3 results
Search Results
Now showing 1 - 3 of 3
Article Citation - WoS: 13Citation - Scopus: 18An E-Environment System for Socio-Economic Sustainability and National Security(Politechnika Lubelska, 2018) Okewu, Emmanuel; Misra, Sanjay; Fernandez Sanz, Luis; Maskeliunas, Rytis; Damasevicius, Robertas; Computer EngineeringThough there are adequate institutional frameworks and legal instruments for the protection of the Sub-Saharan African environment, their impact on the development and conservation (protection) of the environment leaves much to be desired. This assertion is substantiated by the reality that inspite of these regulatory frameworks, the environment is largely degraded with negative ramifications for the twin goals of attaining sustainable socio-economic advancement and realization of environmental rights. Both national and regional state of environment (SoE) reports show that degradation is apparent. It is worthy of mention that almost all African countries have ratified and domesticated the various regional and subregional environmental agreement. Efforts to solve the puzzle have revealed that corruption and environmental degradation in Sub-Saharan Africa are closely linked. Financial impropriety in ecological funds management, poorly equipped environmental protection institutions, and inadequate citizens' environmental management awareness campaigns are outcomes of corruption in the public sector. Since corruption thrives in the absence of transparency and accountability, this study proposes a cutting-edge technology-based solution that promotes participatory environmental accountability using an e-Environment system. The web-based multi-tier e-Environment system will empower both citizens and government officials to deliberate online real-time on environmental policies, programmes and projects to be embarked upon. Both parties will equally put forward proposals on the use of tax payers money in the environment sector while monitoring discrepancies between amount budgeted, amount released and actual amount spent. We applied design and software engineering skills to actualize the proposed solution. Using Nigeria as case study, our research methodology comprised literature review, requirements gathering, design of proposed solution using universal modelling language (UML) and development/implementation on the Microsoft SharePoint platform. In view of our determination to evolve a zero-defect software, we applied Cleanroom Software Engineering techniques. The outcome obtained so far has proved that the model supports our expectations. The system is not only practical, but ecologically sound. It is anticipated that the full-scale implementation of such an enterprise e-Environment system will decrease the current tide of corruption in the environment sector, mitigate environmental degradation and by extension, reduce social-economic tensions and guarantee national security.Article Citation - WoS: 25Identifying Phishing Attacks in Communication Networks Using Url Consistency Features(inderscience Enterprises Ltd, 2020) Azeez, Nureni Ayofe; Salaudeen, Balikis Bolanle; Misra, Sanjay; Damasevicius, Robertas; Maskeliunas, RytisPhishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks.Article Citation - WoS: 19Citation - Scopus: 24Gender Detection Using 3d Anthropometric Measurements by Kinect(Polska Akad Nauk, Polish Acad Sciences, 2018) Camalan, Seda; Sengul, Gokhan; Misra, Sanjay; Maskeliunas, Rytis; Damasevicius, RobertasAutomatic gender detection is a process of determining the gender of a human according to the characteristic properties that represent the masculine and feminine attributes of a subject. Automatic gender detection is used in many areas such as customer behaviour analysis, robust security system construction, resource management, human-computer interaction, video games, mobile applications, neuro-marketing etc., in which manual gender detection may be not feasible. In this study, we have developed a fully automatic system that uses the 3D anthropometric measurements of human subjects for gender detection. A Kinect 3D camera was used to recognize the human posture, and body metrics are used as features for classification. To classify the gender, KNN, SVM classifiers and Neural Network were used with the parameters. A unique dataset gathered from 29 female and 31 male (a total of 60 people) participants was used in the experiment and the Leave One Out method was used as the cross-validation approach. The maximum accuracy achieved is 96.77% for SVM with an MLP kernel function.

