Covenant Journal of Informatics and Communication Technology https://journals.covenantuniversity.edu.ng/index.php/cjict <p>The Covenant University journal of Informatics and Communication technology is a multidisciplinary peer reviewed biannual journal, publishing high-quality articles in all disciplines of Informatics and Communication Technology. Articles that cover research in any area of Electrical and Electronics Engineering, Management, Computer science, Communication Engineering, Information Sciences and Technology, informatics and real world application of Science and Technology will be accepted. The Journal invites the original research work and contributions on innovative ideas, theory and concepts, new results and findings, Empirical studies, results and observations, Results from the industries, novel applications, by leading researchers and developers regarding the latest fundamental advances in the core technologies.</p> Covenant University en-US Covenant Journal of Informatics and Communication Technology 2354-3566 Concept of Cryptographic Operations Based on Code Division Multiple Access https://journals.covenantuniversity.edu.ng/index.php/cjict/article/view/4062 <p>It is a given that numerous users connect to a single satellite transponder on a daily basis in order to communicate while discussing any satellite-based technology. As a result, they must all share the resources that are available without compromising the privacy of one another. Thus, the multiple access strategy is employed to achieve this. This paper focuses on code division multiple access, which does not require time slots or frequency slots to be shared across numerous users. The primary source of communication problems is multipath fading; and if the signal undergoes any multipath fading, then the total signal may be distorted. This work presents improved correlation features of the current Walsh code through one simple yet powerful algorithm. Here, a simulation-based method is used to evaluate performance. Utilizing power delay profiles in several mobile radio propagation channels, measurement-based channel models for indoor, outdoor, suburban, and urban environments are derived. The number of taps and tap gains are then estimated using statistics on the path loss characteristics. Since the source, output is known it is compared with a delayed version of the decision device output to obtain an empirical basis for the error rate. The suggested code’s performance is then compared to a few existing orthogonal and semi- orthogonal codes using a variety of performance criteria, and the conclusion is that this proposal is superior.</p> Akhigbe-mudu Thursday Ehis Copyright (c) 2023 2023-12-05 2023-12-05 27 27 Enhancing Lifetime of Wireless Sensor Networks: A Review https://journals.covenantuniversity.edu.ng/index.php/cjict/article/view/4064 <p>Low&nbsp;Energy&nbsp;Adaptive&nbsp;Clustering&nbsp;Hierarchy&nbsp;(LEACH)&nbsp;is&nbsp;a network&nbsp;of&nbsp;wireless&nbsp;sensors&nbsp;made&nbsp;up&nbsp;of&nbsp;tiny&nbsp;sensor&nbsp;nodes&nbsp;that&nbsp;are capable&nbsp;of sensing,&nbsp;processing,&nbsp;and&nbsp;transmitting information and feedback.&nbsp;These&nbsp;sensor&nbsp;nodes&nbsp;are&nbsp;distributed&nbsp;at&nbsp;random&nbsp;in&nbsp;a&nbsp;sensing&nbsp;environment or sensor field&nbsp;to&nbsp;sense&nbsp;real-world&nbsp;phenomena&nbsp;like&nbsp;heat,&nbsp;moisture,&nbsp;humidity,&nbsp;sound,&nbsp;vibration,&nbsp;etc.,&nbsp;and&nbsp;then&nbsp;aggregate&nbsp;and&nbsp;send&nbsp;to&nbsp;the base&nbsp;station (BS). The&nbsp;significance&nbsp;of&nbsp;energy energy-effective routing&nbsp;algorithm&nbsp;has&nbsp;risen,&nbsp;since the&nbsp;energy constrain&nbsp;is&nbsp;the&nbsp;major&nbsp;factor&nbsp;affecting&nbsp;sensor&nbsp;nodes.&nbsp;To&nbsp;control&nbsp;and&nbsp;manage&nbsp;the energy&nbsp;consumption&nbsp;of&nbsp;sensor&nbsp;nodes,&nbsp;a&nbsp;significant&nbsp;number&nbsp;of&nbsp;techniques&nbsp;have&nbsp;been&nbsp;proposed&nbsp;by&nbsp;various&nbsp;scholars.&nbsp;This&nbsp;review&nbsp;paper&nbsp;presents&nbsp;published&nbsp;works&nbsp;that&nbsp;have&nbsp;been&nbsp;proposed&nbsp;for&nbsp;increasing&nbsp;the&nbsp;lifespan&nbsp;of&nbsp;wireless&nbsp;networks&nbsp;at&nbsp;the&nbsp;very&nbsp;beginning&nbsp;of&nbsp;this&nbsp;paper,&nbsp;a&nbsp;brief overview&nbsp;of&nbsp;Wireless&nbsp;networks,&nbsp;its&nbsp;architecture&nbsp;working&nbsp;and&nbsp;the problems&nbsp;associated&nbsp;with&nbsp;it&nbsp;are&nbsp;discussed.&nbsp;After&nbsp;the&nbsp;detailed&nbsp;overview&nbsp;of&nbsp;the&nbsp;approaches&nbsp;that&nbsp;have&nbsp;been&nbsp;presented&nbsp;for&nbsp;overcoming&nbsp;various limitations&nbsp;of&nbsp;current&nbsp;wireless&nbsp;systems.&nbsp;Lastly,&nbsp;in&nbsp;the conclusion&nbsp;of&nbsp;this&nbsp;paper&nbsp;the reviewed&nbsp;results&nbsp;were&nbsp;compared&nbsp;with&nbsp;earlier&nbsp;techniques,&nbsp;the&nbsp;results&nbsp;thus&nbsp;far&nbsp;show&nbsp;a&nbsp;notable&nbsp;improvement&nbsp;in&nbsp;the&nbsp;node&nbsp;mortality&nbsp;rate&nbsp;and&nbsp;network&nbsp;lifetime.</p> Babagana Sadiq Daniel Isuwa Umar Ali Beniheikh Copyright (c) 2023 2023-12-05 2023-12-05 16 16 Combating Cybercrime Perpetrated Via Social Media Channels Using Individual Resilience Techniques https://journals.covenantuniversity.edu.ng/index.php/cjict/article/view/4065 <p>Cybercrime is a social vice associated with modern society due to the rapid development of technology. Various studies over the years have shown that there is no society without an element of cybercrime. Cybercrime also has negative economic implications for nations and businesses globally. Over the years, several approaches have been employed to reduce the rate of cybercrime by employing various combating techniques. Hence, this study explores individual resilience techniques used in combating cybercrime perpetrated via social media channels in<strong>&nbsp;</strong>Abuja. Three goals and research agendas were developed to guide the research toward achieving the stated goal: a review of relevant literature, a qualitative and quantitative survey design involving about seven million, one hundred and ten thousand internet subscribers that use social media in Abuja, and a sample size of four hundred respondents from the study area were selected using the Taro Yamane purposive sampling technique. The respondents’ data were collected using a twelve-item structured questionnaire. Completed instruments of the sample size were analysed using mean values and standard deviations designed using Google Forms. The results showed that identity theft, cyberstalking, malware attacks, and cyber-casing are major cybercrimes perpetrated online by cyber attackers, and these attacks have led to harassment, child exploitation, digital piracy, and intentional damage to individuals’ online reputations. However, anti-malware, outlier detection, password managers, and multi-factor authentication (MFA) are various individual resilience techniques social media users can employ to combat cybercrime on social media. Creating more awareness of cybercrime and the various individual resilience techniques required in protecting social media accounts on web-enabled devices and setting up a special task force void of bias to help cybercrime victims regain their assets were recommended.</p> Francis Alexander Aleke Onyibe Glory Nosawaru Edegbe Samuel Omaji Akinola Samuel Olayinka Copyright (c) 2023 2024-01-01 2024-01-01 15 15 Mel-Frequency Cepstral Coefficients and Convolutional Neural Network for Genre Classification of Indigenous Nigerian Music https://journals.covenantuniversity.edu.ng/index.php/cjict/article/view/4066 <p>Music genre classification is a field of study within the broader domain of Music Information Retrieval (MIR) that is still an open problem. This study aims at classifying music by Nigerian artists into respective genres using Convolutional Neural Networks (CNNs) and audio features extracted from the songs. To achieve this, a dataset of 524 Nigerian songs was collected from different genres. Each downloaded music file was converted from standard MP3 to WAV format and then trimmed to 30 seconds. The Librosa sc library was used for the analysis, visualization and further pre-processing of the music file which includes converting the audio signals to Mel-frequency cepstral coefficients (MFCCs). The MFCCs were obtained by taking performing a Discrete Cosine Transform on the logarithm of the Mel-scale filtered power spectrum of the audio signals. CNN architecture with multiple convolutional and pooling layers was used to learn the relevant features and classify the genres. Six models were trained using a categorical cross-entropy loss function with different learning rates and optimizers. Performance of the models was evaluated using accuracy, precision, recall, and F1-score. The models returned varying results from the classification experiments but model 3 which was trained with an Adagrad optimizer and learning rate of 0.01 had accuracy and recall of 75.1% and 84%, respectively. The results from the study demonstrated the effectiveness of MFCC and CNNs in music genre classification particularly with indigenous Nigerian artists.</p> Akinosho Oluwadamilola Abayomi-Alli Adebayo Arogundade Oluwsefunmi ‘Tale Oladejo Rachel Adefunke Adedapo Olufikayo A. Copyright (c) 2023 2023-12-04 2023-12-04 GIS-Based Flood Vulnerability Assessment Using Integral Value of Inverse Function Ranked Fuzzy-AHP Technique. https://journals.covenantuniversity.edu.ng/index.php/cjict/article/view/4067 <p>Flooding is a common natural disaster which often causes extensive agricultural, infrastructural and socio-economic damages. In this study, a Geographic Information System (GIS) based flood vulnerability assessment using an improved integral value of inverse function ranked, Fuzzy Analytical Hierarchical Process (FAHP) technique for fast and accurate computation of flood vulnerability assessment across Oyo State, Southwest Nigeria is presented. The flood vulnerability assessment focuses on determining the spatial extent and flood vulnerability class of cultivated lands, settlements and road infrastructures across the study area for effective flood management. Based on the literature review, six prominent flood causative factors namely, elevation, slope, soil, rainfall, drainage density and land use/land cover were used as input criteria in this study. The improved integral value ranked FAHP technique uses both the left and right inverse function of a triangular membership function with an index of optimistic function to derive the weight for each input criterion. A flood vulnerability map for the study area was created using Geographic Information System (GIS) techniques based on the aggregation of the input causative criteria and their derived weights. Furthermore, maps showing the spatial extent and the flood vulnerability classes of cultivated lands, settlements and paved road infrastructures across the study area were made. The output vulnerability maps serve as an early warning system that would further assist policymakers and stakeholders in minimizing the effects of flooding on food security, road infrastructures, lives and properties across the study area.</p> Atijosan Abimbola Isa Ibrahim Copyright (c) 2023 2023-11-30 2023-11-30 22 22