A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Olamide, Oloyede Adetokunbo
- Networking CCTV Cameras and Passive Infra-Red Sensors for E-classroom Monitoring System:Proactive Approach to Quality Assurance in Education System
Authors
1 Computer Engineering’ Dept., Yaba College of Technology, Yaba, Lagos, NG
2 Computer Science’ Dept., Yaba College of Technology, Yaba, Lagos, NG
3 Computer Engineering Dept., Lagos State Polytechnic, Ikorodu, NG
Source
International Journal of Advanced Networking and Applications, Vol 8, No 5 (2017), Pagination: 3213-3219Abstract
Quality assurance in education system is paramount to the global sustainable development, therefore conventional surveillance systems that use cameras and process large amounts of data to extract features from a classroom environment may be essential. This work presents the design and implementation of automated classroom monitoring and security system with CCTV cameras and PIR sensors to monitor student's behavior and observe teacher performance during classroom activities. An active central control system and PIR sensors was designed. CCTV cameral, DVD system, and PIR sensors were networked to implementing the e-monitoring system. The control system supply power to both cameras and PIR sensor. The PIR sensors senses the movement within the monitoring area, and then activate the cameras, then the DVD system start recording the activities for online or offline view by human agent.
Keywords
CCTV, PIR Sensors, Student’s Behavior, Teacher’s Performance, Quality Assurance.References
- ] Yekini, 2014: Effective policing of students against cultism in Nigeria higher institutions of learning: A case of Yaba College of Technology: Available at http: engryekini.org; retrieved Sept. 30, 2015.
- ] Franck L., "Encryption and Cryptosystems in Electronic Surveillance: A Survey of the Technology Assessment Issues", 2001
- ] Jadhav Gauri J. & Raisoni G. H. “International Journal of Engineering Research and General Science” Volume 2, Issue 6, ISSN 2091-2730 October-November, 2014
- ] Wolf P. R. and Dewitt B. A., “Elements of Photogrammetry with Applications in GIS”, 3rd ed. New York: McGraw Hill, 2000.
- ] Keifer E. L., cctv surveillance available at http://ipvideomarket.info/report/cctvsurveillance retrieved July 18, 2016.
- ] Walker M., "Electronic Security Systems", University Press, Cambridge UK, 2008, pp 66-75.
- ] Tony A. M., (2011) “IP camera: advantages”, available at http://en.wikipedia.org/wiki/IPcamera.htm retrieved August 21, 2016.
- ] Mukesh Kumar Thakur, Ravi Shankar Kumar, Mohit Kumar, Raju Kumar, “Wireless Fingerprint Based Security System Using ZigBee Technology”.
- Embedded Computer Application Software for Secured Voter Card Transfer:An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism
Authors
1 Computer Engineering Department, Yaba College of Technology, Yaba Lagos, NG
2 Computer Engineering Department, Lagos State Polytechnics, Ikorodu Lagos, NG
Source
International Journal of Advanced Networking and Applications, Vol 9, No 1 (2017), Pagination: 3294-3299Abstract
Voter registration helps to facilitate the credibility of the electoral process by preventing multiple voting as each person is only allowed to register once. One out of many causes of disenfranchisement of register voter is the failure to transfer their Voter Registration from one place to another when the case arises. That scenario has led to multiple registrations which is a criminal offense in Nigeria context. This research work is to address the difficulty involved in Voter Card Transfer. We design embedded application software proposed to be integrated into the INEC existing website. A flowchart was designed using the procedure for Voter Register Transfer in the INEC website. The prototype of the application was coded with C++. It was tested to meet the demands and objective of the study.Keywords
Electoral Fraud, Electoral Integrity, INEC, Voter Registration, Voter Card Transfer, Register Voter.References
- ] Ashok Kumar D., Ummal Sariba Begun T., (2011). Review Paper on Fingerprint based voting. Available at http: www.ijareeie.com.
- ] KohnoT., Stubblefield A’, Rubin A., Wallch D.S. (2003). Analysis of University Information Security Technical Report TR-2003-19.
- ] MalkawiM., Khsawneh M., Al-Jarah O., (2009). Modeling and Simulation of the IBIMA, Volume 8, 2009. Issn 1943-7765.
- ] Ashok Kumar D., UmmalSariba Begun T., (2011). A comparative study on fingerprint matching algorithm for EVM. Availble at http:pubs.sciepub.com/jcsa.
- ] Yekini, N.A., Oyeyinka I. K., Oludipe O.O., and Lawal O.N., 2012. Computer-Based Automated Voting Machine (AVM) for Elections in Nigeria. IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012
- ] Hassan Adebayo (May 25, 2017). INEC-formally-accuses-kogi-gov-bello-of-double-voterregistration. Available at http://www.premiumtimesng.com/news/232202
- ] Tope Alabi May 24, 2017. Kogi State Governor in double voter’s registration scandal Available at:http://www.informationng.com/2017/05/kogi-state-governor-double-voters-registration-scandal.html
- ] Electoral Act, 2010: Act No. Short Title. Vol. 97. Page. 6. Electoral Act, 2010. A 1103-1202. Printed and Published by The Federal Government Printer, Abuja, Nigeria.
- ] (INEC n.d). Guidelines for Transfer of Registered Voters available at http://www.inecnigeria.org/?page_id=2051
- ] Hakeem Onapajo (2016) How Credible Were the Nigerian 2015 General Elections? An “Electoral Integrity” Framework of Analysis. Postdoctoral fellow, Department of Politics and International Studies, University of Zululand, South Africa.
- ] Aranuwa F.O.& O. Oriola O. (2012). Improved Electoral Fraud Prevention Mechanism for Efficient and Credible Elections in Nigeria. African Journal of Computing & ICT. Vol 5. No. 6. Dec 2012 ISSN 2006-1781. Available at www.ajocict.net. IEEE
- ] Kia, Bariledum (2013). Electoral Corruption and Democratic Sustainability in Nigeria. IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 17, Issue 5 (Nov. - Dec. 2013), PP 42-48 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org www.iosrjournals.org Page 42-48
- ] Onwe, Sunday O., Nwogbaga David, M.E.2, Ogbu, Mark O. (2015). Effects of Electoral Fraud and Violence on Nigeria Democracy: Lessons from 2011 Presidential Election. IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 20, Issue 4, Ver. 1 (Apr. 2015), PP 10-15 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org DOI: 10.9790/0837-20411015 www.iosrjournals.org
- ] Casmir etal (2013) Electoral Fraud in Nigeria: A Philosophical Evaluation of the Framework of Electoral Violence. 2013. Vol.3, No.4, 167-174 Published Online October 2013 in SciRes available at (http://www.scirp.org/journal/ojps)
- Deterring Sybil Attack in Online Communication System via Peer-To-Peer Audio Visual Communication System
Authors
1 Dept of Computer Engineering, Yaba College of Technology, NG
2 Dept of Computer Technology, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 9, No 1 (2017), Pagination: 3335-3337Abstract
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing is not really the one. In this paper, we focus on prevention of identity impersonation attacks in an Online Communication System. Peer-peer Audio Visual Communication System is design to enhance security through online communication system by revealing the identity of the communicators and records the communication if necessary. Embedded application system was design for mobile and desktop devices for audio visual charting using modern IT devices.Keywords
Audio Visual Communication System, Online Communication, Sybil Attacks.References
- ] Wang, Liang; Kangasharju, Jussi (2012). "Real-world sybil attacks in BitTorrent mainline DHT". IEEE GLOBECOM. Retrieved 30 September 2013.
- ] Wang, Liang; Kangasharju, Jussi (2013). "Measuring Large-Scale Distributed Systems: Case of BitTorrent Mainline DHT" (PDF). IEEE Peer-to-Peer. Retrieved 30 September 2013.
- ] Yekini N. Nureni, Aigbokhan E. Edwin, Akinwole A. Kikelomo, Alakiri O. Harrison 2016: E‐Infrastructure and E‐Services Security Platform Using Multifactor Cybercrime Deterrent System: A Conceptual Model iSTEAMS Multidisciplinary Cross-Border Conference Accra Ghana 2016
- ] Graf, F. (2002), Providing security for eLearning. Computer & Graphics, 26(2), 355-365.
- ] Weippl, E., & Ebner, M. (2008). Security privacy challenges in e-learning 2.0. In World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (Vol. 2008, No. 1, pp. 4001-4007).
- ] Dietinger, T. (2003). Aspects of e-learning environments (Unpublished doctoral thesis). Institute for Information Processing and Computer Supported New Media (IICM), Graz University of Technology, Austria.
- Cybernetic Communication Roles in Managing Corona Virus Pandemic Risk:Nigeria Case
Authors
1 Department of Computer Engineering, Yaba College of Technology, NG
2 Department of Computer Science, Yaba College of Technology, NG
Source
International Journal of Advanced Networking and Applications, Vol 11, No 6 (2020), Pagination: 4468-4474Abstract
Computer and Internet-Based Communication Technologies aka Cybernetic Communication play important role in communication over a distance. This work gauged uses of cybernetic communication as major means of communication during COVID-19 outbreak based on measured (Social Distance, Self-Quarantine, Isolation, Lockdown) put in place by the government to curtail spreading of the disease in Nigeria. Data were randomly collected through online publication, newsprints, and telephone calls from 290 sampled population. Data Collected were discussed and analyses using Pie chart, Percentile, and Histogram as statistical tools. Findings shows that Cybernetic communication play major role to bridge the communication gaps between the Nigerian people during the outbreak of the Covid-19 outbreak as majority of Nigerians spent more hours using cybernetic tools to communicate and more money was spent on airtime and data to keep their mobile phone running during the trying period of COVID-19 rash. Majority of the sampled population spent their useful time on social medial as in Facebook, whattsapp, Instagram, YouTube and for social interactions and meetings. The implications of our findings are: majority of Nigeria may have computer linked diseases or syndrome such Sleeping Problems and others due to prolong uses of computers; the cybernetic tools (mobile phones, computer, laptop etc.) used by the infected people may be a carrier of the symptoms in the nearest future; Nigerians spent more on data and airtime credit in this trying period and it may affect their financial economy later. This work ends with proposal for roles to be played by Nigeria government and other stakeholders in cybernetic sustained communication processes for pandemic response and to prevent future outbreak of covid-19 after overcoming recent happenings, and also recommended organization strategy for workforce continuity and recovery.Keywords
COVID-19, Cybernetic Communication, Digital Communication, Nigeria, E-readiness, Social Distancing, Self-Quarantine, and Isolation, Virtual Office Work.References
- ] Lam, Tommy Tsan-Yuk; Shum, Marcus Ho-Hin; Zhu, Hua-Chen; Tong, Yi-Gang; Ni, Xue-Bing; Liao, Yun-Shi; Wei, Wei; Cheung, William YiuMan; Li, Wen-Juan; Li, Lian-Feng; Leung, Gabriel M.; Holmes, Edward C.; Hu, Yan-Ling; Guan, Yi (26 March 2020). "Identifying SARSCoV2 related coronaviruses in Malayan pangolins". Nature. doi:10.1038/s41586-0202169-0. PMID 32218527. Retrieved 5th April 2020.
- ] WHO–China Joint Mission (16–24 February 2020). "Report of the WHO-China Joint Mission on Coronavirus Disease 2019 (COVID19)" (PDF). World Health Organization. Retrieved 8 March 2020.
- ] Shao, Peng (17 March 2020). "Impact of city and residential unit lockdowns on prevention and control of COVID-19". MedRxiv: 2020.03.13.20035253. doi:10.1101/2020.03.13.2 0035253.
- ] Scmp News (2020). Shanghai neighbor Zhejiang imposes draconian quarantine". South China Morning Post. 6 February 2020. Archivedfrom the original on 6 February 2020. Retrieved 10 April 2020.
- ] Marsh, Sarah (23 February 2020). "Four cruise ship passengers test positive in UK—as it happened". The Guardian. ISSN 0261-3077. Retrieved 22 April 2020.
- ] NCDC (2020) available at https://ncdc.gov.ng/news/227/ first-case-ofcoronavirus-disease-confirmed-in-Nigeria retrieved April 1, 2020.
- ] NCDC (4th May 2020), Nigeria’s COVID-19 Situation Report. Report 65. Available at. Covid19.ncdc.gov.ng/. Retrieved 4th May 2020.
- ] Divine Paredes (February 202). ICT deepens role in pandemic response planning available at retrieved April 1st 2020. https://www.cio.com/article/3526590/ictdeepensrole-in-pandemic-responseplanning.html
- ] Ben S Cooper, Richard J Pitman, W. John Edmunds, Nigel J Gay Delaying the International Spread of Pandemic Influenza Published: May 2, 2006 available at https://doi.org/10.1371/journal.pmed.0030212
- ] Muhammad. Adnan, Shereenab, Suliman, Khana. AbeerKazmic, Nadia. Bashira, Rabeea. Siddiquea, (2020). COVID-19 infection: Origin, transmission, and characteristics of human coronaviruses. Journal of Advanced ResearchVolume 24, Pages 91-98
- ] Jacinta, Bowler. 30 March 2020. The COVID-19 Virus May Have Been in Humans For Years, Study Suggests. Available at https://www.sciencealert.com/the-newcoronaviruscould-have-been-percolatinginnocentlyin-humans-for-years
- ] Shigui, Ruan. (March 2020). Likelihood of survival of coronavirus disease 2019 available at https://www.thelancet.com/journals/laninf/article/ PIIS1473-3099 (20)3025.