International Journal of Electronics Communication and Computer Engineering, 2023
One of the major goals of any organization or individual is to ensure the protection of their sen... more One of the major goals of any organization or individual is to ensure the protection of their sensitive data and privacy against any form of attack. It is well known that some of the secured encryption standard has been hacked. It would be worthwhile to improve on them by developing a security mechanism to strengthen them. The aim of this study is to develop a customized encryption and decryption solution using Artificial Neural Network. This security solution can be used separately or in combination with the existing encryption standards. The design and implementation of the encryption and decryption system was computed using the linear activation function of Artificial Neural Network. The encryption and decryption of data was tested for several kind of text messages and the results were accurate with no error. The encryption and decryption algorithm performed excellently well as programmed. In addition, the solution when combined with MD5 (Message-Digest-5) encryption standards improved on the security of data. Finally the implementation used in this research could function as a model that can be used in conjunction with other data encryption standard to enhance data security.
European Journal of Science, Innovation and Technology, 2023
The purpose of this research is to perform an in-depth comparative analysis on blockchain, centra... more The purpose of this research is to perform an in-depth comparative analysis on blockchain, centralized and distributed database management system so as to aid researchers ascertain the correct application of these technologies. Most practitioners are already familiar with centralized database system which is commonly used for general purposes. The findings in this study with respect to the features of blockchain and database were put together to develop a program flowchart that provides the sequence of steps to guide researchers in making the right decision for adopting any of the listed solutions. Furthermore, it was noted that blockchain has gained much attention in most sectors including the educational sector. From the critical review of over 200 articles in Google Scholar, the study was able to analyze ten key factors and drew inference from it to produce the table that summaries the key comparison factor for adopting blockchain or database. Finally, the resolve from the flowchart and the table could serve as a guide to any researcher interested in deploying any of these technologies to quickly make the right decision on when to use blockchain, centralized or distributed database management system.
European Journal of Electrical Engineering and Computer Science
Institutions globally, seek for a solution that intelligently manages the security of data withou... more Institutions globally, seek for a solution that intelligently manages the security of data without tampering or mutilations. To compete globally, It has become necessary for the educational sector in Nigeria to build a software solution to end the challenges of fake results, transcripts and certificates and the time it takes to verify their authenticity. This research aims to develop and implement a blockchain solution that would enforce the required security for the Centre for Information and Telecommunication Engineering, University of Port Harcourt (CITE, Uniport), Nigeria. In this study the various services that comprise the building of a decentralized blockchain network, the network consensus algorithm and block explorer application as a unit was put together using JavaScript and its associate libraries. The blockchain data structure was developed with the ability of proof of work, the mining of new blocks, the creation of transactions, the validation of the chain, retrieving t...
A smart microcomputer-based device was constructed and used to provide satisfactory control of el... more A smart microcomputer-based device was constructed and used to provide satisfactory control of electrically powered domestic gargets. This paper describes how to design a microcomputer-based controls device that can be used to control household equipment, which is more economical and easy to setup. The techniques and tools required for interfacing a microcomputer parallel port with other devices (peripheral) were obtained and the requirements were used to construct the smart device for controlling home appliances connected to it. The results showed that digitally controlled smart device have the potential of automating home appliances turning them on or off according to a predetermined value called a set-point.
American Journal of Electrical and Electronic Engineering, 2018
This paper considered a long term electric power load forecast for twenty years (20 years) projec... more This paper considered a long term electric power load forecast for twenty years (20 years) projection, in Nigeria power system using least-square regression and exponential regression model. The model is implemented in Matlab platform with a plot in residential load demand, commercial load demand and industrial load demand in (MW). In the quest for analysis and predicting the energy (power) demand (MW) requirement for a projection period of (2013 - 2032), data are collected between (2000 - 2012), from the Central Bank of Nigeria (CBN), and National Bureau of statistics (NBS). The results obtained shows that energy generated from the respective generating station including Egbin thermal power station Lagos, Sapele thermal power station etc. are grossly inadequate. This mismatch is a major problem in power system planning and operation. The result also shows that there is deviation between predicted energy demand (MW) and available power (or capacity allocated). The predicted energy d...
International Journal of Computer Trends and Technology, 2017
Nigeria obviously had been experiencing a high level of thuggery, insecurity and violence, less p... more Nigeria obviously had been experiencing a high level of thuggery, insecurity and violence, less participation in its electoral processes. An alternative method to conduct its election was used during its 2015 general elections and a lot of hitches were observed. This research work presents a biometric online voting system that can enhance the electoral processes and thereby provide fast, accurate and secured election results. The result of this research work is a system that will serve as a centralized server to other nodes and will be deployed on the World Wide Web (WWW) to make the internet voting possible.
ABSTRACT Gas turbines play prominent role in aviation, power generation, marine, mining, petroche... more ABSTRACT Gas turbines play prominent role in aviation, power generation, marine, mining, petrochemicals, onshore and offshore oil and gas industries. Environmental factors result to degradation mechanics of the overall performance of the engine. Industrialist therefore face unplanned equipment and manufacturing downtime which is undesirable because it leads to economic losses and costly repairs. While condition monitoring is used to obtain early warning of impending equipment failure, optimization techniques such as water washing (online and offline) are used to bring the engine/equipment back to lime-light. In this work, several schedule visits were made to a gas turbine plant on industrial duty for electricity generation in an offshore thermal station at Ibeno, near Eket, Akwa Ibom State in Nigeria. Continuous monitoring of the aerothermodynamics and vibration data were taken for a period of twelve months on hourly basis to examine the state of health of the engine due to adverse offshore environmental factors. The diagnostic approach of vibration analysis, trend and performance monitoring were used with a model-based mixed data approach for optimizing the performance of the offshore gas turbine plant.A software code-named VANCANAL written in C ++ programming language was used to proactively monitor the gas turbine plant. The software displayed the operational (actual) values of all the parameters of the engine against their designed (reference) values. Once a set limit is exceeded, the software is capable of giving an alarm, signifying the need for maintenance. 31 Nomenclature .. x = Acceleration vibration amplitude, mm/s 2 . x = Velocity vibration amplitude, mm/s m = Lumped mass of rotating system, Kg C = Damping coefficient constant, N.s/m x = Displacement vibration amplitude, mm Fo = Forcing function at initial frequency, Kg.m/s 2 k = Rotor shaft stiffness, KN.m/rad ω = Engine rotational speed, rad/s ωn = Natural damped frequency of vibration, rad/s st d = Elongation, m 1 P = Compressor inlet pressure, bar 2 P = Compressor outlet pressure, bar 1 T = Compressor inlet temperature, K 2 T = Compressor discharge temperature, K ' 2 T = Compressor isentropic temperature, C S = Entropy, KJ/KgK
International Journal of Electronics Communication and Computer Engineering, 2023
One of the major goals of any organization or individual is to ensure the protection of their sen... more One of the major goals of any organization or individual is to ensure the protection of their sensitive data and privacy against any form of attack. It is well known that some of the secured encryption standard has been hacked. It would be worthwhile to improve on them by developing a security mechanism to strengthen them. The aim of this study is to develop a customized encryption and decryption solution using Artificial Neural Network. This security solution can be used separately or in combination with the existing encryption standards. The design and implementation of the encryption and decryption system was computed using the linear activation function of Artificial Neural Network. The encryption and decryption of data was tested for several kind of text messages and the results were accurate with no error. The encryption and decryption algorithm performed excellently well as programmed. In addition, the solution when combined with MD5 (Message-Digest-5) encryption standards improved on the security of data. Finally the implementation used in this research could function as a model that can be used in conjunction with other data encryption standard to enhance data security.
European Journal of Science, Innovation and Technology, 2023
The purpose of this research is to perform an in-depth comparative analysis on blockchain, centra... more The purpose of this research is to perform an in-depth comparative analysis on blockchain, centralized and distributed database management system so as to aid researchers ascertain the correct application of these technologies. Most practitioners are already familiar with centralized database system which is commonly used for general purposes. The findings in this study with respect to the features of blockchain and database were put together to develop a program flowchart that provides the sequence of steps to guide researchers in making the right decision for adopting any of the listed solutions. Furthermore, it was noted that blockchain has gained much attention in most sectors including the educational sector. From the critical review of over 200 articles in Google Scholar, the study was able to analyze ten key factors and drew inference from it to produce the table that summaries the key comparison factor for adopting blockchain or database. Finally, the resolve from the flowchart and the table could serve as a guide to any researcher interested in deploying any of these technologies to quickly make the right decision on when to use blockchain, centralized or distributed database management system.
European Journal of Electrical Engineering and Computer Science
Institutions globally, seek for a solution that intelligently manages the security of data withou... more Institutions globally, seek for a solution that intelligently manages the security of data without tampering or mutilations. To compete globally, It has become necessary for the educational sector in Nigeria to build a software solution to end the challenges of fake results, transcripts and certificates and the time it takes to verify their authenticity. This research aims to develop and implement a blockchain solution that would enforce the required security for the Centre for Information and Telecommunication Engineering, University of Port Harcourt (CITE, Uniport), Nigeria. In this study the various services that comprise the building of a decentralized blockchain network, the network consensus algorithm and block explorer application as a unit was put together using JavaScript and its associate libraries. The blockchain data structure was developed with the ability of proof of work, the mining of new blocks, the creation of transactions, the validation of the chain, retrieving t...
A smart microcomputer-based device was constructed and used to provide satisfactory control of el... more A smart microcomputer-based device was constructed and used to provide satisfactory control of electrically powered domestic gargets. This paper describes how to design a microcomputer-based controls device that can be used to control household equipment, which is more economical and easy to setup. The techniques and tools required for interfacing a microcomputer parallel port with other devices (peripheral) were obtained and the requirements were used to construct the smart device for controlling home appliances connected to it. The results showed that digitally controlled smart device have the potential of automating home appliances turning them on or off according to a predetermined value called a set-point.
American Journal of Electrical and Electronic Engineering, 2018
This paper considered a long term electric power load forecast for twenty years (20 years) projec... more This paper considered a long term electric power load forecast for twenty years (20 years) projection, in Nigeria power system using least-square regression and exponential regression model. The model is implemented in Matlab platform with a plot in residential load demand, commercial load demand and industrial load demand in (MW). In the quest for analysis and predicting the energy (power) demand (MW) requirement for a projection period of (2013 - 2032), data are collected between (2000 - 2012), from the Central Bank of Nigeria (CBN), and National Bureau of statistics (NBS). The results obtained shows that energy generated from the respective generating station including Egbin thermal power station Lagos, Sapele thermal power station etc. are grossly inadequate. This mismatch is a major problem in power system planning and operation. The result also shows that there is deviation between predicted energy demand (MW) and available power (or capacity allocated). The predicted energy d...
International Journal of Computer Trends and Technology, 2017
Nigeria obviously had been experiencing a high level of thuggery, insecurity and violence, less p... more Nigeria obviously had been experiencing a high level of thuggery, insecurity and violence, less participation in its electoral processes. An alternative method to conduct its election was used during its 2015 general elections and a lot of hitches were observed. This research work presents a biometric online voting system that can enhance the electoral processes and thereby provide fast, accurate and secured election results. The result of this research work is a system that will serve as a centralized server to other nodes and will be deployed on the World Wide Web (WWW) to make the internet voting possible.
ABSTRACT Gas turbines play prominent role in aviation, power generation, marine, mining, petroche... more ABSTRACT Gas turbines play prominent role in aviation, power generation, marine, mining, petrochemicals, onshore and offshore oil and gas industries. Environmental factors result to degradation mechanics of the overall performance of the engine. Industrialist therefore face unplanned equipment and manufacturing downtime which is undesirable because it leads to economic losses and costly repairs. While condition monitoring is used to obtain early warning of impending equipment failure, optimization techniques such as water washing (online and offline) are used to bring the engine/equipment back to lime-light. In this work, several schedule visits were made to a gas turbine plant on industrial duty for electricity generation in an offshore thermal station at Ibeno, near Eket, Akwa Ibom State in Nigeria. Continuous monitoring of the aerothermodynamics and vibration data were taken for a period of twelve months on hourly basis to examine the state of health of the engine due to adverse offshore environmental factors. The diagnostic approach of vibration analysis, trend and performance monitoring were used with a model-based mixed data approach for optimizing the performance of the offshore gas turbine plant.A software code-named VANCANAL written in C ++ programming language was used to proactively monitor the gas turbine plant. The software displayed the operational (actual) values of all the parameters of the engine against their designed (reference) values. Once a set limit is exceeded, the software is capable of giving an alarm, signifying the need for maintenance. 31 Nomenclature .. x = Acceleration vibration amplitude, mm/s 2 . x = Velocity vibration amplitude, mm/s m = Lumped mass of rotating system, Kg C = Damping coefficient constant, N.s/m x = Displacement vibration amplitude, mm Fo = Forcing function at initial frequency, Kg.m/s 2 k = Rotor shaft stiffness, KN.m/rad ω = Engine rotational speed, rad/s ωn = Natural damped frequency of vibration, rad/s st d = Elongation, m 1 P = Compressor inlet pressure, bar 2 P = Compressor outlet pressure, bar 1 T = Compressor inlet temperature, K 2 T = Compressor discharge temperature, K ' 2 T = Compressor isentropic temperature, C S = Entropy, KJ/KgK
Uploads
Papers by Joseph Enoch