Nwakanma Cosmas | Federal university of Technology Owerri,Imo state,Nigeria. (original) (raw)
Papers by Nwakanma Cosmas
2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2022
2021 International Conference on Information and Communication Technology Convergence (ICTC), 2021
Cyber-security for IN-Vehicle network protocols is a high-priority research area in the automotiv... more Cyber-security for IN-Vehicle network protocols is a high-priority research area in the automotive space. Electronic Control Units (ECUs) in IN-Vehicle networks are connected via the CAN protocol to facilitate reliable information dissemination. Nevertheless, devices connected to this protocol, and the protocol itself are susceptible to attack as it lacks data authentication mechanism for detecting legitimate and illegitimate traffic. A variety of Machine Learning (ML) approaches for mitigating this problem have emerged. The work presented an investigation into the classification power of various ML models using a public CAN bus dataset. In addition, a comparative analysis of the most used and standardized ML techniques. Based on the analysis of the results of the various investigations, the “Fine Tree”, “Fine Gaussian SVM”, and “Fine KNN” are the most suitable for resolving security issues in CAN Bus using the accuracy and minimum classification error of the various ML models as evaluation criteria.
2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2022
Journal of Engineering, Project, and Production Management, 2021
This study presents a fuzzy decision-making trial and evaluation laboratory (DEMATEL) analysis of... more This study presents a fuzzy decision-making trial and evaluation laboratory (DEMATEL) analysis of the internet challenges of the internet of things (IoT) implementation of construction projects in Nigeria. The identification of the IoT challenges was carried out through a thorough literature search and discussions with 27 built environmental experts. In addition, DEMATEL, an expert judgement-based tool, was used to pick, design, and evaluate a structural model consisting of a causal relationship between defined IoT challenges. Subsequently, the fuzzy DEMATEL was deployed with a view to constructing a structural relationship between the various challenging factors by visualising the dynamic associations between them. Based on the findings of the literature survey and expert evaluation, 18 obstacles to the implementation of IoT in construction projects were classified into cause and effect classes based on their relative parameters of impact. The results suggest that 8 challenges were...
SSRN Electronic Journal, 2021
International Journal of Machine Learning and Computing, 2020
Industries use various platforms to receive feedback from users of their products. In this paper,... more Industries use various platforms to receive feedback from users of their products. In this paper, there is an overview of the potentials of using natural language processing system (NLP) in classifying the quality of user experience. The user experience is captured using google form. To test the efficacy of the platform, sentiments of users were analysed using hotels.ng as the source of data. The natural processing of electronic word of mouth (e-WOM) can be applied to any feedback platforms to classify and predict customers' sentiments and provide a veritable opportunity for companies to capture the quality of users' experiences and improve service delivery. The feature or sentiments extraction was done using opinion mining and data cleaning tools on heterogeneous data sources to judge the decision-making process of users. Using charts and correlations, with an average performance level of the willingness to recommend and degree of review helpfulness, the platform showed that the Quality of User Experience (QoUE) of the customers are 7.31 and 7.03 respectively. Finally, an improved logistic regression classifier was developed to test, train and classify the user experiences. Comparing the improved logistic regression classifier with standard logistic regression classifier shows that the training accuracy of the proposed improved logistic regression gave 97.67% as against the standard logistic regression which had accuracy of 86.01%
American Journal of Computer Science and Information Technology, 2018
Telecommunication subscribers' retention and satisfaction are important goals for telecommunicati... more Telecommunication subscribers' retention and satisfaction are important goals for telecommunication network operators on their way to superior economic success in the liberalized Nigeria telecommunication market. The tight competition brought about by Mobile Number Portability(MNP) has resulted to the need for telecommunication service providers in Nigeria to constantly tune and fine-tune their marketing strategies to meet the dynamic behaviour and expectations of subscribers on quality service delivery. The Factors influencing telecommunication subscribers' decision to port among network providers in Nigeria, Adopting a crosssectional survey design, a simple random sampling technique was used to enroll 378 subscribers of the four major network operators (MTN, Glo, Airtel, 9Mobile) aged 18-59 years and above residing in the three geopolitical zones (Owerri Municipal Orlu, and Okigwe) in Imo State into the study. Structured questionnaire was used for data collection, recorded significant facts in relation to subscribers' decision to port among network providers. The hypothesis testing result of regression analysis using SPSS, a statistical software window version 21.0 to analyze and investigate the influence of Service quality, Network coverage, Call rate/tariff/price, Promotion, Customer care/ services as independent variables against the dependent variable confirmed that Service quality, Network coverage, Call rate/tariff/price, Promotion has significant influence on subscribers' decision to port among network providers in Nigeria with significant levels less than 0.05 that is (0.000, 0.000, 0.014, 0.018) respectively. The factor identified as not having significant influence on subscribers' decision to port is Customer care/services with significant levels greater than 0.05 that is 0.074. It is recommended that the network operators should assume the adequate control and management focus more on network extensions to various location where there is low network coverage, such that subscribers will be able to operate smoothly. It is also advised that more investment be made to enhance quality service delivery, and sustainable promotions, while also concentrating on price reduction both for data and call services as a way of increasing subscribers' base.
International Journal on Data Science and Technology, 2019
Effective communication occurs when the receiver and sender both understand and synchronize the f... more Effective communication occurs when the receiver and sender both understand and synchronize the flow of information across board. The utility of language extends beyond human to human interaction and includes also, the use of syntactically formed programming languages to interact with digital systems. Nigeria has an estimate of over 450 languages, which makes it cumbersome to harmonize and put all into a single large repository for data mining. The goal of this paper is to firmly establish the importance of Information Technology in galvanizing Nigerian Languages and Mining scientific data thereof. The purpose of applying Information and Communication Technology (ICT) is to codify the process of extracting various underlying meanings in a language, processing the various idioms, proverbs and quaint statements in such language with the view of bringing out the creativity behind them. The authors explore the developmental stages and techniques of applying an artificial Intelligence system that scans through a given indigenous linguistic system to bring out the hidden facts therein. It is recommended that stakeholders in the 'digital humanities' adopt such mining platforms which helps in achieving greater insight into the diverse cultures and languages, in turn, promoting easy learning experience for indigenous languages.
American Journal of Information Science and Technology, 2018
Systems Analysis and Design is an exciting endeavour as well as an active field in which analysts... more Systems Analysis and Design is an exciting endeavour as well as an active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. Any organization that wants to have a long-lasting impact on its target market, must be ready to invest its resources in planning and research, to ascertain whether a new project is viable, partially viable or impracticable. This will either show the survival tendencies of the organization as it relates to the project or its weaknesses in handling the project. Every system development inadvertently follows four phases, which are: planning, analysis, design, and implementation. All complex systems can be decomposed into a nested hierarchy of subsystems because the different facets of every individual organization are either a system, part of a system or a subsystem. For an embodiment of various singular interconnected parts to be considered a system, it must have followed through with a methodology or an approach. This paper utilizes expository methodology and drives towards giving a concise overview of the various approaches to be adopted while developing a system. It begs to give more insight to the current methodologies in systems development, the emerging approaches and the pros and cons. The authors investigate from inception to the current methodologies, knowing full well that many occurrences in life happens in correspondence to dispensations, times and seasons; just like winter and summer, the authors understudy the various dispensations to pin the prevalent methodologies in certain time spaces, the advances or improvement as well as the advantages and disadvantages they have over others as time progresses. In the process, old systems methodologies are improved to serve a larger target and the amount of work needed per time reduces as new system methodology are developed over time.
Journal of Telecommunications System & Management, 2014
The world becoming a global village comes with its challenges. One of such challenge is that both... more The world becoming a global village comes with its challenges. One of such challenge is that both local and international manufacturing firms are engaged in fierce competition of winning customer's loyalty through Total Quality Management (TQM). The methodology of this paper used both questionnaire and statistical tools like t-test, F-test, ANOVA, regression and correlation analysis to study the components of TQM and how they affect effective delivery of manufacturing projects. The result of analysis indicates that staff training, staff empowerment, genuine quality culture, top management support, quality-based custom design and product improvement are critical to effective delivery of manufacturing projects. It is therefore very important that for the transformation of the nation, manufacturing sector of the Nation must imbibe the culture and practice of Total Quality Management in their product development and delivery.
2021 International Conference on Information and Communication Technology Convergence (ICTC)
International Journal of Network Security & Its Applications
In this paper, we present a tiered vehicular forensics framework based on permission BlockChain. ... more In this paper, we present a tiered vehicular forensics framework based on permission BlockChain. We integrate all entities involved in the forensics process and record their interactions in the BlockChain to generate comprehensive evidence for settling disputes and appropriating blame. We incorporate a watchdog entity in our tiered framework to prevent collusive tendencies of potentiality liable entities and to prevent exploitation of evidence. Also, we incorporate a state mechanism to prove the state of a smart vehicle when an accident occurs. Furthermore, we conduct a security analysis to demonstrate the resilience of our framework against identified attacks and describe security mechanisms used to achieve key requirements for vehicular forensics. Finally, we comparatively evaluate our framework against existing proposals.
2021 International Conference on Information and Communication Technology Convergence (ICTC)
In additive manufacturing, a relatively high oxygen concentration inside a Stereolithography Appa... more In additive manufacturing, a relatively high oxygen concentration inside a Stereolithography Apparatus (SLA-type) of three dimensional (3D)-printer during the operation have high risk of degrading the quality of the product. Monitoring such level of oxygen is still an open challenge to solve in the additive manufacturing industry. This paper presents a design of a collaborative sensor system that monitors the normal oxygen level during the printing process. Furthermore, a self organizing map (SOM) which is a form of artificial neural network(ANN) to cluster the oxygen concentration to reach the critical level was proposed. Results of the ANN performance is 96%.
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019
Industrial image processing and computer vision play significant role in factory automation since... more Industrial image processing and computer vision play significant role in factory automation since industries now employ human-robot interaction for the monitoring of products in areas considered risky and dangerous for humans. The challenge however, is to ensure reliability in image processing such that image sizes and image similarity index are expected to be perfect representation of actual objects. This paper investigated the statistical relationship between the image ratio size and similarity index after compression. Using correlation analysis, a statistical relationship was established between the image size ratio and similarity index of selected images under review. It was observed that an inverse and high correlation existed between the image similarity index and image size ratio of compressed images. The result of the validation shows that the proposed regression model has predictability or good fit of 95%.
2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2021
In this paper, we used a vibration sensor known as G-Link 200 to collect real time vibration data... more In this paper, we used a vibration sensor known as G-Link 200 to collect real time vibration data. The sensor is connected through the internet gateway and Long Short Term Memory (LSTM) used for the classification of sensor data. The classification allows for detecting normal and anomaly activity situation which allows for triggering emergency situation. This is implemented in smart homes where privacy is an issue of concern. Example of such places are toilets, bedrooms and dressing rooms. It can also be applied to smart factory where detecting excessive or abnormal vibration is of critical importance to factory operation. The system eliminates the discomfort for video surveillance to the user. The data collected is also useful for the research community in similar research areas of sensor data enhancement. MATLAB R2019b was used to develop the LSTM. The result showed that the accuracy of the LSTM is 97.39% which outperformed other machine learning algorithm and is reliable for emer...
2021 International Conference on Information and Communication Technology Convergence (ICTC)
2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020
There’s been a series of datasets with regards to network intrusion detection in recent years, an... more There’s been a series of datasets with regards to network intrusion detection in recent years, and a significant number of studies has also been carried out using these datasets. In this paper we aim to explore these datasets while also showing the capability of the proposed model to accurately detect and classify network intrusions. This paper presents a deep learning based model for network intrusion as well as a comparative analysis of the performance of three major network intrusion datasets using the proposed model. Results showed the model to perform best for NSL-KDD, followed by UNSW-NB15 and CSE-CIC-IDS2018 respectively. Model accuracy achieved for these datasets were NSL-KDD (97.89%), UNSW-NB15 (89.99%), and CSE-CIC-IDS2018 (76.47%) was achieved.
Collaboration and Integration in Construction, Engineering, Management and Technology
2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2022
2021 International Conference on Information and Communication Technology Convergence (ICTC), 2021
Cyber-security for IN-Vehicle network protocols is a high-priority research area in the automotiv... more Cyber-security for IN-Vehicle network protocols is a high-priority research area in the automotive space. Electronic Control Units (ECUs) in IN-Vehicle networks are connected via the CAN protocol to facilitate reliable information dissemination. Nevertheless, devices connected to this protocol, and the protocol itself are susceptible to attack as it lacks data authentication mechanism for detecting legitimate and illegitimate traffic. A variety of Machine Learning (ML) approaches for mitigating this problem have emerged. The work presented an investigation into the classification power of various ML models using a public CAN bus dataset. In addition, a comparative analysis of the most used and standardized ML techniques. Based on the analysis of the results of the various investigations, the “Fine Tree”, “Fine Gaussian SVM”, and “Fine KNN” are the most suitable for resolving security issues in CAN Bus using the accuracy and minimum classification error of the various ML models as evaluation criteria.
2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2022
Journal of Engineering, Project, and Production Management, 2021
This study presents a fuzzy decision-making trial and evaluation laboratory (DEMATEL) analysis of... more This study presents a fuzzy decision-making trial and evaluation laboratory (DEMATEL) analysis of the internet challenges of the internet of things (IoT) implementation of construction projects in Nigeria. The identification of the IoT challenges was carried out through a thorough literature search and discussions with 27 built environmental experts. In addition, DEMATEL, an expert judgement-based tool, was used to pick, design, and evaluate a structural model consisting of a causal relationship between defined IoT challenges. Subsequently, the fuzzy DEMATEL was deployed with a view to constructing a structural relationship between the various challenging factors by visualising the dynamic associations between them. Based on the findings of the literature survey and expert evaluation, 18 obstacles to the implementation of IoT in construction projects were classified into cause and effect classes based on their relative parameters of impact. The results suggest that 8 challenges were...
SSRN Electronic Journal, 2021
International Journal of Machine Learning and Computing, 2020
Industries use various platforms to receive feedback from users of their products. In this paper,... more Industries use various platforms to receive feedback from users of their products. In this paper, there is an overview of the potentials of using natural language processing system (NLP) in classifying the quality of user experience. The user experience is captured using google form. To test the efficacy of the platform, sentiments of users were analysed using hotels.ng as the source of data. The natural processing of electronic word of mouth (e-WOM) can be applied to any feedback platforms to classify and predict customers' sentiments and provide a veritable opportunity for companies to capture the quality of users' experiences and improve service delivery. The feature or sentiments extraction was done using opinion mining and data cleaning tools on heterogeneous data sources to judge the decision-making process of users. Using charts and correlations, with an average performance level of the willingness to recommend and degree of review helpfulness, the platform showed that the Quality of User Experience (QoUE) of the customers are 7.31 and 7.03 respectively. Finally, an improved logistic regression classifier was developed to test, train and classify the user experiences. Comparing the improved logistic regression classifier with standard logistic regression classifier shows that the training accuracy of the proposed improved logistic regression gave 97.67% as against the standard logistic regression which had accuracy of 86.01%
American Journal of Computer Science and Information Technology, 2018
Telecommunication subscribers' retention and satisfaction are important goals for telecommunicati... more Telecommunication subscribers' retention and satisfaction are important goals for telecommunication network operators on their way to superior economic success in the liberalized Nigeria telecommunication market. The tight competition brought about by Mobile Number Portability(MNP) has resulted to the need for telecommunication service providers in Nigeria to constantly tune and fine-tune their marketing strategies to meet the dynamic behaviour and expectations of subscribers on quality service delivery. The Factors influencing telecommunication subscribers' decision to port among network providers in Nigeria, Adopting a crosssectional survey design, a simple random sampling technique was used to enroll 378 subscribers of the four major network operators (MTN, Glo, Airtel, 9Mobile) aged 18-59 years and above residing in the three geopolitical zones (Owerri Municipal Orlu, and Okigwe) in Imo State into the study. Structured questionnaire was used for data collection, recorded significant facts in relation to subscribers' decision to port among network providers. The hypothesis testing result of regression analysis using SPSS, a statistical software window version 21.0 to analyze and investigate the influence of Service quality, Network coverage, Call rate/tariff/price, Promotion, Customer care/ services as independent variables against the dependent variable confirmed that Service quality, Network coverage, Call rate/tariff/price, Promotion has significant influence on subscribers' decision to port among network providers in Nigeria with significant levels less than 0.05 that is (0.000, 0.000, 0.014, 0.018) respectively. The factor identified as not having significant influence on subscribers' decision to port is Customer care/services with significant levels greater than 0.05 that is 0.074. It is recommended that the network operators should assume the adequate control and management focus more on network extensions to various location where there is low network coverage, such that subscribers will be able to operate smoothly. It is also advised that more investment be made to enhance quality service delivery, and sustainable promotions, while also concentrating on price reduction both for data and call services as a way of increasing subscribers' base.
International Journal on Data Science and Technology, 2019
Effective communication occurs when the receiver and sender both understand and synchronize the f... more Effective communication occurs when the receiver and sender both understand and synchronize the flow of information across board. The utility of language extends beyond human to human interaction and includes also, the use of syntactically formed programming languages to interact with digital systems. Nigeria has an estimate of over 450 languages, which makes it cumbersome to harmonize and put all into a single large repository for data mining. The goal of this paper is to firmly establish the importance of Information Technology in galvanizing Nigerian Languages and Mining scientific data thereof. The purpose of applying Information and Communication Technology (ICT) is to codify the process of extracting various underlying meanings in a language, processing the various idioms, proverbs and quaint statements in such language with the view of bringing out the creativity behind them. The authors explore the developmental stages and techniques of applying an artificial Intelligence system that scans through a given indigenous linguistic system to bring out the hidden facts therein. It is recommended that stakeholders in the 'digital humanities' adopt such mining platforms which helps in achieving greater insight into the diverse cultures and languages, in turn, promoting easy learning experience for indigenous languages.
American Journal of Information Science and Technology, 2018
Systems Analysis and Design is an exciting endeavour as well as an active field in which analysts... more Systems Analysis and Design is an exciting endeavour as well as an active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. Any organization that wants to have a long-lasting impact on its target market, must be ready to invest its resources in planning and research, to ascertain whether a new project is viable, partially viable or impracticable. This will either show the survival tendencies of the organization as it relates to the project or its weaknesses in handling the project. Every system development inadvertently follows four phases, which are: planning, analysis, design, and implementation. All complex systems can be decomposed into a nested hierarchy of subsystems because the different facets of every individual organization are either a system, part of a system or a subsystem. For an embodiment of various singular interconnected parts to be considered a system, it must have followed through with a methodology or an approach. This paper utilizes expository methodology and drives towards giving a concise overview of the various approaches to be adopted while developing a system. It begs to give more insight to the current methodologies in systems development, the emerging approaches and the pros and cons. The authors investigate from inception to the current methodologies, knowing full well that many occurrences in life happens in correspondence to dispensations, times and seasons; just like winter and summer, the authors understudy the various dispensations to pin the prevalent methodologies in certain time spaces, the advances or improvement as well as the advantages and disadvantages they have over others as time progresses. In the process, old systems methodologies are improved to serve a larger target and the amount of work needed per time reduces as new system methodology are developed over time.
Journal of Telecommunications System & Management, 2014
The world becoming a global village comes with its challenges. One of such challenge is that both... more The world becoming a global village comes with its challenges. One of such challenge is that both local and international manufacturing firms are engaged in fierce competition of winning customer's loyalty through Total Quality Management (TQM). The methodology of this paper used both questionnaire and statistical tools like t-test, F-test, ANOVA, regression and correlation analysis to study the components of TQM and how they affect effective delivery of manufacturing projects. The result of analysis indicates that staff training, staff empowerment, genuine quality culture, top management support, quality-based custom design and product improvement are critical to effective delivery of manufacturing projects. It is therefore very important that for the transformation of the nation, manufacturing sector of the Nation must imbibe the culture and practice of Total Quality Management in their product development and delivery.
2021 International Conference on Information and Communication Technology Convergence (ICTC)
International Journal of Network Security & Its Applications
In this paper, we present a tiered vehicular forensics framework based on permission BlockChain. ... more In this paper, we present a tiered vehicular forensics framework based on permission BlockChain. We integrate all entities involved in the forensics process and record their interactions in the BlockChain to generate comprehensive evidence for settling disputes and appropriating blame. We incorporate a watchdog entity in our tiered framework to prevent collusive tendencies of potentiality liable entities and to prevent exploitation of evidence. Also, we incorporate a state mechanism to prove the state of a smart vehicle when an accident occurs. Furthermore, we conduct a security analysis to demonstrate the resilience of our framework against identified attacks and describe security mechanisms used to achieve key requirements for vehicular forensics. Finally, we comparatively evaluate our framework against existing proposals.
2021 International Conference on Information and Communication Technology Convergence (ICTC)
In additive manufacturing, a relatively high oxygen concentration inside a Stereolithography Appa... more In additive manufacturing, a relatively high oxygen concentration inside a Stereolithography Apparatus (SLA-type) of three dimensional (3D)-printer during the operation have high risk of degrading the quality of the product. Monitoring such level of oxygen is still an open challenge to solve in the additive manufacturing industry. This paper presents a design of a collaborative sensor system that monitors the normal oxygen level during the printing process. Furthermore, a self organizing map (SOM) which is a form of artificial neural network(ANN) to cluster the oxygen concentration to reach the critical level was proposed. Results of the ANN performance is 96%.
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019
Industrial image processing and computer vision play significant role in factory automation since... more Industrial image processing and computer vision play significant role in factory automation since industries now employ human-robot interaction for the monitoring of products in areas considered risky and dangerous for humans. The challenge however, is to ensure reliability in image processing such that image sizes and image similarity index are expected to be perfect representation of actual objects. This paper investigated the statistical relationship between the image ratio size and similarity index after compression. Using correlation analysis, a statistical relationship was established between the image size ratio and similarity index of selected images under review. It was observed that an inverse and high correlation existed between the image similarity index and image size ratio of compressed images. The result of the validation shows that the proposed regression model has predictability or good fit of 95%.
2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2021
In this paper, we used a vibration sensor known as G-Link 200 to collect real time vibration data... more In this paper, we used a vibration sensor known as G-Link 200 to collect real time vibration data. The sensor is connected through the internet gateway and Long Short Term Memory (LSTM) used for the classification of sensor data. The classification allows for detecting normal and anomaly activity situation which allows for triggering emergency situation. This is implemented in smart homes where privacy is an issue of concern. Example of such places are toilets, bedrooms and dressing rooms. It can also be applied to smart factory where detecting excessive or abnormal vibration is of critical importance to factory operation. The system eliminates the discomfort for video surveillance to the user. The data collected is also useful for the research community in similar research areas of sensor data enhancement. MATLAB R2019b was used to develop the LSTM. The result showed that the accuracy of the LSTM is 97.39% which outperformed other machine learning algorithm and is reliable for emer...
2021 International Conference on Information and Communication Technology Convergence (ICTC)
2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020
There’s been a series of datasets with regards to network intrusion detection in recent years, an... more There’s been a series of datasets with regards to network intrusion detection in recent years, and a significant number of studies has also been carried out using these datasets. In this paper we aim to explore these datasets while also showing the capability of the proposed model to accurately detect and classify network intrusions. This paper presents a deep learning based model for network intrusion as well as a comparative analysis of the performance of three major network intrusion datasets using the proposed model. Results showed the model to perform best for NSL-KDD, followed by UNSW-NB15 and CSE-CIC-IDS2018 respectively. Model accuracy achieved for these datasets were NSL-KDD (97.89%), UNSW-NB15 (89.99%), and CSE-CIC-IDS2018 (76.47%) was achieved.
Collaboration and Integration in Construction, Engineering, Management and Technology
This is a description of the supply side drivers affecting Broadband Penetration in Nigeria. The ... more This is a description of the supply side drivers affecting Broadband Penetration in Nigeria. The drivers listed are Competitiveness, Ease of doing business, Corporate tax and corruption index.