{"title":"hauWE: Hausa Words Embedding for Natural Language Processing","authors":"Idris Abdulmumin, B. Galadanci","doi":"10.1109/NigeriaComputConf45974.2019.8949674","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949674","url":null,"abstract":"Words embedding (distributed word vector representations) have become an essential component of many natural language processing (NLP) tasks such as machine translation, sentiment analysis, word analogy, named entity recognition and word similarity. Despite this, the only work that provides word vectors for Hausa language is that of [1] trained using fastText, consisting of only a few words vectors. This work presents words embedding models using Word2Vec’s Continuous Bag of Words (CBoW) and Skip Gram (SG) models. The models, hauWE (Hausa Words Embedding), are bigger and better than the only previous model, making them more useful in NLP tasks. To compare the models, they were used to predict the 10 most similar words to 30 randomly selected Hausa words. hauWE CBoW’s 88.7% and hauWE SG’s 79.3% prediction accuracy greatly outperformed [1]’s 22.3%.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126185886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. Ahmad, M. Ajiya, Lawal Mohammed Bello, Zainab Yunusa Yusuf
{"title":"Comparison of Various Instantaneous Power Methods for the Estimation of Time-Parameters of Poly Phase Coded Radar Signal","authors":"A. A. Ahmad, M. Ajiya, Lawal Mohammed Bello, Zainab Yunusa Yusuf","doi":"10.1109/NigeriaComputConf45974.2019.8949625","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949625","url":null,"abstract":"Key feature of the electronic intelligence (ELINT) setup as part of the electronic warfare is the interception and analysis of radar signals. This paper as part of ELINT provides a time parameter estimation algorithm associated with poly-phase pulsed radar signal of low probability of intercept (LPI) in a non-cooperative environment in order to identify its other characteristics. Three different methods based on power obtained at instants of time are used. The first two are obtained from the time-aspect approximation of a time-frequency distribution (TFD) while the third one is the traditional method of using its conjugate form. The main TFD used in this paper is Wigner-Ville distribution (WVD) of separable kernel and its brief heuristic approach was presented. Thereafter, an algorithm based on measuring the time-spectrum width is developed so as to determine two basic time parameter of the radar signal; either the pulse width (PW) or the pulse repetition period (PRP). The quality of the algorithm developed is tested at various signal-to-noise ratios (SNRs) in the presence of noise modeled by pseudorandom numbers of Gaussian nature. The Result obtained shows that for a fixed threshold of 37.5%, power at instants of time obtained from the TFD performs best at minimum SNR of −15 dB. The traditional method of getting power at instants of time performs very well if a variable threshold is applied at minimum SNR of −11 dB. The results shows that the proposed methods may be deployed in the practical ELINT field for analysis of radar signal","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125375357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abbas Muhammad Rabiu, A. Ibrahim, M. Dauda, M. I. Mukhtar, A. Abdullahi, Y. Abdulazeez
{"title":"Adoption of E-commerce in Nigeria Challenges and Future Prospects","authors":"Abbas Muhammad Rabiu, A. Ibrahim, M. Dauda, M. I. Mukhtar, A. Abdullahi, Y. Abdulazeez","doi":"10.1109/NigeriaComputConf45974.2019.8949641","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949641","url":null,"abstract":"Nowadays, Electronic commerce has received attention in many parts of the world, because it has the potential to improve many aspects of business activities. Despite this, there have been recent studies carried out on Electronic commerce adoption in both developed and developing countries. Some of these studies have placed importance on economical and technological infrastructure in countries where E-commerce is to be used. Additional factors that are to be considered to successfully adopt E-commerce are the creation of public awareness, creation of trust amongst online stores and customers, geographical locations and other internal and external influences. This paper is aimed to find out the reason why E-commerce has not been fully adopted in Nigeria though some of the requirements needed are available. The paper will also look at other problems experienced by those countries that have fully benefitted from Electronic commerce activities and the benefit they got from it and to make a proper recommendation for a way forward to fully adopt E-commerce in Nigeria.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116066783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. L. Imam, B. H. Adebiyi, H. Bello-Salau, G. Olarinoye, M. O. Momoh
{"title":"Cultured Artificial Fish Swarm Algorithm: An Experimental Evaluation","authors":"M. L. Imam, B. H. Adebiyi, H. Bello-Salau, G. Olarinoye, M. O. Momoh","doi":"10.1109/NigeriaComputConf45974.2019.8949657","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949657","url":null,"abstract":"In this work, a Weighted Cultural Artificial Fish Swarm Algorithm (wCAFSA) which is an amendment of standard artificial fish swarm algorithm (AFSA) is proposed. This algorithm can adaptively select its parameters at every generation in order to reduce the ease at which standard AFSA falls into local optimal. We first introduce inertial weight to adaptively determine visual distance and step size of AFSA thereafter, the Situational and Normative knowledge inherent in cultural algorithm are used to develop new variants of weighted cultural AFSA (wCAFSA Ns, wCAFSA sd, wCAFSA Ns+Sd and wCAFSA Ns+Nd). A collection of sixteen (16) optimization benchmark functions are used to test the performance of the algorithms. The simulation results disclosed that all the new variants of the wCAFSA outclassed the AFSA.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Abubakar, I. Dahiru, S. H. Sulaiman, A. Kunya
{"title":"Robust H-Infinity Control for Magnetic Levitation System","authors":"Ahmad Abubakar, I. Dahiru, S. H. Sulaiman, A. Kunya","doi":"10.1109/NigeriaComputConf45974.2019.8949668","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949668","url":null,"abstract":"This paper studies Quancer Magnetic levitation plant and proposed a robust control for the system using H-infinity approach. The performance and robustness of the proposed method was compared with the existing Proportional Integral Velocity (PIV) + Feed-forward (FF) control designed by the manufacturer. The performance analysis of the existing PIV+FF controller was made to build the desired specification template. A dynamic state feedback controller satisfying H-infinity performance, that is numerically solved using Riccati approach was designed. Simulation results obtained, shows superior robustness to uncertainties of the proposed control over the existing control with sufficient tracking performance.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic Algorithm Based Dual Input Power System Stabilizer","authors":"Aliyu Usman, N. Magaji","doi":"10.1109/NigeriaComputConf45974.2019.8949663","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949663","url":null,"abstract":"This study presents a new generator’s Power System Stabilizer design methodology of a single machine infinite bus. A dual input power system stabilizer genetic algorithm based (GAPSS4B) is analyzed, it performance is improved as compared to the single input genetic Algorithm based Stabilizer (GAPSS) over different operating points. The optimal parameters of both GAPSS and GAPSS4B are obtained by minimizing the bode plot of the transient model of SMIB with help of genetic algorithm (GA). The proposed technique is evaluated against the single input genetic algorithm based PSS (GAPSS) at a SMIB considering system parametric uncertainties. The simulation results shows that the proposed dual input GAPSS provides improved performance as compared to single input GAPSS.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"57 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114053954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Isma’ila Y. Shehu, U. Abubakar, Aminu M. Kawu, B. Sa'idu
{"title":"Effect of Youtube-Video Embedded Instruction on Students’ Academic Achievement In Automotive Technology Education In Tertiary Institutions of North-Eastern Nigeria","authors":"Isma’ila Y. Shehu, U. Abubakar, Aminu M. Kawu, B. Sa'idu","doi":"10.1109/NigeriaComputConf45974.2019.8949616","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949616","url":null,"abstract":"The study determined the effect of YouTube-Video Embedded Instruction (YVEI) on students’ academic achievement in automotive technology education in tertiary institutions of north-eastern Nigeria. Quasi experimental research design (pretest and posttest) was employed in the study. The instrument used for data collection was Automotive Suspension System Academic Achievement Test (ASSAAT)validated by three experts in the area. The reliability of the instrument was established using KR-21 and 0.81 co-efficient was obtained. The data was analyzed using mean, standard deviation and t-test. Findings of the study revealed that students in the experimental group had higher academic achievement than the control group. Based on this finding, it was concluded that YouTube-Video Embedded Instruction will assist in improving students’ academic achievement in Automotive Technology Education in tertiary institutions of Nigeria. Therefore, it is recommended that YouTube-Video Embedded Instruction should be integrated into the teaching of Automotive Technology Education courses in tertiary institutions of north-eastern Nigeria. This study has an implication on providing an opportunity of relating theories acquired in classroom with practical in an easy manner which will in turn improve students’ academic achievements. Lastly, it was suggested that this study should be replicated in other areas of technology education.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Household Construction Materials on Wi-Fi Signal","authors":"M. Ahmed, R. Buhari, A. Musa","doi":"10.1109/NigeriaComputConf45974.2019.8949644","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949644","url":null,"abstract":"Different construction materials cause significant losses when subjected to wireless signals along propagation path. A change in the signal strength, losses and user experience occur as a result of the complex composition of the materials. This paper investigated Wi-Fi (2.4GHz) signal when subjected to an enclosure dimension (0.24mx0.20mx0.16m) made of three timber species namely: Chlorophoral excels (Iroko), Afzelia Africans (Apa) and Gosswei Lerodendrin balsamic ferum (Agba); a reflective glass and solid reinforced concrete. Received Signal Strength (RSS), Upload and Download speed (Mbps) and Jitter (ms) have been considered. The steps taken involve finding the penetration loss from the RSS with their respective data representation and drawing fact from the represented data. The results show that material C has 35.4% increase in indoor signal strength, material E has 8.8% decrease in indoor signal strength, material A, B and D has 63.7%, 46.3% and 71.2% decrease respectively in indoor received signal strength. The result from QoS parameter (Jitter) are compared for both outdoor and indoor. Relatively, it shows that Material A and Material E will provide improved experience to the user.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129286566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aliyu Mustapha, A. Abubakar, Ahmed Haruna Dokoro, Isah Ndakara Abubakar, A. Idris, Abdullahi Raji Egigogo, M. Abdulkadir
{"title":"Problems and Prospects of Internet of Things to the Automobile Industry in Nigeria","authors":"Aliyu Mustapha, A. Abubakar, Ahmed Haruna Dokoro, Isah Ndakara Abubakar, A. Idris, Abdullahi Raji Egigogo, M. Abdulkadir","doi":"10.1109/NigeriaComputConf45974.2019.8949649","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949649","url":null,"abstract":"This study was carried out to identify the problems and prospects of the Internet of Things to the automobile industry in Nigeria. Two research questions were answered. The descriptive survey design was employed and the target population was made up of experts in Automobile Technology and Information and Communication Technology (ICT). The instrument used for data collection was a structured questionnaire. The questionnaire was subjected to face and content validation by five experts; 2 in Automobile Technology and 3 in Computer/ Cyber Security. Cronbach Alpha was used to determine the reliability coefficient of the questionnaire and it was found to be 0.87. The data collected from the respondents we r e analyzed using mean. The findings on the problems of IoT to the automobile industry in Nigeria include among others security, availability and stability of internet network service. The Findings related to the prospects of IoT in the automobile industry in Nigeria include among others, IoT connects and adds security to the vehicles, it also turns a vehicle into a hub of infotainment. Based on the findings, it was recommended among others that the government should provide financial support to strengthen data confidentiality, availability and stability of Internet network service.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Token Technique for Protecting User’s Attributes in a Federated Identity Management System for the Cloud Environment","authors":"M. Abur, S. Junaidu, A. Obiniyi, S. Abdullahi","doi":"10.1109/NigeriaComputConf45974.2019.8949645","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949645","url":null,"abstract":"Once an individual employs the use of the Internet for accessing information; carrying out transactions and sharing of data on the Cloud, they are connected to diverse computers on the network. As such, security of such transmitted data is most threatened and then potentially creating privacy risks of users on the federated identity management system in the Cloud. Usually, User’s attributes or Personal Identifiable Information (PII) are needed to access Services on the Cloud from different Service Providers (SPs). Sometime these SPs may by themselves violate user’s privacy by the reuse of user’s attributes offered them for the release of services to the users without their consent and then carrying out activities that may appear malicious and then causing damage to the users. Similarly, it should be noted that sensitive user’s attributes (e.g. first name, email, address and the likes) are received in their original form by needed SPs in plaintext. As a result of these problems, user’s privacy is being violated. Since these SPs may reuse them or connive with other SPs to expose a user’s identity in the cloud environment. This research is motivated to provide a protective and novel approach that shall no longer release original user’s attributes to SPs but pseudonyms that shall prevent the SPs from violating user’s privacy through connivance to expose the user’s identity or other means. The paper introduces a conceptual framework for the proposed user’s attributes privacy protection in a federated identity management system for the cloud. On the proposed system, the use of pseudonymous technique also called Privacy Token (PT) is employed. The pseudonymous technique ensures users’ original attributes values are not sent directly to the SP but auto generated pseudo attributes values. The PT is composed of: Pseudo Attribute values, Timestamp and SP_ID. These composition of the PT makes it difficult for the User’s PII to be revealed and further preventing the SPs from being able to keep them or reuse them in the future without the user’s consent for any purpose. Another important feature of the PT is its ability to forestall collusion among several collaborating service providers. This is due to the fact that each SP receives pseudo values that have no direct link to the identity of the user. The prototype was implemented with Java programming language and its performance tested on CloudAnalyst simulation.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"463 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}