Chikezie K Nwagu | Nnamdi Azikiwe University, Awka-Nigeria (original) (raw)
Papers by Chikezie K Nwagu
IOP Conference Series: Materials Science and Engineering, 2017
The most acknowledged payment mode is credit card for both disconnected and online mediums in tod... more The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.
Given the increasing awareness of risk management, many good publications are out there. However,... more Given the increasing awareness of risk management, many good publications are out there. However, what stands this out, is its direct and wide industrial applications for the small, medium and large enterprise. It is written for easy comprehension with clear demonstrations for both technical and non-technical persons. This, however, does not compromise its high technical knowledge for experts. How to identify and utilize positive risks were simplified, which assure the availability of the ICT systems for their steady returns on investment and further assures the security of the entire business against trending global cyber attacks.
Agent Technology, 1998
The underlying fabric for communication among intelligent agents will in many cases be provided b... more The underlying fabric for communication among intelligent agents will in many cases be provided by telecommunication networks. But telecommunication networks have been seen as a natural domain for the investigation and application of intelligent agents technology as it emerged from the area of Distributed Artificial Intelligence (DAI). Telecommunication network administrations are vast organizations dedicated to operating and managing networks with broad functional segmentations: telephone network outside plant, switching and transmission plants, public network, all supporting different layers of specialized customer or service networks. These networks are organized into multiple physical and logical layers built with large quantities of repeated network elements and subnetwork structures. All these elements need to be configured, monitored, and controlled. In the future, this will preferably be done by automated operation support systems and without substantial human intervention.
Volume 4, Issue 4, July – August 2015 Page 81 Abstract This Research Paper first, briefly explain... more Volume 4, Issue 4, July – August 2015 Page 81 Abstract This Research Paper first, briefly explains Z-transform, compares it with Laplace transform and also briefly explains difference equation and differential equation.it then takes up difference equation and demystifies its implementation in digital filtering operations. This work further x-rays digital filters with focus on finite impulse response (FIR) and Infinite impulse Response (IIR) filter, basic comparison between IIR and FIR are also highlighted. Finally, based on this work, choice of a filter for a particular purpose is hinted. However, this work does not go into mathematical derivations but it did use the relevant formulae and equations as it pertains to digital signal processing and viewed from relevant application perspectives.
London Journal of Research in Computer Science and Technology Volume 18 | Issue 1 | Compilation 1... more London Journal of Research in Computer Science and Technology Volume 18 | Issue 1 | Compilation 1.0 LJP Copyright ID: 975711 Print ISSN: 2514-863X Online ISSN: 2514-8648 Risk Assessment: Harnessing Positive Risks in ICT Systems Every Organization continually assesses her network – data and communication devices of risks, to ensure risks are proactively averted. And in situations where they cannot be avoided, mitigation plans are put in place to ensure very minimal business impact if triggered. This research work is a product of practical investigations of ICT systems with the immediate focus on data and communication devices. This unravels direct utilization/application of positive risks and further emphasizes that risks are not entirely negative. It also ensures protection against negative risks and conscious activation and utilization of positive risks. Risk Assessment is every stakeholder`s responsibility and should be carried out as many times as possible. This assists stakehold...
Every Organization continually assesses her network – data and communication devices of risks, to... more Every Organization continually assesses her network – data and communication devices of risks, to ensure risks are proactively averted. And in situations where they cannot be avoided, mitigation plans are put in place to ensure very minimal business impact if triggered. This research work is a product of practical investigations of ICT systems with the immediate focus on data and communication devices. This unravels direct utilization/application of positive risks and further emphasizes that risks are not entirely negative. It also ensures protection against negative risks and conscious activation and utilization of positive risks. Risk Assessment is every stakeholder`s responsibility and should be carried out as many times as possible. This assists stakeholders to proactively monitor their data and communication devices against invasion and unforeseen vulnerabilities. The general and long standing perception of risks is that risks and their impacts are entirely negative. This further bares salient opportunities (positive Risks) associated with data and communication devices. And examined their inherent dormant features from direct industry and practical application points of view, which could be activated to further enhance their usage and maximize their benefits to organizations and stakeholders. Specific positive risks associated with specific data and communication devices were identified and their applications/ utilizations were also discussed The Methodologies used were highlighted and risk assessment data gathering techniques explicitly x-rayed. Strategies for mitigating negative risks and harnessing positive risk were explicitly discussed too. Of course, principal advantages of positive risks are enumerated. Finally showed how positive risks have immensely contributed to changing trend of computing today, contributed immensely to advent, deployment and use of Cloud computing.
Gaia (Wooldridge.‚ 2000) was the first complete methodology proposed for the analysis and design ... more Gaia (Wooldridge.‚ 2000) was the first complete methodology proposed for the analysis and design of MAS. However‚ the original version of Gaia suffered from the limitations of being suitable for the analysis and design of closed MAS and of adopting non-standard notation techniques. Several extensions to the basic Gaia methodology have been recently proposed to overcome these limitations. In this article‚ we summarize the key characteristics of the original Gaia methodology and present three extensions that have been proposed to improve Gaia and make it more suitable for the development of open MAS in complex environments.
This Research Paper first, briefly explains Z-transform, compares it with Laplace transform and a... more This Research Paper first, briefly explains Z-transform, compares it with Laplace transform and also briefly explains difference equation and differential equation.it then takes up difference equation and demystifies its implementation in digital filtering operations. This work further x-rays digital filters with focus on finite impulse response (FIR) and Infinite impulse Response (IIR) filter, basic comparison between IIR and FIR are also highlighted. Finally, based on this work, choice of a filter for a particular purpose is hinted. However, this work does not go into mathematical derivations but it did use the relevant formulae and equations as it pertains to digital signal processing and viewed from relevant application perspectives.
— This Research Paper first, defines what data and communication devices are; it's associated typ... more — This Research Paper first, defines what data and communication devices are; it's associated types of Security and methods used to " break " security. The risk management process for Data and Communication devices such as Risk assessment, Risk Mitigation and Continuous risk monitoring, evaluation and review. This work also strengthens the fact that the risk is not always negative as reveals by its SWOT (Strength, Weakness, Threat and Opportunity) analysis as one can build on the opportunity thereby reducing the associated threats and also improves on the strengths and invariably reduces and if possible eradicates the weaknesses.
IJCSIS Papers by Chikezie K Nwagu
The information technology played an important role in information and knowledge dissemination in... more The information technology played an important role in information and knowledge dissemination in the last decade. The usage of IT to transfer information and knowledge in the animal health care domain using expert systems is one of the areas investigated by many institutions. The current era is witnessing a vast development in all fields of animal health care. Therefore there is a need for an unconventional method to transfer the knowledge of experts in this domain to the general public of livestock holders, especially that the number of experts in new technologies is lesser than their demand in a certain domain. The transfer of knowledge from veterinary consultants & scientists to livestock holders represents a bottleneck for the development of animal health care in any country. Expert systems are simply computer software programs that mimic the behaviour of human experts. They are one of the successful applications of the Artificial Intelligence field, a branch in Computer Science that investigates how to make the machine think like human or do tasks that humans do. Expert Systems are very helpful to ensure an effective and nationally coordinated approach in response to emergency incidents and in routine bio-security activities. Such systems enable better management of the information and resources used to manage animal's diseases and emergency responses to incursions.
This paper discusses the several research methodologies that can be used in Computer Science (CS)... more This paper discusses the several research methodologies that can be used in Computer Science (CS) and Information Systems (IS). The research methods vary according to the science domain and project field. However a little of research methodologies can be reasonable for Computer Science and Information System.
The objective of this paper is to provide an insight preview into various agent oriented methodol... more The objective of this paper is to provide an insight preview into various agent oriented methodologies by using an enhanced comparison framework based on criteria like process related criteria, steps and techniques related criteria, steps and usability criteria, model related or " concepts " related criteria, comparison regarding model related criteria and comparison regarding supportive related criteria. The result also constitutes inputs collected from the users of the agent oriented methodologies through a questionnaire based survey.
Role of expert systems in agriculture and its applications in efficient crop production and prote... more Role of expert systems in agriculture and its applications in efficient crop production and protection technologies has been reviewed and discussed in this paper. Different domains of agriculture are highlighted where expert systems can play an important role for an expert in transferring expert-driven knowledge instantly at the level of farmer's field. This paper explores structure of an expert system, role of expert system in agriculture along with details of expert system developed in the different field of agriculture and also possibilities of designing, developing and implementation of an expert system for agriculture would motivate scientists and extension workers to investigate possible applications for the benefit of entire agricultural community. INTRODUCTION This paper explores the possibilities of designing, developing and implementation of an Expert System for different activities of agriculture in integrated approach. The overall crop production management problems involve, among many others, management of diseases and insect-pests, integrated water and fertilizer managements, crop economics etc. The management problems also include the lack of enough experts and availability of experts at the farmer's field to support the crop growers. Each crop requires entirely different management practices and cropping pattern. Farmers may not know about all the information on production technology, so they need rapid access to all the possible information and need to take fast decisions to manage their crops efficiently and effectively. In order to raise a successful pulse crop and remain competitive, the modern farmers often rely on crop production specialists to assist them in arriving at the timely decision. Unfortunately, crop specialists are not always available for consultation at the nick of the time. To solve this problem, an Expert System (ES) may become a powerful tool which is a dire need of the day for
This paper discusses the several research methodologies that can be used in Computer Science (CS)... more This paper discusses the several research methodologies that can be used in Computer Science (CS) and Information Systems (IS). The research methods vary according to the science domain and project field. However a little of research methodologies can be reasonable for Computer Science and Information System.
This Research Paper, explored Risk management from Risk mitigation perspective. Risk Mitigation P... more This Research Paper, explored Risk management from Risk mitigation perspective. Risk Mitigation Perspective thoroughly examined mitigation processes, Strategies for mitigating both Negative and Positive Risks, discussed essence of Cost-benefit analysis for each recommended control as core mitigation process in order to select cost-effective and best-fit control for the Organization and stakeholders. It further emphasises importance of integration and updating of risk registers in the process and consistent communication/consultation among stakeholders including the Original Equipment Manufacturers (OEMs).
The payment card industry has grown rapidly the last few years. Companies and institutions move p... more The payment card industry has grown rapidly the last few years. Companies and institutions move parts of their business, or the entire business, towards online services providing e-commerce, information and communication services for the purpose of allowing their customers better efficiency and accessibility. Regardless of location, consumers can make the same purchases as they previously did " over the desk ". The evolution is a big step forward for the efficiency, accessibility and profitability point of view but it also has some drawbacks. The evolution is accompanied with a greater vulnerability to threats. The problem with making business through the Internet lies in the fact that neither the card nor the cardholder needs to be present at the point-of-sale. It is therefore impossible for the merchant to check whether the customer is the genuine cardholder or not. Payment card fraud has become a serious problem throughout the world. Companies and institutions loose huge amounts annually due to fraud and fraudsters continuously seek new ways to commit illegal actions. The good news is that fraud tends to be perpetrated to certain patterns and that it is possible to detect such patterns, and hence fraud. In this paper we will try to detect fraudulent transaction through the neural network along with the genetic algorithm. As we will see that artificial neural network when trained properly can work as a human brain, though it is impossible for the artificial neural network to imitate the human brain to the extent at which brain work, yet neural network and brain, depend for there working on the neurons, which is the small functional unit in brain as well as ANN. Genetic algorithm are used for making the decision about the network topology, number of hidden layers, number of nodes that will be used in the design of neural network for our problem of credit card fraud detection. For the learning purpose of artificial neural network we will use supervised learning feed forward back propagation algorithm.
Document filtering is increasingly deployed in Web environments to reduce information overload of... more Document filtering is increasingly deployed in Web environments to reduce information overload of users. We formulate online information filtering as a reinforcement learning problem, i.e. TD(0). The goal is to learn user profiles that best represent his information needs and thus maximize the expected value of user relevance feedback. A method is then presented that acquires reinforcement signals automatically by estimating user's implicit feedback from direct observations of browsing behaviors. This " learning by observation " approach is contrasted with conventional relevance feedback methods which require explicit user feedbacks. Field tests have been performed which involved 10 users reading a total of 18,750 HTML documents during 45 days. Compared to the existing document filtering techniques, the proposed learning method showed superior performance in information quality and adaptation speed to user preferences in online filtering.
The evolution of application fields and their sophistication have influenced research topics in t... more The evolution of application fields and their sophistication have influenced research topics in the robotics community. This evolution has been dominated by human necessities. In the early 1960s, the industrial revolution put industrial robots in the factory to release the human operator from risky and harmful tasks. The later incorporation of industrial robots into other types of production processes added new requirements that called for more flexibility and intelligence in industrial robots.
Knowledge Discovery in Databases is the process of searching for hidden knowledge in the massive ... more Knowledge Discovery in Databases is the process of searching for hidden knowledge in the massive amounts of data that we are technically capable of generating and storing. Data, in its raw form, is simply a collection of elements, from which little knowledge can be gleaned. With the development of data discovery techniques the value of the data is significantly improved. A variety of methods are available to assist in extracting patterns that when interpreted provide valuable, possibly previously unknown, insight into the stored data. This information can be predictive or descriptive in nature. Data mining, the pattern extraction phase of KDD, can take on many forms, the choice dependent on the desired results. KDD is a multi-step process that facilitates the conversion of data to useful information.Our increased ability to gain information from stored data raises the ethical dilemma of how the information should be treated and safeguarded.
While knowledge management (KM) is becoming an established discipline with many applications and ... more While knowledge management (KM) is becoming an established discipline with many applications and techniques, its adoption in health care has been challenging. Though, the health care sector relies heavily on knowledge and evidence based medicine is expected to be implemented in daily health care activities; besides, delivery of care replies on cooperation of several partners that need to exchange their knowledge in order to provide quality of care. This publication will give an overview of KM, its methods and techniques.
IOP Conference Series: Materials Science and Engineering, 2017
The most acknowledged payment mode is credit card for both disconnected and online mediums in tod... more The most acknowledged payment mode is credit card for both disconnected and online mediums in today's day and age. It facilitates cashless shopping everywhere in the world. It is the most widespread and reasonable approach with regards to web based shopping, paying bills, what's more, performing other related errands. Thus danger of fraud exchanges utilizing credit card has likewise been expanding. In the Current Fraud Detection framework, false exchange is recognized after the transaction is completed. As opposed to the current system, the proposed system presents a methodology which facilitates the detection of fraudulent exchanges while they are being processed, this is achieved by means of Behaviour and Locational Analysis(Neural Logic) which considers a cardholder's way of managing money and spending pattern. A deviation from such a pattern will then lead to the system classifying it as suspicious transaction and will then be handled accordingly.
Given the increasing awareness of risk management, many good publications are out there. However,... more Given the increasing awareness of risk management, many good publications are out there. However, what stands this out, is its direct and wide industrial applications for the small, medium and large enterprise. It is written for easy comprehension with clear demonstrations for both technical and non-technical persons. This, however, does not compromise its high technical knowledge for experts. How to identify and utilize positive risks were simplified, which assure the availability of the ICT systems for their steady returns on investment and further assures the security of the entire business against trending global cyber attacks.
Agent Technology, 1998
The underlying fabric for communication among intelligent agents will in many cases be provided b... more The underlying fabric for communication among intelligent agents will in many cases be provided by telecommunication networks. But telecommunication networks have been seen as a natural domain for the investigation and application of intelligent agents technology as it emerged from the area of Distributed Artificial Intelligence (DAI). Telecommunication network administrations are vast organizations dedicated to operating and managing networks with broad functional segmentations: telephone network outside plant, switching and transmission plants, public network, all supporting different layers of specialized customer or service networks. These networks are organized into multiple physical and logical layers built with large quantities of repeated network elements and subnetwork structures. All these elements need to be configured, monitored, and controlled. In the future, this will preferably be done by automated operation support systems and without substantial human intervention.
Volume 4, Issue 4, July – August 2015 Page 81 Abstract This Research Paper first, briefly explain... more Volume 4, Issue 4, July – August 2015 Page 81 Abstract This Research Paper first, briefly explains Z-transform, compares it with Laplace transform and also briefly explains difference equation and differential equation.it then takes up difference equation and demystifies its implementation in digital filtering operations. This work further x-rays digital filters with focus on finite impulse response (FIR) and Infinite impulse Response (IIR) filter, basic comparison between IIR and FIR are also highlighted. Finally, based on this work, choice of a filter for a particular purpose is hinted. However, this work does not go into mathematical derivations but it did use the relevant formulae and equations as it pertains to digital signal processing and viewed from relevant application perspectives.
London Journal of Research in Computer Science and Technology Volume 18 | Issue 1 | Compilation 1... more London Journal of Research in Computer Science and Technology Volume 18 | Issue 1 | Compilation 1.0 LJP Copyright ID: 975711 Print ISSN: 2514-863X Online ISSN: 2514-8648 Risk Assessment: Harnessing Positive Risks in ICT Systems Every Organization continually assesses her network – data and communication devices of risks, to ensure risks are proactively averted. And in situations where they cannot be avoided, mitigation plans are put in place to ensure very minimal business impact if triggered. This research work is a product of practical investigations of ICT systems with the immediate focus on data and communication devices. This unravels direct utilization/application of positive risks and further emphasizes that risks are not entirely negative. It also ensures protection against negative risks and conscious activation and utilization of positive risks. Risk Assessment is every stakeholder`s responsibility and should be carried out as many times as possible. This assists stakehold...
Every Organization continually assesses her network – data and communication devices of risks, to... more Every Organization continually assesses her network – data and communication devices of risks, to ensure risks are proactively averted. And in situations where they cannot be avoided, mitigation plans are put in place to ensure very minimal business impact if triggered. This research work is a product of practical investigations of ICT systems with the immediate focus on data and communication devices. This unravels direct utilization/application of positive risks and further emphasizes that risks are not entirely negative. It also ensures protection against negative risks and conscious activation and utilization of positive risks. Risk Assessment is every stakeholder`s responsibility and should be carried out as many times as possible. This assists stakeholders to proactively monitor their data and communication devices against invasion and unforeseen vulnerabilities. The general and long standing perception of risks is that risks and their impacts are entirely negative. This further bares salient opportunities (positive Risks) associated with data and communication devices. And examined their inherent dormant features from direct industry and practical application points of view, which could be activated to further enhance their usage and maximize their benefits to organizations and stakeholders. Specific positive risks associated with specific data and communication devices were identified and their applications/ utilizations were also discussed The Methodologies used were highlighted and risk assessment data gathering techniques explicitly x-rayed. Strategies for mitigating negative risks and harnessing positive risk were explicitly discussed too. Of course, principal advantages of positive risks are enumerated. Finally showed how positive risks have immensely contributed to changing trend of computing today, contributed immensely to advent, deployment and use of Cloud computing.
Gaia (Wooldridge.‚ 2000) was the first complete methodology proposed for the analysis and design ... more Gaia (Wooldridge.‚ 2000) was the first complete methodology proposed for the analysis and design of MAS. However‚ the original version of Gaia suffered from the limitations of being suitable for the analysis and design of closed MAS and of adopting non-standard notation techniques. Several extensions to the basic Gaia methodology have been recently proposed to overcome these limitations. In this article‚ we summarize the key characteristics of the original Gaia methodology and present three extensions that have been proposed to improve Gaia and make it more suitable for the development of open MAS in complex environments.
This Research Paper first, briefly explains Z-transform, compares it with Laplace transform and a... more This Research Paper first, briefly explains Z-transform, compares it with Laplace transform and also briefly explains difference equation and differential equation.it then takes up difference equation and demystifies its implementation in digital filtering operations. This work further x-rays digital filters with focus on finite impulse response (FIR) and Infinite impulse Response (IIR) filter, basic comparison between IIR and FIR are also highlighted. Finally, based on this work, choice of a filter for a particular purpose is hinted. However, this work does not go into mathematical derivations but it did use the relevant formulae and equations as it pertains to digital signal processing and viewed from relevant application perspectives.
— This Research Paper first, defines what data and communication devices are; it's associated typ... more — This Research Paper first, defines what data and communication devices are; it's associated types of Security and methods used to " break " security. The risk management process for Data and Communication devices such as Risk assessment, Risk Mitigation and Continuous risk monitoring, evaluation and review. This work also strengthens the fact that the risk is not always negative as reveals by its SWOT (Strength, Weakness, Threat and Opportunity) analysis as one can build on the opportunity thereby reducing the associated threats and also improves on the strengths and invariably reduces and if possible eradicates the weaknesses.
The information technology played an important role in information and knowledge dissemination in... more The information technology played an important role in information and knowledge dissemination in the last decade. The usage of IT to transfer information and knowledge in the animal health care domain using expert systems is one of the areas investigated by many institutions. The current era is witnessing a vast development in all fields of animal health care. Therefore there is a need for an unconventional method to transfer the knowledge of experts in this domain to the general public of livestock holders, especially that the number of experts in new technologies is lesser than their demand in a certain domain. The transfer of knowledge from veterinary consultants & scientists to livestock holders represents a bottleneck for the development of animal health care in any country. Expert systems are simply computer software programs that mimic the behaviour of human experts. They are one of the successful applications of the Artificial Intelligence field, a branch in Computer Science that investigates how to make the machine think like human or do tasks that humans do. Expert Systems are very helpful to ensure an effective and nationally coordinated approach in response to emergency incidents and in routine bio-security activities. Such systems enable better management of the information and resources used to manage animal's diseases and emergency responses to incursions.
This paper discusses the several research methodologies that can be used in Computer Science (CS)... more This paper discusses the several research methodologies that can be used in Computer Science (CS) and Information Systems (IS). The research methods vary according to the science domain and project field. However a little of research methodologies can be reasonable for Computer Science and Information System.
The objective of this paper is to provide an insight preview into various agent oriented methodol... more The objective of this paper is to provide an insight preview into various agent oriented methodologies by using an enhanced comparison framework based on criteria like process related criteria, steps and techniques related criteria, steps and usability criteria, model related or " concepts " related criteria, comparison regarding model related criteria and comparison regarding supportive related criteria. The result also constitutes inputs collected from the users of the agent oriented methodologies through a questionnaire based survey.
Role of expert systems in agriculture and its applications in efficient crop production and prote... more Role of expert systems in agriculture and its applications in efficient crop production and protection technologies has been reviewed and discussed in this paper. Different domains of agriculture are highlighted where expert systems can play an important role for an expert in transferring expert-driven knowledge instantly at the level of farmer's field. This paper explores structure of an expert system, role of expert system in agriculture along with details of expert system developed in the different field of agriculture and also possibilities of designing, developing and implementation of an expert system for agriculture would motivate scientists and extension workers to investigate possible applications for the benefit of entire agricultural community. INTRODUCTION This paper explores the possibilities of designing, developing and implementation of an Expert System for different activities of agriculture in integrated approach. The overall crop production management problems involve, among many others, management of diseases and insect-pests, integrated water and fertilizer managements, crop economics etc. The management problems also include the lack of enough experts and availability of experts at the farmer's field to support the crop growers. Each crop requires entirely different management practices and cropping pattern. Farmers may not know about all the information on production technology, so they need rapid access to all the possible information and need to take fast decisions to manage their crops efficiently and effectively. In order to raise a successful pulse crop and remain competitive, the modern farmers often rely on crop production specialists to assist them in arriving at the timely decision. Unfortunately, crop specialists are not always available for consultation at the nick of the time. To solve this problem, an Expert System (ES) may become a powerful tool which is a dire need of the day for
This paper discusses the several research methodologies that can be used in Computer Science (CS)... more This paper discusses the several research methodologies that can be used in Computer Science (CS) and Information Systems (IS). The research methods vary according to the science domain and project field. However a little of research methodologies can be reasonable for Computer Science and Information System.
This Research Paper, explored Risk management from Risk mitigation perspective. Risk Mitigation P... more This Research Paper, explored Risk management from Risk mitigation perspective. Risk Mitigation Perspective thoroughly examined mitigation processes, Strategies for mitigating both Negative and Positive Risks, discussed essence of Cost-benefit analysis for each recommended control as core mitigation process in order to select cost-effective and best-fit control for the Organization and stakeholders. It further emphasises importance of integration and updating of risk registers in the process and consistent communication/consultation among stakeholders including the Original Equipment Manufacturers (OEMs).
The payment card industry has grown rapidly the last few years. Companies and institutions move p... more The payment card industry has grown rapidly the last few years. Companies and institutions move parts of their business, or the entire business, towards online services providing e-commerce, information and communication services for the purpose of allowing their customers better efficiency and accessibility. Regardless of location, consumers can make the same purchases as they previously did " over the desk ". The evolution is a big step forward for the efficiency, accessibility and profitability point of view but it also has some drawbacks. The evolution is accompanied with a greater vulnerability to threats. The problem with making business through the Internet lies in the fact that neither the card nor the cardholder needs to be present at the point-of-sale. It is therefore impossible for the merchant to check whether the customer is the genuine cardholder or not. Payment card fraud has become a serious problem throughout the world. Companies and institutions loose huge amounts annually due to fraud and fraudsters continuously seek new ways to commit illegal actions. The good news is that fraud tends to be perpetrated to certain patterns and that it is possible to detect such patterns, and hence fraud. In this paper we will try to detect fraudulent transaction through the neural network along with the genetic algorithm. As we will see that artificial neural network when trained properly can work as a human brain, though it is impossible for the artificial neural network to imitate the human brain to the extent at which brain work, yet neural network and brain, depend for there working on the neurons, which is the small functional unit in brain as well as ANN. Genetic algorithm are used for making the decision about the network topology, number of hidden layers, number of nodes that will be used in the design of neural network for our problem of credit card fraud detection. For the learning purpose of artificial neural network we will use supervised learning feed forward back propagation algorithm.
Document filtering is increasingly deployed in Web environments to reduce information overload of... more Document filtering is increasingly deployed in Web environments to reduce information overload of users. We formulate online information filtering as a reinforcement learning problem, i.e. TD(0). The goal is to learn user profiles that best represent his information needs and thus maximize the expected value of user relevance feedback. A method is then presented that acquires reinforcement signals automatically by estimating user's implicit feedback from direct observations of browsing behaviors. This " learning by observation " approach is contrasted with conventional relevance feedback methods which require explicit user feedbacks. Field tests have been performed which involved 10 users reading a total of 18,750 HTML documents during 45 days. Compared to the existing document filtering techniques, the proposed learning method showed superior performance in information quality and adaptation speed to user preferences in online filtering.
The evolution of application fields and their sophistication have influenced research topics in t... more The evolution of application fields and their sophistication have influenced research topics in the robotics community. This evolution has been dominated by human necessities. In the early 1960s, the industrial revolution put industrial robots in the factory to release the human operator from risky and harmful tasks. The later incorporation of industrial robots into other types of production processes added new requirements that called for more flexibility and intelligence in industrial robots.
Knowledge Discovery in Databases is the process of searching for hidden knowledge in the massive ... more Knowledge Discovery in Databases is the process of searching for hidden knowledge in the massive amounts of data that we are technically capable of generating and storing. Data, in its raw form, is simply a collection of elements, from which little knowledge can be gleaned. With the development of data discovery techniques the value of the data is significantly improved. A variety of methods are available to assist in extracting patterns that when interpreted provide valuable, possibly previously unknown, insight into the stored data. This information can be predictive or descriptive in nature. Data mining, the pattern extraction phase of KDD, can take on many forms, the choice dependent on the desired results. KDD is a multi-step process that facilitates the conversion of data to useful information.Our increased ability to gain information from stored data raises the ethical dilemma of how the information should be treated and safeguarded.
While knowledge management (KM) is becoming an established discipline with many applications and ... more While knowledge management (KM) is becoming an established discipline with many applications and techniques, its adoption in health care has been challenging. Though, the health care sector relies heavily on knowledge and evidence based medicine is expected to be implemented in daily health care activities; besides, delivery of care replies on cooperation of several partners that need to exchange their knowledge in order to provide quality of care. This publication will give an overview of KM, its methods and techniques.
Knowledge management (KM) is becoming an established discipline with many applications and techni... more Knowledge management (KM) is becoming an established discipline with many applications and techniques, its perspective view in health care has been challenging. Though, the health care sector relies heavily on knowledge and evidence based medicine is expected to be implemented in daily health care activities; besides, delivery of care replies on cooperation of several partners that need to exchange their knowledge in order to provide quality of care. This publication will give a perspective view of KM in Health care.
Robotics and artificial intelligence serve very different purposes. However, people often get the... more Robotics and artificial intelligence serve very different purposes. However, people often get them mixed up. Robotics is a branch of technology which deals with robots. Robots are programmable machines which are usually able to carry out a series of actions autonomously, or semi-autonomously. Artificial intelligence (AI) is a branch of computer science. It involves developing computer programs to complete tasks which would otherwise require human intelligence.
Business Intelligence (BI) offers tremendous potential for business organizations to gain insight... more Business Intelligence (BI) offers tremendous potential for business organizations to gain insights into their day-today operations, as well as longer term opportunities and threats. However, most of today's BI tools are based on models that are too much data-oriented from the point of view of business decision makers. We propose an enterprise modeling approach to bridge the business-level understanding of the enterprise with its representations in databases and data warehouses. The Business Intelligence Model (BIM) offers concepts familiar to business decision making-such as goals, strategies, processes, situations, influences, and indicators. Unlike many enterprise models which are meant to be used to derive, manage, or align with IT system implementations, BIM aims to help business users organize and make sense of the vast amounts of data about the enterprise and its external environment. In this paper, we present core BIM concepts, focusing especially on reasoning about situations, influences, and indicators. Such reasoning supports strategic analysis of business objectives in light of current enterprise data, allowing analysts to explore scenarios and find alternative strategies. We describe how goal reasoning techniques from conceptual modeling and requirements engineering have been applied to BIM. Techniques are also provided to support reasoning with indicators linked to business metrics, including cases where specifications of indicators are incomplete. Evaluation of the proposed modelling and reasoning framework includes an ongoing prototype implementation, as well as case studies.
Business Intelligence (BI) offers tremendous potential for business organizations to gain insight... more Business Intelligence (BI) offers tremendous potential for business organizations to gain insights into their day-today operations, as well as longer term opportunities and threats. However, most of today's BI tools are based on models that are too much data-oriented from the point of view of business decision makers. We propose an enterprise modeling approach to bridge the business-level understanding of the enterprise with its representations in databases and data warehouses. The Business Intelligence Model (BIM) offers concepts familiar to business decision making-such as goals, strategies, processes, situations, influences, and indicators. Unlike many enterprise models which are meant to be used to derive, manage, or align with IT system implementations, BIM aims to help business users organize and make sense of the vast amounts of data about the enterprise and its external environment. In this paper, we present core BIM concepts, focusing especially on reasoning about situations, influences, and indicators. Such reasoning supports strategic analysis of business objectives in light of current enterprise data, allowing analysts to explore scenarios and find alternative strategies. We describe how goal reasoning techniques from conceptual modeling and requirements engineering have been applied to BIM. Techniques are also provided to support reasoning with indicators linked to business metrics, including cases where specifications of indicators are incomplete. Evaluation of the proposed modelling and reasoning framework includes an ongoing prototype implementation, as well as case studies.
Business Intelligence (BI) projects are long and painful endeavors that employ a variety of desig... more Business Intelligence (BI) projects are long and painful endeavors that employ a variety of design methodologies, inspired mostly by software engineering and project management lifecycle models. In recent BI research, new design methodologies are emerging founded on conceptual business models that capture business objectives, strategies, and more. Their claim is that they facilitate the description of the problem-at-hand, its analysis towards a solution, and the implementation of that solution. The key question explored in this work is: Are such models actually useful to BI design practitioners? To answer this question, we conducted an in situ empirical evaluation based on an ongoing BI project for a Toronto hospital. The lessons learned from the study include: confirmation that the BI implementation is well-supported by models founded on business concepts; evidence that these models enhance communication within the project team and business stakeholders; and, evidence that there is a need for business modeling to capture BI requirements and, from those, derive and implement BI designs.
This paper elaborates on the role of Intelligent Agents in teaching and learning, more especially... more This paper elaborates on the role of Intelligent Agents in teaching and learning, more especially within course management software or an e-Learning environment. Intelligent Agents, as they are proposed in this paper, appear as a series of independent software modules operating within a web-based teaching and learning environment, such as course management software or an e-Learning Portal. The agents perform specific tasks on the behalf of students, instructors, and other members of the educational community, including parents and alumni. This paper has identified three groups of Intelligent Agents for teaching and learning applications: " Digital Classmate " as a series of Intelligent Agents assisting students and performing tasks related to learning. " Digital TA " (or Digital Teaching Assistant) as a series of intelligent agents assisting teachers and performing tasks related to instruction and course management, and Digital Secretary " as a series of intelligent agents assisting all members of an educational community in performing various administrative assistance tasks. All three Intelligent Agents groups proposed in this paper are conceptualized as a web-based multimedia agent (character) communicating with their human clients using one or more communication channels, including: text, speech, voice recognition, and animated facial graphics. Each Agent could include a series of independent or mobile Agents assisting an educational group.
Every user has an individual background and a precise goal in search of information. The goal of ... more Every user has an individual background and a precise goal in search of information. The goal of personalized search is to search results to a particular user based on the user's interests and preferences. Effective personalization of information access involves two important challenges: accurately identifying the user context and organizing the information to match with the particular context. In this paper, the system uses ontology as a knowledge base for the information retrieval process. It is one layer above any one of search engines retrieve by analyzing just the keywords. Here, the query is analyzed both syntactically and semantically. The developed system retrieves the web results more relevant to the users query. The level of accuracy will be enhanced since the query is analyzed semantically. The results are re-ranked and optimized for providing the relevant links. Based on the user's information access behavior, an ontological profile is created, which is also used for personalization. If the system is deployed for web information gathering, search performance can be improved and accurate results can be retrieved.
Business Intelligence (BI) projects are long and painful endeavors that employ a variety of desig... more Business Intelligence (BI) projects are long and painful endeavors that employ a variety of design methodologies, inspired mostly by software engineering and project management lifecycle models. In recent BI research, new design methodologies are emerging founded on conceptual business models that capture business objectives, strategies, and more. Their claim is that they facilitate the description of the problem-at-hand, its analysis towards a solution, and the implementation of that solution. The key question explored in this work is: Are such models actually useful to BI design practitioners? To answer this question, we conducted an in situ empirical evaluation based on an ongoing BI project for a Toronto hospital. The lessons learned from the study include: confirmation that the BI implementation is well-supported by models founded on business concepts; evidence that these models enhance communication within the project team and business stakeholders; and, evidence that there is a need for business modeling to capture BI requirements and, from those, derive and implement BI designs.
The challenges of how to manage healthcare and achieve clinical integration in today's payment se... more The challenges of how to manage healthcare and achieve clinical integration in today's payment setting has become a national concern. The use of technology to help ensure healthcare quality and control cost is an ongoing research subject. Business intelligence solutions are used in many industries to garner insight from financial and operational data to make more informed decisions towards the ultimate goal of achieving efficiency and effectiveness. This paper aims to bring the reader up-to-date with the current literature on two basic topics; business intelligence and healthcare delivery and form the basis for the justification of research on the impact of business intelligence on healthcare delivery in the Nigeria. To achieve that goal we examine BI deployment in the healthcare industry, address relevant issues and challenges, and explore the role of BI to foster certain organizational capabilities. Examples of how BI capabilities have supported organizational capabilities impacting the problems of accessibility, cost, and quality of healthcare are presented. Scholars and professionals, alike, could benefit from this study where BI is presented as a mechanism to ensure a robust and systematic approach to health-care management with an ultimate goal of enduring impact on quality improvement and cost control.