Volume 1, Issue 4 by Bello A Buhari
Reverse engineering for software is the process of analyzing a program in an effort to create a r... more Reverse engineering for software is the process of analyzing a program in an effort to create a representation of the program at a
higher level of abstraction than source code. Reverse engineering is a process of design recovery. Reverse engineering tools extract data,
architectural, and procedural design information from an existing program. This paper explores the application of reverse engineering in
recovering the design of a legacy student information system developed using Dbase V atUsmanuDanfodiyo University Sokoto using UML
based approach. Use case model is used in recovering the design specifications (i.e., functionalities)of the student information system. In
addition,object oriented design model for the system is proposed using class diagramso that the system can be implemented using object
oriented programming.
The advent of e-commerce has created new financial needs that in many cases cannot be effectively... more The advent of e-commerce has created new financial needs that in many cases cannot be effectively
fulfilled by traditional payment systems. Prepaid cards, originally conceived as a convenient way
for consumers to pay for telephony access, are currently being repurposed for general use as
payment mechanism on the Internet. The significance of Authorization and Importance of
encryption influence the perceived security of E-finance transactions. In this paper we consider
scratch-off card (scratch card) used for institutions online registration payment taking Nigeria as
the case study. We develop a new approach for adding more security to the current prepaid scratch
card payment approach used for online registrations. We added the use alphanumeric code instead
of serial number, which is cumbersome considering the number of generated scratch cards every
year. In addition, we employ standard security mechanism using MD5 cryptographic hash function
to encrypt the scratch card details saved in the database. This will enhanced the security of the
prepaid scratch card payment system. We describe the current approach and proposed approach
using activity diagram.
This research investigates the level of awareness on ICT among secondary school teachers. It focu... more This research investigates the level of awareness on ICT among secondary school teachers. It focuses on the secondary school teachers in Nigerian context specifically Sokoto metropolis. In undertaking this research, a sample of four hundred (400) questionnaires was distributed to selected secondary school teachers of which 365 copies of the questionnaires were duly answered and returned by the respondents. Hence, these data were analyzed using simple frequencies, percentages and chi-square methods. Conclusively, this research has shown that level ICT penetrating Sokoto state secondary school teachers is growing rapidly. Also majority of secondary schools have ICT facilities. But the level of ICT training to teachers is fair because the difference between trained teachers and untrained teachers is negligible. In addition, very few numbers of teachers are not using ICT facilities in teaching and learning. This is identified to be attributed to lack of proper training on how to use the available ICT facilities and constant power supply. It is recommended that proper training should be continuously given to all staff in all levels on how to use the available ICT facilities. Furthermore, constant power supply should be provided to enable teachers to use these ICT facilities any time required.
Papers by Bello A Buhari
International Journal of Wireless and Microwave Technologies, Feb 8, 2020
Nowadays, there is a need for an efficient and effective way in which computers are interconnecte... more Nowadays, there is a need for an efficient and effective way in which computers are interconnected. In National Open University Sokoto Study Center network there exist problems such as: more traffic which may slower the network performance, bandwidth wastage and security problems because the host and servers that are connected to Layer 2 switch are part of the same network segment. To resolve these problems we identify the networking media that best suits the network to enable person-to-person communication, determine the best network architecture that would enable effective resource sharing between all staff offices, design respective VLANs for different units, configure network addresses for each units and identify configurations required on router and switches to create VLAN's and Inter VLANrouting. After the implementation of proposed Virtual Local Area Network in ICT unit of National Open University Sokoto study center, effective resource sharing and communication is achieved. Hence, implementation of this study is practically cost effective.
Several methodologies have often been developed in response to new ideas about how to survive wit... more Several methodologies have often been developed in response to new ideas about how to survive with the inherent complexity of software systems. Object oriented design methodology is one of the latest methodologies that brought about evolutionary systems. This paper adopts the standard object oriented modeling approach called Unified Modeling Language (UML). Disadvantages of manual systems are well known. In addition, there are many computerized systems that are not automatic. That is, they only help in keeping up-to-date records of activities and processing. We proposed an object oriented models for Automatic Staff Promotion Management and Evaluation System of Usmanu Danfodiyo University, Sokoto. We first create Activity diagrams to show the overall flow of control in the system. And later create Sequence diagrams to describe how objects, or groups of objects, interact within the proposed system.
International Journal of Advanced Networking and Applications
The increasingly frequent attacks on Internet visible systems are attempts to breach or compromis... more The increasingly frequent attacks on Internet visible systems are attempts to breach or compromise the security of those systems. Network security issues have been a major challenge on Usmanu Danfodiyo University networks for a long time. Intrusion detection system allows organizations to protect themselves from losses associated with network security challenges. The aim and objectives of this project is to deploy and evaluate the performance of SNORT-IDS system in safeguarding demilitarize zone network segment of Usmanu Danfodiyo University. SNORT-IDS were implemented using some various tools such as Snort Application, Pulledpork, Barnyard, Apache, MySQL, PHP, BASE, and ADODB. The result obtained from the system evaluation indicates that Snortids system is able to detect suspicious trafficby 97%.
International Journal of Security and Privacy in Pervasive Computing
This research performs a literature survey of remote user authentication researches based on smar... more This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size, portability, convenience of non-volatile memory, and security provided by a single chip computer embedded in a plastic card. The most efficient schemes are those that used hash function or ECC. The high cost of the cards and readers and their deployment remains a burden to issuers or users. This is what motivates the use of external memory instead of smart card. But the problem of non-temper resistance property associated with external memory limited researches in that direction. There are also, absence of other activities that are essential in user authentication such as forgot/reset password and re-registration in case the external memory or smart card is stolen or lost in all the reviewed researches.
International Journal of Advanced Networking and Applications
Diabetes or Diabetes Mellitus (DM) is noxious diseases in the world. Diabetes is caused by obesit... more Diabetes or Diabetes Mellitus (DM) is noxious diseases in the world. Diabetes is caused by obesity or high blood glucose level, lack of exercise and so forth. It can be manage if it’s detected at early state. Machine learning is the construction of computer system or program that can adapt and learn from their experience. PIMA dataset is used in this research works. The dataset contains some 9 attributes of 768 patients. There are different kinds of machine learning algorithms but in this research works we choose three algorithms which are under supervised learning. The algorithms are Logistic regression, Decision tree and Random forest. Each of these algorithms model were trained and tested. We later use some measure to compare and analyze the performance of the machine learning algorithms. The performance measures used are Accuracy, F-measure, Recall and Precision. Logistic Regression has the highest accuracy score which is 77%, also have the highest precision score 0.77 and have ...
This research deals with the design and implementation of an improved e-learning system taking Co... more This research deals with the design and implementation of an improved e-learning system taking Computer Science Unit, Mathematics Department of Usmanu Danfodiyo University, Sokoto as the case study. It allows upload of learning materials online and give room for one-on-one interaction with the lecturer by creating an avenue for the students to ask questions and get their answers online. The system is aimed at being user-friendly, reliable and improved with better specifications. The e-learning system is designed using HTML, CSS, PHP, Ajax, and MySQL. To ensure proper interaction between students and lecturers, this proposed system incorporate audio calls to lecturers through Skype and also video conferencing through webinar (Web Based Seminar); a software that enables lecturers deliver lecture live. It gives the system the ability to give, receive, and discuss information in real time.
Key distribution is the strength of any cryptographic system as the security of any communication... more Key distribution is the strength of any cryptographic system as the security of any communication is totally depends on the secret key. Therefore, it is important to have secure key distribution system because if the key get compromised then whole system will get compromised. This research proposed Elgamal cryptographic scheme base on Quantum Key Distribution (QKD). DiffieHellman key exchange the initial key exchange employed by Elgamal is replaced with QKD. The QKD is used to generate and distribute the quantum key to be used by the receiver (Fatima) to encrypt the public key that is to be sent to sender (Abubakar) using Blowfish algorithm. The QK is also the key to be used by Blowfish to decrypt the public key that is going to be used in the encryption of the message M using Elgamal. The security of the proposed system is also discussed in the last section of this research. There is going to be a performance overhead because of the additional encryption and decryption of the publi...
International Journal of Scientific Research in Science and Technology, 2015
This research investigates the level of awareness on ICT among secondary school teachers. It focu... more This research investigates the level of awareness on ICT among secondary school teachers. It focuses on the secondary school teachers in Nigerian context specifically Sokoto metropolis. In undertaking this research, a sample of four hundred (400) questionnaires was distributed to selected secondary school teachers of which 365 copies of the questionnaires were duly answered and returned by the respondents. Hence, these data were analyzed using simple frequencies, percentages and chi-square methods. Conclusively, this research has shown that level ICT penetrating Sokoto state secondary school teachers is growing rapidly. Also majority of secondary schools have ICT facilities. But the level of ICT training to teachers is fair because the difference between trained teachers and untrained teachers is negligible. In addition, very few numbers of teachers are not using ICT facilities in teaching and learning. This is identified to be attributed to lack of proper training on how to use the...
Saudi Journal of Engineering and Technology, 2019
People are transferring large amount of data that are critical and consume large amount of time t... more People are transferring large amount of data that are critical and consume large amount of time through the Internet such as email, banking transaction and online purchase. But due to high exposure they are susceptible to being heavily attacked or become attractive targets for attackers. This can be solved by using a modern phenomenon called symmetric encryption. Symmetric encryption is used to ensure that information is hidden from anyone for whom it is not intended. This research conducted a performance evaluation of symmetric data encryption algorithms namely Advanced Encryption Standard (AES) and Blowfish. The evaluation is done for four different data types: image data type, audio data types, video data types and textual file data types. The performance evaluation metrics are encryption time and throughput. The prototype is developed using JAVA, compiled using the Netbeans IDE7.1.2 with default settings in jdk 7.1 development kit. Results obtained from this evaluation indicated that blowfish is more efficient than AES. But for Blowfish the encryption time sometime decreases with the increase in data size. This can be attributed to the fact that Blowfish uses 126, 192 or 256 key sizes.
Reverse engineering for software is the process of analyzing a program in an effort to create a r... more Reverse engineering for software is the process of analyzing a program in an effort to create a representation of the program at a higher level of abstraction than source code. Reverse engineering is a process of design recovery. Reverse engineering tools extract data, architectural, and procedural design information from an existing program. This paper explores the application of reverse engineering in recovering the design of a legacy student information system developed using Dbase V at Usmanu Danfodiyo University Sokoto using UML based approach. Use case model is used in recovering the design specifications (i.e., functionalities)of the student information system. In addition,object oriented design model for the system is proposed using class diagram so that the system can be implemented using object oriented programming.
The advent of e-commerce has created new financial needs that in many cases cannot be effectively... more The advent of e-commerce has created new financial needs that in many cases cannot be effectively fulfilled by traditional payment systems. Prepaid cards, originally conceived as a convenient way for consumers to pay for telephony access, are currently being repurposed for general use as payment mechanism on the Internet. The significance of Authorization and Importance of encryption influence the perceived security of E-finance transactions. In this paper we consider scratch-off card (scratch card) used for institutions online registration payment taking Nigeria as the case study. We develop a new approach for adding more security to the current prepaid scratch card payment approach used for online registrations. We added the use alphanumeric code instead of serial number, which is cumbersome considering the number of generated scratch cards every year. In addition, we employ standard security mechanism using MD5 cryptographic hash function to encrypt the scratch card details saved...
Mobile social network poses new challenges to the educational sector that needs careful understan... more Mobile social network poses new challenges to the educational sector that needs careful understanding andapproach to address. The aim of this paper is to assess the trend of mobile social networks usage among secondary schools student within Sokoto metropolis and how it affects their academic performance. The research was conducted in some selected secondary schools consisting of students aged 14 to 19. The experimental result shows our study revealed that, mobile social networks typically affects most of the student performance that are addicted to mobile social networking sites, especially those that cannot spend even a day without visiting the sites. This makes them to neglect most of their school activities based on the results of the questionnaire obtained in this study. Hence, the paper recommends that, mobile social network can be a very good tool for supporting learning activities to the students, provided there is appropriate guidance and monitoring from both parents and te...
This research deals with the design and implementation of an improved e-learning system taking Co... more This research deals with the design and implementation of an improved e-learning system taking Computer Science Unit, Mathematics Department of Usmanu Danfodiyo University, Sokoto as the case study. It allows upload of learning materials online and give room for one-on-one interaction with the lecturer by creating an avenue for the students to ask questions and get their answers online. The system is aimed at being user-friendly, reliable and improved with better specifications. The e-learning system is designed using HTML, CSS, PHP, Ajax, and MySQL. To ensure proper interaction between students and lecturers, this proposed system incorporate audio calls to lecturers through Skype and also video conferencing through webinar (Web Based Seminar); a software that enables lecturers deliver lecture live. It gives the system the ability to give, receive, and discuss information in real time.
International Journal of Wireless and Microwave Technologies, Feb 8, 2020
Nowadays, there is a need for an efficient and effective way in which computers are interconnecte... more Nowadays, there is a need for an efficient and effective way in which computers are interconnected. In National Open University Sokoto Study Center network there exist problems such as: more traffic which may slower the network performance, bandwidth wastage and security problems because the host and servers that are connected to Layer 2 switch are part of the same network segment. To resolve these problems we identify the networking media that best suits the network to enable person-to-person communication, determine the best network architecture that would enable effective resource sharing between all staff offices, design respective VLANs for different units, configure network addresses for each units and identify configurations required on router and switches to create VLAN's and Inter VLANrouting. After the implementation of proposed Virtual Local Area Network in ICT unit of National Open University Sokoto study center, effective resource sharing and communication is achieved. Hence, implementation of this study is practically cost effective.
Mobile devices have become more powerful and pervasive which result in mobile application develop... more Mobile devices have become more powerful and pervasive which result in mobile application development to become more important. As a result of the popularization of mobile devices and mobile operating systems market, many applications are being developed and deployed on mobile devices. This has resulted in mobile applications becoming increasingly more present in our daily lives, allowing people to perform several tasks through the use of smart phones, tablets or equivalent devices. In particular, there are many mobile applications that help people to carry out payments. We notice, however, there is also the need for mobile applications that can be used for car parking payments within Abuja. In this paper, a cloud-based mobile application that support multiple platform is presented which enable drivers in Abuja to carry out parking payments using their mobile phones. The result of the system evaluation using some selected users demonstrated that the developed mobile application have most of the functionalities that can help drivers to easily register, manage their account details, securely pay for parking, monitor and extend parking sessions remotely. The proposed application also helps the driver to remember the exact location the vehicle was parked.
All praise and gratitude goes to Almighty Allah for sparing my life and guiding me all through to... more All praise and gratitude goes to Almighty Allah for sparing my life and guiding me all through to this moment. Peace and blessing of Allah be upon the Holy Prophet Muhammad, his family and companions. Blessing of Allah also be upon the men of God in every century till hereafter. I have no words to thank my parents for their endless concern and support in all life. May Allah reward them with paradise? My gratitude goes to my supervisor, Dr D.N Choji, for his patience and guidance through this research thesis. Also I wish to acknowledge Mr. A.A.
Uploads
Volume 1, Issue 4 by Bello A Buhari
higher level of abstraction than source code. Reverse engineering is a process of design recovery. Reverse engineering tools extract data,
architectural, and procedural design information from an existing program. This paper explores the application of reverse engineering in
recovering the design of a legacy student information system developed using Dbase V atUsmanuDanfodiyo University Sokoto using UML
based approach. Use case model is used in recovering the design specifications (i.e., functionalities)of the student information system. In
addition,object oriented design model for the system is proposed using class diagramso that the system can be implemented using object
oriented programming.
fulfilled by traditional payment systems. Prepaid cards, originally conceived as a convenient way
for consumers to pay for telephony access, are currently being repurposed for general use as
payment mechanism on the Internet. The significance of Authorization and Importance of
encryption influence the perceived security of E-finance transactions. In this paper we consider
scratch-off card (scratch card) used for institutions online registration payment taking Nigeria as
the case study. We develop a new approach for adding more security to the current prepaid scratch
card payment approach used for online registrations. We added the use alphanumeric code instead
of serial number, which is cumbersome considering the number of generated scratch cards every
year. In addition, we employ standard security mechanism using MD5 cryptographic hash function
to encrypt the scratch card details saved in the database. This will enhanced the security of the
prepaid scratch card payment system. We describe the current approach and proposed approach
using activity diagram.
Papers by Bello A Buhari
higher level of abstraction than source code. Reverse engineering is a process of design recovery. Reverse engineering tools extract data,
architectural, and procedural design information from an existing program. This paper explores the application of reverse engineering in
recovering the design of a legacy student information system developed using Dbase V atUsmanuDanfodiyo University Sokoto using UML
based approach. Use case model is used in recovering the design specifications (i.e., functionalities)of the student information system. In
addition,object oriented design model for the system is proposed using class diagramso that the system can be implemented using object
oriented programming.
fulfilled by traditional payment systems. Prepaid cards, originally conceived as a convenient way
for consumers to pay for telephony access, are currently being repurposed for general use as
payment mechanism on the Internet. The significance of Authorization and Importance of
encryption influence the perceived security of E-finance transactions. In this paper we consider
scratch-off card (scratch card) used for institutions online registration payment taking Nigeria as
the case study. We develop a new approach for adding more security to the current prepaid scratch
card payment approach used for online registrations. We added the use alphanumeric code instead
of serial number, which is cumbersome considering the number of generated scratch cards every
year. In addition, we employ standard security mechanism using MD5 cryptographic hash function
to encrypt the scratch card details saved in the database. This will enhanced the security of the
prepaid scratch card payment system. We describe the current approach and proposed approach
using activity diagram.