Articles
Permanent URI for this collection
Browse
Browsing Articles by Issue Date
Now showing 1 - 20 of 56
Results Per Page
Sort Options
Item Open Access COMPUTER-ASSISTED INSTRUCTION: A REVOLUTIONARY APPROACH TO TEACHING AND LEARNING(Department of Computer Science, Nasarawa State University Keffi, 4-12-12) Aimufua, Gilbert Imuetinyan Osaze; Adegoke, G.K.; Jegede, Abayomi JoshauTeaching and learning is a continuous process in life by which positive or negative experiences are gained. Many methods of learning and teaching have been propounded and developed. Some of these include the traditional classroom system, the Montessori system. However, very few have been put into practice for fear of change. A number of these methods are used in schools to teach and learn with feedbacks while some remains as mere academic papers. The use of Information and Communication Technology (1CT) as a pathway to effective learning and teaching within a time band has been considered. The Kiosk revolutionary approach has also been proposed. The method when in use shall not only make students to acquire knowledge but also to have a good understanding of the subject.Item Open Access Culture, Adoption, Technology, Personality, AttitudeA ROADMAP FOR SECURING AN INFORMATION SYSTEM ENTERPRISE(Department of Computer Science, Nasarawa State University Keffi, 2007-01-03) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The use of computers and computer-based systems has become increasingly popular in business, the military and even at home. Large amounts of vital and sensitive data are increasingly becoming entrusted to and stored in computers. The power and convenience of information technology is, however, counterbalanced by the wide range of threats to the security of electronic information. The goal of this paper is to explore the need for information security as well as to outline some of the basic strategies necessary for protecting an information system enterprise.Item Open Access Information Security Policy: Relevance, Creation and Enforcement(Department of Computer Science, Nasarawa State University Keffi, 2007-01-06) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The power and convenience of infonnation technology is, however, counterbalanced by the wide range of threats to the security of electronic infonnation. Tins study explores the concept and relevance of security as it relates to electronic information systems. It also sets out the background to preparing an infonnation security policy as well as the strategies required for implementing and enforcing such policy.Item Open Access Implementation of an Order Seven Self-Starting Multistep Methods Using Scilab and Fortran Codes(Department of Computer Science, Nasarawa State University Keffi, 2007-03-03) Fatokun, J.O.; Aimufua, Gilbert Imuetinyan OsazeSelf-starting methods such as the Runge-Kutta methods are often used for the solution of engineering problems on a computer because they need no special starting method and are therefore easy to program. Also the Runge-Kutta methods give an automatic procedure for adjusting the step-size, which again makes for easy use by a non-specialist. However, there are three major disadvantages of the Runge-Kutta methods. An important disadvantages of this method is that, the form of the error term is extremely complicated and can not easily be used for the estimation of the truncation error or determine a suitable step-size. Another undesirable feature of this method is the large number of derivative evaluation required per-step, this makes it time-consuming. The third problem associated with the method is that, it has proved inadequate for stiff systems. Fatokun, in earlier reports proposed a continuous approach for deriving self-starting multistep methods for solving initial value problems of ordinary differential equations. In this study we present an implementation procedure of an order seven integration method for initial value problems. Using the SCILAB to resolve the generated matrices and consequently a FORTRAN code was used to run the block method. The result shows that the method is convenient and easy to use. It needs no other single step method for the implementation of the seven-step method. The graphs of the region of Absolute Stability are also presented for each grid point.Item Open Access A Guided Assessment of Online Processes and Implementation in Sub-Sharan Africa(Department of Computer Science, Nasarawa State University Keffi, 2007-03-06) Aimufua, Gilbert Imuetinyan Osaze; Fatokun, J.O.This study presents a mix of known models that had aided the successful implementation of International acclaimed Software. There after recommends a way forward for the successful implementation of software in the sub-Sahara Africa. The advent of Information Technology and Communications (ICT) has brought about diverse changes within the operations of most organizations. It is expedient for man to abhor changes; however, it is only change that remains constant in this world. We investigated a number of challenges and constraints that had bedeviled the successful Software Implementations in the developing world, Nigeria as a case study. The software packages that had been successfully implemented in most developed world had in most cases faced series of hiccups. The cry for development and technology transfer had been the dream of people of the third world, but they are not ready to pay the price to get true technological transfer. It is obvious from this study that the most affected organizations are the Public Enterprises and the Civil Service. It has been observed that the character/attitude, culture and ethics of the people had contributed to the enormous bottlenecks in software implementation in Public/Civil establishment. This study gives a guided assessment of the implementation processes and proffers some solutions to the teething problems in the Nigerian context.Item Open Access A ROADMAP FOR SECURING AN INFORMATION SYSTEM ENTERPRISE(Department of Computer Science, Nasarawa State University Keffi, 2007-05-04) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The use of computers and computer-based systems has become increasingly popular in business, the military and even at home. Large amounts of vital and sensitive data are increasingly becoming entrusted to and stored in computers. The power and convenience of information technology is, however, counterbalanced by the wide range of threats to the security of electronic information. The goal of this paper is to explore the need for information security as well as to outline some of the basic strategies necessary for protecting an information system enterprise.Item Open Access A Specification of an Application Gateway for Client/Server Systems(Department of Computer Science, Nasarawa State University Keffi, 2007-05-05) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeThe goal of this study is to develop a model of an application gateway that can be used to manage perimeter security in a client/server environment. The gateway acts as a traffic controller between the internal (client/server) LAN and external networks and systems. It ensures that only authorized packets are allowed to go into the LAN from the external systems. It also, guarantees that unauthorized packets are not forwarded to the external environment from the internal local area network. The research conducts an exploratory study of computer networks and client/server systems as well as some of the dangers posed to computer networks. It also examines some of the attempts at curbing network related security threats as well as the strengths and weaknesses of each approach. The study concludes by formulating a model of an application gateway for managing security in client/server environments. The system design tools used in this study is basically the data flow diagram Possible areas of future study include the extension of the model to support more protocols, the exploration of the need to combine the benefits of the traditional packet filtering processes with Lhose of an application gateway as well as the possibility of integrating the model with other network security strategies.Item Open Access Electronic Voting: A Panacea for Electoral Irregularities in Developing Countries(Department of Computer Science, Nasarawa State University Keffi, 2009-02-06) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan Osaze; Akosu, N.IThis study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. The study discribe, the potential benefits and risks of electronic voting technology as well as desirable characteristics of voting systems. This study concludes with the design and implementation of an electronic voting system by using cutting edge programming development toolsItem Open Access AN OVERVIEW OF INFORMATION SECURITY TECHNIQUES(Department of Computer Science, Nasarawa State University Keffi, 2009-03-07) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan OsazeThis study explores the concept of information security and some common threats to the security of electronic information. The research also examines the various techniques used for securing enterprise environments as well as the strengths and weaknesses of the techniques. The study concludes by recommending that a balance be struck between security and availability so that what is gained is security is not lost in performance.Item Open Access AN EFFICIENT DIRECT COLLOCATION METHOD FOR THE INTEGRATION OF GENERAL SECOND ORDER INITIAL VALUE PROBLEMS(Department of Computer Science, Nasarawa State University Keffi, 2010-04-04) Fatokun, J.O.; Aimufua, Gilbert Imuetinyan OsazeIn this paper we present a direct method for the integration of Second order initial value problem without first reducing them to a system of first orders. New two-step finite difference collocation methods of orders two and four were derived. These first derivative approximations were combined with the Numerov method for a direct application to the general second order initial value problem for ordinary differential equations. Two classical problems in literature were considered and the results compared. The proposed method is more efficient approach for direct integration process and an option for a continuous output.Item Open Access Computer Modelling and Simulation for Inventory Control(Department of Computer Science, Nasarawa State University Keffi, 2012-01-06) Adegoke, G.K.; Aimufua, Gilbert Imuetinyan Osaze; Jegede, Abayomi JoshauThis stud) concerns the role of computer simulation as a de\ ice lor conducting scientific experiments on inventor) control. The stores function utilizes a bulk of physical assets and engages a bulk of financial resources in a manufacturing outfit therefore there is a need for an efficient inventory control. The reason being that inventory control reduces cost of production and thereby facilitates the effective and efficient accomplishment of production objectives of an organization. Some mathematical and statistical models were used to compute the Economic Order Quantity (EOQ). Test data were gotten from a manufacturing company and same were simulated. The results generated were used to predict a real life situation and have been presented and discussed. The language of implementation for the three models is Turbo Pascal due to its capability, generality and flexibility as a scientific programming language.Item Open Access Economised Power Series Solutions of Differential-Algebraic Equations with Hessenberg Index-2 by Legendre Approximation.(Department of Computer Science, Nasarawa State University Keffi, 2012-02-02) Fatokun, J.O.; Aimufua, Gilbert Imuetinyan Osaze; Gimba, Audi B.The numerical solution of differential- algebraic equations with Hessenberg Index-2 using the Legendre polynomial approximation is presented. We use are used to approximate the power series solutions of the resulting system of equations evolving from the DAEs. Some numerical examples were tested and absolute errors of the computation obtained to establish the order of accuracy. The results show at least order six accuracy for a system of DAEs. It is however more desirable for systems of index-1 DAEs than a singly-formulated DAE in terms of stability properties.Item Open Access A SURVEY OF FORTRAN, PASCAL AND C PROGRAMMING LANGUAGES(Department of Computer Science, Nasarawa State University Keffi, 2012-05-06) Adegoke, G.K.; Aimufua, Gilbert Imuetinyan Osaze; Jegede, Abayomi JoshauThis paper traces the evolutionary history and presents an impartial comparative study between three programming languages namely; FORTRAN, Pascal and C. The criteria of comparison is focused on expressivity, well-definedness, data types and structures, modularity, input/output facilities, portability, efficiency, pedagogy and generality. It also generally considers the characteristics of the three programming languages. Thereafter, it lists important criteria that influence die selection of a programming language. An evaluation of the three programming languages is then made utilizing some basic properties of programming languages in order to identify their selection by. entering an integer from 1 to 4, as a weight or relative importance factor for each of the criteria above. Integer 1 means that the criterion is poor while integer 4 means that the criterion is excellent. The study concluded that no one programming language is perfect for all people at all times for all jobs but the type of problem to be solved usually determines the selection of programming language to utilize.Item Open Access LEVEL OF ACCESS AND USE OF ICTS FOR AGRICULTURAL COMMUNICATION BY NGO WORKERS IN NASARAWA STATE, NIGERIA.(Department of Computer Science,Nasarawa State University, Keffi., 2014-01-01) Emmanuel, Salau S.; Agwu, A. E.; Luka, E. G.; Bello, B.The study ascertained the level of ICT usage for agricultural communication by NGOs in Nasarawa state, Nigeria using a well structured questionnaire; data for the study were generated from one hundred and twenty five NGO staff in Nasarawa state. The data obtained were analyzed using percentage, mean score and multiple regression. The findings show that some of the agricultural/rural development activities of the NGOs included microfinance/agricultural credit scheme (96%), women/youth empowerment programmes (62.4%) and agricultural extension services (49.6%). On the ownership of ICT facilities by the NGO staff majority (98.40%) of the respondents had mobile phones, followed by radio (93.60%), television (84%), video player (75.20%), audio player (68%) and personal computers (47.20%). Majority (M-1.82) of the respondents used radio for communicating agricultural information to farmers, followed by mobile phone (M=1.79), television (M=1.79), computer (M=1.64) and Internet (M=1.32).The major ICT channels for communicating agricultural messages by the respondents were telephone calls (M=1.76), text messages (M=1.75) and emails (M—1.17). The result of the regression analysis of the effects of respondents’ socioeconomic characteristics on their level of use of ICTs shows that gender, working experience, number of ICT facilities owned by a respondent, income level, length of computer training and membership of social organizations all had positive relationship with the level of ICT use. However, only one variable (Number of ICT owned) had a significant effect (p<0.05) on the level of ICT usage. The study therefore recommended that NGOs in Nasarawa state should focus more attention on agricultural activities such as farm inputs distribution, environmental management/climate change mitigation and conflict resolution/management. These critical needs of rural farmers were not given prominence in the activities of the respondents. The NGOs should equally provide on- the- job training on ICT applications for their staff to improve their capacity in the use of ICTs for agricultural communication, especially areas where such skills are lacking.Item Open Access Modeling and Prediction of Surface Water Contamination using On-line Sensor Data(Department of Computer Science, Nasarawa State University Keffi, 2014-01-01) Anyachebelu, Tochukwu Kene; Conrad, Marc; Ajmal, TahminaWater contamination is a great disadvantage to humans and aquatic life. Maintaining the aesthetics and quality of water bodies is a priority for environmental stake holders. The water quality sensor data can be analyzed over a period of time to give an indication of pollution incidents and could be a useful forecasting tool. Here we show our initial finding from statistical analysis on such sensor data from one of the lakes of the river Lea, south of Luton. Our initial work shows patterns which will form the basis for our forecasting model.Item Open Access Career Awareness of Students Offering Computer Science in Nasarawa State University, Keffi.(Department of Computer Science,Nasarawa State University Keffi., 2015-03-10) Adegoke, G. K.; Azige, G.D.Most young school leavers enter into some careers by chance but not by choice. This phenomenon is sequel to inadequate career awareness. This, in fact, usually deprives them maximum utilization of their potentialities. This study was therefore carried out on the Computer Science students to evaluate the level of their career awareness and its influence on their eventual choice of Computer Science as a career. The result of the study revealed that the respondents' career awareness level is very low. The study concluded suggestions on how to improve career awareness level among young school leavers such as employing and posting of qualified career counselors to the secondary schools, training adequate career counsellors in the tertiary institutions, redesigning of the syllabi of the teacher education at the tertiary level to include courses on career counseling.Item Open Access A SURVEY OF INTRUSION DETECTION SYSTEMS(Department of computer science, nassarawa state university, keffi, 2015-04-01) Agushaka, J.O.; Eke, C.I.; Dauda, A.There is currently a need for an up-to-date, thorough survey of the field of intrusion detection. This paper presents such a sun’ey of the important research on intrusion detection systems to date. It should be noted that the main focus of this survey is intrusion detection systems, in other words major research efforts that have resulted in prototypes that can be studied both quantitatively and qualitatively. We touched a number of open questions related to intrusion detection. However, there are a number of unresolved issues regarding the scope of analysis that an IDS performs and the interoperability of intrusion detection systemsItem Open Access EXTRACTION, CHARACTERIZATION AND MICROBIAL PROPERTIES OF DYE OBTAINED FROM RED ONION, (Allium cepa L.) SKIN(Department Of Computer Science, Nasarawa State University Keffi, 2016-03-03) Musa, M . B .; Musa, J. D.; Adeoye, J. O.; Ibrahim, M. B.Dye was successfully extracted from red onion (Allium cepa) skin using soxhlet apparatus. The UV-spectral showed that the dye absorbed at 371 nm in dimethylformamide (DMF). The FT-IR indicated the OH-stretching at about 3458 cm-1 and the aromatic C = C vibration at almost 1640cm-1. The GC-MS of the dye gives a complete elucidation of the structure with the parent analyte (M+) occurring at 271; the fragmentation values indicated no significant variation with the calculated values. The dye was tested for microbial activities and found not to be a good environment for bacteria and fungi to inhibit.Item Open Access The Role of Culture and Trust in Electronic Banking Adoption: A review(Department of Computer Science, Nasarawa State University Keffi, 2016-08-08) Aimufua, Gilbert Imuetinyan Osaze; Dzidonu, Clement K.The reviewed paper offer insights into three critical factors namely: trust, privacy and security that could influence customer’s behavior towards acceptance of e-banking in developing countries within the framework of specific cultural settings. Banks have invested heavily in hardware, software and communications infrastructures with the intent that customers would easily accept, adapt and adopt their electronic banking services. Further, banks increasingly engineer various strategies to win the customer’s acceptance and adoption of the e-banking services. In spite of the measure of benefits that e-banking provides to customers and banks, acceptance and adoption in developed countries have been used to their advantage but the same cannot be said of developing countries who are lagging. The banks’ managers expect that the customers would easily adopt and adapt to the e-banking scheme which is fraught with distrust, insecurity and privacy invasion. However, these approaches have not yielded the expected results as long as the adoption of e-banking is still lagging amongst the banks’ customers most especially in the developing nations. The literature on e-banking and the extent to which the issue of trust, privacy and security could influence consumers’ behavior have not been extensively reviewed. This paper examines a suitable framework for carrying out this review and uses it to document the state of art on the subject matter. Numerous works have researched into various determinants that would enable customers to accept and adopt new technology. With reference to these studies, the review offer insights into the relevant variables which may affect individual’s trust in electronic banking in developing countries within defined cultural settings. The paper provides a robust framework for reviewing various studies in the area of e-banking with the context of how key factors influence the customers’ acceptance of this technological offerings, This framework is demonstrated to document the state of the art on the subject matter.Item Open Access Towards a General Framework for Analyzing Technology Acceptance – Adoption Factors(Department of Computer Science, Nasarawa State University Keffi, 2016-08-09) Aimufua, Gilbert Imuetinyan Osaze; Dzidonu, Clement K.The paper proposed to advance the understanding of technology adoption and to identify the factors that influence/inhibit adoption of technology among individuals. A number of technology acceptance, adoption and diffusion models have emerged with most of them focusing on the intent to accept/reject new technology. The intention to accept has not shown that the technology would be adopted. A significant number of studies have shown that there are intentions for the products and services to be accepted. However, such findings turn out to be insignificant due to lack of adoption. Intention may yield to adoption in some cases. Surprisingly, acceptance has been found not to imply adoption of technology, from the individual’s perspective. This study is to advance the understanding of technology adoption and identify the factors that inhibit/influence its adoption among individuals. This is basically the state of the art review paper that reviewed a number of relevant literatures on technology acceptance/adoption. The framework adopted for the review focuses on key literature pertaining to individual acceptance, adoption and diffusion of technology. Additionally, various types of models and theories including theory of reasoned action and technology acceptance model, used for individual’s acceptance or adoption of technology were reviewed for the identification of adoption factors. On the basis of the identified factors, the paper presents a new technology adoption framework as a platform for researchers to investigate the adoption of innovative technologies within the framework of individual’s context. This model has laid open other areas of research in identifying various factors for individual adoptions rather than intent to accept technological innovations.
- «
- 1 (current)
- 2
- 3
- »