2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)最新文献

筛选
英文 中文
Fraud Detection in Credit Card and Application of VAT Clustering Algorithm: A Review 信用卡欺诈检测及增值税聚类算法的应用综述
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949660
A. Abdulrazaq, Muhammad Bashir Abdulrazaq, I. J. Umoh, E. A. Adedokun
{"title":"Fraud Detection in Credit Card and Application of VAT Clustering Algorithm: A Review","authors":"A. Abdulrazaq, Muhammad Bashir Abdulrazaq, I. J. Umoh, E. A. Adedokun","doi":"10.1109/NigeriaComputConf45974.2019.8949660","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949660","url":null,"abstract":"The evolution of secured and reliable internet facilities have greatly influence the advancement in the global e-commerce, making online transaction more efficient and even more promising for the future decades. The uses of credit card become more popular for online purchases due to the ease and availability of internets. Financial fraud pattern also changes and increases rapidly with the development of modern technology which conversely increases the level of fraudulent transactions in credit card resulting in huge losses. However, several credit card fraud detection techniques have been developed to address the problem. In this paper, different fraud detection method have been reviewed and classified based on the approaches used. Also, the major limitation and reasons why most methods are not very efficient are also presented. Furthermore, this paper proposed the application of VAT algorithm as a clustering algorithm to improve on the limitations of credit card detection methods.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient Learning Automata Based QLRACH (EELA-RACH) Access Scheme for Cellular M2M Communications 基于节能学习自动机的qrach (EELA-RACH)蜂窝M2M通信接入方案
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949654
Nasir A. Shinkafi, L. M. Bello, D. S. Shu'aibu, I. Saidu
{"title":"Energy Efficient Learning Automata Based QLRACH (EELA-RACH) Access Scheme for Cellular M2M Communications","authors":"Nasir A. Shinkafi, L. M. Bello, D. S. Shu'aibu, I. Saidu","doi":"10.1109/NigeriaComputConf45974.2019.8949654","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949654","url":null,"abstract":"This paper introduces an Energy Efficient Learning Automata Q-Learning Random Access Channel (EELA-RACH) Access Scheme to improve energy efficiency. The proposed EELA-RACH scheme employs a Distributed Learning Automata (DLA) technique based on Learning Automata (LA) feedback to minimise the energy consumed during updating Q-value and storing transmission history. The scheme also utilizes an adaptive duty cycle assignment to control the energy consumption of the Machine-to-Machine (M2M) devices within the cellular M2M communication cycle. The results show that the proposed EELA-RACH scheme achieves better performance compared to the Prioritized Learning Automata Q-Learning RACH (PLA-QL-RACH) and an Enhanced Learning Automata QL-RACH (ELA-QL-RACH) schemes with 9.41% and 65.72% decrease in energy consumption and increase in device lifetime, respectively.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Classification Algorithms for Phishing Detection: A Comparative Appraisal and Analysis 网络钓鱼检测的机器学习分类算法:比较评价与分析
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949632
Noah Ndakotsu Gana, S. Abdulhamid
{"title":"Machine Learning Classification Algorithms for Phishing Detection: A Comparative Appraisal and Analysis","authors":"Noah Ndakotsu Gana, S. Abdulhamid","doi":"10.1109/NigeriaComputConf45974.2019.8949632","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949632","url":null,"abstract":"Exponential growth experienced in Internet usage have pave way to exploit users of the Internet, phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false positive rate and low accuracy has been a setback in phishing detection. In this research RandomForest, SysFor, SPAARC, RepTree, RandomTree, LMT, ForestPA, JRip, PART, NNge, OneR, AdaBoostM1, RotationForest, LogitBoost, RseslibKnn, LibSVM, and BayesNet were employed to achieve the comparative analysis of machine classifier. The performance of the classifier algorithms were rated using Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operation Characteristics Area, Root Relative Squared Error False Positive Rate and True Positive Rate using WEKA data mining tool. The research revealed that quit a number of classifiers also exist which if properly explored will yield more accurate results for phishing detection. RondomForest was found to be an excellent classifier that gives the best accuracy of 0.9838 and a false positive rate of 0.017. The comparative analysis result indicates the achievement of low false positive rate for phishing classification which suggest that anti-phishing application developer can implement the machine learning classification algorithm that was discovered to be the best in this study to enhance the feature of phishing attack detection and classification.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Conceptual Framework for Detection of Learning Style from Facial Expressions using Convolutional Neural Network 基于卷积神经网络的面部表情学习风格检测的概念框架
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949656
F. L. Gambo, G. Wajiga, E. J. Garba
{"title":"A Conceptual Framework for Detection of Learning Style from Facial Expressions using Convolutional Neural Network","authors":"F. L. Gambo, G. Wajiga, E. J. Garba","doi":"10.1109/NigeriaComputConf45974.2019.8949656","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949656","url":null,"abstract":"There are millions of learning materials over the internet that students can use to assimilate new information. But once their preferred learning style is known, they can be provided with a responsive recommendation so that can focus more on representations that will foster their understanding. Providing students with preferred learning object no doubt increase their motivation and hence their learning outcome. Identifying student’s learning styles allows them to learn better and faster through several means. Traditionally, a test (use of questionnaire) is usually conducted for automatic detection and prediction of student’s learning preferences particularly in e-learning. This approach though valid and reliable in detection of learning styles, but it is also associated with many challenges; learner self-report bias, individual earning styles may vary over time, Students not aware of the importance or the future uses of the questionnaire. To this end, this paper proposed a conceptual framework for detection of learning style from facial expression using Convolution neural network.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"s3-19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hospital Electronic Queuing Solution System 医院电子排队解决系统
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949662
Ajekiigbe Enoch Seun, U. I. Bature, K. I. Jahun, A. Y. Nasir, A. M. Hassan, U. S. Toro
{"title":"Hospital Electronic Queuing Solution System","authors":"Ajekiigbe Enoch Seun, U. I. Bature, K. I. Jahun, A. Y. Nasir, A. M. Hassan, U. S. Toro","doi":"10.1109/NigeriaComputConf45974.2019.8949662","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949662","url":null,"abstract":"Queuing is a major challenge for healthcare services all over the world, but particularly in developing countries. Application of queuing theory to enhance decision making to improve this problem is not commonly used by managers in developing countries in contrast to their counterparts in the developed world. In many hospitals, Patients wait for long time in the healthcare facility before they are attended to by the health personnel. This project presents the design and implementation of Automatic Hospital Queue Management System. The system operates on an input/output basis; centered on a programmed ATMEGA328p microcontroller. The system receives the input from the client on the device through the use of RFID card reader which reads the card of the patient and therefore a number will be assigned to the patient, whereby he or she will therefore proceed to the appropriate sit assigned. When a doctor is available a receptionist will therefore press the button of the next available doctor whereby this action then triggers a record of the next patient on the queue by calling it through a speaker and displaying it on the (LCD).","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Tenancy Cloud-Enabled Small Cell Security 支持多租户云的小单元安全性
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949667
B. Abubakar, H. Mouratidis
{"title":"Multi-Tenancy Cloud-Enabled Small Cell Security","authors":"B. Abubakar, H. Mouratidis","doi":"10.1109/NigeriaComputConf45974.2019.8949667","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949667","url":null,"abstract":"The anticipated technological advancement of 5th Generation (5G) network is the ability to apply intelligence directly to network’s edge, in the form of virtual network appliances through the archetypes of Network Functions Virtualisation (NFV) and Edge Cloud Computing.The adoption and use of innovative technologies, such as Software Defined Networking (SDN) and NFV is the key to making 5G networks more promising. However, implementing these technologies yield to the imaging of new security challenges. A Cloud-Enabled Small Cell (CESC) provides multi-operator platform to integrates and execute at the virtualised environment. Providing services to multiple operators/tenants to access technologies and protocols in unified network architecture requires well-define security approach in order to deliver secured data communication, privacy and integrity. The CESC security requirement analysis was carried out using Secure Tropos (SecTro) methodology. The paper will thoroughly examine the CESC security challenges and provide possible solutions to mitigate those challenges.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121144412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Cultural Evolution-Based Nomadic Pastoralist Optimization Algorithm (NPOA): The Mathematical Models 基于文化进化的游牧牧民优化算法(NPOA):数学模型
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949635
Ibrahim M. Abdullahi, M. B. Mu'azu, O. Olaniyi, J. Agajo
{"title":"A Novel Cultural Evolution-Based Nomadic Pastoralist Optimization Algorithm (NPOA): The Mathematical Models","authors":"Ibrahim M. Abdullahi, M. B. Mu'azu, O. Olaniyi, J. Agajo","doi":"10.1109/NigeriaComputConf45974.2019.8949635","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949635","url":null,"abstract":"In this paper, the mathematical models for a proposed novel modified Pastoralist Optimization Algorithm (POA) called the Nomadic Pastoralist Optimization Algorithm (NPOA) inspired by the nomadic pastoralists herding strategies and cultural evolution strategy is presented. The nomadic pastoralist herding strategies which are scouting, camping, herding, splitting and merging were mathematically modeled. The mathematical models will be used to develop the proposed algorithm. The algorithm when developed will be tested on several benchmark functions to ascertain the algorithms exploration and exploitative ability. The performance will also be validated by comparing with POA and other popular and similar metaheuristic algorithms such as GOA, PSO, ABC, BBO and ICA","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of a Data Transmission System using Li-Fi Technology 基于Li-Fi技术的数据传输系统的实现
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949659
E. Ifada, N. Surajudeen-Bakinde, N. Faruk, A. Abubakar, O. O. Mohammed, A. O. Otuoze
{"title":"Implementation of a Data Transmission System using Li-Fi Technology","authors":"E. Ifada, N. Surajudeen-Bakinde, N. Faruk, A. Abubakar, O. O. Mohammed, A. O. Otuoze","doi":"10.1109/NigeriaComputConf45974.2019.8949659","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949659","url":null,"abstract":"Over the years, the overdependence on Wireless Fidelity (Wi-Fi) for data transmission necessitated the need for an alternate and more reliable means of communication, hence, Light Fidelity (Li-Fi). It involves the use of Light Emitting Diode to transmit data by blinking (i.e. switching them On and Off) at a speed not noticeable to the eye. This paper proposed the development of the Li-Fi system using off the shelf electronic components. The proposed system utilizes an embedded system with dual-core Advanced Virtual RISC (AVR) microcontroller (ATmega16L) interfaced to input/output circuits comprising of the Light Emitting Diode (LED), LM358N Operational Amplifier and a photodiode. Also, by developing a user (Receiver PC) interface using JAVA programming, the sample data (text) transferred was monitored and the speed, efficiency, security and capacity of the system was examined and discovered to be top notch. This would make the system an indispensable means of communication in the nearest future. This data transmission system is different from those in existence because expensive components were not in the design, invariably reducing the overall cost of the implementation.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114069101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Intrusion Detection System Based on Support Vector Machine Optimised with Cat Swarm Optimization Algorithm 基于Cat群算法优化的支持向量机入侵检测系统
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949676
S. Idris, O. Oyefolahan Ishaq, N. Ndunagu Juliana
{"title":"Intrusion Detection System Based on Support Vector Machine Optimised with Cat Swarm Optimization Algorithm","authors":"S. Idris, O. Oyefolahan Ishaq, N. Ndunagu Juliana","doi":"10.1109/NigeriaComputConf45974.2019.8949676","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949676","url":null,"abstract":"intrusion detection system (IDS) like firewall, access control and encryption mechanisms no longer provide the much-needed security for systems and computer networks. Current IDS are developed on anomaly detection which helps to detect known and unknown attacks. Though, these anomaly-based IDS feature a high false rate. To reduce this false alarm rate, in this paper, we proposed an intrusion detection model based on support vector machine (SVM) optimized with Cat swarm optimization (CSO) algorithm. We use the information gain (IG) for attribute reduction and perform classification using the optimized Support vector. The result obtained shows that our model performs well with the least false alarm rate and good accuracy value compare with other classification algorithms evaluated using the same datasets.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Speed Control of a Three Phase Induction Motor using a PI Controller 用PI控制器控制三相异步电动机的速度
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) Pub Date : 2019-10-01 DOI: 10.1109/NigeriaComputConf45974.2019.8949624
G. Olarinoye, C. Akinropo, G. J. Atuman, Z. Abdullahi
{"title":"Speed Control of a Three Phase Induction Motor using a PI Controller","authors":"G. Olarinoye, C. Akinropo, G. J. Atuman, Z. Abdullahi","doi":"10.1109/NigeriaComputConf45974.2019.8949624","DOIUrl":"https://doi.org/10.1109/NigeriaComputConf45974.2019.8949624","url":null,"abstract":"Three-phase Induction motors are typically used in an increasing variety of applications such as fans, milling machines, transportation, etc. This paper discusses the speed control of the three-phase induction motor and an associated PI controller. A model of the three-phase induction motor is presented, analyzed and used to demonstrate the effectiveness of the speed controller. The performance of the motor system is carefully examined and compared with and without the PI controller. The unit step response of the speed control loop is characterized by rise time, peak overshoot, settling time and steady state error of 0.0815s, 6.97%, 0.82 and 0.11% respectively. Simulation results show that the speed of the uncontrolled motor changed whereas that of the controlled motor returned quickly to its initial value after the motor is subjected to load changes from 1 pu to 0.5 pu and subsequently to 0.25 pu.","PeriodicalId":228657,"journal":{"name":"2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信