Wilson Nwankwo | Edo State University (original) (raw)

Papers by Wilson Nwankwo

Research paper thumbnail of Throughput in Wireless Lan Implications of Some Meteorological Variables in Undulating Landscape

Nigerian Research Journal of Engineering and Environmental Sciences, Dec 30, 2020

Generally, meteorological variables such as relative humidity, temperature and mean sea level pre... more Generally, meteorological variables such as relative humidity, temperature and mean sea level pressure vary from place to place and it has been shown that these natural conditions may exert significant impact on wireless communication. In traditional settings, these variables are not critically analyzed when deploying wireless networks. This paper presents an account on the study of the throughput of wireless local area networks (WLANs) using an extensive campus network located in an undulating topography in a tropical climate in Iyamho, Edo North, South-South of Nigeria. The undulating topography, temperature, relative humidity and mean sea level pressure were evaluated in order to establish their interactions with WLANs. The result shows that the Wi-Fi signals were more affected by distance than by temperature, relative humidity and mean sea level pressure respectively in the absence of other obstacles that might have introduced some interference along the path of the radio signals. Nevertheless, this study confirmed that the throughput is affected by temperature and relative humidity respectively and that along undulating lowlands optimal performances were recorded under lower temperatures, lower relative humidity and higher mean sea level pressure.

Research paper thumbnail of IoT-Driven Bayesian Learning: A Case Study of Reducing Road Accidents of Commercial Vehicles on Highways

Research paper thumbnail of Comparative Performance Analysis of 
Selected Routing Algorithms by Load Variation of 2-Dimensional Mesh Topology Based 
Network-On-Chip

ELEKTRIKA- Journal of Electrical Engineering, 2021

Network-on-Chip (NoC) has been proposed as a viable solution to the communication challenges on S... more Network-on-Chip (NoC) has been proposed as a viable solution to the communication challenges on System-on-Chips (SoCs). As the communication paradigm of SoC, NoCs performance depends mainly on the type of routing algorithm chosen. In this paper different categories of routing algorithms were compared. These include XY routing, OE turn model adaptive routing, DyAD routing and Age-Aware adaptive routing. By varying the load at different Packet Injection Rate (PIR) under random traffic pattern, comparison was conducted using a 4 × 4 mesh topology. The Noxim simulator, a cycle accurate systemC based simulator was employed. The packets were modeled as a Poisson distribution; first-in-first-out (FIFO) input buffer channel with a depth of five (5) flits and a flit size of 32 bits; and a packet size of 3 flits respectively. The simulation time was 10,000 cycles. The findings showed that the XY routing algorithm performed better when the PIR is low. In a similar vein, the DyAD routing and ...

Research paper thumbnail of Knowledge Discovery and Analytics in Process Reengineering: A Study of Port Clearance Processes

2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), 2020

Due to the nature of the transactions involved in imports and the security threats associated wit... more Due to the nature of the transactions involved in imports and the security threats associated with it, most nations have put agencies and machineries in place for regulating and monitoring the flow of trade. The objectives of these agencies include but not restricted to monitoring of trade transactions; revenue generation, facilitation of trade, policy and decision making, etc. Risk management is a major segment of the clearance process at the port and is consistently advocated by the world customs organization (WCO) and the world trade organization (WTO) respectively. In Nigeria, the Nigeria Customs Service (NCS) performs this function with the aid of Automated System for Customs Data (ASYCUDA) first implemented in 2006 during the modernization project of the Federal Government of Nigeria and now modernized as the Nigeria Customs Information System (NICIS). This study reviews the present imports clearance process to identify areas that may be remedied through process re-engineering using analytics. It adopts a hybrid methodology comprising descriptive methods, object-based and knowledge-based modeling with the aim of establishing a reliable model that could be integrated to advance the existing imports process and clearance process. The proposed model uses the k-means algorithm to discover pertinent patterns and trends with respect to areas that need enhancement thus helping the relevant authorities in achieving a competent and effective clearance process driven by knowledge-based process re-engineering.

Research paper thumbnail of Strengthening Private Sector Participation in Public Infrastructure Projects through Concession Policies and Legislations in Nigeria: A Review

ERN: Infrastructure & Public Investment (Topic), 2019

Infrastructure concession connotes an arrangement the organizations from the private sector parti... more Infrastructure concession connotes an arrangement the organizations from the private sector participate in financing public projects such as construction, development, operation, and maintenance or other similar development projects over a defined period based on agreement between government and the private sector organizations(s). The concession legally grants private investors the right to direct its capital to infrastructural development. As a form of public private partnership, concession is governed by public policies. In developed and developing countries alike, the ease of execution of policies guiding concession arrangements, and ultimate goals recorded following implementation may be dependent upon the extant legislative frameworks. In Nigeria, Concession of governement projects has been in practice for over two decades and has in no way prospered compared to other African countries like Ghana and South Africa. Having regard to the foregoing, this paper is an attempt to dra...

Research paper thumbnail of A Model for Implementing Security and Risk Management Data Warehouse for Scanning Operations in Nigeria

International journal of engineering research and technology, 2016

Security is a fundamental constitutional objective of the government in Nigeria. Undermining this... more Security is a fundamental constitutional objective of the government in Nigeria. Undermining this security are the activities of importers who exploit the security loopholes at the ports and borders across Nigeria to bring in dangerous goods such as arms and ammunitions; expired products; and contraband goods. Conducting risk management operations on imports has therefore become a very critical policy across Nigerian ports and border posts not just that the State’s economy depends greatly on imports but that the State is continuously ravaged by serious security threats. In Nigeria, scanning and security risk management providers have been involved over the years to assist the Nigeria Customs Service in detecting and managing risks associated with international trade transactions particularly import transactions. This research is conceived to address the analytical and data consolidation problems arising from the limited automation usually witnessed at the operational ports and borde...

Research paper thumbnail of A Data Warehouse-Based Mining System for Academic Resource Capacity Planning

Cognitive Psychology eJournal, 2016

Academic resource capacity planning is fundamental to the success of every academic program in an... more Academic resource capacity planning is fundamental to the success of every academic program in any institution whether at the primary, secondary or tertiary level. As a matter of fact, academic capacity planning is a continuous process often involving both core academic and non-academic personnel of an Institution. As simple as it may sound, academic capacity planning may make or mar the quality of students trained as well as the reputation of the Institution amongst its peers. This is why it is vital for every academic planner particularly at the department level to carefully consider important indicators such as: course requirements, previous student performances, academic achievements, future goals, etc. during the planning process. This research studies the fundamental processes in selected Institutions of Higher Learning in Nigeria as it affects academic planning specifically during the allocation of courses to academics during each semester and develops a model program based o...

Research paper thumbnail of Nanomaterials and Nanocoatings for Alternative Antimicrobial Therapy

Research paper thumbnail of Climatic Change and Pesticides Usage: A Brief Review of Their Implicative Relationship

Pesticides are very important for the prevention, mitigation, destruction of pests and diseases f... more Pesticides are very important for the prevention, mitigation, destruction of pests and diseases for the improvement of agricultural efficiency due to their contributions to agricultural yields and improving the standard of living. Considering the dynamicity and influence of weather in our everyday lives, it is obvious that the effects of pesticides might also be a contributing factor and vice versa. Climate change could have an influence on both pesticides’ usage, as well as the losses of pesticides to the environment. Presently, the issue of climate change is one of the furthermost intellectual challenging issues facing the entire human race. Therefore, we must continue to protect our environment from these unfavorable effects of climate change by extremely dipping the emissions of greenhouse gases especially via the use of chemical substances such as pesticides. In this review study, we will briefly attempt to give an insight and try to bridge the uncertainty surrounding the effec...

Research paper thumbnail of Document Interchange Modeling with the Zachman Framework: Nigeria’s Institutions in Perspective

This paper is part of a study aimed at evolving a platform-independent distributed document inter... more This paper is part of a study aimed at evolving a platform-independent distributed document interchange system to ease the challenges associated with the information flow cycle between Institutions of higher learning and their prospective candidates especially during verifying and validating academic documents submitted to such Institutions by the candidates. The first part was the proposition of an interchange framework wherein the basic foundations and principles of document exchange were laid down. This study exploits the Zachman framework for Enterprise and Information Systems Architecture. The proposed model ensures that each Institution could implement its information system in such a way that it could exchange requests and verification information directly with a system owned or managed by another institution over a public network such as the Internet with little or no involvement on the part of the candidates. The model is cost-effective and sustainable in the Nigerian envir...

Research paper thumbnail of A Fuzzy Prototype Solution for Website Quality Assurance

Internet has become ubiquitous and organizations have moved from the traditional storage using ph... more Internet has become ubiquitous and organizations have moved from the traditional storage using physical files localized in cabinets to online remote storage accessible over websites. Over the years, different website evaluation tools have been developed to assist web administrators with website maintenance functions. Prior to a proper website assessment using majority of such tools, the web administrator would have to access each one differently reasons being that each tool is developed to measure different quality parameters. Later, Fuzz-web was developed to capture more parameters but with a limitation wherein the system depends on some of the evaluation tools for inputs, the implication being that where such tools are not available there will be an express failure of fuzz-web. To overcome the foregoing problems, this paper is aimed at developing a Fuzzy-Based Website Quality Assurance System. It employs fuzzy logic principles, exploiting the inherent power of the Java programming...

Research paper thumbnail of The Urban Traffic Congestion Problem In Benin City And The Search For An ICT-Improved Solution

Many hours are wasted often due to the intense traffic congestion on roads in highly populated ci... more Many hours are wasted often due to the intense traffic congestion on roads in highly populated cities with resultant loss of labour productivity. The reason is that while road infrastructure follows an arithmetic progression and often fixed in developed cities, population and road usage patterns follow a geometric progression. In Nigeria, as well other countries with huge road usage, traffic management is a critical challenge to the Government and traffic managers alike. Traffic officers complemented with time-based traffic control infrastructure have remained commonplace. A lot had been done on traffic control systems especially in high traffic density-prone cities. Many studies had proposed the use of sensor arrays. This study is centred around Benin City, the sixth largest city in Nigeria with its unique geography and socio-economic characteristics. In this paper, traffic management challenges are addressed through an improved model and with regard to the existing infrastructure ...

Research paper thumbnail of The Role of Public-Private Partnership on the Implementation of National Cybersecurity Policies: A Case of Nigeria

Compared to other components of the Cyberspace, Cybersecurity is emerging the most prominent doma... more Compared to other components of the Cyberspace, Cybersecurity is emerging the most prominent domain of concern. The reason may not be unconnected with the geometric growth in in the evolution of new computer-based technologies by the day and the deployment of such technologies for both positive and negative purposes. There are four major areas where Cybersecurity programmes are massively ongoing: Technology Products, Research, Education, and Business enterprises. These four areas are unarguably very vital and affect the socioeconomic development of any society. E-commerce and other sensitive socioeconomic ventures are growing but are markedly deterred by security concerns in the Cyberspace. Having regard to the foregoing, this paper examines the ongoing Cybersecurity developments in Nigeria especially as it affects the sectors under review. The argument is that there have not been a significant synergy between the two sectors in promoting Cybersecurity development in Nigeria hence the terrifying spate of cybercrimes amidst the Cybercrime prevention and prohibition laws. We submit that a mutual front propelled by Public Private Partnership (PPP) would go a long way to reducing the spate of these crimes in the cyberspace thus promoting socioeconomic development in Nigeria and the sub region. It is also submitted that with the involvement of public and private sectors, the legal frameworks for combating cybercrimes would be enhanced further through the use of joint socio-technical approaches.

Research paper thumbnail of Evolving Effective Healthcare System through Public Private Partnership

This paper reviews the state of Public Healthcare Infrastructure in Nigeria and the potentiality ... more This paper reviews the state of Public Healthcare Infrastructure in Nigeria and the potentiality of PUBLIC PRIVATE PARTNERSHIP as a financing model towards resuscitating the Healthcare delivery system. First, we reviewed vital documents on Healthcare delivery and Public Private Partnership(PPP) models of delivering public infrastructure projects. The provisions of the National Health Act 2014, the Infrastructure Concession and Regulatory Commission (establishment) Act 2005, and the National Health Policy were examined respectively. The review showed that poor healthcare infrastructure had persisted over decades owing to neglect, poor government funding and a myriad of other factors. Accordingly, having regard to health financing, we examined all PPP-based healthcare projects visa -vis that in other segments of the economy. Though the PPP model appears to be a more prospective model for healthcare infrastructure procurement it is yet to be exploited by the public authorities. Our findings showed that Nigeria has the potential to enthrone effective and efficient healthcare delivery through the PPP platform.

Research paper thumbnail of Biobutanol: A Promising Alternative Commercial Biofuel

Handbook of Nanomaterials and Nanocomposites for Energy and Environmental Applications, 2020

Research paper thumbnail of Security of Cloud Virtualized Resource on a SaaS Encryption Solution

Science Journal of Energy Engineering, 2018

Protection of user data against data breaches in cloud applications and the potential security fa... more Protection of user data against data breaches in cloud applications and the potential security failures of the service providers coupled with heightened cloud user apprehension, have in no small degree defied measures taken to demystify cloud services as to unveil its enormous capacity and awesome benefits such as accessibility, availability, collaboration, to name a few. The security of the cloud infrastructure entails protecting cloud data from unauthorized access, preventing malicious programs from corrupting the virtual resource and ensuring the secure cloud data remains unintelligible to any unauthorized access or intrusion by malicious users. This paper is aimed at building a cryptographically secure cloud application environment. Its major objective is to design and implement an encryption system for protecting valuable data (such as passwords, messages, files) in the cloud environment. The design and implementation extended some basic security and privacy requirements including data confidentiality, integrity, and availability by considering fairness as a viable factor. This paper employed the Structured Systems Analysis and Design Methodology (SSADM) in the software development life. It evolves a novel cryptographically-secure cloud algorithm based on a proposed "Deciv Algorithm" tagged "D65-Enc" algorithm that would effectively hide meaningful user data from all external parties to a virtual network as well as the service provider by putting control in the hands of users. The algorithm is carefully crafted to frustrate any cryptanalyst, hacker or cybercriminal who would try to decipher the algorithm. This implementation is expected to assist cloud users in maintaining control over their data whether at rest or in transit within the cloud networks rather than outsource control to external vendors as usual. Moreover, this algorithm also improves the existing state of data privacy, and security in the cloud.

Research paper thumbnail of A Study on the Application of Bayesian Learning and Decision Trees IoT-Enabled System in Postharvest Storage

Research paper thumbnail of Nanomaterials: Applications in Biomedicine and Biotechnology

Handbook of Nanomaterials and Nanocomposites for Energy and Environmental Applications, 2021

Nanoparticle synthesis has elicited intense interest within the past decade. Nanoparticle size ra... more Nanoparticle synthesis has elicited intense interest within the past decade. Nanoparticle size ranges from 100 to 500 nm and can be solid particles or colloidal in nature. When this particles size or its surface characteristics are manipulated, they can be developed into imaging agents, encasing therapeutic, or a smart system for use in diverse application. Drug formulations from nanoparticle- based materials have opened up a novel field of research in the treatment and management of challenging diseases. This system can be designed to deliver drug to target tissues as well as provide the controlled release of these drugs. The continual drug delivery to target tissues results in declining drug-related toxicity as well as increasing patient’s compliance with lower doing index. Some illness in which nanotechnology has made positive impact includes AIDS, cancer, and several other related diseases.

Research paper thumbnail of Socio-Technical Perspectives on Cyber Security and Definitions of Digital Transformation – A Literature Review

This paper is an attempt to analyze Nigeria‘s principal cybercrime legislation from social, techn... more This paper is an attempt to analyze Nigeria‘s principal cybercrime legislation from social, technical and legal perspectives in a bid to highlight some perceived gaps, which may hamper the expected goals of the law. An exploratory narrative-textual case study approach is adopted in this paper and emphasis is made on some grey areas identified in the law. The points discussed include the concept of critical national infrastructure vis-à-vis critical infrastructure, and the responsibilities of some vital agencies and ministries. A careful review of the legislation in comparison with international best practices showed some inadequacies owing to supposedly undefined scope of application. Consequent upon the foregoing, this paper concludes that while the principal legislation on cybercrime is praiseworthy, there is need to amend the extant law to provide for a more robust legislation that is both reactionary and effectively proactive in promoting other spheres of cybersecurity.

Research paper thumbnail of Customs Automation: The X-ray and Computerized Risk Management Systems Era

MatSciRN: Other Electronic, 2017

Though established by the promulgation of the Customs and Excise Management Act of 1958, The Nige... more Though established by the promulgation of the Customs and Excise Management Act of 1958, The Nigeria Customs Service (NCS) traces its origin to 1891 when the British colonial administration appointed the first Director-General of Customs, Mr. T.A. Wall. Having operated as a major Government revenue collection agency for decades, the customs formation formally embraced<br>automation in 2006 when the Federal government through the Federal Ministry of Finance entered into a 7-year build-own-operate transfer contract with four private companies to provide computerized risk management system (CRMS) and X-ray cargo scanning services to modernize Customs operations, boost revenue generation, and protect the economy and lives of Nigerians. This paper reviews the state of the journey to automation and the current state of affairs in this very important revenue collection and enforcement agency. We also discussed the problems, challenges, prospects of computerized automation.

Research paper thumbnail of Throughput in Wireless Lan Implications of Some Meteorological Variables in Undulating Landscape

Nigerian Research Journal of Engineering and Environmental Sciences, Dec 30, 2020

Generally, meteorological variables such as relative humidity, temperature and mean sea level pre... more Generally, meteorological variables such as relative humidity, temperature and mean sea level pressure vary from place to place and it has been shown that these natural conditions may exert significant impact on wireless communication. In traditional settings, these variables are not critically analyzed when deploying wireless networks. This paper presents an account on the study of the throughput of wireless local area networks (WLANs) using an extensive campus network located in an undulating topography in a tropical climate in Iyamho, Edo North, South-South of Nigeria. The undulating topography, temperature, relative humidity and mean sea level pressure were evaluated in order to establish their interactions with WLANs. The result shows that the Wi-Fi signals were more affected by distance than by temperature, relative humidity and mean sea level pressure respectively in the absence of other obstacles that might have introduced some interference along the path of the radio signals. Nevertheless, this study confirmed that the throughput is affected by temperature and relative humidity respectively and that along undulating lowlands optimal performances were recorded under lower temperatures, lower relative humidity and higher mean sea level pressure.

Research paper thumbnail of IoT-Driven Bayesian Learning: A Case Study of Reducing Road Accidents of Commercial Vehicles on Highways

Research paper thumbnail of Comparative Performance Analysis of 
Selected Routing Algorithms by Load Variation of 2-Dimensional Mesh Topology Based 
Network-On-Chip

ELEKTRIKA- Journal of Electrical Engineering, 2021

Network-on-Chip (NoC) has been proposed as a viable solution to the communication challenges on S... more Network-on-Chip (NoC) has been proposed as a viable solution to the communication challenges on System-on-Chips (SoCs). As the communication paradigm of SoC, NoCs performance depends mainly on the type of routing algorithm chosen. In this paper different categories of routing algorithms were compared. These include XY routing, OE turn model adaptive routing, DyAD routing and Age-Aware adaptive routing. By varying the load at different Packet Injection Rate (PIR) under random traffic pattern, comparison was conducted using a 4 × 4 mesh topology. The Noxim simulator, a cycle accurate systemC based simulator was employed. The packets were modeled as a Poisson distribution; first-in-first-out (FIFO) input buffer channel with a depth of five (5) flits and a flit size of 32 bits; and a packet size of 3 flits respectively. The simulation time was 10,000 cycles. The findings showed that the XY routing algorithm performed better when the PIR is low. In a similar vein, the DyAD routing and ...

Research paper thumbnail of Knowledge Discovery and Analytics in Process Reengineering: A Study of Port Clearance Processes

2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), 2020

Due to the nature of the transactions involved in imports and the security threats associated wit... more Due to the nature of the transactions involved in imports and the security threats associated with it, most nations have put agencies and machineries in place for regulating and monitoring the flow of trade. The objectives of these agencies include but not restricted to monitoring of trade transactions; revenue generation, facilitation of trade, policy and decision making, etc. Risk management is a major segment of the clearance process at the port and is consistently advocated by the world customs organization (WCO) and the world trade organization (WTO) respectively. In Nigeria, the Nigeria Customs Service (NCS) performs this function with the aid of Automated System for Customs Data (ASYCUDA) first implemented in 2006 during the modernization project of the Federal Government of Nigeria and now modernized as the Nigeria Customs Information System (NICIS). This study reviews the present imports clearance process to identify areas that may be remedied through process re-engineering using analytics. It adopts a hybrid methodology comprising descriptive methods, object-based and knowledge-based modeling with the aim of establishing a reliable model that could be integrated to advance the existing imports process and clearance process. The proposed model uses the k-means algorithm to discover pertinent patterns and trends with respect to areas that need enhancement thus helping the relevant authorities in achieving a competent and effective clearance process driven by knowledge-based process re-engineering.

Research paper thumbnail of Strengthening Private Sector Participation in Public Infrastructure Projects through Concession Policies and Legislations in Nigeria: A Review

ERN: Infrastructure & Public Investment (Topic), 2019

Infrastructure concession connotes an arrangement the organizations from the private sector parti... more Infrastructure concession connotes an arrangement the organizations from the private sector participate in financing public projects such as construction, development, operation, and maintenance or other similar development projects over a defined period based on agreement between government and the private sector organizations(s). The concession legally grants private investors the right to direct its capital to infrastructural development. As a form of public private partnership, concession is governed by public policies. In developed and developing countries alike, the ease of execution of policies guiding concession arrangements, and ultimate goals recorded following implementation may be dependent upon the extant legislative frameworks. In Nigeria, Concession of governement projects has been in practice for over two decades and has in no way prospered compared to other African countries like Ghana and South Africa. Having regard to the foregoing, this paper is an attempt to dra...

Research paper thumbnail of A Model for Implementing Security and Risk Management Data Warehouse for Scanning Operations in Nigeria

International journal of engineering research and technology, 2016

Security is a fundamental constitutional objective of the government in Nigeria. Undermining this... more Security is a fundamental constitutional objective of the government in Nigeria. Undermining this security are the activities of importers who exploit the security loopholes at the ports and borders across Nigeria to bring in dangerous goods such as arms and ammunitions; expired products; and contraband goods. Conducting risk management operations on imports has therefore become a very critical policy across Nigerian ports and border posts not just that the State’s economy depends greatly on imports but that the State is continuously ravaged by serious security threats. In Nigeria, scanning and security risk management providers have been involved over the years to assist the Nigeria Customs Service in detecting and managing risks associated with international trade transactions particularly import transactions. This research is conceived to address the analytical and data consolidation problems arising from the limited automation usually witnessed at the operational ports and borde...

Research paper thumbnail of A Data Warehouse-Based Mining System for Academic Resource Capacity Planning

Cognitive Psychology eJournal, 2016

Academic resource capacity planning is fundamental to the success of every academic program in an... more Academic resource capacity planning is fundamental to the success of every academic program in any institution whether at the primary, secondary or tertiary level. As a matter of fact, academic capacity planning is a continuous process often involving both core academic and non-academic personnel of an Institution. As simple as it may sound, academic capacity planning may make or mar the quality of students trained as well as the reputation of the Institution amongst its peers. This is why it is vital for every academic planner particularly at the department level to carefully consider important indicators such as: course requirements, previous student performances, academic achievements, future goals, etc. during the planning process. This research studies the fundamental processes in selected Institutions of Higher Learning in Nigeria as it affects academic planning specifically during the allocation of courses to academics during each semester and develops a model program based o...

Research paper thumbnail of Nanomaterials and Nanocoatings for Alternative Antimicrobial Therapy

Research paper thumbnail of Climatic Change and Pesticides Usage: A Brief Review of Their Implicative Relationship

Pesticides are very important for the prevention, mitigation, destruction of pests and diseases f... more Pesticides are very important for the prevention, mitigation, destruction of pests and diseases for the improvement of agricultural efficiency due to their contributions to agricultural yields and improving the standard of living. Considering the dynamicity and influence of weather in our everyday lives, it is obvious that the effects of pesticides might also be a contributing factor and vice versa. Climate change could have an influence on both pesticides’ usage, as well as the losses of pesticides to the environment. Presently, the issue of climate change is one of the furthermost intellectual challenging issues facing the entire human race. Therefore, we must continue to protect our environment from these unfavorable effects of climate change by extremely dipping the emissions of greenhouse gases especially via the use of chemical substances such as pesticides. In this review study, we will briefly attempt to give an insight and try to bridge the uncertainty surrounding the effec...

Research paper thumbnail of Document Interchange Modeling with the Zachman Framework: Nigeria’s Institutions in Perspective

This paper is part of a study aimed at evolving a platform-independent distributed document inter... more This paper is part of a study aimed at evolving a platform-independent distributed document interchange system to ease the challenges associated with the information flow cycle between Institutions of higher learning and their prospective candidates especially during verifying and validating academic documents submitted to such Institutions by the candidates. The first part was the proposition of an interchange framework wherein the basic foundations and principles of document exchange were laid down. This study exploits the Zachman framework for Enterprise and Information Systems Architecture. The proposed model ensures that each Institution could implement its information system in such a way that it could exchange requests and verification information directly with a system owned or managed by another institution over a public network such as the Internet with little or no involvement on the part of the candidates. The model is cost-effective and sustainable in the Nigerian envir...

Research paper thumbnail of A Fuzzy Prototype Solution for Website Quality Assurance

Internet has become ubiquitous and organizations have moved from the traditional storage using ph... more Internet has become ubiquitous and organizations have moved from the traditional storage using physical files localized in cabinets to online remote storage accessible over websites. Over the years, different website evaluation tools have been developed to assist web administrators with website maintenance functions. Prior to a proper website assessment using majority of such tools, the web administrator would have to access each one differently reasons being that each tool is developed to measure different quality parameters. Later, Fuzz-web was developed to capture more parameters but with a limitation wherein the system depends on some of the evaluation tools for inputs, the implication being that where such tools are not available there will be an express failure of fuzz-web. To overcome the foregoing problems, this paper is aimed at developing a Fuzzy-Based Website Quality Assurance System. It employs fuzzy logic principles, exploiting the inherent power of the Java programming...

Research paper thumbnail of The Urban Traffic Congestion Problem In Benin City And The Search For An ICT-Improved Solution

Many hours are wasted often due to the intense traffic congestion on roads in highly populated ci... more Many hours are wasted often due to the intense traffic congestion on roads in highly populated cities with resultant loss of labour productivity. The reason is that while road infrastructure follows an arithmetic progression and often fixed in developed cities, population and road usage patterns follow a geometric progression. In Nigeria, as well other countries with huge road usage, traffic management is a critical challenge to the Government and traffic managers alike. Traffic officers complemented with time-based traffic control infrastructure have remained commonplace. A lot had been done on traffic control systems especially in high traffic density-prone cities. Many studies had proposed the use of sensor arrays. This study is centred around Benin City, the sixth largest city in Nigeria with its unique geography and socio-economic characteristics. In this paper, traffic management challenges are addressed through an improved model and with regard to the existing infrastructure ...

Research paper thumbnail of The Role of Public-Private Partnership on the Implementation of National Cybersecurity Policies: A Case of Nigeria

Compared to other components of the Cyberspace, Cybersecurity is emerging the most prominent doma... more Compared to other components of the Cyberspace, Cybersecurity is emerging the most prominent domain of concern. The reason may not be unconnected with the geometric growth in in the evolution of new computer-based technologies by the day and the deployment of such technologies for both positive and negative purposes. There are four major areas where Cybersecurity programmes are massively ongoing: Technology Products, Research, Education, and Business enterprises. These four areas are unarguably very vital and affect the socioeconomic development of any society. E-commerce and other sensitive socioeconomic ventures are growing but are markedly deterred by security concerns in the Cyberspace. Having regard to the foregoing, this paper examines the ongoing Cybersecurity developments in Nigeria especially as it affects the sectors under review. The argument is that there have not been a significant synergy between the two sectors in promoting Cybersecurity development in Nigeria hence the terrifying spate of cybercrimes amidst the Cybercrime prevention and prohibition laws. We submit that a mutual front propelled by Public Private Partnership (PPP) would go a long way to reducing the spate of these crimes in the cyberspace thus promoting socioeconomic development in Nigeria and the sub region. It is also submitted that with the involvement of public and private sectors, the legal frameworks for combating cybercrimes would be enhanced further through the use of joint socio-technical approaches.

Research paper thumbnail of Evolving Effective Healthcare System through Public Private Partnership

This paper reviews the state of Public Healthcare Infrastructure in Nigeria and the potentiality ... more This paper reviews the state of Public Healthcare Infrastructure in Nigeria and the potentiality of PUBLIC PRIVATE PARTNERSHIP as a financing model towards resuscitating the Healthcare delivery system. First, we reviewed vital documents on Healthcare delivery and Public Private Partnership(PPP) models of delivering public infrastructure projects. The provisions of the National Health Act 2014, the Infrastructure Concession and Regulatory Commission (establishment) Act 2005, and the National Health Policy were examined respectively. The review showed that poor healthcare infrastructure had persisted over decades owing to neglect, poor government funding and a myriad of other factors. Accordingly, having regard to health financing, we examined all PPP-based healthcare projects visa -vis that in other segments of the economy. Though the PPP model appears to be a more prospective model for healthcare infrastructure procurement it is yet to be exploited by the public authorities. Our findings showed that Nigeria has the potential to enthrone effective and efficient healthcare delivery through the PPP platform.

Research paper thumbnail of Biobutanol: A Promising Alternative Commercial Biofuel

Handbook of Nanomaterials and Nanocomposites for Energy and Environmental Applications, 2020

Research paper thumbnail of Security of Cloud Virtualized Resource on a SaaS Encryption Solution

Science Journal of Energy Engineering, 2018

Protection of user data against data breaches in cloud applications and the potential security fa... more Protection of user data against data breaches in cloud applications and the potential security failures of the service providers coupled with heightened cloud user apprehension, have in no small degree defied measures taken to demystify cloud services as to unveil its enormous capacity and awesome benefits such as accessibility, availability, collaboration, to name a few. The security of the cloud infrastructure entails protecting cloud data from unauthorized access, preventing malicious programs from corrupting the virtual resource and ensuring the secure cloud data remains unintelligible to any unauthorized access or intrusion by malicious users. This paper is aimed at building a cryptographically secure cloud application environment. Its major objective is to design and implement an encryption system for protecting valuable data (such as passwords, messages, files) in the cloud environment. The design and implementation extended some basic security and privacy requirements including data confidentiality, integrity, and availability by considering fairness as a viable factor. This paper employed the Structured Systems Analysis and Design Methodology (SSADM) in the software development life. It evolves a novel cryptographically-secure cloud algorithm based on a proposed "Deciv Algorithm" tagged "D65-Enc" algorithm that would effectively hide meaningful user data from all external parties to a virtual network as well as the service provider by putting control in the hands of users. The algorithm is carefully crafted to frustrate any cryptanalyst, hacker or cybercriminal who would try to decipher the algorithm. This implementation is expected to assist cloud users in maintaining control over their data whether at rest or in transit within the cloud networks rather than outsource control to external vendors as usual. Moreover, this algorithm also improves the existing state of data privacy, and security in the cloud.

Research paper thumbnail of A Study on the Application of Bayesian Learning and Decision Trees IoT-Enabled System in Postharvest Storage

Research paper thumbnail of Nanomaterials: Applications in Biomedicine and Biotechnology

Handbook of Nanomaterials and Nanocomposites for Energy and Environmental Applications, 2021

Nanoparticle synthesis has elicited intense interest within the past decade. Nanoparticle size ra... more Nanoparticle synthesis has elicited intense interest within the past decade. Nanoparticle size ranges from 100 to 500 nm and can be solid particles or colloidal in nature. When this particles size or its surface characteristics are manipulated, they can be developed into imaging agents, encasing therapeutic, or a smart system for use in diverse application. Drug formulations from nanoparticle- based materials have opened up a novel field of research in the treatment and management of challenging diseases. This system can be designed to deliver drug to target tissues as well as provide the controlled release of these drugs. The continual drug delivery to target tissues results in declining drug-related toxicity as well as increasing patient’s compliance with lower doing index. Some illness in which nanotechnology has made positive impact includes AIDS, cancer, and several other related diseases.

Research paper thumbnail of Socio-Technical Perspectives on Cyber Security and Definitions of Digital Transformation – A Literature Review

This paper is an attempt to analyze Nigeria‘s principal cybercrime legislation from social, techn... more This paper is an attempt to analyze Nigeria‘s principal cybercrime legislation from social, technical and legal perspectives in a bid to highlight some perceived gaps, which may hamper the expected goals of the law. An exploratory narrative-textual case study approach is adopted in this paper and emphasis is made on some grey areas identified in the law. The points discussed include the concept of critical national infrastructure vis-à-vis critical infrastructure, and the responsibilities of some vital agencies and ministries. A careful review of the legislation in comparison with international best practices showed some inadequacies owing to supposedly undefined scope of application. Consequent upon the foregoing, this paper concludes that while the principal legislation on cybercrime is praiseworthy, there is need to amend the extant law to provide for a more robust legislation that is both reactionary and effectively proactive in promoting other spheres of cybersecurity.

Research paper thumbnail of Customs Automation: The X-ray and Computerized Risk Management Systems Era

MatSciRN: Other Electronic, 2017

Though established by the promulgation of the Customs and Excise Management Act of 1958, The Nige... more Though established by the promulgation of the Customs and Excise Management Act of 1958, The Nigeria Customs Service (NCS) traces its origin to 1891 when the British colonial administration appointed the first Director-General of Customs, Mr. T.A. Wall. Having operated as a major Government revenue collection agency for decades, the customs formation formally embraced<br>automation in 2006 when the Federal government through the Federal Ministry of Finance entered into a 7-year build-own-operate transfer contract with four private companies to provide computerized risk management system (CRMS) and X-ray cargo scanning services to modernize Customs operations, boost revenue generation, and protect the economy and lives of Nigerians. This paper reviews the state of the journey to automation and the current state of affairs in this very important revenue collection and enforcement agency. We also discussed the problems, challenges, prospects of computerized automation.