{"title":"Evaluation of Level of Service of Traffic at Major Road Intersections in Ibadan, Nigeria","authors":"Soladoye","doi":"10.7176/jiea/9-7-05","DOIUrl":"https://doi.org/10.7176/jiea/9-7-05","url":null,"abstract":"Osuolale, O. M., Durodola, T. A. and Soladoye, E. O. Department of Civil Engineering, Faculty of Engineering and Technology, Ladoke Akintola University of Technology, PMB 4000, Ogbomoso. Nigeria. E-mail: omosuolale@lautech.edu.ng Abstract Transportation has been of immense benefits to the social, economic and political development of communities, however, it is sometimes characterised with negative impacts such as traffic congestions, delays, environmental pollutions and crashes. In this study, the level of service of selected major road intersections in Ibadan were investigated. Traffic volume of each intersection approach was conducted from 7am 7pm on Mondays, Wednesdays and Saturdays, delay studies were carried out during the morning, afternoon and evening peak hours and level of service for each approach was determined from the average delay per vehicle. The traffic volume reveals that passenger cars are the predominant vehicles at all the approaches and the morning and afternoon peak hours occurred between 8 to 9am and 2 to 3pm, respectively. The level of service for all the approaches is B, indicating slight reduction in capacity of the intersections.","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strength and Workability Improvement Potential of Admixture of Corn Cob Ash and Cement for Stabilizing Lateritic Soil","authors":"","doi":"10.7176/jiea/9-7-06","DOIUrl":"https://doi.org/10.7176/jiea/9-7-06","url":null,"abstract":"A natural lateritic soil classified as A-7-5 (10) and CL based on AASHTO and USCS classification systems, was stabilized with up to 5% cement admixed with up to 12% CCA to assess their effect on its basic geotechnical properties such as particle size distribution, Atterberg limits, compaction, unconfined compressive strength and California bearing ratio. The liquid limit decreased and plastic limit increased while there is a reduction in corresponding plasticity index of the clay soil. There was an increase in Maximum Dry Density (MDD) and Optimum Moisture Content (OMC) of the stabilized soil sample, which increased with the increasing content of CCA and cement. Both the Unconfined Compressive Strength (UCS) and California Bearing Ratio (CBR) of the soil increased with increasing percentage of cement and CCA. Based on the results of this study, corn cob ash (CCA) cannot be used as a stand-alone stabilizer for this lateritic soil but with a more potent stabilizer for clay soil such as lime. It is therefore recommended that the mixture of 12% CCA and 2.5% cement could be used to stabilize A-7-5 (10) lateritic soil for use as subbase material and 12% CCA and 5.0% cement could be used to stabilize A-7-5 (10) lateritic soil for use as base material for improving pavement structure in terms of strength, 9 % for 0 to 5% cement and then increased. The decrease in the percentage fine content up to 9% results from the flocculation and agglomeration of soil-CCA mixture coupled with pozzolanic reaction between cement and CCA which both produce hydrated calcium silicates (CHS) and hydrated calcium aluminates (CHA) which act as binder for the fine particles within the soil and hence reduction in the fine content as the percentage CCA increases.","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Line Blood Bank Management System: A Web Application","authors":"M. Hamza","doi":"10.7176/jiea/9-6-01","DOIUrl":"https://doi.org/10.7176/jiea/9-6-01","url":null,"abstract":"The objective of this paper is that the management of the blood and detail of the donors. Online blood bank system” is a web application that allows to access the whole information about blood bank management system, readily scalable and adaptable to meet the complex need of blood bank who is the key facilitator for the health care sector it also supports all the functionalities of blood bank. It is used for maintaining information about the Donor. The project includes main modules admin, donor, blood request, blood bank and helpdesk. It maintains all the information of donor and all the record of blood requests and the available blood. The Blood Bank system helps the people who are in need of a blood by giving them all details of blood group availability or regarding the donors. Keywords: Blood Bank Management, Web Application, Donor, Acceptor DOI : 10.7176/JIEA/9-6-01 Publication date :October 31 st 2019","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127857500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Contracts Implementation, Applications, Benefits, and Limitations","authors":"Silas Nzuva","doi":"10.7176/jiea/9-5-07","DOIUrl":"https://doi.org/10.7176/jiea/9-5-07","url":null,"abstract":"The world today has realized the vast technological evolution that has greatly shaped the production and management functions of business enterprises. Traditional contracts can take weeks or even months to initiate, and there have been numerous instances of breaches and lack of trust for contracts in both the private and public sector. A smart contract can be defined as a self-executing contract that utilizes blockchain technology to digitally enforce, verify, or facilitate the performance or negotiation of a contract. Owing to the security and decentralized system exhibited by blockchain technology, smart contracts can foster transaction credibility between contracting parties without the necessity of third parties as exhibited in traditional contracts. Any business organization that aims at achieving greater heights in management and production dimensions must consider utilizing robust technologies that are aimed at bolstering its competitive edge. Owing to the newness of smart contracts, characterized by very few studies on the same, this research reviews how smart contracts through blockchain technology can be implemented in an organization to enhance performance and outlines the applications, benefits, and limitations associated with such contracts. Keywords: Blockchain technology; smart contracts; smart contract applications; smart contract benefits; smart contract implementation; cryptography; cryptocurrency DOI : 10.7176/JIEA/9-5-07 Publication date :September 30 th 2019","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-CRM on the Relationships Quality and Its Consequences: Evidence from Iranian Private Banks","authors":"Sahar Hatami","doi":"10.7176/jiea/9-5-01","DOIUrl":"https://doi.org/10.7176/jiea/9-5-01","url":null,"abstract":"The importance and urgency of the subject Low rates of e-services and research in the department of Electronical Customer Relationship Management (E-CRM) in banking system of the country, particularly is from the perspective of clients, the research investigated E-CRM on the relationships quality and it’s consequences: evidence from Iranian the private banks, Therefore a questionnaire adapted from George et all and Abdallah scale be determined in the statistical community between private’s bank electronic customers of 388 people, after collecting information and data, the questionnaire designed by Likert scale and obtained by use of random sampling, and evaluated and analyzed by structural equations model method and LIZREL software. Data results show that E-CRM had a positive and meaningful effect on the relationships quality and the consequences of customers that include 7 component such as: communication channels, the overall quality of communication, confidence, satisfaction, loyalty, maintenance and the tendency to compromise.The results of research was confirmed the impact and importance of E-CRM on the quality dimensions and relationships consequences with customers like The satisfaction, loyalty and maintenance. Keywords: Customer Relationship Management , Electronical Customer, Relationships Quality. DOI : 10.7176/JIEA/9-5-01 Publication date : August 31 st 2019","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129287775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Ensemble Technique to Improve Multiclass Classification","authors":"Dalton Ndirangu, W. Mwangi, L. Nderu","doi":"10.7176/jiea/9-5-04","DOIUrl":"https://doi.org/10.7176/jiea/9-5-04","url":null,"abstract":"Many real world applications inevitably contain datasets that have multiclass structure characterized by imbalance classes, redundant and irrelevant features that degrade performance of classifiers. Minority classes in the datasets are treated as outliers’ classes. The research aimed at establishing the role of ensemble technique in improving performance of multiclass classification. Multiclass datasets were transformed to binary and the datasets resampled using Synthetic minority oversampling technique (SMOTE) algorithm. Relevant features of the datasets were selected by use of an ensemble filter method developed using Correlation, Information Gain, Gain-Ratio and ReliefF filter selection methods. Adaboost and Random subspace learning algorithms were combined using Voting methodology utilizing random forest as the base classifier. The classifiers were evaluated using 10 fold stratified cross validation. The model showed better performance in terms of outlier detection and classification prediction for multiclass problem. The model outperformed other well-known existing classification and outlier detection algorithms such as Naive bayes, KNN, Bagging, JRipper, Decision trees, RandomTree and Random forest. The study findings established that ensemble technique, resampling datasets and decomposing multiclass results in an improved classification performance as well as enhanced detection of minority outlier (rare) classes. Keywords: Multiclass, Classification, Outliers, Ensemble, Learning Algorithm DOI : 10.7176/JIEA/9-5-04 Publication date : August 31 st 2019","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Model for Likelihood of Detecting Chronic Kidney Failure and Disease Using Fuzzy Logic","authors":"M. Ajinaja, Kehinde Wiilams","doi":"10.7176/jiea/9-3-04","DOIUrl":"https://doi.org/10.7176/jiea/9-3-04","url":null,"abstract":"Fuzzy logic is highly appropriate and valid basis for developing knowledge-based systems in medicine for different tasks and it has been known to produce highly accurate results. Examples of such tasks include syndrome differentiation, likelihood survival for sickle cell anaemia among paediatric patients, diagnosis and optimal selection of medical treatments and real time monitoring of patients. For this paper, a Fuzzy logic-based system is untaken used to provide a comprehensive simulation of a prediction model for determining the likelihood of detecting Chronic Kidney failure/diseases in humans. The Fuzzy-based system uses a 4-tuple record comprising of the following test taken: Blood Urea Test, Urea Clearance Test, Creatinine Clearance test and Estimated Glomerular Filtrate rate (eGFR). Understanding of the test was elicited from a private hospital in Ibadan through the help of an experienced and qualified nurse which also follows same test according to National Kidney Foundation. This knowledge was then used in the developing the simulated and rule-base prediction model using MATLAB software. The paper also follows the 3 major stages of Fuzzy logic. The results of fuzzification of variables, inference, model testing and defuzzification of variables was also presented. This in turn simplifies the complication involved in detecting Chronic Kidney failure/disease using Fuzzy logic based model. Keywords: Fuzzy logic, prediction model, likelihood, chronic kidney disease/failure DOI : 10.7176/JIEA/9-3-04 Publication date :May 31 st 2019","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133323464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Reservation Management System - Case Study: Grand Ville Hotels","authors":"K. Williams, A. Micheal","doi":"10.4172/2165-7866.1000243","DOIUrl":"https://doi.org/10.4172/2165-7866.1000243","url":null,"abstract":"The management and booking of Rooms in hotels is a tedious and complicated task especially if it is done manually. Keeping track of large customers and all their details requires an inordinate space for file cabinets, not to mention the time the hotel administrator would spend going back and forth to file cabinets so as to look up each customer’s information. This is why a good hotel reservation system is needed to make this task as easy as possible. This paper shows how the noted complicated human task can be solved by using a database Management System together with scripting and programming languages like Html and PHP respectively as the key tools in the development of a hotel reservation System. The system was developed using the object-oriented software development approach which includes the use of object-oriented analysis, object- oriented design and object-oriented programming. This was done so that the developed software can be maintainable, reliable and scalable. Keywords: reservation, management, system DOI : 10.7176/CEIS/10-4-05 Publication date :May 31 st 2019","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).","authors":"Felix. C. Aguboshim, J. I. Udobi","doi":"10.7176/jiea/8-1-07","DOIUrl":"https://doi.org/10.7176/jiea/8-1-07","url":null,"abstract":"The use of employee-owned mobile devices such as smart phones, tablets, laptops, etc., to access business enterprise content or networks otherwise referred to as of ‘Bring Your Own Device’ (BYOD) has further made the confidentiality, integrity, and availability of organizations’ data become insecure, and prone to breaches and fraudulent activities. In this study, the authors explored a narrative review that focuses on the theoretical underpinnings of vast works of literature that revealed significant information on the conceptual framework, existing systems that adopt BYOD security, analysis, and synthesis of prior research. Using some keywords “BYOD system security”, “BYOD security threats”, “cyber-attacks and security”, etc., an electronic database search extracted peer-reviewed articles from the last five years. The thematic analysis of fifty-one articles retrieved revealed that breaches and fraudulent activities exist with the use of BYOD that may be perpetrated against organization’s data, intentionally or maliciously. Good policies and guidelines on the use of BYOD coupled with good formulation and communication of same, should be adhered to avert some forms of security breaches. There is the need to preserve user’s privacy, organizations’ data confidentiality, integrity, and availability, and secure same in the devices of employees using their own devices to process corporate and personal data, by using acceptable and effective BYOD Policy and Mobile Device Management Solution (MDMS). This may increase mutual trust and BYOD adoption rate, new innovations and influence that can positively impact the organizations and their employees. Keyword: BYOD, security threats, password, cyber-attacks and security, Information security. DOI : 10.7176/JIEA/8-1-07","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132187004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Fuzzy Logic-Based Model for Diagnosis of Hepatitis B","authors":"M. Ajinaja, K. Williams","doi":"10.7176/jiea/8-1-02","DOIUrl":"https://doi.org/10.7176/jiea/8-1-02","url":null,"abstract":"Hepatitis B is an infection of the liver by the hepatitis B virus. According to Nigerian treatment guidelines, it is estimated that about 23 million people in Nigeria are currently affected with the disease. It is a key world-wide health problem. This paper is necessitated with the need to develop a fuzzy logic-based model for proper diagnosis of the virus hepatitis B using blood tests. An extensive interview was conducted with a licenced medical personnel at the federal polytechnic Ile Oluji medical centre located at Ondo state, Nigeria. A fuzzy logic-based system is untaken which is used to simulate the diagnosis of hepatitis B in humans using 3-turple record which are HBsAg (Hepatitis B surface antigen), anti-HBs or HBsAb (Hepatitis B surface antibody) and anti-HBc or HBcAb (Hepatitis B core antibody). Triangular membership function were used to fuzzify both inputs and outputs while the fuzzy inference engine was used to develop the rules using MATLAB fuzzy logic toolbox software. The model will help in proper diagnosis of the virus and steps to be taken for treatment. ACM CCS (2012) Classification : 1. Theory of computation → Logic → Modal and temporal logics Key Words : Fuzzy logic; diagnosis; hepatitis b; DOI : 10.7176/JIEA/8-1-02","PeriodicalId":440930,"journal":{"name":"Journal of Information Engineering and Applications","volume":"30 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}