Articles

Browse

Recent Submissions

Now showing 1 - 20 of 56
  • ItemOpen Access
    Secure Annihilation of Out-of-Band Authorization for Online Transactions
    (Department of Computer Science, Nasarawa State University Keffi, 2018-02-02) Hussain, Sabahat; Islam Khan, Burhan UI; Anwar, Farhat; Olanrewaju, Rashidah F.
    Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time- Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic truncation to produce human-readable OTP. An inimitable authentication scheme has been presented in which a unique initial seed is used for generating a series of OTPs on the user’s handheld gadget (i.e. a mobile phone). Findings: The proposed scheme demonstrated better results than the previous schemes of authorization after a security analysis was conducted on it. This is attributed to the eradication of cellular network within the authorization process. A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. The application of hash functions to that seed eliminates the necessity to send one time passwords to the users via Short Message Service and decreases the limitations posed by out-of-band systems, thus making it suitable to be employed in online banking and other financial organizations
  • ItemOpen Access
    Mitigating Storage Security Threats in Mobile Phones
    (Department of Computer Science, Nasarawa State University Keffi, 2018-04-04) Hussain, Sabahat; Olanrewaju, Rashidah F.; Ismail, Ahmad Fadzil Bin
    Objectives: This paper discusses the proposed system which provides the user the ability to run the application on Android phones for encrypting all types of files before they are stored. Methods/Statistical Analysis: In the proposed system, Advanced Encryption Standard (AES) is employed for encryption as well as decryption of the files stored by users in mobile phones. All types of files including docx, text, pdf, image, ppt, audio and video files can be encrypted and later regenerated as well. Findings: The use of AES in encrypting and decrypting data in this system provides good security as well as higher speed. An added advantage is that it is implementable on several platforms particularly in small gadgets like smartphones. As compared to the traditional computers, smartphones can be carried more easily and provide similar functionalities as that of a computer like data storage and processing, communication and other services including video call, wireless network, web browser, GPS, audio or video player. Application/Improvements: Data is transmitted, shared and stored for various purposes including production, banking, development, and research. Therefore, security is a must for information which can be provided by encryption using AES as proposed in this system.
  • ItemOpen Access
    Bandwidth Allocation Policy using the Game Theory Model in Heterogeneous Wireless Networks
    (Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.
    In Heterogeneous Wireless Network (WHN), a Mobile Device (MD) can be connected with multiple access technologies available in a particular geographical area. Selection of appropriate access technology is a challenge for the MD where game theory policy can be applied. Shapley Value is one of the game-theoretic models that can be applied to allocate appropriate bandwidth for i number of users for k number of services from N access technologies. It proposes the fairest allocation of the collectively gained profits among the collaborative players in the game. The primary focus is to find the relative contribution of every player in a cooperative game. This paper has drawn a numerical analysis of Shapley Value for three wireless access technologies, namely WiFi, Cellular and WiMAX. It has been shown how much bandwidth can be allocated from an access technology for a required bandwidth for a specific service. It can be noted from the results that 225Kbps, 141.67Kbps and 233.33Kbps can be allocated from WiFi, Cellular and WiMAX respectively to transmit the 600Kbps data in an HWN network.
  • ItemOpen Access
    Analysis of Packet Reordering Delay for Bandwidth Aggregation in Heterogeneous Wireless Networks
    (Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.
    Bandwidth aggregation in heterogeneous wireless networks (HWN) can be one of the effective solutions in providing quality data transmission for real-time applications. However, transmitting the data through multiple networks create packet reordering issues that result in transmission delay and degrades the overall quality of services. This paper addresses packet reordering issues both for single and multiple paths with a reordering delay in the transmission system. An algorithm has proposed to mitigate the associated delay that has been simulated in network simulator 3 (NS3). The simulation results have benchmarked with the well known Earliest Delivery Path First (EDPF) method and shown better performance over the EDPF results. Moreover, the simulation has been done to analyze the packet scheduling including to measuring packet reordering delay, and reordering entropy. CBR and VBR applications have been transmitted for 1800ms from sender to receiver in a heterogeneous wireless environment created in NS3. The results show the proposed method achieved to reduce the reordering delay and reordering entropy both for CBR and VBR applications.
  • ItemOpen Access
    Improved Artificial Neural Network Algorithm for Offline Signature Verification
    (Department of Computer Science, Nasarawa State Univeristy Keffi, 2022-10-10) Ojuolape, Adewumi Emmanuel; Umar, Mustapha Ahmed; Audu, Abdullahi; Isiaka, Fatima; Ogah, Muhammad Usman
    Identity theft is an invasive crime globally because most peo- ple have their information available online. Research has shown that an effective signature verification system can be used to mitigate the im- pact of identity theft on society. In this paper, we design an efficient sim- ilarity index to resolve the shortcomings of the existing measures in giv- ing high confidence in signature verification. The experiment shows the efficacy of the proposed method in verifying offline signatures using an artificial neural network approach.
  • ItemOpen Access
    Embedding Emojis to Redefine Gaze-Point and Scan-path in a Visual Centre field
    (Department of Computer Science, Nasarawa State University Keffi, 2021-01-06) Isiaka, Fatima; Salihu, Abdullahi Audu; Umar, Mustapha Umar; Abdulsalam, Fatima Yunus; Ogah, Muhammad Usman
    Gaze point reflects the eyes’ fixation on a visual field but doesn’t express the meaning of a fixation point and scan-path on the same area of interest as much as text-based expression. Text-based expressions are the most common type of emoticons. Emojis are derived from emotion and icons. In an instance when one is feeling happy, not-happy, overjoyed, or upset emoticons can help express the most basic form of these feelings in ways that word or speech cannot. An important function of emoji as a form of the communicative symbol is to convey emotional content from a sender to a receiver in a computer-mediated form of communication. Here we tend to redefine fixations points and scan-path using emoji and physiological response to convey user emotional response to a static webpage by a synchronous assembly of emoji coordinates and gaze points based on the following concepts: (1) correlating gaze points with emotional emoji (2) redefine eye movement behaviour with emoji bubbles (3) integrate physiological correlates for synchronious mapping of emoji characters. From the analysis, result shows that stress and neutral mood are the basic form of emotion expressed by users while dealing with specific form of web content, this reflects the dynamic changes in their pupil dilation.
  • ItemOpen Access
    Secured Cloud Data Storage Encryption Using Post-Quantum Cryptography
    (Department of Computer Science, Nasarawa State University Keffi, 2022-01-06) Alu, S.E.; Yunana, Kefas; Ogah, Muhammad Usman
    Cloud computing is evolving daily for securing large data in diverse industries and organizations. The two major challenges about cloud storage are reliability and security. Clients cannot entrust their data to another company without any assurance that they can access their information anytime and no third party will be granted access to it. Data can also be requested from the cloud by the users. However, uploading data in the cloud faces some security issues due to cyber threats and prevalent fraudulent activities. With advancement in technology and research, different solutions have evolved to protect cloud data. Cryptographic techniques utilizing different encryption mechanisms are used to protect the data and ensure its integrity. The existing cryptographic techniques are classical and vulnerable to attacks by quantum computers. In addition, the classical computers utilizes multiple algorithms for encryption and decryption which takes time to encrypt and decrypt a file. In this paper, we presented an optimized new security mechanism using post- quantum cryptography to provide block-wise security to cloud data storage irrespective of the size of the file uploaded or downloaded.
  • ItemOpen Access
    Towards An Enhanced Smartphone Security Using Distributed Ledger Technology (Blockchain)
    (Department of Computer Science, Nasarawa State University Keffi, 2022-03-03) Alu, S.E.; Ogah, Muhammad Usman; Yakubu, Awal J.
    Smartphones have now become an important tool in our daily lives, even to the level of addiction for some individuals. Due to the increase in the usage of cell phones, security issue has become a major challenge in mobile transactions. In this paper, smartphone security/vulnerabilities, and awareness on data security challenges were discussed. Due to big data and massive usage of online data, security implementation in cellphones cannot be under-estimated. However, diverse data protective measures such as fingerprint sensors, Face ID, iris scanner for cellphones and biometric security features, smartphones have existed but could not provide adequate mitigate against any security breach. As a result, smartphone producers encourage their users to safeguard their devices with strong passwords. However, with all of this security counter measures, loopholes still plague the mobile phones such that antivirus software are inadequate in protecting phone users against cyber-attacks. Blockchain is an alternative that evolve to boost the security of transactions using smartphones to clamp down on any possibility of external breach. This paper also expound the use of visual sim technology other than the existing physical Sim cards in providing more security enhancement in smartphones.
  • ItemOpen Access
    Development of Interagency Crime Management System
    (Department of Computer Science, Nasarawa State University Keffi, 2020-02-05) Nweke, James; Ajayi, Binyamin Adeniyi; Ogah, Muhammad Usman
    Enhancing the interagency collaborative approach to crime management in developing nations cannot be overemphasized. This study presents a computerized system that is posed to enhance interagency collaboration in combating crime in Nigeria. Interagency Crime Management System (ICMS) is a web-based application that accepts input through an Application Program Interface (API) provided to the individual applications being used by different security agencies under the Federal Government of Nigeria. The system is based on a relational database with schemas very close to those of law enforcement agencies. The system was designed to accept data in the same input format from each of these agencies. These are the criminal code, name of criminal, nationality, state of origin, the local government of origin, age, nature of the crime committed, location of the crime, a section of the penal code violated, current status as at when reporting, officer-in-charge, and reporting agency. To achieve this, the study adopted the Structured System Analysis and Design Methodology (SSADM). The process starts with designing a framework for ICMS, then furthered by developing an algorithm for ICMS, and Laravel was employed for the implementation of the algorithm developed. The database management software employed for the application, PostgreSQL, stores every detail of the crime using a unique reference number for every record stored in the database to facilitate easy retrieval. This system also provides a search facility to query the database about information relating to the various categories of crime, criminals, and crimes that are common in particular geographical location and provide analytics tools such as charts for research and analysis purposes.
  • ItemOpen Access
    Mathematical Model of Political Rumour in Assakio Community with Conditional Latent Period in a Varying Population
    (Department of Computer Science, Nasarawa State University Keffi, 2021-09-09) Emmanuel, Atanyi Yusuf; Akayede, Imam; Olagunju, A.S.; Aimufua, Gilbert Imuetinyan Osaze; Apene, Oghenvovwero Zion; Sani, Umar; Isah, S.H.
    1/1 «-its paper 1 rumour propagation model with conditional latent period and uarying population is considered. 111 tire literature, 12551081 model assume that an ignorant in d d u a l enters tire latent period and decide ■whether to become aspreader or stifler.ln our model roe introduce anew compartment called tire blackmailers, another type o f spreaders who spread the rumour for selfish reason. The model equations are first transformed into proportions, thus reducing the model equations from fine to four differeritial equations. The model exhibit two equilibra, namely the Rumour Tree Equilibrium RTEf and the Rumour Endemic Equilibrium REE). Using the method of linearized stability, we establish that the RTE state exist and is localhj asymptomatically stable when R٠
  • ItemOpen Access
    LEVEL OF ACCESS AND USE OF ICTS FOR AGRICULTURAL COMMUNICATION BY NGO WORKERS IN NASARAWA STATE, NIGERIA.
    (Department of Computer Science,Nasarawa State University, Keffi., 2014-01-01) Emmanuel, Salau S.; Agwu, A. E.; Luka, E. G.; Bello, B.
    The study ascertained the level of ICT usage for agricultural communication by NGOs in Nasarawa state, Nigeria using a well structured questionnaire; data for the study were generated from one hundred and twenty five NGO staff in Nasarawa state. The data obtained were analyzed using percentage, mean score and multiple regression. The findings show that some of the agricultural/rural development activities of the NGOs included microfinance/agricultural credit scheme (96%), women/youth empowerment programmes (62.4%) and agricultural extension services (49.6%). On the ownership of ICT facilities by the NGO staff majority (98.40%) of the respondents had mobile phones, followed by radio (93.60%), television (84%), video player (75.20%), audio player (68%) and personal computers (47.20%). Majority (M-1.82) of the respondents used radio for communicating agricultural information to farmers, followed by mobile phone (M=1.79), television (M=1.79), computer (M=1.64) and Internet (M=1.32).The major ICT channels for communicating agricultural messages by the respondents were telephone calls (M=1.76), text messages (M=1.75) and emails (M—1.17). The result of the regression analysis of the effects of respondents’ socioeconomic characteristics on their level of use of ICTs shows that gender, working experience, number of ICT facilities owned by a respondent, income level, length of computer training and membership of social organizations all had positive relationship with the level of ICT use. However, only one variable (Number of ICT owned) had a significant effect (p<0.05) on the level of ICT usage. The study therefore recommended that NGOs in Nasarawa state should focus more attention on agricultural activities such as farm inputs distribution, environmental management/climate change mitigation and conflict resolution/management. These critical needs of rural farmers were not given prominence in the activities of the respondents. The NGOs should equally provide on- the- job training on ICT applications for their staff to improve their capacity in the use of ICTs for agricultural communication, especially areas where such skills are lacking.
  • ItemOpen Access
    Development of a Cloud-Based Meteorological Historical Data System
    (Department of Computer Science, Nasarawa State University Keffi, 2022-12-15) Aimufua, Gilbert Imuetinyan Osaze; Gummi, Sulaiman Ammar; Abdullahi, M.U.
    Meteorological data has played a significant role in most developed and developing nations. However, in Nigeria, the storage of meteorological data has been so limited, scattered and without defined structure. The purpose of this paper is to develop a cloud-based meteorological data management system as well as a sales portal to improve the management of meteorological data and associated climate services at the Nigerian Meteorological Agency (NiMet). This agency has indisputable importance in the nation’s economy, but poor management leads to either loss or damage of the data. Additionally, the process of accessing NiMet data and products for research is often long and stressful. To address these problems, this paper adopts the waterfall and descriptive models to develop a new system. This approach divides the project activities into sequential phases, where each phase depends on the deliverables of the previous one and corresponds to a specialization of tasks. The developed system will be the central hub for numerous meteorological services, including statistical reports, graphical analyses, data extractions, climate summaries, and health sectors, which will dramatically improve work flow, data consistency, and integrity beyond previous practices in Nigeria.
  • ItemOpen Access
    Protein secondary structure prediction using deep neural network and particle swarm optimization algorithms
    (Department of Computer Science, Nasarawa State University Keffi, 2022-12-04) Abimiku, Aka Patience; Aimufua, Gilbert Imuetinyan Osaze; Abdullahi, M.U.
    Protein secondary structure prediction from its amino acids is purposely used to evaluate and improve the accuracy of performance as well as drug design and cell functionality. Various approaches for predicting protein secondary structure have been used, each with varying accuracy, vulnerabilities, and strengths. In view of this, this paper is aimed at training a deep neural network with particle swarm optimization and comparing the results with the state of accuracy. Also, the methodology used is basic particle swarm optimization for training a 20-15-15-15-3 deep neural network. The Java programming language and the Spring Boot framework were employed to implement the various application programming interfaces of the model. The dataset acquired after the training of JPred Server 1.2, which included 1349 training sets and 149 test sets, was used in training the model. Following the training, it was discovered that the model had a highest accuracy of 53.18 percent on epoch 140, indicating that this model is not a best fit or an alternative to the current state of the art for the prediction of protein secondary structure.
  • ItemOpen Access
    Development of Computerized Warehouse Management System
    (Department of Computer Science, Nasarawa State University Keffi, 2022-01-06) Aimufua, Gilbert Imuetinyan Osaze; Abdullahi, M.U.; Ibrahim, Muazu Auwal
    warehouse is a storage facility for products and commodities awaiting clearance. The manual clearance of these commodities is in used in most organizations. It involves physically transporting billing paperwork from one port to another, which delays the clearance of products. Furthermore, creating a reference to a specific transaction takes a lengthy time. In view of this, this paper developed a computerized warehouse management system to address these issues. It will electronically maintain records of Good Inwards (GI), check-in and check-out, as well as simplify warehouse operations by eliminating the rate of defects in the present manual method. For software implementation, observation and the internet will be employed as data collection techniques. As a result, the waterfall model is used to develop the new system. While PHP programming language is also used for the coding of the client-model application in order to achieve the aims and objectives of the system.
  • ItemOpen Access
    A Texture-based Method for Detecting Impostor Attacks using Printed Photographs
    (Department of Computer Science, Nasarawa State University Keffi, 2020-09-09) Jegede, Abayomi Joshau; Aimufua, Gilbert Imuetinyan Osaze; Thomas, G.A.
    Conventional biometric systems do not possess the capability to detect whether a biometric image is acquired from a live subject or an artificial representation of his identity. This allows impostors to use different methods to fake the identities of legitimate users and compromise the security of biometric authentication systems. This paper proposed a texture-based anti-spoofing technique known as concatenated rotation invariant uniform local binary pattern, which uses textural properties to discriminate between images (face and iris) captured directly from live subjects and those obtained from secondary sources such as photographs or video images. The proposed approach extracts uniform local binary pattern features from an image at different scales and resolutions. The extracted features are further concatenated to obtain a composite feature representation of the image. The accuracy of proposed method is evaluated using face images from Nanjing University of Aeronautics and Astronautics (NUAA) normalized dataset and iris images from Audio, Temporal signals, Vision and Speech (ATVS) fake iris database. The programming environment used to implement the proposed technique is MATLAB 2014. The MATLAB environment provides the tools/utilities for creating the programs which implements the various tasks in the spoof detection system. Experimental results suggest that the proposed approach is capable of distinguishing genuine face and iris images from fake representations of the same image. The results also show the technique has better recognition accuracy and higher textural discriminative power for iris than it does for face. This is largely due to the fact that iris exhibits low intra-class variation and high inter-class distance; while face has high intra-class variation and low inter-class distance. The suitability of the proposed technique is not limited to only face and iris biometric data. The technique can be applied to any biometric modality whose textural features can be extracted. Examples include retina, palm, knuckle, fingerprint, lip and ear. We only used face and iris samples to verify the proposed method.
  • ItemOpen Access
    Economised Power Series Solutions of Differential-Algebraic Equations with Hessenberg Index-2 by Legendre Approximation.
    (Department of Computer Science, Nasarawa State University Keffi, 2012-02-02) Fatokun, J.O.; Aimufua, Gilbert Imuetinyan Osaze; Gimba, Audi B.
    The numerical solution of differential- algebraic equations with Hessenberg Index-2 using the Legendre polynomial approximation is presented. We use are used to approximate the power series solutions of the resulting system of equations evolving from the DAEs. Some numerical examples were tested and absolute errors of the computation obtained to establish the order of accuracy. The results show at least order six accuracy for a system of DAEs. It is however more desirable for systems of index-1 DAEs than a singly-formulated DAE in terms of stability properties.
  • ItemOpen Access
    Conceptual Framework for the Assessment of the Degree of Dependency of Critical National Infrastructure on ICT in Nigeria
    (Department of Computer Science, Nasarawa State University Keffi, 2019-03-06) Mbanaso, Uche M.; Kulugh, Victor; Musa, Habiba; Aimufua, Gilbert Imuetinyan Osaze
    Critical National Infrastructure (CNI) are assets that provide core functions to modern society, which failure or incapacitation can adversely affect national security, economic prosperity and wellbeing of citizens. In an evolving digital society, CNI rely heavily on Information and Communications Technology (ICT) infrastructure to improve productivity, and effectively deliver critical services in timely and cost-effective fashion. However, the underlying ICT infrastructure that drives CNI amplify cyber risks, threats and vulnerabilities exponentially. Consequently, a failure in ICT infrastructure has the potential to affect CNI in an unexpected manner. The risks associated with the use of ICT are dynamic, raising the need for continuous assessment of degree of ICT dependency. Presently however, there is rarely a framework nor a publicly available tool in Nigeria that can quantitatively gauge the degree of CNI dependency on ICT. The study addresses this gap by the development of a conceptual framework that can facilitate the assessment of the degree of CNI dependency on ICT. In this study, existing relevant documents on critical infrastructure, ICT frameworks and standards and critical process engineering principles were scanned, analysed and synthesised to conceptualise the framework, and the construction of the building blocks, metrics and indicators. The framework was tested using a hypothetical discrete dataset. The outcome further facilitated the framing of ICT Dependency Index (IDI), a predefined quadrant, of which the computation of Dependency must fall within one of the quadrants.
  • ItemOpen Access
    A Hybrid Cyprosystem for Multibiometric Authentication and Template Protection
    (Department of Computer Science, Nasarawa State University Keffi, 2019-12-09) Jegede, Abayomi Joshau; Akosu, N.I; Aimufua, Gilbert Imuetinyan Osaze
    This paper proposes and implements a multilayer authentication and template protection scheme known as the hybrid scheme. The hybrid scheme is based on the integration of modified shielding function with matrix transformation. It is a 2-in-1 approach which provides good recognition accuracy, security of stored templates and user privacy. The recognition accuracy of the proposed approach is evaluated using a multi-biometric dataset obtained from the fusion of face and iris images. The multibiometric dataset is constructed using feature level fusion to combine face images in CASIA Near Infrared Database and iris images in CASIA Iris Database version 1. Security analysis is used to determine the robustness of the hybrid scheme against security threats such as guessing and key exhaustion (or brute force) attacks. This is carried out using complexity analysis to determine the level of difficulty an attacker faces in an attempt to launch compromise the authentication scheme. The privacy capability of the hybrid scheme is analyzed using the requirements proposed in the ISO/IEC JTC 1/SC 27 standard. Experimental results as well as security and privacy analyses show that the approach provides good recognition accuracy as well as high-level template security and user privacy.
  • ItemOpen Access
    Application of Sales Forecasting Model Based on Machine Learning Algorithms
    (Department of Computer Science, Nasarawa State University Keffi, 2021-10-10) Abdullahi, Maimuna A.; Aimufua, Gilbert Imuetinyan Osaze; Abdullahi, M.U.
    Machine learning has been a subject undergoing intense study across many different industries and fortunately, companies are becoming gradually more aware of the various machine learning approaches to solve their problems. However, to fully harvest the potential of different machine learning models and to achieve efficient results, one needs to have a good understanding of the application of the models and the nature of data. This paper aims to investigate different approaches to obtain good results of the machine learning algorithms applied for a given forecasting task. To this end, the paper critically analyzes and investigate the applicability of machine learning algorithm in sales forecasting under dynamic conditions, develop a forecasting model based on the regression model, and evaluate the performance of four machine learning regression algorithms (Random Forest, Extreme Gradient Boosting, Support Vector Machine for Regression and Ensemble Model) using data set from Nigeria retail shops for sales forecasting based on performance matrices such as R-squared, Root Mean Square Error, Mean Absolute Error and Mean Absolute Percentage Error.
  • ItemOpen Access
    Development of Anti-Polypharmacy Management System
    (Department of Computer Science, Nasarawa State University Keffi, 2021-03-06) Aimufua, Gilbert Imuetinyan Osaze; Onyechi, Nkiruka P.; Abdullahi, M.U.
    The prevalence of adverse drug reactions, adverse drug effects, avoidable deaths, and other drug-related problems arising from multiple drug administration is a wake-up call to our medical practitioners and the world at large, hence prompt action is required to this effect. In this paper, a computerized web-based system called “Anti-Polypharmacy Module” (APM) is being proposed which is geared towards checking the menace of polypharmacy by highlighting its adverse effect and drug-drug interactions. The drug library which contains most of the required information will be used to accomplish this task. The application is designed to be a user-friendly one. The system methodology for this work is the System Development Life Cycle (SDLC). This system is implemented using Java-servlet (JSP), JQuery, and SQL as a collection of software development tools. It is also a web-based application hence HTML5 and CSS3 are carefully crafted together for maximum user-friendliness. Apache Maven and Tomcat 7 are deployed for the back-end server technology. For database query optimization, the basic rules are strictly followed as discussed in the methodology.