OWL Formalization of Cases: An Improved Case-Based Reasoning in Diagnosing and Treatment of Breast Cancer

Abstract: Case base reasoning is an artificial intelligence (AI) paradigm that has proven to be a relevant technique in various fields of reasoning especially medical diagnosis. The technique provides solutions/answers to new problem through comparison of repository of finite set of known solved cases. Cases in the repository/case-store that share similar features with the new

Brainwave Authentication

Abstract: Though brainwave authentication technique is still a growing area of biometric authentication but it has been established that it is most reliable means of authenticating computer users. More works need to be done in a bit to make brainwave acquiring by electroencephalogram (EEG) available at affordable price and less prone to noise. This paper

A Metamorphic Malware Detection System

Abstract: Malware is the major cause of data breaches, resulting in financial losses in excess of $400 billion in 2017. The key ones, eluding malware scanners, are metamorphic. Malware metamorphic engines use varying obfuscating techniques to evade virus scanners. Current detection solutions are not effective against metamorphic malware. This study investigated metamorphic malware intrusions and

Hybrid Cryptosystem for Multibiometric Authentication and Template Protection

Abstract: This paper proposes and implements a multilayer authentication and template protection scheme known as the hybrid scheme. The hybrid scheme is based on the integration of modified shielding function with matrix transformation. It is a 2-in-1 approach which provides good recognition accuracy, security of stored templates and user privacy. The recognition accuracy of the

An Enhanced Pattern-based Detection of Computer Virus

Abstract; Technological advancement over the years has engineered the absolute dependence of existing vital information systems upon the internet. Moreover, while this has facilitated civilization and made life a lot easier, certain accruing distresses are being experienced with the use thereof. Amongst these distress vectors is the computer virus; whose proliferation in recent times has