A. Abdulrazaq, Muhammad Bashir Abdulrazaq, I. J. Umoh, E. A. Adedokun
{"title":"Fraud Detection in Credit Card and Application of VAT Clustering Algorithm: A Review","authors":"A. Abdulrazaq, Muhammad Bashir Abdulrazaq, I. J. Umoh, E. A. Adedokun","doi":"10.1109/NigeriaComputConf45974.2019.8949660","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949660","url":null,"abstract":"The evolution of secured and reliable internet facilities have greatly influence the advancement in the global e-commerce, making online transaction more efficient and even more promising for the future decades. The uses of credit card become more popular for online purchases due to the ease and availability of internets. Financial fraud pattern also changes and increases rapidly with the development of modern technology which conversely increases the level of fraudulent transactions in credit card resulting in huge losses. However, several credit card fraud detection techniques have been developed to address the problem. In this paper, different fraud detection method have been reviewed and classified based on the approaches used. Also, the major limitation and reasons why most methods are not very efficient are also presented. Furthermore, this paper proposed the application of VAT algorithm as a clustering algorithm to improve on the limitations of credit card detection methods.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nasir A. Shinkafi, L. M. Bello, D. S. Shu'aibu, I. Saidu
{"title":"Energy Efficient Learning Automata Based QLRACH (EELA-RACH) Access Scheme for Cellular M2M Communications","authors":"Nasir A. Shinkafi, L. M. Bello, D. S. Shu'aibu, I. Saidu","doi":"10.1109/NigeriaComputConf45974.2019.8949654","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949654","url":null,"abstract":"This paper introduces an Energy Efficient Learning Automata Q-Learning Random Access Channel (EELA-RACH) Access Scheme to improve energy efficiency. The proposed EELA-RACH scheme employs a Distributed Learning Automata (DLA) technique based on Learning Automata (LA) feedback to minimise the energy consumed during updating Q-value and storing transmission history. The scheme also utilizes an adaptive duty cycle assignment to control the energy consumption of the Machine-to-Machine (M2M) devices within the cellular M2M communication cycle. The results show that the proposed EELA-RACH scheme achieves better performance compared to the Prioritized Learning Automata Q-Learning RACH (PLA-QL-RACH) and an Enhanced Learning Automata QL-RACH (ELA-QL-RACH) schemes with 9.41% and 65.72% decrease in energy consumption and increase in device lifetime, respectively.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Classification Algorithms for Phishing Detection: A Comparative Appraisal and Analysis","authors":"Noah Ndakotsu Gana, S. Abdulhamid","doi":"10.1109/NigeriaComputConf45974.2019.8949632","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949632","url":null,"abstract":"Exponential growth experienced in Internet usage have pave way to exploit users of the Internet, phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false positive rate and low accuracy has been a setback in phishing detection. In this research RandomForest, SysFor, SPAARC, RepTree, RandomTree, LMT, ForestPA, JRip, PART, NNge, OneR, AdaBoostM1, RotationForest, LogitBoost, RseslibKnn, LibSVM, and BayesNet were employed to achieve the comparative analysis of machine classifier. The performance of the classifier algorithms were rated using Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operation Characteristics Area, Root Relative Squared Error False Positive Rate and True Positive Rate using WEKA data mining tool. The research revealed that quit a number of classifiers also exist which if properly explored will yield more accurate results for phishing detection. RondomForest was found to be an excellent classifier that gives the best accuracy of 0.9838 and a false positive rate of 0.017. The comparative analysis result indicates the achievement of low false positive rate for phishing classification which suggest that anti-phishing application developer can implement the machine learning classification algorithm that was discovered to be the best in this study to enhance the feature of phishing attack detection and classification.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Framework for Detection of Learning Style from Facial Expressions using Convolutional Neural Network","authors":"F. L. Gambo, G. Wajiga, E. J. Garba","doi":"10.1109/NigeriaComputConf45974.2019.8949656","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949656","url":null,"abstract":"There are millions of learning materials over the internet that students can use to assimilate new information. But once their preferred learning style is known, they can be provided with a responsive recommendation so that can focus more on representations that will foster their understanding. Providing students with preferred learning object no doubt increase their motivation and hence their learning outcome. Identifying student’s learning styles allows them to learn better and faster through several means. Traditionally, a test (use of questionnaire) is usually conducted for automatic detection and prediction of student’s learning preferences particularly in e-learning. This approach though valid and reliable in detection of learning styles, but it is also associated with many challenges; learner self-report bias, individual earning styles may vary over time, Students not aware of the importance or the future uses of the questionnaire. To this end, this paper proposed a conceptual framework for detection of learning style from facial expression using Convolution neural network.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"s3-19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajekiigbe Enoch Seun, U. I. Bature, K. I. Jahun, A. Y. Nasir, A. M. Hassan, U. S. Toro
{"title":"Hospital Electronic Queuing Solution System","authors":"Ajekiigbe Enoch Seun, U. I. Bature, K. I. Jahun, A. Y. Nasir, A. M. Hassan, U. S. Toro","doi":"10.1109/NigeriaComputConf45974.2019.8949662","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949662","url":null,"abstract":"Queuing is a major challenge for healthcare services all over the world, but particularly in developing countries. Application of queuing theory to enhance decision making to improve this problem is not commonly used by managers in developing countries in contrast to their counterparts in the developed world. In many hospitals, Patients wait for long time in the healthcare facility before they are attended to by the health personnel. This project presents the design and implementation of Automatic Hospital Queue Management System. The system operates on an input/output basis; centered on a programmed ATMEGA328p microcontroller. The system receives the input from the client on the device through the use of RFID card reader which reads the card of the patient and therefore a number will be assigned to the patient, whereby he or she will therefore proceed to the appropriate sit assigned. When a doctor is available a receptionist will therefore press the button of the next available doctor whereby this action then triggers a record of the next patient on the queue by calling it through a speaker and displaying it on the (LCD).","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Tenancy Cloud-Enabled Small Cell Security","authors":"B. Abubakar, H. Mouratidis","doi":"10.1109/NigeriaComputConf45974.2019.8949667","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949667","url":null,"abstract":"The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network’s edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing.The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121144412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim M. Abdullahi, M. B. Mu'azu, O. Olaniyi, J. Agajo
{"title":"A Novel Cultural Evolution-Based Nomadic Pastoralist Optimization Algorithm (NPOA): The Mathematical Models","authors":"Ibrahim M. Abdullahi, M. B. Mu'azu, O. Olaniyi, J. Agajo","doi":"10.1109/NigeriaComputConf45974.2019.8949635","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949635","url":null,"abstract":"In this paper, the mathematical models for a proposed novel modified Pastoralist Optimization Algorithm (POA) called the Nomadic Pastoralist Optimization Algorithm (NPOA) inspired by the nomadic pastoralists herding strategies and cultural evolution strategy is presented. The nomadic pastoralist herding strategies which are scouting, camping, herding, splitting and merging were mathematically modeled. The mathematical models will be used to develop the proposed algorithm. The algorithm when developed will be tested on several benchmark functions to ascertain the algorithms exploration and exploitative ability. The performance will also be validated by comparing with POA and other popular and similar metaheuristic algorithms such as GOA, PSO, ABC, BBO and ICA","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Ifada, N. Surajudeen-Bakinde, N. Faruk, A. Abubakar, O. O. Mohammed, A. O. Otuoze
{"title":"Implementation of a Data Transmission System using Li-Fi Technology","authors":"E. Ifada, N. Surajudeen-Bakinde, N. Faruk, A. Abubakar, O. O. Mohammed, A. O. Otuoze","doi":"10.1109/NigeriaComputConf45974.2019.8949659","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949659","url":null,"abstract":"Over the years, the overdependence on Wireless Fidelity (Wi-Fi) for data transmission necessitated the need for an alternate and more reliable means of communication, hence, Light Fidelity (Li-Fi). It involves the use of Light Emitting Diode to transmit data by blinking (i.e. switching them On and Off) at a speed not noticeable to the eye. This paper proposed the development of the Li-Fi system using off the shelf electronic components. The proposed system utilizes an embedded system with dual-core Advanced Virtual RISC (AVR) microcontroller (ATmega16L) interfaced to input/output circuits comprising of the Light Emitting Diode (LED), LM358N Operational Amplifier and a photodiode. Also, by developing a user (Receiver PC) interface using JAVA programming, the sample data (text) transferred was monitored and the speed, efficiency, security and capacity of the system was examined and discovered to be top notch. This would make the system an indispensable means of communication in the nearest future. This data transmission system is different from those in existence because expensive components were not in the design, invariably reducing the overall cost of the implementation.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114069101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System Based on Support Vector Machine Optimised with Cat Swarm Optimization Algorithm","authors":"S. Idris, O. Oyefolahan Ishaq, N. Ndunagu Juliana","doi":"10.1109/NigeriaComputConf45974.2019.8949676","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949676","url":null,"abstract":"intrusion detection system (IDS) like firewall, access control and encryption mechanisms no longer provide the much-needed security for systems and computer networks. Current IDS are developed on anomaly detection which helps to detect known and unknown attacks. Though, these anomaly-based IDS feature a high false rate. To reduce this false alarm rate, in this paper, we proposed an intrusion detection model based on support vector machine (SVM) optimized with Cat swarm optimization (CSO) algorithm. We use the information gain (IG) for attribute reduction and perform classification using the optimized Support vector. The result obtained shows that our model performs well with the least false alarm rate and good accuracy value compare with other classification algorithms evaluated using the same datasets.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Olarinoye, C. Akinropo, G. J. Atuman, Z. Abdullahi
{"title":"Speed Control of a Three Phase Induction Motor using a PI Controller","authors":"G. Olarinoye, C. Akinropo, G. J. Atuman, Z. Abdullahi","doi":"10.1109/NigeriaComputConf45974.2019.8949624","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949624","url":null,"abstract":"Three-phase Induction motors are typically used in an increasing variety of applications such as fans, milling machines, transportation, etc. This paper discusses the speed control of the three-phase induction motor and an associated PI controller. A model of the three-phase induction motor is presented, analyzed and used to demonstrate the effectiveness of the speed controller. The performance of the motor system is carefully examined and compared with and without the PI controller. The unit step response of the speed control loop is characterized by rise time, peak overshoot, settling time and steady state error of 0.0815s, 6.97%, 0.82 and 0.11% respectively. Simulation results show that the speed of the uncontrolled motor changed whereas that of the controlled motor returned quickly to its initial value after the motor is subjected to load changes from 1 pu to 0.5 pu and subsequently to 0.25 pu.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}