Faculty of Information and Communication Technology
Permanent URI for this community
Browse
Browsing Faculty of Information and Communication Technology by Issue Date
Now showing 1 - 20 of 202
Results Per Page
Sort Options
- ItemUse of electronic information resources by university lecturers in Edo State, Nigeria(2013) Uwaifo, S. O; Eiriemiokhale, K. A.The limited access to up-to-date materials in university libraries in Nigeria is a main problem that impedes research and teaching. In the last couple of years, lecturers in Nigerian tertiary institutions have increasingly demanded and preferred access to electronic sources delivery and networked information from their respective libraries. The objectives of this study are to: i. identify the benefits the university lecturers in Edo State derive from using electronic information resources; ii. find out the available facilities for using electronic information resources by the university lecturers in Edo State. The study concludes that the university lecturers in Edo State derive several benefits from the use of electronic information resources. However, the available facilities for using electronic information resources are not encouraging. Except for the fact that university lecturers have personal computers at home coupled with handheld devices and the universities’ e-libraries, the universities do not have departmental computer laboratories not to talk of personal computer at their offices. The researchers provided the following recommendations: i. The university managements should provide well equipped computer laboratories for all the departments and provide personal computers in the university lecturers’ offices. ii. The university managements should provide funds for subscription to more primary and secondary electronic sources. Reasonable investment should be made on the university’s e-library so as to be able to subscribe to several databases and provide internet services to lecturers free of charge. iii. There is the urgent need for all the universities in Edo State to be properly funded by their financiers (federal and state governments as well as private organizations). Huge financial investment in ICTs by the universities will positively impact on the lecturers.
- ItemUse of Electronic Information Resources by University Lecturers in Edo State, Nigeria(PNLA Quarterly, the official publication of the Pacific Northwest Library Association, 2013-07) Dr. Stephen Osahon Uwaifo; Kennedy Arebamen EiriemiokhaleThe limited access to up-to-date materials in university libraries in Nigeria is a main problem that impedes research and teaching. In the last couple of years, lecturers in Nigerian tertiary institutions have increasingly demanded and preferred access to electronic sources delivery and networked information from their respective libraries (Covi & Cragin, 2004). Timely information is required by all categories of people in the different organizations of the society and one of such organizations is the university. University lecturers equip students with skills in reading, inquiry and independent thinking and strive to develop students’ creativity, insight and analytical skills. All these necessitate seeking and use of information from various sources such as books, journals, periodicals, to mention a few. University education is changing rapidly (Toner, 2008). Bennet (2003) identified a major shift in education- The revolution in information technology is changing delivery of education. This dramatic change includes the way in which information is provided to the university community. Universities through a number of ways embrace the electronic provision of information to facilitate study programmes and research. With the integration of online information services, electronic books, electronic document delivery services and digital libraries in its library systems, university lecturers can now access information from various sources.
- ItemEthical Considerations in Product Advertising in Nigeria(2013-09) Victor BabatundeThis paper seeks to examine the trends of deception in advertising practice in Nigeria and their corresponding effects on the consumer. The paper relies on documentary research method to analyse selected product advertisements and review certain literature or documents that contain information about the phenomenon being investigated. The paper found out that some advertisers have failed to exercise caution while advertising their products in order to ensure that consumers are not misled. Therefore, the paper concludes that the active selectors’ use of the mass media by the audience to achieve their goals will result in being dependent on the media and thereby exposed to deceptive advertising contents. Against this backdrop, the paper recommends that the Advertising Practitioners Council of Nigeria (APCON) should live up to its responsibility of monitoring and controlling the practice of advertising in Nigeria. It also recommends that the mass media should ensure that all advertising messages conform to the rules guiding advertisements before placing them on the appropriate media.
- ItemDevelopment of an Intrusion Detection System in a Computer Network.(International Journal of Computers & Technology., 2014-03-14) Babatunde, R. S., Adewole K. S., Abdulsalam S. O. and Isiaka R. M. (2014)The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic.
- ItemDevelopment of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution.(Computer Engineering and Intelligent Systems., 2014-04-13) Adewole, K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M. and Oloyede M. O. (2014)Institutions, companies and organisations where security and net productivity is vital, access to certain areas must be controlled and monitored through an automated system of attendance. Managing people is a difficult task for most of the organizations and maintaining the attendance record is an important factor in people management. When considering the academic institute, taking the attendance of non-academic staff on daily basis and maintaining the records is a major task. Manually taking attendance and maintaining it for a long time adds to the difficulty of this task as well as wastes a lot of time. For this reason, an efficient system is proposed in this paper to solve the problem of manual attendance. This system takes attendance electronically with the help of a fingerprint recognition system, and all the records are saved for subsequent operations. Staff biometric attendance system employs an automated system to calculate attendance of staff in an organization and do further calculations of monthly attendance summary in order to reduce human errors during calculations. In essence, the proposed system can be employed in curbing the problems of lateness, buddy punching and truancy in any institution, organization or establishment. The proposed system will also improve the productivity of any organization if properly implemented.
- ItemAdoption and use of electronic information resources by medical science students of the University of Benin, Benin City, Nigeria(The Association of Information Professionals of Nigeria., 2015) Kennedy A. EIRIEMIOKHALE; James A. Aiyefelehin
- ItemInfluence of Televised Violence on the Behaviour of Selected Teenagers in Ilorin Metropolis(2015) Murtada Busair Ahmad; Kamal Idowu DaudaTelevised violence is believed to have gradually made its way into some Nigerian homes as violence among Nigerian teenagers is perceived to be growing rapidly against the backdrop of the assumed influence exerted by their exposure to aggression and horrors on Nigerian TV channels. This study attempts to empirically test the cultivation hypotheses on the Nigerian teenagers. Cultivation analysis has been used in communication scholarship to explain how the time the viewers spend on television as well as how their exposure to televised violence influence their social reality beliefs of the real world. A survey carried out on Ilorin teenagers reveals that there is significant relationship between exposure to horror film and teenagers' tendency to bully others. The survey data analysed also reveals that there is relationship between exposure to horror films and teenagers' tendency to abuse others while a third hypothesis tested reveals that there is no significant correlation between hours spent watching TV and teenagers' tendency to bully others.
- ItemAudience Perception of Roll Back Malaria Campaign in Kaduna Metropolis(2015) Victor Olusegun Babatunde; Suleiman SalauNigeria accounts for one quarter of all the malaria cases in Africa. Though preventable, malaria remains one of the major public health problems in Nigeria. This study was undertaken to find out audience perception of the Roll Back Malaria campaign in Kaduna Metropolis and its implications for malaria elimination among pregnant women and children. This is by determining the variations in levels of source confidence among the vulnerable group and finding out how the campaign has been useful in their attitude towards malaria prevention. One hundred and eighty copies of the questionnaire were administered to the vulnerable group (pregnant women and nursing mothers), purposively drawn from eight primary health centres within Kaduna metropolis selected based on their high client flow for maternity cases. The study discovers that the campaign has changed the views and perceptions of a clear majority of the people (97%) about the use of mosquito nets and other beliefs regarding malaria. In this regard, the study recommends that the government should, as a matter of routine, monitor the use of mosquito nets through community health educators, ward focal persons, and take adequate steps to improve on the campaign in areas where low success is recorded
- ItemLocal Binary Pattern and Ant Colony Optimization Based Feature Dimensionality Reduction Technique for Face Recognition Systems.(Journal of Advances in Mathematics and Computer Science, 2015-04-13) Babatunde, R.S, Olabiyisi, S. O., Omidiora, E. O. and Ganiyu, R. A. (2015)Feature dimensionality reduction is the process of minimizing the number of features in high dimensional feature space. It encompasses two vital approaches: feature extraction and feature selection. In face recognition domain, widely adopted face dimensionality reduction techniques include Principal component analysis, Discrete wavelet transform, Linear discriminant analysis and Gabor filters. However, the performances of these techniques are limited by strict requirement of frontal face view, sensitivity to signal shift and sample size, computational intensiveness amongst others. In this paper, a feature dimensionality reduction technique that employed Local binary pattern for feature extraction and Ant colony optimization algorithms for the selection of optimal feature subsets was developed. The developed technique identified and selected the salient feature subsets capable of generating accurate recognition. The average training time, recognition time and recognition rate obtained from the experiment on locally acquired face data using cross-validation evaluation approach indicate an efficient performance of the potential combination of both methods in a two-level technique for dimensionality reduction
- Item: Assessing the performance of Random Partitioning and K-Fold Cross Validation methods of evaluation of a Face Recognition System.(Journal of Advances in Image and Video Processing, 2015-06-08) Babatunde, R. S, Olabiyisi S. O, Omidiora E. O, Ganiyu, R. A. and Isiaka, R. M. (2015)Face recognition has been an active research area in the pattern recognition and computer vision domains due to its many potential applications in surveillance, credit cards, passport and security. However, the problem of correct method of partitioning the face data into train and test set has always been a challenge to the development of a robust face recognition system. The performance of the System was tested on locally acquired face database when the face database was randomly partitioned and when k-fold Cross Validation partition was used. The face database was captured under the condition of significant variations of rotation, illumination and facial expression. Quantitative evaluation experimental results showed that Random Sampling technique has a higher average recognition rate (96.7%) than Cross Validation partition method (95.3%). However, recognition time in Cross Validation is faster (0.36 secs) than that of Random Sampling (0.38 secs).
- ItemUse of statistical records for library management at University of Ilorin(Information Technology Application Group International, Nigeria, 2016) Eiriemiokhale, K. A.; Isiwele-Ishola, R. O.; Ishola, M. T.Purpose: The study examined the use of statistical records for library management at the University of Ilorin, Kwara State. Design/Methodology/Approach: The descriptive survey research design was adopted for the study. Questionnaire was used to collect data from 40 library staff (professionals & paraprofessionals). Data obtained were analyzed using frequency counts and percentages. Findings: The results revealed that library statistics are used for reference analysis, selection and acquisition ofinformation resources, planning and decision making, preparation of library budget and determining the extent of library use Implication: The study admonished that statistics should be collected appropriately in order to enhance the growth and management of the library.Experts should be in charge of ZCX interpretation, compilation, analysis and distribution of statistical data. Originality/Value: The study will be off help to librarians because statistics will help them to plan library operations.
- ItemRedundant Residue Number System Based Fault Tolerant Architecture for Communication System(Proceedings of the 1St International Conference of IEEE Nigeria Computer Chapter In collaboration with Department of Computer Science, University of Ilorin, Ilorin, Nigeria - 2016, 2016) Kadri Akeem Femi; Saheed Yakub Kayode; Gbolagade Kazeem AlagbeThis paper proposed the Redundant Residue Number System based Code Division Multiple Access over a communication channel. The Coded transmission technique applied in a multipath environment has a Bit Error Rate comparable to that of a narrow band radio channel due to the fact that the fading of each subcarrier is frequency non-selective. The existing scheme requires large block of data and higher overhead. Moreover, simple error detection such as parity check bit is too weak for communication in which quality of radio channel is often poor and burst error often occurs. These aforementioned shortcomings reduce the performance of the CDMA. In this paper, an alternative scheme to detect and correct error, in order to increase performance and also to eliminate the higher overhead in the present CDMA scheme is presented. We use length five (5) moduli set [2n, 2n – 1, 2n + 1, 2n - 2(n+1)/2 + 1, 2n +2(n+1)/2 + 1], where (2n - 2(n+1)/2 + 1, 2n +2(n+1)/2 + 1) is the redundant moduli set which is used for the correction of error. The proposed scheme increases the performance of CDMA and provides more capability for fault-tolerance than those similar of the state-of the-art.
- ItemHandwritten Character Recognition using Brainnet Library,(Annals. Computer Science Series Journal, Published by Faculty of Computers and Applied Computer Science, Tibiscus University of Trinisoara, Romania., 2016-02-15) Babatunde, A. N., Abikoye, O.C., Babatunde, R.S. and Kawu, R.O. (2016)Handwriting has continued to persist as a means of communication and recording information in dayto- day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition of handwriting has practical significance, as in reading handwritten notes in a PDA, in postal addresses on envelopes, in amounts in bank checks, in handwritten fields in forms, etc. An off-line handwritten alphabetical character recognition system using multilayer feed forward neural network is described, and a method, called, diagonal based feature extraction is used for extracting the features of the handwritten alphabets. This project implements this methodology using BrainNet Library. Ten data sets, each containing 26 alphabets written by various people, are used for training the neural network and 130 different handwritten alphabetical characters are used for testing. The proposed recognition system performs quite well yielding higher levels of recognition accuracy compared to the systems employing the conventional horizontal and vertical methods of feature extraction. This system, if modified will be suitable for converting handwritten documents into structural text form and recognizing handwritten names.
- ItemA novel approach to outliers removal in a noisy numeric dataset for efficient Mining.(Published by Faculty of Computing and Information Systems, University of Ilorin., 2016-02-16) Ajiboye, A. R, Adewole, K. S., Babatunde, R. S. and Oladipo, I. D. (2016):Data pre-processing is a key task in the data mining process. The task generally consumes the largest portion of the total data engineering effort while unveiling useful patterns from datasets. Basically, data mining is about fitting descriptive or predictive models from data. However, the presence of outlier sometimes reduces the reliability of the models created. It is, therefore, essential to have raw data properly pre-processed before exploring them for mining. In this paper, an algorithm that detects and removes outliers in a numeric dataset is proposed. In order to establish the effectiveness of the proposed algorithm, the clean data obtained through the implementation of the proposed approach is used to create a prediction model. Similarly, the clean data obtained through the use of one of the existing techniques is also used to create a prediction model. Each of the models created is simulated using a set of untrained data and the error associated with each model is measured. The resulting outputs from the two approaches reveal that, the prediction model created using the output from the proposed algorithm has an error of 0.38, while the prediction model created using the cleaned data from the clustering method gives an error of 0.61. Comparison of the errors associated with the models created using the two approaches shows that, the proposed algorithm is suitable for cleaning numeric dataset. The results of the experiment also unveils that, the proposed approach is efficient and can be used as an alternative technique to other existing cleaning methods.
- ItemImplications of System Identification Techniques on ANFIS E-learners Activities Models-A Comparative Study.(Transactions on Machine Learning and Artificial Intelligence,, 2016-04-11) Isiaka, R. M., Omidiora, E. O. Olabiyisi, S. O., Okediran O.O. and Babatunde, R. S. (2016):Efficient e-learners activities model is essential for real time identifications and adaptive responses. Determining the most effective Neuro- Fuzzy model amidst plethora of techniques for structure and parameter identifications is a challenge. This paper illustrates the implication of system identification techniques on the performance of Adaptive Network based Fuzzy Inference System (ANFIS) E-learners Activities models. Expert knowledge and Historical data were used to formulate the system and their performances were compared. Similarly, comparison was made between memberships functions selected for Historical data identification. The efficiencies of the simulated models in MATLAB editor were determined using both classification uncertainty metrics and confusion matrix–based metrics. The classification uncertainty metrics considered are Mean Absolute Error (MAE) and Root Mean-Squared Error (RMSE). The confusion matrix-based metrics used are Accuracy, Precision and Recall. It was discovered that the model based on Experts Knowledge after training outperformed those based on Historical Data. The performances of the Membership Functions after ranking are Sigmoid, Gaussian, Triangular and G-Bells respectively.
- ItemGender Recognition using Local Binary Pattern and Naïve Bayes Classifier(African Journal Online. Published by Nigeria Computer Society Journal. Journal of Computer Science and its Applications, 2016-10-24) Babatunde, R. S., Abdulsalam, S. O., Yusuff, S. R., and Babatunde, A. N. (2016):Human face provides important visual information for gender perception. Ability to recognize a particular gender is very important for the purpose of differentiation. Automatic gender classification has many important applications, for example, intelligent user interface, surveillance, identity authentication, access control and human-computer interaction amongst others. Gender recognition is a fundamental task for human beings, as many social functions critically depend on the correct gender perception. Consequently, real-world applications require gender classification on real-life faces, which is much more challenging due to significant appearance variations in unconstrained scenarios. In this study, Local Binary Pattern is used to detect the occurrence of a face in a given image by reading the texture change within the regions of the image, while Naive Bayes Classifier was used for the gender classification. From the results obtained, the gender correlation was 100% and the highest accuracy of the result obtained was 99%.The system can be employed for use in scenarios where real time gender recognition is required.
- ItemInternet news: Displacing or complementing mainstream TV in Zaria and Kaduna?(Department of Mass Communication, Ebonyi State University, Abakaliki, Nigeria., 2017) Agnes Joe SHAIBUPopularity of Internetnews sources continues to raise concerns over its impact on traditional news sources across the globe, as it is a widely investigated topic in academic researches. Internet use is a global phenomenon, hence this study sought to find out how much of the assertions of Internet use displacing or complementing traditional media apply to Nigerians. The study investigated the extent to which uptake of Internet news had affected use of Television news and the extent of complementarity. The study was premised upon the uses and gratifications and media complementarity theories. 345 respondents purposively sampled were surveyed in Zaria and Kaduna, Nigeria. Findings showed that use ofInternet news complemented respondents’ uptake of mainstream Television news and that Internet news has affected their television news consumption to a minimal extent. The study concluded that Internet news usage was unlikely to displace Television news viewing among sampled respondents. The study recommended that traditional media who were online upload different contents from their offline version.
- ItemAn Empirical Study on the Traits of Information Literacy Level among Senior Secondary Students in Ilorin, Nigeria(The University Libraries of the University of Nebraska--Lincoln, Lincoln, Nebraska, USA, 2017) Adeyemi, Ismail OlatunjiThis study examined the information literacy level among secondary school students in Ilorin. This study adopted the disproportionate stratified random sampling techniques. The total population for this study 1958 students. The data for the study was collected through structured questionnaires which were distributed randomly to 210 students. However, only 192 copies of the questionnaire were properly filled and returned for analysis and thus form the basis as sample for this study (N=192). The findings of the study revealed that more than half of the respondents can identify lack of knowledge in a subject area. The study also revealed that majority of the respondents can articulate current knowledge on a topic. Furthermore, it also revealed that a large number of the respondents cannot identify specialist search tools. Also, from the study, it was revealed that noteworthy numbers of the respondents do not use Boolean operators in their search for information. Conclusively, the study shows that information literacy skills are essential for every human being because information is vital to everyone and every walk of life. It was recommended that policy makers in education sector should try and introduce information literacy skills as a subject in the secondary school curriculum so as to ensure that the students have the necessary information literacy skills rather than developing these skills through self-education. It was also recommended that teachers that have skills in information literacy skills should be employed as the facilitators in this subject.
- Itemscreening of prosopsis africana for antimicrobial activity against selected oral pathogens(Nig. J. Pure & Appl. Sci., 2017) FAUSAT ABIMBOLA JIMOHProsopis africana, a chewing stick popularly used in the South Western part of Nigeria was examined for antimicrobial activity against Lactobacillus casei ATCC 334, Staphylococcus aureus ATCC 35218, Candida albicans ATCC 10231, Escherichia coli ST2747 and Streptococcus mutans using agar well diffusion method. Extraction was done using ethanol and distilled water. The plant was screened for its phytochemical components. Gas chromatography mass spectrometry analysis was done to detect the secondary metabolites. All the extracts showed antimicrobial activity against the organisms with zones of inhibition ranging from 3.33±0.29 - 13.83±1.61mm except Staphylococcus aureus ATCC 35218 which was resistant to aqueous extract of the dried sample. Statistical analysis of data showed that there was no significant difference in the antimicrobial effects of ethanolic and aqueous extracts of the plant samples at 95% confidence intervals. The phytochemical screening result showed that phenols, alkaloids, sterols, triterpenes and saponins are components of the chewing stick. Also, fatty acids such oleic, palmitic and stearic acids were chemical constituents detected in the plant extracts by GC-MS. The results obtained in this study indicate that P. africana will be useful in the treatment of oral infections.
- ItemAn Evaluation of performance of k-NN and Mahalanobis Distance on Local Binary Pattern Feature representation for Access Control in Face Recognition System.(The Creative Research Networks for The African Society for Information & Communication Technology, USA, 2017-03) Yusuff, S. R.; Balogun, F. B.; Babtunde A. N.; Babatunde, R. S.A vast majority of the existing face recognition techniques encounter misclassifications when there is a large variation of the subject in terms of pose, illumination and expression as well as artefact such as occlusion. With the usage of Local Binary Pattern (LBP), local feature representation which preserves local primitives and texture information, robust against illumination, expression and occlusion was realized in the feature extraction process. Mahalanobis distance and k-NN classifier were employed for recognition as basis for comparison. An assessment of both algorithms was considered. It was observed that Mahalanobis distance measure outperformed the k-NN classifier for access control and recognition system due to its high recognition rate (98.4%), genuine acceptance rate (98.37) and its stern adherence to both FAR and FRR (0.0144, 1.568) than kNN with 94.9% and (0.392 and 2.895) respectively. This result demonstrates the robustness of Mahalanobis distance classifier for use access control system