University of Ibadan Journal of Science and Logics in ICT Research
https://journals.ui.edu.ng/index.php/uijslictr
<p lang="en-GB" align="justify"><span style="font-size: medium;">The UIJSLICTR is a scholarly peer reviewed journal published twice in a year. The journal aims at providing a platform and encourages emerging scholars and academicians globally to share their professional and academic knowledge in the fields of computer science, engineering, technology and related disciplines. UIJSLICTR also aims to reach a large number of audiences worldwide with original and current research work completed on the vital issues of the above important disciplines. Other original works like, well written surveys, book reviews, review articles and high quality technical notes from experts in the field to promote intuitive understanding of the state-of-the-art are also welcome. </span><span style="font-size: medium;"><span lang="en-US">In this maiden edition, 18 articles were received from authors from the different parts of Nigeria including one from UK. At the end of the review process and plagiarism check, only nine were found to be publishable, as we intend to build quality into the Journal right from the outset. </span></span></p>en-USUniversity of Ibadan Journal of Science and Logics in ICT ResearchEnhancing Regulatory Compliance in the National FinTech Ecosystem: A Centralized RegTech Approach
https://journals.ui.edu.ng/index.php/uijslictr/article/view/1464
<p>This study looked at a centralized regtech approach to improving regulatory compliance in the national financial technology ecosystem. The study's specific goals are to design a FinReg/FinTech ecosystem using the new National Financial Ontology (NFO) model and investigate the issue of information overload using a cost effective algorithm in the program. This was tested using the big O time notation to show that the size of the data does not affect processing time. Centralization of regulatory technology (RegTech) is a crucial method to strengthening regulatory compliance and control in the fast evolving financial technology (fintech) sector. The Object-Oriented methodology (OOM), which focuses on encapsulating the behavior and structure of information systems into compact modules, is the approach used in this study.</p>Nefishetu Faith ALIU Abdullahi Braimoh IKHARO Abayomi Joshua JEGEDE
Copyright (c) 2024 University of Ibadan Journal of Science and Logics in ICT Research
2024-10-282024-10-28122111Enhancing Data Security: Implementing a Step-Count Method for Confidential Communications during Practical Transmission
https://journals.ui.edu.ng/index.php/uijslictr/article/view/1465
<p>Overall, the improved structure of the data encryption standard algorithm delivers a state-of-the-art solution for <br>protecting confidential data backed by unrivaled expertise and meticulous design. It is an essential tool in <br>today's digital landscape, where cybersecurity threats are ever-evolving. Encryption is the encoding of a <br>statement that only trusted parties can read. Only the authorized recipient understands the encoded message. The <br>research aims to develop a step-count data encryption model for minimizing information breaches in <br>transmission. In this research, the "key" length is the same as the original dataset, the cipher length is equal to <br>the original message, and it has a reduction in encrypting and decrypting times compared to the RSA algorithm.</p>I. O. Adeyemi S. O AkinolaS. K Olagunju F. S. Omotosho
Copyright (c) 2024 University of Ibadan Journal of Science and Logics in ICT Research
2024-10-282024-10-281221217Botnet Attack Detection in Internet of Things Using Selected Learning Algorithms
https://journals.ui.edu.ng/index.php/uijslictr/article/view/1469
<p>The Internet of Things (IoT) refers to a network of everyday devices, such as smartphones and industrial sensors, all connected to the Internet, allowing them to communicate and share data. IoT networks comprise various devices with different functions, communication protocols, and computational capabilities. This heterogeneity complicates the development of a one-size-fits-all solution for botnet detection. Developing effective botnet detection systems for IoT environments is challenging due to the diversity of devices, each with unique characteristics and behaviors. This study focuses on creating a robust model to identify botnet attacks across various IoT devices. Using the NB-IoT-23 datasets, which include data from five distinct devices, supervised machine learning techniques, namely Logistic Regression, Linear Regression, Artificial Neural Network (ANN), K-nearest neighbours (KNN), and Bagging, were employed to identify the most accurate and efficient method. The research highlights the Bagging ensemble technique as particularly effective. The Bagging model demonstrated remarkable performance, achieving an accuracy of 99.96%, precision of 99.93%, recall of 99.98%, an F1 score of 99.96%, and a Receiver Operating Characteristic Area Under the Curve (ROC-AUC) score of 99.96%, all within a training time of 27.59 seconds. These results suggest that the Bagging model is highly effective and very efficient, making it a strong candidate for real-world IoT botnet detection. The model's high accuracy and low computational overhead make it a viable solution for real-world applications of Botnet detection, contributing significantly to the ongoing efforts of stakeholders in securing IoT networks against botnet threats.</p>B. L AremuAro T. O Aro K. K Saka A. A SerikiR.O Raji
Copyright (c) 2024 University of Ibadan Journal of Science and Logics in ICT Research
2024-10-282024-10-281221826Enhancing Intermediate System Network Routing Mechanism for Wireless Sensor Networks through Swarm Intelligence Algorithms Techniques
https://journals.ui.edu.ng/index.php/uijslictr/article/view/1467
<p>Wireless Sensor Networks (WSNs) consist of nodes equipped with limited energy resources. These micro<br>sensors collect and relay data to a central node, but they often encounter challenges related to energy efficiency. <br>This study examines WSNs' architecture, uses, and energy issues, and introduces Particle Swarm Optimization <br>(PSO) and Firefly Optimization (FFO) to refine routing protocols. The focus is on enhancing the Intermediate <br>System Routing Protocol (ISRP) by addressing energy use, transmission delays, and packet delivery. The <br>method includes node placement, coverage, link stability, and optimization via PSO/FFO. Performance is <br>assessed through metrics such as energy consumption, delay, packet delivery ratio, and network lifetime <br>Performance is assessed through energy consumption, delay, packet delivery ratio, and network lifetime. These <br>research shows that optimizing ISRP with PSO and FFO leads to significant improvements: energy use <br>decreases from 0.235J to 0.14J, delay reduces by 0.5974s, packet delivery rises from 87% to 96%, and network <br>lifespan extends from 370s to 576s. This work enhances WSN efficiency and longevity, offering insights for <br>future studies.</p>O.Y. Bello-Sulayman I. O Mustapha K. K. Saka U. B Musa
Copyright (c) 2024 University of Ibadan Journal of Science and Logics in ICT Research
2024-10-282024-10-281222739Efficient Tuberculosis Detection Using Chest X-ray Images with Deep Learning Algorithms
https://journals.ui.edu.ng/index.php/uijslictr/article/view/1470
<p>Tuberculosis is a threat to the existence of the human race due to its substantial mortality rate and it has become a <br>significant public health concern, which if detected at an early stage could reduce the death rate globally. <br>Harnessing the potential of machine learning to combat the low detection rate of tuberculosis detection by traditional <br>methods and promote a faster and more accurate diagnosis of the disease. An online Dataset comprising 11,200 <br>Chest X-ray (CXR) images of different categories of patients that are healthy, Sick but not infected, and those <br>infected with Tuberculosis with their corresponding bounding box annotations were used for this research, and <br>feature engineering was carried out on the dataset for effective data cleaning, Image resizing, normalization, and <br>augmentation to increase the quality of data during data segmentation. The dataset was divided into training, <br>validation, and testing sets using the RestNet50 model which demonstrated a good performance in classification, <br>achieving impressive precision, and recall of 98%, and 96% respectively, and YOLOv8 was also used with 68% <br>precision, 65% recall, and 68% mean average precision respectively which showed that the model needs <br>improvement to further accurately detect regions infected with tuberculosis.</p>journal managerOlusesan A. Obakunle Oladimeji A Abiola Solomon O. Akinola
Copyright (c) 2024 University of Ibadan Journal of Science and Logics in ICT Research
2024-10-282024-10-281224048