Mathematics and Computer Science

  • An approximation algorithm for minimizing congestion in the single-source k-splittable flow

    An approximation algorithm for minimizing congestion in the single-source k-splittable flow Chengwen Jiao*, Qi Feng, Weichun Bu College of Science, Zhongyuan University of Technology, Zhengzhou, Henan 450007, People’s Republic of China In the traditional multi-commodity transmission networks, the number of paths each commodity can use is unrestricted, and the commodities can use arbitrary number of paths to transmit the flow. However, in the real transmission networks, too many paths will increase the total transmission cost of the network and also…

  • Application of the Discrete Geometrical Invariants to the Quantitative Monitoring of the Electrochemical Background

    Application of the Discrete Geometrical Invariants to the Quantitative Monitoring of the Electrochemical Background R. R. Nigmatullin1, H. C. Budnikov2, A. V. Sidelnikov3, E. I. Maksyutova3 1Radioelectronic and Informative-Measurements Techniques Department, Kazan National Research Technical University (KNRTU-KAI)K. Marx str. 10. , 420011, Kazan, Tatarstan, Russian Federation; 2A.M. Butlerov Institute of Chemistry, Kazan Federal University (KFU), Kazan, Russian Federatio; 3Chemistry Department, Bashkir State University, Ufa, Russian Federation In this paper, we apply the statistics of the fractional moments (SFM) and discrete…

  • An Implementation of a One-Time Pad Encryption Algorithm for Data Security in Cloud Computing Environment

    An Implementation of a One-Time Pad Encryption Algorithm for Data Security in Cloud Computing Environment Omotunde Ayokunle A*1, Faith Adekogbe2, Onuiri Ernest3, Precious Uchendu4 1Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria. 2Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria 3Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria 4Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria The cloud is a computing model used by many consumers which include individuals and organizations for data storage which hitherto…

  • Expert System Model for Diagnosing Legume Diseases

    Expert System Model for Diagnosing Legume Diseases Rahmon,I.A,Adebola_Akinsanya and Eze M.,. Computer Science Department Babcock University, Ilishan, Ogun State. There is a current surge in designing expert systems to solve problems like humans in different domains of research but there presently exist dearth of models that can guide designers of expert systems that can be used to accurately diagnose Soya beans diseases. Soya bean is a leguminous plant that is commonly grown in sub Saharan region and it is currently…

  • A Conceptual Design and Evaluation Framework for Mobile Persuasive Health Technologies (Usability Approach)

    A Conceptual Design and Evaluation Framework for Mobile Persuasive Health Technologies (Usability Approach) Kasali, F. A.1, Awodele, O.2, Kuyoro, S.3, Akinsanya, A.4, Eze, M.5 1,2,3,4,5Department of Computer Science and Information Technology, Babcock University, Ogun State, Nigeria Persuasive techniques are recently being explored by computer science researchers as an effective strategy towards creating applications that are aimed at positive attitudinal changes especially in the health domain but finding effective evaluation approaches for these technologies remain an herculean task for all stakeholders…

  • A Logical Approach for Empirical Risk Minimization in Machine Learning for Data Stratification

    A Logical Approach for Empirical Risk Minimization in Machine Learning for Data Stratification 1Taiwo, O. O., 2Awodele O., 3Kuyoro, S. O. 1,2,3Department of Computer Science, Babcock University, Ilishan-Remo, Ogun State, Nigeria The data-driven methods capable of understanding, mimicking and aiding the information processing tasks of Machine Learning (ML) have been applied in an increasing range over the past years in diverse areas at a very high rate, and had achieved great success in predicting and stratifying given data instances of…

  • Session Hijacking in Mobile Ad-hoc Networks: Trends, Challenges and Future

    Session Hijacking in Mobile Ad-hoc Networks: Trends, Challenges and Future Kuyoro Shade O., Okolie Samuel O. and Oyebode Aduragbemi Department of Computer Science, Babcock University, Nigeria Technological advancement in the field of telecommunication has led to the creation of highly dynamic networks, one of such is Mobile Ad-Hoc Networks which can be described as an autonomous collection of devices (mobile devices) that offers dynamic topologies, no central administration, dynamic and ever mobile nodes and so on, information becomes easy to…

  • Human Gait identification System

    Human Gait identification System Ali Mohammed mohaisun 1, Muayad Sadik Croock 2 1 Informatics Institute for Postgraduate Studies, 2 University of Technology, Computer Engineering Department. Few biometrics can be used to recognize a person from distance without need for direct sharing or cooperation of that person, gait (walking behavior) is one of them. Walking behavior (gait) recognition includes specifying person identity by analyzing his walking style (walking manner). In this paper, a human gait identification system depending on extracted features,…