Faculty of Information and Communication Technology
Permanent URI for this community
Browse
Browsing Faculty of Information and Communication Technology by Issue Date
Now showing 1 - 20 of 302
Results Per Page
Sort Options
- ItemAgent-Based Faults Monitoring in Automatic Teller Machines(African Institute of Development Informatics and Policy - Computing, Information Systems and Development Informatics Journal, 3(4), 1 – 6, 2012) Bashir, S.A.; Mohammed, I.K.; Abdulsalam, S.O.Automated Teller Machine (ATM) has gained widespread acceptance as a convenient medium to facilitate financial transaction without need for human agent. However, ATM deployers are facing challenges in maximizing the uptime of their ATMs as a result of wide gap in fault detection, notification and correction of the ATMs. One way to ameliorate this situation is through intelligent monitoring of ATM by resident software agents that monitor the device real time and report faulty components real time to facilitate quick response. We proposed an architecture for rule-based, intelligent agent based monitoring and management of ATMs. Agents are used to perform remote monitoring on the ATMs and control function such software maintenance. Such agents can detect basic events or correlate existing events that are stored in a database to detect faults. A system administrator can securely modify the monitoring policies and control functions of agents. The framework presented here includes software fault monitor, hardware fault monitor and transaction monitor. A set of utility support agents: caller agent and log agent are used to alert network operator and log error and transaction information in a database respectively. at-1, stuck-at-0 faults in digital circuits validate the point that faulty circuits dissipates more and hence draw more power. Key words: Automated Teller Machine (ATM), Intelligent Agents, Mobile Agents, Event Monitoring
- ItemData Mining for Knowledge Discovery from Financial Institution Database(Society for Science and Nature - International Journal of Engineering and Management Sciences. 3(4), 409 – 415, 2012) Abdulsalam, S.O.; Adewole, K.S.; Bashir, S.A.; Jimoh, R.G.; Olagunju, M.Due to its importance for the investment decision-making and risk management, describing and predicting stock represents a key topic in stock analysis. Stock or shares are valued and analyzed by stock investors using fundamental analysis and technical analysis. Stock investors describe and predict stock manually based on individual experiences. Employing manual procedure in analyzing stock, most especially technical analysis is always very cumbersome and inefficient; because of much time that is consumed in examining the past records of a respective firm, an investor is willing to invest in. This paper presents a better way of describing and predicting stock, especially technical analysis, by employing data mining techniques. A database was developed employing 360 records of daily activity summary (equities) and 78 records of weekly activity summary (equities) spanning through 18 months that is, from January 2007 to June 2008. These data were obtained from the daily official list of the prices of all shares traded on the stock exchange published by the Nigerian Stock Exchange being the financial institution that runs Nigerian stock market; using banking sector of Nigerian economy with three banks namely:- First Bank of Nigeria Plc, Zenith Bank Plc, and Skye Bank Plc. A data mining software tool was developed and employed in identifying patterns and relationships from the database to generate new knowledge about the data set in the database through the use of data mining techniques that employ regression analysis. KEYWORDS: Data Mining, Stock Exchange, Financial Institution, Decision-Making, Risk Management, Regression Analysis
- ItemUse of electronic information resources by university lecturers in Edo State, Nigeria(2013) Uwaifo, S. O; Eiriemiokhale, K. A.The limited access to up-to-date materials in university libraries in Nigeria is a main problem that impedes research and teaching. In the last couple of years, lecturers in Nigerian tertiary institutions have increasingly demanded and preferred access to electronic sources delivery and networked information from their respective libraries. The objectives of this study are to: i. identify the benefits the university lecturers in Edo State derive from using electronic information resources; ii. find out the available facilities for using electronic information resources by the university lecturers in Edo State. The study concludes that the university lecturers in Edo State derive several benefits from the use of electronic information resources. However, the available facilities for using electronic information resources are not encouraging. Except for the fact that university lecturers have personal computers at home coupled with handheld devices and the universities’ e-libraries, the universities do not have departmental computer laboratories not to talk of personal computer at their offices. The researchers provided the following recommendations: i. The university managements should provide well equipped computer laboratories for all the departments and provide personal computers in the university lecturers’ offices. ii. The university managements should provide funds for subscription to more primary and secondary electronic sources. Reasonable investment should be made on the university’s e-library so as to be able to subscribe to several databases and provide internet services to lecturers free of charge. iii. There is the urgent need for all the universities in Edo State to be properly funded by their financiers (federal and state governments as well as private organizations). Huge financial investment in ICTs by the universities will positively impact on the lecturers.
- ItemLeadership Traits and Strategy for Driving Creative and Innovative Workforce in Academic Libraries in Kwara State(2013) Abdullahi Bakare; M.T. Bashorun; E.K. Akinboro
- ItemUse of Electronic Information Resources by University Lecturers in Edo State, Nigeria(PNLA Quarterly, the official publication of the Pacific Northwest Library Association, 2013-07) Dr. Stephen Osahon Uwaifo; Kennedy Arebamen EiriemiokhaleThe limited access to up-to-date materials in university libraries in Nigeria is a main problem that impedes research and teaching. In the last couple of years, lecturers in Nigerian tertiary institutions have increasingly demanded and preferred access to electronic sources delivery and networked information from their respective libraries (Covi & Cragin, 2004). Timely information is required by all categories of people in the different organizations of the society and one of such organizations is the university. University lecturers equip students with skills in reading, inquiry and independent thinking and strive to develop students’ creativity, insight and analytical skills. All these necessitate seeking and use of information from various sources such as books, journals, periodicals, to mention a few. University education is changing rapidly (Toner, 2008). Bennet (2003) identified a major shift in education- The revolution in information technology is changing delivery of education. This dramatic change includes the way in which information is provided to the university community. Universities through a number of ways embrace the electronic provision of information to facilitate study programmes and research. With the integration of online information services, electronic books, electronic document delivery services and digital libraries in its library systems, university lecturers can now access information from various sources.
- ItemEthical Considerations in Product Advertising in Nigeria(2013-09) Victor BabatundeThis paper seeks to examine the trends of deception in advertising practice in Nigeria and their corresponding effects on the consumer. The paper relies on documentary research method to analyse selected product advertisements and review certain literature or documents that contain information about the phenomenon being investigated. The paper found out that some advertisers have failed to exercise caution while advertising their products in order to ensure that consumers are not misled. Therefore, the paper concludes that the active selectors’ use of the mass media by the audience to achieve their goals will result in being dependent on the media and thereby exposed to deceptive advertising contents. Against this backdrop, the paper recommends that the Advertising Practitioners Council of Nigeria (APCON) should live up to its responsibility of monitoring and controlling the practice of advertising in Nigeria. It also recommends that the mass media should ensure that all advertising messages conform to the rules guiding advertisements before placing them on the appropriate media.
- ItemDevelopment of an Intrusion Detection System in a Computer Network(Council for Innovative Research - International Journal of Computers and Technology, 12(5), 3479 – 3485, 2014) Babatunde, R.S.; Adewole, K.S.; Abdulsalam, S.O.; Isiaka, R.M.The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using Microsoft Visual Basic. Indexing terms: Intrusion detection system, illegitimate, misuse, network.
- ItemPredicting Nigeria Budget Allocation Using Regression Analysis: A Data Mining Approach(Nigeria Computer Society (NCS), Lagos, Nigeria - The Journal of Computer Science and Its Application, An International Journal of the Nigeria Computer Society. 21(1), 73 – 82, 2014) Adewole, K.; Mabayoje, M.; Abdulsalam, S.; Ajao, J.Budget is used by the Government as a guiding tool for planning and management of its resources to aid in effective decision-making. Data mining is one of the most vital areas of research with the objective of finding meaningful information from large datasets. The delay in the preparation of budget of the Federation by the Government has become incessant issue in the running of affairs of the country. This is evident in the delay in implementation of the previous budgets in the country; hence, the need for automated system to tackle the setback. In this paper, regression analysis which is one of the data mining techniques is employed to predict budget allocation from Nigeria budget dataset. 200 records consisting of the budget allocation summary for the year 2008, 2009, 2010, 2011, and 2012 across 40 data points containing Ministries, Departments, Commissions and Agencies (MDCAs) were used. A web-based data mining tool that employed linear regression to predict both Nigeria budget allocation across the 40 data points and the overall budget summary allocation of the Federation is proposed. The proposed data mining software predicted N1,803,196,024,657.40, N1,871,754,338,112.68 and N2,007,780,403,902.98 for the year 2013, 2014 and 2015 respectively. The tool is found capable of discovering interesting patterns in the data and for predicting budget allocation. Keywords: Budget, Data Mining, Dataset, Linear Regression, Prediction
- ItemFrequent Pattern and Association Rule Mining from Inventory Database Using Apriori Algorithm(Institute of Electrical & Electronics Engineers (IEEE) - African Journal of Computing and ICT, A Journal of the Institute of Electrical & Electronics Engineers (IEEE) Computer Chapter Nigeria Section. 7(3), 35 – 42, 2014) Adewole, K.S.; Akintola, A.G.; Ajiboye, A.R.; Abdulsalam, S.O.Recently, data mining has attracted a great deal of attention in the information industry and in a Society where data continue to grow on a daily basis. The availability of huge amounts of data and the imminent need for turning such data into useful information and knowledge is the major focus of data mining. The information and knowledge obtained from large data can be used for applications ranging from market analysis, fraud detection, production control, customer retention, and science exploration. A record in such data typically consists of the transaction date and the items bought in the transaction. Successful organizations view such databases as important pieces of the marketing infrastructure. This paper considers the problem of mining association rules between items in a large database of sales transactions in order to understand customer-buying habits for the purpose of improving sales. Apriori algorithm was used for generating strong rules from inventory database. It was found that for a transactional database where many transaction items are repeated many times as a superset in that type of database, Apriori is suited for mining frequent itemsets. The algorithm was implemented using PHP, and MySQL database management system was used for storing the inventory data. The algorithm produces frequent itemsets completely and generates the accurate strong rules. Keywords: Apriori Algorithm, data mining, database, strong rules & inventory
- ItemDevelopment of an Intrusion Detection System in a Computer Network.(International Journal of Computers & Technology., 2014-03-14) Babatunde, R. S., Adewole K. S., Abdulsalam S. O. and Isiaka R. M. (2014)The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic.
- ItemDevelopment of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution.(Computer Engineering and Intelligent Systems., 2014-04-13) Adewole, K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M. and Oloyede M. O. (2014)Institutions, companies and organisations where security and net productivity is vital, access to certain areas must be controlled and monitored through an automated system of attendance. Managing people is a difficult task for most of the organizations and maintaining the attendance record is an important factor in people management. When considering the academic institute, taking the attendance of non-academic staff on daily basis and maintaining the records is a major task. Manually taking attendance and maintaining it for a long time adds to the difficulty of this task as well as wastes a lot of time. For this reason, an efficient system is proposed in this paper to solve the problem of manual attendance. This system takes attendance electronically with the help of a fingerprint recognition system, and all the records are saved for subsequent operations. Staff biometric attendance system employs an automated system to calculate attendance of staff in an organization and do further calculations of monthly attendance summary in order to reduce human errors during calculations. In essence, the proposed system can be employed in curbing the problems of lateness, buddy punching and truancy in any institution, organization or establishment. The proposed system will also improve the productivity of any organization if properly implemented.
- ItemEnhanced Automated Teller Machine Using Short Service Authentication Service(African Journal of Computing and ICTs, 2014-05-16) Jimoh, R. G. & Babatunde, A.N.The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society imposing additional security cost of running ATM services by banks in the country. The researchers developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The usability of the developed prototype was examined using heuristic evaluation with the aid of a questionnaire designed based on validated software usability metrics. Responses from ten (10) respondents who are users of ATM cards in the country and the data collected were analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is revealed that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria. Keywords—ATM, ATM Fraud, E-banking, Prototyping.
- ItemAn Appropriate Search Algorithm for Finding Grid Resources(International Journal of Emerging Trends and Technology in Computer Science, 2014-06-16) Olusegun, O. A., Babatunde, A. N., Omotehinwa, T. O., Aremu, D. R. & Balogun, B. F.Abstract: A grid is a collection of computing resources that perform tasks. Searching within a grid resource is very challenging considering the potential size of the grid and wide range of resources that are represented. The aim of this study is to find the search algorithm that is appropriate for a search problem in a grid environment. Breadth first search, Depth first search and Depth first iterative deepening search algorithms were studied and analyzed to find the one with minimal complexity. The algorithms were implemented using graph with a collection of nodes. They were analyzed based on their completeness and optimality in terms of running time. Octave was used as the analysis tool to measure the time complexity of these search algorithms. From the analysis of these algorithms, Depth First Iterative deepening search algorithm was adopted as a search strategy for grid resources because of its completeness and optimality in terms of running time. The research shows that Depth First Iterative Deepening search algorithm is asymptotically optimal in terms of cost of solution, running time, and space required for uninformed searches. Therefore, DFID search is the best search strategy suitable for grid resources among the three search strategy studied in this work. Keywords: Grid, Breadth first search, Depth first search, Depth first iterative deepening search.
- ItemAdoption and use of electronic information resources by medical science students of the University of Benin, Benin City, Nigeria(The Association of Information Professionals of Nigeria., 2015) Kennedy A. EIRIEMIOKHALE; James A. Aiyefelehin
- ItemInfluence of Televised Violence on the Behaviour of Selected Teenagers in Ilorin Metropolis(2015) Murtada Busair Ahmad; Kamal Idowu DaudaTelevised violence is believed to have gradually made its way into some Nigerian homes as violence among Nigerian teenagers is perceived to be growing rapidly against the backdrop of the assumed influence exerted by their exposure to aggression and horrors on Nigerian TV channels. This study attempts to empirically test the cultivation hypotheses on the Nigerian teenagers. Cultivation analysis has been used in communication scholarship to explain how the time the viewers spend on television as well as how their exposure to televised violence influence their social reality beliefs of the real world. A survey carried out on Ilorin teenagers reveals that there is significant relationship between exposure to horror film and teenagers' tendency to bully others. The survey data analysed also reveals that there is relationship between exposure to horror films and teenagers' tendency to abuse others while a third hypothesis tested reveals that there is no significant correlation between hours spent watching TV and teenagers' tendency to bully others.
- ItemAudience Perception of Roll Back Malaria Campaign in Kaduna Metropolis(2015) Victor Olusegun Babatunde; Suleiman SalauNigeria accounts for one quarter of all the malaria cases in Africa. Though preventable, malaria remains one of the major public health problems in Nigeria. This study was undertaken to find out audience perception of the Roll Back Malaria campaign in Kaduna Metropolis and its implications for malaria elimination among pregnant women and children. This is by determining the variations in levels of source confidence among the vulnerable group and finding out how the campaign has been useful in their attitude towards malaria prevention. One hundred and eighty copies of the questionnaire were administered to the vulnerable group (pregnant women and nursing mothers), purposively drawn from eight primary health centres within Kaduna metropolis selected based on their high client flow for maternity cases. The study discovers that the campaign has changed the views and perceptions of a clear majority of the people (97%) about the use of mosquito nets and other beliefs regarding malaria. In this regard, the study recommends that the government should, as a matter of routine, monitor the use of mosquito nets through community health educators, ward focal persons, and take adequate steps to improve on the campaign in areas where low success is recorded
- ItemAn Assessment of Preservation and Conservation Practices in Two selected Libraries in Kwara State and their Implications for Quality Education(Communicate: journal of library and information science, 2015) A. A. Bakare; Florence O. Ajani; S.K. Gambari
- ItemA Survey of Cloud Computing Awareness, Security Implication and Adoption in Nigeria IT Based Enterprises(Faculty of Communication and Information Sciences, University of Ilorin, Ilorin, Nigeria - International Journal of Information Processing and Communication, 3(1&2), 210 – 220, 2015) Bashir, S.A.; Adebayo, O.S.; Abdulsalam, S.O.; Sadiku, J.S.; Mabayoje, M.A.The advancement in information technology (IT) infrastructures and the overwhelming pervasive Internet accessibility has tremendously change the way computing is done in IT based enterprises. The recent hype of Cloud Computing that utilizes the existing Internet infrastructure to provide pay-as-you-go services to diverse community of businesses has emerged to alleviate and reduce the cost of computing tremendously. This paper examined the awareness of the Nigerian business enterprisesand their readiness in adopting cloud computing. It was found that the trend of awareness and adoption were very minimal with many being sceptical although few businesses were aware of the cloud technology. The survey also revealed that the stakeholders were precarious of the security-level of the cloud-based computing. Keywords: Cloud-Based Computing, Security Implications, Cloud Awareness, Cloud Adoption, Enterprises, Technology
- ItemComparative Analysis of Decision Tree Algorithms for Predicting Undergraduate Students’ Performance in Computer Programming(Faculty of Science, Adeleke University, Ede, Nigeria - Journal of Advances in Scientific Research & Applications, A Multidisciplinary Journal Publication of the Faculty of Science, Adeleke University, Ede, Nigeria, 2015) Abdulsalam, S.O.; Babatunde, A.N.; Hambali, M.A.; Babatunde, R.S.Educational data are increasing tremendously with little exploration by the education managers. Hidden knowledge can be discovered from the huge data sets available in educational databases through the use of data mining techniques. Educational data mining (EDM) is an emerging discipline, concerned with developing methods for exploring the unique types of data that reside in educational databases. One of the significant areas of the application of EDM is the development of student models for predicting students’ performances in their educational institutions. The focus of this work is to identify the optimal decision tree algorithms for predicting students’ performance in a computer programming course taken in 200 level based on their ordinary level results in Mathematics and Physics and their 100 level results in Mathematics and Physics courses. One hundred and thirty one (131) students’ records from computer science programme at Kwara State University (KWASU) between 2009 and 2013 were used. The attributes used are students’ ordinary level scores in Mathematics and Physics, 100 level results in Mathematics and Physics courses and the score in a 200 level computer programming course (CSC 203). C4.5 (known as J48 in WEKA) Classification and Regression Tree (CART), and Best-First Tree (BF Tree) decision tree algorithms were used in Waikato Environment for Knowledge Analysis data mining software to generate three classification models employed in predicting students’ performance in CSC 203. The results of these algorithms were compared using 10-fold cross validation method in terms of prediction accuracy and computational time. Our results showed that J48 tree has the highest prediction accuracy of 70.37% and least execution time of 0.02 seconds while CART and BFTree has prediction accuracy of 60.44% and 60.30% respectively and both having execution time of 0.22 seconds based on the data set used in this study. This study also revealed that previous knowledge of Mathematics and Physics both at Ordinary level and 100 level are essential determinants of students’ performance in a computer programming course. Keywords: Data Mining, Educational Data Mining, Decision Tree algorithm, Students’ Performance
- ItemLocal Binary Pattern and Ant Colony Optimization Based Feature Dimensionality Reduction Technique for Face Recognition Systems.(Journal of Advances in Mathematics and Computer Science, 2015-04-13) Babatunde, R.S, Olabiyisi, S. O., Omidiora, E. O. and Ganiyu, R. A. (2015)Feature dimensionality reduction is the process of minimizing the number of features in high dimensional feature space. It encompasses two vital approaches: feature extraction and feature selection. In face recognition domain, widely adopted face dimensionality reduction techniques include Principal component analysis, Discrete wavelet transform, Linear discriminant analysis and Gabor filters. However, the performances of these techniques are limited by strict requirement of frontal face view, sensitivity to signal shift and sample size, computational intensiveness amongst others. In this paper, a feature dimensionality reduction technique that employed Local binary pattern for feature extraction and Ant colony optimization algorithms for the selection of optimal feature subsets was developed. The developed technique identified and selected the salient feature subsets capable of generating accurate recognition. The average training time, recognition time and recognition rate obtained from the experiment on locally acquired face data using cross-validation evaluation approach indicate an efficient performance of the potential combination of both methods in a two-level technique for dimensionality reduction