Department of Computer Engineering
Permanent URI for this collection
Browse
Recent Submissions
- ItemFeature Fusion Using GSA for Multi Instance Authentication System(Asian Research Journal of Current Science, 2023-11-15) Ibikunle, AkinolaMulti-instance fusion of fingerprint authentication system at score level overcomes a few of the shortcomings of a Unimodal Biometric System (UBS) and enhanced the efficiency of the system. However, due to loss of information at higher levels, the features fused at the score level are confined in comparison to feature level fusion and could lead to poor performance. In this study, multi-instance fusion of fingerprints was done at feature level using Gravitational Search Algorithm (GSA) to select and combine minimal relevant informative texture features subsets from multi-instances of fingerprint and considerably improves the performance of the system. The approach was validated by creation of multi-instances of fingerprint database acquired locally from 150 subjects in an uncontrolled environment and texture based feature extraction was considered and classification of fused texture feature was done using back propagation neural network. The results show that the presented technique was effective in subject authentication with accuracy of 97.09%, indicating that it can successfully secure fingerprint authentication systems from unauthorized attacks.
- ItemA SIMULATION-BASED COMPARATIVE STUDY OF CONTROLLED DELAY (CODEL) WITH RANDOM EARLY DETECTION (RED) FOR NETWORK PERFORMANCE EVALUATION(British Journal of Computer, Networking and Information Technolog, 2023) KOMOLAFE Temitope AmosThe rising need to use the internet for time/delaysensitive applications with different Quality of Service (QOS) requirements has made network management and control even more challenging. The current congestion avoidance and control mechanisms for Transport Control Protocol (TCP) are insufficient to offer good service in all circumstances. A few decades ago, the TCP successfully regulated Internet congestion control. However, it is already widely acknowledged that TCP has reached its limits and that new congestion control protocols will be required in the near future. This has prompted a significant amount of research on novel congestion control designs that will meet the demands of the future Internet. With widespread public attention and study, the full buffer problem has not gone away, but rather worsened. As a result, there has been a surge in interest in using Active Queue Management (AQM) in Internet routers to minimize queue latency. The effectiveness of a recently developed AQM, Controlled Delay (CoDel) algorithm, designed to work in today’s network setups and can be deployed as a main part of the bufferbloat solution, is evaluated in this research study. CoDel's effectiveness is evaluated by running simulations in ns-3 and comparing its results to that of Random Early Detection (RED), another promising network queue management technique
- ItemDEVELOPMENT OF A PREDICTIVE FUZZY LOGIC MODEL FOR MONITORING THE RISK OF SEXUALLY TRANSMITTED DISEASES (STD) IN FEMALE HUMAN(International Research Journal of Engineering and Technology, 2020) Janet O. JoodaThe purpose of this study is to develop a classification model for monitoring the risk of sexually transmitted diseases (STDs) among females using information about non-invasive risk factors. The specific research objectives are to identify the risk factors that are associated with the risk of STDs; formulate the classification model; and simulate the model. Structured interview with expert physicians was done in order to identify the risk factors that are associated with the risk of STDs Nigeria following which relevant data was collected. Fuzzy Triangular Membership functions was used to map labels of the input risk factors and output STDs risk of the classification model identified to associated linguistic variables. The inference engine of the classification model was formulated using IF-THEN rules to associate the labels of the input risk factors to their respective risk of still birth. The model was simulated using the fuzzy logic toolbox available in the MATLAB® R2015a Simulation Software. The results showed that 9 non-invasive risk factors were associated with the risk of STDs among female patients in Nigeria. The risk factors identified were marital status, socio- economic status, toilet facility used, age at first sexual intercourse, practice sex protection, sexual activity (in last 2 weeks), lifetime partners, practice casual sex and history of STDs. 2, 3 and 4 triangular membership functions were appropriate for the formulation of the linguistic variables of the factors while the target risk was formulated using four triangular membership functions for the linguistic variables no risk, low risk, moderate risk and high risk. The 2304 inferred rules were formulated using IF-THEN statements which adopted the values of the factors as antecedent and the STDs as consequent part of each rule. This study concluded that using information about the risk factors that are associated with the risk of STDs, fuzzy logic modeling was adopted for predicting the risk of STD based on knowledge about the risk factors.
- ItemDevelopment of a Modified Simulated Annealing to School Timetabling Problem(International Journal of Applied information Systems, 2015) Janet O. JoodaThis work presents a modified simulated annealing applied to the process of solving a typical high school timetabling problem. Preparation of a high school timetable consists basically of fixing a sequence of meetings between teachers and students in a prefixed period of time in such a way that a certain set of constraints of various types is satisfied. The approach presented in the paper has been successfully used to schedule the first time school timetable of Fakunle Comprehensive High School, Osogbo Nigeria during the 2012/2013 session and it was capable of generating timetables for complex problem instances. A task involving 18 Classes, 45 Teachers and 15 Subjects for Junior Secondary School (JSS) with 3 Levels (JSS 1 to JSS 3), and 6 arms each; and 24 Classes, 77 Teachers and 19 Subjects for Senior Secondary School (SSS), with 3 Levels (SSS 1 to SSS 3), and 8 arms (3 for Science Group, 3 for Commercial Group, and 2 for Art Group), for 6 hours, 5 days respectively. The use of the implemented model resulted in significant time saving in the scheduling of the timetables, and a well spread lessons for the teachers. Also none of the teachers and classes was double booked. It was clearly evident that the developed modified simulated annealing reduces the major weakness of slow convergence (convergence at excessive time) associated with the classical simulated annealing.
- ItemMultiple Instances Fingerprint Image Data Acquisition(International Conference on Electrical, Computer and Energy Technologies, 2023) Janet O. JoodaUsing public fingerprint databases to validate the multi-instance fusion approach of a Multi-instance Biometric Authentication System (MBAS) for accurate authentication is a means of overcoming some of the limitations of a Unimodal Biometric System (UBS). Nevertheless, a significant portion of the web databases used for MBAS (Machine Learning-Based Automated Systems) were obtained under controlled conditions, with the photos being curated to align with a certain algorithmic objective. The performance of biometric systems exhibits variability when the datasets used in the algorithms undergo modifications as a result of discrepancies in the settings under which the photos were obtained. In this study, a database containing multiple fingerprint instances was developed locally in an uncontrolled environment. The aim was to create a database containing numerous examples of fingerprints for the same person from one or multiple data collection sessions. The database was produced locally by acquiring six samples of ten fingerprint instances of 150 subjects in an uncontrolled environment using a Futronic fingerprint scanner. The created database and results will be helpful to all researchers in the biometrics field as a tool for improving multi-instance fusion methods and enabling an unbiased evaluation of algorithms.