Browsing by Author "Ogah, Muhammad Usman"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Open Access Development of Interagency Crime Management System(Department of Computer Science, Nasarawa State University Keffi, 2020-02-05) Nweke, James; Ajayi, Binyamin Adeniyi; Ogah, Muhammad UsmanEnhancing the interagency collaborative approach to crime management in developing nations cannot be overemphasized. This study presents a computerized system that is posed to enhance interagency collaboration in combating crime in Nigeria. Interagency Crime Management System (ICMS) is a web-based application that accepts input through an Application Program Interface (API) provided to the individual applications being used by different security agencies under the Federal Government of Nigeria. The system is based on a relational database with schemas very close to those of law enforcement agencies. The system was designed to accept data in the same input format from each of these agencies. These are the criminal code, name of criminal, nationality, state of origin, the local government of origin, age, nature of the crime committed, location of the crime, a section of the penal code violated, current status as at when reporting, officer-in-charge, and reporting agency. To achieve this, the study adopted the Structured System Analysis and Design Methodology (SSADM). The process starts with designing a framework for ICMS, then furthered by developing an algorithm for ICMS, and Laravel was employed for the implementation of the algorithm developed. The database management software employed for the application, PostgreSQL, stores every detail of the crime using a unique reference number for every record stored in the database to facilitate easy retrieval. This system also provides a search facility to query the database about information relating to the various categories of crime, criminals, and crimes that are common in particular geographical location and provide analytics tools such as charts for research and analysis purposes.Item Open Access Embedding Emojis to Redefine Gaze-Point and Scan-path in a Visual Centre field(Department of Computer Science, Nasarawa State University Keffi, 2021-01-06) Isiaka, Fatima; Salihu, Abdullahi Audu; Umar, Mustapha Umar; Abdulsalam, Fatima Yunus; Ogah, Muhammad UsmanGaze point reflects the eyes’ fixation on a visual field but doesn’t express the meaning of a fixation point and scan-path on the same area of interest as much as text-based expression. Text-based expressions are the most common type of emoticons. Emojis are derived from emotion and icons. In an instance when one is feeling happy, not-happy, overjoyed, or upset emoticons can help express the most basic form of these feelings in ways that word or speech cannot. An important function of emoji as a form of the communicative symbol is to convey emotional content from a sender to a receiver in a computer-mediated form of communication. Here we tend to redefine fixations points and scan-path using emoji and physiological response to convey user emotional response to a static webpage by a synchronous assembly of emoji coordinates and gaze points based on the following concepts: (1) correlating gaze points with emotional emoji (2) redefine eye movement behaviour with emoji bubbles (3) integrate physiological correlates for synchronious mapping of emoji characters. From the analysis, result shows that stress and neutral mood are the basic form of emotion expressed by users while dealing with specific form of web content, this reflects the dynamic changes in their pupil dilation.Item Open Access A generic face detection algorithm in electronic attendance system for educational institute(Department of Computer Science, Nasarawa State University Keffi, 2022-01-06) Muhammad, Umar Abdullahi; Ogah, Muhammad Usman; Wamapana, Asua PaulThis paper aims to develop a generic face detection and recognition system that will automate the process of collecting school attendance by recognizing students' frontal faces from classroom photographs. The reliability of the data collected is the biggest problem with the traditional attendance management systems. Many automated methods, such as biometric attendance, are being used. However, technical difficulties with scanning devices always affect the efficiency of such techniques. This paper employs principal component analysis approaches for face detection and OpenCV for face recognition to improve data quality and information accessibility for legitimate parties. The Python programming language was used for the development of the proposed system, while SQL was used for the development of the database that houses the information of users in the system. The new system was tested and shown to be not only safe but also protects students' identities by offering an anonymous attendance environment.Item Open Access ICT and Teaching-Learning Curve in Public School: A Case Study Of Government Comprehensive Secondary School, Obio-Akpor, Rivers State, Nigeria.(Department of Computer Science, Nasarawa State University Keffi, 2022-01-03) Ahubele., B.O.; Alu, S.E.; Ogah, Muhammad UsmanThe 21st century digital era is faced with utilizing ICT in the classroom for aiding teaching and learning opportunities amongst teachers and learners. The roles and challenges of ICT in enhancing the teaching and learning process in a Government Comprehensive Secondary school, Obio-Akpor, Rivers State was carried out. The descriptive survey was used in this research. The simple random sampling method was utilized to collect a sample size of (150) respondents which consists of 115 and 35 females and males respectively. The descriptive statistics of mean, frequency and percentages were used to analyze the collected data. However, the study unveil the gross unavailability of facilities to fully support the implementation and integration of information and communication technology in the school. It also specified the various roles of ICT in education among which are eliminating the barriers of distance learning, making teaching and learning more interesting and impactful, etc. However, studying the issues and challenges related to ICT use in teaching and learning can assist teachers in overcoming the foreseen limitations and become successful technology users. The findings revealed a large percentage of inadequacy in the usage and availability of ICT g adgets for teaching and learning. With the changes in modern technologies, it is recommended that ICT gadgets be provided in public secondary schools in the State for effective teaching and learning process.Item Open Access Improved Artificial Neural Network Algorithm for Offline Signature Verification(Department of Computer Science, Nasarawa State Univeristy Keffi, 2022-10-10) Ojuolape, Adewumi Emmanuel; Umar, Mustapha Ahmed; Audu, Abdullahi; Isiaka, Fatima; Ogah, Muhammad UsmanIdentity theft is an invasive crime globally because most peo- ple have their information available online. Research has shown that an effective signature verification system can be used to mitigate the im- pact of identity theft on society. In this paper, we design an efficient sim- ilarity index to resolve the shortcomings of the existing measures in giv- ing high confidence in signature verification. The experiment shows the efficacy of the proposed method in verifying offline signatures using an artificial neural network approach.Item Open Access Secured Cloud Data Storage Encryption Using Post-Quantum Cryptography(Department of Computer Science, Nasarawa State University Keffi, 2022-01-06) Alu, S.E.; Yunana, Kefas; Ogah, Muhammad UsmanCloud computing is evolving daily for securing large data in diverse industries and organizations. The two major challenges about cloud storage are reliability and security. Clients cannot entrust their data to another company without any assurance that they can access their information anytime and no third party will be granted access to it. Data can also be requested from the cloud by the users. However, uploading data in the cloud faces some security issues due to cyber threats and prevalent fraudulent activities. With advancement in technology and research, different solutions have evolved to protect cloud data. Cryptographic techniques utilizing different encryption mechanisms are used to protect the data and ensure its integrity. The existing cryptographic techniques are classical and vulnerable to attacks by quantum computers. In addition, the classical computers utilizes multiple algorithms for encryption and decryption which takes time to encrypt and decrypt a file. In this paper, we presented an optimized new security mechanism using post- quantum cryptography to provide block-wise security to cloud data storage irrespective of the size of the file uploaded or downloaded.Item Open Access Towards An Enhanced Smartphone Security Using Distributed Ledger Technology (Blockchain)(Department of Computer Science, Nasarawa State University Keffi, 2022-03-03) Alu, S.E.; Ogah, Muhammad Usman; Yakubu, Awal J.Smartphones have now become an important tool in our daily lives, even to the level of addiction for some individuals. Due to the increase in the usage of cell phones, security issue has become a major challenge in mobile transactions. In this paper, smartphone security/vulnerabilities, and awareness on data security challenges were discussed. Due to big data and massive usage of online data, security implementation in cellphones cannot be under-estimated. However, diverse data protective measures such as fingerprint sensors, Face ID, iris scanner for cellphones and biometric security features, smartphones have existed but could not provide adequate mitigate against any security breach. As a result, smartphone producers encourage their users to safeguard their devices with strong passwords. However, with all of this security counter measures, loopholes still plague the mobile phones such that antivirus software are inadequate in protecting phone users against cyber-attacks. Blockchain is an alternative that evolve to boost the security of transactions using smartphones to clamp down on any possibility of external breach. This paper also expound the use of visual sim technology other than the existing physical Sim cards in providing more security enhancement in smartphones.