- Cyber Security, Grid Computing, Cloud Computing, Machine Learning, Network Security, Fault Tolerant Computing, and 22 moreFault Detection, Fault Tolerant Control, Fault Tolerance In Cloud Computing, Resource Allocation, Optimization techniques, Particle Swarm Optimization, Meta-heuristics, Heuristic and Meta-heuristic Algorithms, Meta-Heuristics (Tabu Search, Genetic Algorithms, Simulated Annealing, Ant-Colony, Particle Swarm Optimization), Optimization Techniques: Genetic Algorithm; Differential Evolution, Human Resource Management, Strategic Human Resource Management, Scheduling, Mobile Cloud Computing, Cloud, Cloud Computing Security, Cloud Security, Security in Cloud Computing, Task scheduling algorithms in Cloud computing systems, Job Scheduling on Grid Computing and Cloud Computing, Web Mining and Cloud Computing, and Cloud Computing and Virtualizationedit
- Shafi’i Muhammad ABDULHAMID received his PhD in Computer Science from Universiti Teknologi Malaysia (UTM), MSc in Com... moreShafi’i Muhammad ABDULHAMID received his PhD in Computer Science from Universiti Teknologi Malaysia (UTM), MSc in Computer Science from Bayero University Kano (BUK), Nigeria and a Bachelor of Technology in Mathematics/Computer Science from the Federal University of Technology Minna, Nigeria. His current research interests are in Cyber Security, Cloud computing, Soft Computing and BigData. He has published many academic papers in reputable International journals, conference proceedings and book chapters. He has been appointed as an Editorial board member for UPI JCSIT and IJTRD. He has also been appointed as a reviewer of several ISI and Scopus indexed International journals such as JNCA Elsevier, EIJ Elsevier, JKSU-CIS Elsevier, IJNS, IJST, IJCT, JITE:Research, JITE:IIP, JAIT, IJAER and JCEIT SciTechnol. He is a member of IEEE, International Association of Computer Science and Information Technology (IACSIT), Computer Professionals Registration Council of Nigeria (CPN), International Association of Engineers (IAENG), The Internet Society (ISOC), Cyber Security Experts Association of Nigeria (CSEAN) and Nigerian Computer Society (NCS). Presently he is a lecturer at the Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.edit
- Prof. Dr. Muhammad Shafie Abd Latiff (UTM Malaysia)edit
Exponential growth experienced in Internet usage have pave way to exploit users of the Internet, phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false... more
Exponential growth experienced in Internet usage have pave way to exploit users of the Internet, phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false positive rate and low accuracy has been a setback in phishing detection. In this research RandomForest, SysFor, SPAARC, RepTree, RandomTree, LMT, ForestPA, JRip, PART, NNge, OneR, AdaBoostM1, RotationForest, LogitBoost, RseslibKnn, LibSVM, and BayesNet were employed to achieve the comparative analysis of machine classifier. The performance of the classifier algorithms were rated using Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operation Characteristics Area, Root Relative Squared Error False Positive Rate and True Positive Rate using WEKA data mining tool. The research revealed that quit a number of classifiers also exist which if properly explored will yield more accurate results for phishing detection. RondomForest was...
Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique-of humpback whales-for solving the complex optimization problems. It has been... more
Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique-of humpback whales-for solving the complex optimization problems. It has been widely accepted swarm intelligence technique in various engineering fields due to its simple structure, less required operator, fast convergence speed and better balancing capability between exploration and exploitation phases. Owing to its optimal performance and efficiency, the applications of the algorithm have extensively been utilized in multidisciplinary fields in the recent past. This paper investigates further into WOA of its applications, modifications, and hybridizations across various fields of engineering. The description of the strengths, weaknesses and opportunities to support future research are also explored. The Systematic Literature Review is opted as a method to disseminate the findings and gap from the existing literature. The authors...
Research Interests:
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity,... more
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.
Research Interests:
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure, application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level... more
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure, application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level of security such as privacy, confidentiality and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as when needed.
Research Interests:
Research Interests:
Dynamic topology change and decentralized makes routing a challenging task in mobile ad hoc network. Energy efficient routing is the most challenging task in MANET due to limited energy of mobile nodes. Limited power of batteries... more
Dynamic topology change and decentralized makes routing a challenging task in mobile ad hoc network. Energy efficient routing is the most challenging task in MANET due to limited energy of mobile nodes. Limited power of batteries typically use in MANET, and this is not easy to change or replace while running communication. Network disorder can occur for many factors but in middle of these factors deficiency of energy is the most significant one for causing broken links and early partition of the network. Evenly distribution of power between nodes could enhance the lifetime of the network, which leads to improving overall network transmission and minimizes the connection request. To discourse this issue, we propose an Energy Aware Routing Protocol (EARP) which considers node energy in route searching process and chooses nodes with higher energy levels. The EARP aim is to establish the shortest route from source to destination that contains energy efficient nodes. The performance of E...
Research Interests:
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to... more
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to investigate the prevalence of spam SMS, with focus on Nigeria. To quantify the prevalence, primary data was collected using questionnaire. Out of 270 surveyed, the responses of 191 mobile users were valid and analyzed. The study revealed that all mobile subscribers receive spam SMS, receiving an average of 2.45 spam SMS daily. This implies an average of 334,857,685 spam SMS received daily in Nigeria. However, most are for commercial purposes. Few mobile users report cases of fraudulent spam SMS, including those with SMShing intent, to network providers or security agencies. Most believe customers of mobile networks should reserve the right to determine the type of unsolicited SMS to be received, and unsolicited advertorial/promotional SMS should be regulated. Current guidelines and regulations need to be reviewed, to effectively manage spamming activities in Nigeria.
Research Interests:
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows... more
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows stronger. In this paper, we looked at the structure and components of the member profile and the challenges of privacy issues faced by individuals and governments that participate in social networking. We also looked at how it can be used to distort national security, how it became the new weapons of mass mobilization and also how social networks have became the rallying forces for revolutions and social justice.
Research Interests:
Deep learning is presently attracting extra ordinary attention from both the industry and the academia. The optimization of deep learning models through nature inspired algorithms is a subject of debate in computer science. In this paper... more
Deep learning is presently attracting extra ordinary attention from both the industry and the academia. The optimization of deep learning models through nature inspired algorithms is a subject of debate in computer science. In this paper , we present recent progress on the application of nature inspired algorithms in deep learning. The survey pointed out recent development issues, strengths, weaknesses and prospects for future research. A new taxonomy is created based on natured inspired algorithms for deep learning. The trend of the publications in this domain is depicted; it shows the research area is growing but slowly. The deep learning architectures not exploit by the nature inspired algorithms for optimization are unveiled. We believed that the survey can facilitate synergy between the nature inspired algorithms and deep learning research communities. As such, massive attention can be expected in a near future.
Research Interests:
Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science discipline. Symbiotic organisms search (SOS) algorithm is a recent metaheuristic... more
Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science discipline. Symbiotic organisms search (SOS) algorithm is a recent metaheuristic algorithm inspired by symbiotic interaction between organisms in an ecosystem. Organisms develop symbiotic relationships such as mutualism, commensalism, and parasitism for their survival in ecosystem. SOS was introduced to solve continuous benchmark and engineering problems. The SOS has been shown to be robust and has faster convergence speed when compared with genetic algorithm, particle swarm optimization, differential evolution, and artificial bee colony which are the traditional metaheuristic algorithms. The interests of researchers in using SOS for handling optimization problems are increasing day by day, due to its successful application in solving optimization problems in science and engineering fields. Therefore, this paper presents a comprehensive survey of SOS advances and its applications, and this will be of benefit to the researchers engaged in the study of SOS algorithm.
Research Interests:
In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is... more
In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is likely to encounter. It was discovered that though the majority of financial institution users are familiar with the possible risk associated with some banking transaction, some aspect still exists that financial institution users are not familiar with which serves as a vulnerable point that could be exploited. The study makes a recommendation for proper enlightenment of financial institution users so as to stay abreast with possible security challenge associated with some banking transaction processes to be able to mitigate possible exploit.
Research Interests:
Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of " big data ". ANN are known for their effectiveness and efficiency for small datasets, and this era of big data has... more
Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of " big data ". ANN are known for their effectiveness and efficiency for small datasets, and this era of big data has posed a challenge to the big data analytics using ANN. Recently, much research effort has been devoted to the application of ANN in big data analytics and is still ongoing, although it is in it is early stages. The purpose of this paper is to summarise recent progress, challenges and opportunities for future research. This paper presents a concise view of the state-of-the-art, challenges and future research opportunities regarding the applications of ANN in big data analytics, and reveals that progress has been made in this area. Our review points out the limitations of the previous approaches, the challenges in the ANN approaches in terms of their applications in big data analytics, several ANN architecture that have not yet been explored in big data analytics and opportunities for future research. We believe that this paper can serve as a yardstick for future progress on the applications of ANN in big data analytics as well as a starting point for new researchers with an interest in the exploration of ANN in big data analytics.
Research Interests:
—As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing... more
—As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing tools have become easily available on the internet, which has made people who are a novice in the field of image editing, to be capable of tampering with an image easily without leaving any visible clue or trace behind, which has led to increase in digital images losing authenticity. This has led to developing various techniques for tackling authenticity and integrity of forged images. In this paper, a robust and enhanced algorithm is been developed in detecting copy-move forgery, which is done by hybridizing block-based DCT (Discrete Cosine Transform) technique and a keypoint-based SURF (Speeded-Up Robust Feature)technique using the MATLAB platform. The performance of the above technique has been compared with DCT and SURF techniques as well as other hybridized techniques in terms of precision, recall, FPR and accuracy metrics using MICC-F220 dataset. This technique works by applying DCT to the forged image, with the main goal of enhancing the detection rate of such image and then SURF is applied to the resulting image with the main goal of detecting those areas that are been tampered with on the image. It has been observed that this paper's technique named HDS has an effective detection rate on the MICC-F220 dataset with multiple cloning attacks and other various attacks such as rotation, scaling, a combination of scaling plus rotation, blur, compression, and noise. Index Terms—Copy-move image forgery, block-based method, keypoint-based method, DCT, SURF
Research Interests:
The increase in the use of email in every day transactions for a lot of businesses or general communication due to its cost effectiveness and efficiency has made emails vulnerable to attacks including spamming. Spam emails also called... more
The increase in the use of email in every day transactions for a lot of businesses or general communication due to its cost effectiveness and efficiency has made emails vulnerable to attacks including spamming. Spam emails also called junk emails are unsolicited messages that are almost identical and sent to multiple recipients randomly. In this study, a performance analysis is done on some classification algorithms including: Bayesian Logistic Regression, Hidden Naï ve Bayes, Radial Basis Function (RBF) Network, Voted Perceptron, Lazy Bayesian Rule, Logit Boost, Rotation Forest, NNge, Logistic Model Tree, REP Tree, Naï ve Bayes, Multilayer Perceptron, Random Tree and J48. The performance of the algorithms were measured in terms of Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operator Characteristics Area and Root Relative Squared Error using WEKA data mining tool. To have a balanced view on the classification algorithms' performance, no feature selection or performance boosting method was employed. The research showed that a number of classification algorithms exist that if properly explored through feature selection means will yield more accurate results for email classification. Rotation Forest is found to be the classifier that gives the best accuracy of 94.2%. Though none of the algorithms did not achieve 100% accuracy in sorting spam emails, Rotation Forest has shown a near degree to achieving most accurate result.
Research Interests:
One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet. It resultant consequences are that it slow down... more
One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet. It resultant consequences are that it slow down internet services, makes it unavailable, and sometime destroy the systems. Most of the services it affects are online applications and procedures, system and network performance, emails and other system resources. The aim of this work is to detect and classify DDoS attack traffics and normal traffics using multi layered feed forward (FFANN) technique as a tool to develop model. The input parameters used for training the model are: service count, duration, protocol bit, destination byte, and source byte, while the output parameters are DDoS attack traffic or normal traffic. KDD99 dataset was used for the experiment. After the experiment the following results were gotten, 100% precision, 100% specificity rate, 100% classified rate, 99.97% sensitivity. The detection rate is 99.98%, error rate is 0.0179%, and inconclusive rate is 0%. The results above showed that the accuracy rate of the model in detecting DDoS attack is high when compared with that of the related works which recorded detection accuracy as 98%, sensitivity 96%, specificity 100% and precision 100%.
Research Interests:
Ministries, Department and Agencies (MDA " s) websites are useful constituents for information dissemination and citizen centric services. Various vulnerabilities exist in this websites. In this paper, vulnerabilities found in MDA " s... more
Ministries, Department and Agencies (MDA " s) websites are useful constituents for information dissemination and citizen centric services. Various vulnerabilities exist in this websites. In this paper, vulnerabilities found in MDA " s website are categorized and analyzed based on Open Web Application Security Project (OWASP) Top 10 to understand impact of these vulnerabilities on web security of MDA " s websites. In this study we have analyzed security pertaining to 10 MDA " s websites. We found vulnerabilities in all websites with different degree of security risk. To achieve the results we have cross tabulated vulnerabilities found in these websites with their security risk level. As a result the research work found that vulnerability A4-insecure direct object reference with 49% is the main contributor of web security risk in MDA " s websites. Apart from this it is clearly evident that majority of the vulnerabilities found in MDA " s websites belongs to informational risk group with 45.82% but still few high impacting vulnerabilities exists and needs to be handle without delay. Thus, the paper contributed towards the understanding of web security risk in MDA " s websites.
Research Interests:
The rapid rate of technology advancement cannot be left unnoticed especially when it comes to the ICT sector. Ironically, this has also brought about an increase in cybercrime worldwide, thus forensic agencies and analysts are constantly... more
The rapid rate of technology advancement cannot be left unnoticed especially when it comes to the ICT sector. Ironically, this has also brought about an increase in cybercrime worldwide, thus forensic agencies and analysts are constantly on the move to investigate and acquire evidences at various crime scenes. Amongst all digital devices relating to forensic analysis, mobile phones are one of the most troublesome. Acquiring, decoding and presenting information resident in mobile device is a complex and challenging process. Several tools and methods both commercial and open source have been and are being developed to ensure authenticity and integrity in mobile forensic investigation and evidence acquisition. However, the level of result accuracy of these tools based on the mobile platform must be understood before even employing them in an investigation process. This paper examines the Android and Windows phone platform comparing the accuracy level of information extracted.
Research Interests:
Mobile phone devices have become popular among every age and social grouping in every society and are utilised by lots of people for different purposes. As the design of Mobile phones are continually evolving due to advancement in present... more
Mobile phone devices have become popular among every age and social grouping in every society and are utilised by lots of people for different purposes. As the design of Mobile phones are continually evolving due to advancement in present technologies, applications that run on them are also being updated to fully utilise features on new devices. Due to the flexibility and portability coupled with applications that make communication easy and accessible, these devices are now mostly used to perform e-transactions, social networking and even criminal activities. One of such applications is WhatsApp which over various versions have tried to maintain the confidentiality and integrity of messages sent and received using WhatsApp. Securing of data from Criminals or unauthorized users called for constant updating of the encryption scheme of the SQLite database which is usually saved on the memory of the device on which it is installed. Over many updates of WhatsApp, the encryption has been changed from db.crypt, db.crypt5, db.crypt7, db.crypt8 to db.crypt12. There is need for forensic expert to constantly update their knowledge so as to get the needed information from the database. This study presents a forensic process of extracting WhatsApp data from db.crypt12, which is the latest SQLite Database encryption used by WhatsApp to secure stored communication data. The steps involve using some open source tools that can be downloaded for free on the internet.
Research Interests:
A particularly detrimental attack ravaging campus and ad hoc networks is the Sybil attack, where a node illegally claims more than one identity, targeting honest and genuine nodes, thereby weaken or disrupting the system. This research... more
A particularly detrimental attack ravaging campus and ad hoc networks is the Sybil attack, where a node illegally claims more than one identity, targeting honest and genuine nodes, thereby weaken or disrupting the system. This research work aimed at designing a mitigation mechanism to combat the attack on a Campus network (CANET). Setting threshold and checking for IP address spoofing by comparing nodes physical addresses is the focus of this work. The success of the algorithm is validated by simulation, and quality of service is guaranteed with regards to the detection rate and packet delivery ratio.
Research Interests:
In its simplest structure, cloud computing technology is a massive collection of connected servers residing in a datacenter and continuously changing to provide services to users on-demand through a front-end interface. The failure of... more
In its simplest structure, cloud computing technology is a massive collection of connected servers residing in a datacenter and continuously changing to provide services to users on-demand through a front-end interface. The failure of task during execution is no more an accident but a frequent attribute of scheduling systems in a large-scale distributed environment. Recently, some computational intelligence techniques have been mostly utilized to decipher the problems of scheduling in the cloud environment, but only a few emphasis on the issue of fault tolerance. This research paper puts forward a Checkpointed League Championship Algorithm (CPLCA) scheduling scheme to be used in the cloud computing system. It is a fault-tolerance aware task scheduling mechanisms using the checkpointing strategy in addition to tasks migration against unexpected independent task execution failure. The simulation results show that, the proposed CPLCA scheme produces an improvement of 41%, 33% and 23% as compared with the Ant Colony Optimization (ACO), Genetic Algorithm (GA) and the basic league championship algorithm (LCA) respectively as parametrically measured using the total average makespan of the schemes. Considering the total average response time of the schemes, the CPLCA scheme produces an improvement of 54%, 57% and 30% as compared with ACO, GA and LCA respectively. It also turns out significant failure decrease in jobs execution as measured in terms of failure metrics and performance improvement rate. From the results obtained, CPLCA provides an improvement in both tasks scheduling performance and provides failure awareness that is more appropriate for scheduling in the cloud computing model.
Research Interests:
Aim/Purpose Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of... more
Aim/Purpose Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution The researchers' aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems.
Research Interests:
Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries... more
Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries service providers in view of the fact that it upsets their clients or even causes them lose subscribers. By way of mitigating this practice, researchers have proposed several solutions for the detection and filtering of SMS spams. In this paper, we present a review of the currently available methods, challenges and future research directions on spam detection techniques, filtering and mitigation of mobile SMS spams. The existing research literature is critically reviewed and analysed. The most popular techniques for SMS spam detection, filtering and mitigation are compared, including the used datasets, their findings and limitations, and the future research directions are discussed. This review is designed to assist expert researchers to identify open areas that need further improvement.
Research Interests:
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to... more
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to investigate the prevalence of spam SMS, with focus on Nigeria. To quantify the prevalence, primary data was collected using questionnaire. Out of 270 surveyed, the responses of 191 mobile users were valid and analyzed. The study revealed that all mobile subscribers receive spam SMS, receiving an average of 2.45 spam SMS daily. This implies an average of 334,857,685 spam SMS received daily in Nigeria. However, most are for commercial purposes. Few mobile users report cases of fraudulent spam SMS, including those with SMShing intent, to network providers or security agencies. Most believe customers of mobile networks should reserve the right to determine the type of unsolicited SMS to be received, and unsolicited advertorial/promotional SMS should be regulated. Current guidelines and regulations need to be reviewed, to effectively manage spamming activities in Nigeria.
Research Interests:
Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing. In cloud computing, a number of tasks may need to be scheduled on different virtual machines in order to minimize makespan... more
Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing.
In cloud computing, a number of tasks may need to be scheduled on different virtual machines in
order to minimize makespan and increase system utilization. Task scheduling problem is NP-complete,
hence finding an exact solution is intractable especially for large task sizes. This paper presents a Discrete
Symbiotic Organism Search (DSOS) algorithm for optimal scheduling of tasks on cloud resources.
Symbiotic Organism Search (SOS) is a newly developed metaheuristic optimization technique for solving
numerical optimization problems. SOS mimics the symbiotic relationships (mutualism, commensalism,
and parasitism) exhibited by organisms in an ecosystem. Simulation results revealed that DSOS
outperforms Particle Swarm Optimization (PSO) which is one of the most popular heuristic optimization
techniques used for task scheduling problems. DSOS converges faster when the search gets larger which
makes it suitable for large-scale scheduling problems. Analysis of the proposed method conducted using
t-test showed that DSOS performance is significantly better than that of PSO particularly for large search
space.
In cloud computing, a number of tasks may need to be scheduled on different virtual machines in
order to minimize makespan and increase system utilization. Task scheduling problem is NP-complete,
hence finding an exact solution is intractable especially for large task sizes. This paper presents a Discrete
Symbiotic Organism Search (DSOS) algorithm for optimal scheduling of tasks on cloud resources.
Symbiotic Organism Search (SOS) is a newly developed metaheuristic optimization technique for solving
numerical optimization problems. SOS mimics the symbiotic relationships (mutualism, commensalism,
and parasitism) exhibited by organisms in an ecosystem. Simulation results revealed that DSOS
outperforms Particle Swarm Optimization (PSO) which is one of the most popular heuristic optimization
techniques used for task scheduling problems. DSOS converges faster when the search gets larger which
makes it suitable for large-scale scheduling problems. Analysis of the proposed method conducted using
t-test showed that DSOS performance is significantly better than that of PSO particularly for large search
space.
Research Interests:
Makespan minimization in tasks scheduling of infrastructure as a service (IaaS) cloud is an NP-hard problem. A number of techniques had been used in the past to optimize the makespan time of scheduled tasks in IaaS cloud, which is... more
Makespan minimization in tasks scheduling of infrastructure as a service (IaaS) cloud is an NP-hard problem. A number of techniques had been used in the past to optimize the makespan time of scheduled tasks in IaaS cloud, which is propotional to the execution cost billed to customers. In this paper, we proposed a League Championship Algorithm (LCA) based makespan time minimization scheduling technique in IaaS cloud. The LCA is a sports-inspired population based algorithmic framework for global optimization over a continuous search space. Three other existing algorithms that is, First Come First Served (FCFS), Last Job First (LJF) and Best Effort First (BEF) were used to evaluate the performance of the proposed algorithm. All algorithms under consideration assumed to be non-preemptive. The results obtained shows that, the LCA scheduling technique perform moderately better than the other algorithms in minimizing the makespan time of scheduled tasks in IaaS cloud.
Research Interests:
Cloud computing technology keeps evolving especially in the area of service delivery for provisioning of computing and storage resources. Infrastructure as a service (IaaS) cloud is used to provide virtual machines on-demand to cloud... more
Cloud computing technology keeps evolving especially in the area of service delivery for provisioning of computing and storage resources. Infrastructure as a service (IaaS) cloud is used to provide virtual machines on-demand to cloud users. This Cloud computing power can be enhanced by setting up a traditional Grid network within the virtual machines to be used by clients as on-demand Grid or Grid as a Service (GaaS) Cloud. The purpose of this study is to survey the various concepts and architectures used for the on-demand GaaS using IaaS Cloud. The GaaS combines the advantage of providing clients with model that is familiar to the traditional Grid, the computational ability and the pay as you use paradigm of the cloud, with the capability of flexible management of comp utational resources. This research presented in this paper will contribute as a guide in the design of future architectures and in the selection of models or methods for further researches.
Research Interests:
League Championship Algorithm (LCA) is a population based algorithmic framework for global optimization over a continuous search space first proposed by Kashan (2009). It is a Swam optimization algorithm. A general characteristic between... more
League Championship Algorithm (LCA) is a population based algorithmic framework for global optimization over a continuous search space first proposed by Kashan (2009). It is a Swam optimization algorithm. A general characteristic between all population based optimization algorithms similar to the LCA is that they both try to progress a population of achievable solutions to potential areas of the search space when seeking the optimization. LCA is a newly proposed stochastic population based algorithm for continuous global optimization which tries to imitate a championship situation where synthetic football clubs participate in an artificial league for a number of weeks. This algorithm has been tested in many areas and performed creditably well as compared to other known optimization schemes or heuristics algorithms.
Research Interests:
Negative selection algorithms (NSAs) are inspired by artificial immune system. It creates techniques that aim at developing the immune based model. This is done by distinguishing self from non-self spam in the generation of detectors. In... more
Negative selection algorithms (NSAs) are inspired by artificial immune system. It creates techniques that aim at developing the immune based model. This is done by distinguishing self from non-self spam in the generation of detectors. In general, NSAs has an exponential run time. This research study the significance of time and accuracy for two commonly used matching rules. The hamming and r-chunk matching rules, based on different threshold values (r) for generating set of fixed number of detectors. The results show the differences between the mean values of time and accuracy for hamming and r-chunk matching rules. Statistical t test shows that the difference between hamming and r-chunk matching rule are insignificant for accuracy while it is significant for time.
Research Interests:
The Infrastructure as a service (IaaS) Cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the Cloud computing paradigm of pay-per-use. When the IaaS is now utilized... more
The Infrastructure as a service (IaaS) Cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the Cloud computing paradigm of pay-per-use. When the IaaS is now utilized to build a traditional Grid network within the cloud environment, it is now called an on-demand Grid as a service (GaaS) Cloud. In the on-demand GaaS Cloud, a user may use hundred of thousand of Grid nodes to implement a job, therefore manual scheduling is not a feasible scheduling solution. The main objective of this review is to study the various concepts and scheduling algorithms used for the on-demand GaaS Cloud in relation to the scheduling parameters used by existing researches. We also survey the Cloud infrastructures, Grid middlewares and the issues addressed by different researchers in the past within this domain of research. Our contribution will thus be of assistance in understanding the key scheduling algorithms and parameters for potential future enhancements in this evolving area of research.
Research Interests:
Fog computing is a recent model of computing, in a distributed way that extends the cloud computing operation to the network edges. Fog computing enables storage execution and tasks processing, which relies on the cooperation of users... more
Fog computing is a recent model of computing, in a distributed way that extends the cloud computing operation to the network edges. Fog computing enables storage execution and tasks processing, which relies on the cooperation of users and resource sharing among various devices. The fog being the new shift to cloud computing addresses some critical challenges associated with cloud model by providing notable advantages which are location sensitivity, latency minimization, geographical accessibility, wireless connectivity, mobility support and improved data streaming. Nevertheless, fog computing concept is never an option for replacing cloud computing model. In spite of the attractive solutions found in fog computing, it also inherited some security problems from the cloud. Most of the proposed techniques to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. A fog computing security approach that is based on man- in- the middle attack using Dragonfly algorithm (DA) detection algorithm is conceptualized here. This paper is a framework for detection of MITM attacks that exist between the fog nodes and the cloud and vice versa using swarm intelligence optimization techniques called the DA algorithm which is be implemented on the platform of ifogsim simulator.
Research Interests:
Security Risk management in online shopping mall has significant influence on business performance. Regardless of the security risk, threats and vulnerabilities users are exposed to, customers and shoppers still find the e-commerce... more
Security Risk management in online shopping mall has significant influence on business performance. Regardless of the security risk, threats and vulnerabilities users are exposed to, customers and shoppers still find the e-commerce platform useful and most convenient. This study seeks to address user satisfaction in relation to security analysis and management using SHOPRITE Nigeria as a case study. Questionnaires were sent out and respondents data was collected via Whatsapp application. Using Cronbach's Alpha, the statistical reliability and accuracy outcome was determined. This study proved that customers are satisfied with the security risk management of SHOPRITE Nigeria and therefore feel safe to shop both online and offline