Browsing by Author "Isiaka, R. M."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Building a Spammer Monitoring System Using Heuristic Rule-Based Approach(International Journal of Engineering and Technology, Centre of Professional Research Publications, 2012) Adewole, K. S.; Babatunde, R. S.; Isiaka, R. M.; Abdulsalam, S. O.Spam is a major problem of electronic mail system that has enjoyed extensive discourse. E-mail has been greatly abused by spammers to disseminate unwanted messages and spread malicious contents. Several anti-spam systems developed have been greatly abused and this is as evident in the proliferation of Spammer’s activities. Observing this fact, a protective mechanism to countermeasure the ever-growing spam problem is indeed inevitable. In this paper, a heuristic approach is proposed which employs a standard normalized Spammer’s languages harvested from Google and Yahoo spam language data set to build the knowledge base. The spam languages were prioritized based on the frequency of occurrence in the two global data sets. A threshold of 5% was established for a user without spamming history while 3% was set for a suspected spammer. A platform independent system was designed and implemented to monitor users’ mail in real time. As soon as the threshold is reached the user will be alerted and the suspected mail will be cancelled. The developed model was evaluated for accuracy and effectiveness using three composed email messages. It is recommended among others that this spam preventive model be incorporated in the architecture of every Internet Service Provider.Item Development of an Intrusion Detection System in a Computer Network(International Journal of Computers & Technology (IJCT), 2014) Babatunde, R. S.; Adewole, K. S.; Abdulsalam, S. O.; Isiaka, R. M.The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic.Item IMPLEMENTING MOBILE-LEARNING IN NIGERIA TERTIARY EDUCATIONAL SYSTEM – A Feasibility Study(International Journal of Science and Advanced Technology, 2011) Isiaka, R. M.; Adewole, K. S.; Olayemi, R. T.This paper reports the pilot study on the feasibility of mobile-learning (m-learning) in Nigeria Tertiary Educational system. It investigates the level of availability and usage of mobile devices among students in Nigerian Tertiary Institutions. University of Ilorin- a Federal University and Kwara State University were the case study. One hundred students (100); fifty (50) from each of the universities were randomly sampled for the study. Structured questionnaire was used to elicit the kind of mobile devices being use by the students and the use to which they are currently putting them. T-test statistical inference was used to analyze the mobile and computer usage patterns among the students, the calculated mean for the mobile devices usage pattern (9.43) is greater than that of computer usage pattern (5.30). This shows that students use mobile devices to perform more functions than computer systems. This result was further analyzed using paired samples correlations which show that there is a very weak correlation (0.241) between mobile devices and computer usage patterns. Also, the t-calculated is 18.888 and using degree of freedom of 99 and confidence interval of 0.050 in t-distribution table, the table value is 1.980. It was therefore inferred that since the table value is less than the t-calculated value, there is a significant difference between the mobile devices and computer usage patterns. The various types of mobile devices, and operations or usage to which they are being put to by students were summarized. Furthermore, the academic relevance of these devices was discussed in relation to relevant theories of learning such as; behaviourism, constructivism, and socialism [11] that is enhanced by the usage pattern of mobile devices. It was concluded that the overall intention of blended learning, distance learning or e-learning is becoming more feasible in Africa especially in Nigeria via an emerging concept of m-learning. The green signal is the product of the general advancements in mobile communication technology, the availability, affordability and popularity of mobile devices among the digital native and digital immigrants [9] in Nigerian higher institutions of learning.