{"title":"Fetal Heart Rate Estimation: Adaptive Filtering Approach vs Time-Frequency Analysis","authors":"A. A. Ahmad, D. Nyitamen, S. Lawan, C. L. Wamdeo","doi":"10.1109/NigeriaComputConf45974.2019.8949643","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949643","url":null,"abstract":"Fetal heart rate (FHR) estimation is an essential aspect of fetal heart rate observation utilized to determine fetal health condition during the antenatal period. This paper proposes two methods for FHR estimation from an abdominal electrocardiogram (ECG) signal based on adaptive filtering and time-frequency techniques. The fetal ECG signal is the main aspect of the abdominal ECG marred by other interference/ noise signals. These signals include propagated maternal ECG signal, the power-line noise and the white noise. The adaptive filtering approach is based on the least mean squares (LMS) and requires the maternal ECG signal as reference signal for the filtering processing for FHR estimation. The time-frequency analysis is based on the spectrogram time-frequency distribution (TFD), where instantaneous power (IP) and peak analyses are subsequently carried out from this TFD for FHR estimation. The adaptive filtering is made of a single step but requires an external reference signal while the time-frequency analysis involves more steps but does not require a reference signal. Results obtained showed that both methods are able to estimate the FHR of 160 beats per minute (bpm) accurately at signal-to-noise ratio (SNR) of slightly higher noise at −1dB. Results obtained showed that the proposed techniques are efficient for fetal heart monitoring and choice of technique will depend on available resources.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Alhassan, Sadiq Thomas, Rabiu Aminu, Zainab Jibril Barau, O. Oyeleke, Rukaiya Abdullahi
{"title":"Combined Cycle Power Plant Technology: Prospects in Boosting Nigeria’s Electricity Production","authors":"F. Alhassan, Sadiq Thomas, Rabiu Aminu, Zainab Jibril Barau, O. Oyeleke, Rukaiya Abdullahi","doi":"10.1109/NigeriaComputConf45974.2019.8949617","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949617","url":null,"abstract":"The Combined Cycle Power Plant or Combined Cycle Gas Turbine is described as a gas turbine generator in which electricity is generated and the resulting waste heat is used to produce steam to generate additional electricity by means of a steam turbine. The gas turbine is considered one of the most resourceful for conversion of gas fuel to mechanical power or in this case electricity. The electricity sector in Nigeria’s has suffered a systemic failure over the years. In the earlier years, considering the 70s and 80s, electric power production and supply was considered ample and barely sufficient to meet the National demand. And recently, it is still experiencing gradual deterioration and is still struggling to meet the increase in the demand for electricity as a result of increase in population. Electricity production in Nigeria over the last 35 years constitutes various methods of generation of which are gas-fired, oil-fired, hydro-electric power stations, and coal-fired station with hydroelectric power system. And with infrastructural developments, oil and gas-fired power stations make up about 85% of her power plants. This paper discusses the prospects of combined cycle power plants (CCPPs) for boosting generation of electricity in Nigeria, the associated technology, and the possibilities to be exploited, hence, meeting up with the rise in the demand for energy for sustainable national development. The paper also suggests the potentials of improving present gas-fired power plants into combined cycle power plants for enhanced electricity generation and supply.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. N. Odaudu, I. J. Umoh, M. B. Mu’azu, E. A. Adedokun
{"title":"Machine Learning for Strategic Urban Planning","authors":"S. N. Odaudu, I. J. Umoh, M. B. Mu’azu, E. A. Adedokun","doi":"10.1109/NigeriaComputConf45974.2019.8949665","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949665","url":null,"abstract":"Data mining is an important part of strategic planning for the development of modern urban settlement with capacities to accommodate population explosion. Developing countries are fast becoming urbanized giving the developments and opportunities that are lacking in rural areas. Data regarding urban development such as satellite image need to be analysed to ascertain the possibilities for further development or opening up of new settlements. This work presents a binary sub-pixel and feature based method of classification to detect water bodies and vegetation in earth observatory images. In this work, the images were subjected data pre-processing, feature extraction, and analysed the data using machine learning classification method to detection regions that support urban expansion or development of new settlement. The proposed method achieved 88.93% accuracy and 0.06% RMSE.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regulation of Induced Movement using Back Stepping Control","authors":"M. Ahmed, M. S. Huq, B. S. K. Ibrahim","doi":"10.1109/NigeriaComputConf45974.2019.8949651","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949651","url":null,"abstract":"The paper presented an evaluation using the Back Stepping control (BSC) for the regulation of Functional Electrical Stimulation (FES) aided sit-to-stand (STS) motion restoration by investigating the effect of human mass distribution across the world. The study focused on eradicating or reducing to the minimum the tasks of changing the control system parameters when applying the device for different subjects. The comparison was made with the Proportional Integral Derivative (PID) based gain scheduling based control approach. Results do indicate the robustness of the BSC control method as it portrays that despite the alteration of the masses to the extremes the control system was able to keep the tracking error approaching zero or very close to the desired with and without changes. It outperformed the PID based gain scheduling control scheme. It also operates within the permissible limits specified. Hence, it reveals the effectiveness of the BSC scheme for solving the problem of continuous readjustments making the equipment universal. It, therefore, relieve the burden of the necessity of changing the control variables continuously. The study is novel because the BSC has never been evaluated on four segments based induced STS movement in paraplegia model. The universal human mass distribution has also not been considered using the control scheme on the model","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Salami, I. J. Umoh, E. A. Adedokun, M. B. Mu'azu, Lukman Adewale Ajao
{"title":"Efficient Method for Discriminating Flash Event from DoS Attack during Internet Protocol Traceback using Shark Smell Optimization Algorithm","authors":"O. Salami, I. J. Umoh, E. A. Adedokun, M. B. Mu'azu, Lukman Adewale Ajao","doi":"10.1109/NigeriaComputConf45974.2019.8949671","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949671","url":null,"abstract":"Internet Protocol (IP) traceback tool can wrongly identify a Flash event (FE) flow as a Denial of Service (DoS) attack when tracing a DoS attack source because of the symptomatic similarities between them. IP traceback scheme should be able to differentiate FE from DoS attack to avoid higher false error during a DoS attack traceback process. Discrimination policy was introduced into IP traceback scheme to address this challenge, but the discrimination policy may not work effectively when the attack packets from a DoS attack is very large. This work proposed improvement to the discrimination policy implementation by improving the method of the statistical analysis of the attack packets distribution on each node along the path to select a more accurate attack path segment. The results of different tests carried out show significant improvement on the scheme in analyzing very large values of the attack packets discrimination parameters.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"68 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114099849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hussaini, S. A. Nor, H. Bello-Salau, Hiba Jasim Hadi, A. A. Gumel, Kabiru Abdullahi Jahun
{"title":"Mobility Support Challenges for the Integration of 5G and IoT in Named Data Networking","authors":"M. Hussaini, S. A. Nor, H. Bello-Salau, Hiba Jasim Hadi, A. A. Gumel, Kabiru Abdullahi Jahun","doi":"10.1109/NigeriaComputConf45974.2019.8949670","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949670","url":null,"abstract":"Named Data Networking is a consumer-driven network that supports content consumer mobility due to the nature of in-network catching. Consumer mobility was inherently supported in NDN while producer mobility was not supported, also faces many challenges from initial architectural design. Therefore, there is needs to provide substantial producer mobility support to minimize the handoff latency, handoff signaling overhead cost, reduce the unnecessary Interest packets loss to improve data packets delivery once a content producer relocated. In this paper, the Broadcasting Approach is proposed as a solution to the problem of the mobile producer in NDN. Consequently, the result may solve the inherited problems of triangular routing in NDN network mobility. Also, may have significant implication to support the integration of 5G, Mobile Ad-hoc Networks (MANET), Delay-Tolerant Network, Vehicular Adhoc Networks (VANET) and IoT network into NDN for mobile application without a special mechanism.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Ogunbiyi, C. T. Thomas, B. Olufeagba, I. S. Madugu, B. H. Adebiyi, Lambe M. Adesina
{"title":"A Direct Optimal Control of the Jebba Hydropower Station","authors":"O. Ogunbiyi, C. T. Thomas, B. Olufeagba, I. S. Madugu, B. H. Adebiyi, Lambe M. Adesina","doi":"10.1109/NigeriaComputConf45974.2019.8949623","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949623","url":null,"abstract":"The optimal power generation from the Jebba hydroelectric power station is subject to the reservoir operating head, weather-related factors, units’ availability and system dynamics. In this paper, a computer control system is designed to ensure safe operation and maximize power generation. The controller is an optimal controller, which determines the amount of inflow required to regulate the reservoir operating head. The control law is an optimal control procedure developed around the steepest descent and conjugate gradient algorithm. The algorithms determine the control signal and state trajectories for minimization of a performance index defined for the regulation of the reservoir operating head. The results show that the two techniques are feasible in estimating an optimal inflow needed to move the reservoir operating head from any level to the nominal head. The two techniques were compared under different operating conditions of the hydropower system, the conjugate gradient algorithm performs better in terms of computational time. The control algorithm is recommended for use in the realization of a computer control system for the station.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faisal A. Garba, Kabiru I. Kunya, S. A. Ibrahim, A. B. Isa, Khadija M. Muhammad, Nasiru N. Wali
{"title":"Evaluating the State of the Art Antivirus Evasion Tools on Windows and Android Platform","authors":"Faisal A. Garba, Kabiru I. Kunya, S. A. Ibrahim, A. B. Isa, Khadija M. Muhammad, Nasiru N. Wali","doi":"10.1109/NigeriaComputConf45974.2019.8949637","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949637","url":null,"abstract":"Hackers use malware to gain access to target computers. Malicious payloads are usually generated using tools such as Metasploit. As a means of defense, the target computers deploy anti-virus solution to detect this malicious payloads and protect the victim machines. In a reaction to this, the hackers created anti-virus evasion tools to evade detection by this antivirus solutions. But how effective are these antivirus evasion tools? This paper seeks to evaluate the effectiveness of some selected anti-virus evasion tools: Avet, Veil 3.0, The Fat Rat, PeCloak.py, Phantom-Evasion, Shellter, Unicorn and Hercules against current best Antivirus Solutions on Windows and Android platforms.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132168596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Resonant Fault Current Limiting Prediction Technique based on Auditory Machine Intelligence","authors":"Biobele A. Wokoma, E. N. Osegi","doi":"10.1109/NigeriaComputConf45974.2019.8949653","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949653","url":null,"abstract":"Faults are a major problem encountered by power system operators particularly single-line-to-ground faults. To mitigate such faults and assure enhanced services to consumers, power system operators need to deploy appropriate hard and soft-computing solutions. In this paper, we present a novel approach to fault mitigation based on a new type of artificial intelligence technique dedicated to time series prediction called Auditory Machine Intelligence (AMI). The actual fault mitigation approach uses a Resonant Fault Current Limiter (RFCL) to fine-tune inductances in circuit in order to estimate the clearance times for a fault. The fault mitigation approach is cast as a time series problem where the resonant inductances (L) and associated clearance times (tc) are re-sequenced in a temporal aggregated fashion; this approach is then applied to a double-circuit transmission line (Alaoji-Afam sub-transmission) of the Nigerian power network. The results using the proposed technique on a generated L-tc sequence are compared with that of the Group Method of Data Handling for time series (GMDH time-series) which is a state-of-the-art neural network; the results indicate that the both techniques are competitive but the AMI technique will outperform the GMDH time-series to the tune of 0.57% for a number of GMDH time-series and AMI equal simulation trials.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}