PICTURE PASSWORD: A SURROGATE TO PIN AUTHENTICATION SCHEME ON ANDROID PHONES

ABSTRACT An authentication system on Android devices provides access control to the devices. It screens access to the devices. The security system makes it sufficiently difficult for an unauthorized person to gain access to computing resources. This work proposes an authentication scheme that could substitute Personal Identity Number (PIN) based on Passfaces technology. The scheme

PERFORMANCE COMPARISON OF THE LTE AND WIMAX NETWORKS’ QOS IMPROVEMENT USING THROUGHPUT PARAMETER

ABSTRACT The worldwide interoperability for microwave access (WiMAX) and long-term evolution (LTE) technologies offer a solution to the growing demand for broadband wireless applications that enabled high-rate voice services at affordable rates and with good flexibility via IP-based networks. However, the existing Throughput for both LTE and WiMAX Networks does not give the end user

OVERSAMPLING-ADAPTIVE SEARCH OPTIMIZATION OF THE EXTREME GRADIENT BOOST MODEL ON AN IMBALANCED SPAM EMAIL DATASET

ABSTRACT Imbalanced datasets present a challenge for machine learning models as they can lead to bias towards the majority class, resulting in poor performance for the minority class. In this study, four variants of the Extreme Gradient Boost (XGBoost) model were developed: XGBoost Baseline Model, XGBoost Random Search, XGBoost Adaptive Search + SMOTE, and XGBoost

NIGERIA’S ENERGY GENERATION USING RENEWABLE SOURCES FOR A SUSTAINABLE DEVELOPMENT

ABSTRACT Nigeria consistently has unstable electricity supplies despite being a significant natural gas and petroleum exporter. In Nigeria, it is difficult to do business because of inefficient generation and distribution of power. In this sense, Nigeria acknowledges the significance of renewable and sustainable energy source to address its power deficit. Additionally, Nigeria has a long

IPSODAC: AUTOMATED PROTECTION OF IMAGES IN SOCIAL NETWORKS USING SENSITIVE OBJECT DETECTION AND ACCESS CONTROL

ABSTRACT Despite the introduction of various privacy tools by online social networks to safeguard users’ privacy and data, ensuring a high degree of privacy remains challenging because of the complexity and ambiguity of setting these privacy policies and tools. To solve this problem, a new model is proposed that automates the privacy settings process for

IoT-BASED DESIGN FOR PERSONAL ELECTRONIC HEALTH MONITORING SYSTEM FOR NIGERIA PRIMARY CARE

ABSTRACT This project is about a microcontroller-based Personal electronic health monitoring system used to monitors vital sign of patient remotely. The vital signs include heart rate, temperature and Electrocardiogram (ECG) measurement. The system measures the variation in blood volume at the fingertip using optical sensors after every heartbeat, and a pair of probes to measure

HEALTH STATUS PREDICTION SYSTEM FOR STRUCTURAL HERITAGES AND BUILDINGS: A COMPARATIVE ANALYSIS USING A DEEP AND MACHINE LEARNING MODEL

ABSTRACT Early detection of structural damage is essential for the maintenance, repair, and rehabilitation of the building. Yet, data science has emerged as a significant and useful technique for a number of civil engineering applications, such as structural health monitoring (SHM). As a result, the goal of this effort was to use a machine and