Publication

Publisher:
 International Journal Of Computer Science And Security, Malaysia, Volume 5 Issue 4, Page 414-424
Publication Type:
 Journal
Publication Title:
 Adaptive And Faster Approach To Fingerprint Minutiae Extraction And Validation
Publication Authors:
 Iwasokun G. B., Akinyokun O. C., Alese B. K. And Olabode O. (2011)
Year Published:
 2011
Abstract:
Fingerprint is a very vital index in the field of security. Series of Automatic Fingerprint Identification Systems (AFIS) have been developed for human identification. These systems compare each of the features of a template fingerprint image with each of the features in the feature sets in the reference database to determine whether the template and each of the reference images are from the same source. Comparison is done on the basis of preset parameters such as feature type, location, orientation and so on. Getting the features used for the construction of a reference database from the images involve the implementation of a sound fingerprint feature detection, validation and extraction algorithm. In this paper, the process of detecting and extracting true and false feature points in a fingerprint image is discussed. Attention is also given to the elimination of the false feature points through the process of validation. Some of the existing fingerprint feature extraction and validation algorithms were firstly modified and the resulting algorithms were implemented. The implementation was carried out in an environment characterized by Window Vista Home Basic as platform and Matrix Laboratory (MatLab) as frontend engine. Fingerprints images of different qualities obtained from the manual (ink and paper) and electronic (fingerprint scanner) methods were used to test the adequacy of the resulting algorithms. The results obtained show that with the modified algorithm, valid and true minutiae points were extracted from the images with greater speed and accuracy. 
Publisher:
 International Journal Of Research And Reviews In Applied Sciences’ ISSN 2076-7344 9(3)
Publication Type:
 Journal
Publication Title:
 Time Series Forecaster With Neural Network: A Case Study Of Stock Of Intercontinental Bank, Nigeria
Publication Authors:
 Akintola K. G., Alese B. K. And Thompson A. B. (2011)
Year Published:
 2011
Abstract:

Nil

 
Publisher:
 International Journal Of Computer And Organisation Trends, Vol. 1 (3): 5-9
Publication Type:
 Journal
Publication Title:
 Design Of A Hybrid Aircraft Tracking System For Developing Countries
Publication Authors:
 Thompson A. F., Gabriel A. J. And Alese B. K. (2011)
Year Published:
 2011
Abstract:
Aircraft crashes are always accompanied with monumental loses. Other than the very high mortality rate involved, the grand scale destruction of property and the attendant socio - economic costs have made air crashes one of the most feared event in the world today. Guaranteeing a hundred percent safety during flight is impossible. We present, the design of an aircraft tracking system with a view to enhancing the effective tracking of aircrafts in flight, thereby ensuring air safety and preserving public trust and belief in the safety of air travel. 
Publisher:
 International Journal Of Computer Science And Information Security (IJCSIS), USA Vol. 9, No. 7. Pages 134-143
Publication Type:
 Journal
Publication Title:
 Design And Implementation Of Internet Protocol Security Filtering Rules In A Network Environment
Publication Authors:
 Alese B. K., Gabriel J. A. And Adetunmbi A. O. (2011)
Year Published:
 2011
Abstract:
Internet Protocol Security (IPSec) devices are essential elements in network security which provide traffic filtering, integrity, confidentiality and authentication based on configured security policies. The complexities involved in the handling of these policies can result in policy conflicts that may cause serious security breaches and network vulnerabilities. This paper therefore presents a mathematical model developed for IPSec filtering rules and policies using Boolean expressions. A comprehensive classification of security policy conflicts that might potentially exist in a single IPSec device (intra-policy conflicts) or between different network devices (inter-policy conflicts) in enterprise networks is also presented. All these are implemented in user-friendly interfaces that significantly simplify the management and/or proper configuration of IPSec policies written as filtering rules, while minimizing network vulnerability due to security policy mis-configurations. 
Publisher:
 International Journal Of Wireless Networking And Communications 1(1) 8-15, 2011
Publication Type:
 Journal
Publication Title:
 Development Of Models For Managing Network Congestion On Global Systems For Mobile Systems (GSM) In Nigeria
Publication Authors:
 Kuboye B. M., Alese B. K., Fajuyigbe O. And Adewale O. S. (2011)
Year Published:
 2011
Abstract:
Unexpectedly, the level of patronage being experienced in Global System for Mobile Communication (GSM) in Nigeria is overwhelming. This is as a result of freedom of calling from anywhere at anytime and clarity of the voice enjoyed in GSM since it is on a digital technology platform. This has brought a lot of congestion in the network resulting in poor services by the operators. This research has developed a management algorithm for the management of the congestion experienced in the GSM network in Nigeria. It explores the use of Erlang-B in determining the appropriate probability level for some range of subscribers. Thereafter, when there is congestion, block time sharing, dynamic allocation without time slicing, dynamic allocation time slicing with signal sensing, frequently recent call allocation, and priority allocation algorithms were developed to manage the congestion. Furthermore, a hybrid algorithm was developed that integrates all the algorithms together in other to manage the congestion considering all the strengths and constraints of each algorithm. If the recommended congestion management algorithm is followed comprehensibly, the congestion problem on the GSM network will be reduced drastically. 
Publisher:
 Oghenerukevwe E. Oyinloye, Ayodeji I. Fasiku, Alese B. K. And Akinbohun F. (2011)
Publication Type:
 Journal
Publication Title:
 Development Of Enhanced Token Using Picture Password And Public Key Infrastructure Mechanism For Digital Signature
Publication Authors:
 Oghenerukevwe E. Oyinloye, Ayodeji I. Fasiku, Alese B. K. And Akinbohun F. (2011)
Year Published:
 2011
Abstract:
The recent advances in actualizing a highly networked environment where data is been exchanged from one person to environment where data is been exchanged from one person to another electronically has given great concern for data integrity,another electronically has given great concern for data integrity,confidentiality and security. It is stated that the exchange of confidentiality and security. It is stated that the exchange of information range from telephone conversation, computer files,information range from telephone conversation, computer files,signals e.t.c. The vulnerability of networks makes data exchangesignals e.t.c. The vulnerability of networks makes data exchange prone to a high level of security threats. Security mechanisms areprone to a high level of security threats. Security mechanisms arebeen employed in the transport layer but there is a need to extendbeen employed in the transport layer but there is a need to extendsecurity mechanisms to the information/data been exchanged. Severalsecurity mechanisms to the information/data been exchanged. Several security measures have been deployed so far Which include PINS,security measures have been deployed so far Which include PINS,textual passwords (which are vulnerable to brute force, dictionary textual passwords (which are vulnerable to brute force, dictionary attack, complex meaningless password), graphical passwords and attack, complex meaningless password), graphical passwords andPKIs to reduce the risk of loss which can be valued at great amounts,PKIs to reduce the risk of loss which can be valued at great amounts,but all of these have not provided the user the convenience andbut all of these have not provided the user the convenience andinterest required to achieve full human capabilities in securing data.interest required to achieve full human capabilities in securing data.This paper proffers an improved solution for data security, integrityThis paper proffers an improved solution for data security, integrityand confidentiality via the development of enhanced token for dataand confidentiality via the development of enhanced token for data signature using the underlining technologies of picture password signature using the underlining technologies of picture password algorithm and public key infrastructure.algorithm and public key infrastructure 
Publisher:
 International Journal Of Computer Science And Information Security
Publication Type:
 Journal
Publication Title:
 Design Of A Secure Information Sharing System For E-policy In Nigeria
Publication Authors:
 Alese B. K., Iyare O. M. And Falaki S. O. (2011)
Year Published:
 2011
Abstract:
Problems of National concerns such as kidnapping, ritual killings, prevention, detection and control of crimes, provision of security to lives and properties and many more necessitate information sharing, coordination and collaboration with members of the Police Force, Businesses and Citizens within the country. A number of daunting challenges exist towards the development of an efficient information sharing system. The principal challenge would be the development of a system that securely exchanges information between members of the police, businesses and the populace in other to restructure the police services. In this paper, a means was devised to secure the information sharing system for confidential sharing of secret information between members of the police force. The secure system which enforces access control and information confidentiality was based on the principles of Bell LaPadula model and the Rivest Shamir Adelman (RSA) algorithm. The system assures secure and stream-lined information sharing among the police to avoid intimidating activi 
Publisher:
 International Conference On Education, Training And Informatics: ICETI 2011, Orlando Florida, USA
Publication Type:
 Conferenceproceeding
Publication Title:
 Web-Based Virtual Classroom System Model For Computer Science Education Programme In Nigeria
Publication Authors:
 Adewale, O. S., Ibam, O. E. And Alese, B. K. (2011)
Year Published:
 2011
Abstract:

Nil

 
Publisher:
 Proceedings Of The 10th International Conference, Nigeria Computer Society
Publication Type:
 Conferenceproceeding
Publication Title:
 A Mathematical Approach To Fingerprint Enhancement
Publication Authors:
 Iwasokun G. B., Akinyokun O. Co., Alese B. K. And Olabode O. (2011)
Year Published:
 2011
Abstract:

Nil

 
Publisher:
 International Multi-Conference Of Engineers And Computer Scientists, IMECS 2012, 14-16 March, 2012, Hong Kong, Pp730-735
Publication Type:
 Conferenceproceeding
Publication Title:
 A Multi-level Model For Fingerprint Enhancement
Publication Authors:
 Iwasokun G. B., Akinyokun O. C., Alese B. K. And Olabode O. (2011)
Year Published:
 2011
Abstract:
Fingerprint has remained a very vital index for human recognition. In the field of security, series of Automatic Fingerprint Identification System (AFIS) have been developed. One of the indices for evaluating their contributions to the enforcement of security is the degree with which they appropriately verify or identify fingerprint images. This degree is generally determined by the quality of the images and the efficiency of the algorithm. In this paper, a modified version of an existing mathematical algorithm for improving the quality of fingerprint image through enhancement is discussed and implemented. The modified algorithm consists of sub-models for fingerprint segmentation, normalization, ridge orientation estimation, ridge frequency estimation, Gabor filtering, binarization and thinning. The implementation was characterized by Window Vista Home Basic operating system as platform and Matrix Laboratory (MatLab) as frontend engine. Synthetic images as well as real fingerprints obtained from the manual method of ink and paper were used to test the adequacies of the sub-models and the resulting algorithm. The results show that each sub-model performs well when images with free or minimal noise level were used. The necessity of each stage of the enhancement is also revealed