Nwokorie Euphemia

Nwokorie Euphemia
Federal University of Technology Owerri | FUTO · Department of Computer Science

Doctor of Philosophy

About

34
Publications
11,756
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations

Publications

Publications (34)
Conference Paper
Full-text available
Mobile virtualization is an approach to mobile device management in which more than one virtual operating systems (platforms) are installed on a single wireless device. With the recent increase in mobile phone usage and over dependence of people on their phones these days to do virtually everything, mobile phone virtualization is now hugely seen as...
Conference Paper
Full-text available
This paper has examined the effect of temperature compensator in thermal efficiency management in data centre. The use of computer room air control (CRAC) unit in ensuring thermal efficiency facilitate thermal process stability such that variation of temperature does not exceed predetermined value expected for effective working of data centre infra...
Article
Full-text available
The Internet of Things (IoT) is changing the conventional way of doing business, worldwide. The focus of business is on reducing the cost that pertains to attracting and retaining customers, while rendering service to them. Although this may not be a new approach, the objective of this paper today is now more on improving Quality of Service (QoS) i...
Article
Full-text available
Nigerian security challenges have attracted attention in recent times due to several criminal activities such as kidnappings, armed robbery, hired assassins and lately Boko Haram attacks. This work aimed to analyze Boko Haram insurgency attacks menace in Nigeria using big data analytics model. DynamicK-reference Clustering Algorithm an improved Big...
Article
Full-text available
Big Data poses enormous challenges to traditional machine learning algorithms. In Information Technology, Big Data is a collection of datasets so large and complex that they become difficult to compute and process using existing database management tools or traditional data processing applications. In this work we have proposed an improved model fo...
Article
Full-text available
This study attempts to examine the activity, awareness and measures being adopted by staff and students in tertiary institutions to overcome the cyber security challenges. A total of one hundred and twenty (120) staff and students were sampled from three different tertiary institutions in Owerri-Imo State, Nigeria using random sampling technique. A...
Research
Full-text available
The idea of anonymity in all fields of modern cryptography is given due attention so as to improve users’ experience and security. Generally, in broadcast encryption schemes, a broadcaster first chooses a set S of users who will be able to decrypt broadcast messages as authorized users’ set and encrypts a computed secret broadcast as a part of a ci...
Article
Full-text available
Human Beings are born to be Intelligent on the average Score. Our Society has deteriorated greatly in learning, especially children. Now many children carry learning disabilities to adulthood and on getting higher up they perceive learning as a boring activity and something they have to just cope with. Learning is the ability of the eye to see know...
Article
Full-text available
Clustering is produced by grouping objects with high degree of relationship from object with low degree of relationship, such that object found in a group are highly similar and share common attributes that is distinct from the other groups. One major problem of data clustering is to know accurately the number of clusters that can be formed out of...
Conference Paper
Full-text available
The electronic Foreign Exchange (FOREX) market where currencies are bought and sold has become more complex and dynamic with characteristics of high volatility, nonlinearity, and irregularity. Some important factors such as economic growth, trade development, interest rates, inflation rates, etc. have significant impacts on the exchange rate fluctu...
Article
Full-text available
The desire to have a baby of a particular sex has caused many marital problems and led many homes to have a large number of children they never planned for, resulting in population explosion in the country. The baby gender application predicts the days in a woman's monthly cycle in which intercourse results in either a baby boy or a baby girl or no...
Article
Full-text available
The need for intelligent conversational software which will enable users to communicate with computer using natural language such as English, sometimes on a certain domain or on a particular topic cannot be over emphasized.Chatbot development is aimed at stimulating human conversation and is usually based on the principle of pattern matching where...
Article
Full-text available
Mobile phones are used for a variety of purposes, including keeping in touch with family members, conducting business and having access to a telephone in the event of an emergency. Some people carry more than one cell phone for different purposes, such as for business and personal use. A mobile phone is a phone that can make and receive telephone c...
Conference Paper
Full-text available
Article
Full-text available
Web Based premarital counselling system has emerged as a way to lower the chances of divorce and also to increase couples' satisfaction and compatibility after marriage. Premarital programs provide couples with necessary skills to enhance communication, problem solving, and decrease conflict by addressing expectations within marriage. Most couples...
Article
Full-text available
Searching for solution appears to be the only method of problem solving for which Artificial Intelligence (AI) is concerned. The Hill climbing Search Technique is one of the strategies used in finding an object when developing an expert system. we have presented a general Hill Climbing algorithm and four different algorithms that can be used to imp...
Article
Full-text available
Security has become a major concern when computers are connected in a network.This concern has been increased as private data and Local Area Network (LAN) infrastructure are increasingly exposed to internet crackers. This paper discusses an end-to-end overview of the potential security issues that can affect any networked computer system and what s...
Conference Paper
Full-text available
Mobile Number Portability (MNP) enables subscribers to change their service providers without changing their telephone numbers. With NMP one can use Glo number and make calls as an Airtel number. This paper looks at the pros and cons of Mobile Number portability in Nigeria and as well as its effects on subscirbers. It is very obvious that in Nigeri...
Conference Paper
Full-text available
Most famous Nigerians, dead or alive today who have achieved greatnes in academics did so via the University of London and other Universities external degree awards. A good example is Chief Awolowo and Professor Chike Obi who achieved academic greatness through correspondence degree programs operated by foreign universities during their time. Today...
Article
Full-text available
Artificial Intelligence(AI) applications have permeated Science and Technology more than any other field. The choice of an AI language had depended on what language an individual liked to program with. Experience has shown however that there are now a good no of languages that are best suited for AI applications. Each of these languages will perfor...
Conference Paper
Full-text available
Recent technological developments in computer aided assessment (CAA) have led to a dramatic increase in its use in higher education. Assessment is a fundamental ingredient in the teaching and learning process, yet there is an increasing body of literature expressing dissatisfaction with current assessment policies and practices in higher education...
Article
Full-text available
Cloud Computing is an adaptable, beneficial, tested and demonstrated stage for conveying businesses or end-users Information Technology (IT) administration and management over the Internet. Be that as it may, Cloud Computing usage is rising very quickly and raising various security challenges throughout today's reality. In cloud computing, the secu...
Article
Full-text available
The growth of the web and the unlimited use of database management systems have brought to the forefront and integrated interconnection of diverse and large numbers of information sources known as distributed databases. The major problem in such an environment is the time taken to responds to query and the cost of transmission across the distribute...
Article
Full-text available
Intelligent Transportation Systems (ITS) are gaining recognition in developing countries today. This paper focuses on the implementation of a Real-Time Public Vehicle Mobile Tracking System using GPS Technology. The system includes global position determining mobile phones located in the vehicles for determining the location of the vehicles along t...
Article
Full-text available
Project work is an indispensible aspect of learning. It impacts knowledge on the student (researcher), supervisor(s), and the entire public which could be used to achieve development goals. Carrying out a project involves an adventure into a task methodologically in order to achieve a mission. Project in most tertiary institutions in Nigeria are no...
Article
Full-text available
Many households indulge in different forms of electricity theft and illegal tampering of electric metering devices. These lead to distribution system faults and overload as well as loss of revenue by the distribution companies,this paper envisages the utilization of the global system for mobile communication (GSM) into the prepaid energy meter for...
Article
Full-text available
Recent technological developments in computer aided assessment (CAA) have led to a dramatic increase in its use in higher education. Assessment is a fundamental ingredient in the teaching and learning process, yet there is an increasing body of literature expressing dissatisfaction with current assessment policies and practices in higher education...
Article
Full-text available
Recent technological developments in computer aided assessment (CAA) have led to a dramatic increase in its use in higher education. Assessment is a fundamental ingredient in the teaching and learning process, yet there is an increasing body of literature expressing dissatisfaction with current assessment policies and practices in higher education...
Article
Full-text available
One of the most critical challenges in today's CMOS VLSI design is the lack of predictability in chip performance at design stage. One of the process variability comes from the voltage drop variations in on-chip power distribution networks. Power distribution systems in integrated circuits are used to provide the voltages and currents the devices n...

Network

Cited By