Faculty of Computing
Permanent URI for this communityhttps://repository.nileuniversity.edu.ng/handle/123456789/13
Browse
24 results
Search Results
Item Developing a Digital Interactive Course Material on Automated Management System (AMS) Moodle for Partial Differential Equations (PDEs) Course(IEEE, 2019-02-02) Moussa Mahamat BoukarMany physical, engineering problems from some areas like fluid mechanics, heat transfer, rigid body dynamics and elasticity are modelled by Partial Differential Equations (PDEs). That’s why, PDEs course is the main course in the higher educations. The aim of this work is to develop an interactive digital course material for some kind of PDEs. A digital question bank is developed using Wildcard technology on the automated management system Moodle.Item An Error Analysis Algorithm for Approximate Solution of Linear Fredholm-Stieltjes Integral Equations with Generalized Trapezium Method(IEEE, 2017-02-02) Moussa Mahamat BoukarIntegral equations and their solutions are very important for various areas like physics, engineering, biology and other. Fredholm-Stieltjes integral equations are some of the integral equations. Sometimes it is possible to find exact solutions for some of the integral equations.The main purpose of this paper is to propose an error analysis algorithm for approximate solution of linear Fredholm-Stieltjes integral equations of second kind with Generalized Trapezium Method. Firstly, the theory of error analysis is given. Then the implementation of algorithm is done with Maple software and examples are given with graphics.Item User Define Time Based Change Pattern Dynamic Password Authentication Scheme(IEEE, 2017-02-02) Salisu Ibrahim Yusuf; Moussa Mahamat BoukarIn this paper a novel time based dynamic password was presented to the overcome challenge of using a third party such as one-time password email, test and token device system for authentication in dynamic password authentication systems, user will set an initial password define how the password will be changing over a defined time, we found that the system retains the strength of the dynamic password and improves the usability of the system in terms of availability.Item DEVELOPMENT OF ROAD ANOMALY DATA TRANSMISSION USING ANT COLONY OPTIMIZATION ALGORITHM IN A VEHICLE-TO-VEHICLE COMMUNICATION(IEEE, 2019-02-02) Muktar Othman; Steve Adeshina; Moussa Mahamat BoukarThis study aim is to design a road anomaly transmission Algorithms using Ant Colony Optimization(ACO) based Technique in a Vehicle-to-Vehicle (V2V) and Vehicle to Infrastructure (V2I) Communication. The developed VACO also uses the features of VANET to find out the optimal path by considering a minimum number of nodes and cost parameters, which provides information related to accidents, speed of neighbouring vehicle and weather to help users in making informed decisions. Vehicle routing protocol based on ACO (VACO) also ensures to mitigate issues by combining the reactive and proactive approach and considers the parameters affecting the Quality of Service (QoS) such as latency, bandwidth, and delivery ratio in evaluating the Algorithms.Item Four-Factors Authentication Algorithm For Preventing Fake Attendance(International Conference on Electronics Computer and Computation, 2019-02-02) Asim Balarabe Yazid; Moussa Mahamat Boukar; Salisu Ibrahim YusufTaking attendance is a day-to-day chore for every organization, human resources, and class teachers, traditionally people take attendance manually either by calling out names or allowing the user to sign the attendance sheets or clock in and out. The problem, however, people most likely sign the attendance on behalf of their colleagues that are absent. This makes the traditional method very vulnerable and may affect the integrity of the system. Researchers come up with different ideas and methods of minimizing fake attendance to improve efficiency in terms of integrity, time and cost. After reviewing the existing system’s strength and vulnerabilities, we are proposing a multi-factor authentication algorithm which makes use of QR code, GPS, and Facial recognition. The user will make use of their personal mobile phone. The research of this proposed is still ongoing, we are hoping the proposed technique can be applied to various attendance systems such as schools, universities, and organizations.Item SIDELOBE REDUCTION USING WAVELET NEURAL NETWORK FOR BINARY CODED PULSE COMPRESSION(ARPN Journal of Engineering and Applied Sciences, 2016-01-02) Ibrahim Anka SalihuPulse compression technique is a popular technique used for improving waveform in radar systems. Series of undesirable sidelobes usually accompany the technique that may mask small targets or create false targets. This paper proposed a new approach for pulse compression using Feed-forward Wavelet Neural Network (WNN) with one input layer, one output layer and one hidden layer that consists of three neurons. Networks of 13-bit Barker code and 69-bit Barker code were used for the implementation. WNN-based back-propagation (BP) learning algorithm was used in training the networks. These networks used Morlet and sigmoid activation functions in hidden and output layer respectively. The simulation results from the proposed method shows better performance in sidelobe reduction where more than 100 dB output peak sidelobe level (PSL) is achieved, compared to autocorrelation function (ACF). Furthermore, the results show that WNN approach has significant improvement in noise reduction performance and Doppler shift performance compared to Recurrent Neural Network (RNN) and Multi-Layer Perceptron (MLP).Item Comparative Study of Mobile Applications Testing Techniques for Context Events(American Scientific Publisher, 2018-02-02) Ibrahim Anka SalihuThe increase of mobile devices with rich innovative features has become an enabler for developing mobile applications (mobile apps) that offer users an advance and extremely-localized context-aware content. Mobile apps receive and process events from both internal and external sources due to the changing context to produce the appropriate output. These events need to be tested to ensure that an application behaves correctly. The goal of this study is to present a comparative study of mobile apps testing approaches focusing on context events. We defined the comparison criteria that comprise six key points, events identification, method of analysing mobile apps, the testing technique, classification of context event, validation method and evaluation metrics to enable us answer the research questions. Several approaches from the literature were analysed to evaluate their effectiveness. Results from our study show that the popular approaches offer limited coverage of mobile app context events. This is because they consider only a few selected context events in mobile apps for test case generation. This study identifies the limitations and the possibilities for improving context events coverage for effective testing of mobile apps.Item A User Readiness Model of Social Media for Learning among Polytechnic Students in Nigeria(Path of Science, 2019-06-30) Ibrahim Anka SalihuThe adoption of Internet resources for learning continues to grow in the world today. Despite the abundant benefit of utilizing social media due to the growth of web 2.0, an internet resource for communication and interaction, its use has not been fully embraced as a teaching tool in Nigeria. Social media is becoming a prominent communication tool and found to be facilitating teaching and learning activities among students. However, the user readiness of social media in learning by the students has been challenging. Despite the wide acceptance of social media (such as Facebook, Twitter, and WhatsApp, e.t.c.) amongst Nigerian polytechnic students, they do not utilize it for academic pursuit. This study examined the Use of Social Media among students in Nigerian Polytechnics. The main objective of this study is to find out the user readiness’ factors that influence the use of social media by the students in Nigerian Polytechnic. The evaluation results show that social media is an indispensable Internet platform among Nigerian Polytechnic students.Item AMOGA: A Static-Dynamic Model Generation Strategy for Mobile Apps Testing(IEEE, 2019-01-31) Ibrahim Anka SalihuIn the past few years, mobile devices have been increasingly replacing traditional computers, as their capabilities, such as CPU computation, memory, RAM size, and many more, are being enhanced almost to the level of conventional computers. These capabilities are being exploited by mobile apps developers to produce apps that offer more functionalities and optimized performance. To ensure acceptable quality and to meet their specifications (e.g., design), mobile apps need to be tested thoroughly. As the testing process is often tedious, test automation can be the key to alleviating such laborious activities. In the context of the Android-based mobile apps, researchers and practitioners have proposed many approaches to automate the testing process mainly on the creation of the test suite. Although useful, most existing approaches rely on reverse engineering a model of the application under test for test case creation. Often, such approaches exhibit a lack of comprehensiveness, as the application model does not capture the dynamic behavior of the applications extensively due to the incompleteness of reverse engineering approaches. To address this issue, this paper proposes AMOGA, a strategy that uses a hybrid, static-dynamic approach for generating a user interface model from mobile apps for model-based testing. AMOGA implements a novel crawling technique that uses the event list of UI element associated with each event to dynamically exercise the events ordering at the run time to explore the applications’ behavior. An experimental evaluation was performed to assess the effectiveness of our strategy by measuring the code coverage and the fault detection capability through the use of mutation testing concept. The results of the experimental assessment showed that AMOGA represents an alternative approach for model-based testing of mobile apps by generating comprehensive models to improve the coverage of the applications. The strategy proved its effectiveness by achieving high code coverage and mutation score for different applicationsItem A Static-dynamic Approach for UI Model Generation for Mobile Applications(IEEE, 2018-02-02) Ibrahim Anka SalihuNowadays, smartphone users are increasingly relying on mobile applications to complete most of their daily tasks. To ensure acceptable quality and to meet its specifications, mobile apps need to be tested thoroughly. As testing mobile apps becomes challenging and tedious, test automation can alleviate this process. Model-based testing is an approach for test automation that is popularly used to test mobile applications. In order to benefit from model-based testing, there is a need for technique and tool for automated model generation. Therefore, this paper presents a hybrid approach for automated User Interface (UI) model generation for mobile applications. It performs static analysis of application’s bytecode to extract UI information, followed by a dynamic crawling to systematically explore and reverse engineer a model of the application under test. We then evaluate our approach on several open-source mobile applications. The results showed that our approach can generate a high-quality model from mobile applications.
- «
- 1 (current)
- 2
- 3
- »