Browsing by Author "Jimoh, Rasheed Gbenga"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item Anomaly Intrusion Detection Using An Hybrid Of Decision Tree And K-Nearest Neighbor(Journal of Advances in Scientific Research & Applications (JASRA), Faculty of Science, Adeleke University, Ede, Osun state., 2015-03-30) Balogun, Abdullateef Oluwagbemiga; Jimoh, Rasheed GbengaWith the dictate of the 21st century making the economy to be information-driven, securing this valuable asset becomes interesting engagement. Intrusion detection plays a vital role in this regard by allowing prospective attacks or threats to information resources by unauthorized person(s) be detected and prevented. Previous researchers have identified the need for a robust approach to intrusion detection. This paper presents an overview of intrusion detection and a hybrid classification algorithm based on decision tree and K Nearest neighbour. The data set is first passed through the decision tree and node information is generated. Node information is determined according to the rules generated by the decision tree. This node information (as an additional attribute) along with the original set of attributes is passed through the KNN to obtain the final output. The key idea here is to investigate whether the node information provided by the decision tree will improve the performance of the KNN. A performance evaluation is performed using a 10-fold cross validation technique on the individual base classifiers (decision tree and KNN) and the proposed hybrid classifier (DT-KNN) using the KDD Cup 1999 dataset on WEKA tool. Experimental results show that the hybrid classifier (DT-KNN) gives the best result in terms of accuracy and efficiency compared with the individual base classifiers (decision tree and KNN).Item Development of data encryption and decryption algorithm using Modified Rail Fence Cipher(A.M.S.E. France., 2009) Omolehin, Joseph O; Abikoye, Oluwakemi Christiana; Jimoh, Rasheed GbengaThe increase use of electronic means of data transfer from one point to the other coupled with growth in networking and internet has really called for vital security. This security is usually achieved by encryption and digital signature. Data encryption is the automated process of securing data so that no unauthorized person can access them It makes use of different algorithm to scramble (encrypt) the original message called plain text into an unintelligible message called cipher text. Key is an important object in data encryption. There are some data encryption algorithm that uses same key for both its encryption and decryption while some uses two keys, one for encryption and the other for decryption. Rail fence cipher is categorized under data encryption algorithm that uses same key for both its encryption and decryption. The number of rows used to break up text/data to be encrypted into rows and column arrangement serves as the key in Rail fence cipher. In this paper, we present the algorithm that can encrypt and decrypt data using a Modified Rail fence Cipher. The modification includes the inclusion of a subroutine that re-encrypts the data at a set time interval so that after the first use of a known key, the subsequent key(s) that will be used will be internally determined by the algorithm. This ensures that the key is kept confidential.Item On the relationship between Human Immunology and Computer Immunology.(IEEE Computer Nigeria Chapter, 2016) Yusuf- Asaju, Ayisat Wuraola; Salau- Ibrahim, Taofeeqoh Tosin; Jimoh, Rasheed GbengaItem A Review of Algorithms for Fingerprint Image Acquisition, Preprocessing and Minutiae Extraction(Faculty of Physical Sciences, University of Ilorin, Ilorin, Nigeria, 2014) Adewole, Kayode S; Jimoh, Rasheed Gbenga; Abikoye, Oluwakemi ChristianaBiometric recognition distinguishes between individuals using physical, chemical or behavioral attributes of the person. These attributes are called biometric identifiers or traits, and include fingerprint, palmprint, iris, face, voice, signature, gaint, and DNA among others. Fingerprint recognition is one of the oldest and most reliable biometric used for personal identification. Fingerprint has come a long way from tedious manual fingerprint matching. The ancient procedure of matching fingerprints manually was extremely cumbersome and time- consuming and required skilled personnel. In this paper, a review of algorithms for the various stages involved in fingerprint recognition such as fingerprint image acquisition, segmentation, normalization, ridge orientation estimation, ridge frequency, Gabor filtering, binarization, thinning, minutiae extraction, template generation, and template matching is presented. It was established that minutiae features of a person fingerprint truly make fingerprint of individual to be unique.Item Stepwise biometric procedures for managing student attendance in higher institutions of learning(Nigeria Computer Society, 2015) Kayode, Adewole S; Jimoh, Rasheed Gbenga; Abikoye, Oluwakemi Christiana; Ajiboye, Adeleke RaheemData and information security are very important issues in computing environment. Security of data prevents unauthorized users from accessing an individual personal information. Biometric is one of the authentication methods used in a wide range of application domains such as airline and banking environment to secure confidential data. This technique is more reliable and capable of distinguishing between an authorized person and an impostor than traditional methods such as passwords. Large numbers of higher academic institutions in the developing countries are still using the process of manual attendance for both lecture and examination for students' authentication and authorization, hence, the need for automated system that can assist in this area. In this paper, stepwise biometric procedures for managing students' attendance for both lectures and examinations are presented. The various stages involved in student attendance management are discussed and simulated. These include enrollment, fingerprint matching and attendance management. The results show that the proposed system is capable of reducing students' impersonation during lectures and examination in higher institution of learning.Item Survey of Video Encryption Algorithms(Covenant University, 2017) Babatunde, Akinbowale Nathaniel; Jimoh, Rasheed Gbenga; Abikoye, Oluwakemi Christiana; Isiaka, BResearch on security of digital video transmission and storage has been gaining attention from researchers in recent times because of its usage in various applications and transmission of sensitive information through the internet. This is as a result of the swift development in efficient video compression techniques and internet technologies. Encryption which is the widely used technique in securing video communication and storage secures video data in compressed formats. This paper presents a survey of some existing video encryption techniques with an explanation on the concept of video compression. The review which also explored the performance metrics used in the evaluation and comparison of the performance of video encryption algorithms is being believed to give readers a quick summary of some of the available encryption techniques.