tree algorithm. The tool also has several useful functionalities that help patients with their conditions. Using scikit-learn framework we were able to develop and integrate algorithms inside the tool. During the benchmarking study, the implemented machine learning algorithms achieved the following performance: an accuracy of 75% for the rule-based classifier, and 89% for the ID3 decision tree classifier.Item Data Dissemination via web Services for Distributed and Heterogeneous Data sources: An Enhancement of the Nigerian University Certificate Verification System(IEEE, 2017-02-02) Salisu Ibrahim Yusuf; Moussa Mahamat BoukarHarmonization of academic records between institutions will ease information sharing among institutions and reduce forgery of certifications and other academic qualifications. A solutions was proposed which collect relevant certificate information from Nigerian Universities’ databases via web service and make it publically available across all platforms via web service as a means for verifying certificate authenticity. One of the limitations of the proposed system is the limitation imposed on the data that can be retrieved from institutions by the defines JSON template, more relevant data might be neglected, also it was assumed that all universities use relational database, with the current trend it is possible in the nearest future a good number of institutions might move to NoSQL platform. In this study we proposed an enhancement of the initially proposed system to accommodate diversity of data and databases provided by institutions by using NoSQL platform and allowing institutions modify the template for the web service they will share their data, this improves the parsing time as data will not need to be structured as relational database. Hence an enhancement of the Nigerian Universities’ Certificate Verification was proposed.Item A Hybrid Approach for Reverse Engineering GUI Model from Android Apps for Automated Testing(Journal of Telecommunication, Electronic and Computer Engineering, 2017-02-02) Ibrahim Anka SalihuNowadays, smartphone users are increasingly relying on mobile applications to complete most of their daily tasks. As such, mobile applications are becoming more and more complex. Therefore, software testers can no longer rely on manual testing methods to test mobile applications. Automated model-based testing techniques are recently used to test mobile applications. However, the models generated by existing techniques are of insufficient quality. This paper proposed a hybrid technique for reverse engineering graphical user interface (GUI) model from mobile applications. It performs static analysis of application’s bytecode to extract GUI information followed by a dynamic crawling to systematically explore and reverse engineer a model of the application under test. A case study was performed on real-world mobile apps to evaluate the effectiveness of the technique. The results showed that the proposed technique can generate a model with high coverage of mobile apps behaviour.Item An Error Analysis Algorithm for Approximate Solution of Linear Fredholm-Stieltjes Integral Equations with Generalized Trapezium Method(IEEE, 2017-02-02) Moussa Mahamat BoukarIntegral equations and their solutions are very important for various areas like physics, engineering, biology and other. Fredholm-Stieltjes integral equations are some of the integral equations. Sometimes it is possible to find exact solutions for some of the integral equations.The main purpose of this paper is to propose an error analysis algorithm for approximate solution of linear Fredholm-Stieltjes integral equations of second kind with Generalized Trapezium Method. Firstly, the theory of error analysis is given. Then the implementation of algorithm is done with Maple software and examples are given with graphics.Item User Define Time Based Change Pattern Dynamic Password Authentication Scheme(IEEE, 2017-02-02) Salisu Ibrahim Yusuf; Moussa Mahamat BoukarIn this paper a novel time based dynamic password was presented to the overcome challenge of using a third party such as one-time password email, test and token device system for authentication in dynamic password authentication systems, user will set an initial password define how the password will be changing over a defined time, we found that the system retains the strength of the dynamic password and improves the usability of the system in terms of availability.Item Comparative Study of Mobile Applications Testing Techniques for Context Events(American Scientific Publisher, 2018-02-02) Ibrahim Anka SalihuThe increase of mobile devices with rich innovative features has become an enabler for developing mobile applications (mobile apps) that offer users an advance and extremely-localized context-aware content. Mobile apps receive and process events from both internal and external sources due to the changing context to produce the appropriate output. These events need to be tested to ensure that an application behaves correctly. The goal of this study is to present a comparative study of mobile apps testing approaches focusing on context events. We defined the comparison criteria that comprise six key points, events identification, method of analysing mobile apps, the testing technique, classification of context event, validation method and evaluation metrics to enable us answer the research questions. Several approaches from the literature were analysed to evaluate their effectiveness. Results from our study show that the popular approaches offer limited coverage of mobile app context events. This is because they consider only a few selected context events in mobile apps for test case generation. This study identifies the limitations and the possibilities for improving context events coverage for effective testing of mobile apps.Item A Static-dynamic Approach for UI Model Generation for Mobile Applications(IEEE, 2018-02-02) Ibrahim Anka SalihuNowadays, smartphone users are increasingly relying on mobile applications to complete most of their daily tasks. To ensure acceptable quality and to meet its specifications, mobile apps need to be tested thoroughly. As testing mobile apps becomes challenging and tedious, test automation can alleviate this process. Model-based testing is an approach for test automation that is popularly used to test mobile applications. In order to benefit from model-based testing, there is a need for technique and tool for automated model generation. Therefore, this paper presents a hybrid approach for automated User Interface (UI) model generation for mobile applications. It performs static analysis of application’s bytecode to extract UI information, followed by a dynamic crawling to systematically explore and reverse engineer a model of the application under test. We then evaluate our approach on several open-source mobile applications. The results showed that our approach can generate a high-quality model from mobile applications.Item Test Case Generation from Android Mobile Applications Focusing on Context Events(Association for Computing Machinery, 2018-02-02) Ibrahim Anka SalihuNowadays mobile apps are developed to address more critical areas of people’s daily computing needs, which bring concern on the applications’ quality. Today’s Mobile apps processed not only the traditional GUI events but also accept and react to constantly varying context events which may have an impact on the application’s behaviour. To build high quality and more reliable applications, there is a need for effective testing techniques to test apps before release. Most of recent testing technique focuses on GUI events only making it difficult to identify other defects in the changes that can be inclined by the context in which an application runs. This paper proposed an approach for testing mobile apps considering the two sets of events: GUI events which we identified through static analysis of bytecode and context events obtained from analysis of manifest.xml file. Results from the experimental evaluation indicated that our approach is effective in identifying and testing context events.Item AMOGA: A Static-Dynamic Model Generation Strategy for Mobile Apps Testing(IEEE, 2019-01-31) Ibrahim Anka SalihuIn the past few years, mobile devices have been increasingly replacing traditional computers, as their capabilities, such as CPU computation, memory, RAM size, and many more, are being enhanced almost to the level of conventional computers. These capabilities are being exploited by mobile apps developers to produce apps that offer more functionalities and optimized performance. To ensure acceptable quality and to meet their specifications (e.g., design), mobile apps need to be tested thoroughly. As the testing process is often tedious, test automation can be the key to alleviating such laborious activities. In the context of the Android-based mobile apps, researchers and practitioners have proposed many approaches to automate the testing process mainly on the creation of the test suite. Although useful, most existing approaches rely on reverse engineering a model of the application under test for test case creation. Often, such approaches exhibit a lack of comprehensiveness, as the application model does not capture the dynamic behavior of the applications extensively due to the incompleteness of reverse engineering approaches. To address this issue, this paper proposes AMOGA, a strategy that uses a hybrid, static-dynamic approach for generating a user interface model from mobile apps for model-based testing. AMOGA implements a novel crawling technique that uses the event list of UI element associated with each event to dynamically exercise the events ordering at the run time to explore the applications’ behavior. An experimental evaluation was performed to assess the effectiveness of our strategy by measuring the code coverage and the fault detection capability through the use of mutation testing concept. The results of the experimental assessment showed that AMOGA represents an alternative approach for model-based testing of mobile apps by generating comprehensive models to improve the coverage of the applications. The strategy proved its effectiveness by achieving high code coverage and mutation score for different applicationsItem Time Series Analysis and prediction of bitcoin using Long Short Term Memory Neural Network(International Conference on Electronics Computer and Computation, 2019-02-02) Temiloluwa I. Adegboruwa; Steve Adeshina; Moussa Mahamat BoukarBitcoin is the first digital currency that uses decentralization to solve the issue of trust in performing the functions of a digital currency successfully. This digital currency has shown extraordinary growth and intermittent plunge in value and market capitalization over time. This makes it important to understand what determines the volatility of bitcoin and to what extent they are predictable. Long Short Term Memory Neural Networks (LSTM-NN) have recently grown popular for time series prediction systems but there has been no consensus on methods to model time series inputs for LSTMs, this paper proposes the need for this problem to be solved by conducting an experimental research on the efficacy of an LSTM-NN given the form of its time-series input features.Item Analysis of Bad Roads Using Smart phone(IEEE, 2019-02-02) Moussa Mahamat Boukar; Steve AdeshinaDeveloping nations are faced with a lot of bad roads with potholes of different debt ranges, the maintenance and rehabilitation process by government agencies is an ongoing effort that requires periodic bad road inventory to guarantee safety. Bad roads are either identified by government agency’s survey teams or individual who volunteer to report these conditions to the authorities. Our research provided a simple but effective solution to aid in automatically reporting bad roads using smart-phones through measuring the pavement profile based on the vibration of a moving vehicle. In this article, we will explain how we used some a smart-phone in reading the vibration pattern, GPS location, speed and direction of a vehicle that drives through a pothole, these parameters are periodically streamed to a cloud application. We used standard deviation to measure the level of dispersion around a segmented set of streamed vehicle vibration to identify potholes of different sizes, we also used Artificial Intelligence - supervised learning algorithm (classification) to reduce the false positive error rates due to human behaviors. The final results show a distinct vibration levels between small pot-holes, speed bumps and big pot-holes, these values are displayed on map application to visualize the geographical locations of these pot-holes (Google maps)Item A framework for Poultry weather control with IoT in sub-Saharan Africa(15th International Conference on Electronics Computer and Computation (ICECCO 2019), 2019-02-02) Nasiru Afeez; Steve Adeshina; Abdullahi Inci; Moussa Mahamat BoukarPoultry farming in the sub-Saharan region of Africa is fraught with a lot of challenges among which are high temperature and humidity. In this paper, the authors proposed an Internet of Things (IoT) framework that will help in regulating the various climatic conditions that will help at providing a high yield of poultry products. This framework is aimed at providing proactive and preventive ways to avert or reduce the high mortality rate in a flock of birds as a result of heat stress. IoT which is a connected environment of monitoring sensors with high precision and an accurate decision taken would be presented in managing environmental conditions of poultry house that will gather information, analyze it and effect an action based on the predetermined weather conditions that are suitable for bird’s existence
- «
- 1 (current)
- 2
- 3
- »