Browsing by Author "Jegede, Abayomi Joshau"
Now showing 1 - 16 of 16
Results Per Page
Sort Options
Item Open Access AN ASSESSMENT OF CULTURAL INFLUENCE ON PERSONALITY TOWARDS TECHNOLOGY ADOPTION(Department of Computer Science, Nasarawa State University Keffi, 2019-01-06) Aimufua, Gilbert Imuetinyan Osaze; Jegede, Abayomi JoshauIndividual's adoption of innovative technology in culture sensitive society had been in the discourse in recent past. Culture had been found to affect attitude towards technology adoption. Social psychologists theorized that culture significantly affect individuals personality which in turn affect altitude towards behavioral tendencies. However, this assertion had not been fully proven scientifically. Hence this study examined the impact of culture on personality towards innovative technology adoption. Quantitative research approach using questionnaire survey method was adapted. Data collected from 1539 banks' customers in two states within two geographical zones in Nigeria who had prior experiences with Internet technology were empirically tested using structural equation modeling (SEM). The findings revealed that culture, perceived ease of use. personality significantly influence the adoption of technology. Furthermore, culture was found to affect attitude towards adoption of technology as personality mediate it. While perceived usefulness was found to be insignificant in the adoption of e-banking.Item Open Access Assessment of Security Awareness Level of Mobile Device Users in Tertiary Institutions in Plateau State of Nigeria(Department of Computer Science, Nasarawa State University Keffi, 2021-11-11) Jegede, Abayomi Joshau; Odii, Grace; Magaji, Musa; Aimufua, Gilbert Imuetinyan Osaze—Mobile devices are widely used in everyday life, however, the number of cyber-attacks on the security and privacy of mobile device users are increased. Although students at tertiary institutions are savvy Internet users, there appears to be a gap between their behaviors and the security of their mobile devices. The security awareness of mobile device users in tertiary institutions in Nigeria's Plateau State is assessed in this article. The study looks into mobile security vulnerabilities, as well as whether or not users are aware of them and what tactics (if any) they take to deal with them. A questionnaire is used as an instrument to acquire information about consumers' security awareness. The purpose is to see if academic literacy and the ability to utilize mobile devices are related to security awareness and the implementation of relevant security measures. It also tries to figure out whether users who value mobile device security and have legitimate security concerns engage in behaviors that either enhance or compromise security. The findings demonstrate that the majority of students (58.4%) have a strong understanding of their devices (including their functions) and that a substantial percentage of students (85.6%) regard mobile device security to be vital. Furthermore, (63.4 %) of respondents are concerned about the security of their mobile devices. In conclusion, the outcome of this study shows that smartphone users have little knowledge of security and privacy on smartphones but then the level of security awareness using smartphones is increasing as respondents answered the questionnaire.Item Open Access Computer Modelling and Simulation for Inventory Control(Department of Computer Science, Nasarawa State University Keffi, 2012-01-06) Adegoke, G.K.; Aimufua, Gilbert Imuetinyan Osaze; Jegede, Abayomi JoshauThis stud) concerns the role of computer simulation as a de\ ice lor conducting scientific experiments on inventor) control. The stores function utilizes a bulk of physical assets and engages a bulk of financial resources in a manufacturing outfit therefore there is a need for an efficient inventory control. The reason being that inventory control reduces cost of production and thereby facilitates the effective and efficient accomplishment of production objectives of an organization. Some mathematical and statistical models were used to compute the Economic Order Quantity (EOQ). Test data were gotten from a manufacturing company and same were simulated. The results generated were used to predict a real life situation and have been presented and discussed. The language of implementation for the three models is Turbo Pascal due to its capability, generality and flexibility as a scientific programming language.Item Open Access COMPUTER-ASSISTED INSTRUCTION: A REVOLUTIONARY APPROACH TO TEACHING AND LEARNING(Department of Computer Science, Nasarawa State University Keffi, 4-12-12) Aimufua, Gilbert Imuetinyan Osaze; Adegoke, G.K.; Jegede, Abayomi JoshauTeaching and learning is a continuous process in life by which positive or negative experiences are gained. Many methods of learning and teaching have been propounded and developed. Some of these include the traditional classroom system, the Montessori system. However, very few have been put into practice for fear of change. A number of these methods are used in schools to teach and learn with feedbacks while some remains as mere academic papers. The use of Information and Communication Technology (1CT) as a pathway to effective learning and teaching within a time band has been considered. The Kiosk revolutionary approach has also been proposed. The method when in use shall not only make students to acquire knowledge but also to have a good understanding of the subject.Item Open Access Culture, Adoption, Technology, Personality, AttitudeA ROADMAP FOR SECURING AN INFORMATION SYSTEM ENTERPRISE(Department of Computer Science, Nasarawa State University Keffi, 2007-01-03) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The use of computers and computer-based systems has become increasingly popular in business, the military and even at home. Large amounts of vital and sensitive data are increasingly becoming entrusted to and stored in computers. The power and convenience of information technology is, however, counterbalanced by the wide range of threats to the security of electronic information. The goal of this paper is to explore the need for information security as well as to outline some of the basic strategies necessary for protecting an information system enterprise.Item Open Access Electronic Voting: A Panacea for Electoral Irregularities in Developing Countries(Department of Computer Science, Nasarawa State University Keffi, 2009-02-06) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan Osaze; Akosu, N.IThis study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. The study discribe, the potential benefits and risks of electronic voting technology as well as desirable characteristics of voting systems. This study concludes with the design and implementation of an electronic voting system by using cutting edge programming development toolsItem Open Access A Hybrid Cyprosystem for Multibiometric Authentication and Template Protection(Department of Computer Science, Nasarawa State University Keffi, 2019-12-09) Jegede, Abayomi Joshau; Akosu, N.I; Aimufua, Gilbert Imuetinyan OsazeThis paper proposes and implements a multilayer authentication and template protection scheme known as the hybrid scheme. The hybrid scheme is based on the integration of modified shielding function with matrix transformation. It is a 2-in-1 approach which provides good recognition accuracy, security of stored templates and user privacy. The recognition accuracy of the proposed approach is evaluated using a multi-biometric dataset obtained from the fusion of face and iris images. The multibiometric dataset is constructed using feature level fusion to combine face images in CASIA Near Infrared Database and iris images in CASIA Iris Database version 1. Security analysis is used to determine the robustness of the hybrid scheme against security threats such as guessing and key exhaustion (or brute force) attacks. This is carried out using complexity analysis to determine the level of difficulty an attacker faces in an attempt to launch compromise the authentication scheme. The privacy capability of the hybrid scheme is analyzed using the requirements proposed in the ISO/IEC JTC 1/SC 27 standard. Experimental results as well as security and privacy analyses show that the approach provides good recognition accuracy as well as high-level template security and user privacy.Item Open Access Implementing an Application Gateway for Client/Server Systems(Department of Computer Science, Nasarawa State University Keffi, 2007-02-02) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeThis stud)’ was earned in the computer science laboratory of the Department of Mathematical Sciences, Nasarawa state University, Keffi, Nigeria. The research is a continuation an earlier work tilled ‘A specification of an application gateway for client/server systems’ published in Asian Journal of Information Technolog)', vol. 6 No. 8. The model of an application gateway proposed in the earlier work is implemented here as a totally decentralized distributed application consisting of three subsystems: Generate packet system, AppGateway system and Learning system. The system flowchart is used to illustrate how each of the subsystems works as well as their interactions in the overall system. Java is used as the language of implementation because it is very suitable for network communication and it lias extensive routines for dealing with communication protocols. The existence of these routines provides java with the capability and flexibility to communicate with TCP/IP protocols such as HTTP, FTP, etc.Item Open Access Information Security Policy: Relevance, Creation and Enforcement(Department of Computer Science, Nasarawa State University Keffi, 2007-01-06) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The power and convenience of infonnation technology is, however, counterbalanced by the wide range of threats to the security of electronic infonnation. Tins study explores the concept and relevance of security as it relates to electronic information systems. It also sets out the background to preparing an infonnation security policy as well as the strategies required for implementing and enforcing such policy.Item Open Access Modeling of Climate Effect on Arable Crops Production of Oryza Sativa and Zea Mays in Nigeria Using Fuzzy Logic(Department of Computer Science, Nasarawa State University Keffi, 2022-01-06) Aimufua, Gilbert Imuetinyan Osaze; Akimoh, J.O.; Jegede, Abayomi JoshauIn Nigeria, farmers account for more than a third of the labor force. Despite the government’s and other relevant stakeholders’ strategies and measures to address climate change’s impact on agricultural activities in Nigeria, the country has continued to be threatened by climate change, which has had negative consequences for food production, particularly rice and maize, which are the country’s main staple foods. High precipitation owing to moisture levels negates agricultural yields, according to the impacts of temperature and moisture levels on agriculture productivity. Weather disasters, deforestation, disease transmission, and species extinction are all climate variables that limit agricultural production rates. The goal of this research is to use machine learning algorithms to determine the best weather conditions for arable crops. To model and predict agricultural yields, fuzzy logic was used. Secondary data, pre-processing and processing, modeling, and the user interface are the five sections that make up the system design. The harvesting outcomes for each of the months specified From January through December, the majority of the data obtained revealed Harvest values of low (54.8%), fair (23.6%), and good (21.5%) quality. Agricultural activities should be carried out between MAY and SEP, whereas crops that require a lot of rain should be sown between JUL and AUG when rainfall is at its highest. The study concluded that agricultural operations should be carried out between MAY and SEP in order to achieve good harvest quality, based on the data collected, extracted, and assessed. The findings of the study will guide policymakers and farmers toward a bumper harvest, increased income, and a rise in the country’s GDP. Finally, crops that require a lot of rain, like rice, should be planted between July and August, according to the research.Item Open Access AN OVERVIEW OF INFORMATION SECURITY TECHNIQUES(Department of Computer Science, Nasarawa State University Keffi, 2009-03-07) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeThis study explores the concept of information security and some common threats to the security of electronic information. The research also examines the various techniques used for securing enterprise environments as well as the strengths and weaknesses of the techniques. The study concludes by recommending that a balance be struck between security and availability so that what is gained is security is not lost in performance.Item Open Access A ROADMAP FOR SECURING AN INFORMATION SYSTEM ENTERPRISE(Department of Computer Science, Nasarawa State University Keffi, 2007-05-04) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The use of computers and computer-based systems has become increasingly popular in business, the military and even at home. Large amounts of vital and sensitive data are increasingly becoming entrusted to and stored in computers. The power and convenience of information technology is, however, counterbalanced by the wide range of threats to the security of electronic information. The goal of this paper is to explore the need for information security as well as to outline some of the basic strategies necessary for protecting an information system enterprise.Item Open Access A Specification of an Application Gateway for Client/Server Systems(Department of Computer Science, Nasarawa State University Keffi, 2007-05-05) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeThe goal of this study is to develop a model of an application gateway that can be used to manage perimeter security in a client/server environment. The gateway acts as a traffic controller between the internal (client/server) LAN and external networks and systems. It ensures that only authorized packets are allowed to go into the LAN from the external systems. It also, guarantees that unauthorized packets are not forwarded to the external environment from the internal local area network. The research conducts an exploratory study of computer networks and client/server systems as well as some of the dangers posed to computer networks. It also examines some of the attempts at curbing network related security threats as well as the strengths and weaknesses of each approach. The study concludes by formulating a model of an application gateway for managing security in client/server environments. The system design tools used in this study is basically the data flow diagram Possible areas of future study include the extension of the model to support more protocols, the exploration of the need to combine the benefits of the traditional packet filtering processes with Lhose of an application gateway as well as the possibility of integrating the model with other network security strategies.Item Open Access A SURVEY OF FORTRAN, PASCAL AND C PROGRAMMING LANGUAGES(Department of Computer Science, Nasarawa State University Keffi, 2012-05-06) Adegoke, G.K.; Aimufua, Gilbert Imuetinyan Osaze; Jegede, Abayomi JoshauThis paper traces the evolutionary history and presents an impartial comparative study between three programming languages namely; FORTRAN, Pascal and C. The criteria of comparison is focused on expressivity, well-definedness, data types and structures, modularity, input/output facilities, portability, efficiency, pedagogy and generality. It also generally considers the characteristics of the three programming languages. Thereafter, it lists important criteria that influence die selection of a programming language. An evaluation of the three programming languages is then made utilizing some basic properties of programming languages in order to identify their selection by. entering an integer from 1 to 4, as a weight or relative importance factor for each of the criteria above. Integer 1 means that the criterion is poor while integer 4 means that the criterion is excellent. The study concluded that no one programming language is perfect for all people at all times for all jobs but the type of problem to be solved usually determines the selection of programming language to utilize.Item Open Access A SURVEY OF PORTRAN, PASCAL AND C PROGRAMMING LANGUAGES(Department of Computer Science, Nasarawa State University Keffi, 2022-01-06) Adegoke, G.K.; Aimufua, Gilbert Imuetinyan Osaze; Jegede, Abayomi JoshauThis paper traces the evolutionary history and presents an. impartial comparative study between three programming languages namely; FORTRAN, Pascal and c. The criteria of comparison is focused on expressivity, well-definedness, data types and structures, modularity, input/output facilities, portability,, efficiency, pedagogy and generality. It also generally considers the characteristics o f the three programming languages. Thereafter,, it lists important criteria that influence tlae selection of a programming language. An evaluation of the three programming languages is then made utilizing some basic properties of programming languages in order to identify their selection by, entering an integer from I t o 4, as a weight ,br relative importance factor for each of the criteria above, integer 1 means that the criterion is poor while integer 4 means Gnat the criterion is excellent. The study concluded that no one programming language is perfect for all people at all times for all jobs but the type of problem to be solved usually determines the selection of programming language to utilize.Item Open Access A Texture-based Method for Detecting Impostor Attacks using Printed Photographs(Department of Computer Science, Nasarawa State University Keffi, 2020-09-09) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan Osaze; Thomas, G.A.Conventional biometric systems do not possess the capability to detect whether a biometric image is acquired from a live subject or an artificial representation of his identity. This allows impostors to use different methods to fake the identities of legitimate users and compromise the security of biometric authentication systems. This paper proposed a texture-based anti-spoofing technique known as concatenated rotation invariant uniform local binary pattern, which uses textural properties to discriminate between images (face and iris) captured directly from live subjects and those obtained from secondary sources such as photographs or video images. The proposed approach extracts uniform local binary pattern features from an image at different scales and resolutions. The extracted features are further concatenated to obtain a composite feature representation of the image. The accuracy of proposed method is evaluated using face images from Nanjing University of Aeronautics and Astronautics (NUAA) normalized dataset and iris images from Audio, Temporal signals, Vision and Speech (ATVS) fake iris database. The programming environment used to implement the proposed technique is MATLAB 2014. The MATLAB environment provides the tools/utilities for creating the programs which implements the various tasks in the spoof detection system. Experimental results suggest that the proposed approach is capable of distinguishing genuine face and iris images from fake representations of the same image. The results also show the technique has better recognition accuracy and higher textural discriminative power for iris than it does for face. This is largely due to the fact that iris exhibits low intra-class variation and high inter-class distance; while face has high intra-class variation and low inter-class distance. The suitability of the proposed technique is not limited to only face and iris biometric data. The technique can be applied to any biometric modality whose textural features can be extracted. Examples include retina, palm, knuckle, fingerprint, lip and ear. We only used face and iris samples to verify the proposed method.