University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr <p lang="en-GB" align="justify"><span style="font-size: medium;">The UIJSLICTR is a scholarly peer reviewed journal published twice in a year. The journal aims at providing a platform and encourages emerging scholars and academicians globally to share their professional and academic knowledge in the fields of computer science, engineering, technology and related disciplines. UIJSLICTR also aims to reach a large number of audiences worldwide with original and current research work completed on the vital issues of the above important disciplines. Other original works like, well written surveys, book reviews, review articles and high quality technical notes from experts in the field to promote intuitive understanding of the state-of-the-art are also welcome. </span><span style="font-size: medium;"><span lang="en-US">In this maiden edition, 18 articles were received from authors from the different parts of Nigeria including one from UK. At the end of the review process and plagiarism check, only nine were found to be publishable, as we intend to build quality into the Journal right from the outset. </span></span></p> en-US Fri, 07 Mar 2025 15:13:17 +0000 OJS 3.3.0.15 http://blogs.law.harvard.edu/tech/rss 60 A Machine Learning-Based Fraud Prevention Model for Improving Customers’ Trust in E-Commerce https://journals.ui.edu.ng/index.php/uijslictr/article/view/1402 <p class="p1">The growth of e-commerce has led to significant challenges regarding fraud, resulting in a decline in customer trust and confidence in online transactions. This research proposes a comprehensive Fraud Prevention Model aimed at enhancing customer trust and security within e-commerce platforms by integrating advanced machine learning (ML) techniques, an Address Verification System (AVS), and Two-Factor Authentication (2FA). The model leverages Convolutional Neural Network - Long Short-Term Memory Network (CNN-LSTM) and Random Forest techniques to capture the complexities and temporal dependencies of e-commerce transaction data. The AVS component of the system verifies transaction legitimacy by comparing billing addresses with credit card records, and the implementation of 2FA adds an extra layer of security. The system's effectiveness was evaluated through rigorous testing using a dataset of transaction records. The results indicate that the combined approach of machine learning, AVS, and 2FA significantly enhances the detection of fraudulent transactions and improves overall customer trust in e-commerce platforms.</p> journal manager Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1402 Fri, 07 Mar 2025 00:00:00 +0000 A Systematic Review of Computational Approach to Pipeline Leakage Detection in a Water Distribution Network https://journals.ui.edu.ng/index.php/uijslictr/article/view/1550 <p>The detection and localization of leakages in water distribution networks is crucial for both the conservation of<br>resources and the efficient operation. The process network has proved to be a difficult task over years,<br>considering the complexities inherent in water distribution networks. The enormous interconnected pipelines<br>make the leakage detection and location process burdensome. Computational techniques play a significant role in<br>this domain by offering advanced tools and techniques for leakage detection. This study, therefore, performed a<br>systematic review of published articles on computational leakage detection and localization in a water<br>distribution network. Findings show the number of recent quality studies on the computational approach to water<br>distribution network leakage research is beginning to dwindle, considering the journal's impact factor. In the<br>recent studies, a deep learning algorithm is beginning to trend as the most significant computational technique,<br>as it accounts for 13.21 % (n=7) of the pipeline leakage research output. The univariable predicated studies<br>account for 83.33%of the research output disseminated in the past five years. The invention of various efficient<br>learning methods and network structures in deep learning algorithms makes it suitable for the realization of<br>multi-disciplinary studies, as the multi-variable concept will reduce false positives and negatives, enhancing the<br>overall reliability of leak detection and localization models in future studies.</p> O.S. Ojo, R.O. Akinyede, O.D. Alowolodu, A Adebayo Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1550 Fri, 07 Mar 2025 00:00:00 +0000 Framework for a Stimulated Predictive Distributed Learning Method https://journals.ui.edu.ng/index.php/uijslictr/article/view/1551 <p class="p1">Due to the intrinsic properties of high-dimensional microarray datasets, most feature selection approaches do not</p> <p class="p1">scale well, which makes these models inapplicable and impairs the performance of most classifiers. This study</p> <p class="p1">used data complexity and stability measures to maintain class distribution and reduce features variability while</p> <p class="p1">proposing a novel predictive distributed FS model through horizontal partitioning. Brain tumour microarray</p> <p class="p1">benchmark was employed for implementation. Six classifiers as well as feature selection methods were</p> <p class="p1">employed along with their ensemble learning techniques. The study observed the proposed distributed model</p> <p class="p1">with an average accuracy of 98.54% and 99.67% obtained from both the single and ensemble</p> <p class="p1">models respectively.</p> E.C Igodan, J.O Iyekowa Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1551 Fri, 07 Mar 2025 00:00:00 +0000 Improved Stock Price Prediction Model in the Nigeria Bank Sector Using Ensemble Machine Learning Models https://journals.ui.edu.ng/index.php/uijslictr/article/view/1552 <p class="p1">Stock market prediction remains a critical challenge in emerging economies, particularly within volatile</p> <p class="p1">financial landscapes like Nigeria. Despite significant technological advancements, existing research</p> <p class="p1">predominantly relies on single-model approaches that inadequately capture the complex, non-linear dynamics of</p> <p class="p1">financial markets. This study addresses the methodological gap by developing an ensemble machine learning</p> <p class="p1">model for predicting stock prices in the Nigerian banking sector. The research utilized historical stock price data</p> <p class="p1">from Guaranty Trust Bank and First Bank (2018-2023), integrating advanced preprocessing techniques,</p> <p class="p1">employing rigorous data transformation, feature standardization, and cross-validation strategies, the study</p> <p class="p1">transforms raw financial data into a robust predictive framework. Empirical results reveal distinct performance</p> <p class="p1">metrics across ensemble models: Among the models, Gradient Boosting achieved an MAE of 0.1547, MSE of</p> <p class="p1">0.0918, and RMSE of 0.999, while the Stacking Regressor yielded an MAE of 0.1912, MSE of 0.1396, and</p> <p class="p1">RMSE of 0.9989, highlighting their accuracy and reliability in volatile market conditions. The ensemble</p> <p class="p1">methodology demonstrates superior performance in capturing intricate market dynamics, offering significant</p> <p class="p1">improvements over traditional forecasting techniques by integrating macroeconomic indicators and advanced</p> <p class="p1">machine learning algorithms. The findings underscore the potential of ensemble machine learning in decoding</p> <p class="p1">complex financial patterns, providing valuable insights for investors, financial analysts, and policymakers.</p> Ayoade Akeem Owoade Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1552 Fri, 07 Mar 2025 00:00:00 +0000 Integrating Zero-Trust Architecture with Deep Learning Algorithm to Prevent Structured Query Language Injection Attack in Cloud Database https://journals.ui.edu.ng/index.php/uijslictr/article/view/1553 <p class="p1">The increasing reliance on cloud databases has made them a prime target for cyber attacks, with Structured</p> <p class="p1">Query Language (SQL) injection being a particularly devastating threat. SQL injection attacks pose significant</p> <p class="p1">threats to database security, compromising sensitive information. Deep learning algorithms have emerged as</p> <p class="p1">effective solutions to detect and prevent SQL injection attacks. This study proposes a novel approach to</p> <p class="p1">detecting SQL injection attack by integrating deep learning-based detection with zero-trust architectute. The</p> <p class="p1">proposed system utilizes a Feed-Forward Neural Network (FNN)to analyze database queries and detect potential</p> <p class="p1">SQL injection attacks. The FNN model is trained on a dataset of labelled queries, allowing it to learn patterns</p> <p class="p1">and anomalies indictive of SQL injection attacks. The output of the FNN model is then integrated with zero-</p> <p class="p1">trust architecture, which enforces strict access controls and authentication mechanisms based on the results</p> <p class="p1">generated by the FNN model. The model exhibits a precision score approximating 100% accuracy in the</p> <p class="p1">classification of queries deemed normal, while achieving a 94% rate of correct classification for queries</p> <p class="p1">indicative of SQL injection attacks. By leveraging advanced machine learning techniques, our approach aims to</p> <p class="p1">identify and block malicious queries in real-time, ensuring the integrity and security of cloud-based data.</p> <p class="p1">Through a comprehensive evaluation, we demonstrate the effectiveness of our deep learning-based solution with</p> <p class="p1">zero-trust architecture in detecting SQL injection attacks with high accuracy and low false positives.</p> M. E Timadi , E.C.M Obasi Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1553 Fri, 07 Mar 2025 00:00:00 +0000 Predicting Students’ Academic Performance in Virtual Learning Environment Using Pearson Correlation Coefficient https://journals.ui.edu.ng/index.php/uijslictr/article/view/1554 <p class="p1">Feature Selection involves selecting the most relevant features from a dataset during the prediction process. The</p> <p class="p1">selection method of features greatly influences how accurate, understandable, and effective predictive models</p> <p class="p1">are. Predicting students' academic success or struggle in a Virtual Learning Environment (VLE) is limited.</p> <p class="p1">Students who drop out of online courses are substantially more numerous than those who drop out of traditional</p> <p class="p1">courses [1,2]. The methodology followed in the study involved the use of two approaches: training and testing</p> <p class="p1">machine learning models with features selected from the dataset, and the second approach involved training and</p> <p class="p1">testing the machine models using all features in the dataset without feature selection. The Pearson Correlation</p> <p class="p1">Coefficient (PCC) feature selection method is used to select the features used for prediction. The two</p> <p class="p1">approaches were compared in terms of their impacts on the performance of the machine learning algorithms.</p> <p class="p1">The study was carried using nine classification models, which include Logistic Regression, K-Nearest</p> <p class="p1">Neighbour (KNN), Support Vector Machine (SVM), Random Forest, Gradient Boosting, XGBoosting,</p> <p class="p1">LightGBM, MLP classifier (Neural Network) and Naïve Bayes. The result of the study showed that logistic</p> <p class="p1">Regression show highest accuracy mean of 0.7333 with feature selection and reduced accuracy mean of 0.7188</p> <p class="p1">when all features were used in the prediction process. Without feature selection, the accuracy mean of Random</p> <p class="p1">Forest is 0.6813 and applying PCC feature selection to select the features for prediction, the accuracy mean of</p> <p class="p1">Random Forrest increased to 0.7333 revealing that feature selection method such as PCC is important for</p> <p class="p1">improving model performance.</p> F.O Adelodun , W Sakpere, K. F Famurewa , Y.J Oguns Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1554 Fri, 07 Mar 2025 00:00:00 +0000 A Machine Learning-Based Predictive Model for the Classification of Academic Performance of Students https://journals.ui.edu.ng/index.php/uijslictr/article/view/1555 <p class="p1">Predicting student academic performance is critical for enhancing personalized learning and improving educational</p> <p class="p1">outcomes. Traditional assessment methods, while useful, often fail to capture the complex factors influencing</p> <p class="p1">performance, such as socio-economic background and engagement metrics. This study explores the development of a</p> <p class="p1">predictive model using an ensemble of machine learning algorithms to classify students' academic performance in</p> <p class="p1">higher institutions. By leveraging data collected from Department of Computer Science, Tai Solarin University of</p> <p class="p1">Education records, relevant features were selected using the mutual information method. The ensemble model was</p> <p class="p1">formulated and simulated using multiple machine learning algorithms such as Naïve Bayes (NB), Support Vector</p> <p class="p1">Machines (SVM) and Decision Trees (DT) in the Google CoLaboratory environment. The model’s predictive accuracy</p> <p class="p1">was evaluated based on key performance metrics, including accuracy, precision, and F-measure. Results indicate that</p> <p class="p1">the ensemble approach outperforms single-model methods by enhancing prediction robustness and reducing variance.</p> <p class="p1">This study demonstrates the effectiveness of machine learning techniques in identifying at-risk students early with NB</p> <p class="p1">and SVM having 100% accuracy respectively, allowing for timely interventions and improved resource allocation.</p> <p class="p1">Moreover, it contributes to evidence-based decision-making in educational institutions, helping to optimize learning</p> <p class="p1">experiences and boost student retention rates.</p> Oluwaseun B Adedeji, Olayinka, O Olusanya, Adedeji Adebare, Peter A Idowu, Ayoade, A Owoade, Ademola, A Omilabu Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1555 Fri, 07 Mar 2025 00:00:00 +0000 A Comparative Analysis of Ensemble Machine Learning Algorithms for Bank Customer Churn Prediction https://journals.ui.edu.ng/index.php/uijslictr/article/view/1556 <p class="p1">Customers churn became a serious issues to banks manager because customers have numerous options where to</p> <p class="p1">save their money. This justify why many researchers are attracted to this area. This study developed a bank</p> <p class="p1">customers churn predictive model. The study used dataset from kaggle.com repository. It consists of 10127</p> <p class="p1">instances and 20 parameters. One Hot Encoder was used as data preprocessing on the dataset. The data was divided</p> <p class="p1">into 80% for training and 20% for testing. The predictive model was created using Long Short-Term Memory</p> <p class="p1">(LSTM), Ensemble LSTM, and Random Forest (RF). The results of the model revealed LSTM with F1 score of</p> <p class="p1">0.94, accuracy of 0.9235, specificity of 0. 6635 sensitivity of 0.97, AUC of 0.95 and loss value of 0.1663. Ensemble</p> <p class="p1">LSTM with F1 score of 0.94, accuracy of 0.9057, specificity of 0.554, sensitivity of 0.98, AUC of 0.92 and loss</p> <p class="p1">value of 0.238. RF with F1 score of 0.97, accuracy of 0.95, specificity of 0. 774, sensitivity of 0.99, AUC of 0.99</p> <p class="p1">and loss value of 0.15. The study concluded that RF outperformed both LSTM and Ensemble LSTM. Also pointed</p> <p class="p1">out that customer’s gender, marital status, customer income category and age against attrition are determining factor</p> <p class="p1">for customer churn prediction. The model is recommended for banking sector to assist in decision making. Future</p> <p class="p1">work can be done using more ensembles techniques and perform more data expository</p> journal manager; Gbenga. O Ogunsanwo Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1556 Fri, 07 Mar 2025 00:00:00 +0000 A Multiclass Model for Adversary Domain Name Classification using Tree Based AI Classifiers https://journals.ui.edu.ng/index.php/uijslictr/article/view/1557 <p>The rising prevalence of AI-generated adversary (malicious) domain names has escalated the challenge of <br>combating cybercrime, particularly as spamming, phishing, and malware activities become increasingly common <br>online. Traditional approaches, such as blacklisting, binary detection systems, and basic lexical analysis of domain <br>names, prove insufficient for real-time identification of malicious domains across various cyber threat landscapes. <br>This study presents a comprehensive strategy for the multiclass detection of malicious domain names (MDNs) <br>utilizing data mining techniques. It investigates feature engineering processes, including dimensionality reduction <br>and variance inflation factor analysis, to identify and select domain name features that enhance the performance of <br>advanced AI and machine learning classifiers in classifying MDNs. We employed a train/test split ratio and cross-validation&nbsp;methods on the CIC-Bell-DNS2021 public dataset for training some cutting-edge AL/ML classifiers. The <br>findings reveal that tree-based machine learning algorithms, particularly the Extreme Gradient Boosting (XGBoost) <br>algorithm achieved outstanding results, with a mean accuracy score of 0.9998 (100%). Additionally, regarding <br>execution time, XGBoost displayed a notable advantage, requiring less time to build models, which could <br>significantly influence real-time detection capabilities when implemented as a cybersecurity tool for detecting <br>malicious domain names.</p> B. B Odigie, O. P Bernard Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1557 Fri, 07 Mar 2025 00:00:00 +0000 Optimising Malaria Prediction from Cell Images Using Forward Selection and Support Vector Machine Classifier https://journals.ui.edu.ng/index.php/uijslictr/article/view/1570 <p>Malaria is a significant health concern, primarily affecting tropical and subtropical regions. Traditional <br>diagnostic methods for malaria detection, such as microscopic blood smear analysis of cell images, are time<br>consuming, dependent on trained specialists, and prone to variability. Timely and accurate malaria detection is <br>crucial for prompt treatment and preventing severe complications. Therefore, this study developed a machine <br>learning (ML)-based model that could accurately predict malaria by analysing microscopic cell images, <br>enabling efficient and reliable diagnosis to support timely treatment decisions. Using the Kaggle malaria <br>dataset comprising 26,159 blood smear images, this study uniquely integrates forward feature selection and <br>Support Vector Machines (SVM) to enhance malaria prediction accuracy. Unlike existing works, it addresses <br>gaps in transparency and reproducibility in feature selection methods used for high-dimensional medical image <br>datasets. Forward selection was employed to optimise and select relevant features for the model, reducing <br>computational complexity and enhancing its performance. The SVM model achieved an accuracy of 97.1%, <br>recall of 97.4%, precision of 96.8%, F1-score of 96.9%, and an AUC score of 97.4%. These findings highlight <br>the potential of ML in automating malaria detection and demonstrate the practical advantage of combining <br>feature selection with high-performing classifier to optimise diagnostic workflows, especially in resource<br>limited settings.</p> O Folorunsho, O. O Faboya, S. A Mogaji, E Willie, I Ochidi Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1570 Fri, 07 Mar 2025 00:00:00 +0000 Evaluation of Machine Learning-Based Algorithm to Predicting Loan Default in Nigeria https://journals.ui.edu.ng/index.php/uijslictr/article/view/1559 <p>Accurately predicting loan defaults is critical in the financial sector to minimize losses and optimize credit risk <br>management. Traditional creditworthiness assessment methods often fail to capture the complex, dynamic <br>interactions in financial data, leading to inaccurate predictions. This study harnesses advanced machine learning <br>techniques to enhance the prediction of loan defaults, aiming to outperform traditional statistical models. A <br>dataset containing 50,000 borrower records with diverse characteristics, including demographic, financial, and <br>loan-specific features, was utilized. The data was split into training (70%) and test (30%) sets for model <br>development and evaluation. Various machine learning algorithms were tested, including Logistic Regression, <br>Decision Trees, Gradient Boosting Classifiers, Random Forest, and Gaussian Naive Bayes. The Gaussian Naive <br>Bayes (GaussianNB) model demonstrated superior performance, achieving an accuracy of 78.8% on the test set. <br>This model effectively captured complex patterns in the high-dimensional data, significantly reducing false <br>positives and false negatives compared to other models. The findings suggest that machine learning models, <br>particularly GaussianNB, offer substantial improvements in predictive accuracy for loan default risk assessments. <br>This findings can enhance lenders' decision-making processes by improving risk stratification and resource <br>allocation. Future research should explore integrating non-traditional data sources, such as behavioral and <br>macroeconomic variables, and employing deep learning techniques to further refine predictive accuracy.</p> K. O Efekodo, O. S Akinola, A. A Waheed Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1559 Fri, 07 Mar 2025 00:00:00 +0000 Leveraging Artificial Intelligence for Detecting Insider Threats in Corporate Networks https://journals.ui.edu.ng/index.php/uijslictr/article/view/1560 <p>In the modern corporate environment, insider threats pose a significant risk to data integrity, financial stability, <br>and overall cybersecurity. Unlike external attacks, insider threats originate from individuals within an <br>organization like employees, contractors, or partners who possess legitimate access to critical systems. <br>Traditional security measures often fail to identify these threats due to the complexity of distinguishing malicious <br>behaviour from regular activities. Artificial Intelligence (AI) based systems, with their ability to analyse large <br>datasets, detect subtle patterns, and adapt to evolving threat landscapes, offer a powerful approach to insider <br>threat detection. This research involves the application of machine learning algorithms to identify deviations from <br>normal users’ activities in corporate networks. The methodology involves analysing user behaviours and access <br>patterns, development and training a machine learning model for classifying user behaviours into normal or <br>abnormal activity. The system helps to identify abnormal user activities and flags suspicious activities in real time, <br>providing an early warning sign for potential breaches. The results demonstrate the effectiveness of machine <br>learning in enhancing threat detection, reducing insider threats, and improving overall cybersecurity in corporate <br>networks.</p> J. T Nnodi, E. C. M Obasi Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1560 Fri, 07 Mar 2025 00:00:00 +0000 A Review of Fixed Input Size Limitation in Convolutional Neural Networks Models and Proposed Solutions https://journals.ui.edu.ng/index.php/uijslictr/article/view/1561 <p>Convolutional Neural Networks (CNNs) are incredibly powerful deep learning techniques that have been applied <br>to computer vision applications to yield innovative results. CNNs are ideal for applications like object <br>identification, image segmentation, and image classification because they can automatically extract pertinent <br>information from the images without human supervision. While CNNs can attain state-of-the-art performance in <br>many applications and domains, most CNNs currently have limitations in training and prediction due to their <br>sensitivity to image size. As a result, image recognition datasets are typically downsized to the input size <br>specification of the CNN models. This study's objective is to examine CNN models and suggest possible <br>solutions to tackle the fixed input size problem that exists in CNN models.</p> K.F Famurewa, W Sakpere, F.O Adelodun Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1561 Fri, 07 Mar 2025 00:00:00 +0000 Education Systems Interoperability: Implications for Privacy and Security in Educational Management Information Systems https://journals.ui.edu.ng/index.php/uijslictr/article/view/1562 <p>The importance of robust Educational Management Information System (EMIS) becomes very essential in <br>addressing the complexities of data management, particularly as Nigerian educational systems is progressively <br>leveraging the interrelated platforms in order to enhance operational efficiency and data sharing. However, <br>educational sector is faced with several related challenges like: fragmented data, management systems, data <br>privacy concerns, inadequate technology infrastructure, interoperability that is poor between different platforms, <br>and lack of standardized protocols. These challenges made most institutions of learning to compromise the <br>security and integrity of sensitive information. This study presents conceptual model that exemplifies the <br>synergistic interactions among the major components of EMIS, by stressing the main roles of interoperability, <br>security and privacy. Interoperability is central and surrounded by Data Governance, Technology Infrastructure, <br>Privacy Measures, Regulatory Compliance, Security Measures, and Stakeholder Engagement. Each of the <br>components is interconnected to illustrate how technology infrastructure enable effective data exchange while <br>preserving sensitive information. The integration of these components in the proposed model offers qualitative <br>understanding for educational institutions to strive well in enhancing EMIS while securing stakeholder’s privacy. <br>This strategy addresses the present limitations of EMIS in Nigeria, opening way for a more efficient and safe <br>educational data management system. It is recommended that educational institutions should be encouraged in <br>adopting standardized procedures for seamless integration of EMIS in order to facilitate overall functionality <br>and efficient exchange of data. Also, institutions should develop clear data governance policies that prioritize <br>privacy and security, ensuring regulatory compliance and promoting responsible data use through regular <br>training and awareness programs.</p> O, A Adenubi, N Samuel, A. O Oyenuga Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1562 Fri, 07 Mar 2025 00:00:00 +0000 A Comparative Evaluation of Embedding Techniques from Language Models for Automatic Grading of Short Answer Questions https://journals.ui.edu.ng/index.php/uijslictr/article/view/1563 <p>An automatic grading system of short answer questions on an e-learning platform can help reduce stress, save <br>time, increase the productivity of instructors and help provide feedback to students in record time. However, the <br>success of automatic grading of short answer questions (open-ended questions) depends on the ability of the <br>computer to adequately capture the semantic similarity between students’ answers and the reference answer <br>provided by the examiner. This paper presents a comparative study of some embedding techniques from <br>language models for automatic grading of short answer questions in order to address the longstanding challenge <br>of automating the assessment of students' responses to open-ended questions. It studies five embedding <br>techniques such as Word2vec, Bi-LSTM, BERT, SBERT, and OpenAI on four datasets (SemEval, Texas, <br>ASAG, and MIT) to find the best method among them for Automatic Short Answer Grading (ASAG). <br>Experiments include regression tasks and classification tasks using Mean Squared Error (MSE), Pearson <br>Correlation, and accuracy as metrics for evaluation. The results indicate that fine-tuned BERT achieved the <br>highest accuracy of 75% on SemEval dataset in classification tasks, while OpenAI performed better in the <br>regression tasks with a MSE of 0.57 on the Texas dataset. The research highlights automated grading as a means <br>to reduce instructors' workload while enhancing the quality of feedback provided to learners. Future studies will <br>focus on extending the experiments to include both domain-specific and non-domain-specific.</p> V Odumuyiwa, O Adewoyin, A Fagoroye, E Fasina, B Sawyerr, O Sennaike Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1563 Fri, 07 Mar 2025 00:00:00 +0000 A Framework for Education Technology Integration in Nigerian Basic School System: Digital Framework for Technology Integration in Education (DiFTIE) for Basic School System https://journals.ui.edu.ng/index.php/uijslictr/article/view/1565 <p>The integration of technology into education has gained significant attention globally, however, the existing <br>frameworks such as: Technological Pedagogical Content Knowledge (TPACK), Substitution, Augmentation, <br>Modification, Redefinition (SAMR) and (Technology Integration Matrix (TIM) failed to address the unique <br>challenges faced by technology resource-limited contexts like Nigeria. This study designed and developed a <br>contextual model termed Digital Framework for Technology Integration in Education (DiFTIE) to address the <br>unique challenges facing technology integration in Nigerian basic schools. It was also developed to bridge the <br>existing digital divide among students by improving educational performance of students from diverse socio<br>economic backgrounds and to promote equitable access to technology-enhanced learning. The DiFTIE <br>Framework fills a major gap by suggesting a realistic, actionable, and adaptable model that is tailored to <br>Nigeria's socio-economic realities. DiFTIE framework surpasses traditional frameworks such as TPACK, <br>SAMR and TIM by emphasizing on policy alignment, foundational readiness and community involvement <br>(major elements in resource-limited contexts to enhance sustainable integration of technology). Components of <br>DiFTIE Framework include developing localized educational content, enhancing ICT infrastructure, provision <br>of teacher training programs and strengthening policy support. The DiFTIE Framework also provides well<br>structured and sustainable strategies for integrating educational technology into pedagogic experiences due to <br>the fact that the framework recognizes the specific needs of Nigerian educational system and its challenges. <br>Therefore, it is recommended that implementing the DiFTIE Framework would promote equitable access to <br>technology-enhanced learning for all students irrespective of gender and socio-economy background, display a <br>transformative role in bridging the digital divide in Nigerian basic education and to improve educational <br>performances of students across diverse socio-economic backgrounds.</p> O. A Adenubi, N Samuel, A. O Oyenuga Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1565 Fri, 07 Mar 2025 00:00:00 +0000 Enhancing Symmetric Encryption Using Digital Signatures https://journals.ui.edu.ng/index.php/uijslictr/article/view/1564 <p>Maintaining the confidentiality and integrity of digital documents transmitted through electronic media is a <br>critical security concern in the field of Information Security. To address this security concern, this paper <br>proposes a system that uses a digital signature to ensure the authenticity, non-repudiation and integrity of the <br>transmitted data and it also uses symmetric encryption to provide authentication and confidentiality of the <br>transmitted data. The Rivest, Shamir &amp; Adleman (RSA) algorithm was used to implement the Digital Signature <br>while the Advanced Encryption Standard (AES) was used for symmetric encryption. The system involves <br>encrypting a plaintext using AES, then a hash function (SHA-256) is used to create a hash value of the <br>ciphertext and the private key of the RSA algorithm is used to encrypt the hash value to produce the digital <br>signature. The ciphertext and the digital signature are attached and sent to the recipient. The digital signature is <br>decrypted by the recipient to obtain the hash value of the ciphertext, then it verifies if it is a valid signature <br>before proceeding to decrypt the ciphertext using the AES secret key. The proposed system was evaluated <br>against the existing AES algorithm. The size of the test file was observed and analyzed before and after <br>encryption, this showed that the size did not change. Different RSA key sizes were used to perform signature <br>and verification processes to see how long it takes to perform the operations, this also showed that the smaller <br>the key size the faster the signature and verification processes and the verification process is a much faster <br>process than the signature process. The system was able to meet the cryptography objectives and will be useful <br>to individuals and businesses in transmitting sensitive information over insecure communication mediums.</p> Y. Y Chamo Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1564 Fri, 07 Mar 2025 00:00:00 +0000 Development of a Knowledge Management System to Support Intelligent Rice Farming https://journals.ui.edu.ng/index.php/uijslictr/article/view/1566 <p>Rice is a staple food worldwide. It is most common in Asia, Africa and Latin America. In Ghana, the annual rice <br>consumption is about 1.5 million metric tons. However, about 60% of this demand is imported majorly from <br>Asia. This high reliance on imported rice is one of the contributory factors that weaken Ghana’s foreign <br>exchange reserves. Hence, there is a need to encourage local rice production. However, the efforts by local <br>farmers are thwarted by many challenges, including pest infestations, bird interference, insufficient technology <br>for efficient fertiliser and herbicide applications, and the absence of reliable systems for predicting rainfall <br>patterns. Additionally, inadequate access to modern agricultural extension services and the lack of advanced <br>storage facilities exacerbate these difficulties. Although numerous intelligent agriculture systems exist that could <br>address these issues in an environmentally sustainable manner, farmers in this region remain largely unaware of <br>such technologies and persist with outdated and inefficient methods. This study sought to address these <br>challenges by developing a customised Knowledge Management System (KMS) aimed at facilitating knowledge <br>dissemination and supporting intelligent agricultural practices in rice farming. The research used a system <br>prototyping methodology to produce a prototype KMS, which the System Usability Scale (SUS) evaluated for <br>usability. The system achieved an average score of 70.025, surpassing the threshold for "Acceptability <br>Usability," which denotes that the KMS meets the minimum standards for practical application. This result <br>highlights the potential for the KMS to enhance agricultural practices and improve productivity within the <br>community.</p> Essah Yaw Okai George, Olufemi Akinyede Raphael , Agangiba Millicent, Agangiba Akotam Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1566 Fri, 07 Mar 2025 00:00:00 +0000 Assessment of the Initial Adoption and Implementation of an Electronic Medical Records (EMR) System in a Nigerian Teaching Hospital https://journals.ui.edu.ng/index.php/uijslictr/article/view/1567 <p>All medical information related to patients can be displayed in a digital system known as the Electronic Medical <br>Record System. The system is an attempt by many medical facilities to design and implement a means of collecting, <br>storing, and presenting patients’ information at the point of care. EMRs are implemented worldwide because they <br>are recognized as a potential means of improving medical services' quality, safety, and efficiency. In Nigeria, the <br>Federal Ministry of Health has acknowledged the significance of EMRs for quality enhancement in healthcare <br>delivery and has directed all teaching hospitals to computerize their clinical processes. Based on this directive, some <br>teaching and national hospitals are now computerized. This paper aims to assess the initial adoption and <br>implementation of the EMR system in a Nigerian teaching hospital. The research design adopted in this paper is a <br>qualitative research design. Primary data were collected via participant observation and face-to-face interviews with <br>medical staff and information technology personnel who deployed the system. Also, the researchers reviewed <br>existing literature on adoption of electronic medical records systems and the pros and cons of adopting an electronic <br>medical records system. The tools used in developing the EMR system were JavaScript, C#, MSSQL server, Web <br>server (IIS), and Web browser is the program the user uses to view the web pages. The system has many modules <br>which can only be accessed by authorized members of staff based on the role they perform. The system comprises <br>of patient information module, Billing and payment module, Nurses module, Doctors module/clerking module, <br>Customizable Reporting/Quality reporting, clinical coding, NHIS module, Diagnoses, Diagnostic imaging system <br>(Radiology), E-prescription, and Laboratory information system. The system can still be improved upon through the <br>inclusion of more relevant modules for better clinical and patient experience.</p> K. F Famurewa, W Sakpere, F. O Adelodun Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1567 Fri, 07 Mar 2025 00:00:00 +0000 Artificial Intelligence-Assisted Retrieval of Owo Cultural Artifacts from Heterogeneous Online Sources https://journals.ui.edu.ng/index.php/uijslictr/article/view/1568 <p>Preservation of cultural heritage has increasingly been dependent on artificial intelligence (AI) to tackle issues of <br>documentation, accessibility and retrieval. The present research centers around the system of an AI-based <br>retrieval system designed for Owo cultural objects, a historically important collection in Ondo State, Nigeria. <br>Through machine learning, natural language processing, and chatbot technology, the system overcomes access <br>barriers, improves familiarity with, and comprehension of these artifacts. The study is based on data collection <br>across a range of sources, data pre-processing steps to enable structured storage, and the development of a Flask <br>based API to provide a platform for easy and on demand retrieval. A chatbot driven by Botpress is used as the <br>user interface to allow the system to be used via natural language queries. The AI model, by learning textual and <br>image-based representation, showed excellent accuracy for artifact retrieval, and multimodal learning itself <br>further improved performance of classification. The paper demonstrates the possibility of application of AI as <br>connecting bridge between classical preservation techniques and current digital accessibility, guaranteeing the <br>permanent recording and interaction with Owo cultural properties. Future developments include augmenting <br>NLP functionality, scaling the system, and increasing the scope of the datasets in order to further improve <br>accuracy of artifact retrieval.</p> B. R Ijasan, O Oriola, E. O Oyekanmi Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1568 Fri, 07 Mar 2025 00:00:00 +0000 A Robust Biometric Authentication Framework for Access Control https://journals.ui.edu.ng/index.php/uijslictr/article/view/1569 <p>Unauthorized access poses significant security concerns, jeopardizing the confidentiality, integrity, and <br>availability of critical data and resources. Ensuring authorized access is essential for protecting sensitive systems <br>across diverse fields, including smart buildings, military bases, hospitals, airports, and financial institutions. <br>Biometric authentication has emerged as a reliable solution for access control, leveraging unique human traits for <br>verification. However, traditional feature-based biometric systems are limited by environmental sensitivity, poor <br>generalization, and vulnerability to spoofing, while deep learning-based systems face challenges such as high <br>computational demands, reliance on large datasets, and lack of interpretability. To address these limitations, this <br>research proposes a hybrid biometric authentication framework that combines the strengths of deep learning, <br>specifically Residual Network (ResNet)-a Convolutional Neural Network (CNN), with the Local Binary Pattern <br>(LBP) method. By integrating interpretable, computationally efficient features from LBP with ResNet’s ability to <br>learn complex patterns, the framework improves robustness, reduces overfitting, and enhances scalability. This <br>approach offers a balanced, efficient solution for secure biometric authentication, tailored for real-world and <br>resource-constrained environments.</p> T Achimba, O. J Okhuoya, R. O Akinyede, P. A Alabi, A Ibrahim, G Ateata Copyright (c) 2025 University of Ibadan Journal of Science and Logics in ICT Research https://journals.ui.edu.ng/index.php/uijslictr/article/view/1569 Fri, 07 Mar 2025 00:00:00 +0000