Publication
Publisher:
International Institute For Science, Technology & Education Accelerating Global Knowledge Creation And Sharing
Publication Type:
Journal
Publication Title:
Protecting Legitimate Software Users
Publication Authors:
Adu M. K., Alese B. K., Adewale O. S. And Adetunmbi A. O.
Year Published:
2013
Abstract:
Publisher:
International Journal Of Computer Applications
Publication Type:
Journal
Publication Title:
Development Of A Lattice-based Cryptosystem
Publication Authors:
Anyanwu S. I., Alese B. K. And Obe O. O.
Year Published:
2013
Abstract:
This work proposes a lattice-based cryptosystem using
embedded technique of the closest vector problem (CVP). It
adopts the key-gen algorithms of [1], and improves on vector
reduction method for encryption/decryption. With this we
achieved great implementation speed and time for an
acceptable security parameter.
Publisher:
Anale. Seria Informatică
Publication Type:
Journal
Publication Title:
A Neuro-Fuzzy System For Detection During Interrogation In Law Enforcement Agency
Publication Authors:
Iyare O., Alese B. K., Adewale O. And Falaki S.
Year Published:
2013
Abstract:
The development of soft-computing
approaches in law enforcement agencies has a wide
range of application to intelligence analysis in the face of
interrogation and evidence gathering during
investigation. The capability of these tools to alleviate
attempted deception by an informant or suspect is
affected by many issues including the type of critical
method, the type of hybridization used, and the ability to
address issues of source reliability and information
credibility. This work at the end will presents a hybrid
model using neuro-fuzzy system to aid in the detection of
deception during interrogation
Publisher:
Anale. Seria Informatică
Publication Type:
Journal
Publication Title:
Design Of Software Piracy Prevention Technique Using Mobile Agent Messaging Call
Publication Authors:
Adu M. K., Alese B. K. And Adetunmbi A. O.
Year Published:
2013
Abstract:
The rapid development of computer network
especially the internet has enabled new software capabilities
and wide market interest. The reality that this technology
will virtually place all computer users on the internet is a
major motivating factor in this work. This paper proposes a
software piracy prevention technique in which client/user
purchases a software product, but must connect to the
remote server of the software developer before installation.
The user provides an activation code that activates mobile
agent. The validity of the activation is checked, the software
user identity information is compared with store
information in the database of the developer to ascertain
authenticity and prevent piracy. A mathematical model is
adopted for measuring the effectiveness of mobile agent
migration in terms of network load which is expected to be
at minimal
Publisher:
School Of Computing And Information Systems
Publication Type:
Journal
Publication Title:
Land Monitoring In Nigeria Using Geo-spatial Data Mining Approach.
Publication Authors:
Thompson, A.F., Adetunmbi A. O. And Alese B. K.
Year Published:
2013
Abstract:
Publisher:
School Of Computing And Information Systems
Publication Type:
Journal
Publication Title:
School Of Computing And Information Systems
Publication Authors:
Thompson, A.F., Adetunmbi A. O. And Alese B. K.
Year Published:
2013
Abstract:
Publisher:
International Journal Of Networks And Communications.
Publication Type:
Journal
Publication Title:
A Discriminatory Model Of Self And Nonself Network Traffic
Publication Authors:
Adetunmbi A. O., Olubadeji Bukky, Alese B. K. And Adeola O. S.
Year Published:
2013
Abstract:
The matrix of business and other transaction systems over the Internet makes computer security a critical issue in our day-to-day activities. In recent times, various approaches ranging from rule-based, expert system to data mining have been subjected to extensive research in handling security breaches on computer networks. Immune system (IS) presents a protection against the possibility of malfunctioning and failure of individual host cells. In mammals it keeps the organisms free of pathogens which are unfriendly foreign organisms, cells, or molecules. Two approaches to change detection which are based on the generation of T-cells were examined. One is an existing model while the other model is proposed by us, the one proposed by us is called immunological model, which is a protection model capable of autonomously detecting (Nonself) and opposing the attempts at intrusion and exploitation. The two models were implemented using C++ programming language and their feasibility determined on 1999 International Knowledge Discovery Intrusion Detection Datasets. The results reveal that our proposed model outperforms the existing model not only in terms of detection accuracy but also in terms of simplicity and generation of explainable rules inform of if ... then statements. The classification accuracy of our model christened IMSNT on training and test Datasets are 97.06% and 86.39% as against 89.65% and 85.70% on the Stephanie et al approach, which shows that it is a promising approach. The proposed system apart from its capability of detecting and monitoring the activities on the network can be used in extracting virus signature patterns.
Publisher:
International Journal Of Education And Research
Publication Type:
Journal
Publication Title:
Design Of A Neurofuzzy-based Model For Active And Collaborative Online Learning,
Publication Authors:
Agbonifo, O. Catherine1*, Adewale, O. Sunday1 And Alese, B. Kayode
Year Published:
2013
Abstract:
An e-learning model that adapts instructional content to individual learning differences and creates new
assessment parameters such as studylevel, reviewstudylevel, collabotivelevel, assignments and finalexam
for a focused and improved study performance is proposed in this paper. The model was adopted from
Honey and Mumford model learning style questionnaire with four classes (activist, pragmatist, theorist
and reflector) which was used to determine the learners’ learning preference and matched with the
appropriate content presentation. Fuzzy c-means clustering technique was used to analyze the learners’
responses stored in the learner profile database to obtain the degree at which learners belong to each of
the four classes. The highest degree of membership value was selected among the four classes as the most
acceptable pattern of learning for individual learner. The result of the analysis showed classification
accuracy in the ratio of 96%:4% on the fifty learners’ data collected. Furthermore, the learners’ responses
from assessment parameters as they gainfully engaged with learning process were obtained in form of
studylevel, reveiewstudylevel, collabotivelevel, assignments and finalexam and stored in leaner profile
database. The values of the assessment parameters of each learner were fed into neurofuzzy-based
network where fuzzy logic technique was performed on a four-layer network. The stages are fuzzification
of the input variables, realization of fuzzy relations and rule evaluation, fuzzy aggregation of the rule
outputs and defuzzification. These were used to determine the learners learning capability. The results
obtained from the implementation of this model showed that the varied learning rate of 0.05, 0.10, 0.15
and 0.20 has the best network classification performance of 97% at 0.05. The tools used for the
implementation of this model include MySQL, PHP, HTML and Java.
Publisher:
Annuls Computer Science Services (Romania)
Publication Type:
Journal
Publication Title:
Detecting DDOS Attack In An Agent-Based Virtual Knowledge Community.
Publication Authors:
Ogunleye G. O., Adewale O. S. And Alese B. K.
Year Published:
2013
Abstract:
Publisher:
IMS Manthan International Journal Of Computer Science And Technology, India, Volume 6 Issue II
Publication Type:
Journal
Publication Title:
Computer Based Analysis Of Parents’ Contribution To The Productivity Of Public Secondary Schools In Nigeria
Publication Authors:
Iwasokun G. B., Alese B. K. Aranuwa F. O. And Adegoke M. O. (2012)
Year Published:
2012
Abstract: