Mubarak Albarka Umar | UAE University (original) (raw)

Papers by Mubarak Albarka Umar

Research paper thumbnail of Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

One of the key challenges of the machine learning (ML) based intrusion detection system (IDS) is ... more One of the key challenges of the machine learning (ML) based intrusion detection system (IDS) is the expensive computation time which is largely caused by the redundant, incomplete, and unrelated features contain in the IDS datasets. To overcome such challenges and ensure building efficient and more accurate IDS models, many researchers utilize preprocessing techniques such as normalization and feature selection, and a hybrid modeling approach is typically used. In this work, we propose a hybrid IDS modeling approach with an algorithm for feature selection (FS) and another for building the IDS. The FS method is a wrapper-based FS with a decision tree as the feature evaluator. Five selected ML algorithms are individually used in combination with the proposed FS method to build five IDS models using the UNSW-NB15 dataset. As a baseline, five more IDS models are built, in a single modeling approach, using the full features of the datasets. We evaluate the effectiveness of our proposed method by comparing it with the baseline models and also with state-of-the-art works. Our method achieves the best DR of 97.95% and proved to be quite effective in comparison to state-of-the-art works. We, therefore, recommend its usage especially in IDS modeling with the UNSW-NB15 dataset.

Research paper thumbnail of A Time Series Regression-based Model for Predicting the Spread of Dengue Disease

2023 International Conference on Robotics and Automation in Industry (ICRAI)

Research paper thumbnail of Analysis and Design of Fire Emergency Application (Feap)

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping the public with a means of reporting fire incidents to ensure prompt response and proper management of the incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated FEAP – a mobile application, to enable the public to quickly alert nearest fire emergency units of any possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC) phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical User Interface (GUI) prototype of the proposed application was...

Research paper thumbnail of Fighting Crime and Insecurity in Nigeria: An Intelligent Approach

Over the years, insecurity and crime have been significant issues in Nigeria. While the country s... more Over the years, insecurity and crime have been significant issues in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reasons, mainly the use of the same outdated, futile strategy. Several researchers have proposed numerous ways of tackling such insecurity challenges, mostly via a conventional approach; however, very few researchers proposed a more technological approach towards combating the insecurity challenges. In this paper, we discussed some modern technologies and how they can be applied to fight the new insecurities and crimes in Nigeria. We proposed the use of a Central Database as a backbone model serving as a central point of reference for all law enforcement agencies. Various modern technologies such as Facial recognition surveillance, Automatic p...

Research paper thumbnail of Web Load Balancing Method Based On Resource Request Division

The main function of WEB load balancing is to receive requests sent from clients, and then dynami... more The main function of WEB load balancing is to receive requests sent from clients, and then dynamically allocate requests to the available nodes in the backend. The resources of the backend node server are called according to the rules and policies of the load balancer. Comparing functions, the static load balancing algorithm is an important part of the load balancing algorithm. The characteristics are that the system consumes less resources and is easier to implement. The principle of the static load balancing algorithm is easy to understand, simple to implement, and distributes requests in random and polling. The randomness cannot be predicted, resulting in poor load balancing effect, and the polling regularity is too strong to achieve the corresponding load balancing effect. In response to the above problems, this chapter mainly classifies the received HTTP requests to optimize the load balancing algorithm. A WEB load balancing algorithm based on resource request division is proposed. The request resources are divided into static request resources and dynamic request resources, and the static request resources are cached in memory to improve access efficiency.

Research paper thumbnail of A Study of Software Testing: Categories, Levels, Techniques, and Types

Software Testing is the process of evaluating a software program to ensure that it performs its i... more Software Testing is the process of evaluating a software program to ensure that it performs its intended purpose. Software testing verifies the safety, reliability, and correct working of software. The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many methods of testing software, however, the choice of method to test a given software remains a major problem in software testing. Although, it is often impossible to find all errors in software, employing the right combination of methods will make software testing efficient and successful. Knowing these software testing methods is the key to making the right selection. This paper presents a comprehensive study of software testing methods. An explanation of Testing Categories was presented first, followed by Testing Levels (and their comparison), then Testing Techniques (and their comparison). For each Testing Levels and Testing Techniques, examples of some testing ...

Research paper thumbnail of Effects of Feature Selection and Normalization on Network Intrusion Detection

The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approac... more The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using Machine Learning (ML) techniques to build more efficient and reliable Intrusion Detection Systems (IDSs). However, the advent of larger IDS datasets has negatively impacted the performance and computational complexity of ML-based IDSs. Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues. While most of these researchers reported the success of these preprocessing techniques on a shallow level, very few studies have been performed on their effects on a wider scale. Furthermore, the performance of an IDS model is subject to not only the utilized preprocessing techniques but also the dataset and the ML algorithm used, which most of the existing studies give little emphasis on. Thus, this study provides an in-depth analysis of feature selection and normalization effects on various IDS models built using two IDS datasets namely, NSL-KDD and UNSW-NB15, and five different ML algorithms. The algorithms are support vector machine, k-nearest neighbor, random forest, naive bayes, and artificial neural network. For feature selection and normalization, the decision tree wrapper-based approach, which tends to give superior model performance, and min-max normalization methods were respectively used. A total of 30 unique IDS models were implemented using the full and feature-selected copy of the datasets. The models were evaluated using popular evaluation metrics in IDS modeling, intra- and inter-model comparisons were performed between models and with state-of-the-art works. Random forest achieved the best performance on both NSL-KDD and UNSW-NB15 datasets with prediction accuracies of 99.87% and 98.5%, as well as detection rates of 99.79% and 99.17% respectively, it also achieved an excellent performance in comparison with the recent works. The results show that both normalization and feature selection positively affect IDS modeling with normalization slightly more important. The study also found that the UNSW-NB15 dataset is more complex and more suitable for building and evaluating modern-day IDS than NSL-KDD.

Research paper thumbnail of A Study of Automated Software Testing: Automation Tools and Frameworks

The growing demand for delivering quality software faster "Quality at Speed" requires f... more The growing demand for delivering quality software faster "Quality at Speed" requires faster and successful execution of software testing to ensure its standard. Utilizing appropriate testing method(s) and right test automation tools/framework are two defining factors for a successful and effective software testing project. Using one testing method will not be sufficient to test software and ensure its standard, a combination of some appropriate testing techniques is often required. Likewise, is no one tool that can satisfy all automated testing needs which makes finding the right tool combination difficult. Knowing the various testing methods and tools/frameworks are the first steps towards achieving a successful and efficient software testing. This article presents a comprehensive study of test automation tools and frameworks. Firstly, automated testing and their categories are explained, followed by an explanation of the various test automation frameworks. Finally, a br...

Research paper thumbnail of Analysis and Design of Fire Emergency Application (Feap)

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping the public with a means of reporting fire incidents to ensure prompt response and proper management of the incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated FEAP – a mobile application, to enable the public to quickly alert nearest fire emergency units of any possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC) phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical User Interface (GUI) prototype of the proposed application was...

Research paper thumbnail of A Hybrid Intrusion Detection with Decision Tree for Feature Selection

Information & Security: An International Journal

Due to the size and nature of intrusion detection datasets, intrusion detection systems (IDS) typ... more Due to the size and nature of intrusion detection datasets, intrusion detection systems (IDS) typically take high computational complexity to examine features of data and identify intrusive patterns. Data preprocessing techniques such as feature selection can be used to reduce such complexity by eliminating irrelevant and redundant features in the dataset. The objective of this study is to analyze the efficiency and effectiveness of some feature selection approaches namely, a wrapper-based and filter-based modeling approaches. To achieve that, a hybrid of feature selection algorithm in combination with wrapper and filter selection processes is designed. We propose a wrapper-based hybrid intrusion detection modeling with a decision tree algorithm to guide the selection process. Five machine learning algorithms are used on the wrapper and filter-based feature selection methods to build IDS models using the UNSW-NB15 dataset. The three filter-based methods namely, information gain, gain ratio, and relief are used for comparison to determine the efficiency and effectiveness of the proposed approach. Furthermore, a fair comparison with other state-of-the-art intrusion detection approaches is also performed. The experimental results show that our approach is quite effective in comparison to state-of-the-art works, however, it takes high computational time in comparison to the filter-based methods whilst achieves similar results. Our work also revealed unobserved issues about the conformity of the UNSW-NB15 dataset.

Research paper thumbnail of Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering

Research paper thumbnail of A Comparative Study Of Dynamic Software Testing Techniques

International Journal of Advanced Networking and Applications

The growing need for quality software makes software testing a crucial stage in Software Developm... more The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many techniques of testing software, however, the choice of a technique to test a given software remains a major problem. Although, it is impossible to find all errors in software, selecting the right testing technique can determine the success or failure of a software testing project. Knowing these software testing techniques and their classification is a vital key in selecting the right technique(s). Software testing can broadly be classified as static or dynamic, this paper presents a broad comparative study of the various dynamic software testing techniques. An explanation of the dynamic testing techniques, their advantages and disadvantages, as well as some of the commonly used types of testing under each technique are presented. Finally, a comparison of the dynamic testing techniques is also made to enable a clear and definite understanding of the techniques for the betterment of testing and subsequent improvement in software quality.

Research paper thumbnail of International Journal of Computer Engineering in Research Trends Multidisciplinary, Open Access, Peer-Reviewed and fully refereed

Over the years, insecurity and crime have been a significant issue in Nigeria. While the country ... more Over the years, insecurity and crime have been a significant issue in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reasons, mainly the use of the same outdated, futile strategy. Several researchers have proposed numerous ways of tackling such insecurity challenges, mostly via a conventional approach; however, very few researchers proposed a more technological approach towards combating the insecurity challenges. In this paper, we discussed some modern technologies and how they can be applied to fight the new insecurities and crimes in Nigeria. We proposed the use of a Central Database as a backbone model serving as a central point of reference for all law enforcement agencies. Various modern technologies such as Facial recognition surveillance, Automatic plate number recognition, GIS and Crime Mapping, and Voice recognition are proposed to be integrated and used to identify and predict criminal activities, thus, mitigating the nation's prolonged insecurity and terrorism vulnerabilities.

Research paper thumbnail of Fighting Crime and Insecurity in Nigeria: An Intelligent Approach

Over the years, insecurity and crime have been a significant issue in Nigeria. While the country ... more Over the years, insecurity and crime have been a significant issue in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reasons, mainly the use of the same outdated, futile strategy. Several researchers have proposed numerous ways of tackling such insecurity challenges, mostly via a conventional approach; however, very few researchers proposed a more technological approach towards combating the insecurity challenges. In this paper, we discussed some modern technologies and how they can be applied to fight the new insecurities and crimes in Nigeria. We proposed the use of a Central Database as a backbone model serving as a central point of reference for all law enforcement agencies. Various modern technologies such as Facial recognition surveillance, Automatic plate number recognition, GIS and Crime Mapping, and Voice recognition are proposed to be integrated and used to identify and predict criminal activities, thus, mitigating the nation's prolonged insecurity and terrorism vulnerabilities.

Research paper thumbnail of Web Load Balancing Method Based On Resource Request Division

The main function of WEB load balancing is to receive requests sent from clients, and then dynami... more The main function of WEB load balancing is to receive requests sent from clients, and then dynamically allocate requests to the available nodes in the backend. The resources of the backend node server are called according to the rules and policies of the load balancer. Comparing functions, the static load balancing algorithm is an important part of the load balancing algorithm. The characteristics are that the system consumes less resources and is easier to implement. The principle of the static load balancing algorithm is easy to understand, simple to implement, and distributes requests in random and polling. The randomness cannot be predicted, resulting in poor load balancing effect, and the polling regularity is too strong to achieve the corresponding load balancing effect. In response to the above problems, this chapter mainly classifies the received HTTP requests to optimize the load balancing algorithm . A WEB load balancing algorithm based on resource request division is proposed. The request resources are divided into static request resources and dynamic request resources, and the static request resources are cached in memory to improve access efficiency.

Research paper thumbnail of ANALYSIS AND DESIGN OF FIRE EMERGENCY APPLICATION (FEAP)

IJCSMC, 2020

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire
outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and
convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping
the public with a means of reporting fire incidents to ensure prompt response and proper management of the
incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated
FEAP – a mobile application, to enable the public to quickly alert nearest fire emergency units of any
possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC)
phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the
application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical
User Interface (GUI) prototype of the proposed application was designed. Our work highlights a practical
application of analysis and design concepts in developing a software to providing an efficient solution in
reporting fire outbreaks.

Research paper thumbnail of Analysis and Design of Fire Emergency Application (FEAP)

International Journal of Computer Science and Mobile Computing (IJCSMC), 2020

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping the public with a means of reporting fire incidents to ensure prompt response and proper management of the incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated FEAP-a mobile application, to enable the public to quickly alert nearest fire emergency units of any possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC) phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical User Interface (GUI) prototype of the proposed application was designed. Our work highlights a practical application of analysis and design concepts in developing software to provide an efficient solution in reporting fire outbreaks.

Research paper thumbnail of A Study of Automated Software Testing: Automation Tools and Frameworks

International Journal of Computer Science Engineering (IJCSE), 2019

The growing demand for delivering quality software faster "Quality at Speed" requires faster and ... more The growing demand for delivering quality software faster "Quality at Speed" requires faster and successful execution of software testing to ensure its standard. Utilizing appropriate testing method(s) and right test automation tools/framework are two defining factors for a successful and effective software testing project. Using one testing method will not be sufficient to test software and ensure its standard, a combination of some appropriate testing techniques is often required. Likewise, is no one tool that can satisfy all automated testing needs which makes finding the right tool combination difficult. Knowing the various testing methods and tools/frameworks is the first step towards achieving a successful and efficient software testing. This article presents a comprehensive study of test automation tools and frameworks. Firstly, automated testing and their categories were explained, followed by an explanation of the various test automation frameworks. Finally, a brief explanation and comparison of some of the most commonly used automation tools was presented.

Research paper thumbnail of Comprehensive study of software testing: Categories, levels, techniques, and types

International Journal of Advance Research, Ideas and Innovations in Technology, 2019

Software Testing is the process of evaluating a software program to ensure that it performs its i... more Software Testing is the process of evaluating a software program to ensure that it performs its intended purpose. Software testing verifies the safety, reliability, and correct working of the software. The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many methods of testing software, however, the choice of method to test a given software remains a major problem in software testing. Although, it is often impossible to find all errors in software, employing right combination of methods will make software testing efficient and successful. Knowing these software testing methods is the key to making right selection. This paper presents a comprehensive study of software testing methods. An explanation of Testing Categories was presented first, followed by Testing Levels (and their comparison), then Testing Techniques (and their comparison). For each Testing Levels and Testing Techniques, examples of some testing types and their pros and cons were given with a brief explanation of some of the important testing types. Furthermore, a clear and distinguishable explanation of two confused and contradictory terms (Verification and Validation) and how they relate to Software Quality was provided.

Research paper thumbnail of Student Academic Performance Prediction using Artificial Neural Networks: A Case Study

International Journal of Computer Applications, Sep 18, 2019

Students dropout and delay in graduation are significant problems at Katsina State Institute of T... more Students dropout and delay in graduation are significant problems at Katsina State Institute of Technology and Management (KSITM). There are various reasons for that, students' performances during first year is one of the major contributing factors. This study aims at predicting poor students' performances that might lead to dropout or delay in graduation so as to allow the institution to develop strategic programs that will help improve student performance and enable the student to graduate in time without any problem. This study presents a neural network model capable of predicting student's GPA using students' personal information, academic information, and place of residence. A sample of 61 Computer Networking students' dataset was used to train and test the model in WEKA software tool. The accuracy of the model was measured using well-known evaluation criteria. The model correctly predicts 73.68% of students' performance and, specifically, 66.67% of students that are likely to dropout or experience delay before graduating.

Research paper thumbnail of Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

One of the key challenges of the machine learning (ML) based intrusion detection system (IDS) is ... more One of the key challenges of the machine learning (ML) based intrusion detection system (IDS) is the expensive computation time which is largely caused by the redundant, incomplete, and unrelated features contain in the IDS datasets. To overcome such challenges and ensure building efficient and more accurate IDS models, many researchers utilize preprocessing techniques such as normalization and feature selection, and a hybrid modeling approach is typically used. In this work, we propose a hybrid IDS modeling approach with an algorithm for feature selection (FS) and another for building the IDS. The FS method is a wrapper-based FS with a decision tree as the feature evaluator. Five selected ML algorithms are individually used in combination with the proposed FS method to build five IDS models using the UNSW-NB15 dataset. As a baseline, five more IDS models are built, in a single modeling approach, using the full features of the datasets. We evaluate the effectiveness of our proposed method by comparing it with the baseline models and also with state-of-the-art works. Our method achieves the best DR of 97.95% and proved to be quite effective in comparison to state-of-the-art works. We, therefore, recommend its usage especially in IDS modeling with the UNSW-NB15 dataset.

Research paper thumbnail of A Time Series Regression-based Model for Predicting the Spread of Dengue Disease

2023 International Conference on Robotics and Automation in Industry (ICRAI)

Research paper thumbnail of Analysis and Design of Fire Emergency Application (Feap)

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping the public with a means of reporting fire incidents to ensure prompt response and proper management of the incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated FEAP – a mobile application, to enable the public to quickly alert nearest fire emergency units of any possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC) phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical User Interface (GUI) prototype of the proposed application was...

Research paper thumbnail of Fighting Crime and Insecurity in Nigeria: An Intelligent Approach

Over the years, insecurity and crime have been significant issues in Nigeria. While the country s... more Over the years, insecurity and crime have been significant issues in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reasons, mainly the use of the same outdated, futile strategy. Several researchers have proposed numerous ways of tackling such insecurity challenges, mostly via a conventional approach; however, very few researchers proposed a more technological approach towards combating the insecurity challenges. In this paper, we discussed some modern technologies and how they can be applied to fight the new insecurities and crimes in Nigeria. We proposed the use of a Central Database as a backbone model serving as a central point of reference for all law enforcement agencies. Various modern technologies such as Facial recognition surveillance, Automatic p...

Research paper thumbnail of Web Load Balancing Method Based On Resource Request Division

The main function of WEB load balancing is to receive requests sent from clients, and then dynami... more The main function of WEB load balancing is to receive requests sent from clients, and then dynamically allocate requests to the available nodes in the backend. The resources of the backend node server are called according to the rules and policies of the load balancer. Comparing functions, the static load balancing algorithm is an important part of the load balancing algorithm. The characteristics are that the system consumes less resources and is easier to implement. The principle of the static load balancing algorithm is easy to understand, simple to implement, and distributes requests in random and polling. The randomness cannot be predicted, resulting in poor load balancing effect, and the polling regularity is too strong to achieve the corresponding load balancing effect. In response to the above problems, this chapter mainly classifies the received HTTP requests to optimize the load balancing algorithm. A WEB load balancing algorithm based on resource request division is proposed. The request resources are divided into static request resources and dynamic request resources, and the static request resources are cached in memory to improve access efficiency.

Research paper thumbnail of A Study of Software Testing: Categories, Levels, Techniques, and Types

Software Testing is the process of evaluating a software program to ensure that it performs its i... more Software Testing is the process of evaluating a software program to ensure that it performs its intended purpose. Software testing verifies the safety, reliability, and correct working of software. The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many methods of testing software, however, the choice of method to test a given software remains a major problem in software testing. Although, it is often impossible to find all errors in software, employing the right combination of methods will make software testing efficient and successful. Knowing these software testing methods is the key to making the right selection. This paper presents a comprehensive study of software testing methods. An explanation of Testing Categories was presented first, followed by Testing Levels (and their comparison), then Testing Techniques (and their comparison). For each Testing Levels and Testing Techniques, examples of some testing ...

Research paper thumbnail of Effects of Feature Selection and Normalization on Network Intrusion Detection

The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approac... more The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using Machine Learning (ML) techniques to build more efficient and reliable Intrusion Detection Systems (IDSs). However, the advent of larger IDS datasets has negatively impacted the performance and computational complexity of ML-based IDSs. Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues. While most of these researchers reported the success of these preprocessing techniques on a shallow level, very few studies have been performed on their effects on a wider scale. Furthermore, the performance of an IDS model is subject to not only the utilized preprocessing techniques but also the dataset and the ML algorithm used, which most of the existing studies give little emphasis on. Thus, this study provides an in-depth analysis of feature selection and normalization effects on various IDS models built using two IDS datasets namely, NSL-KDD and UNSW-NB15, and five different ML algorithms. The algorithms are support vector machine, k-nearest neighbor, random forest, naive bayes, and artificial neural network. For feature selection and normalization, the decision tree wrapper-based approach, which tends to give superior model performance, and min-max normalization methods were respectively used. A total of 30 unique IDS models were implemented using the full and feature-selected copy of the datasets. The models were evaluated using popular evaluation metrics in IDS modeling, intra- and inter-model comparisons were performed between models and with state-of-the-art works. Random forest achieved the best performance on both NSL-KDD and UNSW-NB15 datasets with prediction accuracies of 99.87% and 98.5%, as well as detection rates of 99.79% and 99.17% respectively, it also achieved an excellent performance in comparison with the recent works. The results show that both normalization and feature selection positively affect IDS modeling with normalization slightly more important. The study also found that the UNSW-NB15 dataset is more complex and more suitable for building and evaluating modern-day IDS than NSL-KDD.

Research paper thumbnail of A Study of Automated Software Testing: Automation Tools and Frameworks

The growing demand for delivering quality software faster "Quality at Speed" requires f... more The growing demand for delivering quality software faster "Quality at Speed" requires faster and successful execution of software testing to ensure its standard. Utilizing appropriate testing method(s) and right test automation tools/framework are two defining factors for a successful and effective software testing project. Using one testing method will not be sufficient to test software and ensure its standard, a combination of some appropriate testing techniques is often required. Likewise, is no one tool that can satisfy all automated testing needs which makes finding the right tool combination difficult. Knowing the various testing methods and tools/frameworks are the first steps towards achieving a successful and efficient software testing. This article presents a comprehensive study of test automation tools and frameworks. Firstly, automated testing and their categories are explained, followed by an explanation of the various test automation frameworks. Finally, a br...

Research paper thumbnail of Analysis and Design of Fire Emergency Application (Feap)

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping the public with a means of reporting fire incidents to ensure prompt response and proper management of the incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated FEAP – a mobile application, to enable the public to quickly alert nearest fire emergency units of any possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC) phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical User Interface (GUI) prototype of the proposed application was...

Research paper thumbnail of A Hybrid Intrusion Detection with Decision Tree for Feature Selection

Information & Security: An International Journal

Due to the size and nature of intrusion detection datasets, intrusion detection systems (IDS) typ... more Due to the size and nature of intrusion detection datasets, intrusion detection systems (IDS) typically take high computational complexity to examine features of data and identify intrusive patterns. Data preprocessing techniques such as feature selection can be used to reduce such complexity by eliminating irrelevant and redundant features in the dataset. The objective of this study is to analyze the efficiency and effectiveness of some feature selection approaches namely, a wrapper-based and filter-based modeling approaches. To achieve that, a hybrid of feature selection algorithm in combination with wrapper and filter selection processes is designed. We propose a wrapper-based hybrid intrusion detection modeling with a decision tree algorithm to guide the selection process. Five machine learning algorithms are used on the wrapper and filter-based feature selection methods to build IDS models using the UNSW-NB15 dataset. The three filter-based methods namely, information gain, gain ratio, and relief are used for comparison to determine the efficiency and effectiveness of the proposed approach. Furthermore, a fair comparison with other state-of-the-art intrusion detection approaches is also performed. The experimental results show that our approach is quite effective in comparison to state-of-the-art works, however, it takes high computational time in comparison to the filter-based methods whilst achieves similar results. Our work also revealed unobserved issues about the conformity of the UNSW-NB15 dataset.

Research paper thumbnail of Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering

Research paper thumbnail of A Comparative Study Of Dynamic Software Testing Techniques

International Journal of Advanced Networking and Applications

The growing need for quality software makes software testing a crucial stage in Software Developm... more The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many techniques of testing software, however, the choice of a technique to test a given software remains a major problem. Although, it is impossible to find all errors in software, selecting the right testing technique can determine the success or failure of a software testing project. Knowing these software testing techniques and their classification is a vital key in selecting the right technique(s). Software testing can broadly be classified as static or dynamic, this paper presents a broad comparative study of the various dynamic software testing techniques. An explanation of the dynamic testing techniques, their advantages and disadvantages, as well as some of the commonly used types of testing under each technique are presented. Finally, a comparison of the dynamic testing techniques is also made to enable a clear and definite understanding of the techniques for the betterment of testing and subsequent improvement in software quality.

Research paper thumbnail of International Journal of Computer Engineering in Research Trends Multidisciplinary, Open Access, Peer-Reviewed and fully refereed

Over the years, insecurity and crime have been a significant issue in Nigeria. While the country ... more Over the years, insecurity and crime have been a significant issue in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reasons, mainly the use of the same outdated, futile strategy. Several researchers have proposed numerous ways of tackling such insecurity challenges, mostly via a conventional approach; however, very few researchers proposed a more technological approach towards combating the insecurity challenges. In this paper, we discussed some modern technologies and how they can be applied to fight the new insecurities and crimes in Nigeria. We proposed the use of a Central Database as a backbone model serving as a central point of reference for all law enforcement agencies. Various modern technologies such as Facial recognition surveillance, Automatic plate number recognition, GIS and Crime Mapping, and Voice recognition are proposed to be integrated and used to identify and predict criminal activities, thus, mitigating the nation's prolonged insecurity and terrorism vulnerabilities.

Research paper thumbnail of Fighting Crime and Insecurity in Nigeria: An Intelligent Approach

Over the years, insecurity and crime have been a significant issue in Nigeria. While the country ... more Over the years, insecurity and crime have been a significant issue in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reasons, mainly the use of the same outdated, futile strategy. Several researchers have proposed numerous ways of tackling such insecurity challenges, mostly via a conventional approach; however, very few researchers proposed a more technological approach towards combating the insecurity challenges. In this paper, we discussed some modern technologies and how they can be applied to fight the new insecurities and crimes in Nigeria. We proposed the use of a Central Database as a backbone model serving as a central point of reference for all law enforcement agencies. Various modern technologies such as Facial recognition surveillance, Automatic plate number recognition, GIS and Crime Mapping, and Voice recognition are proposed to be integrated and used to identify and predict criminal activities, thus, mitigating the nation's prolonged insecurity and terrorism vulnerabilities.

Research paper thumbnail of Web Load Balancing Method Based On Resource Request Division

The main function of WEB load balancing is to receive requests sent from clients, and then dynami... more The main function of WEB load balancing is to receive requests sent from clients, and then dynamically allocate requests to the available nodes in the backend. The resources of the backend node server are called according to the rules and policies of the load balancer. Comparing functions, the static load balancing algorithm is an important part of the load balancing algorithm. The characteristics are that the system consumes less resources and is easier to implement. The principle of the static load balancing algorithm is easy to understand, simple to implement, and distributes requests in random and polling. The randomness cannot be predicted, resulting in poor load balancing effect, and the polling regularity is too strong to achieve the corresponding load balancing effect. In response to the above problems, this chapter mainly classifies the received HTTP requests to optimize the load balancing algorithm . A WEB load balancing algorithm based on resource request division is proposed. The request resources are divided into static request resources and dynamic request resources, and the static request resources are cached in memory to improve access efficiency.

Research paper thumbnail of ANALYSIS AND DESIGN OF FIRE EMERGENCY APPLICATION (FEAP)

IJCSMC, 2020

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire
outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and
convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping
the public with a means of reporting fire incidents to ensure prompt response and proper management of the
incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated
FEAP – a mobile application, to enable the public to quickly alert nearest fire emergency units of any
possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC)
phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the
application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical
User Interface (GUI) prototype of the proposed application was designed. Our work highlights a practical
application of analysis and design concepts in developing a software to providing an efficient solution in
reporting fire outbreaks.

Research paper thumbnail of Analysis and Design of Fire Emergency Application (FEAP)

International Journal of Computer Science and Mobile Computing (IJCSMC), 2020

Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire o... more Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire incidents. The growing usage of smartphones provides a way of equipping the public with a means of reporting fire incidents to ensure prompt response and proper management of the incidents. In this paper, we analyze the manual process of reporting fire outbreaks and design an automated FEAP-a mobile application, to enable the public to quickly alert nearest fire emergency units of any possible fire incidents. We developed FEAP with the aid of the Software Development Life Cycle (SDLC) phases and Unified Modeling Language (UML) which was used as a model to visualize the design view of the application. An Entity Relationship Diagram (ERD) was used for database design and a simple Graphical User Interface (GUI) prototype of the proposed application was designed. Our work highlights a practical application of analysis and design concepts in developing software to provide an efficient solution in reporting fire outbreaks.

Research paper thumbnail of A Study of Automated Software Testing: Automation Tools and Frameworks

International Journal of Computer Science Engineering (IJCSE), 2019

The growing demand for delivering quality software faster "Quality at Speed" requires faster and ... more The growing demand for delivering quality software faster "Quality at Speed" requires faster and successful execution of software testing to ensure its standard. Utilizing appropriate testing method(s) and right test automation tools/framework are two defining factors for a successful and effective software testing project. Using one testing method will not be sufficient to test software and ensure its standard, a combination of some appropriate testing techniques is often required. Likewise, is no one tool that can satisfy all automated testing needs which makes finding the right tool combination difficult. Knowing the various testing methods and tools/frameworks is the first step towards achieving a successful and efficient software testing. This article presents a comprehensive study of test automation tools and frameworks. Firstly, automated testing and their categories were explained, followed by an explanation of the various test automation frameworks. Finally, a brief explanation and comparison of some of the most commonly used automation tools was presented.

Research paper thumbnail of Comprehensive study of software testing: Categories, levels, techniques, and types

International Journal of Advance Research, Ideas and Innovations in Technology, 2019

Software Testing is the process of evaluating a software program to ensure that it performs its i... more Software Testing is the process of evaluating a software program to ensure that it performs its intended purpose. Software testing verifies the safety, reliability, and correct working of the software. The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many methods of testing software, however, the choice of method to test a given software remains a major problem in software testing. Although, it is often impossible to find all errors in software, employing right combination of methods will make software testing efficient and successful. Knowing these software testing methods is the key to making right selection. This paper presents a comprehensive study of software testing methods. An explanation of Testing Categories was presented first, followed by Testing Levels (and their comparison), then Testing Techniques (and their comparison). For each Testing Levels and Testing Techniques, examples of some testing types and their pros and cons were given with a brief explanation of some of the important testing types. Furthermore, a clear and distinguishable explanation of two confused and contradictory terms (Verification and Validation) and how they relate to Software Quality was provided.

Research paper thumbnail of Student Academic Performance Prediction using Artificial Neural Networks: A Case Study

International Journal of Computer Applications, Sep 18, 2019

Students dropout and delay in graduation are significant problems at Katsina State Institute of T... more Students dropout and delay in graduation are significant problems at Katsina State Institute of Technology and Management (KSITM). There are various reasons for that, students' performances during first year is one of the major contributing factors. This study aims at predicting poor students' performances that might lead to dropout or delay in graduation so as to allow the institution to develop strategic programs that will help improve student performance and enable the student to graduate in time without any problem. This study presents a neural network model capable of predicting student's GPA using students' personal information, academic information, and place of residence. A sample of 61 Computer Networking students' dataset was used to train and test the model in WEKA software tool. The accuracy of the model was measured using well-known evaluation criteria. The model correctly predicts 73.68% of students' performance and, specifically, 66.67% of students that are likely to dropout or experience delay before graduating.

Research paper thumbnail of Software Testing: Categories, Levels, Techniques, and Types

Software Testing is the process of evaluating a software program to ensure that it performs its i... more Software Testing is the process of evaluating a software program to ensure that it performs its intended purpose. Software testing verifies safety, reliability, and correct working of software. The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many methods of testing software, however, choice of method to test a given software remains a major problem in software testing. Although, it is often impossible to find all errors in software, employing right combination of methods will make software testing efficient and successful. Knowing these software testing methods is the key to making right selection. This paper presents a comprehensive study of software testing methods. An explanation of Testing Categories was presented first, followed by Testing Levels (and their comparison), then Testing Techniques (and their comparison). For each Testing Levels and Testing Techniques, examples of some testing types and their pros and cons were given with a brief explanation of some of the important testing types. Furthermore, a clear and distinguishable explanation of two confused and contradictory terms (Verification and Validation) and how they relate to Software Quality was provided.