Department of Computer Science
Permanent URI for this community
Browse
Browsing Department of Computer Science by Issue Date
Now showing 1 - 20 of 107
Results Per Page
Sort Options
- ItemDevelopment of an Intrusion Detection System in a Computer Network.(International Journal of Computers & Technology., 2014-03-14) Babatunde, R. S., Adewole K. S., Abdulsalam S. O. and Isiaka R. M. (2014)The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic.
- ItemDevelopment of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution.(Computer Engineering and Intelligent Systems., 2014-04-13) Adewole, K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M. and Oloyede M. O. (2014)Institutions, companies and organisations where security and net productivity is vital, access to certain areas must be controlled and monitored through an automated system of attendance. Managing people is a difficult task for most of the organizations and maintaining the attendance record is an important factor in people management. When considering the academic institute, taking the attendance of non-academic staff on daily basis and maintaining the records is a major task. Manually taking attendance and maintaining it for a long time adds to the difficulty of this task as well as wastes a lot of time. For this reason, an efficient system is proposed in this paper to solve the problem of manual attendance. This system takes attendance electronically with the help of a fingerprint recognition system, and all the records are saved for subsequent operations. Staff biometric attendance system employs an automated system to calculate attendance of staff in an organization and do further calculations of monthly attendance summary in order to reduce human errors during calculations. In essence, the proposed system can be employed in curbing the problems of lateness, buddy punching and truancy in any institution, organization or establishment. The proposed system will also improve the productivity of any organization if properly implemented.
- ItemLocal Binary Pattern and Ant Colony Optimization Based Feature Dimensionality Reduction Technique for Face Recognition Systems.(Journal of Advances in Mathematics and Computer Science, 2015-04-13) Babatunde, R.S, Olabiyisi, S. O., Omidiora, E. O. and Ganiyu, R. A. (2015)Feature dimensionality reduction is the process of minimizing the number of features in high dimensional feature space. It encompasses two vital approaches: feature extraction and feature selection. In face recognition domain, widely adopted face dimensionality reduction techniques include Principal component analysis, Discrete wavelet transform, Linear discriminant analysis and Gabor filters. However, the performances of these techniques are limited by strict requirement of frontal face view, sensitivity to signal shift and sample size, computational intensiveness amongst others. In this paper, a feature dimensionality reduction technique that employed Local binary pattern for feature extraction and Ant colony optimization algorithms for the selection of optimal feature subsets was developed. The developed technique identified and selected the salient feature subsets capable of generating accurate recognition. The average training time, recognition time and recognition rate obtained from the experiment on locally acquired face data using cross-validation evaluation approach indicate an efficient performance of the potential combination of both methods in a two-level technique for dimensionality reduction
- Item: Assessing the performance of Random Partitioning and K-Fold Cross Validation methods of evaluation of a Face Recognition System.(Journal of Advances in Image and Video Processing, 2015-06-08) Babatunde, R. S, Olabiyisi S. O, Omidiora E. O, Ganiyu, R. A. and Isiaka, R. M. (2015)Face recognition has been an active research area in the pattern recognition and computer vision domains due to its many potential applications in surveillance, credit cards, passport and security. However, the problem of correct method of partitioning the face data into train and test set has always been a challenge to the development of a robust face recognition system. The performance of the System was tested on locally acquired face database when the face database was randomly partitioned and when k-fold Cross Validation partition was used. The face database was captured under the condition of significant variations of rotation, illumination and facial expression. Quantitative evaluation experimental results showed that Random Sampling technique has a higher average recognition rate (96.7%) than Cross Validation partition method (95.3%). However, recognition time in Cross Validation is faster (0.36 secs) than that of Random Sampling (0.38 secs).
- ItemRedundant Residue Number System Based Fault Tolerant Architecture for Communication System(Proceedings of the 1St International Conference of IEEE Nigeria Computer Chapter In collaboration with Department of Computer Science, University of Ilorin, Ilorin, Nigeria - 2016, 2016) Kadri Akeem Femi; Saheed Yakub Kayode; Gbolagade Kazeem AlagbeThis paper proposed the Redundant Residue Number System based Code Division Multiple Access over a communication channel. The Coded transmission technique applied in a multipath environment has a Bit Error Rate comparable to that of a narrow band radio channel due to the fact that the fading of each subcarrier is frequency non-selective. The existing scheme requires large block of data and higher overhead. Moreover, simple error detection such as parity check bit is too weak for communication in which quality of radio channel is often poor and burst error often occurs. These aforementioned shortcomings reduce the performance of the CDMA. In this paper, an alternative scheme to detect and correct error, in order to increase performance and also to eliminate the higher overhead in the present CDMA scheme is presented. We use length five (5) moduli set [2n, 2n – 1, 2n + 1, 2n - 2(n+1)/2 + 1, 2n +2(n+1)/2 + 1], where (2n - 2(n+1)/2 + 1, 2n +2(n+1)/2 + 1) is the redundant moduli set which is used for the correction of error. The proposed scheme increases the performance of CDMA and provides more capability for fault-tolerance than those similar of the state-of the-art.
- ItemHandwritten Character Recognition using Brainnet Library,(Annals. Computer Science Series Journal, Published by Faculty of Computers and Applied Computer Science, Tibiscus University of Trinisoara, Romania., 2016-02-15) Babatunde, A. N., Abikoye, O.C., Babatunde, R.S. and Kawu, R.O. (2016)Handwriting has continued to persist as a means of communication and recording information in dayto- day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition of handwriting has practical significance, as in reading handwritten notes in a PDA, in postal addresses on envelopes, in amounts in bank checks, in handwritten fields in forms, etc. An off-line handwritten alphabetical character recognition system using multilayer feed forward neural network is described, and a method, called, diagonal based feature extraction is used for extracting the features of the handwritten alphabets. This project implements this methodology using BrainNet Library. Ten data sets, each containing 26 alphabets written by various people, are used for training the neural network and 130 different handwritten alphabetical characters are used for testing. The proposed recognition system performs quite well yielding higher levels of recognition accuracy compared to the systems employing the conventional horizontal and vertical methods of feature extraction. This system, if modified will be suitable for converting handwritten documents into structural text form and recognizing handwritten names.
- ItemA novel approach to outliers removal in a noisy numeric dataset for efficient Mining.(Published by Faculty of Computing and Information Systems, University of Ilorin., 2016-02-16) Ajiboye, A. R, Adewole, K. S., Babatunde, R. S. and Oladipo, I. D. (2016):Data pre-processing is a key task in the data mining process. The task generally consumes the largest portion of the total data engineering effort while unveiling useful patterns from datasets. Basically, data mining is about fitting descriptive or predictive models from data. However, the presence of outlier sometimes reduces the reliability of the models created. It is, therefore, essential to have raw data properly pre-processed before exploring them for mining. In this paper, an algorithm that detects and removes outliers in a numeric dataset is proposed. In order to establish the effectiveness of the proposed algorithm, the clean data obtained through the implementation of the proposed approach is used to create a prediction model. Similarly, the clean data obtained through the use of one of the existing techniques is also used to create a prediction model. Each of the models created is simulated using a set of untrained data and the error associated with each model is measured. The resulting outputs from the two approaches reveal that, the prediction model created using the output from the proposed algorithm has an error of 0.38, while the prediction model created using the cleaned data from the clustering method gives an error of 0.61. Comparison of the errors associated with the models created using the two approaches shows that, the proposed algorithm is suitable for cleaning numeric dataset. The results of the experiment also unveils that, the proposed approach is efficient and can be used as an alternative technique to other existing cleaning methods.
- ItemImplications of System Identification Techniques on ANFIS E-learners Activities Models-A Comparative Study.(Transactions on Machine Learning and Artificial Intelligence,, 2016-04-11) Isiaka, R. M., Omidiora, E. O. Olabiyisi, S. O., Okediran O.O. and Babatunde, R. S. (2016):Efficient e-learners activities model is essential for real time identifications and adaptive responses. Determining the most effective Neuro- Fuzzy model amidst plethora of techniques for structure and parameter identifications is a challenge. This paper illustrates the implication of system identification techniques on the performance of Adaptive Network based Fuzzy Inference System (ANFIS) E-learners Activities models. Expert knowledge and Historical data were used to formulate the system and their performances were compared. Similarly, comparison was made between memberships functions selected for Historical data identification. The efficiencies of the simulated models in MATLAB editor were determined using both classification uncertainty metrics and confusion matrix–based metrics. The classification uncertainty metrics considered are Mean Absolute Error (MAE) and Root Mean-Squared Error (RMSE). The confusion matrix-based metrics used are Accuracy, Precision and Recall. It was discovered that the model based on Experts Knowledge after training outperformed those based on Historical Data. The performances of the Membership Functions after ranking are Sigmoid, Gaussian, Triangular and G-Bells respectively.
- ItemGender Recognition using Local Binary Pattern and Naïve Bayes Classifier(African Journal Online. Published by Nigeria Computer Society Journal. Journal of Computer Science and its Applications, 2016-10-24) Babatunde, R. S., Abdulsalam, S. O., Yusuff, S. R., and Babatunde, A. N. (2016):Human face provides important visual information for gender perception. Ability to recognize a particular gender is very important for the purpose of differentiation. Automatic gender classification has many important applications, for example, intelligent user interface, surveillance, identity authentication, access control and human-computer interaction amongst others. Gender recognition is a fundamental task for human beings, as many social functions critically depend on the correct gender perception. Consequently, real-world applications require gender classification on real-life faces, which is much more challenging due to significant appearance variations in unconstrained scenarios. In this study, Local Binary Pattern is used to detect the occurrence of a face in a given image by reading the texture change within the regions of the image, while Naive Bayes Classifier was used for the gender classification. From the results obtained, the gender correlation was 100% and the highest accuracy of the result obtained was 99%.The system can be employed for use in scenarios where real time gender recognition is required.
- ItemStudent Identity Card Based On Advanced Quick Response Code Technology(Computing, Information Systems, Development Informatics & Allied Research Journal V, 2016-12-01) Kadri A. F.; Saheed Y.K; Salau-Ibrahim T.TAll academic institutions have certain means for student’s identity. Student identity card is an indispensable means of identification for every student’s in Africa Universities and beyond. In this paper, we advance the current means of identification in Al-Hikmah University which is the student identification card by designing and developing a Quick Response code student identity card to replace the current student Identity card. We adopted the use of Quick Response (QR) code to generate student based identification card which can be achieved through the use of a virtual Server that keeps student record, generate a QR code using QR generator which will hold the link to each student details on the server. The developed system identifies students by scanning the QR code placed on the back of the student’s identification card. Each black and whites box on the code, when scan is translated to digital information; which allows the computer to access the database and provide the student academic record. This new system which enhances data integrity and confidentiality ensures that there is a unique way of identifying an individual as an Al-Hikmah University student.
- Itemscreening of prosopsis africana for antimicrobial activity against selected oral pathogens(Nig. J. Pure & Appl. Sci., 2017) FAUSAT ABIMBOLA JIMOHProsopis africana, a chewing stick popularly used in the South Western part of Nigeria was examined for antimicrobial activity against Lactobacillus casei ATCC 334, Staphylococcus aureus ATCC 35218, Candida albicans ATCC 10231, Escherichia coli ST2747 and Streptococcus mutans using agar well diffusion method. Extraction was done using ethanol and distilled water. The plant was screened for its phytochemical components. Gas chromatography mass spectrometry analysis was done to detect the secondary metabolites. All the extracts showed antimicrobial activity against the organisms with zones of inhibition ranging from 3.33±0.29 - 13.83±1.61mm except Staphylococcus aureus ATCC 35218 which was resistant to aqueous extract of the dried sample. Statistical analysis of data showed that there was no significant difference in the antimicrobial effects of ethanolic and aqueous extracts of the plant samples at 95% confidence intervals. The phytochemical screening result showed that phenols, alkaloids, sterols, triterpenes and saponins are components of the chewing stick. Also, fatty acids such oleic, palmitic and stearic acids were chemical constituents detected in the plant extracts by GC-MS. The results obtained in this study indicate that P. africana will be useful in the treatment of oral infections.
- ItemFingerprint Based Approach For Examination Clearance in Higher Institution(FUOYE Journal of Engineering and Technology., 2017) A.F. Kadri; Y.K. SaheedBiometric techniques have become a prominent option and secured means of authentication capable of sustaining the emerging ubiquitous computing. The process for allowing students to sit for an examination has been through the presentation of medium of identification such as ID cards, library cards, fees clearance cards, photo cards, etc. This method of authenticating a student for an examination has an obvious problem such as presentation of fake clearance card, impersonation and so on. The unethical manner associated with the examination is a grim issue that require the stakeholders in academic area to seek for alternative means of authenticating student for examination because, the manual paper-based clearance process is fundamentally flawed. This paper addressed all the aforementioned shortcomings and revealed the effectiveness of biometric system using fingerprint for examination clearance. The proposed examination clearance system used fingerprint identification. In identification, the system recognizes an individual by comparing his/her biometrics with every record in the database.
- ItemAn Evaluation of performance of k-NN and Mahalanobis Distance on Local Binary Pattern Feature representation for Access Control in Face Recognition System.(The Creative Research Networks for The African Society for Information & Communication Technology, USA, 2017-03) Yusuff, S. R.; Balogun, F. B.; Babtunde A. N.; Babatunde, R. S.A vast majority of the existing face recognition techniques encounter misclassifications when there is a large variation of the subject in terms of pose, illumination and expression as well as artefact such as occlusion. With the usage of Local Binary Pattern (LBP), local feature representation which preserves local primitives and texture information, robust against illumination, expression and occlusion was realized in the feature extraction process. Mahalanobis distance and k-NN classifier were employed for recognition as basis for comparison. An assessment of both algorithms was considered. It was observed that Mahalanobis distance measure outperformed the k-NN classifier for access control and recognition system due to its high recognition rate (98.4%), genuine acceptance rate (98.37) and its stern adherence to both FAR and FRR (0.0144, 1.568) than kNN with 94.9% and (0.392 and 2.895) respectively. This result demonstrates the robustness of Mahalanobis distance classifier for use access control system
- ItemAn Evaluation of performance of k-NN and Mahalanobis Distance on Local Binary Pattern Feature representation for Access Control in Face Recognition System.(Computing, Information Systems & Development Informatics Journal, 2017-04-11) Yusuff, S.R., Balogun, F.B., Babatunde, A.N. and Babatunde, R.S. (2017)A vast majority of the existing face recognition techniques encounter misclassifications when there is a large variation of the subject in terms of pose, illumination and expression as well as artefact such as occlusion. With the usage of Local Binary Pattern (LBP), local feature representation which preserves local primitives and texture information, robust against illumination, expression and occlusion was realized in the feature extraction process. Mahalanobis distance and k-NN classifier were employed for recognition as basis for comparison. An assessment of both algorithms was considered. It was observed that Mahalanobis distance measure outperformed the k-NN classifier for access control and recognition system due to its high recognition rate (98.4%), genuine acceptance rate (98.37) and its stern adherence to both FAR and FRR (0.0144, 1.568) than k- NN with 94.9% and (0.392 and 2.895) respectively. This result demonstrates the robustness of Mahalanobis distance classifier for use access control system.
- ItemImplication of variation in Ant Colony Optimization Algorithm (ACO) parameters on Feature Subset Size.(Computing and Information System Journal, University of West Scotland, 2017-05-20) Babatunde, R. S., Isiaka, R.M., Adigun, O.J. and Babatunde, A.N. (2017)Purpose: The purpose of this research is to apply ant colony optimization (ACO), a nature inspired computational (NIC) technique to achieve optimal feature subset selection, for the purpose of data dimensionality reduction, which will remove redundancy, provide a reduced storage space, improve memory utilization and subsequently, classification task. Design/Methodology/Approach: The ACO feature subset selection process was filter-based, accomplished by using correlation coefficient as the heuristic information which guides the search to determine the pixel (feature) attractiveness. The intensity of the pixel represents the pheromone level . Also, ρ, φ, and are key parameters which were tuned to various arbitrary values at each iteration to determine the best combination of parameters which can result in a reduced feature subset (window size). The procedure was simulated in MATLAB 2012. Findings: The study has been able to demonstrate that experimental results obtained by tuning the parameters of ACO at each run gave a reduced feature subset (window size), at parameter settings of α (0.10), β (0.45), ρ (0.50), φ (1.0) which was salient for efficient face recognition thereby demonstrating the effectiveness and superiority of filter-based over wrapper–based feature selection. Research Limitation: The major limiting factor in this research was time and materials which hindered the further testing and implementation of innovative computational intelligence. Originality/Value: This research work is valuable because it gives the implication of the variation of the ACO parameters which determines the extent to which the optimal solution construction that results in a reduced feature subset can be realized.
- ItemA Systematic Review of Feature Dimensionality Reduction Techniques for Face Recognition Systems.(Journal of Digital Innovations & Contemp Res. In Sc., Eng & Tech., 2017-09-07) Babatunde, R.S. (2017)In this research, a comparison of the various techniques used for face recognition is shown in tabular format to give a precise overview of what different authors have already projected in this particular field. A systematic review of 40 journal articles pertaining to feature dimensionality reduction was carried out. The articles were reviewed to appraise the methodology and to identify the key parameters that were used for testing and evaluation. The dates of publication of the articles were between 2007 and 2015. Ten percent (10%) of the articles reported the training time for their system while twenty four percent (24%) reported their testing time. Sixty seven percent (67%) of the reviewed articles reported the image dimension used in the research. Also, only forty eight percent (48%) of the reviewed articles compared their result with other existing methods. The main emphasis of this survey is to identify the major trade-offs of parameters and (or) metrics for evaluating the performance of the techniques employed in dimensionality reduction by existing face recognition systems. Findings from the review carried out showed that major performance metrics reported by vast amount of researchers in this review is recognition accuracy in which eighty six percent (86%) of the authors reported in their experiment.
- ItemA Generalized Neuron Model (GNM) Based Human Age Estimation.(Advances in Multidisciplinary & Scientific Research Journal., 2017-10-20) Babatunde, R.S. and Yakubu, I.A. (2017)In real-world application, the identification characteristic of face images has been widely explored, ranging from National ID card, International passport, driving license amongst others. In spite of the numerous investigation of person identification from face images, there exists only a limited amount of research on detecting and estimating the demographic information contained in face images such as age, gender, and ethnicity. This research aim at detecting the age/age range of individual based on the facial image. In this research, a generalized neuron (GN), which is a modification of the simple neuron, is used, to overcome some of the problems of artificial neural network (ANN) and improve its training and testing performance. The GN is trained with discrete wavelet transform (DWT) features obtained after the application of Canny edge detection algorithm on the face Image. Validating the technique on FGNET face images reveals that the frequency domain features obtained using the DWT captures the wrinkles on the face region, which represents a distinguishing factor on the face as humans grow older. The empirical results demonstrates that the GN outperforms the simple neuron, with detection rate of 93.5%, training time of 96.30secs, matching time of 14secs and root mean square error of 0.0523. The experimental results suggest that the GN model performs comparably and could be adopted for detecting human ages.
- ItemImage Encryption System based on Length Three Moduli Set(Foundation of Computer Science (FCS), NY, USA, 2018-05-01) Damilare Peter OyinloyeDigital images have found usage in almost all our everyday applications. These images sometimes contain confidential and intelligible information which need to be protected when stored on memory or transmitted over networks (Intranet or Internet). Many techniques have been proposed to deal with this security issues in the past. This paper proposes a simple scrambling algorithm to encrypt and decrypt the grey level image based on random number generation and Residue Number System (Forward and Reverse Conversion). The image is first encrypted by changing the position of each pixel in the original image without changing the value of grey level. The original image reads row by row, pixel by pixel and each pixel will take a new position in the scrambled image. The new position is chosen based on random number generation from the random number generator. The key will be generated as a matrix during the encryption process and also the key saves the position of each pixel in the encrypted/scrambled image. The encryption layer transforms the scrambled image to moduli images which automatically adds an extra security layer to our data. The encrypted moduli images is decrypted by decoding the moduli images and converting them back to a single scrambled image (Reverse Conversion) and the single scrambled image back to the Plain and Original Image by using the saved key matrix. This scheme achieves an enhanced image encryption process and a more efficient decryption process without loses of any inherent information of the recovered plain image.
- ItemAn Improved Image Scrambling Algorithm Using {2 n -1, 2 n , 2 n +1}(University of the West of Scotland, School of Computing, 2018-10-01) Damilare Peter Oyinloye; Kazeem Alagbe GbolagadeTraditional iris segmentation methods and strategies regularly contain an exhaustive search of a large parameter space, which is sensitive to noise, time-consuming and no longer secured enough. To address these challenges, this paper proposes a secured iris template. This paper proposes a technique to secure the iris template using steganography. The experimental analysis was carried out on matrix laboratory (MATLABR2015A) environment. The segmented iris region was normalized to decrease the dimensional inconsistencies between iris region areas with the aid of the usage of Hough transform (HT). The features of the iris were encoded by convolving the normalized iris region with 1D Log- Gabor filters in order to generate a bit-wise biometric template. Then, least significant bit (LSB) was used to secure the iris template. The Hamming distance was chosen as a matching metric, which gives the measure of how many bits disagreed between the templates of the iris. The system operated at a very good training time and high level of conditional testing signifying high optimization with recognition accuracy of 92% and error of 1.7%. The proposed system is reliable, secure and efficient with the computational complexity significantly reduced. The proposed technique provides an efficient approach for securing the iris template.
- ItemComparison Performance Evaluation of Modified Genetic Algorithm and Modified Counter Propagation Network for Online Character recognition.(Transactions on Machine Learning and Artificial Intelligence., 2018-10-07) Adigun O. J., Fenwa, O. D. and Babatunde, R. S. (2018)This paper carries out performance evaluation of a Modified Genetic Algorithm (MGA) and Modified Counter Propagation Network (MCPN) Network for online character recognition. Two techniques were used to train the feature vectors using supervised and unsupervised methods. First, the modified genetic algorithm used feature selection to filter irrelevant features vectors and improve character recognition because of its stochastic nature. Second, MCPN has its capability to extract statistical properties of the input data. MGA and MCPN techniques were used as classifiers for online character recognition then evaluated using 6200-character images for training and testing with best selected similarity threshold value. The experimental results of evaluation showed that, at 5 x 7 pixels, MGA had 97.89% recognition accuracy with training time of 61.20ms while MCPN gave 97.44% recognition accuracy in a time of 62.46ms achieved. At 2480, MGA had 96.67% with a training time of 4.53ms, whereas MCPN had 96.33% accuracy with a time of 4.98ms achieved. Furthermore, at 1240 database sizes, MGA has 96.44 % recognition accuracy with 0.62ms training time whereas MCPN gave 96.11% accuracy with 0.75ms training time. The two techniques were evaluated using different performance metrics. The results suggested the superior nature of the MGA technique in terms of epoch, recognition accuracy, convergence time, training time and sensitivity.