Victor Waziri | FEDERAL UNIVERSITY OF TECHNOLOGY, MINNA-NIGERIA (original) (raw)

Papers by Victor Waziri

Research paper thumbnail of A Negative Selection Algorithm Based on Email Classification Techniques

Aiming to develop an immune based system, the negative selection algorithm aid in solving complex... more Aiming to develop an immune based system, the negative selection algorithm aid in solving complex problems in spam detection. This is been achieve by distinguishing spam from non-spam (self from non-self). In this paper, we propose an optimized technique for e-mail classification. This is done by distinguishing the characteristics of self and non-self that is been acquired from trained data set. These extracted features of self and non-self are then combined to make a single detector, therefore reducing the false rate. (Non-self that were wrongly classified as self). The result that will be acquired in this paper will demonstrate the effectiveness of this technique in decreasing false rate. KeywordsNegative selection; E-mail Classification; Algorithm; Self, Non-Self, Artificial Immune System, Classification accuracy.

Research paper thumbnail of Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions

2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020

The use of public key cryptosystems ranges from securely encrypting bitcoin transactions and crea... more The use of public key cryptosystems ranges from securely encrypting bitcoin transactions and creating digital signatures for non-repudiation. The cryptographic systems security of public key depends on the complexity in solving mathematical problems. Quantum computers pose a threat to the current day algorithms used. This research presents analysis of two Hash-based Signature Schemes (MSS and W-OTS) and provides a comparative analysis of them. The comparisons are based on their efficiency as regards to their key generation, signature generation and verification time. These algorithms are compared with two classical algorithms (RSA and ECDSA) used in bitcoin transaction security. The results as shown in table II indicates that RSA key generation takes 0.2012s, signature generation takes 0.0778s and signature verification is 0.0040s. ECDSA key generation is 0.1378s, signature generation takes 0.0187s, and verification time for the signature is 0.0164s. The W-OTS key generation is 0.002s. To generate a signature in W-OTS, it takes 0.001s and verification time for the signature is 0.0002s. Lastly MSS Key generation, signature generation and verification has high values which are 16.290s, 17.474s, and 13.494s respectively. Based on the results, W-OTS is recommended for bitcoin transaction security because of its efficiency and ability to resist quantum computer attacks on the bitcoin network.

Research paper thumbnail of Cyber Crimes Analysis Based-On Open Source Digital Foresics Tools

Research paper thumbnail of Assessment of Information Security Awareness among Online Banking Costumers in Nigeria

Internet banking system has classically supplanted traditional banking system in both developed a... more Internet banking system has classically supplanted traditional banking system in both developed and developing nations due to rapidly growing Information Technology (IT) in today world. Internet banking which is also refer to as online banking has not only increase the productivity of banks but also give room for easy transactions by the customers. Since the introduction of internet banking into the country (Nigeria), the banking sector has experienced a tremedious change in its mode of operations. Meanwhile, Internet banking system has some challenges including information security. Information security challenge mostly affects online banking customers who supply their details during online transaction. For costumer not to be a victim of this information security challenge, there must be proper information security awareness. This information security awareness will serve as guide for online banking customers. Many costumers enter into banking hall to apply for internet banking and...

Research paper thumbnail of Cyber Security Education: A Tool for National Security

International Journal of Data Network Security, Aug 9, 2014

The rate at which cybercrime is being perpetrated in our society is quietly alarming, the insecur... more The rate at which cybercrime is being perpetrated in our society is quietly alarming, the insecurity of internet has exposed the global community and resources to this menace, many nations, organizations and individuals are becoming victims of this on daily basis. Many Individuals have lost their personal information into the hands of hackers, it is now easy for people to masquerade the identity of others, organizations lose edge to their competitors as their confidential information have been revealed, many nations are engaged in cyber war against the other, all these activities are being perpetrated on the cyberspace. As a result of these, this paper seeks to highlight the impact of cyber security education on national security by identifying its importance, to both individual and organizations and to the nation at large. We suggest introduction of Cyber Security education into the curriculum of primary and basic education of any nation.

Research paper thumbnail of Big Data Analytics And Data Security In The Cloud Via Fully Homomorphic Encryption

This paper describes the problem of building secure<br> computational services for encrypte... more This paper describes the problem of building secure<br> computational services for encrypted information in the Cloud<br> Computing without decrypting the encrypted data; therefore, it meets<br> the yearning of computational encryption algorithmic aspiration<br> model that could enhance the security of big data for privacy,<br> confidentiality, availability of the users. The cryptographic model<br> applied for the computational process of the encrypted data is the<br> Fully Homomorphic Encryption Scheme. We contribute a theoretical<br> presentations in a high-level computational processes that are based<br> on number theory and algebra that can easily be integrated and<br> leveraged in the Cloud computing with detail theoretic mathematical<br> concepts to the fully homomorphic encryption models. This<br> contribution enhances the full implementation of big data analytics<br> based cryptographic security al...

Research paper thumbnail of O Programa de Auxílios Estudantis do IFC na percepção dos estudantes do Ensino Médio Integrado

O presente artigo tem como objeto de estudo o Programa de Auxílios Estudantis (PAE) do Instituto ... more O presente artigo tem como objeto de estudo o Programa de Auxílios Estudantis (PAE) do Instituto Federal Catarinense (IFC), programa que faz parte de uma política educacional inserida no contexto de um país com grandes desigualdades sociais e de dualidade estrutural. O objetivo geral da pesquisa foi analisar a compreensão que os estudantes do ensino médio integrado (EMI), dos 15 <em>campi </em>do IFC, possuem em relação aos limites e possibilidades desse programa, focando em aspectos relativos ao acesso às informações sobre a política de assistência estudantil. Trata-se de um estudo de caso, de abordagem qualitativa e os dados foram coletados por meio de questionário online, com estudantes do EMI atendidos do PAE dos 15 <em>campi</em> do IFC. A maioria dos estudantes realizam atividades em período integral na instituição, tornando ainda mais necessário a existência de auxílios como o PAE, pois além de terem gastos extras, como de alimentação e transporte, não...

Research paper thumbnail of Minna-Nigeria

— This paper reviews the concept of Cryptography and Steganography and their differences are clas... more — This paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated abstractedly over the Internet with the belief that the stego-image carrying the message would not be discovered by unauthenticated person.

Research paper thumbnail of AU J.T. 11(2): (Oct. 2007) The Application of the Extended Conjugate Gradient Method on the One-Dimensional Energized Wave Equation

This paper computes the optimal control and state of the one-dimensional Energized wave equation ... more This paper computes the optimal control and state of the one-dimensional Energized wave equation using the Extended Conjugate gradient Method (ECGM. We recalled all vital computational issues in the implementation of the ECGM algorithm on the one-dimensional Energized Wave equation in the paper. With these recalls, program codes were derived which gave various numerical optima controls and states. These optimal controls and states were considered as various points in thin rod as our computational problem is a one dimensional space wave problem.

Research paper thumbnail of A Secure Method to Hide Confidential Data Using Cryptography and Steganography

The rate at which encrypted messages are being sent over the internet and other electronic means ... more The rate at which encrypted messages are being sent over the internet and other electronic means will easily capture the attention of hackers and possibly make them try to disrupt or even hack those messages so as view the original message. Steganography is designed to hide the presence of a message by hiding the secret message inside an innocent file. For effective security, steganography is sometimes combined with cryptography. In this paper, steganography and cryptography are combined to provide a robust system capable of encrypting a secret message using RSA algorithm. To hide the message, advanced LSB method is used. The original message is encrypted at the initial stage and then separated into two portions P1 and P2. An XOR operation is applied to the first portion (P1) using the odd location and to the second portion (P2) using the even position of the LSB+1.The Position of the LSB is then used to hide the XORed encrypted message. Keywords-cryptography; RSA algorithm; stegano...

Research paper thumbnail of Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing Security

This paper studies the issues of Big Data Analytics (BDAs) or the Internet of Things (IOT) and it... more This paper studies the issues of Big Data Analytics (BDAs) or the Internet of Things (IOT) and its implementation in the Cloud Computing Environment with a full thrust consideration to the Fully Homomorphic Encryption Scheme (FHE). The FHE is a computational algorithm that allows the computations on encrypted data; and yet, when the outputs of the computations of the encrypted data are decrypted, they still conform to the operations of the original plaintext. The Bootstrapping of the Somewhat Homomorphic Encryption Scheme (SWHE) of the Craig Gentry's PhD the- sis was studied; an algorithm that continuously reduces the inherently noisy ciphertext parameters of the Ideal Circuit at each computational iteration stage, and thus, gives more room for the less noisy ciphertext computation in the cloud based the application of addition and multiplication operations. The FHE implementation on Big Data Ana- lytcs Security on the cloud computing was discovered to have boosted confidentiali...

Research paper thumbnail of Discrete Optimization Model for the 2-DIMENSIONAL Energized Waves

Energized waves are waves characterized by diffusion effects [Odio et al, 1997, Pain, 2005] and s... more Energized waves are waves characterized by diffusion effects [Odio et al, 1997, Pain, 2005] and such waves are common in acoustics, ocean waves and many other wave propagation phenomena that involve propagation of energy. [Reju, 1995] was the first to apply the Extended Conjugate Gradient Method (ECGM) to the optimal control of classical wave propagation problem and with a specific extension to energized waves by [Waziri, 2006]. Computational procedures of Reju and Waziri are semi-analytic in nature utilizing in each case a direct methodology that is finally employed in the implementation of the ECGM. This paper however employs a discretization procedure via the 4 th order Runge-Kutta algorithm to the search of optimal solutions of the 2-dimensional energised wave propagation problem and so contributing to the unified theory of the foregoing diffusive and kinetic Hamiltonian approach [Reju et al, 1999] preceding the implementation of the various versions of ECGM [Reju, et al, 2001; ...

Research paper thumbnail of Extended Machine Replacement Policy

This paper uses iterative method for replacement and maintenance policies leading to a very effic... more This paper uses iterative method for replacement and maintenance policies leading to a very efficient model in large systems unlike the existing exhaustive enumeration algorithm which can be used only if the number of stationary policies is reasonably small. From the numerically simulated results, it was observed that the optimal values of unbounded horizon problems are obtained at the last peak of the model before shooting into non convergence state. Immediately after the optimum report is acquired, a local minimum is achieved. Thereafter, a non convergence positive result that goes into infinity is achieved. The last trough clearly gives a false positive respond. Therefore, the optimum value observed before non-convergence state should be the decisive state to quit the stage. All equipment must be constantly kept under good maintenance since the cost of maintenance increases with time. At a stage of deterioration, equipment could be refurbished and sold out at less expensive cost ...

Research paper thumbnail of A Hierarchical Cluster Analysis and Simulation of State Capitals in Nigeria for Tourism Exploration

In this paper we conducted hierarchical cluster analysis with multiscale bootstrap resampling tec... more In this paper we conducted hierarchical cluster analysis with multiscale bootstrap resampling technique using average linkage method and correlation based dissimilarity matrix to classify state capitals according to their distances by Road from Federal capital, Abuja to the respective state capitals. The R package pvclust was used to assess the uncertainty in hierarchical clustering results. This was then applied to the standard normal approximation theory on the clusters whose standard errors were high or larger than 0.030. The cluster formations have an apparent error rate of 0.027.

Research paper thumbnail of Data Loss Prevention and Challenges Faced in their Deployments

The technology world has greatly evolved over the past three decades and it is at a pace where an... more The technology world has greatly evolved over the past three decades and it is at a pace where an average user’s laptop can accommodate up to a terabyte of data, where a tiny SD card can store an entire database of an organization, where file transferring has become less complex, and where users can easily connect to any wireless network (Private or Public) within the range of their wireless devices to exchange sensitive information. This evolvement has led to one of the greatest challenges organizations are faced with, which is in the area of adequately protecting their sensitive information from being lost or leaked. Data Loss Prevention (DLP) techniques was created in preventing these breaches on data loss, when these breaches occur in an organization. DLP systems has gained popularity over the last decade and is now referred as a matured technology, and with the alarming rate at which digitally stored assets is growing, the need for DLP systems has also increased. This paper dis...

Research paper thumbnail of Development of Crypto-Biometric System Using Fingerprint and Rsa Model for Secure Communication

i-manager's Journal on Information Technology, 2019

Research paper thumbnail of A forensic evidence recovery from mobile device applications

International Journal of Digital Enterprise Technology, 2018

In recent past, there are a lot of research advancements in mobile forensics tools. This is so du... more In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals due to increased computational capabilities. Mobile forensics devices continue to remain a very challenging task due to poor user data retrieval techniques for evidence retrieval. Recently, third party applications assume a veritable feet because it is supported by majority of mobile devices platforms, thereby making it easy to extract information of its users' for future criminal audit. This paper proposes an evidence data retrieval method from InstagramApp using two networks-based platforms [that is, pure peer-to-peer (PPP) and special cluster peer (SCP)-based], whose concept is to manage mobile device communication and generate multiple copies of users data/information to be dumped across three servers. The forensic test results were obtained from PPP and SCP developed to securely extract data from mobile devices. This shows that, SCP outperformed PPP in terms of the time taken to fulfil forensic auditor's request, throughput and broadband utilisation which are 42.82% to 57.18%, 56.81% to 43.19% and 35.41% to 64.53% respectively.

Research paper thumbnail of Mathematical model for the deterministic extended machine replacement policy

International Journal of Computing and Optimization, 2014

This paper uses iterative method for replacement and maintenance policies leading to a very effic... more This paper uses iterative method for replacement and maintenance policies leading to a very efficient model in large systems unlike the existing exhaustive enumeration algorithm which can be used only if the number of stationary policies is reasonably small. From the numerically simulated results, it was observed that the optimal values of unbounded horizon problems are obtained at the last peak of the model before shooting into non convergence state. Immediately after the optimum report is acquired, a local minimum is achieved. Thereafter, a non convergence positive result that goes into infinity is achieved. The last trough clearly gives a false positive respond. Therefore, the optimum value observed before non-convergence state should be the decisive state to quit the stage. All equipment must be constantly kept under good maintenance since the cost of maintenance increases with time. At a stage of deterioration, equipment could be refurbished and sold out at less expensive cost as their lifespan cannot stand the test of time.

Research paper thumbnail of A Survey on Mobile Cloud Computing with Embedded Security Considerations

International Journal of Cloud Computing and Services Science, Apr 13, 2014

The emergence of cloud computing hold a promise to computing where software is provided as a serv... more The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.

Research paper thumbnail of Steganography and Its Application in Information Dessimilation on the Web Using Images As Security Embeddment: A Wavelet Approach

Research paper thumbnail of A Negative Selection Algorithm Based on Email Classification Techniques

Aiming to develop an immune based system, the negative selection algorithm aid in solving complex... more Aiming to develop an immune based system, the negative selection algorithm aid in solving complex problems in spam detection. This is been achieve by distinguishing spam from non-spam (self from non-self). In this paper, we propose an optimized technique for e-mail classification. This is done by distinguishing the characteristics of self and non-self that is been acquired from trained data set. These extracted features of self and non-self are then combined to make a single detector, therefore reducing the false rate. (Non-self that were wrongly classified as self). The result that will be acquired in this paper will demonstrate the effectiveness of this technique in decreasing false rate. KeywordsNegative selection; E-mail Classification; Algorithm; Self, Non-Self, Artificial Immune System, Classification accuracy.

Research paper thumbnail of Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions

2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020

The use of public key cryptosystems ranges from securely encrypting bitcoin transactions and crea... more The use of public key cryptosystems ranges from securely encrypting bitcoin transactions and creating digital signatures for non-repudiation. The cryptographic systems security of public key depends on the complexity in solving mathematical problems. Quantum computers pose a threat to the current day algorithms used. This research presents analysis of two Hash-based Signature Schemes (MSS and W-OTS) and provides a comparative analysis of them. The comparisons are based on their efficiency as regards to their key generation, signature generation and verification time. These algorithms are compared with two classical algorithms (RSA and ECDSA) used in bitcoin transaction security. The results as shown in table II indicates that RSA key generation takes 0.2012s, signature generation takes 0.0778s and signature verification is 0.0040s. ECDSA key generation is 0.1378s, signature generation takes 0.0187s, and verification time for the signature is 0.0164s. The W-OTS key generation is 0.002s. To generate a signature in W-OTS, it takes 0.001s and verification time for the signature is 0.0002s. Lastly MSS Key generation, signature generation and verification has high values which are 16.290s, 17.474s, and 13.494s respectively. Based on the results, W-OTS is recommended for bitcoin transaction security because of its efficiency and ability to resist quantum computer attacks on the bitcoin network.

Research paper thumbnail of Cyber Crimes Analysis Based-On Open Source Digital Foresics Tools

Research paper thumbnail of Assessment of Information Security Awareness among Online Banking Costumers in Nigeria

Internet banking system has classically supplanted traditional banking system in both developed a... more Internet banking system has classically supplanted traditional banking system in both developed and developing nations due to rapidly growing Information Technology (IT) in today world. Internet banking which is also refer to as online banking has not only increase the productivity of banks but also give room for easy transactions by the customers. Since the introduction of internet banking into the country (Nigeria), the banking sector has experienced a tremedious change in its mode of operations. Meanwhile, Internet banking system has some challenges including information security. Information security challenge mostly affects online banking customers who supply their details during online transaction. For costumer not to be a victim of this information security challenge, there must be proper information security awareness. This information security awareness will serve as guide for online banking customers. Many costumers enter into banking hall to apply for internet banking and...

Research paper thumbnail of Cyber Security Education: A Tool for National Security

International Journal of Data Network Security, Aug 9, 2014

The rate at which cybercrime is being perpetrated in our society is quietly alarming, the insecur... more The rate at which cybercrime is being perpetrated in our society is quietly alarming, the insecurity of internet has exposed the global community and resources to this menace, many nations, organizations and individuals are becoming victims of this on daily basis. Many Individuals have lost their personal information into the hands of hackers, it is now easy for people to masquerade the identity of others, organizations lose edge to their competitors as their confidential information have been revealed, many nations are engaged in cyber war against the other, all these activities are being perpetrated on the cyberspace. As a result of these, this paper seeks to highlight the impact of cyber security education on national security by identifying its importance, to both individual and organizations and to the nation at large. We suggest introduction of Cyber Security education into the curriculum of primary and basic education of any nation.

Research paper thumbnail of Big Data Analytics And Data Security In The Cloud Via Fully Homomorphic Encryption

This paper describes the problem of building secure<br> computational services for encrypte... more This paper describes the problem of building secure<br> computational services for encrypted information in the Cloud<br> Computing without decrypting the encrypted data; therefore, it meets<br> the yearning of computational encryption algorithmic aspiration<br> model that could enhance the security of big data for privacy,<br> confidentiality, availability of the users. The cryptographic model<br> applied for the computational process of the encrypted data is the<br> Fully Homomorphic Encryption Scheme. We contribute a theoretical<br> presentations in a high-level computational processes that are based<br> on number theory and algebra that can easily be integrated and<br> leveraged in the Cloud computing with detail theoretic mathematical<br> concepts to the fully homomorphic encryption models. This<br> contribution enhances the full implementation of big data analytics<br> based cryptographic security al...

Research paper thumbnail of O Programa de Auxílios Estudantis do IFC na percepção dos estudantes do Ensino Médio Integrado

O presente artigo tem como objeto de estudo o Programa de Auxílios Estudantis (PAE) do Instituto ... more O presente artigo tem como objeto de estudo o Programa de Auxílios Estudantis (PAE) do Instituto Federal Catarinense (IFC), programa que faz parte de uma política educacional inserida no contexto de um país com grandes desigualdades sociais e de dualidade estrutural. O objetivo geral da pesquisa foi analisar a compreensão que os estudantes do ensino médio integrado (EMI), dos 15 <em>campi </em>do IFC, possuem em relação aos limites e possibilidades desse programa, focando em aspectos relativos ao acesso às informações sobre a política de assistência estudantil. Trata-se de um estudo de caso, de abordagem qualitativa e os dados foram coletados por meio de questionário online, com estudantes do EMI atendidos do PAE dos 15 <em>campi</em> do IFC. A maioria dos estudantes realizam atividades em período integral na instituição, tornando ainda mais necessário a existência de auxílios como o PAE, pois além de terem gastos extras, como de alimentação e transporte, não...

Research paper thumbnail of Minna-Nigeria

— This paper reviews the concept of Cryptography and Steganography and their differences are clas... more — This paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated abstractedly over the Internet with the belief that the stego-image carrying the message would not be discovered by unauthenticated person.

Research paper thumbnail of AU J.T. 11(2): (Oct. 2007) The Application of the Extended Conjugate Gradient Method on the One-Dimensional Energized Wave Equation

This paper computes the optimal control and state of the one-dimensional Energized wave equation ... more This paper computes the optimal control and state of the one-dimensional Energized wave equation using the Extended Conjugate gradient Method (ECGM. We recalled all vital computational issues in the implementation of the ECGM algorithm on the one-dimensional Energized Wave equation in the paper. With these recalls, program codes were derived which gave various numerical optima controls and states. These optimal controls and states were considered as various points in thin rod as our computational problem is a one dimensional space wave problem.

Research paper thumbnail of A Secure Method to Hide Confidential Data Using Cryptography and Steganography

The rate at which encrypted messages are being sent over the internet and other electronic means ... more The rate at which encrypted messages are being sent over the internet and other electronic means will easily capture the attention of hackers and possibly make them try to disrupt or even hack those messages so as view the original message. Steganography is designed to hide the presence of a message by hiding the secret message inside an innocent file. For effective security, steganography is sometimes combined with cryptography. In this paper, steganography and cryptography are combined to provide a robust system capable of encrypting a secret message using RSA algorithm. To hide the message, advanced LSB method is used. The original message is encrypted at the initial stage and then separated into two portions P1 and P2. An XOR operation is applied to the first portion (P1) using the odd location and to the second portion (P2) using the even position of the LSB+1.The Position of the LSB is then used to hide the XORed encrypted message. Keywords-cryptography; RSA algorithm; stegano...

Research paper thumbnail of Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing Security

This paper studies the issues of Big Data Analytics (BDAs) or the Internet of Things (IOT) and it... more This paper studies the issues of Big Data Analytics (BDAs) or the Internet of Things (IOT) and its implementation in the Cloud Computing Environment with a full thrust consideration to the Fully Homomorphic Encryption Scheme (FHE). The FHE is a computational algorithm that allows the computations on encrypted data; and yet, when the outputs of the computations of the encrypted data are decrypted, they still conform to the operations of the original plaintext. The Bootstrapping of the Somewhat Homomorphic Encryption Scheme (SWHE) of the Craig Gentry's PhD the- sis was studied; an algorithm that continuously reduces the inherently noisy ciphertext parameters of the Ideal Circuit at each computational iteration stage, and thus, gives more room for the less noisy ciphertext computation in the cloud based the application of addition and multiplication operations. The FHE implementation on Big Data Ana- lytcs Security on the cloud computing was discovered to have boosted confidentiali...

Research paper thumbnail of Discrete Optimization Model for the 2-DIMENSIONAL Energized Waves

Energized waves are waves characterized by diffusion effects [Odio et al, 1997, Pain, 2005] and s... more Energized waves are waves characterized by diffusion effects [Odio et al, 1997, Pain, 2005] and such waves are common in acoustics, ocean waves and many other wave propagation phenomena that involve propagation of energy. [Reju, 1995] was the first to apply the Extended Conjugate Gradient Method (ECGM) to the optimal control of classical wave propagation problem and with a specific extension to energized waves by [Waziri, 2006]. Computational procedures of Reju and Waziri are semi-analytic in nature utilizing in each case a direct methodology that is finally employed in the implementation of the ECGM. This paper however employs a discretization procedure via the 4 th order Runge-Kutta algorithm to the search of optimal solutions of the 2-dimensional energised wave propagation problem and so contributing to the unified theory of the foregoing diffusive and kinetic Hamiltonian approach [Reju et al, 1999] preceding the implementation of the various versions of ECGM [Reju, et al, 2001; ...

Research paper thumbnail of Extended Machine Replacement Policy

This paper uses iterative method for replacement and maintenance policies leading to a very effic... more This paper uses iterative method for replacement and maintenance policies leading to a very efficient model in large systems unlike the existing exhaustive enumeration algorithm which can be used only if the number of stationary policies is reasonably small. From the numerically simulated results, it was observed that the optimal values of unbounded horizon problems are obtained at the last peak of the model before shooting into non convergence state. Immediately after the optimum report is acquired, a local minimum is achieved. Thereafter, a non convergence positive result that goes into infinity is achieved. The last trough clearly gives a false positive respond. Therefore, the optimum value observed before non-convergence state should be the decisive state to quit the stage. All equipment must be constantly kept under good maintenance since the cost of maintenance increases with time. At a stage of deterioration, equipment could be refurbished and sold out at less expensive cost ...

Research paper thumbnail of A Hierarchical Cluster Analysis and Simulation of State Capitals in Nigeria for Tourism Exploration

In this paper we conducted hierarchical cluster analysis with multiscale bootstrap resampling tec... more In this paper we conducted hierarchical cluster analysis with multiscale bootstrap resampling technique using average linkage method and correlation based dissimilarity matrix to classify state capitals according to their distances by Road from Federal capital, Abuja to the respective state capitals. The R package pvclust was used to assess the uncertainty in hierarchical clustering results. This was then applied to the standard normal approximation theory on the clusters whose standard errors were high or larger than 0.030. The cluster formations have an apparent error rate of 0.027.

Research paper thumbnail of Data Loss Prevention and Challenges Faced in their Deployments

The technology world has greatly evolved over the past three decades and it is at a pace where an... more The technology world has greatly evolved over the past three decades and it is at a pace where an average user’s laptop can accommodate up to a terabyte of data, where a tiny SD card can store an entire database of an organization, where file transferring has become less complex, and where users can easily connect to any wireless network (Private or Public) within the range of their wireless devices to exchange sensitive information. This evolvement has led to one of the greatest challenges organizations are faced with, which is in the area of adequately protecting their sensitive information from being lost or leaked. Data Loss Prevention (DLP) techniques was created in preventing these breaches on data loss, when these breaches occur in an organization. DLP systems has gained popularity over the last decade and is now referred as a matured technology, and with the alarming rate at which digitally stored assets is growing, the need for DLP systems has also increased. This paper dis...

Research paper thumbnail of Development of Crypto-Biometric System Using Fingerprint and Rsa Model for Secure Communication

i-manager's Journal on Information Technology, 2019

Research paper thumbnail of A forensic evidence recovery from mobile device applications

International Journal of Digital Enterprise Technology, 2018

In recent past, there are a lot of research advancements in mobile forensics tools. This is so du... more In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals due to increased computational capabilities. Mobile forensics devices continue to remain a very challenging task due to poor user data retrieval techniques for evidence retrieval. Recently, third party applications assume a veritable feet because it is supported by majority of mobile devices platforms, thereby making it easy to extract information of its users' for future criminal audit. This paper proposes an evidence data retrieval method from InstagramApp using two networks-based platforms [that is, pure peer-to-peer (PPP) and special cluster peer (SCP)-based], whose concept is to manage mobile device communication and generate multiple copies of users data/information to be dumped across three servers. The forensic test results were obtained from PPP and SCP developed to securely extract data from mobile devices. This shows that, SCP outperformed PPP in terms of the time taken to fulfil forensic auditor's request, throughput and broadband utilisation which are 42.82% to 57.18%, 56.81% to 43.19% and 35.41% to 64.53% respectively.

Research paper thumbnail of Mathematical model for the deterministic extended machine replacement policy

International Journal of Computing and Optimization, 2014

This paper uses iterative method for replacement and maintenance policies leading to a very effic... more This paper uses iterative method for replacement and maintenance policies leading to a very efficient model in large systems unlike the existing exhaustive enumeration algorithm which can be used only if the number of stationary policies is reasonably small. From the numerically simulated results, it was observed that the optimal values of unbounded horizon problems are obtained at the last peak of the model before shooting into non convergence state. Immediately after the optimum report is acquired, a local minimum is achieved. Thereafter, a non convergence positive result that goes into infinity is achieved. The last trough clearly gives a false positive respond. Therefore, the optimum value observed before non-convergence state should be the decisive state to quit the stage. All equipment must be constantly kept under good maintenance since the cost of maintenance increases with time. At a stage of deterioration, equipment could be refurbished and sold out at less expensive cost as their lifespan cannot stand the test of time.

Research paper thumbnail of A Survey on Mobile Cloud Computing with Embedded Security Considerations

International Journal of Cloud Computing and Services Science, Apr 13, 2014

The emergence of cloud computing hold a promise to computing where software is provided as a serv... more The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.

Research paper thumbnail of Steganography and Its Application in Information Dessimilation on the Web Using Images As Security Embeddment: A Wavelet Approach