Jean Bosco Ntihinyurwa, Daniel Kanyarwanda, Sefu Bikorimana, Fidele Kwizera
Purpose: This paper investigates the impacts of electric vehicles integration in Rwandan Power system by assessing harmonic distortion, power loss, system loading, and voltage stability. Methodology: Distribution network test was conducted on 34 buses taken from KINIGI feeder of Camp Belge substation in northern corridor of nation grid by using ETAP software. Findings: The test came up with locating electric vehicles charging stations by taking into account the total harmonic distortion, transformer loading, voltage sensibility factor and the power loss where 4, 1, 2, 2, and 1 vehicles are located at buses 19, 20, 23, 25, and 26 respectively. The study determined the location of charging stations to enhance technical perspectives while implementing policies as policy maker motivates the public to shift from diesel powered EV to mitigate greenhouse gases emissions and fuel resources scarcity. Recommendations: The number of integrated EVs has been shown to be low compared to the demand for EVs and the industry's annual target of 1000 EVs per year. This requires a utility to manage the proposed load increase by planning for the power generation, transmission and distribution infrastructure. In addition, EV charging stations generate current and voltage harmonics that affect negatively electrical equipment, nearby loads, and neighboring telecommunications lines. Harmonic filtering devices such as RHS, SC and hybrid devices built on RHS and SC are required in the distribution network to eliminate the effects generated by the harmonics.
{"title":"FEASIBILITY STUDY OF ELECTRIC VEHICLES INTEGRATION IN RWANDA DISTRIBUTION NETWORK","authors":"Jean Bosco Ntihinyurwa, Daniel Kanyarwanda, Sefu Bikorimana, Fidele Kwizera","doi":"10.47672/ajce.1015","DOIUrl":"https://doi.org/10.47672/ajce.1015","url":null,"abstract":"Purpose: This paper investigates the impacts of electric vehicles integration in Rwandan Power system by assessing harmonic distortion, power loss, system loading, and voltage stability. \u0000Methodology: Distribution network test was conducted on 34 buses taken from KINIGI feeder of Camp Belge substation in northern corridor of nation grid by using ETAP software. \u0000Findings: The test came up with locating electric vehicles charging stations by taking into account the total harmonic distortion, transformer loading, voltage sensibility factor and the power loss where 4, 1, 2, 2, and 1 vehicles are located at buses 19, 20, 23, 25, and 26 respectively. The study determined the location of charging stations to enhance technical perspectives while implementing policies as policy maker motivates the public to shift from diesel powered EV to mitigate greenhouse gases emissions and fuel resources scarcity. \u0000Recommendations: The number of integrated EVs has been shown to be low compared to the demand for EVs and the industry's annual target of 1000 EVs per year. This requires a utility to manage the proposed load increase by planning for the power generation, transmission and distribution infrastructure. In addition, EV charging stations generate current and voltage harmonics that affect negatively electrical equipment, nearby loads, and neighboring telecommunications lines. Harmonic filtering devices such as RHS, SC and hybrid devices built on RHS and SC are required in the distribution network to eliminate the effects generated by the harmonics. \u0000 ","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Disease detection and monitoring using electronic means called E-disease monitoring cannot be over emphasized. This work goes to the in depth of how infected specimens can be tracked using radio frequency waves, and also how sensed information can be transmitted using sensor tags. The present study also demonstrates the algorithm for the process of RFID-SLT by applying the Radio Frequency Identification (RFID) sensor system designed in Matlab/simulink with sensor-tags in order to indicate how communication is carried out throughout the system. Comparisons were carried out to show the performance of the system with and without the RFID sensor links. The results obtained shows that RFID-SLT can detect certain human body vitals to be able to detect infected specimen at any tag range and the data obtained transmitted to a host network via node tags.
{"title":"E-disease monitoring using radio frequency identification sensor link technology (RFID-SLT) to improve public health information system in Nigeria","authors":"O. R. Otagburuagu, Irukwu Joe Ogbonnaya","doi":"10.47672/ajce.988","DOIUrl":"https://doi.org/10.47672/ajce.988","url":null,"abstract":"Disease detection and monitoring using electronic means called E-disease monitoring cannot be over emphasized. This work goes to the in depth of how infected specimens can be tracked using radio frequency waves, and also how sensed information can be transmitted using sensor tags. The present study also demonstrates the algorithm for the process of RFID-SLT by applying the Radio Frequency Identification (RFID) sensor system designed in Matlab/simulink with sensor-tags in order to indicate how communication is carried out throughout the system. Comparisons were carried out to show the performance of the system with and without the RFID sensor links. The results obtained shows that RFID-SLT can detect certain human body vitals to be able to detect infected specimen at any tag range and the data obtained transmitted to a host network via node tags.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the design and development of a VHF telemetry Two-way radio device network downtime/uptime alerting prototype. Telemetry network monitoring using VHF 2-way radio Streaming is a paradigm in networking management that has not been deployed. The framework enables continuous monitoring of the mobile and fixed access points of the mining fleet management Wi-Fi system (in the case of the Barrick Lumwana mine, Zambia). Considering the significance of real-time alerts in a mining facility, critical systems such as slope monitoring radars, mobile emergency alerts, and timely copper production reports must be monitored in real-time. The results for the performance warnings of the telemetry access points collectively accounted for a response alert time of 1999ms from the samples collected which translated to 0.29% compared to the SNMP system that registered a total of 689500ms for the samples collected which translates to 99.71% of the total response time of 691499ms. The results derived from the VHF 2-way radio telemetry prototype show that this system performs better than the traditional SNMP network monitoring system. We recommend that this IP network prototype is used in open-pit mines alongside Motorola telemetry two-way radios.
{"title":"Design and Development of a VHF Telemetry Two-way Radio Device Network Downtime/Uptime Alerting Prototype","authors":"Jonathan Chisapi, Charles S Lubobya","doi":"10.47672/ajce.968","DOIUrl":"https://doi.org/10.47672/ajce.968","url":null,"abstract":"This paper presents the design and development of a VHF telemetry Two-way radio device network downtime/uptime alerting prototype. Telemetry network monitoring using VHF 2-way radio Streaming is a paradigm in networking management that has not been deployed. The framework enables continuous monitoring of the mobile and fixed access points of the mining fleet management Wi-Fi system (in the case of the Barrick Lumwana mine, Zambia). Considering the significance of real-time alerts in a mining facility, critical systems such as slope monitoring radars, mobile emergency alerts, and timely copper production reports must be monitored in real-time. The results for the performance warnings of the telemetry access points collectively accounted for a response alert time of 1999ms from the samples collected which translated to 0.29% compared to the SNMP system that registered a total of 689500ms for the samples collected which translates to 99.71% of the total response time of 691499ms. The results derived from the VHF 2-way radio telemetry prototype show that this system performs better than the traditional SNMP network monitoring system. We recommend that this IP network prototype is used in open-pit mines alongside Motorola telemetry two-way radios.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper evaluates the performance of routing protocols such as OSPF, EIGRP and IS-IS in an enterprise network. Routing protocols are rules that govern the best route to transfer data between various nodes in networks. These rules are used in the transmission of information from the transmitting end to the receiving end. Routing protocol's main responsibility lies in determining the best way routers communicate with each other in order to forward any kind of network traffic using the optimal path. The evaluation of routing protocols was achieved by measuring packet end-to-end delay, packet delay variation, Jitter, Ethernet delay, traffic sent and received parameters by employing OPNET simulator software using Http, Video conferencing and Voice data types. The results shows that OSPF_IS-IS combined protocols outperforms the of OSPF_EIGRP and OSPF protocols by 60%.
{"title":"Performance Evaluation of Routing Protocols in Enterprise Networks","authors":"W. Mwewa, Smart C. Lubobya","doi":"10.47672/ajce.953","DOIUrl":"https://doi.org/10.47672/ajce.953","url":null,"abstract":"This paper evaluates the performance of routing protocols such as OSPF, EIGRP and IS-IS in an enterprise network. Routing protocols are rules that govern the best route to transfer data between various nodes in networks. These rules are used in the transmission of information from the transmitting end to the receiving end. Routing protocol's main responsibility lies in determining the best way routers communicate with each other in order to forward any kind of network traffic using the optimal path. The evaluation of routing protocols was achieved by measuring packet end-to-end delay, packet delay variation, Jitter, Ethernet delay, traffic sent and received parameters by employing OPNET simulator software using Http, Video conferencing and Voice data types. The results shows that OSPF_IS-IS combined protocols outperforms the of OSPF_EIGRP and OSPF protocols by 60%.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128886804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nwachukwu, K. Njoku, P. Okorie, I. S. Akosubo, C. Uzoukwu, E. O. Ihemegbulem, A. U. Igbojiaku
Purpose: This research work aimed at formulating an optimization model based on Scheffe’s Third Degree Polynomial (5,3) that can be used to optimize the compressive strength of Glass Fibre Reinforced Concrete (GFRC), which is then compared to Scheffe’s Second Degree Polynomial (5,2) formulation developed by Nwachukwu and others (2017) . Methodology: Using Scheffe’s Simplex method, the compressive strength of GFRC was determined for different ratios. Control experiments were also carried out and the compressive strength determined. After the tests have been conducted, the adequacy of the model was tested using fisher’s f-test and the result of the test shows a good correlation between the model and control results. Findings: Optimum compressive strength for the Scheffe’s (5,3) model was obtained as 21.82 N/mm2. This is slightly higher than the optimum compressive strength for Scheffe’s (5,2) model which was obtained as 20.71 N/mm2 by Nwachukwu and others (2017). Since structural concrete elements are generally made with concrete having a compressive strength of 20 to 35 MPa (or 20 to35 N/mm2 ), it then means that optimized GFRC based on both Scheffe’s models can produce the required compressive strength needed in major construction projects such as bridges and light-weight structures. Recommendations: Major stakeholders in the construction industry are therefore advised to use optimized GFRC as it is far cheaper and still possess the required strength needed for construction works.
{"title":"Comparison Between Scheffe’s Second Degree (5,2) And Third Degree (5,3) Polynomial Models In The Optimization Of Compressive Strength Of Glass Fibre Reinforced Concrete (GFRC)","authors":"K. Nwachukwu, K. Njoku, P. Okorie, I. S. Akosubo, C. Uzoukwu, E. O. Ihemegbulem, A. U. Igbojiaku","doi":"10.47672/ajce.893","DOIUrl":"https://doi.org/10.47672/ajce.893","url":null,"abstract":"Purpose: This research work aimed at formulating an optimization model based on Scheffe’s Third Degree Polynomial (5,3) that can be used to optimize the compressive strength of Glass Fibre Reinforced Concrete (GFRC), which is then compared to Scheffe’s Second Degree Polynomial (5,2) formulation developed by Nwachukwu and others (2017) . \u0000Methodology: Using Scheffe’s Simplex method, the compressive strength of GFRC was determined for different ratios. Control experiments were also carried out and the compressive strength determined. After the tests have been conducted, the adequacy of the model was tested using fisher’s f-test and the result of the test shows a good correlation between the model and control results. \u0000Findings: Optimum compressive strength for the Scheffe’s (5,3) model was obtained as 21.82 N/mm2. This is slightly higher than the optimum compressive strength for Scheffe’s (5,2) model which was obtained as 20.71 N/mm2 by Nwachukwu and others (2017). Since structural concrete elements are generally made with concrete having a compressive strength of 20 to 35 MPa (or 20 to35 N/mm2 ), it then means that optimized GFRC based on both Scheffe’s models can produce the required compressive strength needed in major construction projects such as bridges and light-weight structures. \u0000Recommendations: Major stakeholders in the construction industry are therefore advised to use optimized GFRC as it is far cheaper and still possess the required strength needed for construction works.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123745762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alain François Kuate, Paulin Nembot Tchueguem, Jean-François D. Essiben
Purpose: This paper presents the design and analysis of rectangular patch antenna that can be reconfigured in frequency for the three non-overlapping channels of the 2.4 GHz Wi-Fi. Methodology: To achieve this, a patch model in which four Pin diodes are introduced into the radiating structure, two operating in switching (ON / OFF) and two others kept blocked throughout operation has been proposed. By using as radiating element a copper hob placed on a substrate of the FR4_Epoxy type. The so-called CST Microwave Studio simulation software was used to simulate the design antenna. Findings: It was shown that this rectangular patch antenna resonates at the center frequencies of channels 1 (2.412GHz); 6 (2.437 GHz) and 11 (2.462 GH) with an almost uniform radiation pattern for different diode configurations. Recommendations: To improve the performance of this reconfigurable frequency patch antenna, future research must be based on optimizing the radiation parameters for configurations where one of the diodes is ON and the other is blocked.
{"title":"Design of a frequency reconfigurable rectangular patch antenna for 2.4 GHz Wi-Fi application","authors":"Alain François Kuate, Paulin Nembot Tchueguem, Jean-François D. Essiben","doi":"10.47672/ajce.886","DOIUrl":"https://doi.org/10.47672/ajce.886","url":null,"abstract":"Purpose: This paper presents the design and analysis of rectangular patch antenna that can be reconfigured in frequency for the three non-overlapping channels of the 2.4 GHz Wi-Fi. \u0000Methodology: To achieve this, a patch model in which four Pin diodes are introduced into the radiating structure, two operating in switching (ON / OFF) and two others kept blocked throughout operation has been proposed. By using as radiating element a copper hob placed on a substrate of the FR4_Epoxy type. The so-called CST Microwave Studio simulation software was used to simulate the design antenna. \u0000Findings: It was shown that this rectangular patch antenna resonates at the center frequencies of channels 1 (2.412GHz); 6 (2.437 GHz) and 11 (2.462 GH) with an almost uniform radiation pattern for different diode configurations. \u0000Recommendations: To improve the performance of this reconfigurable frequency patch antenna, future research must be based on optimizing the radiation parameters for configurations where one of the diodes is ON and the other is blocked.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study, titled "The Future of Fog Computing in Kenya," discusses fog computing, computing evolution, and the Internet of Things. It has layers ideal for fog networks. The architecture depicts the functions performed by each layer, the protocols, devices, and their functionality at various layers. Fog computing extends cloud computing and helps mitigate its difficulties. The study also goes forth to explain the various sectors where fog-computing technology is applied and the various merits associated with it. In order to improve present technology, this article will greatly help researchers in Kenya and beyond by giving ideas and suggestions as a way to focus on the COUNTRY’S VISION 2030.
{"title":"THE FUTURE OF FOG COMPUTING IN KENYA","authors":"Rebeccah Ndungi, B. Sugiantoro","doi":"10.47672/ajce.857","DOIUrl":"https://doi.org/10.47672/ajce.857","url":null,"abstract":"The study, titled \"The Future of Fog Computing in Kenya,\" discusses fog computing, computing evolution, and the Internet of Things. It has layers ideal for fog networks. The architecture depicts the functions performed by each layer, the protocols, devices, and their functionality at various layers. Fog computing extends cloud computing and helps mitigate its difficulties. The study also goes forth to explain the various sectors where fog-computing technology is applied and the various merits associated with it. In order to improve present technology, this article will greatly help researchers in Kenya and beyond by giving ideas and suggestions as a way to focus on the COUNTRY’S VISION 2030.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125479135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Purpose: This paper presents the design and analysis of a 2.4 GHz monopole antenna arrays with parasitic elements for Wireless communications using the Finite-Element Method. Methodology: The antenna arrays are constituted of five quarter wave antenna monopoles of section ¶. The selected configuration is the side coupling on a plan of mass out of rectangular copper of form posed on a FR-4 substrate materiel with relative permittivity of 4.4 and the thickness of section ¶. Only the central monopole is fed and the others known as parasitic are in short-circuit position by an effect of mutual coupling. The so-called CST Microwave Studio simulation software is used to simulate the design antenna. Findings: It is shown that this array is directive with high gain. Recommendations: To integrate this antenna arrays into wireless telecommunication systems, future research must be based on reducing its weight and dimensions. The use of printed monopole elements based on metamaterials may be a possible path for this integration.
{"title":"DESIGN AND SIMULATION OF A 2.4 GHz MONOPOLE ANTENNA ARRAYS WITH PARASITIC ELEMENTS FOR WIRELESS COMMUNICATIONS","authors":"A. Kuate, Jean-François D. Essiben","doi":"10.47672/AJCE.825","DOIUrl":"https://doi.org/10.47672/AJCE.825","url":null,"abstract":"Purpose: This paper presents the design and analysis of a 2.4 GHz monopole antenna arrays with parasitic elements for Wireless communications using the Finite-Element Method. \u0000Methodology: The antenna arrays are constituted of five quarter wave antenna monopoles of section ¶. The selected configuration is the side coupling on a plan of mass out of rectangular copper of form posed on a FR-4 substrate materiel with relative permittivity of 4.4 and the thickness of section ¶. Only the central monopole is fed and the others known as parasitic are in short-circuit position by an effect of mutual coupling. The so-called CST Microwave Studio simulation software is used to simulate the design antenna. \u0000Findings: It is shown that this array is directive with high gain. \u0000Recommendations: To integrate this antenna arrays into wireless telecommunication systems, future research must be based on reducing its weight and dimensions. The use of printed monopole elements based on metamaterials may be a possible path for this integration.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Plantain pseudostem has high content of lignocellulose used for production of pulp. But ironically, this resource is unexploited, with plantain stem becoming a common domestic waste in many parts of the world. The present work provides a kinetic model based on the kraft process from experimental determination of the rate of delignification reaction of plantain stem aimed at its application for pulp making and eventual paper production. Objectives of the work are twofold: firstly, to create an alternative raw material to wood for pulp production given the dwindling wood resources world – over and secondly, as a means of environmental waste management and control. The Arrhenius kinetic model was used to find the rate constant for the process with precise determination of its activation energy and pre – exponential factor. Results of study showed that Plantain (musa acuminate) is similar in chemical composition and morphology, but has higher amounts of cellulose (which is the major substance in pulping) than banana (musa pradisiaca). Plantain pseudostem is therefore highly recommended as an alternative source of raw material to wood for pulping production.
{"title":"Kinetic Modeling of Pulp Production from Plantain Trunk","authors":"P. Igbagara, Umukoro Evawere","doi":"10.47672/ajce.735","DOIUrl":"https://doi.org/10.47672/ajce.735","url":null,"abstract":"Plantain pseudostem has high content of lignocellulose used for production of pulp. But ironically, this resource is unexploited, with plantain stem becoming a common domestic waste in many parts of the world. The present work provides a kinetic model based on the kraft process from experimental determination of the rate of delignification reaction of plantain stem aimed at its application for pulp making and eventual paper production. Objectives of the work are twofold: firstly, to create an alternative raw material to wood for pulp production given the dwindling wood resources world – over and secondly, as a means of environmental waste management and control. The Arrhenius kinetic model was used to find the rate constant for the process with precise determination of its activation energy and pre – exponential factor. Results of study showed that Plantain (musa acuminate) is similar in chemical composition and morphology, but has higher amounts of cellulose (which is the major substance in pulping) than banana (musa pradisiaca). Plantain pseudostem is therefore highly recommended as an alternative source of raw material to wood for pulping production.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Passwords are a common measure used in Authentication systems to make sure that the users are who they say they are. The complexity of these Passwords is relied on while ensuring security. However, the role of complexity is limited. Users are forced to write down complex passwords since easy ones are easily guessed. This study aimed at evaluating the uniqueness of typing patterns of password holders so as to strengthen the authentication process beyond matching the string of characters. Using our own dataset, this research experimentally showed that k Nearest Neighbor algorithm using Euclidean distance as the metric, produces sufficient results to distinguish samples and detect whether they are from the same authentic user or from an impostor based on a threshold that was computed. Results obtained indicated that typing patterns are distinct even on simple guessable passwords and that typing pattern biometrics strengthens the authentication process. This research extends work in typing pattern analysis using k Nearest Neighbor machine learning approach to auto detect the password pattern of the authentic and non-authentic users. It also provides an investigation and assessment to the effect of using different k values of the KNN algorithm. Further to this field is the methodology for calculating an optimal threshold value with higher accuracy levels that acted as a basis for rejection or acceptance of a typing sample. Additionally is an introduction of a new feature metric of a combined dataset which is a concatenation of both the dwell and latency timings. A comparison of performance for independent and a combined dataset of the feature metrics was also evaluated.
{"title":"Authenticating Passwords by Typing Pattern Biometrics","authors":"Rose Nakasi, Safari Yonasi, J. Ngubiri","doi":"10.47672/AJCE.661","DOIUrl":"https://doi.org/10.47672/AJCE.661","url":null,"abstract":"Passwords are a common measure used in Authentication systems to make sure that the users are who they say they are. The complexity of these Passwords is relied on while ensuring security. However, the role of complexity is limited. Users are forced to write down complex passwords since easy ones are easily guessed. This study aimed at evaluating the uniqueness of typing patterns of password holders so as to strengthen the authentication process beyond matching the string of characters. Using our own dataset, this research experimentally showed that k Nearest Neighbor algorithm using Euclidean distance as the metric, produces sufficient results to distinguish samples and detect whether they are from the same authentic user or from an impostor based on a threshold that was computed. Results obtained indicated that typing patterns are distinct even on simple guessable passwords and that typing pattern biometrics strengthens the authentication process. This research extends work in typing pattern analysis using k Nearest Neighbor machine learning approach to auto detect the password pattern of the authentic and non-authentic users. It also provides an investigation and assessment to the effect of using different k values of the KNN algorithm. Further to this field is the methodology for calculating an optimal threshold value with higher accuracy levels that acted as a basis for rejection or acceptance of a typing sample. Additionally is an introduction of a new feature metric of a combined dataset which is a concatenation of both the dwell and latency timings. A comparison of performance for independent and a combined dataset of the feature metrics was also evaluated.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117320369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}