As organizations/institutions grow the need for an efficient monitoring software tool that scruti... more As organizations/institutions grow the need for an efficient monitoring software tool that scrutinizes the true identity and the attendance behaviour of staff and students arises. In most organizations, the conventional method of keeping time books and attendance registers has failed to achieve the desired success and as a result there are regular occurrences of identity irregularities and identity theft. In Nigeria, the trends of employing identification systems using textual information or the conventional fingerprint biometrics for identification have not proved to be effective. An identification system, which employs the use of fingerprint biometric that conducts a one-to-many pattern-matching to authenticate the claimed identity of an individual (student), is proposed in this paper. The system is designed to comprise of a three-level process; namely, a system module, algorithm module, and a user module. The digital representations of the fingerprint biometric data are captured at the system module level. At the algorithm module level, the fingerprint features are extracted for comparison with features stored in the system database. The user interacts with the system at the user module level. The program of implementation of the system is the version 6.0 of the Visual Basic. Results from the implementation reveal that the system has an execution time of 3.01 seconds, making it preferable to the manual system with an execution time of 30 seconds. Key Words : Biometrics, Pattern-matching Identification, Verification, Authentication, Fingerprints
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2021
Unstructured Supplementary service data (USSD), a capability built-in Global System for Mobile Co... more Unstructured Supplementary service data (USSD), a capability built-in Global System for Mobile Communication (GSM) mobile phones, is one of the technologies that make use of the direct PIN entry method. Sadly, the Direct PIN entry method is susceptible to shoulder surfing attacks. USSD technology is text-based, as a result, supports only authentication methods that are in plain text. As a result of this, existing user authentication models against shoulder surfing cannot be implemented on USSD technology. The user authentication model is an area of research interest as a result of the high level of insecurity associated with the proliferation of mobile-based services. The user authentication model has gained more research attention in recent years. Various authentication models against shoulder surfing attacks have been proposed, adopted, and implemented in recent years, yet the authentication model against shoulder surfing attacks that can be implemented in the USSD channel remains an area of research interest. Many existing Authentication models against Human shoulder surfing attacks are applications that use graphical, textual, and biometric (primary and soft) techniques that are based on, image display, image capturing, colors, and so on. In this paper, an attempt has been made to identify why a direct PIN entry method that is prone to attack is still implemented in the USSD channel while there are many strong authentication models against shoulder surfing attacks in existence. To do this, some existing authentication models against shoulder surfing attacks were analyzed and their model requirements identified.
In open and distance learning (ODL), students need to access different e-learning platforms daily... more In open and distance learning (ODL), students need to access different e-learning platforms daily in order to acquire knowledge and write examinations. In these situations, the Username and Password Model (UPM) is the most common authentication model. However, owing to the model's inability to prevent 'identity theft' and the vital need to authenticate and ascertain the true identity of students who register online, this article proposes a new authentication method, namely the Multipurpose Authentication Model (MAM). MAM is able to solve problems of identification in the midst of identity theft effectively. In the process it determines which part of the student's credentials act as 'watermarking' mechanisms to check whether completed examinations returned by students are authentic. In order to validate the effectiveness of MAM, a demonstration of a prototype of the system has been made, thus ensuring the practicability of the model.
Journal of the Nigerian Association of Mathematical Physics, 2011
System security assessment tools are either restricted to manual risk evaluation methodologies th... more System security assessment tools are either restricted to manual risk evaluation methodologies that are not appropriate for real-time application or used to determine the impact of certain events on the security status of networked systems. In this paper, we determine the strength of computer systems from the perspective of the authentication models employed at the user interface domain by introducing a novel approach to system risk assessment. We first establish the risk of a system as the composition of the risks of individual authentication factors employed for user authentication processes, providing a more formally defined model. Using Hidden Markov Models (HMMs) we characterize the likelihood of transitions between security states of systems with different levels of authentication factors and we provide soft evidence on the states of these systems by applying our security assessment tool to an existing multifactor authentication model. The results of the analysis and the empi...
Currently the „user name and password‟ model is used extensively in offline computing systems an... more Currently the „user name and password‟ model is used extensively in offline computing systems and online correspondence. However this is a weak method of authentication because users tend to generate textual passwords that are easy to remember, easy to crack and recycled across multiple accounts. To counteract user errors associated with password authentication, many projects focus on developing authentication models that make use of mnemonic passwords without carefully considering the implications. This paper presents an empirical investigation into users regular (RPs) and mnemonic passwords (MPs) and expressions and justifies the effectiveness of MPs over RPs using a generated MPs dictionary and a password algorithm. From the study a total of 121 users MPs were found in the MPs dictionary relating to respondents names, personal information, religious and family background, life‟s philosophy and goals, representing 11.49% of total dictionary size. This reveals the vulnerability o...
Journal of Computer Science and Its Application, 2012
Internet banking provides alternatives for faster delivery of banking services to a wider range o... more Internet banking provides alternatives for faster delivery of banking services to a wider range of customers. These services have attracted the attention of legitimate and illegitimate online banking practices. Customers are liable to criminal activities, fraud, thefts and other similar threats. Criminals focus on stealing user's online banking credentials because the username and password combination are relatively easy to acquire and utilize to access Internet banking accounts and commit financial fraud. To alert users, many banking sites are now including Security Indicators (SI) to their sites. This paper describes a user study conducted using questionnaires to investigate user's perception of factors influencing the effective implementation of existing SI objectives and evaluate the effectiveness of SI in banking web browsers using the Communication-Human Information Processing Model (C-HIP). Thirteen (13) banks in Nigeria were randomly selected for the study. Data analysis revealed that SI are not very effective at alerting and shielding users from revealing sensitive information to spoofed sites because 27(19.7%) of the 137 participants never even noticed that a warning appeared. These outcomes may help the management of banks develop effective security strategies for the future of electronic banking in Nigeria.
International Journal of Advanced Computer Science and Applications, 2012
Some teaching methods adopted for disseminating Information Communication Technology Related Cour... more Some teaching methods adopted for disseminating Information Communication Technology Related Courses (ICTRC) in institutions of learning have been observed to be inadequate in bringing about the right perception and performance in students. In order to qualitatively establish the efficiency of tutoring ICTRC, this study investigates the effect of ICT resources on students' perception and performance in ICTRC. Two hundred and forty-eight (248) students in the Department of Computer Science/ICT from two universities: a Federal and a Private University from the South-South region of Nigeria were used. A pre-test, post-test control group and quasi experimental design were utilized. Findings revealed that teaching ICTRC without using ICT resources are not effective at empowering the students with the right perception and the students are not enabled to perform to the best of their ability. Some recommendations are proffered encouraging ICT aided teaching strategies in Nigeria.
Object Oriented Systems (OOS) have been widely adopted in software engineering because of their s... more Object Oriented Systems (OOS) have been widely adopted in software engineering because of their superiority with respect to data extensibility. The present trend in the software engineering process (SEP) towards concurrent computing raises novel concerns for the facilities and technology available in database management systems for data representation suitable in a distributed computing environment that will maximize the productivity of software designs r elative to costs. This paper highlights the need for object - oriented database management systems and mechanism of OOS applicable in the SEP. The mobile cellular telephone has been used as a simple example to illustrate the method. Key Words: Object -Oriented, Database , Management , Systems, Computer , Application. Software and Engineering.
Canada is experiencing steady increases in the utilization of diagnostic laboratory services. An ... more Canada is experiencing steady increases in the utilization of diagnostic laboratory services. An interprovincial study demonstrated rising laboratory expenditures per capita over five years (1996/1997 to 2001/2002) in Ontario (8%), Manitoba (8%), Alberta (14%), Saskatchewan (15%), and British Columbia (34%). A 44% increase over four years (1997/1998 to 2001/2002) was shown in outpatient laboratory testing expenditures in British Columbia, exceeding growth in government budgets for the same period.
Journal of the Nigerian Association of Mathematical Physics, 2011
The increases in computerized mode of operations and the activities of identity attackers have no... more The increases in computerized mode of operations and the activities of identity attackers have not only affected the trust in computerized systems but have slowed down the adoption of both offline and online services. Today there is the risk of unauthorized access, fraud and inappropriate disclosure of sensitive data. Human resources and malicious applications steal user identity, potentially resulting in a direct loss of highly sensitive information and hard currency to affected victims. To protect sensitive information, commercial and corporate sites extensively employ the use of textual passwords, which when used over an encrypted connection is vulnerable to attacks. To counter some of these attacks, many corporate sites instruct users to make use of mnemonic passwords without carefully considering the implications. This paper describes the generation of a novel mnemonic password dictionary, and an empirical study performed to analyze the strength and effectiveness of regular pas...
In recent times, many organizations in Nigeria have been awakened with the enormous drive to go p... more In recent times, many organizations in Nigeria have been awakened with the enormous drive to go paperless, however the conversion to an absolute paperless environment has been an illusion in Nigeria as many individuals lack confidence in such systems. This paper examines the mode of processing information by 309 staffs and students of the University of Benin, verifies the level of difficulties encountered by the use of paperless or manual mode of processing information and compare the feasible time difference derived from adopting a paperless office environment with a traditional paper-based environment while carrying out office job functions that relates to paper activities, with the believe that this time reserves can be effectively utilized in other operation processes associated with the services provided. Results showed that despite the time gain in using automated systems as against using hard copy manuals for processing information, 71% of the respondents still use hard copy ...
Public revenue collection is an integral component of fiscal policy and administration in any eco... more Public revenue collection is an integral component of fiscal policy and administration in any economy because of its influence on national government operations and the grassroots. Research establishes that it is inconsistent for local governments to exclusively look to the federal government for revenue to establish or maintain programs whose benefits have a local reach. This study sought to establish the efficiency of a Revenue Collection Automation App that was designed on the development Oredo and Egor local councils. Trend analysis was used to bring out the comparison between the period before and after automation of revenue collection in Oredo and Egor Local Government Areas (LGAs). Content analysis was used to analyze the primary data from the interviews. Chi-square was used to test whether the change in the level of revenue collection automation has a relationship to the increase in revenue collection in both Oredo and Egor LGAs, respectively. The study established that impl...
The increase in authentication models to secure systems has led to the need to develop quality mo... more The increase in authentication models to secure systems has led to the need to develop quality models for evaluating these authentication models. Past research in software products quality is focused on five different perspectives: product perspective, user perspective, valuebased perspective, transcendental perspective, and manufacturing perspective. Generally, the qualities of these software products are required for three types of audience: manager, developer, and user. Nevertheless, most software quality models combine the different points of views and some researchers target more than one type of audience. This research study is focus on establishing corresponding characteristics of user authentication models (UAMs) and software product quality models. The aim is to propose a framework for measuring the quality of UAMs from users’ perspective. The proposed framework is applied in a survey that comparatively evaluates fingerprint biometrics, one-time password, token, username an...
– The complex nature of Ebola hemorrhagic fever (EHF), particularly at the early stages of its o... more – The complex nature of Ebola hemorrhagic fever (EHF), particularly at the early stages of its outbreak, makes it difficult to diagnose because it manifests symptoms that are similar to those commonly associated with other diseases. Diagnostic decisions of physicians are therefore subjective, calling for an intelligent system for the diagnosis of EHF. This study proposes a fuzzy logic system that takes account of human limitations of medical professionals in the diagnosis of EHF and evaluation of its Risk Level in patients. To achieve the aim of the study, a fuzzy logic- controlled system was designed and implemented using MATLAB fuzzy logic tool box. Input variables to the fuzzy logic controller are (i) patient ’s symptoms (PS), (ii) laboratory test results (TR), (iii) patient ’s itinerary history (PH), and (iv) number of days since initial infection (ND). The proposed system, which is able to diagnose EHF and evaluate its risk level in patients, shows varying output values as t...
Over the current century, recognition-based graphical password models (RGPM) that embed art-forms... more Over the current century, recognition-based graphical password models (RGPM) that embed art-forms in their interfaces have been designed to enable users to comply with fundamental usability and security requirements, yet users still find it a challenge to comply with these requirements. Though some studies have centered on humans as the weakest link in the security chain, recent assertions from the literature have shown that the choice of art-forms in graphical password models and allowing users to choose their own art-forms or click point within an art-form during authentication can have a direct effect on a system’s usability and security level. This study is a literature survey on RGPM. The occurrence of some important design attributes relating to RGPM are analyzed in order to determine unique design attributes that can be used as a framework to measure the quality RGPM from designers’ perspective. Our result shows that there exist 80 art-form design attributes that can be used ...
Many Nigerian universities are beset with the need for expansion but lack effective planning tech... more Many Nigerian universities are beset with the need for expansion but lack effective planning techniques to effectively utilize the meager finance available to plan towards expansion of facilities in order to accommodate the ever-increasing number of students’ population. In the quest to design effective strategic plans to guide the utilization of the limited funds allocations made available by the federal government, many Nigerian universities adopt statistical approaches like the ratio technique for making population projections. However, such statistical means are based on unrealistic assumptions and are not very suitable for predicting population growth due to the intrinsic chaos of population growth. This research work explores the use of Artificial Neural Networks in generating accurate student population projections from trends in student demographic data and implements a proposed model that achieves this purpose in a case study university. Results show that the proposed syste...
As organizations/institutions grow the need for an efficient monitoring software tool that scruti... more As organizations/institutions grow the need for an efficient monitoring software tool that scrutinizes the true identity and the attendance behaviour of staff and students arises. In most organizations, the conventional method of keeping time books and attendance registers has failed to achieve the desired success and as a result there are regular occurrences of identity irregularities and identity theft. In Nigeria, the trends of employing identification systems using textual information or the conventional fingerprint biometrics for identification have not proved to be effective. An identification system, which employs the use of fingerprint biometric that conducts a one-to-many pattern-matching to authenticate the claimed identity of an individual (student), is proposed in this paper. The system is designed to comprise of a three-level process; namely, a system module, algorithm module, and a user module. The digital representations of the fingerprint biometric data are captured at the system module level. At the algorithm module level, the fingerprint features are extracted for comparison with features stored in the system database. The user interacts with the system at the user module level. The program of implementation of the system is the version 6.0 of the Visual Basic. Results from the implementation reveal that the system has an execution time of 3.01 seconds, making it preferable to the manual system with an execution time of 30 seconds. Key Words : Biometrics, Pattern-matching Identification, Verification, Authentication, Fingerprints
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2021
Unstructured Supplementary service data (USSD), a capability built-in Global System for Mobile Co... more Unstructured Supplementary service data (USSD), a capability built-in Global System for Mobile Communication (GSM) mobile phones, is one of the technologies that make use of the direct PIN entry method. Sadly, the Direct PIN entry method is susceptible to shoulder surfing attacks. USSD technology is text-based, as a result, supports only authentication methods that are in plain text. As a result of this, existing user authentication models against shoulder surfing cannot be implemented on USSD technology. The user authentication model is an area of research interest as a result of the high level of insecurity associated with the proliferation of mobile-based services. The user authentication model has gained more research attention in recent years. Various authentication models against shoulder surfing attacks have been proposed, adopted, and implemented in recent years, yet the authentication model against shoulder surfing attacks that can be implemented in the USSD channel remains an area of research interest. Many existing Authentication models against Human shoulder surfing attacks are applications that use graphical, textual, and biometric (primary and soft) techniques that are based on, image display, image capturing, colors, and so on. In this paper, an attempt has been made to identify why a direct PIN entry method that is prone to attack is still implemented in the USSD channel while there are many strong authentication models against shoulder surfing attacks in existence. To do this, some existing authentication models against shoulder surfing attacks were analyzed and their model requirements identified.
In open and distance learning (ODL), students need to access different e-learning platforms daily... more In open and distance learning (ODL), students need to access different e-learning platforms daily in order to acquire knowledge and write examinations. In these situations, the Username and Password Model (UPM) is the most common authentication model. However, owing to the model's inability to prevent 'identity theft' and the vital need to authenticate and ascertain the true identity of students who register online, this article proposes a new authentication method, namely the Multipurpose Authentication Model (MAM). MAM is able to solve problems of identification in the midst of identity theft effectively. In the process it determines which part of the student's credentials act as 'watermarking' mechanisms to check whether completed examinations returned by students are authentic. In order to validate the effectiveness of MAM, a demonstration of a prototype of the system has been made, thus ensuring the practicability of the model.
Journal of the Nigerian Association of Mathematical Physics, 2011
System security assessment tools are either restricted to manual risk evaluation methodologies th... more System security assessment tools are either restricted to manual risk evaluation methodologies that are not appropriate for real-time application or used to determine the impact of certain events on the security status of networked systems. In this paper, we determine the strength of computer systems from the perspective of the authentication models employed at the user interface domain by introducing a novel approach to system risk assessment. We first establish the risk of a system as the composition of the risks of individual authentication factors employed for user authentication processes, providing a more formally defined model. Using Hidden Markov Models (HMMs) we characterize the likelihood of transitions between security states of systems with different levels of authentication factors and we provide soft evidence on the states of these systems by applying our security assessment tool to an existing multifactor authentication model. The results of the analysis and the empi...
Currently the „user name and password‟ model is used extensively in offline computing systems an... more Currently the „user name and password‟ model is used extensively in offline computing systems and online correspondence. However this is a weak method of authentication because users tend to generate textual passwords that are easy to remember, easy to crack and recycled across multiple accounts. To counteract user errors associated with password authentication, many projects focus on developing authentication models that make use of mnemonic passwords without carefully considering the implications. This paper presents an empirical investigation into users regular (RPs) and mnemonic passwords (MPs) and expressions and justifies the effectiveness of MPs over RPs using a generated MPs dictionary and a password algorithm. From the study a total of 121 users MPs were found in the MPs dictionary relating to respondents names, personal information, religious and family background, life‟s philosophy and goals, representing 11.49% of total dictionary size. This reveals the vulnerability o...
Journal of Computer Science and Its Application, 2012
Internet banking provides alternatives for faster delivery of banking services to a wider range o... more Internet banking provides alternatives for faster delivery of banking services to a wider range of customers. These services have attracted the attention of legitimate and illegitimate online banking practices. Customers are liable to criminal activities, fraud, thefts and other similar threats. Criminals focus on stealing user's online banking credentials because the username and password combination are relatively easy to acquire and utilize to access Internet banking accounts and commit financial fraud. To alert users, many banking sites are now including Security Indicators (SI) to their sites. This paper describes a user study conducted using questionnaires to investigate user's perception of factors influencing the effective implementation of existing SI objectives and evaluate the effectiveness of SI in banking web browsers using the Communication-Human Information Processing Model (C-HIP). Thirteen (13) banks in Nigeria were randomly selected for the study. Data analysis revealed that SI are not very effective at alerting and shielding users from revealing sensitive information to spoofed sites because 27(19.7%) of the 137 participants never even noticed that a warning appeared. These outcomes may help the management of banks develop effective security strategies for the future of electronic banking in Nigeria.
International Journal of Advanced Computer Science and Applications, 2012
Some teaching methods adopted for disseminating Information Communication Technology Related Cour... more Some teaching methods adopted for disseminating Information Communication Technology Related Courses (ICTRC) in institutions of learning have been observed to be inadequate in bringing about the right perception and performance in students. In order to qualitatively establish the efficiency of tutoring ICTRC, this study investigates the effect of ICT resources on students' perception and performance in ICTRC. Two hundred and forty-eight (248) students in the Department of Computer Science/ICT from two universities: a Federal and a Private University from the South-South region of Nigeria were used. A pre-test, post-test control group and quasi experimental design were utilized. Findings revealed that teaching ICTRC without using ICT resources are not effective at empowering the students with the right perception and the students are not enabled to perform to the best of their ability. Some recommendations are proffered encouraging ICT aided teaching strategies in Nigeria.
Object Oriented Systems (OOS) have been widely adopted in software engineering because of their s... more Object Oriented Systems (OOS) have been widely adopted in software engineering because of their superiority with respect to data extensibility. The present trend in the software engineering process (SEP) towards concurrent computing raises novel concerns for the facilities and technology available in database management systems for data representation suitable in a distributed computing environment that will maximize the productivity of software designs r elative to costs. This paper highlights the need for object - oriented database management systems and mechanism of OOS applicable in the SEP. The mobile cellular telephone has been used as a simple example to illustrate the method. Key Words: Object -Oriented, Database , Management , Systems, Computer , Application. Software and Engineering.
Canada is experiencing steady increases in the utilization of diagnostic laboratory services. An ... more Canada is experiencing steady increases in the utilization of diagnostic laboratory services. An interprovincial study demonstrated rising laboratory expenditures per capita over five years (1996/1997 to 2001/2002) in Ontario (8%), Manitoba (8%), Alberta (14%), Saskatchewan (15%), and British Columbia (34%). A 44% increase over four years (1997/1998 to 2001/2002) was shown in outpatient laboratory testing expenditures in British Columbia, exceeding growth in government budgets for the same period.
Journal of the Nigerian Association of Mathematical Physics, 2011
The increases in computerized mode of operations and the activities of identity attackers have no... more The increases in computerized mode of operations and the activities of identity attackers have not only affected the trust in computerized systems but have slowed down the adoption of both offline and online services. Today there is the risk of unauthorized access, fraud and inappropriate disclosure of sensitive data. Human resources and malicious applications steal user identity, potentially resulting in a direct loss of highly sensitive information and hard currency to affected victims. To protect sensitive information, commercial and corporate sites extensively employ the use of textual passwords, which when used over an encrypted connection is vulnerable to attacks. To counter some of these attacks, many corporate sites instruct users to make use of mnemonic passwords without carefully considering the implications. This paper describes the generation of a novel mnemonic password dictionary, and an empirical study performed to analyze the strength and effectiveness of regular pas...
In recent times, many organizations in Nigeria have been awakened with the enormous drive to go p... more In recent times, many organizations in Nigeria have been awakened with the enormous drive to go paperless, however the conversion to an absolute paperless environment has been an illusion in Nigeria as many individuals lack confidence in such systems. This paper examines the mode of processing information by 309 staffs and students of the University of Benin, verifies the level of difficulties encountered by the use of paperless or manual mode of processing information and compare the feasible time difference derived from adopting a paperless office environment with a traditional paper-based environment while carrying out office job functions that relates to paper activities, with the believe that this time reserves can be effectively utilized in other operation processes associated with the services provided. Results showed that despite the time gain in using automated systems as against using hard copy manuals for processing information, 71% of the respondents still use hard copy ...
Public revenue collection is an integral component of fiscal policy and administration in any eco... more Public revenue collection is an integral component of fiscal policy and administration in any economy because of its influence on national government operations and the grassroots. Research establishes that it is inconsistent for local governments to exclusively look to the federal government for revenue to establish or maintain programs whose benefits have a local reach. This study sought to establish the efficiency of a Revenue Collection Automation App that was designed on the development Oredo and Egor local councils. Trend analysis was used to bring out the comparison between the period before and after automation of revenue collection in Oredo and Egor Local Government Areas (LGAs). Content analysis was used to analyze the primary data from the interviews. Chi-square was used to test whether the change in the level of revenue collection automation has a relationship to the increase in revenue collection in both Oredo and Egor LGAs, respectively. The study established that impl...
The increase in authentication models to secure systems has led to the need to develop quality mo... more The increase in authentication models to secure systems has led to the need to develop quality models for evaluating these authentication models. Past research in software products quality is focused on five different perspectives: product perspective, user perspective, valuebased perspective, transcendental perspective, and manufacturing perspective. Generally, the qualities of these software products are required for three types of audience: manager, developer, and user. Nevertheless, most software quality models combine the different points of views and some researchers target more than one type of audience. This research study is focus on establishing corresponding characteristics of user authentication models (UAMs) and software product quality models. The aim is to propose a framework for measuring the quality of UAMs from users’ perspective. The proposed framework is applied in a survey that comparatively evaluates fingerprint biometrics, one-time password, token, username an...
– The complex nature of Ebola hemorrhagic fever (EHF), particularly at the early stages of its o... more – The complex nature of Ebola hemorrhagic fever (EHF), particularly at the early stages of its outbreak, makes it difficult to diagnose because it manifests symptoms that are similar to those commonly associated with other diseases. Diagnostic decisions of physicians are therefore subjective, calling for an intelligent system for the diagnosis of EHF. This study proposes a fuzzy logic system that takes account of human limitations of medical professionals in the diagnosis of EHF and evaluation of its Risk Level in patients. To achieve the aim of the study, a fuzzy logic- controlled system was designed and implemented using MATLAB fuzzy logic tool box. Input variables to the fuzzy logic controller are (i) patient ’s symptoms (PS), (ii) laboratory test results (TR), (iii) patient ’s itinerary history (PH), and (iv) number of days since initial infection (ND). The proposed system, which is able to diagnose EHF and evaluate its risk level in patients, shows varying output values as t...
Over the current century, recognition-based graphical password models (RGPM) that embed art-forms... more Over the current century, recognition-based graphical password models (RGPM) that embed art-forms in their interfaces have been designed to enable users to comply with fundamental usability and security requirements, yet users still find it a challenge to comply with these requirements. Though some studies have centered on humans as the weakest link in the security chain, recent assertions from the literature have shown that the choice of art-forms in graphical password models and allowing users to choose their own art-forms or click point within an art-form during authentication can have a direct effect on a system’s usability and security level. This study is a literature survey on RGPM. The occurrence of some important design attributes relating to RGPM are analyzed in order to determine unique design attributes that can be used as a framework to measure the quality RGPM from designers’ perspective. Our result shows that there exist 80 art-form design attributes that can be used ...
Many Nigerian universities are beset with the need for expansion but lack effective planning tech... more Many Nigerian universities are beset with the need for expansion but lack effective planning techniques to effectively utilize the meager finance available to plan towards expansion of facilities in order to accommodate the ever-increasing number of students’ population. In the quest to design effective strategic plans to guide the utilization of the limited funds allocations made available by the federal government, many Nigerian universities adopt statistical approaches like the ratio technique for making population projections. However, such statistical means are based on unrealistic assumptions and are not very suitable for predicting population growth due to the intrinsic chaos of population growth. This research work explores the use of Artificial Neural Networks in generating accurate student population projections from trends in student demographic data and implements a proposed model that achieves this purpose in a case study university. Results show that the proposed syste...
Uploads
Papers by Annie Egwali