Browsing by Author "Abikoye, Oluwakemi Christiana"
Now showing 1 - 20 of 31
Results Per Page
Sort Options
Item A 2- Dimensional Gabor-Filters for Face Recognition System: A Survey(Faculty of Computers and Applied Computer Science, "Tibiscus" University of Timişoara, Romania., 2017) Aro, Taye Oladele; Oluwade, Bamidele A; Abikoye, Oluwakemi Christiana; Bajeh, Amos OrenyiAn efficient recognition algorithm for human face is a technique discovered to be based on good facial feature representation. A two-dimensional Gabor represents a group of wavelets which capture optimally frequency information and local orientation from a digital image. Gabor filters have been employed greatly and highly considered to be one of the best performing techniques for feature extraction in face recognition owing to its invariant against local distortion initiated by changes in expression, lighting and pose. This paper discusses some reviews on 2-Dimensional Gabor-based facial recognition techniques. The huge feature dimensionality problem associated with Gabor feature is stated and several techniques to reduce this problem are suggested.Item Adaptive Neuro-Fuzzy Inference System for HIV/AIDS Diagnosis, Clinical Staging And Regimen Prescription(Published by Georgian Technical University and St. Andrew the First Called Georgian University of The Patriarchy of Georgia, 2017) Abikoye, Oluwakemi Christiana; Popoola, Eunice Oluwadamilola; Aro, Taye Oladele; Popoola, Victor OluwatobiHIV/AIDS is one of the life threaten diseases in the society today, which has resulted into loss of many lives in the world. Despite the deadly nature of the disease and the availability of effective treatment, most people still do not know their HIV status, largely because of lack of privacy, stigmatization and discrimination that exist in the community. To bridge these gaps identified, an adaptive neuro-fuzzy Inference system is efficiently developed to diagnose and manage patients by placing them into appropriate clinical stages as recommended by the World Health organization (WHO) and prescribing to them the life-saving Antiretroviral drugs through a standardized set of rules that will enable efficient use of scarce resources, encourage testing and lead to overall better treatment outcome for patients.Item Analysis of Human Factors in Cyber Security: A Case Study of Anonymous Attack on Hbgary(School of Engineering and Computing, University of the West of Scotland, Paisley., 2017) Gyunka, Benjamin Aruwa; Abikoye, Oluwakemi ChristianaPurpose: This paper critically analyses the human factors or behaviours as major threats to cyber security. Focus is placed on the usual roles played by both the attackers and defenders (the targets of the attacker) in cyber threats’ pervasiveness and the potential impacts of such actions on critical security infrastructures. Design/Methodology/Approach: To enable an effective and practical analysis, the Anonymous attack against HBGary Federal (A security firm in the United State of America) was taken as a case study to reveal the huge damaging impacts of human errors and attitudes against the security of organizations and individuals. Findings: The findings revealed that the powerful security firm was compromised and overtaken through simple SQL injection techniques and a very crafty social engineering attack which succeeded because of sheer personnel negligence and unwitting utterances. The damage caused by the attack was enormous and it includes the exposure of very sensitive and personal data, complete shutdown of the website, loss of backup data and personnel character deformations. The research also found that damaging human factors results from ignorance or illiteracy to basic security practices, carelessness and sometimes sabotage by disgruntled employees from within and these vulnerabilities have become prime target for exploitation by attackers through social engineering attacks. Social engineering was also discovered to be the leading attack technique adopted by attackers within the cyber space in recent years. Practical Implications: The paper concludes by advocating assiduous training and cyber securityawareness programmes for workforces and the implementations and maintenance of basic security culture and policies as a panacea for social engineering cyber attacks against individuals and organizations. Originality: Lots of work has been done and many still on-going in the field of social engineering attacks and human factors, but this study is the first to adopt an approach of a practical case study to critically analyze the effects of human factors on cyber security.Item Binary Text Classification Using An Ensemble of Naïve Bayes and Support Vector Machines(Georgian Technical University and St. Andrew the First Called Georgian University of The Patriarchy of Georgia, 2017) Abikoye, Oluwakemi Christiana; Omokanye, Samuel Oladeji; Aro, Taye OladeleText classification is being done by classifiers over the years, combining classifiers together can result in better classification and thus Naïve Bayes algorithm is combined with Support vector machine through stacking and the results shows that the ensemble results in an increase in the classification accuracy though at the expense of the time taken by the ensemble to build its classification modelItem Comprehensive Evaluation of Appearance-Based Techniques for Palmprint Features Extraction Using Probabilistic Neural Network, Cosine Measures and Euclidean Distance Classifiers(Editura Universitatii din Pitesti, 2018) Akande, Noah Oluwatobi; Abikoye, Oluwakemi Christiana; Adeyemo, I.A; Ogundokun, Roseline Oluwaseun; Aro, Taye OladeleMost biometric systems work by comparing features extracted from a query biometric trait with those extracted from a stored biometric trait. Therefore, to a great extent, the accuracy of any biometric system is dependent on the effectiveness of its features extraction stage. With an intention to establish a suitable appearance based features extraction technique, an independent comparative study of Independent Component Analysis (ICA), Linear Discriminant Analysis (LDA) and Principal Component Analysis (PCA) algorithms for palmprint features extraction is reported in this article. Euclidean distance, Probabilistic Neural Network (PNN) and cosine measures were used as classifiers. Results obtained revealed that cosine metrics is preferable for ICA features extraction while PNN is preferable for LDA features extraction. Both PNN and Euclidean distance yielded a better recognition rate for PCA. However, ICA yielded the best recognition rate in terms of FAR and FRR followed by LDA then PCA.Item Computational Analysis of GSM Security Algorithm(Published by the IEEE Nigeria Computer Chapter., 2008) Abikoye, Oluwakemi Christiana; Oluwade, DeleThe security and authentication mechanisms incorporated in the Global System of Mobile Network (GSM) make it the most secure mobile communication standard currently available, particularly in comparison to the analog systems. GSM security and encryption algorithm are used to provide authentication and radio link privacy to users on GSM network. Security in GSM consists of the following aspects: subscriber identity authentication, subscriber identity confidentiality, signaling data confidentiality, and user data confidentiality. These various security aspects are addressed by the user authentication algorithm(called A3), the signal encryption algorithm(A5) and the encryption key generation algorithm(A8). Both A3 and A8 algorithms are similar in functionality and are commonly implemented as a single algorithm called COMP128. In this paper, a computational time complexity analysis of COMP 128 is performed. It is shown that the running time of user authentication algorithm COMP128 is constant, meaning that the number of executions of basic operations in COMP128 algorithm is fixed and so the total time is bounded by a constantItem Conficker: An enviable threat to a computer and internet system(Fafakawa Centre, University of Cape Coast, Ghana., 2011) Adebayo, O.S; Mabayoje, M.A; Abikoye, Oluwakemi Christiana; Amit, Mishra; Olagunju, MukailaThe fear of computer worms and virus have become the beginning of wisdom for most computer users just as they both pose threats to the computer and its all activities, organs and usefulness of computer systems. Most of the computer and internet users cannot also differentiate between Computer Virus and Worms and therefore risk a high damage to their system by performing various kinds of activities that are harmful to their system. The categories, damages, symptoms, preventions of a conficker worm among others are discussed in this paper.Item Design and Implementation of Ayo Olopon Game(2015) Babatunde, Akinbowale Nathaniel; Abikoye, Oluwakemi Christiana; Mabayoje, Medinat Abolore; Akintola, Abimbola Ganiyat; Oderemi, ChristianaThe difficulty encountered with the present manual mode of the “Ayo olopon” game is majorly on the tools used in playing it. The game utilizes the earth as the board of the game and uses stones, leaves as other parameters in playing it. Though some still use boards carved from wood and seeds but there is still a problem with portability. This research which is centred on automating the “Ayo olopon” game is inevitable because of the increasing need for system automation. There are many difficulties associated with the existing manual approach of playing the “Ayo olopon” game which ranges from loss or misplacing of seeds to inaccuracy in scores calculation due to human errors. This system is designed to efficiently handle the entire process of the game play. Two algorithms were implemented for the game manipulation. The first for handling the incrementing of the next cell while the other an entire play turn. Out of the diverse rules for the game play, one was selected and implemented. With the proposed system, “Ayo olopon” game playing is more efficient when compared to its present mode of play. The study outlined the concepts of the analysis and design methodology of the proposed system, compares it with the existing system and explains the design and implementation of the system using Microsoft C# as its programming language on the Visual Studio.NET platform serving as the Integrated Development Environment (IDE). The research was tested using the Windows operating system and worked successfulItem Design and Implementation of Yoruba Language Cryptosystem(Published by Faculty of Physical Sciences, University of Ilorin, 2014) Abikoye, Oluwakemi Christiana; Akintola, Abimbola Ganiyat; Ibrahim, SSecurity has always been a bedrock for transaction and protection of human lives and until the existence of artificial intelligence, humans have learned to trust themselves for each other safety or safety of information except for few times where security was threatened by breach of trust or betrayal by persons which often led to enormous crisis. Recent research works have been able to achieve some high level of success in security of information. However, communication in Yoruba language using the Yoruba alphabet and symbols is still at its infancy. In other to achieve acceptable quality of information security of Yoruba alphabet and symbols in text, there is need for a robust security system. There are multiple layers of security, requirements and features which need automated technicality for assurance of effective security. In this paper, encryption and decryption of information written in Yoruba as text is achieved using Caesar Cipher Algorithm to carry the Yoruba people along in the advancement taking place in the world of information technology. It adopted a symmetric encryption algorithm that uses one key for both encryption and decryption and used digits as its ciphertext which is a novel means of ensuring difficulty in breaking the codes as patterns with digits are not easily recognizable.Item Development of a System for Extraction of Patient Drug Prescription from Clinical Notes(Faculty of Communication and Information Sciences, University of Ilorin, Ilorin, Nigeria, 2018) Abikoye, Oluwakemi Christiana; Salihu, Shakirat Aderonke; Shodolu, Wasiu OlabodeDoctors are saddled with the challenges of writing clinical notes which serve as a form of documenting the patient’s clinical histories and at the same time write a drug prescription for pharmacy to dispense. This manual process of documentation and writing of prescription is very tedious, stressful, involves duplication and time consuming, most especially for hospital that have hundreds of patients that needs diagnosis. This paper deals with the extraction of drugs prescribed by doctors in the clinical note of the patient. The developed system was designed using MySQL and Visual Basic.NET. The system also takes into considerations the registration of patients, diagnosis by the Doctor and reports on patient’s history. A total number of 50 drugs and illness were generated in the library used and four different samples of clinical notes were collected from Doctors to test run the system. It was able to extract the drug prescribed as written in the clinical notes successfully.Item Development of a Model for the implementation of GSM Algorithm(Mathematical Association of Nigeria., 2009) Abikoye, Oluwakemi Christiana; Bajeh, Amos OrenynThe motivations for security in cellular Telecommunication systems are to secure conversations and signaling data from interception as well as to prevent cellular telephone fraud. With the older analog-based cellular telephone systems such as Advanced Mobile Phone System and the Total access communication System, all these motivation were not achieved. Another security consideration with cellular telecommunications systems involves identification credentials such as the Electronic Serial number, which are transmitted “in the clear”. In analog systems. With more complicated equipment, it is possible to receive the Electronic Serial Number and use it to commit cellular telephone fraud by “cloning” another cellular phone and placing calls with it. This led to the development of digital technologies, with the advent of digital technologies, wireless voice communications are much difficult to intercept than analog systems. GSM is a standard for a digital mobile cellular communication. In this paper, the three different GSM security algorithms namely, A3, A5 and A8 were studied and we present a computer model for one of the three GSM security algorithms known as A3(User authentication) algorithm. The model is implemented using Visual Basic 6.0 Programming Language.Item Development of data encryption and decryption algorithm using Modified Rail Fence Cipher(A.M.S.E. France., 2009) Omolehin, Joseph O; Abikoye, Oluwakemi Christiana; Jimoh, Rasheed GbengaThe increase use of electronic means of data transfer from one point to the other coupled with growth in networking and internet has really called for vital security. This security is usually achieved by encryption and digital signature. Data encryption is the automated process of securing data so that no unauthorized person can access them It makes use of different algorithm to scramble (encrypt) the original message called plain text into an unintelligible message called cipher text. Key is an important object in data encryption. There are some data encryption algorithm that uses same key for both its encryption and decryption while some uses two keys, one for encryption and the other for decryption. Rail fence cipher is categorized under data encryption algorithm that uses same key for both its encryption and decryption. The number of rows used to break up text/data to be encrypted into rows and column arrangement serves as the key in Rail fence cipher. In this paper, we present the algorithm that can encrypt and decrypt data using a Modified Rail fence Cipher. The modification includes the inclusion of a subroutine that re-encrypts the data at a set time interval so that after the first use of a known key, the subsequent key(s) that will be used will be internally determined by the algorithm. This ensures that the key is kept confidential.Item Fuzzy Logic Approach to determine Security Level of Biometrics(IEEE Nigeria Computer Chapter., 2014) Abikoye, Oluwakemi Christiana; Adewole, Kayode S; Salahdeen, N.KOne of the methods that use uniquely identifiable physical or behavioral characteristics to identify individuals is Biometrics. As Biometrics becomes the most promising authentication technology, the world is faced with the challenge of choosing the best among the biometrics traits for their security purposes. In this paper, a model is proposed using fuzzy logic approach to evaluate the Biometrics traits in order to determine their security level. Biometrics characteristics categorized by previous researchers in the field of Biometrics was used as knowledge base. The model developed was simulated using Qtfuzzylite 4.0 (A Fuzzy Logic Control Library in C++) and the results show that Fingerprint, Hand Geometry, Hand Veins, Iris, Ear Canal and Palm print have medium security level among the fifteen (15) Biometrics traits considered based on the following metrics; Universality, Uniqueness, Permanence, Collectability, Performance and Circumvention. The results of this simulation further revealed that fuzzy logic approach provides a simple way of drawing definite conclusions from vague and imprecise informationItem Handwritten Character Recognition using Brainnet Library(Faculty of Computers and Applied Computer Science, "Tibiscus" University of Timişoara, Romania., 2016) Babatunde, Akinbowale Nathaniel; Abikoye, Oluwakemi Christiana; Babatunde, Ronke Seyi; Kawu, R.OHandwriting has continued to persist as a means of communication and recording information in dayto- day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition of handwriting has practical significance, as in reading handwritten notes in a PDA, in postal addresses on envelopes, in amounts in bank checks, in handwritten fields in forms, etc. An off-line handwritten alphabetical character recognition system using multilayer feed forward neural network is described, and a method, called, diagonal based feature extraction is used for extracting the features of the handwritten alphabets. This project implements this methodology using BrainNet Library. Ten data sets, each containing 26 alphabets written by various people, are used for training the neural network and 130 different handwritten alphabetical characters are used for testing. The proposed recognition system performs quite well yielding higher levels of recognition accuracy compared to the systems employing the conventional horizontal and vertical methods of feature extraction. This system, if modified will be suitable for converting handwritten documents into structural text form and recognizing handwritten namesItem Hybridized Intrusion Detection System Using Genetic and Tabu Search Algorithm(Faculty of Computers and Applied Computer Science, "Tibiscus" University of Timişoara, Romania., 2017) Abikoye, Oluwakemi Christiana; Aro, Taye Oladele; Obisesan, Racheal Oyeranti; Babatunde, Akinbowale NathanielAs transactions, data communication and information systems are drastically increasing in the society, so many people are connected through internet for e-commerce and other electronic activities. The introduction of internet technology in business brings about great relief in reaching the end users. Also this technology invites numerous security threats of misuses and intrusions. Intrusion detection systems are significant element for network security infrastructure which plays key role in the detection of several attacks along the network. They are several techniques being employed in intrusion detection, but these methods are not completely flawless. In quest for an efficient Intrusion Detection System (IDS), this study employs hybridization technique which involves the Genetic Algorithm and Tabu-search to produce a robust Intrusion Detection System. Evaluation of the system on KKD 99 intrusion database, shows that the performance of proposed hybridized IDS is better than that of Genetic algorithm or tabu search method alone which can significantly detect almost all anomaly data in the computer network.Item The Impact of Android Malware On Mobile Health Applications (Mhealth Apps) Services(Published by IEEE Nigeria Computer Chapter in collaboration with Department of Computer Science, University of Ilorin, Ilorin, Nigeria., 2016) Benjamin, Aruwa Gyunka; Abikoye, Oluwakemi ChristianaSophisticated and advanced malware are being created on a daily basis and have become one most stealthy and dangerous attack approach used against critical information technology infrastructures in recent times. This paper seeks to expose Android malware attack strategies and concealment techniques and the consequent impacts on the security and privacy of electronic healthcare (eHealth) systems, particularly mobile health applications (mHealth apps). The main aim is to reveal the danger ignorant and vulnerable users, especially the sick and desperate, are exposed to when it comes to issues of Trust and Privacy arising from the use of these prevalent technology. A detailed analysis, based on secondary literatures, of various malware propagation methods and infection vectors was conducted. The research revealed that the healthcare industry information technology infrastructures experience the most of cyber attacks in recent years above other industries. With the adoption of ICT in Medicare, hospitals now accrues and stores more sensitive and personal data about their patients, more than accrued by banks and employers, but gives little or no attention to the security of their information systems. Malware attacks poses serious threats to information management and can distort critical health services such as the control of communicable and non-communicable diseases. The paper concludes by recommending for extensive peer-review of mHealth apps and for intensive measures to be taken by hospitals in implementing and continuous monitoring of a secured ICT infrastructure.Item Implementation of Textual Information Encryption using 128, 192 and 256 bits Advanced Encryption Standard Algorithm(Faculty of Computers and Applied Computer Science, "Tibiscus" University of Timişoara, Romania., 2017-12) Abikoye, Oluwakemi Christiana; Garba, Qudus Adesola; Akande, Oluwatobi NoahIndividual or organizational sensitive data and information need to be prevented from unauthorized access. Several reports of middle man attacks and intrusion in form of hacking have been reported over the years when data are sent over wired or wireless media. One of the ways to prevent these is to either secure the medium through which information is being sent or to put measures in place to secure the actual information being sent. Though implementing both options could be expensive, however, implementing any of the option could still be effective. This could be achieved by making the data being sent meaningless to a third party but meaningful to the intending recipient. Cryptography is a proven way to achieve this. It entails using certain mathematical techniques to make a data unreadable and meaningless to any other person except the actual recipient who has the key needed to decrypt the encrypted data. Rijndael algorithm; which is the Advanced Encryption Standard (AES) for implementing cryptography is presented in this paper. It is a symmetric approach to implementing cryptography as it uses the same key for encryption and decryption. A detailed analysis of its implementation using its various 128, 192 and 256 bits key lengths is presented in this paper. The encryption and decryption process is made more secured by sending the encrypted text to the recipients email while the decryption key is sent to the recipient’s phone number. This is done to prevent instances where the recipients email is hacked.Item Improved Performance of Intrusion Detection System using feature Reduction and J48 Decision Tree Classification(Department of Computer Science, University of Ilorin, Ilorin, Nigeria, 2016) Abikoye, Oluwakemi Christiana; Balogun, A.Oluwagbemiga; Olarewaju, A.Kehinde; Bajeh, Amos OrenyiDue to the obvious importance of accuracy in the performance of intrusion detection system, in addition to the algorithms used there is an increasing need for more activities to be carried out, aiming for improved accuracy and reduced real time used in detection. This paper investigates the use of filtered dataset on the performance of J48 Decision Tree classifier in its classification of a connection as either normal or an attack. The reduced dataset is based on using Gain Ratio attribute evaluation technique (entropy) for performing feature selection (removal of redundant attributes) and feeding the filtered dataset into a J48 Decision Tree algorithm for classification. A 10-fold cross validation technique was used for the performance evaluation of the J48 Decision Tree classifier on the KDD cup 1999 dataset and simulated in WEKA tool. The results showed J48 decision tree algorithm performed better in terms of accuracy and false positive report on the reduced dataset than the full dataset(Probing full dataset: 97.8%, Probing reduced dataset: 99.5%, U2R full dataset: 75%, reduced dataset: 76.9%, R2L full dataset: 98.0%, reduced dataset: 98.3%).Item INFORMATION SECURITY MODEL USING TWOFISH ENCRYPTION AND DECRYPTION ALGORITHM(Faculty of Communication and Information Sciences, University of Ilorin, Ilorin, Nigeria, 2016) Abikoye, Oluwakemi Christiana; Ademarati, Oluwatoyin ACryptography has gained more attention from researchers due to the need to enable the security of messages sent over an unsecure network. Message sender want to ensure that only authorized receiver is able to interpret the message sent. So, even if a message falls in the hands of another person other than the authorized recipient, the message is still secured. This proposed system shows how a symmetric key algorithm (Twofish) is used to encrypt messages to make it secure when sent over the network. In this paper, the Twofish algorithm with a 16 bits character key length is implemented using JAVA programmimg language. The result is efficient because it gives a different ciphertext each time encryption is performed.Item A K-means and fuzzy logic-based system for clinical diagnosis (staging) of cervical cancer(Inderscience, 2017) Abikoye, Oluwakemi Christiana; Olajide, Emmanuel Oluwaseun; Babatunde, Akinbowale Nathaniel; Akintola, Abimbola GaniyatIn cases of the burden arising from cancer world, cervical cancer is the most common type of gynaecological cancer, accounting 8% (527,624 cases in 2012) of all female malignancies, second only to breast and colorectal cancer. Women with cervical cancer constitute patient populations that are in need of ongoing, person-centred supportive care. The unavailability of technologies that can determine the stage of cervical cancer constitutes a problem in the actual diagnosis. Previously physician predict the cancer stage on the basis of their experience in the field, however this is prone to error because man’s judgement are sometimes clouded by emotions. This research seeks to address this problem with the design of a k-means and fuzzy logic based system for clinical diagnosis (staging) of cervical cancer. The K-means algorithm was used for the grouping of data and fuzzy logic for the rule based prognosis of cervical cancer