Conference Papers
Permanent URI for this communityhttp://197.211.34.35:4000/handle/123456789/2
Conference Papers
Browse
Item 2-DIMENTIONAL MODELS OF THE STRUCTURAL FEATURES WITHIN THE LOWER BENUE AND UPPER ANAMBRA BASINS NIGERIA, USING (2009) AEROMAGNETIC DATA(Journal of Science, Technology, Mathematics and Education (JOSTMED),, 2015-08) ADETONA, Adebayo Abbass, ABU MallamAnalysis base on the CET shows that the basement rocks to the North and Southern edge of the study area intrude into the sedimentary formation. At the lower (middle-portion) of the study area (within Angba and Otukpo sheets) are structures that are Basaltic rocks that intrude into the basement. It is believed that these structures must have predated the depositional period of the sedimentary formation. Several fracture and fault lines are detected on the CET map, most prominent among is that which start from the Eastern end (latitude 7.450 and longitude 8.300 ) and ends at the Southern end (Latitude 7.000 longitude 7.450 ).cutting the South Western corner of the study area diagonally. Secondly is that which runs vertically and is parallel to the course of River Niger within this area, supporting the assertion that the River Niger is structurally controlled. The 2-dimentional models of the six profiles revealed sedimentary formations whose susceptibility values are zero (0). Maximum depth of about ten (10) kilometers was obtained within the Southern end of the study area, but a maximum thickness of sedimentation of about four (4) kilometers was observed on profile six within Nkporo formation. The basement susceptibility varies from 0.002 to 0.004 but in some places it is as high as 0.007. Structural, 2-dimensional, Exploration Targeting, Total Magnetic IntensityItem A 4-Step Order (K + 1) Block Hybrid Backward Differentiation Formulae (BHBDF) for the Solution of General Second Order Ordinary Differential Equations(2023-12) Muhammad R; Hussaini AIn this paper, the block hybrid backward differentiation formulae (BHBDF) for the step number 𝑘 = 4 was developed using power series as basis function for the solution of general second order ordinary differential equation. The idea of interpolation and collocation of the power series at some selected grid and off- grid points gave rise to continuous schemes which were further evaluated at those points to produce discrete schemes combined together to form block methods. Numerical problems were solved with the proposed methods and were found to perform effectively.Item A Comparative Analysis of Grillage Method and Beam line Analysis of a Reinforced Concrete Waffle Brifge Deck(Nigeria Journal of Engineering and Applied Sciences (NJEAS), 2022-01-23) Adamu, H. N.; Abbas, B. A.; Abubakar, M.; Yusuf, A.; Kolo, D. N.; Shehu, M.The analysis of reinforced concrete waffle bridge deck using Chanchaga bridge as a case study was carried out with the aid of computer program written in MATLAB. The bridge deck which is a beam bridge was idealized to be a waffle slab. A mathematical model of the bridge was developed using the method of grillages because very complex shapes of problem domain with prescribed conditions can be handled easily using the method. The bridge deck was modelled as interconnection of grid elements. The analysis was carried out using direct stiffness matrix method. The nodal displacements and the resulting static internal forces; shear forces, bending moments and twisting moments of each grid element were determined using the matrix. The results obtained using the method of grillages were then compared with beam line analysis and the former method gave a 10% decrease in forces which will result in the reduction of overall design and materials by 10%.Item A Comparative Evaluation of the Networks of Three Nigerian Federal Universities for Effective Library Services(Ghana Library Journal, Ghana, 2013) Abduldayan, F.J.; Oluwade, B.; Oyedum, G.U.This paper is a comparative evaluation of the networks of three Nigerian federal universities and how such networks can be used to enhance library services. The university networks included in this study are the Federal University of Technology Minna Network (FUTMINNet), University of Jos Network (UNIJOSNet) and University of Lagos Network (UNILAGNet). University of Minna (FUTMIN), established in the 1980s, belongs to the third generation of Nigerian universities; University of Jos (UNIJOS) (established in the 1970s) belongs to the second generation, while University of Lagos (UNILAG) (which was established in the 1960s) belongs to the first generation. Both FUTMIN and UNIJOS are located in North Central geo-political zone of Nigeria while UNILAG is located in the South West zone. The research design employed was the survey method (involving the use of questionnaire, interview, and direct observation) to study the wired and wireless connectivity of the networks of the three universities and compare them against criteria such as network speed, bandwidth, latency, and user response. Structured and semi-structured questionnaires were administered to the network users of each of the three universities, giving a total of 300 questionnaires for the study. The result of the study shows that UNIJOSNet is the fastest while in terms of the wired service, UNILAGNet is the fastest. FUTMINNet is not performing well compared with the UNIJOSNet and UNILAGNet, or not satisfying its users at a satisfactory level. Wireless services of UNIJOSNet and UNILAGNet, which in turn affects the quality of library services offered to users. Wireless services of FUTMINNet do not adequately meet the expectations of users of library services. The paper recommends that the library network services of UNILAGNet has the best performance, while FUTMINNet needs the most improvement. Finally, universities need to enhance their wireless networks by upgrading and expanding the network components and infrastructures of all the networks, especially FUTMINNet.Item A Comparative Study of Local and Global Construction Materials Sourcing Strategies for Road Projects in Nigeria(CSID Journal of Infrastructure Development (CJID), Faculty of Engineering, Universitas Indonesia, 2024-06-30) Ajiboye, Araoye Olarinkoye; Silas, Micaiah Zhitsu; Adindu, Chinedu Chimdi; Alhassan, Elijah Aina; Kolo, Stephen SundayThis study is a comparative analysis of local and global sourcing strategies to determine the impact of strategic material sourcing on road construction project performance. The study aimed to evaluate the effects of material-sourcing strategies on the performance of road construction companies in Nigeria. A mixed-methods approach was used, incorporating both qualitative and quantitative research. Data collection involved sampling techniques using structured questionnaires and oral interviews. Regression analysis evaluated the relationship between strategic material sourcing and road construction performance. The results revealed that 87.5% of the materials used by road construction companies in the study areas were sourced from the local market, which indicates a high dependence on local resources and substantial investments and purchases within the local economy. Additionally, it was shown that local material sourcing was advantageous over global sourcing in terms of quick delivery and cost savings on road projects. However, the study also revealed that global material sourcing was necessary for projects requiring advanced and higher-quality materials. The study concludes that a high percentage of domestic material sourcing is essential for boosting the Nigerian economy through industrialization, employment generation, and a robust and self-sufficient economy. It is recommended that both government and private material suppliers explore ways to enhance the quality and availability of local road construction materials through advanced manufacturing technologies to improve service delivery by road project contractors. Furthermore, expanding the existing road material procurement process could create opportunities for construction companies beyond the local area and foster healthier competition among them by leveraging economies of scale.Item A Comparative Study Of Two Iterative Techniques For Systems Of Linear Algebraic Equations(Academic Staff Union of Universities, Nigeria, 2021-12-20) Khadeejah James AuduThis study compares numerically two iterative methods for solving systems of linear algebraic equations: the Symmetric Accelerated Overrelaxation technique and the Symmetric Successive Overrelaxation method. Four numerical problems are applied to analyze and compare the convergence speeds of the two approaches. On the basis of performance metrics including spectral radius, convergence time, accuracy, and number of iterations required to converge, the numerical results demonstrate that the Symmetric Accelerated Overrelaxation approach needed less computing time, a smaller spectral radius, and fewer iterations than the Symmetric Successive Overrelaxation approach. This demonstrates that the Symmetric Accelerated Overrelaxation is superior to the Symmetric Successive Overrelaxation. Researchers and numerical analysts can benefit from the findings of this study; it will help them comprehend iteration techniques and adopt an appropriate or more efficient iterative strategy for solving systems of linear algebraic equations.Item A Comparison of Strategies for Missing Values in Data on Machine Learning Classification Algorithms(IEEE, 2019) Makaba, T.; Dogo, E.Dealing with missing values in data is an important feature engineering task in data science to prevent negative impacts on machine learning classification models in terms of accurate prediction. However, it is often unclear what the underlying cause of the missing values in real-life data is or rather the missing data mechanism that is causing the missingness. Thus, it becomes necessary to evaluate several missing data approaches for a given dataset. In this paper, we perform a comparative study of several approaches for handling missing values in data, namely listwise deletion, mean, mode, k-nearest neighbors, expectation-maximization, and multiple imputations by chained equations. The comparison is performed on two real-world datasets, using the following evaluation metrics: Accuracy, root mean squared error, receiver operating characteristics, and the F1 score. Most classifiers performed well across the missing data strategies. However, based on the result obtained, the support vector classifier method overall performed marginally better for the numerical data and naïve Bayes classifier for the categorical data when compared to the other evaluated missing value methods.Item A Face Recognition-Based Intruder Detection System for Automatic Door Control(IEC, 2023-03-21) Abdullahi Daniyan, Michael O. MichaelIn recent years, theft and unauthorized access to private areas in homes and communities has become a growing concern, leaving individuals feeling insecure about their lives and properties. To address this problem, this paper proposes a solution that features a facial recognition system to prevent entry by unauthorized individuals. The system uses an ESP32 Camera module and the Arduino Integrated Development Environment (IDE) to capture and store facial biometric details through facial recognition techniques. The data is saved in a database that is accessible through a web interface enabled by HOTSPOT connection. The camera's Internet Protocol (IP) address also allows for live streaming as an added feature. An ATmega328 microcontroller on the Arduino IDE receives signals from the ESP32 camera, process the data and operate the door accordingly. When the ESP32 Camera recognizes a face, it sends a signal to the microcontroller to open the door. If the face is not recognized, the door is kept locked to prevent entry by intruders. The proposed solution effectively identifies intruders and those with authorized access but grants access only to authorized individuals in its database. This ensures a secure environment for homes and communities, providing peace of mind to individuals who have long been worried about theft and unauthorized access. Results demonstrate that the proposed facial recognition system is has been able to provide a secure environment for homes and communities by denying entry to intruders and granting access only to recognized individuals.Item A fractional-order mathematical model for malaria and COVID-19 co-infection dynamics(Elsevier BV, 2023-12) Adesoye Idowu Abioye; Olumuyiwa James Peter; Hammed Abiodun Ogunseye; Festus Abiodun Oguntolu; Tawakalt Abosede Ayoola; Asimiyu Olalekan OladapoThis study proposes a fractional-order mathematical model for malaria and COVID-19 co-infection using the Atangana–Baleanu Derivative. We explain the various stages of the diseases together in humans and mosquitoes, and we also establish the existence and uniqueness of the fractional order co-infection model solution using the fixed point theorem. We conduct the qualitative analysis along with an epidemic indicator, the basic reproduction number R0 of this model. We investigate the global stability at the disease and endemic free equilibrium of the malaria-only, COVID-19-only, and co-infection models. We run different simulations of the fractional-order co-infection model using a two-step Lagrange interpolation polynomial approximate method with the aid of the Maple software package. The results reveal that reducing the risk of malaria and COVID-19 by taking preventive measures will reduce the risk factor for getting COVID-19 after contracting malaria and will also reduce the risk factor for getting malaria after contracting COVID-19 even to the point of extinction.Item A Joint Optimization Scheme for Enhanced Breast Cancer Diagnosis using Particle Swarm Optimization (PSO) and Binary Particle Swarm Optimization (BPSO)(International Conference of the Faculty of Science, 2025-01-14) Ahmed, Y.E., Abdullahi, I.M., Maliki, D., & Akogbe, M. AOne of the leading diseases globally is cancer and breast cancer is not exempted. The objective of the WHO Global Breast Cancer Initiative (GBCI) is to reduce global breast cancer mortality by 2.5% per year, thereby averting 2.5 million breast cancer deaths globally between 2020 and 2040. The three pillars toward achieving these objectives are: health promotion for early detection; timely diagnosis; and comprehensive breast cancer management. In this study we propose an early and comprehensive detection technique in combating breast cancer diagnosis by combining the strength of both PSO (Particle Swarm Optimization) and BPSO (Binary Particle Swarm Optimization) to achieve optimal solution. The results obtained indicated the superiority of the Hybrid PSO-BPSO model in detection over an existing solution by achieving an accuracy of 98.82% on both the WBCD and WDBC datasets.Item A MATHEMATICAL MODEL OF SCABBY MOUTH DISEASE INCORPORATING THE QUARANTINE CLASS.(39th Annual Conference of the Nigerian Mathematical Society, (NMS), 2021-04-23) Abdurrahman, Nurat Olamide; Somma S. A.; Aboyeji Folawe Ibironke; Akinwande Ninuola IfeoluwaWe propose a mathematical model to study the transmission and control of scabby mouth disease in sheep, incorporating the vaccinated and quarantine classes. The Disease-free equilibrium was obtained, and the reproduction number was also computed. The local stability of DFE was analyzed for stability. Sensitivity analysis of the basic reproduction number with respect to some parameters of the model was carried out, and the sensitive parameters withR_0 are presented graphically. The local stability of DFE is stable if R_0<1. The sensitivity analysis shows that the contact rateα is the most sensitive parameter to increase the spread of the disease, and vaccination rate ω is the highest sensitive parameter to control the transmission of scabby.Item A MATHEMATICAL MODEL OF YELLOW FEVER DISEASE DYNAMICS INCORPORATING SPECIAL SATURATION INTERACTIONS FUNCTIONS(1st SPS Biennial International Conference Federal University of Technology, Minna, Nigeria, 2017-05-05) Akinwande, N. I.; Abdulrahman, S.; Ashezua, T. T.; Somma, Samuel AbuWe proposed an Mathematical Model of Yellow Fever Disease Dynamics Incorporating Special Saturation Process functions, obtained the equilibrium states of the model equations and analyzed same for stability. Conditions for the elimination of the disease in the population are obtained as constraint inequalities on the parameters using the basic reproduction number 0 R demographic and epidemiological data. . Graphical simulations are presented using someItem A Mathematical Model of Yellow Fever Disease Dynamics Incorporating Special Saturation Interactions Functions(1st SPS Biennial International Conference Federal University of Technology, Minna, Nigeria, 2017-05-05) Akinwande, N. I.; Abdulrahman, S.; Ashezua, T. T.; Somma, Samuel AbuWe proposed an Mathematical Model of Yellow Fever Disease Dynamics Incorporating Special Saturation Process functions, obtained the equilibrium states of the model equations and analyzed same for stability. Conditions for the elimination of the disease in the population are obtained as constraint inequalities on the parameters using the basic reproduction number 0R . Graphical simulations are presented using some demographic and epidemiological data.Item A Model for an Enterprise Automated RFID-Based Pay and Park System(ceur-ws.org, 2016) Dogo, E. M.; Ahmed, A.; Adelakun, M. O.Traffic management is one of the challenging problems in urban cities as vehicle owners look for where to park and queue to pay for rented car parks usually on an hourly basis. Therefore, the choice of a suitable, reliable and flexible architecture for Radio Frequency Identification (RFID) based pay and park system readily comes to mind. It is assumed in this work that the parking lot is already known and secured by the vehicle owner in a closed car park; this paper therefore seeks to address and automate the billing system for enterprise car parks. To achieve this, a reliable and accurate enterprise star topology networked RFID based system, that computes the amount to be paid by a user which is calculated based on the time the user enters and exits the park, and the amount the park owner is charging at a particular point in time is proposed for the automated pay and park system. The system comprises of both software and hardware components integrated together. The developed prototype system is able to grant authorized users access to the park within 30ms after verification and open the barrier in 30ms whenever the emergency button is pressed for safety consideration.Item A MULTIGRID METHOD FOR NUMERICAL SOLUTION OF ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS(IJSAR Journal of Mathematics and Applied Statistics (IJSAR-JMAS), 2022-12) I. O. Isah; A. Ndanusa; R. Muhammad; K. A. Al-MustaphaTechniques and analyses of multigrid method for solving elliptic partial differential equations (PDEs) in two dimensions are presented. The focal point of this paper is the applicability of the parametric reaccelerated overrelaxation (PROR) iterative method as a smoother in multigrid solution of elliptic PDEs. The two-dimensional Poisson equation on a unit square domain with Dirichlet boundary conditions is adopted as the model PDE. We present some practical formulae and techniques for building the various multigrid components using Kronecker tensor product of matrices. In addition, we carryout smoothing analysis of the PROR method using Local Fourier Analysis (LFA) and show how optimal relaxation parameters and smoothing factors can be obtained from analytic formulae derived to ensure better convergence. This analysis combines full standard coarsening strategy (doubling) and second order finite difference scheme. The result of PROR smoothing factors in comparison with those of other widely used smoothers is also presented. Results obtained from numerical experiment are displayed and compared with theoretical results.Item A non-linear differential equation model of COVID-19 and seasonal influenza co-infection dynamics under vaccination strategy and immunity waning(Elsevier BV, 2023-12) Rabiu Musa; Olumuyiwa James Peter; Festus Abiodun OguntoluThis study presents a mathematical model of the transmission dynamics of COVID-19 and influenza co-infection. The potential impacts of the influenza vaccine only on the co-infection dynamics and the potential impacts of both vaccines on the co-infection dynamics are thoroughly studied. The basic reproduction number for the two diseases using the next-generation matrix approach and the stability of the sub-model is examined. The model assessed the scenario whereby both diseases’ waning immunity occurs concurrently to check the epidemic peaks. The numerical simulation results show that the diseases would continue to be endemic in the population if the immunity waning rates increase. The epidemic peak can be reduced by increasing vaccination and vaccine efficacy rates. The results show that the COVID-19 contact rate significantly increases the epidemic level more than the co-infection contact rate. A similar result was obtained when it was observed that the COVID-19 post-recovery waning rate has more significant effects on the epidemic peak than the co-infection post-recovery waning rate. A possible reason for this counter-intuitive occurrence is that two infections cannot have the same viral load nor the same within-host competitiveness. This means an infectious co-infected person will transmit the infection with the highest within-host competitiveness. Here, it is suspected that COVID-19 has a within-host competitive advantage over influenza in the co-dynamics.Item A NOTE ON COMBUSTIBLE FOREST MATERIAL (CFM) OF WILDLAND FIRE SPREAD(Proceedings of 3rd SPS Biennial International Conference Federal University of Technology, Minna, Nigeria, 2021-10-28) Zhiri, A. B.; Olayiwola, R. O.; Somma Samuel Abufire is presented. The equations describing the fractional components of forest fire were carefully studied. The reaction before a forest can burn or before fire can spread must involves fuel, heat and oxygen. The coupled dimensionless equations describing the phenomenon have been decoupled using perturbation method and solved analytically using eigen function expansion technique. The results obtained were graphically discussed and analysed. The study revealed that varying Radiation number and Peclet energy number enhances volume fractions of dry organic substance and moisture while they reduced volume fraction of coke.Item A Note on Combustible Forest Material (CFM) of Wildland Fire Spread(Proceedings of 3rd SPS Biennial International Conference Federal University of Technology, Minna, Nigeria, 2021-10-28) Zhiri, A. B.; Olayiwola, R. O.; Somma, Samuel AabuIn this paper, a mathematical model for combustible forest material of a wildland fire is presented. The equations describing the fractional components of forest fire were carefully studied. The reaction before a forest can burn or before fire can spread must involves fuel, heat and oxygen. The coupled dimensionless equations describing the phenomenon have been decoupled using perturbation method and solved analytically using eigen function expansion technique. The results obtained were graphically discussed and analysed. The study revealed that varying Radiation number and Peclet energy number enhances volume fractions of dry organic substance and moisture while they reduced volume fraction of coke.Item A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies.(2022) Olaniyi, O.M.; Dogo, E.M.; Nuhu, B.K.; Treiblmaier, H.; Abdulsalam, Y.S.; Folawiyo, Z.This chapter presents a distributed e-voting system that solves the problems of vote-rigging, voter impersonation, and vote falsification, all of which are prevalent in traditional paper ballot systems. In general, the digitization of democratic decision-making is convenient, fast, and cost-saving but can become a gateway for electoral fraud if not properly secured. Authentication and the simultaneous achievement of confidentiality, integrity, and availability represent major challenges toward establishing e-voting as a reliable means of democratic decision-making. In this chapter, a combination of multifactor authentication (MFA) and blockchain techniques is used to secure electronic voting. MFA hampers the compromising of voters’ identities and allows for easy verification, while blockchain technology protects the integrity of the votes and ensures the verifiability of the cast votes. Combining a facial recognition algorithm and RFID authenticates and authorizes voters to participate in the election process. A smart contract implemented on an Ethereum network provides the required measures of integrity and verifiability for secure e-voting. Performance evaluations of the proposed approach show that the MFA yielded a 0.1% false acceptance rate and a 0.8% false rejection rate for 100 voters, respectively. This illustrates that the proposed technique can solve issues of authentication and integrity, thereby paving the way for free, fair, and credible e-democratic decision-making in digitally enabled voting scenarios.Item A Smart Real-time Attendance System using Smart Data Filtering and Selection Techniques(2024-04-09) Ibrahim M. A., Maliki, D., I. A. Dauda, A. Y. Ogaji, S. YakubuCooperate organizations, firms, companies, and educational institutions in Nigeria and the whole world are concerned about attendance of students and employees as the case may be, student overall performance is affected by it. In order to provide solutions for attendance management systems, a variety of techniques and technologies were used in the development of the attendance systems. However, most of these systems lack the flexibility of use and appropriate resource management. This paper presents the development of a smart real-time attendance system that uses smart data filtering and selection techniques to parse user-defined attendance instructions, optimize performance, and improve efficiency and flexibility. This system also employs a multi-factor approach in terms of security engaging the use of RFID technology and fingerprint biometrics to manage attendance records. Also, the system uses a wireless (Wi-Fi) communication approach for real-time communication. The performance of the system was mainly evaluated in terms of throughput, latency, and accuracy showing an average delay of 3 seconds per student, 21.95Mbps average throughput, and zero percent false acceptance.