Papers by Tertsegha Anande
International Journal of Computers and Applications
Bookmarks Related papers MentionsView impact
International Journal of Advance Engineering and Research Development, Jul 31, 2017
Bookmarks Related papers MentionsView impact
International Journal of Applied Information Systems, 2017
Bookmarks Related papers MentionsView impact
International Journal of Applied Information Systems, 2016
Bookmarks Related papers MentionsView impact
International Journal of Applied Information Systems, 2016
Bookmarks Related papers MentionsView impact
The most common challenged in today’s world is security of lives and properties. This has necessi... more The most common challenged in today’s world is security of lives and properties. This has necessitate the need to concentrate effort towards improving the security frame work currently in existence and the need to build new ones were applicable. In this research a comprehensive literature study and implementation related to the various door locks and gate security systems in areas such as home, vehicles, banks and industries where possibilities of incursion are increasing day by day is realized. The input of the system in this design has two stages of authentication, stage 1 is the screen pattern inputted via the TFT touch screen and stage 2, is the knock pattern inputted via the piezoelectric sensor. The TFT touch screen and piezo sensor are connected directly to the microcontroller and both stages have to be verified before the Arduino microcontroller sends an electric signal to the DC motor which turns the deadbolt and unlocks the safe. The user first inputs his recorded screen p...
Bookmarks Related papers MentionsView impact
This paper is about the implementation of a software tool to aid the study of chaos theory in the... more This paper is about the implementation of a software tool to aid the study of chaos theory in the the context of the financial or commodities markets. The main focus of this paper is simulating the movement of oil prices in an attempt to identity chaos when it exists. Models implemented represent certain economically realistic aspects of the oil market. Tests for chaos (Lyapunov exponent test) will be conducted on these models, an attempt will be made to test for chaos in the movement of the price of oil dated from 2006 to 2016. The models implemented here are nonlinear models with the potential of exhibiting chaos for certain parameter values. Shocks will be introduced into the models and their effect on the models will be noted and visualized through the use of a time series or graphs. An Object oriented programming language (Java) was used in building this application, MYSQL database was used to save the data generated by the models and the spiral software development life-cycle was used in structuring, planning and controlling the process of building this application.
Bookmarks Related papers MentionsView impact
Rootkits are a major security concern for smartphones today. They have always been around, though... more Rootkits are a major security concern for smartphones today. They have always been around, though largely operational on desktops and PCs. On the mobile platform, their presence was not very popular until the advent of smartphones and advanced mobile devices. The rapid developments and trends recorded on smartphones today make them highly vulnerable to rootkit attacks. Smartphone operating systems now come highly sophisticated and packaged with advanced functionality to keep record of users' diary, sensitive personal and security details, among others. These features make them a prime choice for attacks from rootkit authors, who explore all available avenues to exploit and extract this information for malicious purposes. Cases of rootkit attacks have continued to increase with more of such attacks targeted at popular smartphone operating systems like Android. In this research, we discuss rootkits, illustrating their operational architecture and operation with a design of a kernel rootkit for the Linux kernel 2.6. We explore possible measures to combat rootkits on the mobile platform, using Android as a case study
Bookmarks Related papers MentionsView impact
In the recent past, robotic vehicles used for various applications make use of wireless technolog... more In the recent past, robotic vehicles used for various applications make use of wireless technology in controlling the vehicles. The major drawback of these wireless unmanned robots is that they normally make use of radio frequency (RF) circuits for maneuver and control. Principally RF circuits suffer from a lot of disadvantages such as limited control and limited frequency range i.e. working range. To overcome these challenges associated with RF control, other methods have been implemented which make use of the global system for mobile communication (GSM) network and the dual tone multiple frequency (DTMF) function of a cell phone to control the robotic vehicle. Although this work uses the same principle as the technology of the GSM network. It essentially shows the construction of a circuit using Graphical User Interface (GUI) and GSM modules which send commands to control the movement and direction of the vehicle with the use of a PIC microcontroller. GUI is the main controlling system of the vehicle. The GUI generates five different coded signals with the help of visual basic. These signals are transmitted through the communication (COM) port of the personal computer (PC) to the GSM module interface. These commands are sent as a short messaging services (SMS) to another GSM module interfaced with the microcontroller and they control the robot accordingly. As the vehicle moves about the target area, once any GUI control button is clicked on the PC, an SMS is sent is through the GSM module interfaced with the PC to the GSM module on the remote robotic vehicle to control the direction of the robot.This robotic vehicle was implemented, GUI Commands sent from the remote robot control station were received and the robot moved accordingly.
Bookmarks Related papers MentionsView impact
Decision making process has greatly been influenced by the data mining methods applications. The ... more Decision making process has greatly been influenced by the data mining methods applications. The utilization of data mining algorithms and methods to analyze various types of data has shown great advantages in different sectors of life. Some of the data require little or no preparations before being processed. Others meanwhile require large pre-processing because of the complex nature of those data sets. To ensure efficiency in the data mining process, the dimensionality of these data has to be reduced before mining. The WEKA data mining tool allows for the process of data pre-processing in terms of feature or attribute selection to enhance the accuracy and efficiency of data. The study applied the classification algorithms and feature selections on the IDP data sets, to determine the accuracy and efficiency between the different classifications and thus suggest how this can help manage data in the rising humanitarian crisis. The study concludes by acknowledging the need for a better data understanding and suggesting the appropriately the feature selection and classification algorithms that can be applied in Data mining in the humanitarian sector in Nigeria.
Bookmarks Related papers MentionsView impact
Many individuals diagnosed with diabetes find themselves in the need to rethink their common dail... more Many individuals diagnosed with diabetes find themselves in the need to rethink their common daily routines, and alter their lifestyle and habits. Computing technology, especially ubiquitous computing applications, can help individuals maintain a high level of awareness of their health, reflect on and learn from their past experiences, and generally improve their diabetes management practices. However, to be successful, these applications require continuous engagement from their users and must be able to adapt to the changing environments of use, their users' changing health and their growing understanding of their disease. In this work we designed the graphic user interface (GUI) of an android smartphone with features such as patient's glucose level, time information is received, patient's location with the aid of global positioning system (GPS), like colour code, voice recorder and facial expression for the different glucose levels. This system also utilizes Google sheet to manage Personal Health Records (PHRs), which not only bridges the gaps between patients and different health care providers but enabling accesses to patients' PHRs anywhere and anytime by taking advantage of the universal accessibility of Google sheet. The system further integrates with GPS, Google Search and Google Map functionalities to facilitate the user to find all hospitals near to his/her current location.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Tertsegha Anande