Department of Computer Science;
Permanent URI for this collection
Browse
Browsing Department of Computer Science; by Issue Date
Now showing 1 - 20 of 40
Results Per Page
Sort Options
Item Development of a Computerized Hospital Laboratory Operations’ Support System(Lead City University, 2022-12) Abiodun Timothy ADEGBIJIManual hospital laboratory operation system is characterized with lack of prompt retrieval of Information which result in time wastage, loss of information, misplacement and misallocation of results. To proffer solution to the aforementioned problems, the research study developed a computerized hospital laboratory operation support application which is aimed at using information technology to solve the problems associated with manual method of Hospital Laboratory Information System. The system is a web based model built on laravel 7.29 and a WAMP (Windows, Apache, MySQL, PHP) server. A total of 4 laboratories were visited (2 government owned and 2 private laboratories) to collect various types of tests being carried out in the laboratories through ethical approval using the conventional and the developed systems. During the implementation of the developed system at Oyo state hospital management laboratory in Oyo and Ibadan, the system was installed unto the hospital laboratories’ database and subsequently utilized for registration of patients data and processed data. The result obtained showed that 65% of the respondents who were tested with the developed system used between 30-45 minutes and 48% used between 46- 60minutes while 88% that used the manual system used between 2-8hours before the result was ready.The adoption of this research will greatly allow prompt release of test results retrieval of Information, reduce patient test time wastage, give accurate laboratory test result, reduce loss of vital information, reduce misplacement of test results and reduce misallocation of test results to the barest minimum, if not totally eradicated. Keywords: Computerized, information technology, Hospital, Laboratory, Laravel Word Count:250Item Feedback Management System for a Confidential Evaluation of Teachers Performance(Lead City University, 2022-12) Feranmi Emmanuel ADEJUWONFeedback management system for a confidential evaluation of teacher’s performance is aimed at protecting student credentials while giving remarks about their teachers. The main goal of this thesis is to develop a more secure student evaluation system that protects student credentials while providing maximum confidentiality. The objectives in achieving the set goals are: designing a system user interface, design of a database and the development of the whole system with HTML, CSS, Java Script, Xamp Server. The system is targeted to helping students feel safe knowing fully well that a feedback the teacher consider negative cannot be traced back to them. The feedback management system makes use of Monte Carlo Simulation Analysis techniques for data analysis and RSA algorithm is developed for the implementation of the system. The system will protect the credentials of the students and will take less time to complete execution. The cost of implementing the system is minimal compared to the cost of the feedback systems available online. The system is deployed into the department of Computer Science in Lead City University, Ibadan. Keyword: Feedback, Confidential, Credentials, Evaluation, RSA Algorithm Word Count: 177Item Testing the Effectiveness of Money Supply on Inflation in Nigeria(Lead City University, 2022-12) Adeniyi Benjamin ADEDOYINManual hospital laboratory operation system is characterized with lack of prompt retrieval of Information which result in time wastage, loss of information, misplacement and misallocation of results. To proffer solution to the aforementioned problems, the research study developed a computerized hospital laboratory operation support application which is aimed at using information technology to solve the problems associated with manual method of Hospital Laboratory Information System. The system is a web based model built on laravel 7.29 and a WAMP (Windows, Apache, MySQL, PHP) server. A total of 4 laboratories were visited (2 government owned and 2 private laboratories) to collect various types of tests being carried out in the laboratories through ethical approval using the conventional and the developed systems. During the implementation of the developed system at Oyo state hospital management laboratory in Oyo and Ibadan, the system was installed unto the hospital laboratories’ database and subsequently utilized for registration of patients data and processed data. The result obtained showed that 65% of the respondents who were tested with the developed system used between 30-45 minutes and 48% used between 46- 60minutes while 88% that used the manual system used between 2-8hours before the result was ready.The adoption of this research will greatly allow prompt release of test results retrieval of Information, reduce patient test time wastage, give accurate laboratory test result, reduce loss of vital information, reduce misplacement of test results and reduce misallocation of test results to the barest minimum, if not totally eradicated. Keywords: Computerized, information technology, Hospital, Laboratory, Laravel Word Count:250Item Enhanced School Management System using Progressive Web Application(Lead City University, 2022-12) Emmanuel Adebowale ADEDIRANSchool Management System using Progressive Web Application is aimed at Network Independent for Student Management system which allows the students to check through their details awithout necessary using data logging-in via their matriculation number, since the developed System will not allow matriculation numbers outside Lead City University. The main goal of this thesis is to develop a Progressive Web Application School Management System and provide an interface that will be used for all the necessary details of School Management. The objectives in achieving the set goal are: Designing of the database, designing of the design of the progressive web application school management system and the development of the whole system with HTML, CSS, PHP, JavaScript, React, Xamp Server. The system is targeted to helping students take their studies in a more advanced fashion breaking away from the conventional way of using papers and manual processing of doing their registration all the time. The School Management System using Progressive Web Application makes use of features such as service workers, push notification, indexedDB, Background sync is deployed for the implementation of the system. The system will give a more developed and user-friendly access as well as it will take less time to complete its execution. The cost of implementing the system is minimal compared to the cost of other development of other School Management System. The system is deployed into the Department of Computer Science in Lead City University. Keywords: Progressive Web Application, , School Management System. Word Count: 238Item Enhancing Window-Based Congestion Control Algorithm for the Internet(Lead City University, 2022-12) Matthew Ojo AYEMOWAThe Transmission Control Protocol (TCP) or Internet Protocol (IP) has gone through a number of changes. There have been numerous ideas to alter the mechanisms of TCP congestion control in order to improve its performance. Many research had been done on congestion avoidance and control; however, previous studies on window-based congestion control were mostly based on the starting network, adaptive congestion, and end-to-end mechanisms; however, network overloading will be avoided, and packet losses should be minimized by using the PERC Algorithm. The goal of this study is to develop a Proactive Explicit Rate Control (PERC) algorithm for max-min fair rates that avoids network overcrowding and packet losses through sharing. For max-min fair rates, we devised the PERC algorithm, which can prioritize short flows as needed. Motivated by the need for fast congestion control, this thesis focuses on a different class of congestion control algorithms, called proactive explicit rate-control (PERC) algorithms, which decouple the rate calculation from congestion signals in the network. The switches and Network Interface Cards(NICs) exchange control messages to run a distributed algorithm to pick explicit rates for each flow. PERC algorithms proactively schedule flows to be sent at certain explicit rates. They take as input the set of flows and the network link speeds and topology, but not a congestion signal. As a result, they converge faster and their convergence time depends only on fundamental” dependency chains,” essentially couplings between links that carry common flows, that are a property of the traffic matrix and the network topology. We argue that congestion control should converge in a time limited only by fundamental dependency Our main contribution is to use PERC Algorithm to control Network Overloading and to equally control packet loss In simulation and on a P4 programmed FPGA hardware test bed, s-PERC converges an order of magnitude faster than reactive schemes such as TCP, DCTCP, and RCP. Keywords: Congestion Control, Congestion Window, Network Overloading, Network Protocols, Packet Losses. Word Count: 300Item A 3D LASER SCANNING DEVICE FOR OBJECT RESTORATION USING POINT CLOUD REGISTRATION(Lead City University, 2022-12) Ahmed Abba Sheik3D scanning of environments and the objects have a lot of practical uses. During the last decade increased performance and reduced cost has made them more accessible to larger consumer groups. The price point is still however high, where popular scanners are in the price range of 300,000 NGN-500,000 NGN. The objective of this thesis is to investigate the current 3D scanners in the market, considering both time-of-flight and triangulation in terms of accuracy and limitations and compare there results to build a more cost effective model of the 3D scanner at the end of the thesis. For validation purposes the constructed 3d scanner will be put through tests to measure its accuracy and ability to create realistic representations of its environment. The constructed model produced significantly less accurate results and scanning time was much longer compared to a popular competitor. This was mainly due to the cheaper camera sensor used for the model and not the mechanical construction itself. There are however many applications where higher accuracy is not essential and with some modifications, a low cost solution could have many potential use cases, especially since it only costs 1% of the compared product. Keywords: Triangulation, 3D scanner, Time-of-flight, Laser scanner Word count 185Item Academic Journal Plagiarism Checker Using Tri-Gram Algorithm and KNN Algorithm(Lead City University, 2022-12) Iyanuoluwa Modupeore FATOKIAcademic journal plagiarism checker using data mining is aimed at checking for plagiarism in journals submitted by students, in which the research title has a unique name since two journals in the database are not allowed to have similar titles. The main goal of this thesis is to develop a journal plagiarism checker and provide an interface that will be used for journal submission and check for plagiarism. The objectives in achieving the set goal are: Designing of the document repository, design of the design of the plagiarism checker algorithm and the development of the whole system with HTML, CSS, PHP, JavaScript, Xamp Server. The system is targeted to helping students take their research seriously and also to reduce the rate at which students plagiarize in their research work and to also help students with the selection of research topic that has not been done by someone else before so as to prevent plagiarism. The journal plagiarism checker makes use of clustering techniques in data mining and KNN algorithm and Trigram algorithm is deployed for the implementation of the system. The system will give accurate plagiarism report and it will take less time to complete its execution. The cost of implementing the system is minimal compared to the cost of other plagiarism tools available online. The system is deployed into the Department of Computer Science in Lead City University. Keywords: Plagiarism, KNN Algorithm, Trigram Algorithm, Journal. Word Count: 232Item Applicability of Machine Learning Algorithms to Analyze Despondency Comments on Social Media Using Analytical Hierarchical Process (AHP)(Lead City University, 2022-12) Damilola Alaba HALLYDepression is a serious mental illness that affects an individual’s professional and personal life. With the development of internet usage people have started to share their experiences and challenges with mental disorder through online platforms. Social media platforms come close to being a true digitization of the human social experience. In many cases people would prefer to express themselves online rather than offline especially in completed suicide attempts around the world. This thesis objectives are to extract despondency indicative social media posts, categorize these posts and then apply an integration of machine learning techniques to generate markers in identifying depressive comments in social media. This will be examined using five algorithms; Support Vector Machine, Logistic Regression, K-Nearest Neighbor, Naves Bayes and Linear Regression. The Analytical hierarchical Performance was used to determine the best algorithm to detect depression in terms of performance metrics. This process identifies users who are at risk of depression to initiate quick intervention. The result of this thesis shows that the support Vector machine has the highest performance metrics. This signifies that the support vector Machine is the best algorithm to apply for the extraction of Despondency symptoms in social media, this will also determine the best machine learning Algorithm that has the best performance and accuracy in detecting despondency symptoms on social media. It is recommended based on the conclusions of this thesis that the support vector machine Algorithm be used in institutions social media platforms to adequately monitor despondency in individuals Keywords: Despondency, Machine learning Algorithm, Analytical Hierarchical Performance, Support Vector Machine, Logistic Regression, Word count: 246.Item A Mathematical Morphological Deep Neural Network for the Classification of Periapical Radiographs in the Diagnosis and Treatment of Dental Diseases(Lead City University, 2022-12) Grace Lawumi TAM-NURSEMANOne of the best ways to diagnose a disease in medical practice objectively is through medical imaging. The importance of medical imaging cannot be overemphasized. In dentistry, dentists often use radiographs, especially in finding hidden dental structure, bone loss, malignant or benign masses, and cavities that cannot be examined during a visual examination. The use of dental radiographs also helps dentists to detect hidden dental diseases early. This study is a continuation of previous work which bothered on the development of an expert system for the diagnosis and prognosis of 20 Common dental diseases using Bayesian network. The work was developed using several symptoms associated with dental disease for diagnosing dental diseases (D1- D20). The study was limited to symptomatic diagnosis which however has some obvious gaps such as the uncertainty in the reasoning associated with Bayes rule, the use of Pain as a parameter among others that were filled through the use of deep learning tools on dental periapical radiographs through an improved model. The improved model was developed integrating mathematical morphology (MM) operations (dilation, erosion, opening and closing) in the convolution layer of CNN, for data preprocessing and quality feature extraction. With its high sense of intelligence (artificial) obtained during training, the system receives dental images and analyses them automatically for various clinical findings with which 6 dental disease problems were solved. With an achieved accuracy of 99.78%, it can be established that this system can be used in dental clinics with high confidence giving very little or no-error-diagnosis. To make this system more scalable and robust, more dental diseases should nbe added through other MM based theory like lattice, topology and random functions other than set theory-based MM used in this study. Keywords: Mathematical Morphology (MM), Dilation, Erosion, Opening, Closing, Convolutional Neural Network (CNN) Word Count: 285Item Cybercrime Monitoring System for Online Security Expert(Lead City University, 2022-12) Cybercrime Monitoring System for Online Security ExpertCyberspace is increasingly attacked and there are limited means of mitigating this act. This is usually due to shifted degree of security features and management schemes within the cloud entity in cyberspace. The challenges are due to improvements in methods and the utilization of new technologies in committing crimes by criminals. The threat of cybercrime will continue to evolve and grow as criminals adapt to new security measures and take advantage of the changes in online behaviour. Hence, it is still challenging to identify and track down cybercriminals. This study focuses on implementing a cybercrime monitoring system for online data experts. After an in-depth understanding of cyber users' attacks, a possible solution could be proffered. A web application portal is designed using WordPress development tools that will serve as a platform to monitor and present possible vulnerabilities discovered. Tawk.to is integrated into the website for the implementation of real-life monitoring and My Structured Query Language is used as the database for storing and retrieval of information. This system will capture the digital signature of each piece of information sent to cyberspace, the user login parameter, the geographical location of the user, the Media Access Control address of the system used, the date, time and action carried out by the user while online. It will also aid cyber security experts in ascertaining the extent of activities carried out by cybercriminals in the domain. The result showed that the system can genuinely identify cyber users and their activities online. Keyword: Cybercrime, Cyberspace, Cyber Criminals, Security Expert Word Count: 247Item Investigation of Electromagnetic Interference and Geo-Spatial Encroachment of Radio-Frequency Based Infrastructures around Ibadan Airport(Lead City University, 2022-12) Olalekan Jimmy LAWALAirport is a piece of land with facilities used purposely for commercial air transportation and or training. There are usually facilities to park and maintain aircraft, a control tower and a stretch of land for landing or take-off. Therefore operating an airport is extremely complicated, with a rigorous system of aircraft support services, passenger services, and aircraft control services contained within the operation. The Airport is also a site of operation for heavy machinery, a number of regulations and safety measures have been implemented in airports, in order to reduce hazards. Additionally, airports have major local environmental impacts, as both large sources of air pollution, noise pollution, exposure to dangerous radiation and other environmental impacts, making them sites that acutely experience the environmental effects of aviation. Airports are also vulnerable to electromagnetic radiations. Maintaining accurate cockpit reading in flight especially during taking off and landing is crucial to flight operation. Electromagnetic interference from installations in the vicinity of the Airfield has been a major challenge. Selecting the right location for land based signal generator/receiver in hope of meeting a right location that offers zero interference to accurate instruments reading would be highly desirable for the safety of lives and property. The vast land set aside for Airports in the early eighties are now choked with urban and suburban developmental infrastructures, such as Telecommunication base station, Television and Radio stations, Medical Facilities such as X-Rays and Computerized Tomography Scanners, Nuclear Power Plant , Research Laboratories, Manufacturing and Construction companies among other EMF sources. These EMF based infrastructures are mostly kept far below 15Km step-back stipulated by NCC as Airport Setback. The straying electric and magnetic fields interfere with the operation of the aircraft microprocessor memories and instruments, causing trifling disorder in the deck display or more seriously shutdown the aircraft engine. To investigate the level of electro-spatial encroachment and interference of the stray electric and magnetic fields around Ibadan Airport’s environment, hence this study. Word count: 323Item Enhanced School Management System using Progressive Web Application(Lead City University, 2022-12) Emmanuel Adebowale ADEDIRANSchool Management System using Progressive Web Application is aimed at Network Independent for Student Management system which allows the students to check through their details a without necessary using data logging-in via their matriculation number, since the developed System will not allow matriculation numbers outside Lead City University. The main goal of this thesis is to develop a Progressive Web Application School Management System and provide an interface that will be used for all the necessary details of School Management. The objectives in achieving the set goal are: Designing of the database, designing of the design of the progressive web application school management system and the development of the whole system with HTML, CSS, PHP, JavaScript, React, Xamp Server. The system is targeted to helping students take their studies in a more advanced fashion breaking away from the conventional way of using papers and manual processing of doing their registration all the time. The School Management System using Progressive Web Application makes use of features such as service workers, push notification, indexedDB, Background sync is deployed for the implementation of the system. The system will give a more developed and user-friendly access as well as it will take less time to complete its execution. The cost of implementing the system is minimal compared to the cost of other development of other School Management System. The system is deployed into the Department of Computer Science in Lead City University. Keywords: Progressive Web Application, , School Management System. Word Count: 238Item Evaluation of Load Balancing Technique on Web Servers Using Round Robin(Lead City University, 2022-12) Olanrewaju Lawrence ABRAHAMTraditional networking architectures have many significant limitations that must be overcome to meet modern IT requirements. To overcome these limitations; Software Defined Networking (SDN) is taking place as the new networking approach. One of the major issues of traditional networks is that they use static switches that cause poor utilization of the network resources. Another issue is the packet loss and delay in case of switch breakdown. This project proposes an implementation of a dynamic load balancing algorithm for SDN based data center network to overcome these issues. In a data center environment, the load balancer is an integral part of the networking ecosystem. The primary function of a load balancer is to distribute traffic among a cluster of servers such that a single server does not become over-utilized and ensure that critical services keep running. Software Defined Networking (SDN) offers a cost-effective and flexible approach in implementing a load balancer. Moving away from traditional hardware-based networking approach, this project implements load balancing with the help of software. The SDN approach reduces the cost, offers flexibility in configuration, reduces time to deploy, provides automation and facilitates building a network without requiring the knowledge of any vendor-specific software/hardware. A test-bed has been implemented using Mininet software to emulate the network, and OpenDaylight platform (ODL) as SDN controller. Python programming language is used to define a fat-tree network topology and to write the load balancing algorithm program. Finally, iPerf is used to test network performance. The network was tested before and after running the load balancing algorithm. The testing focused on some of Quality of Service (QoS) parameters such as throughput, latency, bandwidth, delay, jitter, and packet loss between two servers in the fat-tree network. The algorithm increased throughput with at least 35.8%, and also increased the network utilization within the system. Keywords: Application Programmable Interface (API), Load Balancer, OpenFlow, Round Robin, Software Defined Networking (SDN). Word Count: 300Item Improved Fleet Management System Using Global Positioning System(Lead City University, 2022-12) Dajah Vincent ALIThe overall use and purpose of the improved fleet management system is the computerized management of fleet and other vehicular equipment. This is done to eliminate the use of manual system that rely on the use of books and manual documentation. The aim of the study is to develop a database that will be used to capture and store users’ data, trucks and vehicular equipment data. To develop a web application interface that will track trucks and drives in real time and to able to view users’ profile, trucks and other information and will be able to run reports from the system, develop a real time tracking and monitoring algorithm, also to be able to use the system as comparative measure to analyze existing systems. Methodology used was a web application developed using HTML, CSS and JavaScript for the front-end, while PHP was used for the server side. Also, flutter was used to develop the mobile application which runs on an android device that will be resident with the person operating the vehicle or truck. After successful development, quality testing was conducted on all unit of the project and system was tested for throughput and response time. The system was simulated for system behavior when multiple users are using the system at a time, and the average response time is 134ms for 25 users at a time. In conclusion, this system will be of great benefit to organizations that manages large fleet of trucks or vehicles for their operation, general recommendations are for such organizations or government agencies to adopt the use of a fleet management system and government at all levels to enforce the use of this system. Keywords: Fleet management system, web application, HTML, CSS, JavaScript, GPS Word Count: 279Item District Health Information System (DHIS2 SMS Server) and Routine Immunization (RI) Data in Goronyo LGA, Sokoto State(Lead City University, 2022-12) Bello A. SHEHUThis project is on District Health Information System (DHIS2 SMS Server) and Routine Immunization (RI) Data in Goronyo LGA, Sokoto State. Descriptive research method was used to conduct the research. project is limited to Goronyo LGA, and its covers role of DHIS2 SMS server in strengthening Routine Immunization data in Goronyo LGA, Sokoto state. The target population for this research are mainly any health facility worker who is supporting/attached direct to Routine Immunization unit (Health facility in-charge, Routine Immunization service provider, Assistant RI service provider and RI recorder), working in public health facilities in Goronyo LGA (all 22 health facilities conducting RI in the LGA), sampling method was not use because the researcher was able to reach out all the respondents. Accordingly, 90 questionnaires were issued out to 90 RISP we have in the LGA. Of these figure only 85 were retrieved. Percentage was main method used to analyze the data. Similarly, data was downloaded from DHIS2 RI The research find out that 13 (15%) of respondents know DHIS2 before 2017, while 67 (85%) don’t know, but 85 (100%) of respondent received training on DHIS2 during implementation of the software. The significant of this study is to investigating District Health Information System (DHIS2 SMS Server) and Routine Immunization (RI) Data in Goronyo LGA, Sokoto State, which will serves as an addition of knowledge on District Health Information System (DHIS2 SMS server) in the LGA, state and nation in general, similarly, other impact this study, included, it shows how the software helps in RI data analysis, interpretation, storage, retrieval and transmission automatically, this research find out how the DHIS2 SMS server detect incompleteness and error of RI data, the research reveals how the software help health care mangers with data for monitoring and supervision from anywhere. Keywords: Routine Immunization, District Health Information System (DHIS2), Vaccination, ICT Infrastructure, Routine Immunization Data Word Count: 295Item Performance Evaluation of Some Selected Learning Algorithms for Software Defect Prediction Using Harmony Search Algorithm(Lead City University, 2022-12) Folorunsho BAMISAYESoftware defects (SD) is a significant area of software development that has called for the attention of both academics and professionals in the last few decades. The more software evolves, the more there is a need to produce testing measures by which the reliability, dependability, and efficiency of the software can be verified and ascertained. The quest to predict defects or better still produce error-free software is commendable, however, other factors such as an accurate prediction rate and time interval for prediction call for imperative attention. The prolonged processing of prediction can lead to misclassification, most especially when a large dataset is used for classification. In other words, misclassification and prolonged processing is inevitable when a large dataset is used for prediction. That is why this study has applied a meta-heuristic optimization algorithm for feature selection (FS) to reduce high dimensionality which may lead to prolonged classification time and misclassification. The HSA was employed for feature selection, and five learning algorithms- Support Vector Machine (SVM), Artificial Neural Network, K-Nearest Neigbour, Naïve Baye, and C4.5 were applied for classification. Also, Eclipse dataset was used for prediction. The operational output of the model was achieved using some evaluation metrics such as precision, accuracy, recall, classification time, and F1 score.The recorded results with HSA revealed that the ANN algorithm achieved the lowest classification time of 24.09s in the Eclipse Dataset which shows that the predictive rate of ANN outperformed other classifiers used for defect classification. The highest accuracy of 86.44% was obtained in SVM which shows that KNN outperformed other learning algorithms used for prediction in terms of correctness. Based on the output of KNN with harmony search in the SDP, it is therefore recommended for model development. Keywords: Software Defeat, Defect Prediction, Dimensionality Reduction, Feature Selection, Misclassification Word Count: 279Item E-Health Data Security Using Hybrid Encryption Techniques(Lead City University, 2022-12) Ridwan Olayinka KOLAPOThe introduction of cryptography has brought plenty of improvement to health informatics, but not really employed in health institutes and this is often as a results of the protection issues that come together with the employment of e-Health systems. Security issues is taken into account a significant concern which is why health institutes still opt to follow the normal way of addressing health records. This study aim to ensure data security in health record using enhanced Ceasar Cipher, Affine Cipher and Red2 Cryptographic Techniques.This method used is considered a double enhanced encryption algorithm with a steganography technique because it combines an enhanced Ceasar encryption method with Affine Cipher encryption technique to enhance security of medical health records along with Red2 algorithm, which helps encrypt cipher-text messages and hide them in images. The integration of the enhanced Caesar and affine ciphers is as follows: First, each field in the record is encrypted with the enhanced Caesar cipher encryption method, and the encrypted output is used as the input for the affine cipher encryption method after-which the output of the second encryption phase is fed into the steganography stage and the final output of the developed system is presented as an image.The result of this study is presented as a software solution and also some metrics like accuracy, precision, recall and F1-score were measure to test the performance of the system and it shows that the enhanced ceasar cipher encryption technique used in this study has a larger computational time which compensate for the high level of security and also the image used for steganography resulted to having lesser image quality parameters as this also compensate for the addition security level. In conclusion, the main aim of cryptographic system and steganographic system is to protect the confidentiality of data both at rest and in transit. With the mix of the enhanced Ceasar Cipher method and Affine cipher alongside Red2 Algorithm, these techniques has helped to enhance effectiveness. Keywords: e-Health, cloud, encyrption algorithm, Ceasar Cipher, Affine Cipher, Red2 algorithm. Word Count: 338Item Monitoring Suspicious Discussions on Online Forum Using Deep Learning Techniques(Lead City University, 2022-12) Oluranti John AFOLABINowadays, people are passionate about using the internet in their daily lives. This is rapidly increasing the use of online forums. An online forum is nothing but a medium to share one's thoughts, feelings and emotions towards specific pictures, videos and paintings etc. This leads to the execution of many legal and illegal activities. These illegal activities are trading black money online, distributing copyrighted movies and using illegal words. Law enforcement needs a system to effectively deal with this problem. Network Intrusion Detection System (NIDS) help system administrators detect network security vulnerabilities in their organization. However, many challenges arise when developing a flexible and effective NIDS for unplanned and unpredictable attacks. In this thesis, we propose a deep learning-based approach to develop a flexible and efficient NIDS to analyse suspicious and criminal activities occurring in forums. Deep learning technique is used, Natural Language Processing (NLP) for suspicious keyword extraction and Support Vector Machine (SVM) for detection and classification of suspicious keywords. We present the performance of our approach and compare it with some previous works. The metrics to be compared include accuracy, precision, recall, and f-measure values. Keywords: online forum; machine learning; deep learning; natural language processing; support vector machine. Word Count: 187Item Electromagnetic Radiation and Spatial Proximity of Mobile Communication Base Stations: Analysis of Compliance in Sagamu Metropolis(Lead City University, 2022-12) Olabisi Olayinka, ONALAJAElectromagnetic radiation emanating from randomly selected 113 GSM Mobile Base Transceiver Stations (MBTSs) in different regions of Sagamu, Ogun State, Southwest, Nigeria, was assessed according to the International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines, National Communication Commission (NCC), National Environmental Standards and Regulations Enforcement Agency (NESREA). This was to determine the exposure level at these MBTS and their compliance to setback distance in relation to the specification in the guidelines. Measurements of the maximum Power Density of radio signals were taken for sites operating in GSM 900MHz, GSM 1800MHz, WCDMA 2100MHz and correlated with the ICNIRP, NCC and NESREA specifications. The result indicated that only 23.9% (27) of the entire MBTSs complied with NCC regulations (5m) set back to the closest infrastructure, while majority 76.1% (86) of the MBTSs do not comply. 62.8% (71) of the MBTSs complied with the NESREA standard of 10 metres set back to the closest infrastructure while 37.2% (42) do not comply with the regulations as they do not observe 10 meters set back from the nearest infrastructure. Only 6.2% (7) of the total MBTSs in the study area, violated the recommended E(V/m) for 900MHz, GSM 1800MHz, WCDMA 2100MHz rates having a peak value of 85V/m. Also, 25.7% (29) of the total MBTS in the study area violated the recommended power density levels for 900MHz, GSM 1800MHz, WCDMA2100MHz rates having highest value for power density which is (47.75mW/m2) while others also showed high values ranging from 9.966 to 29.73mW/m2. These findings suggest that many MBST’s complies with NESREA (10m) setback regulation but violated the NCC (5m) regulation. Radiations emanating from the accessed base stations in some vicinity are in safe range specified in the guidelines and as such they do not constitute health risk in the short run. Mobile base stations whose RF radiation intensity is significantly high once identified, the settlers should be advised to relocate away from such base stations. Keywords: Electromagnetic waves, Mobile Phone, Base Stations, power density, radiation level. Word Count: 299Item Web-base System for Motherless Homes Service Providers in Oyo State, Ibadan, Oyo State, Nigeria(Lead City University, 2022-12) Makinde Olukemi FunlolaThere is a need for an effective web based system for motherless homes service providers to decrease challenges in social sectors, to achieve this there is a need to design and implement a database, develop a web application and also test a design database. The methodology is achieved by studying and reviewing other literature relating to my study to improve the efficiency of the system as a means of filling the gap in the literature. The system makes use of designing software which makes use of two programming language, content management system (CMS), PHP and Javacript. Google Map API was also integrated in the system to enable GPS location sharing of the Motherless Homes service providers address and location. A developed system which hosted on Github International web host service for test verification and implemented. Agithub is a web based hosting service version control using Git. The hardware device that was made use are personal computer, uninterrupted power. Waterfall model is the methodology adopted. The Architectural design improves three levels structure 1, client server, middle tier, and back end. The entity diagram is a logical and graphical representation of the overall structure of the data base. The flowchart is concerned about splitting of high level functions into sub functions, establishing definite relationships among specified functions. The results are partitioned into three parts which are programming language used, Admin Dashboard and user interface. A data design and architectural design and a procedural design are all included in the design process. Keywords: Web-base, Design, NGO, Application. Word Count: 298