Department of Computer Science

Permanent URI for this collectionhttps://irepos.unijos.edu.ng/handle/123456789/11435

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    State of the Art in Biometric Key Binding and Key Generation Schemes
    (International Journal of Communication Networks and Information Security, 2017-12) Abayomi Jegede1,2, Nur Izura Udzir1, Azizol Abdullah1, Ramlan Mahmod
    Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Biometric cryptosystems or template protection schemes are used to overcome the security and privacy challenges associated with the use of biometrics as a means of authentication. This paper presents a review of previous works in biometric key binding and key generation schemes. The review focuses on key binding techniques such as biometric encryption, fuzzy commitment scheme, fuzzy vault and shielding function. Two categories of key generation schemes considered are private template and quantization schemes. The paper also discusses the modes of operations, strengths and weaknesses of various kinds of key-based template protection schemes. The goal is to provide the reader with a clear understanding of the current and emerging trends in key-based biometric cryptosystems.
  • Item
    A Virtual-Community-Centric Architecture to Support Coordination in a Large Scale Distributed Environment: A Case Study of the South African Public Sector
    (International Journal of Innovative Science, Engineering & Technology,, 2018-07) Godwin A. Thomas1, Reinhardt A. Botha2 and Darrell van Greunen 3
    Coordination in a distributed environment is customarily a difficult endeavour. The work pattern that emerges owing to the complexities associated with size, autonomy, structure and geographical dispersal of the participants provides unique coordination challenges, as evidenced in the South African Public Sector. To take advantage of opportunities and maximise the utilisation of limited resources, entities are required to periodically collaborate. This denotes that the need for effective coordination and cooperative collaboration among role players is crucial, to ensure that the ineffective use of resources does not occur, through incoherence, fragmentation and the duplication of efforts. This paper presents an overview of Virtual community-centric architecture that has the potential to support and promote sustainable coordination within the South African public sector. The architecture looks to support the operations of a context aware collaboration life cycle model geared to streamline coordination in a distributed environment from a collaborative stand point.
  • Item
    IDENTIFYING RECOVERY PATTERNS FROM RESOURCE USAGE DATA OF CLUSTER SYSTEMS
    (Science World Journal, 2018) Nentawe Gurumdimma 1 , Gideon Dadik Bibu2 , Desmond Bala Bisandu3 , Mammuan Titus Alams
    Failure of Cluster Systems has proven to be of adverse effect and it can be costly. System administrators have employed divide and conquer approach to diagnosing the root-cause of such failure in order to take corrective or preventive measures. Most times, event logs are the source of the information about the failures. Events that characterized failures are then noted and categorized as causes of failure. However, not all the ’causative’ events lead to eventual failure, as some faults sequence experience recovery. Such sequences or patterns constitute challenge to system administrators and failure prediction tools as they add to false positives. Their presence are always predicted as “failure causing“, while in reality, they will not. In order to detect such recovery patterns of events from failure patterns, we proposed a novel approach that utilizes resource usage data of cluster systems to identify recovery and failure sequences. We further propose an online detection approach to the same problem. We experiment our approach on data from Ranger Supercomputer System and the results are positive.
  • Item
    Cancelable and hybrid biometric cryptosystems: current directions and open research issues
    (2017-09-21) Abayomi Jegede; Nur Izura Udzir; Azizol Abdullah; Ramlan Mahmod
  • Item
    UNDERSTANDING ERROR LOG EVENT SEQUENCE FOR FAILURE ANALYSIS
    (Science World Journal, 2018) Nentawe Gurumdimma1 , Desmond Bala Bisandu
    Due to the evolvement of large-scale parallel systems, they are mostly employed for mission critical applications. The anticipation and accommodation of failure occurrences is crucial to the design. A commonplace feature of these large-scale systems is failure, and they cannot be treated as exception. The system state is mostly captured through the logs. The need for proper understanding of these error logs for failure analysis is extremely important. This is because the logs contain the “health” information of the system. In this paper we design an approach that seeks to find similarities in patterns of these logs events that leads to failures. Our experiment shows that several root causes of soft lockup failures could be traced through the logs. We capture the behavior of failure inducing patterns and realized that the logs pattern of failure and non-failure patterns are dissimilar.