Habiba Sani - Profile on Academia.edu (original) (raw)
Papers by Habiba Sani
International journal of computer applications, Jan 15, 2016
The timetabling problem is always a difficult task which comes up every calendar year in educatio... more The timetabling problem is always a difficult task which comes up every calendar year in educational institutions. More especially if it has to be done manually. Various institutions of learning across the country are being faced with a lot of difficulties preparing examination timetable. Most of this problems are usually attributed to the constant increase in the number of students and courses while having limited resources (exam classes) to use in scheduling. The aim of this paper is to propose the use of genetic algorithm technique to develop an easier, effective and efficient timetable using in order to ease the problems faced during scheduling of examination. Although, there are various scheduling techniques, but the use of Genetic Algorithm was based on the fact that, the algorithm are robust there by properly fits into complex problem space. The new method is aimed at providing a more flexible timetable representation and proved to be efficient in real life applications..
An Improved Satisfactory Algorithm Forfinding Optimal Solutions to Problems
Asian Journal of Mathematics and Computer Research, 2015
Lecture Notes in Computer Science
Decision tree is a simple but powerful learning technique that is considered as one of the famous... more Decision tree is a simple but powerful learning technique that is considered as one of the famous learning algorithms that have been successfully used in practice for various classification tasks. They have the advantage of producing a comprehensible classification model with satisfactory accuracy levels in several application domains. In recent years, the volume of data available for learning is dramatically increasing. As a result, many application domains are faced with a large amount of data thereby posing a major bottleneck on the computability of learning techniques. There are different implementations of the decision tree using different techniques. In this paper, we theoretically and experimentally study and compare the computational power of the most common classical top-down decision tree algorithms (C4.5 and CART). This work can serve as part of review work to analyse the computational complexity of the existing decision tree classifier algorithm to gain understanding of the operational steps with the aim of optimizing the learning algorithm for large datasets.
Performance Analysis of Feature Selection Methods for Classification of Healthcare Datasets
Classification analysis is widely used in enhancing the quality of healthcare applications by ana... more Classification analysis is widely used in enhancing the quality of healthcare applications by analysing data and discovering hidden patterns and relationships between the features, which can be used to support medical diagnostic decisions and improving the quality of patient care. Usually, a healthcare dataset may contain irrelevant, redundant, and noisy features; applying classification algorithms to such type of data may produce a less accurate and a less understandable results. Therefore, selection of optimal features has a significant influence on enhancing the accuracy of classification systems. Feature selection method is an effective data pre-processing technique in data mining, which can be used to identify a minimum set of features. This type of technique has immediate effects on speeding up classification algorithms and improving performance such as predictive accuracy. This paper, aims to evaluate the performance of five different classification methods including: C5.0, R...
International Journal of Computer Science and Information Technology, 2015
Database security is a growing concern as the amount of sensitive data collected and retained in ... more Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and teaching and learning institutions store sensitive data in databases .As most of these data are electronically accessed , It can therefore be assumed that , the integrity of these numerous and sensitive data is prone to different kind of threat such as{Unauthorized access, theft as well access denial}. Therefore, the need for securing databases has also increased The primary objectives of database security are to prevent unauthorized access to data, prevent unauthorized tampering or modification of data, and to also ensure that, these data remains available whenever needed. In this paper, we developed a database security framework by combining different security mechanism on a sensitive students information database application designed for Shehu Shagari College of Education Sokoto (SSCOE) with the aim of minimizing and preventing the data from Confidentiality, Integrity and Availability threats.
Database security is a growing concern as the amount of sensitive data collected and retained in ... more Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and teaching and learning institutions store sensitive data in databases .As most of these data are electronically accessed , It can therefore be assumed that , the integrity of these numerous and sensitive data is prone to different kind of threat such as{Unauthorized access, theft as well access denial}. Therefore, the need for securing databases has also increased The primary objectives of database security are to prevent unauthorized access to data, prevent unauthorized tampering or modification of data, and to also ensure that, these data remains available whenever needed. In this paper, we developed a database security framework by combining different security mechanism on a sensitive students information database application designed for Shehu Shaga...
International journal of computer applications, Jan 15, 2016
The timetabling problem is always a difficult task which comes up every calendar year in educatio... more The timetabling problem is always a difficult task which comes up every calendar year in educational institutions. More especially if it has to be done manually. Various institutions of learning across the country are being faced with a lot of difficulties preparing examination timetable. Most of this problems are usually attributed to the constant increase in the number of students and courses while having limited resources (exam classes) to use in scheduling. The aim of this paper is to propose the use of genetic algorithm technique to develop an easier, effective and efficient timetable using in order to ease the problems faced during scheduling of examination. Although, there are various scheduling techniques, but the use of Genetic Algorithm was based on the fact that, the algorithm are robust there by properly fits into complex problem space. The new method is aimed at providing a more flexible timetable representation and proved to be efficient in real life applications..
An Improved Satisfactory Algorithm Forfinding Optimal Solutions to Problems
Asian Journal of Mathematics and Computer Research, 2015
Lecture Notes in Computer Science
Decision tree is a simple but powerful learning technique that is considered as one of the famous... more Decision tree is a simple but powerful learning technique that is considered as one of the famous learning algorithms that have been successfully used in practice for various classification tasks. They have the advantage of producing a comprehensible classification model with satisfactory accuracy levels in several application domains. In recent years, the volume of data available for learning is dramatically increasing. As a result, many application domains are faced with a large amount of data thereby posing a major bottleneck on the computability of learning techniques. There are different implementations of the decision tree using different techniques. In this paper, we theoretically and experimentally study and compare the computational power of the most common classical top-down decision tree algorithms (C4.5 and CART). This work can serve as part of review work to analyse the computational complexity of the existing decision tree classifier algorithm to gain understanding of the operational steps with the aim of optimizing the learning algorithm for large datasets.
Performance Analysis of Feature Selection Methods for Classification of Healthcare Datasets
Classification analysis is widely used in enhancing the quality of healthcare applications by ana... more Classification analysis is widely used in enhancing the quality of healthcare applications by analysing data and discovering hidden patterns and relationships between the features, which can be used to support medical diagnostic decisions and improving the quality of patient care. Usually, a healthcare dataset may contain irrelevant, redundant, and noisy features; applying classification algorithms to such type of data may produce a less accurate and a less understandable results. Therefore, selection of optimal features has a significant influence on enhancing the accuracy of classification systems. Feature selection method is an effective data pre-processing technique in data mining, which can be used to identify a minimum set of features. This type of technique has immediate effects on speeding up classification algorithms and improving performance such as predictive accuracy. This paper, aims to evaluate the performance of five different classification methods including: C5.0, R...
International Journal of Computer Science and Information Technology, 2015
Database security is a growing concern as the amount of sensitive data collected and retained in ... more Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and teaching and learning institutions store sensitive data in databases .As most of these data are electronically accessed , It can therefore be assumed that , the integrity of these numerous and sensitive data is prone to different kind of threat such as{Unauthorized access, theft as well access denial}. Therefore, the need for securing databases has also increased The primary objectives of database security are to prevent unauthorized access to data, prevent unauthorized tampering or modification of data, and to also ensure that, these data remains available whenever needed. In this paper, we developed a database security framework by combining different security mechanism on a sensitive students information database application designed for Shehu Shagari College of Education Sokoto (SSCOE) with the aim of minimizing and preventing the data from Confidentiality, Integrity and Availability threats.
Database security is a growing concern as the amount of sensitive data collected and retained in ... more Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and teaching and learning institutions store sensitive data in databases .As most of these data are electronically accessed , It can therefore be assumed that , the integrity of these numerous and sensitive data is prone to different kind of threat such as{Unauthorized access, theft as well access denial}. Therefore, the need for securing databases has also increased The primary objectives of database security are to prevent unauthorized access to data, prevent unauthorized tampering or modification of data, and to also ensure that, these data remains available whenever needed. In this paper, we developed a database security framework by combining different security mechanism on a sensitive students information database application designed for Shehu Shaga...