Faculty of Computing
Permanent URI for this communityhttps://repository.nileuniversity.edu.ng/handle/123456789/13
Browse
27 results
Search Results
Item Comprehensive Evaluation Of Appearance-Based Techniques For Palmprint Features Extraction Using Probabilistic Neural Network, Cosine Measures And Euclidean Distance Classifiers(UNIVERSITY OF PITESTI SCIENTIFIC BULLETIN, 2018-08-08) Akande Oluwatobi Noah; Abikoye O. C; Adeyemo I. A; Ogundokun R. O; Aro T. OMost biometric systems work by comparing features extracted from a query biometric trait with those extracted from a stored biometric trait. Therefore, to a great extent, the accuracy of any biometric system is dependent on the effectiveness of its features extraction stage. With an intention to establish a suitable appearance based features extraction technique, an independent comparative study of Independent Component Analysis (ICA), Linear Discriminant Analysis (LDA) and Principal Component Analysis (PCA) algorithms for palmprint features extraction is reported in this article. Euclidean distance, Probabilistic Neural Network (PNN) and cosine measures were used as classifiers. Results obtained revealed that cosine metrics is preferable for ICA features extraction while PNN is preferable for LDA features extraction. Both PNN and Euclidean distance yielded a better recognition rate for PCA. However, ICA yielded the best recognition rate in terms of FAR and FRR followed by LDA then PCAItem Design and Implementation of a Mobile Students’ Course Registration Platform(International Journal of Advanced Technology and Engineering Exploration, 2015-08-08) Adigun Abimbola Adebisi; Akande Oluwatobi Noah; Ajagbe Oluwafemi AdeolaThis paper describes a Mobile Application Based Course Registration Platform (MABCRP) designed and implemented to facilitate the process of students' course registration within a University system. This was designed to serve as an alternative to web based and online course registration system being currently used by most universities. This intends to bring course registration closer to the students who are vastly great users of mobile devices. The developed mobile application will enable students to automatically register expected courses per semester, view all registered courses and also to add or delete registered courses. Result of user evaluation of the developed MABCRP shows that it has a good usability in terms of usefulness and ease of use. The results also indicate that the developed MABCRP is capable to help students register their academic courses more easily without location being a barrier.Item Electronic Medical Information Encryption Using Modified Blowfish Algorithm(Springer Nature Switzerland, 2019-08-08) Akande Oluwatobi Noah; Abikoye Christiana Oluwakemi; Adebiyi Marion Olubunm; Kayode Anthonia Aderonke; Adegun Adekanmi Adeyinka; Ogundokun Roseline OluwaseunSecurity and privacy of patients’ information remains a major issue of concern among health practitioners. Therefore, measures must be put in place to ensure that unauthorized individual do not have access to this information. However, the adoption of digital alternative of retrieving and documenting medical information has further opened it up to more attacks. This article presents a modified blowfish algorithm for securing textual and graphical medical information. The F-function used in generating round sub-keys was strengthened so as to produce a strong key that could resist differential attacks. Number of Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI) of 98.85% and 33.65% revealed that the modified algorithm is sensitive to changes in its key and also resistive to differential attacks. Furthermore, the modified algorithm demonstrated a better encryption and decryption time than the existing blowfish algorithm.Item Developing a Digital Interactive Course Material on Automated Management System (AMS) Moodle for Partial Differential Equations (PDEs) Course(IEEE, 2019-02-02) Moussa Mahamat BoukarMany physical, engineering problems from some areas like fluid mechanics, heat transfer, rigid body dynamics and elasticity are modelled by Partial Differential Equations (PDEs). That’s why, PDEs course is the main course in the higher educations. The aim of this work is to develop an interactive digital course material for some kind of PDEs. A digital question bank is developed using Wildcard technology on the automated management system Moodle.Item An Error Analysis Algorithm for Approximate Solution of Linear Fredholm-Stieltjes Integral Equations with Generalized Trapezium Method(IEEE, 2017-02-02) Moussa Mahamat BoukarIntegral equations and their solutions are very important for various areas like physics, engineering, biology and other. Fredholm-Stieltjes integral equations are some of the integral equations. Sometimes it is possible to find exact solutions for some of the integral equations.The main purpose of this paper is to propose an error analysis algorithm for approximate solution of linear Fredholm-Stieltjes integral equations of second kind with Generalized Trapezium Method. Firstly, the theory of error analysis is given. Then the implementation of algorithm is done with Maple software and examples are given with graphics.Item User Define Time Based Change Pattern Dynamic Password Authentication Scheme(IEEE, 2017-02-02) Salisu Ibrahim Yusuf; Moussa Mahamat BoukarIn this paper a novel time based dynamic password was presented to the overcome challenge of using a third party such as one-time password email, test and token device system for authentication in dynamic password authentication systems, user will set an initial password define how the password will be changing over a defined time, we found that the system retains the strength of the dynamic password and improves the usability of the system in terms of availability.Item DEVELOPMENT OF ROAD ANOMALY DATA TRANSMISSION USING ANT COLONY OPTIMIZATION ALGORITHM IN A VEHICLE-TO-VEHICLE COMMUNICATION(IEEE, 2019-02-02) Muktar Othman; Steve Adeshina; Moussa Mahamat BoukarThis study aim is to design a road anomaly transmission Algorithms using Ant Colony Optimization(ACO) based Technique in a Vehicle-to-Vehicle (V2V) and Vehicle to Infrastructure (V2I) Communication. The developed VACO also uses the features of VANET to find out the optimal path by considering a minimum number of nodes and cost parameters, which provides information related to accidents, speed of neighbouring vehicle and weather to help users in making informed decisions. Vehicle routing protocol based on ACO (VACO) also ensures to mitigate issues by combining the reactive and proactive approach and considers the parameters affecting the Quality of Service (QoS) such as latency, bandwidth, and delivery ratio in evaluating the Algorithms.Item Four-Factors Authentication Algorithm For Preventing Fake Attendance(International Conference on Electronics Computer and Computation, 2019-02-02) Asim Balarabe Yazid; Moussa Mahamat Boukar; Salisu Ibrahim YusufTaking attendance is a day-to-day chore for every organization, human resources, and class teachers, traditionally people take attendance manually either by calling out names or allowing the user to sign the attendance sheets or clock in and out. The problem, however, people most likely sign the attendance on behalf of their colleagues that are absent. This makes the traditional method very vulnerable and may affect the integrity of the system. Researchers come up with different ideas and methods of minimizing fake attendance to improve efficiency in terms of integrity, time and cost. After reviewing the existing system’s strength and vulnerabilities, we are proposing a multi-factor authentication algorithm which makes use of QR code, GPS, and Facial recognition. The user will make use of their personal mobile phone. The research of this proposed is still ongoing, we are hoping the proposed technique can be applied to various attendance systems such as schools, universities, and organizations.Item SIDELOBE REDUCTION USING WAVELET NEURAL NETWORK FOR BINARY CODED PULSE COMPRESSION(ARPN Journal of Engineering and Applied Sciences, 2016-01-02) Ibrahim Anka SalihuPulse compression technique is a popular technique used for improving waveform in radar systems. Series of undesirable sidelobes usually accompany the technique that may mask small targets or create false targets. This paper proposed a new approach for pulse compression using Feed-forward Wavelet Neural Network (WNN) with one input layer, one output layer and one hidden layer that consists of three neurons. Networks of 13-bit Barker code and 69-bit Barker code were used for the implementation. WNN-based back-propagation (BP) learning algorithm was used in training the networks. These networks used Morlet and sigmoid activation functions in hidden and output layer respectively. The simulation results from the proposed method shows better performance in sidelobe reduction where more than 100 dB output peak sidelobe level (PSL) is achieved, compared to autocorrelation function (ACF). Furthermore, the results show that WNN approach has significant improvement in noise reduction performance and Doppler shift performance compared to Recurrent Neural Network (RNN) and Multi-Layer Perceptron (MLP).Item Comparative Study of Mobile Applications Testing Techniques for Context Events(American Scientific Publisher, 2018-02-02) Ibrahim Anka SalihuThe increase of mobile devices with rich innovative features has become an enabler for developing mobile applications (mobile apps) that offer users an advance and extremely-localized context-aware content. Mobile apps receive and process events from both internal and external sources due to the changing context to produce the appropriate output. These events need to be tested to ensure that an application behaves correctly. The goal of this study is to present a comparative study of mobile apps testing approaches focusing on context events. We defined the comparison criteria that comprise six key points, events identification, method of analysing mobile apps, the testing technique, classification of context event, validation method and evaluation metrics to enable us answer the research questions. Several approaches from the literature were analysed to evaluate their effectiveness. Results from our study show that the popular approaches offer limited coverage of mobile app context events. This is because they consider only a few selected context events in mobile apps for test case generation. This study identifies the limitations and the possibilities for improving context events coverage for effective testing of mobile apps.
- «
- 1 (current)
- 2
- 3
- »