Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043296
Y. S. Mohammed, Dalhatu Ismail Inuwa, B. Saka, E. A. Aja, Sadiq Thomas, U. Umar
In the last few decades, power sectors are known to be growing faster worldwide with changing climatic condition meanwhile sustainable development is needed to confront some of the challenges. Sustainable energy technologies are one of the numerous requirements in the context of sustainable development. Increasing human population density and urban size requires a corresponding increase in technology-oriented energy development. Smart energy systems are technology-oriented information and communication technologies used in different parts of the world for improvement in access to energy to improve energy generation, transmission and distribution processes. The application of smart systems for energy harvest is a paradigm shift in the current global power sector. A smart application encompasses identifying, sensing and processing competences to utilize system networks to communicate among energy stakeholders using different internet networking devices. Smart energy systems enable ambiance communication intelligence to achieve some objectives. In the current state of researches with regards to the application of smart energy systems, there are lots of conspicuous challenges, especially in developing countries. Therefore, in this paper, the synopsis of the challenges threatening the diffusion of smart grid technologies in Nigeria is presented.
{"title":"Smart Energy Solutions in Power Sector: Overview of the Challenges in Nigeria Perspective","authors":"Y. S. Mohammed, Dalhatu Ismail Inuwa, B. Saka, E. A. Aja, Sadiq Thomas, U. Umar","doi":"10.1109/ICECCO48375.2019.9043296","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043296","url":null,"abstract":"In the last few decades, power sectors are known to be growing faster worldwide with changing climatic condition meanwhile sustainable development is needed to confront some of the challenges. Sustainable energy technologies are one of the numerous requirements in the context of sustainable development. Increasing human population density and urban size requires a corresponding increase in technology-oriented energy development. Smart energy systems are technology-oriented information and communication technologies used in different parts of the world for improvement in access to energy to improve energy generation, transmission and distribution processes. The application of smart systems for energy harvest is a paradigm shift in the current global power sector. A smart application encompasses identifying, sensing and processing competences to utilize system networks to communicate among energy stakeholders using different internet networking devices. Smart energy systems enable ambiance communication intelligence to achieve some objectives. In the current state of researches with regards to the application of smart energy systems, there are lots of conspicuous challenges, especially in developing countries. Therefore, in this paper, the synopsis of the challenges threatening the diffusion of smart grid technologies in Nigeria is presented.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043230
U. Mbanaso, V. Kulugh, Habiba Musa, G. Aimufua
Critical National Infrastructure (CNI) are assets that provide core functions to modern society, which failure or incapacitation can adversely affect national security, economic prosperity and wellbeing of citizens. In an evolving digital society, CNI rely heavily on Information and Communications Technology (ICT) infrastructure to improve productivity, and effectively deliver critical services in timely and cost-effective fashion. However, the underlying ICT infrastructure that drives CNI amplify cyber risks, threats and vulnerabilities exponentially. Consequently, a failure in ICT infrastructure has the potential to affect CNI in an unexpected manner. The risks associated with the use of ICT are dynamic, raising the need for continuous assessment of degree of ICT dependency. Presently however, there is rarely a framework nor a publicly available tool in Nigeria that can quantitatively gauge the degree of CNI dependency on ICT. The study addresses this gap by the development of a conceptual framework that can facilitate the assessment of the degree of CNI dependency on ICT. In this study, existing relevant documents on critical infrastructure, ICT frameworks and standards and critical process engineering principles were scanned, analysed and synthesised to conceptualise the framework, and the construction of the building blocks, metrics and indicators. The framework was tested using a hypothetical discrete dataset. The outcome further facilitated the framing of ICT Dependency Index (IDI), a predefined quadrant, of which the computation of Dependency must fall within one of the quadrants.
{"title":"Conceptual Framework for the Assessment of the Degree of Dependency of Critical National Infrastructure on ICT in Nigeria","authors":"U. Mbanaso, V. Kulugh, Habiba Musa, G. Aimufua","doi":"10.1109/ICECCO48375.2019.9043230","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043230","url":null,"abstract":"Critical National Infrastructure (CNI) are assets that provide core functions to modern society, which failure or incapacitation can adversely affect national security, economic prosperity and wellbeing of citizens. In an evolving digital society, CNI rely heavily on Information and Communications Technology (ICT) infrastructure to improve productivity, and effectively deliver critical services in timely and cost-effective fashion. However, the underlying ICT infrastructure that drives CNI amplify cyber risks, threats and vulnerabilities exponentially. Consequently, a failure in ICT infrastructure has the potential to affect CNI in an unexpected manner. The risks associated with the use of ICT are dynamic, raising the need for continuous assessment of degree of ICT dependency. Presently however, there is rarely a framework nor a publicly available tool in Nigeria that can quantitatively gauge the degree of CNI dependency on ICT. The study addresses this gap by the development of a conceptual framework that can facilitate the assessment of the degree of CNI dependency on ICT. In this study, existing relevant documents on critical infrastructure, ICT frameworks and standards and critical process engineering principles were scanned, analysed and synthesised to conceptualise the framework, and the construction of the building blocks, metrics and indicators. The framework was tested using a hypothetical discrete dataset. The outcome further facilitated the framing of ICT Dependency Index (IDI), a predefined quadrant, of which the computation of Dependency must fall within one of the quadrants.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043196
A. A. Adeniyi, Steve A. Adeshina
Age estimation from images of the face, has gained more attention in recent as it is favorable in some realworld applications. In this work, we address the problem of Under-Age registration/voting in Nigeria Electoral system, which has been a major menace, hindering a free and fair election in the country since the assumption of the Democratic system of Government. To this end, a pretrained VGG-16 Deep Convolutional Neural Network while comparing two optimization algorithms without image preprocessing is employed to both extract features from image(s) of prospective voters and classify same under the established age classification group, as eligible or not to exercise their civil right. In light of this, a classification accuracy of 77.67% is achieved with the model.
{"title":"Automatic Age Classification of Prospective Voters Using Deep Convolutional Neural Network.","authors":"A. A. Adeniyi, Steve A. Adeshina","doi":"10.1109/ICECCO48375.2019.9043196","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043196","url":null,"abstract":"Age estimation from images of the face, has gained more attention in recent as it is favorable in some realworld applications. In this work, we address the problem of Under-Age registration/voting in Nigeria Electoral system, which has been a major menace, hindering a free and fair election in the country since the assumption of the Democratic system of Government. To this end, a pretrained VGG-16 Deep Convolutional Neural Network while comparing two optimization algorithms without image preprocessing is employed to both extract features from image(s) of prospective voters and classify same under the established age classification group, as eligible or not to exercise their civil right. In light of this, a classification accuracy of 77.67% is achieved with the model.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126721295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043209
Imrana Abdullahi Yari, Babangida Abdullahi, Steve A. Adeshina
Open-source software has slowly infiltrated the enterprise space because the products tend to be cheaper, flexible, and secure in comparison to propriety products. However, open-source software incurs the cost of beavering to acquire professionals to, customize the product in meeting expectations, support fixes and in extending the product to a wide range of capabilities. ModSecurity is an open-source web application firewall (WAF) developed explicitly for Apache, and technically only listens to HTTP port 80. This study utilized the agility and flexibility property of open-source software to design a framework of configuring Apache module ModSecurity WAF to communicate with Tomcat server (which runs explicitly on HTTP port 8080). Furthermore, using suitable penetration testing methodology, this study investigates and compares the effectiveness of ModSecurity WAF in both Apache and Tomcat environments. ModSecurity WAF limitations were also investigated. In addition to providing a framework for configuring ModSecurity on tomcat server, this study provides an understanding of web application vulnerabilities, the techniques used to exploit them and the mitigation mechanisms to address them.
{"title":"Towards a Framework of Configuring and Evaluating ModSecurity WAF on Tomcat and Apache Web Servers","authors":"Imrana Abdullahi Yari, Babangida Abdullahi, Steve A. Adeshina","doi":"10.1109/ICECCO48375.2019.9043209","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043209","url":null,"abstract":"Open-source software has slowly infiltrated the enterprise space because the products tend to be cheaper, flexible, and secure in comparison to propriety products. However, open-source software incurs the cost of beavering to acquire professionals to, customize the product in meeting expectations, support fixes and in extending the product to a wide range of capabilities. ModSecurity is an open-source web application firewall (WAF) developed explicitly for Apache, and technically only listens to HTTP port 80. This study utilized the agility and flexibility property of open-source software to design a framework of configuring Apache module ModSecurity WAF to communicate with Tomcat server (which runs explicitly on HTTP port 8080). Furthermore, using suitable penetration testing methodology, this study investigates and compares the effectiveness of ModSecurity WAF in both Apache and Tomcat environments. ModSecurity WAF limitations were also investigated. In addition to providing a framework for configuring ModSecurity on tomcat server, this study provides an understanding of web application vulnerabilities, the techniques used to exploit them and the mitigation mechanisms to address them.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043215
Usman Mohammed, M. Aminu, Steve A. Adeshina, Omotayo Oshiga, Gokhan Koyunlu, Sadiq Thomas
In Nigeria, due to the epileptic nature of power supply, most institutions, individuals, and industries resort to self-generation of power via petrol and diesel generators, which does not only cause environmental and sound pollution but very expensive. As a result, the prices of domestic goods are on the rise. The threat of noise pollution and greenhouse gas emission associated with these generators cannot be over-emphasized. A renewable energy resource will provide a better alternative. This paper therefore designs and implements a regulated DC variable power supply of rating (0-15)V, 5A using solar PV with storage. The gap found from the literature review was; lack of digitally displayed output of the system. The paper designed and implemented DC variable power supply using a voltage regulator (LM33S), resistors, LED, capacitors, a solar PV of200 W, a 12V/24V20 A charge controller and two 12 V, l8Ah batteries. During the design stage, the voltage regulator capacity, solar PV, charge controller, battery ratings were designed. Tests were carried out with the aid of a digital multimeter to determine the response of the system. Results obtained showed that the system is capable of powering DC loads not greater than 75 W. It was also established that implemented system output voltage ranges from 1.21 V to 15.2 V. It was evident that basic experiments and other needs of DC power that are within the design range can be met.
在尼日利亚,由于电力供应的癫痫病性质,大多数机构、个人和工业都通过汽油和柴油发电机自行发电,这不仅造成环境和声音污染,而且非常昂贵。因此,国内商品的价格在上涨。与这些发电机有关的噪音污染和温室气体排放的威胁怎么强调也不过分。可再生能源将提供一个更好的选择。因此,本文设计并实现了一种额定(0-15)V, 5A的带储能太阳能光伏稳压直流可变电源。从文献综述中发现的差距是;缺少系统的数字显示输出。本文采用稳压器LM33S、电阻器、LED、电容、200w太阳能光伏、12V/24V20 a充电控制器和2节12V, 18ah电池设计并实现了直流可变电源。在设计阶段,对稳压容量、太阳能光伏、充电控制器、电池额定值进行了设计。在数字万用表的帮助下进行了测试,以确定系统的响应。结果表明,该系统能够为不大于75w的直流负载供电。并确定实现的系统输出电压范围为1.21 V ~ 15.2 V。可以看出,在设计范围内,直流电源的基本实验和其他需求是可以满足的。
{"title":"Design and Implementation of Regulated DC Variable Power Supply Using Solar PV with Storage (0-15V, 5A)","authors":"Usman Mohammed, M. Aminu, Steve A. Adeshina, Omotayo Oshiga, Gokhan Koyunlu, Sadiq Thomas","doi":"10.1109/ICECCO48375.2019.9043215","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043215","url":null,"abstract":"In Nigeria, due to the epileptic nature of power supply, most institutions, individuals, and industries resort to self-generation of power via petrol and diesel generators, which does not only cause environmental and sound pollution but very expensive. As a result, the prices of domestic goods are on the rise. The threat of noise pollution and greenhouse gas emission associated with these generators cannot be over-emphasized. A renewable energy resource will provide a better alternative. This paper therefore designs and implements a regulated DC variable power supply of rating (0-15)V, 5A using solar PV with storage. The gap found from the literature review was; lack of digitally displayed output of the system. The paper designed and implemented DC variable power supply using a voltage regulator (LM33S), resistors, LED, capacitors, a solar PV of200 W, a 12V/24V20 A charge controller and two 12 V, l8Ah batteries. During the design stage, the voltage regulator capacity, solar PV, charge controller, battery ratings were designed. Tests were carried out with the aid of a digital multimeter to determine the response of the system. Results obtained showed that the system is capable of powering DC loads not greater than 75 W. It was also established that implemented system output voltage ranges from 1.21 V to 15.2 V. It was evident that basic experiments and other needs of DC power that are within the design range can be met.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043227
N. A. Umar, Jamilu Awwalu
Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.
{"title":"Integrating Strategic Information Systems Planning into Nigerian Security Agencies","authors":"N. A. Umar, Jamilu Awwalu","doi":"10.1109/ICECCO48375.2019.9043227","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043227","url":null,"abstract":"Strategic Information Systems Planning (SISP) as a means for technology optimization plays important role along with Information system as the key player. Security information as the major resource for Information Systems is produced from the massive data collected by security agencies on daily basis. While other countries continuously strive to be several steps ahead of crime and their perpetrators, map out crime pattern, and implement efficient security personnel allocation by mining the voluminous data from their Information Systems (IS) as a means of achieving their organization goals, the absence of both hard and soft working infrastructure that can serve the purpose of collecting adequate data further complicates matters for Nigerian security agencies. These different security challenges can be identified and linked with strategic planning, obsolete computing resources, Information Systems features, data collection and Information Systems adoption. This study targets the audience of the top decision makers and managers of Nigerian security agencies by provides a framework for integrating SISP into security agencies. This is in order to facilitate the achievement security agencies organizational goals and make them benefit from a functional IS and put them on track to catching up with their counterparts around the world within the shortest possible time.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043239
Ochilbek Rakhmanov, U. Ibrahim
the increasing prevalence of mobile applications in modern age has made them an important tool that can be used to solve community based problems. In Nigeria especially, open air defecation due to lack of toilets and improper waste disposal (caused by the lack of garbage disposal containers) are two major problems plaguing the country that can be resolved with mobile applications. Therefore, in this paper, we designed a mobile application which records input from one type of user (coordinates of toilets and waste disposal containers) and provide this information to other users. We tested the reaction of the community for given opportunity to solve this problem, as well as how likely are users to use toilets around, if they learn the exact place. The simulation, overall, was successful and the results showed that community sourcing can solve a huge part of community problems once the opportunity is presented.
{"title":"Use of Mobile Phone for Community Based Crowd Sourcing","authors":"Ochilbek Rakhmanov, U. Ibrahim","doi":"10.1109/ICECCO48375.2019.9043239","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043239","url":null,"abstract":"the increasing prevalence of mobile applications in modern age has made them an important tool that can be used to solve community based problems. In Nigeria especially, open air defecation due to lack of toilets and improper waste disposal (caused by the lack of garbage disposal containers) are two major problems plaguing the country that can be resolved with mobile applications. Therefore, in this paper, we designed a mobile application which records input from one type of user (coordinates of toilets and waste disposal containers) and provide this information to other users. We tested the reaction of the community for given opportunity to solve this problem, as well as how likely are users to use toilets around, if they learn the exact place. The simulation, overall, was successful and the results showed that community sourcing can solve a huge part of community problems once the opportunity is presented.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043232
Abubakar Dayyabu, Aisha Abdullahi lawal, A. Amuda, A. Mambo, Ado Mohammed
Traffic stream in many countries including Nigeria is made of different vehicles having different static and dynamic characteristic. The ban of two wheelers vehicles in Abuja city center has resulted in upsurge in the use of three wheelers. There is therefore the need to estimate the passenger car unit for this city due to the change in means of transportation for effective transport planning, designing and operation analysis. In this study, the headway method was used to develop a PCU value for trucks and three-wheelers at signalized intersections in Abuja, Nigeria. The intersections were selected based on stratified random method of sampling. Data was collected using manual method. The PCU obtained from this research is 0.92 and 1.82 for three-wheeler at Apo intersection; followed PCU of 0.92 and 2.34 at Gwarimpa intersection and lastly a PCU of 0.96 and 2.09 at Games village Intersection. The research concluded on a state average PCU value of 2.08 and 0.93 for Trucks and three wheelers for planning, designing and operation analysis in Abuja. The research recommends adapting the passenger car unit values obtained for local use and design of intersections in Abuja for efficient operation of highway facilities in the city.
{"title":"Estimation Of Three-Wheeler Passenger Unit (Pcu) Using Headway Method Case Study Of Abuja Nigeria","authors":"Abubakar Dayyabu, Aisha Abdullahi lawal, A. Amuda, A. Mambo, Ado Mohammed","doi":"10.1109/ICECCO48375.2019.9043232","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043232","url":null,"abstract":"Traffic stream in many countries including Nigeria is made of different vehicles having different static and dynamic characteristic. The ban of two wheelers vehicles in Abuja city center has resulted in upsurge in the use of three wheelers. There is therefore the need to estimate the passenger car unit for this city due to the change in means of transportation for effective transport planning, designing and operation analysis. In this study, the headway method was used to develop a PCU value for trucks and three-wheelers at signalized intersections in Abuja, Nigeria. The intersections were selected based on stratified random method of sampling. Data was collected using manual method. The PCU obtained from this research is 0.92 and 1.82 for three-wheeler at Apo intersection; followed PCU of 0.92 and 2.34 at Gwarimpa intersection and lastly a PCU of 0.96 and 2.09 at Games village Intersection. The research concluded on a state average PCU value of 2.08 and 0.93 for Trucks and three wheelers for planning, designing and operation analysis in Abuja. The research recommends adapting the passenger car unit values obtained for local use and design of intersections in Abuja for efficient operation of highway facilities in the city.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043200
Y. Mohammed, A. S. Mohammed, H. Abdulkarim, Clement Danladi, Aduh Victor, Romanus Edoka
Web-based solutions that employs the use of Internet of Things (IoT), is continuously creating new application areas, including healthcare. This shows that, iHealth, real-time monitoring as well as remote patients monitoring, are expected to revolutionize the healthcare sector. IoT is nothing but communication between devices that contain embedded technology with existing internet infrastructure. This research work employs a smart data gathering method using a fuzzy logic assisted approach. The fuzzy scheme employed, helps make the system smart by helping the device make decisions on when and what data is to be sent depending on the inference made on various inputs from the physiological sensors. Performance analysis was carried out on the energy consumption pattern of the nodes which indicate that throughout the monitoring period of Ten (10) hours each day, for three days. The average energy consumed by the device when fuzzy assisted logic is used is 90.78 milli Watt (mW), while the average energy consumed when the conventional method is used is 128.5 mW. From the results, it was observed that power consumption is substantially reduced by about 37.72 mW (29.35%), when using the fuzzy assisted method as compared to when using the normal/conventional method.. It was equally observed that while using the fuzzy assisted logic, energy consumption only increased whenever there is an anomaly in the sensor reading.
{"title":"Development and Implementation of an Internet of Things (IOT) Based Remote Patient Monitoring System","authors":"Y. Mohammed, A. S. Mohammed, H. Abdulkarim, Clement Danladi, Aduh Victor, Romanus Edoka","doi":"10.1109/ICECCO48375.2019.9043200","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043200","url":null,"abstract":"Web-based solutions that employs the use of Internet of Things (IoT), is continuously creating new application areas, including healthcare. This shows that, iHealth, real-time monitoring as well as remote patients monitoring, are expected to revolutionize the healthcare sector. IoT is nothing but communication between devices that contain embedded technology with existing internet infrastructure. This research work employs a smart data gathering method using a fuzzy logic assisted approach. The fuzzy scheme employed, helps make the system smart by helping the device make decisions on when and what data is to be sent depending on the inference made on various inputs from the physiological sensors. Performance analysis was carried out on the energy consumption pattern of the nodes which indicate that throughout the monitoring period of Ten (10) hours each day, for three days. The average energy consumed by the device when fuzzy assisted logic is used is 90.78 milli Watt (mW), while the average energy consumed when the conventional method is used is 128.5 mW. From the results, it was observed that power consumption is substantially reduced by about 37.72 mW (29.35%), when using the fuzzy assisted method as compared to when using the normal/conventional method.. It was equally observed that while using the fuzzy assisted logic, energy consumption only increased whenever there is an anomaly in the sensor reading.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043280
Abdulahi Monday Jubrin, Ikechukwu Izegbu, O. S. Adebayo
Cloud Computing has witnessed tremendous growth in the last decades. Security and privacy of cloud data are two major concerns that have limited the growth and researches witnessed in the area of cloud computing. With Artificial Intelligence and Deep Learning taking prominent role in the decade, individuals and organizations are becoming more uneasy to the issues of security and privacy of cloud data. This article aims to provide an introduction to Fully Homomorphic Encryption as an antidote to the challenges of security and privacy of cloud data computation. The milestones and review of works in the area of Homomorphic Encryption was discussed. An insight into future research direction in the field of Fully Homomorphic Encryption was specified.
{"title":"Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concems.","authors":"Abdulahi Monday Jubrin, Ikechukwu Izegbu, O. S. Adebayo","doi":"10.1109/ICECCO48375.2019.9043280","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043280","url":null,"abstract":"Cloud Computing has witnessed tremendous growth in the last decades. Security and privacy of cloud data are two major concerns that have limited the growth and researches witnessed in the area of cloud computing. With Artificial Intelligence and Deep Learning taking prominent role in the decade, individuals and organizations are becoming more uneasy to the issues of security and privacy of cloud data. This article aims to provide an introduction to Fully Homomorphic Encryption as an antidote to the challenges of security and privacy of cloud data computation. The milestones and review of works in the area of Homomorphic Encryption was discussed. An insight into future research direction in the field of Fully Homomorphic Encryption was specified.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124785231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}