13.07.2015 Views

African Journal of Computing & ICTs - IEEE Afr J Comp & ICTs

African Journal of Computing & ICTs - IEEE Afr J Comp & ICTs

African Journal of Computing & ICTs - IEEE Afr J Comp & ICTs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & <strong>ICTs</strong>Vol. 5. No.3. May, 2012i


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & <strong>ICTs</strong>Vol. 5. No.3. May, 2012An International <strong>Journal</strong> <strong>of</strong> theInstitute <strong>of</strong> Electrical & Electronics Engineers (<strong>IEEE</strong>)Nigeria Section <strong>Comp</strong>uter Chapter© 2012 - All Rights Reserved______________________________Published in the USA by:Trans-Atlantic Management Consultants2580 Fairham DriveBaton Rouge, LA, USA 70816ii


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netVolume 5. No. 3. May, 2012All Rights Reserved© 2012Published for the Institute <strong>of</strong> Electrical & Electronics Engineers (<strong>IEEE</strong>)Nigeria Section <strong>Comp</strong>uter ChapterByThe Trans-Atlantic Management Consultants2580 Fairham DriveBaton Rouge LA, USAiii


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netCONTENTSi. Table <strong>of</strong> Contentsii.iii.Editorial BoardManaging Editor’s IntroductionTABLE OF CONTENTS1-6 A Platform for Solving Transportation Problems Using an Interactive System for Optimal Solution.C.U. Onianwa & F.I. SadiqAmbrose All University, Ekpoma, Nigeria7-14 An Activity Ontology for a Water Production <strong>Comp</strong>anyV.B. OyekunleLead City University, Ibadan, Nigeria11-16 Employing Response Time Constraints To Mitigate CAPTCHA Relay Attack2C.U. Onwudebelu & C. UgwuokeSalem University, Lokoja, Nigeria15-22 Review on Number Portability in Global System For MobileJ.N. Odii & J.C. OnuohaThe Federal University <strong>of</strong> Technology, Owerri, Nigeria23-30 On the Role <strong>of</strong> Linguistics in The Detection and Prevention <strong>of</strong> Cybercrimes in NigeriaF.U. Balogun, O. Abu (Esq), E.I.G. Balogun & O.O. AramideAuchi Polytechnic, Auchi, Nigeria31-36 A Model for Intelligent Motion Detection in Live Video Streaming Systems.Olufade, F.W. Onifade., Oladeji, P. Akomolafe & Ademola, S. OlaniyiUniversity <strong>of</strong> Ibadan, Nigeria37-48 A Model Checking Framework For Developing Scalable Antivirus SystemsE. Osaghae & S.C. ChiemekeUniversity <strong>of</strong> Benin, Benin City, Nigeria49-56 Just another Harmless Click <strong>of</strong> the Mouse ? - An Empirical Evidence <strong>of</strong> Deviant Cyber Space Behaviour Using anOnline TrapP. Danquah, O.B. Longe & F. TotimehPentecost University Colleg & The Accra Institute <strong>of</strong> Technology, Accra, Ghana.57 Call for Papers58 Publication Templateiv


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netEditorial BoardEditor-in-ChiefPr<strong>of</strong>. Dele OluwadeSenior Member (<strong>IEEE</strong>) & Chair <strong>IEEE</strong> Nigeria – <strong>Comp</strong>uter Chapter.Dean - College <strong>of</strong> Information & Communication TechnologySalem University, Lokoja, NigeriaEditorial Advisory BoardPr<strong>of</strong>. Gloria Chukwudebe - Senior Member & Chairman <strong>IEEE</strong> Nigeria SectionEngr. Tunde Salihu – Senior Member & Former Chairman <strong>IEEE</strong> Nigeria SectionPr<strong>of</strong>. A.B. S<strong>of</strong>oluwe – Vice Chancellor, University <strong>of</strong> Lagos, NigeriaPr<strong>of</strong>. Adenike Os<strong>of</strong>isan - University <strong>of</strong> Ibadan, NigeriaPr<strong>of</strong>. Amos David – Universite Nancy2, FrancePr<strong>of</strong>. Clement K. Dzidonu – President Accra Institute <strong>of</strong> Technology, GhanaPr<strong>of</strong>. Adebayo Adeyemi – Vice Chancellor, Bells University, NigeriaPr<strong>of</strong>. S.C. Chiemeke – University <strong>of</strong> Benin, NigeriaPr<strong>of</strong>. Akaro Ibrahim Mainoma – DVC (Admin) Nasarawa State University, NigeriaDr. Richard Boateng – University <strong>of</strong> Ghana, Ghana.Pr<strong>of</strong>. Lynette Kvassny – Pennsylvania State University, USAPr<strong>of</strong>. C.K. Ayo – Covenant University, NigeriaDr. Williams Obiozor – Bloomsburg University <strong>of</strong> Pennsylvania, USAPr<strong>of</strong> Enoh Tangjong – University <strong>of</strong> Beau, CameroonPr<strong>of</strong>. Sulayman Sowe, United Nations University Institute <strong>of</strong> Advanced Studies, JapanDr. John Effah, University <strong>of</strong> Ghana Business School, GhanaMr. Colin Thakur - Durban University <strong>of</strong> Technology, South <strong>Afr</strong>icaManaging/Production EditorDr. Longe Olumide PhDSouthern University and A & M College, Baton Rouge, USAUniversity <strong>of</strong> Ibadan, Ibadan, Nigeriav


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netManaging Editors Introduction.The ICT strides continues – so are the challengesEvents within the last one year showed that <strong><strong>Comp</strong>uting</strong> and ICT will continue to dominate popular discussions all over the world. Whatwith new advances in mobile developments, tele-medicine, drones for fighting battles and new concerns about viruses that can now closedown nuclear plants. We live in a time that can be considered as a watershed <strong>of</strong> mixed blessings brought about by accelerateddevelopments in computing, <strong>ICTs</strong> and their applications.The <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT stands at the nexus <strong>of</strong> providing a platform for contributions to discourses, developments,growth and implementation <strong>of</strong> <strong><strong>Comp</strong>uting</strong> and ICT initiatives. We provide a voice for scholars from the developing countries and othernations across the world to contribute to the solution paradigm through timely dissemination <strong>of</strong> research findings as well as new insightsinto how to identify and mitigate possible unintended consequences <strong>of</strong> <strong>ICTs</strong>.In the last year, we have experienced tremendous impact and acceptance across the globe. This is evidenced by the H-Index <strong>of</strong> some <strong>of</strong>our authors ranking as high as 7 based on cited works in the journal. Our impact factor has also grown beyond the 1.7 in 2011 to 2.8during the first quarter <strong>of</strong> this year, 2012. In particular is the interest expressed in the <strong>Journal</strong> by <strong><strong>Afr</strong>ican</strong> scholars in Diaspora. Thanks toour authors and reviewers and the Editorial board for continuously striving to provide submissions, insights and comments that hashelped improve the quality <strong>of</strong> the <strong>Journal</strong>. We have also continued to experience increased interest evidenced by the volume <strong>of</strong>submissions that we received recently from Asia, America, the United Kingdom and many parts <strong>of</strong> <strong>Afr</strong>ica that are now scheduled toappear in future issues. Surely, the <strong>Journal</strong> is repositioning itself among the league <strong>of</strong> impactful <strong>Journal</strong>s in <strong><strong>Comp</strong>uting</strong>, informationsystems/science, Information and Communication Technology and other allied fields globally.The <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & <strong>ICTs</strong> is now indexed in the Cabells Directory <strong>of</strong> ScientificJourna, Google Scholar, IS PublicationIndexing, ScienceCentral.com , Database <strong>of</strong> <strong>Comp</strong>uter Science <strong>Journal</strong>s, Docstoc Database/Indexing and the SCRIBD ResearchDatabase. Other indexing schemes are being pursued to further increase access to the journal contents. We remain committed toexcellence in publishing and desire that the <strong>Afr</strong>, J <strong>of</strong> <strong><strong>Comp</strong>uting</strong> and ICT be a prime avenue for the dissemination <strong>of</strong> cutting edgeresearch report by <strong><strong>Afr</strong>ican</strong>s, for <strong>Afr</strong>ica and all lovers <strong>of</strong> research and development all around the world. We will promote indigenous<strong><strong>Comp</strong>uting</strong> and ICT development through the dissemination <strong>of</strong> cutting edge research and development reportThis March, 2012 issue <strong>of</strong> the <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT contain ten (10) articles that have been subjected to rigorous peerreview by experts in the subject domain. The articles articulate issues <strong>of</strong> research and development related to computational informaticsand mathematical modelling, computer and cyber security, e-Learning and multimedia-based pedagogy, data mining and knowledgemanagement, management <strong>of</strong> ICT units, grid computing and open source mobile platform system design. While welcoming you toperuse this March, 2012 Edition <strong>of</strong> the <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> and <strong>ICTs</strong>, we encourage you to submit your manuscript forconsideration in future issues <strong>of</strong> the <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> and <strong>ICTs</strong>.Have a rewarding readingThank youLonge Olumide Babatope PhDManaging Editor<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & <strong>ICTs</strong>Fulbright SIR FellowInternational Centre for Information Technology & DevelopmentSouthern University SystemSouthern UniversityBaton RougeLouisiana, USAE-mail: longeolumide@fulbrightmail.orgvi


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netA Platform for Solving Transportation Problem Usingan Interactive System for Optimal Solution1 C.U. Onianwa (Ph.D) and 2 F.I. Sadiq (MCPN,MNCS)Department <strong>of</strong> <strong>Comp</strong>uter ScienceAmbrose Alli University, P.M.B 14, Ekpoma.fatai_aau@yahoo.com charlesonianwa@yahoo.comABSTRACTTransportation problem is one <strong>of</strong> the major areas <strong>of</strong> application <strong>of</strong> linear programming. In this paper, we discussed the concept <strong>of</strong>transportation system and the method <strong>of</strong> solving transportation problems. We developed a model for the transportation system inAmbrose Alli University (AAU), Ekpoma though private but provides an optimal transportation framework for decision making in theUniversity transportation division. In developing the s<strong>of</strong>tware, we used Micros<strong>of</strong>t Visual Basic 6.0. The optimal solution arrived atshowed that the management can operate at a minimum cost if they utilize the routes as presented in the study: Main campus to AlliSquare conveying an average <strong>of</strong> 90 passengers per day, Main campus to Market Square with an average <strong>of</strong> 150 passengers, BasicMedical Sciences to Alli Square with an average <strong>of</strong> 15 passengers, Basic Medical Sciences to Mousco junction with an average <strong>of</strong> 150passengers and Basic Medical Sciences to Opoji junction with an average <strong>of</strong> 85 passengers. Consequently, the cost <strong>of</strong> transportation onthese routes are N30, N30, N20, N20, and N30 respectively per journey. An online application was also developed using North-WestCorner (NWC) rule to automate the analysis <strong>of</strong> the System.Keyword: Transportation problem, Route, Linear programming, S<strong>of</strong>tware, Optimal solution1. PRELIMINARIESTransportation is a vital part <strong>of</strong> the everyday life <strong>of</strong> every urbancitizen. Even the very young, the very old, the sick and the shutinsare beneficiaries <strong>of</strong> a good transportation system or victims<strong>of</strong> a poor one. Efficient transportation stimulates the economy <strong>of</strong>any state. The condition <strong>of</strong> transportation services and facilitiesimproves or detracts from living and working conditions,enhances or harms the environment <strong>of</strong> the area, and heavilyinfluences the general desirability <strong>of</strong> the community. In moststudies <strong>of</strong> transportation, the following questions are asked forthe transportation system to be in the best possible condition inan area. They are: do you receive numerous complaints about congestionand accidents caused by a poor transportation system? are industry and commerce concerned about delays intheir shipments caused by inadequate transportationfacilities?<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:C.U. Onianwa & F.I. Sadiq (2012). A Platform for SolvingTransportation Problems Using an Interactive System forOptimal Solution. <strong>Afr</strong> J. <strong>of</strong> <strong>Comp</strong> & <strong>ICTs</strong>. Vol 5, No. 3. pp 1-6.© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781are industry and commerce rejecting your communitybecause <strong>of</strong> a poor transportation system?has enough been done to take care <strong>of</strong> transportationproblems in your community?and finally, has timely improvements been made?2. RELATED WORKSJurgen [5] noted that the main task <strong>of</strong> scheduling is the temporalassignment <strong>of</strong> activities to resources where a number <strong>of</strong> goalsand constraints have to be considered. Scheduling problems canbe found in several different application areas, e.g., thescheduling <strong>of</strong> production operation in manufacturing industry,computer processes in operating systems, aircraft crews, etc.Scheduling covers the creation <strong>of</strong> a schedule <strong>of</strong> the activitiesover a longer period (predictive scheduling) and the adaptation<strong>of</strong> an existing schedule due to actual events in the schedulingenvironment.However, scheduling also has a very important interactivedimension because we always find humans involved in thescheduling process that have to decide, interact or control.Among the decisions to be taken by the human scheduler are,e.g., introducing new orders, canceling orders, changingpriorities, setting operations on specific schedule positions.These decisions have to be regarded within the schedulingprocess. But, Reed [7] stated that a key problem manager’s faceis how to allocate scarce resources among various activities orprojects.1


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTherefore, an essential tool for doing this is the linearprogramming method. Thus, Linear programming, is a method<strong>of</strong> allocating resources in an optimal way. It is one <strong>of</strong> the mostwidely used operation research tool and has been a decisionmakingaid in almost all manufacturing industries and infinancial and service organizations. These resources are knownas decision variables.2.1 Transportation ProblemChung et al [2] presented a poly-log-competitive deterministiconline algorithm for the online transportation problem onhierarchically separated trees when the online algorithm has oneextra server per site. Using metric embedding results in theliterature, one can then obtain a poly-log-competitiverandomized online algorithm for the online transportation on anarbitrary metric space when the online algorithm has one extraserver per site. Sheng et al [8] analyzed a transportation problemwith discontinuous piecewise linear cost function and developeda genetic algorithm to solve it. Their genetic algorithm exhibitsbetter optimization effect on solution quality and efficiency thanthe matrix encoding genetic algorithm. Their genetic algorithmutilizes the structure <strong>of</strong> spanning tree in the basic feasiblesolution and the possible values <strong>of</strong> the non-basic variables arerestricted to the flow bounds.The compact coding representing the basic feasible solution isanother important factor. In addition, the genetic algorithmdeveloped in their paper can be applied to solve the fixed chargetransportation problem as well. Zijian et al [10], focused on thecomputing complexity dealing with hub and spoke system,proposed a new reliable combination optimization method,named ACO (ant colony optimization) algorithm, to solve thecontainer transportation network problem for marine transportsystem. To prove its utility, they compared the proposed methodwith the result by Dijkstra algorithm through a simple example.The result shows ACO algorithms is <strong>of</strong> a credible and excellentprobability accumulation searching method. In general, it’sknown that there exist four factors in an optimization problem <strong>of</strong>container transportation, namely economical efficiency,speediness, security and inventory cost [4]. Yuichi et al [9],considered the problem <strong>of</strong> transporting a long object such as aladder through a degree corner in a corridor using two omnidirectional robots that do not necessarily have identicalcharacteristics. A distributed algorithm is presented in whicheach robot computes its own motion-based on the current andgoal positions <strong>of</strong> the ladder, the locations <strong>of</strong> the walls and themotion <strong>of</strong> the other robot observed indirectly through the linkbetween the robot and the ladder. They evaluate the performanceand robustness <strong>of</strong> the algorithm using extensive computersimulation by changing several parameter values that act as thekey characteristics <strong>of</strong> the robots including the maximum speedthe guide pathTable 1: PassengersLocations/Alli Square Market Square Mousco Junction Opoji Junction SupplyServicesMain Campus 60 100 30 50 240Basic Medical Sciences 45 50 20 35 150Demand 105 150 50 85For the above problem, all units available must be supplied.How likely it is that supply always will equal demand? Forpractical purposes, it doesn’t matter as long as supply isadequate to meet demand. We can ignore the surplus and treatthe total supply as equal to the requirement.3. PROBLEM STATEMENTIn Ambrose Alli University, (AAU) Ekpoma the transportationunit is faced with the optimal administration <strong>of</strong> transportationsolution in a bid to reducing the cost <strong>of</strong> transportation for staffand students to and from campus while in the processconsidering the convenience <strong>of</strong> the passengers. In this paper, wemodel the transportation system in Ambrose Alli University,(AAU) Ekpoma, The outcome <strong>of</strong> the model was finallyautomated with the process <strong>of</strong> analysis <strong>of</strong> the system. The studyused the North-West Corner (NWC) rule to obtain the initialbasic feasible solution <strong>of</strong> the system that can serve as a guide forthe unit.3.1 Research DirectionThis paper reported the findings <strong>of</strong> a result in an undergraduateresearch, that developed an automated transportation problemusing AAU Ekpoma as a case study, the purpose which focusedon the following;• to aid administration minimize the total transportationcost within the school environment• to help administration analyze the varioustransportation situation at a very fast rate• to facilitate the decision making process ontransportation at all levels2


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net4. MATERIALS AND METHODWe considered some routes and collected data from the routes.The collection <strong>of</strong> data was done for some period <strong>of</strong> time afterwhich average <strong>of</strong> the observations was determined. This ideawas to enable us know the routes to include in our modeling.The modeling <strong>of</strong> the transportation took effect as soon as thedata collection was completed. The model was used to developan algorithm that eventually transformed into the use <strong>of</strong> visualbasic programming language at the end to design s<strong>of</strong>tware that isusable in solving problems related to the transportation mattersin the university. The available routes include Main campus toAlli square, Main campus to Market Square, Main campus toMousco junction, Main campus to Opoji junction, BasicMedical Sciences to Alli square, Basic Medical Sciences toMarket Square, Basic Medical Sciences to Mousco junction, andBasic Medical Sciences to Opoji junction.4.1 Mathematical model <strong>of</strong> the transportation problemThe mathematical modeling <strong>of</strong> this transportation problem isnothing but a special linear programming problem in which theobjective function is a minimize cost <strong>of</strong> transportation subjectedto the demand and supply constraints.Let d i = Number <strong>of</strong> passengers (staff and students) availableto be transportation from the origin i.Si = Number <strong>of</strong> passengers that is required to be at adestination i.C ij = The transportation cost per passenger from theorigin i to destination j.X ij = Number <strong>of</strong> passenger from origin to destination j.Mathematically, the problem is i.Minimize∑ ∑ ∑ d i, i = 1,2,…,m∑ S j, j = 1,2,…,n ………..(1)x ij ≥ 0 for all i and jFrom equation 1, it can be understood that we have two sources<strong>of</strong> supply namely main campus and Basic Medical Sciences t<strong>of</strong>our demand destination namely; Alli square, Market square,Mousco junction and Opoji junction. With this in mind, we nowformulate transportation problem.Table 2: Cost <strong>of</strong> transportationRoutes Alli Square Market Square Mousco Opoji JunctionSupplyJunctionMain Campus30 33240420030020030Basic MedicalSciencesDemand 105 150 50 85The problem is to determine the number <strong>of</strong> passengers to be transported from each origin to various destinations at minimizedcost. Table 3 below shows the possible number <strong>of</strong> passengers that can be transported from each <strong>of</strong> the origin to their variousdestinations.Table 3. The <strong>Comp</strong>lete Transportation ProblemRoutes Alli Square Market Square Mousco Opoji Junction SupplyJunctionMain X 11 X 12 X 13 X 14 240Campus30 30 30 40Basic X 21 X 22 X 23 X 24 150Medical20 30 20 30SciencesDemand 105 150 50 85The total transportation cost:Minimize z = 30 x 11 + 30 x 2 + 30 x 3 + 40 x 14 + 20 x 21 + 30 x 22 + 20 x 23 + 30x 24Subject to:x 11 +x 12 +x 13 +x 14 = 240x 21 +x 22 +x 23 +x 24 = 150x 11 + x 21 = 105x 21 + x 22 = 150x 31 + x 32 = 50x 41 + x 42 = 85Xij > 01503


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net5. DESIGN IMPLEMENTATIONThe s<strong>of</strong>tware design for the model used Micros<strong>of</strong>t Visual basic6.0. The development was possible due to the properunderstanding <strong>of</strong> the formulation as well as the development <strong>of</strong>the mathematical model <strong>of</strong> the problem. The major step that wasfollowed to solve the problem also played a vital role in thedevelopment, but the key issue is actually the process <strong>of</strong>translating mathematical algorithm into visual basic symbolicinstruction code and the design <strong>of</strong> the interface to achieve thegoal <strong>of</strong> the study. System analysis approach was followed andsample data presented in our methodology was used to test runthe s<strong>of</strong>tware developed. The results for input and output duringtesting are presented in Figures 1to 4.Fig 3: Transportation problem with test data with (NWC).Source: Okoruwa [6]Fig 1: Transportation problem s<strong>of</strong>tware introduction pageSource: Okoruwa [6]Fig 4: The transportation problem output oncomputation using the test data.Source: Okoruwa [6]Fig 2: The transportation problem input pageSource: Okoruwa [6]4


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net5.1 System InstallationBefore the s<strong>of</strong>tware can be used, the executable file name“aigbibhalu.exe” need to be installed having installed visualbasic programming language 6.0, for the application toeffectively run, the system must met the following requirements;Minimum hardware requirementsa. Pentium III computer system or moreb. 233 MHZ processor clock speedc. 64 MB RAM or mored. 200MB free hard disk space or moreMinimum s<strong>of</strong>tware requirementsThe s<strong>of</strong>tware will work well on Micros<strong>of</strong>t Windows 2000, XP,Vista operating systems. No additional framework is needed onany <strong>of</strong> this operating system for the application to runeffectively.6. FINDINGSThe transportation problem in all the routes from campus tovarious locations such as Basic Medical Sciences, Alli Square,Market Square etc, are <strong>of</strong>ten computed by estimation but thedata collected were entered into the interface and the resultsobtained. More accurate results were equally obtained using theNorth West Corner rule that gave the optimal solution <strong>of</strong> 11050.Based on our findings, it is recommended that the managementin transportation unit should always carryout survey periodicallyto find out if there are variations in the distributions <strong>of</strong>passengers in their routes. Data obtained in surveys should beanalyzed with this application to obtain current optimal solutionfor the current transportation situation and compare it withprevious one. If any alteration is made to the number <strong>of</strong> routes,then the system will need to be modified to meet the specifiedroutes.7. CONCLUSIONThis study on the transportation problem in Ambrose AlliUniversity Ekpoma was mainly to identify the transportationroutes and then structure the system to obtain a model that willenable the management to operate at minimal cost. We wentfurther to develop an application that will help the managementto analyze the AAU transportation problem as fast andeffectively as possible. As a result <strong>of</strong> this the management canoperate at a minimum cost.REFERENCES1. Chen, L., Qin, L., Chen, H.J. and Xu, X.H. (2003) AntColony Algorithm with Characteristics <strong>of</strong> Sensationand Consciousness, <strong>Journal</strong> <strong>of</strong> System Simulation,Vol. 15, No. 10, 1418 – 1425.2. Chung Christine Pruns Kirk Uthaisombut Patchrawat(2006), The Online Transportation Problem: On theExponential Boost <strong>of</strong> One Extra |Server. <strong>Comp</strong>uterScience Department, University <strong>of</strong> Pittsburgh.3. Dorigo, M., Maniezzo, V. and Colorni, A. (1996) Theant system: optimization by a colony <strong>of</strong> cooperatingagents, <strong>IEEE</strong> Trans. Systems Man Cybernet. Vol. 26,29-42).4. Ikpotokin F.O. (2003), Introduction to the study <strong>of</strong>operation research technique Tide Publishers, BeninCity Edo State Nigeria.5. Jurgen Sauer, Hans-Jurgen Appeirath (2000),Integrating Transportation in a Multi-Site SchedulingEnvironment. University <strong>of</strong> Oldenburg Dept. <strong>of</strong><strong>Comp</strong>uter Science Escherweg 2, D-26121 OldenburgGermany.6. Okoruwa A. (2010), A Web-Based System for SolvingTransportation System: A Case Study <strong>of</strong> AAU,Ekpoma, Undergraduate Research Work submitted tothe Department <strong>of</strong> <strong>Comp</strong>uter Science, AAU, Ekpoma,Unpublished.7. Reed J. and LeavenGood S. (2002): TransportationProblem: A special case for linear programmingproblems EM8779. Corvallis Oregun State UniversityExtension service.8. Sheng, Su Dechen Zhan, Xu Xia<strong>of</strong>eit (2006), GeneticAlgorithm for the Transportation Problem withDiscontinuous Piecewise Linear Cost Function.International <strong>Journal</strong> <strong>of</strong> <strong>Comp</strong>uter Science andNetwork Security, Vol. 6 No. 7A. Harbin, China.9. Yuichi Asahiroy, Eric Chung-Hui Changz, AmolMaliz, Ichiro Suzukiz, Masafumi Yamashita (2003), ADistributed Ladder Transportation Algorithm for TwoRobots in a Corridor. Department <strong>of</strong> <strong>Comp</strong>uterScience and Communication Engineering KyushuUniversity Fukuoka Japan.10. Zijian GUO, Xiangqun SONG, Peng Zhang (2005),The Aco Algorithm For Container TransportationNetwork Of Seaports Proceedings <strong>of</strong> the Eastern AsiaSociety for Transportation Studies, Vol. 5, pp. 581 –591,. School <strong>of</strong> Civil and Hydraulic EngineeringDalian University <strong>of</strong> Technology 2 Linggong Road,Ganjingzi District, Dalian 116024, Liaoning, P.R.China.5


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netAUTHOR’S BRIEFSDr. Charles Uche Onianwa hasbeen at Ambrose Alli University,Ekpoma, Nigeria since 1988 andhas been engaged in teaching -and research. Born at Asaba,Delta State, he attended St.Patrick's College, Asaba between1973-1978 and 1978-1980 and theUniversity <strong>of</strong> Benin, Benin City. He hold a Bachelor, Master <strong>of</strong>Science and an MBA degrees from - same University between1980-1984, 1985-1987 and 1990-1995 respectively. Healso holds a Doctor <strong>of</strong> Philosophy (Ph.D) degree inMathematics from Ambrose Alli University, Ekpoma withspecialization in numerical computing. He is a member <strong>of</strong>several pr<strong>of</strong>essional organizations including the Nigeria<strong>Comp</strong>uter Society, Nigerian Institute <strong>of</strong> Management and theResearch and Development Network. He is a fellow,Chartered Institute <strong>of</strong> Administrator and StrategicInstitute for National Resources and HumanDevelopment. His primary research interests are inNumerical computing, Hardware maintenance and InformationTechnology where he has authored a number <strong>of</strong> books andpublished academic papers.Mr. Fatai Idowu SAD1Q isa Lecturer at Ambrose AlliUniversity,Ekpoma. Nigeria.He obtained his B.Tech.Maths./<strong>Comp</strong>uter Sciencein 1998 at FederalUniversity <strong>of</strong> Technology. Minna. Master <strong>of</strong>Technology in <strong>Comp</strong>uter Science in 2005 at FederalUniversit y <strong>of</strong> Te ch n ol ogy, Akure, MBA and PGDin Edu cati on at Ambr ose Alli University, Ekpomain 2004, 2010 respectively. He has recently obtainedMaster <strong>of</strong> Philosophy (MPhil) in <strong>Comp</strong>uter Science in2012 from the University <strong>of</strong> Benin, Benin City, Edo State.Nigeria, with a view to proceed for Ph.D. in the samefield. He is a member <strong>of</strong> Nigeria <strong>Comp</strong>uter Society.(NCS), <strong>Comp</strong>uter Pr<strong>of</strong>essional and RegistrationCouncil <strong>of</strong> Nigeria (CPN). <strong>IEEE</strong> <strong>Comp</strong>uter Society. Hisresearch interest is mobile computing applications forelectronic learning and Information and CommunicationTechnology (ICT) for Development. He has publishednumber <strong>of</strong> papers in both local and International journals.6


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netAn Activity Ontology for a Water Production <strong>Comp</strong>anyV. B. OyekunleDepartment <strong>of</strong> <strong>Comp</strong>uter ScienceLead City UniversityIbadan, Nigeriabolanleoyekunle@yahoo.comABSTRACTThe key success <strong>of</strong> a business process is the ability to manage between processes within an enterprise and between enterprises. Toremain competitive, enterprises must become increasingly agile and integrated across their functions. Activity ontology plays a criticalrole in this integration, enabling better designs for enterprises, analysis <strong>of</strong> their performance, and management <strong>of</strong> their operations. Thegoal <strong>of</strong> this paper is to create an activity ontology for water production processes that has the ability to deduce answers to queries thatrequire relatively shallow knowledge <strong>of</strong> the domain. This activity ontology will provide a sharable representation <strong>of</strong> knowledge thatminimizes ambiguity and maximizes understanding <strong>of</strong> the production activities. This kind <strong>of</strong> representation is <strong>of</strong> importance because itwill be able to provide sophisticated support to automated decision making; it does not only answer queries with what are explicitlyrepresented in the Knowledge Base, but also answer queries to what is implied in the Knowledge Base. The project was implementedusing Prolog, a logic programming language and it was tested by posing a set <strong>of</strong> competency questions.Keywords: Activity Ontology, Knowledge Base, Formal Representation, <strong>Comp</strong>etency questions.1. INTRODUCTIONAn activity is the basic transformational action primitive withwhich processes and operations can be represented; it specifieshow the world is changed [12]. Thus in this paper, the focus ison how the production activities <strong>of</strong> water production companycan be modeled. The activity ontology for the productionactivities would provide a framework that would break down thesteps involved in the different activities and the time interval foreach activity. In enterprise modelling, we want to define theactions performed within an enterprise, and define constraintsfor plans and schedules which are constructed to satisfy thegoals <strong>of</strong> the enterprise. This leads to the following set <strong>of</strong>informal competency questions;a. Temporal projection: Given a set <strong>of</strong> actions that occur atdifferent points in the future, what are the properties <strong>of</strong>resources and activities <strong>of</strong> different intervals?b. Planning and Scheduling: What sequence <strong>of</strong> activities mustbe completed to achieve some goal? At what times mustthese activities be initiated and terminated?<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:V.B. Oyekunle (2012). An Activity Ontology for a WaterProduction <strong>Comp</strong>any. <strong>Afr</strong> J. <strong>of</strong> <strong>Comp</strong> & <strong>ICTs</strong>. Vol 5, No. 3. pp7-14© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781c. Time-Based <strong>Comp</strong>etition: We want an ontology thatminimizes the cycle time for a product. This is essentiallythe task <strong>of</strong> finding a minimum duration plan that minimizesaction occurrences and maximizes concurrency <strong>of</strong>activities.Activities are defined to occur over intervals <strong>of</strong> time and cannotbe reduced to some set <strong>of</strong> properties holding at instantaneouspoints in time. In an enterprise, activities take place over time.These time points can be point based, interval-based or pointinterval-based.In this paper, we want to see how practicable arethe Allen’s interval temporal logic <strong>of</strong> Actions and Events usingWater Production Activities.This paper therefore aims at developing an activity ontology inform <strong>of</strong> knowledge representation that includes facts and axiomsthat support deduction for the activities <strong>of</strong> water production, theontology will be able to deduce answers to some given queries.These queries are the common sense queries that require theknowledge based system to have extensive knowledge andreasoning capabilities. Ontologies are widely used as techniquefor representation and reuse <strong>of</strong> knowledge. Ontology can beviewed as a shared conceptualization <strong>of</strong> a domain that iscommonly agreed to by all parties. It is defined as ‘aspecification <strong>of</strong> a conceptualization [11]. ‘Conceptualization’refers to the understanding <strong>of</strong> the concepts and relationshipsbetween the concepts that can exist or do exist in a specificdomain.7


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThe primary goals for developing ontology is not only to enablereuse <strong>of</strong> domain Knowledge but also to share commonunderstanding <strong>of</strong> the structure <strong>of</strong> information among people ors<strong>of</strong>tware agents, to make domain assumptions explicit, toseparate domain knowledge from the operational knowledge andto analyze domain knowledge in an enterprise context, theyreflect the relevant knowledge based on enterprise-specificconcepts and their relations. This activity ontology can beconsidered as building blocks for demand-oriented informationsupply in networked organizations.Drinking water can be produced from any natural sources likeground water, lakes and rivers (surface water) or sea water.Drinking water standard are set by the world healthorganization/NAFDAC. Drinking water must be free <strong>of</strong>suspended solids, microorganism and toxic chemicals. Thequality <strong>of</strong> drinking water is assessed not only in terms <strong>of</strong> healthbut also in terms <strong>of</strong> taste. One <strong>of</strong> the solution for improving thetaste <strong>of</strong> water is to reduce the amount <strong>of</strong> environmental organicmaterials, which are difficult to eliminate with traditionaltreatment processes due to their high solubility. The moreorganic materials there are in water the higher themicrobiological risk and the more necessary the chlorinationtreatment becomes, organic materials and chlorine jointlydeteriorating the taste <strong>of</strong> water in the supply systems, the easierit is to reduce chlorination and therefore unwanted effects, notonly in terms <strong>of</strong> taste but also with regard to disinfection byproduct.Water properties differ from one area to another, some<strong>of</strong> these properties are; Hardness, Alkalinity, pH level,Conductivity etc. these properties differ from one area to anotherarea and any drinking water produced must be in accordancewith the NAFDAC specifications.2. RELATED LITERATUREOntology as a specification <strong>of</strong> conceptualization is defined bylogical theory, axioms <strong>of</strong> which constrain predicateinterpretations. Nikola Guarino uses notions <strong>of</strong> domain spaceand conceptual relationships. Several projects are known thatcreate ontologies to define a given subject domain and share thisknowledge among users for more coordinated interaction indomain. TOVE [8] and Enterprise [16] create ontologies forcommerse and production organization, CIDOC [4] develops anontology for museums and cultural heritage, PHYSSYS [2]creates an ontology in the area <strong>of</strong> physical systems. The projectSYNTHESIS uses ontologies for semantic interrelating <strong>of</strong>object-oriented specifications.Project Ontoseek and Plinus use ontologies for informationretrieval. There are many projects where ontologies help todetect similarities and redundancies in natural languageinformation [5]. Ontologies are used for context definition in asubject domain. Determination <strong>of</strong> exact difference betweencontexts helps to solve a problem <strong>of</strong> viewing onto aninformation resource from another context or changing <strong>of</strong>resource moving from one context to another [6].Using shared ontologies, establishing correspondence <strong>of</strong> data toontological definitions; enhancing ontologies for new tasksallow to achieve correct interoperation between differentinformation systems [7]. The web needs ontologies for relatingweb-information to concepts <strong>of</strong> ontologies. The project SHOE[14] proposes to support HTML-pages by additional tags, whichrelate the information to ontological definitions. The TOVEOntology currently spans knowledge <strong>of</strong> activity, time andcausality, resources and more enterprise oriented knowledgesuch as cost, quality and organization structure. The TOVETestbed provides an environment for analyzing enterpriseontologies; it provides a model <strong>of</strong> an enterprise and tools forbrowsing, visualization, simulation and deductive queries. Thegoal <strong>of</strong> the TOVE Enterprise modelling project is to create acommon sense Enterprise model. By common sense we meanthat an enterprise model has the ability to deduce answers toqueries that require relatively shallow knowledge <strong>of</strong> the domain.2.1 <strong>Comp</strong>uter Integrated Manufacturing Open SystemArchitecture (CIMOSACIMOSA incorporate an event-driven, process based modellingapproach with the goal to cover essential enterprise aspects inone integrated model. The main aspects are the functional,behavioural, resource, information and organizational aspect.For each <strong>of</strong> the aspects, modelling constructs are available. Thisenables to model the aspects <strong>of</strong> business processes independentfrom each other. CIMOSA provides a formal language for themodelling, which is specified in BNF form. Furthermore,CIMOSA aims at the execution <strong>of</strong> business processes also, notonly the modelling <strong>of</strong> those. The goal is to drive an informationinfrastructure with the processes modelled.2.2 PERA(The Purdue Reference Architecture)PERA was developed as an endeavor in enterprise modeling fora computer-integrated manufacturing (CIM) factory by thePurdue Laboratory for Applied Industrial Control at PurdueLaboratory University. The functional descriptions <strong>of</strong> the tasksand functions <strong>of</strong> the enterprise are divided into two majorstreams: (1) Information (including decision and control) and (2)Manufacturing, or customer service.2.3 Classes <strong>of</strong> Models for Ontology Construction andReasoningOntological modelling in information technologies hasundergone considerable evolution. Models and languages usedfor ontology construction and reasoning can be classified asfollows.2.3.1 Verbal ModelsInformal linguistic models are <strong>of</strong>ten used for specification <strong>of</strong>ontologies [3]. In such models ontological concepts are definedby verbal definitions like in an explanatory dictionary. Somekinds <strong>of</strong> basic relationships may be established betweenconcepts. A glossary <strong>of</strong> terms in some subject domain, athesaurus with its concepts and relationships defining naturallanguage terms may be considered as ontologies.8


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net2.3.2 Logic-Based ModelsIn contract to verbal models, logic based ontologies are definedformally and have an ability <strong>of</strong> formal reasoning. One <strong>of</strong> the firstlogic-based ontological models was Ontolingua [11]. Predicativeexpressions in Ontolingua are represented in the KIF language,which is based on the first order logic. KIF is highly expressiveand due to that it is not tractable for automatic inference.Development <strong>of</strong> ontologies in this model is regulated by specialtechnique for adding <strong>of</strong> unambiguous specifications [7].Ontolingua has been intended as an intermediate language forheterogeneous ontologies interchange.Ontological model uses a train model as its basis. The openknowledge Base connectivity (OKBC) API is considered as akey enabler in the distributed ontology repository architecture.The OKBC model serves as an inter-lingua for ontology that isbeing communicated using OKBC. Ontology interchangelanguage, OIL is the first ontology representation language inW3C standards that is properly grounded. It is an evolution <strong>of</strong>existing proposals such as OKBC, XOL, RDF (ResourceDescription framework). OIL is the first web-basedrepresentation language intended for ontology definition withthe formal semantics and reasoning services provided by adescription logic.2.3.3 Structural (Object) ModelsSeveral approaches are known to apply structural (Object) datamodels to define ontologies. A mediator ontological language(MOL) may depend on a subject domain and is to be defined atthe media for consolidation phase. On the other hand, fordifferent information sources different ontological models(languages) can be used to define their own ontologies.Reversible mapping <strong>of</strong> the source ontological models into MOLis needed for information sources registration at the mediator.3.1 Properties <strong>of</strong> Actions and EventsProperties <strong>of</strong> action and events that are essential to any generalrepresentation:a. Actions and events take time, while some events maybe instantaneous, most occur over an interval <strong>of</strong> time –During this time, they may have a rich structure.Because events are extended in time, different eventsand actions may overlap in time and interact.b. The relationship between actions and event and theireffects is complex. Some effects become true at theend <strong>of</strong> the event and remain true for some time afterthe event. Other effects only hold while the event is inprogress. Other effects might start to hold sometimeafter the event has started and stop holding before itfinishes.c. Actions and events may interact in complex wayswhen they overlay or occur simultaneously.d. External changes in the world may occur no matterwhat actions an agent plans to do, and may interactwith the planned actions.e. Knowledge <strong>of</strong> the world is necessary incomplete andunpredictable in detail, thus prediction can only bedone on the basis <strong>of</strong> certain assumptions.In this paper, the following steps are carried out;a. Purpose identification and requirement specificationconcernsto clearly identify the ontology purpose andits intended uses, that is, the competence <strong>of</strong> theontology. To do this, we use competency questions.Purpose Identification andRequirement Specification2.3.4 Hybrid ModelsTo enrich an expressive power <strong>of</strong> the ontological model, theremight be a need to use a facilities <strong>of</strong> verbal, logic-based orstructural models in one and the same ontology. For instance,this project uses a hybrid model. The ontological model hasverbal facilities making possible to define ontological orglossary concepts, classifier categories. At the same time, it isdefined as logic-based type.Evaluation andDocumentationOntologyCaptureIntegratingExistingOntology3. METHODS AND FORMAL REPRESENTATIONActions and Events in Interval Temporal LogicIn order to adequately represent actions and events, one need anexplicit temporal logic [1] and that approaches with weakertemporal model such as state spaces (e.g. STRIPS-basedapproaches) and the situation calculus, either cannot handle theproblems.OntologyFormalizationFormalOntologyFig 1: Stages in the ontology development process.9


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netb. Ontology capture, the goal is to capture the domainconceptualization based on the ontologycompetence. The relevant concepts and relationswere identified and organized.c. The formalization activity aims to explicitlyrepresent the conceptualization captured in a formallanguage. In this project, first order logic is thepreferred formalism, since it embeds less ontologicalcommitments.d. Finally, the ontology was evaluated using Prolog tocheck whether it satisfies the specificationrequirements and ontology competence. It should benoticed that the competence questions plays anessential role in the evaluation <strong>of</strong> the completeness<strong>of</strong> the ontology, especially when consideringits axiom.StartBoreholePump intoRaw Water Storage Flows Tank intoSedimentation Storage TankPass throughAllow to settleAddition <strong>of</strong> lime,NaOH, Buffer solution<strong>Comp</strong>osite filterCarbon filterfillsPass throughFurther sedimentationMicro filter And ultraviolet light end productend productPure Water Storage Tank Micro filter (0.5u) 1uFurther filtrationfor table waterIce BlockcontainerAutomated feedingMachineTreatment Water Storage Freezer Sachet Waterend productReserved OsmosisIce BlockStainless Water TankDispenserOzonatorDispenserWaterAutomated feederBottled WaterFig 2: Water Production Flowchart10


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net3.2 Language DefinitionThe language used is the interval temporal logic <strong>of</strong> Action andEvents, subset <strong>of</strong> first order predicate calculus. Standardsymbols for quantifiers are used; universal (V) and Existential(Ǝ).For Sedimentation to occur, there is going to be addition <strong>of</strong>Calcium Carbonate, which will take time interval t 2 todissolve, Sodium Hydroxide will take time interval t 4 todissolve and Buffer Solution will take time interval t 6 todissolve .The time relation is as shown.The connectives used are;NegationAndOrImpliesConditional implication‏(ך)‏(↔)(Ʌ)(V)(→)B2. V t, e Filt_ster(e, t):- Ǝe 1 , e 2 , e 3 Open_tap(st 2 ,e 1 ,t 1 ) ɅWaterflows(st 2 , comp_filter,t 2 ) Ʌ Waterflows (comp_filter,carbon_filter,t 3 ) Ʌ Waterflows (carbon_filter, micr<strong>of</strong>ilter,t 4 ) Ʌ Waterflows (micro filter, ultraligth,t 5 ) ɅAfter(t 1 ,t 2 ) Ʌ Overlap(t 2 ,t 3 ) Ʌ Overlap(t 3 ,t 4 ) Ʌ Overlap(t 4 ,t 5 )Ʌ Overlap(t 5 ,t 6 ) Ʌ Cover(t,t 1 ,t 6 ).Time relations used are;Meets (i, j) - Interval ‘i’ meets interval ‘j’.Before (i, j) – Interval ‘i’ is before interval ‘j’.After (i, j) – Interval ‘i’ is after interval ‘j’.Equal (i, j) – Interval ‘i’ is equal to interval ‘j’.Overlaps (i, j) – Interval ‘i’ overlaps interval ‘j’.Cover ((i, j, k) – Interval ‘i’ covers interval ‘j’ and ‘k’.Specification in First Order Logic – AxiomsA. V t1,t 2 ,e Pump(st 1 ,st 2 ,e) Level(st 1 ,full,Pre2(e) ɅLevel(st 2 ,empty,Pre2(e)) Ʌ Ǝe 1 ,e 2 Open tap(st 1 ,e 1 ) Ʌwater flows(st 1 ,st 2 ,e 2 ) Ʌ Level(st 1 ,empty,eff1(e)) ɅLevel(t 2 ,full,eff2(e))ɅMeets(time(pre1(e l )),time(pre2(e)))ɅMeets(times)(pre1(e)),time(e 1 ))ɅOverlap(time(e 1 ),time(e 2 ))ɅCover(time(e),time(pre1(e)),time(e 2 )).Water is pumped from storage tank (st 1 ) to storage tank (st 2 ) ifst 1 is full and st 2 is empty ,these are the two preconditions. Andthere exist activities (e 1 ) and (e 2 ) such that e1 is the opening <strong>of</strong>tap for st1 and e2 is the process <strong>of</strong> water flowing from st1 to st2and the effect <strong>of</strong> these is that the level <strong>of</strong> st1 will now be emptywhile that <strong>of</strong> st2 will be full. The time relations are as shownbelow.B. V t,e Treatment(e,t) Ǝe 1 ,e 2 ,e 3 Sedi(e 1 ,pre1(e),t 1 ) ɅFilt(e 2 ,pre2(e),t 2 ) Ʌ Sterili(e 3 ,(pre3(e),t 3 ) ɅBefore(t 1 ,t 2 ) Ʌ Overlaps(t 2 ,t 3 ) Ʌ Cover(t 1 ,t 2 ,t 3 ).For all water treatment, there exist sedimentation,filtration and sterilization.B1. V st 2 ,t,e Sedime(st 2 ,t,e) Ǝe 1 ,e 2 ,e 3Add(CaCO 3 ,st 2 ,e 1 ,t 1 ) Ʌ Dissolve(CaCO 3 ,st 2 ,t 2 )Add(NaOH,dt 2 ,e 2 ,t 3 ) Ʌ Dissolve(NaOH,st 2 ,t 4 ) ɅAdd(bufsol, st 2 ,e 3 ,t 5 ) Ʌ Dissolve(bufsol,st 2 ,t 6 ) Ʌ Meets(t 1 ,t 2 )Ʌ Before(t 2 ,t 3 ) Ʌ Meets(t 3 ,t 4 ) Ʌ Before(t 4 ,t 5 ) Ʌ Meets(t 5 ,t 6 )Ʌ Cover(t,t 1 ,t 6 ).For filtration and sterilization to occur, sedimentation tankst 2 will be opened for water to flow from it throughcomposite filter, then through carbon filter and thenthrough micro filter ,for the process <strong>of</strong> filtration. After thewater has been filtered, it needs to be sterilized by flowingthrough the ultraviolet light. The time interval is as shown.C. V e,t Bottlemaking(e,t) Ǝe 1 ,e 2 ,t 1 ,t 2 Heating(e 1 ,t 1 )Ʌ Blowing(e 2 ,t 2 ) Ʌ Meets(t 1 ,t 2 ).For all bottle making activities, there exists heatingand blowing activities, and the two activities meet.C1 V e,t Heating(e,t) Ǝp,m,e 1 ,e 2 ,t 1 ,t 2 Preform(p)Ʌ Heatingmachine(m) ɅHeatup(e 1 ,m,t 1 ) Ʌ Pass(p(s),m,e 2 ,t 2 ) Ʌ Remove(p(s),m,t 3 )Ʌ Meets(t 1 ,t 2 ) Ʌ Meets(t 2 ,t 3 ) Ʌ Cover(t,t 1 ,t 3 ).For all heating activity, there exists perform <strong>of</strong> a particularsize and heating machine such that the heating machine isheated within time interval t 1 and immediately the performis passed through the heated machine. The end product isthe heated perform.C2 V e,t Blowing(e,t) Ǝp,b,m,e 1 ,e 2 ,t 1 ,t 2Heated_preform(p)) Ʌ Blowing_machine(m) ) ɅBottles(b) Ʌ Set-mould(s,m,e 1 ,t 1 ) Ʌ Put_in (p(s),m,t 2 ) ɅPress(m,t 3 ) Ʌ Remove(b,s,m,t 4 ) Ʌ Meets(t 1 ,t 2 ) ɅMeets(t 2 ,t 3 ) Ʌ Meets(t 3 ,t 4 ) Ʌ Cover(t,t 1 ,t 4 ).For all blowing process, there exists heated perform andblowing machine ,such that mould <strong>of</strong> size(s) is set into theblowing machine ,and the heated perform is put inside theblowing machine which in turn is being pressed. The endproduct is the bottle.D. V e,t Satchet Water Production(e,t) Ǝe 1 ,e 2 ,e 3 ,e 4 ,e 5 ,e 6Set(f,a,e 1 ,t 1 ) Ʌ Pass_through(f,u,e 2 ,t 2 ) Ʌ Fill(a,f,e 3 ,t 3 )Ʌ Seal(a,f,e 4 ,t 4 ) Ʌ Cut(a,f,e 5 ,t 5 ) Ʌ Packs(w,s,n,e 6 ,t 6 ) ɅBefore(t 1 ,t 2 ) Ʌ Overlap(t 2 ,t 3 ) Ʌ Overlap(t 3 ,t 4 ) ɅOverlap(t 4 ,t 5 ) Ʌ Overlap(t 5 ,t 6 ) Ʌ Cover(t,t 1 ,t 6 ).11


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netFor every sachet water production, there exists subactivities ; set, pass through, fill , seal , cut ,and pack.Film(f) is set into Automated machine(a) and the filmis passed through the ultraviolet light to be sterilised.The function <strong>of</strong> the automated machine is to fill, sealand cut. The factory workers (w) pack the sachet water(s) in number <strong>of</strong> 20 inside the packing nylon(n). Thetime relation is as shown.E. V e,t Bottle_Water(e) Ǝe 1 ,e 2 ,e 3 ,e 4 ,e 5 ,e 6Further_treatment(e 1 ,t 1 ) Ʌ Bottlewashing(e 2 ,t 2 ) ɅFeeding(e 3 ,t 3 ) Ʌ Capping(e 4 ,t 4 ) Ʌ Labelling(e 5 ,t 5 ) ɅAuto_pack(e 6 ,t 6 ) Ʌ Meets(t 1 ,t 2 ,t 3 ,t 4 ,t 5 ) Ʌ Cover(t,t 1 ,t 6 ).For every bottle water activity, there existssubactivities ; further treatment , bottle washing ,feeding , capping , labelling and autopack.E1 V e,t Further_treatment(e,t) Ǝm,o,rMicr<strong>of</strong>ilter(m) Ʌ Ozonator(o) Ʌ ReverseOsmosis(r) ɅWaterpass_through(m,t 1 ) Ʌ Waterpass_through(o,t 2 ) ɅWaterpass_through(r,t 3 ) Ʌ Overlap(t 1 ,t 2 ,t 3 ) Ʌ Cover(t,t 1 ,t 3 ).For all further treatment activity, there exists micro filter,ozonator and reverse osmosis, water pass through each <strong>of</strong>these for further treatment.E2 V e,t Bottle_water_ process(e,t) Ǝe 1 ,e 2 ,e 3Insert(f,c,a,t 1 ) Ʌ Arrange(f,b,w,t 2 ) Ʌ Wash(w,b,t 3 ) ɅFeed(j,b,t 4 ) Ʌ Cap(k,b,t 5 ) Ʌ Label(f,b,t 6 ) ɅArrange(f,b,v,t 7 ) Ʌ Packing(v,b,t 8 ) Ʌ Before(t 1 ,t 2 ) ɅMeets(t 2 ,t 3 ) Ʌ Overlap(t 3 ,t 4 ) Ʌ Overlap(t 4 ,t 5 ) Ʌ After(t 6 ,t 5 )Ʌ After(t 7 ,t 6 ) Ʌ Meets(t 7 ,t 8 ) Ʌ Cover(t,t 1 ,t 8 ).4. RESULTS AND DISCUSSIONInformal <strong>Comp</strong>etency QuestionsMotivating scenarios are problems which are encountered in thespecified industry. Given the motivating scenario, a set <strong>of</strong>queries will arise. TOVE consider these queries to berequirements that are in the form <strong>of</strong> questions that an ontologymust be able to answer. These are the informal competencyquestions, since they are not yet expressed in the formallanguage <strong>of</strong> the ontology.Ideally, the competency questions should be defined in astratified manner, with high level questions requiring thesolution <strong>of</strong> lower level questions. These competency question donot generate ontological commitments, rather they are used toevaluate the ontological commitment that have been made.4.2 <strong>Comp</strong>etency Questions1. What steps are involved in a particular process?2. Which activity comes first?3. What is the total time taken for a particular process tocomplete?4. What are the low level activities involved in achieving thehigh level activity?5. What is the time interval for each low level activity? .6. What are the raw materials used for each activity?7. The window below shows the available set <strong>of</strong> options, these 8.options have been linked for the system to answer eachcompetency questionBottle water process involve insertion <strong>of</strong> covers(c) byfactory workers(f) on the automated capping machine (a),arranging bottles(b) on the washing machine(w) andwashing <strong>of</strong> these bottles by the washing machine , feeding<strong>of</strong> these bottles by the feeding machine(j) , capping <strong>of</strong> thesebottles by automated capping machine(k), labeling by thefactory worker and packing <strong>of</strong> these filled bottles by theautomated shrink machine(v).F V e,t Dispensed_water_production(e,t) Ǝd,f,tDispenser(d) Ʌ Factory_worker(f) ɅTreated_water_tank(t) Ʌ Fill(f,d,t,t 1 ) Ʌ Cap(f,d,t 2 )Ʌbefore(t 1 ,t 2 )Ʌ Cover(t,t 1 ,t 2 ).For all dispenser water production, there exists rawmaterial, dispenser, factory worker and treated water tank,the factory worker fill the dispenser from the treated watertank and the factory worker then cap the dispenser. Thetime interval is as shown.Fig 3: Options Interface12


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTo know about the processes involved in sachet waterproduction and the raw materials involved, enter option 4 andpress enter.Fig 5: Interface showing water treatment activitiesFig. 7: Sachet water production activities5. CONCLUSIONAn activity ontology has been built using the water productioncompany. It achieves the principal aim <strong>of</strong> capturing domainknowledge in a generic way, and it provides a sharedunderstanding <strong>of</strong> the domain, which may be reused and sharedacross applications and groups. It provides a standard ontologyfor water production company, thereby minimizing ambiguityand maximise understanding <strong>of</strong> the production activities. Alsothe set <strong>of</strong> competency questions developed and tested showedthat it would effectively serve as the core <strong>of</strong> an organisation. . Inaddition, it also helps in the storage <strong>of</strong> water productionknowledge for those people that have no experience in the field.REFERENCES[1] Allen, J.F., 1984. “Towards a general theory <strong>of</strong> actionand time”, Artificial Intelligence, volume 23, pages123-154.Fig 6: Interface showing bottle making activities[2] Borst, P., Akkermans, H., Top, J. “EngineeringOntologies”, International <strong>Journal</strong> <strong>of</strong> Human computerstudies special issue using Explicit Ontologies in KBSDevelopment 46 (213), 365-406, 1997.[3] Briukhov,D.O., Shumilov, S.S. “OntologySpecification and Integration facilities in a SemanticInterpretation framework”. Proc. Of the InternationalWorskshop ADBIS’ 95, Moscow, 1995.13


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net[4] Definition <strong>of</strong> the CIDOC Object-Oriented conceptualReference Model. Version 3.0. Editors Cr<strong>of</strong>ts, N.,Dionissiadov, I., Doerr, M., Stiff, M. ICOM/CIDOCCRM special interest Group, February 2001.[5] Everett, J., Condo ravdi, C., Van den Berg, M.,Polanyi, L. Making Ontologies Work for ResolvingRedundancies across Documents communications <strong>of</strong>the ACM, 45 (2): 55-60, 2002.[6] Farquhar, A., Dappert, A., Fikes, R., Pratt, W.Integrating Information Sources. AAAI.-95 SpringSymposium on information Gathering fromHeterogeneous, Distributed Environments, 1995.[7] Fikes, R. and Pratt, W., Rice, J. collaborativeOntology construction for information IntegrationTechnical report. Standard University, 1995.[8] Fox, M., Barbuceanu, M., Gruninger, M., Lin, J. Anorganisation Ontology for Enterprise Modelling. InSimullating Organizations: <strong>Comp</strong>utational Model <strong>of</strong>Institutions and |Groups, Prietula, M., Carley, K.,Gasser, L. (Eds), Menlo Park CA; AAAI/MIT Press,pp 131-152, 1998.[16] Uschold, M., King, M. Towards a Methodology forBuilding Ontologies. Workshop on Basic Ontologicalissues in knowledge sharing, held in conjunction withIJCAL-95, Montreal, August 20-25, 1995.Author’s BriefMrs. V.B. Oyekunle lectures at theDepartment <strong>of</strong> <strong>Comp</strong>uter Science,Lead City University, Ibadan, Nigeria.She holds B.Sc Electrical andElectronics Engineering from ObafemiAwolowo University, Ile-Ife; andM.Sc <strong>Comp</strong>uter Science fromUniversity <strong>of</strong> Ibadan. She is a doctoralstudent at the department <strong>of</strong><strong>Comp</strong>uter Science, University <strong>of</strong> Ibadan, Nigeria. Her interest isin the area <strong>of</strong> Artificial Intelligence, Ontology and InformationSystem.Modelling . She can be reached at the Department Of<strong>Comp</strong>uter Science, Faculty Of Information Technology andApplied Science, Lead City University, Ibadan, Nigeria. E-mailbolanleoyekunle@yahoo.com[9] Galton Anthony, Operators vs Arguments: The Ins andOuts <strong>of</strong> Reification. LMT-galton.tex; pg 1, 2004.[10] Genesereth, M., Fikes, R. Knowledge interchangeformat, version 3.0, reference manual. Technicalrwport, logic-92-1, <strong>Comp</strong>uter Science Department,Standard University, 1992.[11] Gruber, T. Towards Principles for the Design <strong>of</strong>Ontologies for knowledge sharing. International<strong>Journal</strong> <strong>of</strong> Human <strong>Comp</strong>uter Studies 43 (516), pages907-928, 1993.[12] Gruninger, M. and Fox, M.S. “Methology for theDesign and Evaluation <strong>of</strong> Ontologies”, TechnicalReport, University <strong>of</strong> Toronto, April 1994.[13] Hilbert, D and Ackermann, W. (1950): GrudzugecherTheoretische Logik (1928); English TranslationPrinciples <strong>of</strong> Mathematical Logic, R.E. Luce, ed.,(Chelsea Publishing <strong>Comp</strong>any, New York)[14] Luke, S., Helfin, J., Hendler, J. applying Ontology tothe web: A case study.http://www.cs.umd.edu/projects/plus/SHOE/pubs/iwann99.pdf.[15] OWL Web Ontology language Guide. W3C.http://www.w3.org/TR/owl_guide 1Knowledge Management Applications. ACMSIGMOD Record, vol 31, N4, 2002.14


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net*Correspondence AuthorA Review On Number Portability In Global System For Mobile1 J.N. Odii & 2 J.C. OnuohaDepartment <strong>of</strong> <strong>Comp</strong>uter ScienceFederal University <strong>of</strong> TechnologyOwerri, Imo State1 jnodii@yahoo.com2 chiomajaco@yahoo.comABSTRACTThis work looks into the monopoly associated with some telecommunication regulatory agencies inability to mandate the implementation<strong>of</strong> Mobile Number Portability (MNP) and its effects on subscribers who cannot retain their directory numbers when switching over toanother service provider for reason best known to them. Many operators have claimed that Mobile Number Portability (MNP) isunnecessary and is an unwarranted expense, using assertions that the sector is highly competitive. Some mobile operators have gone toconsiderable trouble to make MNP difficult and have discouraged customers from exercising this right. They have suggested alternativessuch as personal numbering and Universal Personal Telephony (UPT). However, these are not substitutes for MNP, but are expensive,value-added services. MNP should therefore strongly be encouraged by governments and Regulatory Agencies to recognize that MobileNumber Portability (MNP) is an essential part <strong>of</strong> the competitive framework and should be made legally binding on all operators andservice providers.Key word: Mobile number portability, universal personal telephony, mobile subscriber, service provider1. INTRODUCTIONTechnology has influenced the telecommunication industry in somany ways. Mobile data, Wi-Fi and 3G networks are few <strong>of</strong>these technologies that will continue to have great influence <strong>of</strong>the telecoms industry in general. But there is one new capabilitythat gives subscribers greater flexibility and mobility which hasbeen mandated and implemented in so many countries – NumberPortability (NP). Number Portability gives subscribers theability to change service providers and keep his/her dial-ablenumber. To make this seemingly simple concept a reality, awhole host <strong>of</strong> new technologies, network upgrades, newbusiness processes, laws and regulations, and cost models needto be addressed.The list <strong>of</strong> countries that have adopted number portability isgrowing; and the technologies needed to support numberportability continue to evolve. More importantly, the increase innumber portability awareness among subscribers has resulted inan increased expectation by consumers that taking their numberswith them when changing service providers should be seamlessand trouble free [6].<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:J.N. Odii & J.C. Onuoha(2012). Review on Number Portability inGlobal System For Mobile. . <strong>Afr</strong> J. <strong>of</strong> <strong>Comp</strong> & <strong>ICTs</strong>. Vol 5, No. 3.pp 15-22.© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781The Telecommunications Act <strong>of</strong> 1996 (TA 96) tore down most<strong>of</strong> the significant barriers to unfettered competition intelecommunications. However, the inability <strong>of</strong> end users toretain their telephone numbers when changing service providersor types could potentially dissuade consumers from making sucha change, threatening to hinder industry competition and growth.Congress’ addition <strong>of</strong> Section 251 (b)(2) to TA 96 addressed thisobstacle by defining number portability, requiring that allcarriers deploy it, and setting deadlines for implementation.Federal Communications Commission (FCC) Docket No. 95-116 (In the Matter <strong>of</strong> Telephone Number Portability) andsubsequent FCC orders and reconsiderations reinforcedCongress’ mandate and set the machinery in motion toimplement number portability [5][7].The actions <strong>of</strong> both Congress and the FCC enabled consumersand businesses to choose new providers, services, and localeswhile retaining their phone numbers, thereby fosteringcompetition in the telecommunications industry. To ensurestandardization across platforms for all participants, the FCCinstructed the North American Numbering Council (NANC) todetermine which number portability method to employ. Severaloptions were investigated. The location routing number (LRN)method was chosen because it appeared to be the most efficientand is now successfully implemented in the wirelineenvironment. The NANC then created the Local NumberPortability Working Group (LNPA-WG) and empowered it toselect the appropriate technology, create standards, determineoperational processes, and develop and implement a deploymentstrategy [3][4].15


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTo fulfill its responsibilities, the LNPA-WG was granted theauthority to convene appropriate subcommittees as needed.Subcommittees created include the National Number Poolingand Slow Horse groups, as well as the Wireless NumberPortability subcommittee, which defines integration issuesbetween the wireless and the wire line industries. NeuStar wasnamed the Number Portability Administrator and operates theNumber Portability Administration Center (NPAC). Regulatorshave mandated that number portability be implemented beforethe regional Bell operating companies (RBOCs) are allowed to<strong>of</strong>fer long distance service within their regions. Conversely,interexchange carriers (IXCs) and competitive local exchangecarriers (CLECs) require local number portability (LNP), alsocalled service provider portability, to gain a competitivefoothold in the local loop [2][8].This ability to enter local markets on a competitive basis isconsidered key to fair and open competition and is directlyaddressed in FCC Docket No. 95-116. CLECs are takingadvantage <strong>of</strong> opportunities created by LNP to compete withincumbent local exchange carriers (ILECs). In 1999, the localservice market—the primary market identified by CLECs—represented over $109 billion in total revenue, and CLECsgarnered 5.8 percent <strong>of</strong> that revenue, according to the FCC.(VeriSign Communications Services, 2004) This penetration islargely predicated on the ability <strong>of</strong> current ILEC customers tochange service providers without changing their phone numbers.Some CLECs have reported that over 90 percent <strong>of</strong> theirsubscriber growth was directly enabled by number portability.Wireline LNP has been implemented within the top 100 MSAsin the United States, as mandated, and is gradually beingadopted outside <strong>of</strong> these areas[1][5].The FCC order also set an aggressive implementation schedulefor the wireless industry. However, the CellularTelecommunications Industry Association (CTIA), acting onbehalf <strong>of</strong> the wireless community, asked for and receiveddeadline extensions. The FCC’s current mandate requires thatwireless carriers, including cellular and personalcommunications service (PCS) carriers, implement serviceprovider portability by November 24, 2003 [10]2. PRINCIPLES OF IMPLEMENTING NUMBERPORTABILITY2.1. Mandates for the Implementation <strong>of</strong> Number Portabilityin NigeriaThe proposition for the mandated for the implementation <strong>of</strong>Mobile Number Portability was first raised by the ViceChairman <strong>of</strong> the Nigerian Communications Commissions (NCC)Engr. Ernest Ndukwe during the public lecture held at the NCCsecretariat (11 th June 2007). During the lecture, he made themandate for the implementation <strong>of</strong> MNP known the varioustelecommunication operators in Nigeria and December 31 st 2007was fixed for the implementation. However, the plan for theimplementation on Mobile Number Portability in Nigeria faileddue to various constrains from cost and infrastructure. Theprocess is still on and would be implemented soonest [7]2.2 Number Portability DefinedNumber portability gives a telephone subscriber (fixed ormobile) the ability to change service providers but keep thesame dial-able phone number. Sometimes, the porting <strong>of</strong> anumber may require a different phone; the new phone isprogrammed with the “old” phone number [9]2.3 Types <strong>of</strong> Number PortabilityThere are basically three types <strong>of</strong> Number Portability currentlybeing implemented around the world presently which includes,Service Provider Portability (SSP) or Local Number Portability(LNP), Location Portability (LP) and Service Portability (SP).2.3.1 Service Provider Portability (SSP)The most commonly deployed number portability type, serviceprovider portability enables end users to retain their telephonenumbers when changing service providers.2.3.2 Location Portability (LP)Location portability is the ability <strong>of</strong> end users to retain theirtelephone numbers when moving from one location to another(between areas serviced by different central <strong>of</strong>fices). In thisinstance, a telephone number could be associated with a device,independent <strong>of</strong> location. It would allow customers to keep theirnumbers when they move to locations outside <strong>of</strong> the original ratecenter. Until very recently, no requirements have beendesignated or mandated for location portability in the USA.(Note: In August 2005, the Federal Communication Commission(FCC) mandated a 90-day waiver for location number portabilityto help victims displaced by Hurricane Katrina in Mississippi,Alabama and Louisiana.)2.3.3 Service portabilityThis is the ability <strong>of</strong> end users to retain the same telephonenumber as they change from one service to another. The newservice can be <strong>of</strong>fered by a new operator or can be within thesame operator network. For example, a subscriber shiftssubscription to a VoIP service provider, or from a code divisionmultiple access (CDMA) or time division multiple access(TDMA) network to a global system for mobile communications(GSM) network or vice versa [6].2.4 Forms <strong>of</strong> Number PortabilityNumber Portability can take one <strong>of</strong> the following forms: Fixed –to – Fixed Porting, This is the porting <strong>of</strong> a fixed line numberinto another fixed line, Mobile – to – Fixed Porting, Thisinvolves the porting <strong>of</strong> a mobile phone number to a fixed line,Fixed – to – Mobile Porting, This porting <strong>of</strong> a fixed linenumber to a mobile phone and Mobile – to – Mobile Porting,This is the process <strong>of</strong> porting a mobile phone number to anothermobile phone [6].2.5 Key Network Elements in a Number Portability Domain16


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netListed below and shown in Figure 6 are several key networkelements in a number portability domain:a. NP server: maintains the number portability database(NPDB) and provides routing instructions, for example theTekelec EAGLE ® 5 Integrated Signaling System (ISS).b. Donor network: network from where the number originallycame.c. Originating/initiating network: network from where the calloriginated.d. Subscription network: network in which the subscriber ispresently being served.e. Recipient network: network to where a number is ported.f. Transit network: network between two networks (wheresignaling is transported prior to arriving at the recipientnetwork) (Tekelec Co. 2007).3. ARCHITECTURE AND METHODOLOGY3.1 Three Steps to Porting a NumberDifferent countries have implemented NP differently. Thesedifferences are primarily because <strong>of</strong> the disparities amongregulatory agency philosophies, existing infrastructure andmethods employed by operators to meet the mandate. Althoughthere is a variety <strong>of</strong> ways to implement these steps, in all cases,there are three basic steps to porting a number from the “old”service provider (OSP) to the “new” service provider (NSP):a) Port Initiation: The subscriber has to initiate the portby letting an operator know <strong>of</strong> his/her intent.b) Exchange <strong>of</strong> Porting Information: The OSP andNSP must communicate with each other specific aboutthe port, including the subscriber information, exactdate and time, and <strong>of</strong> course, the phone number.c) Network Routing Schemes: Once the number hasbeen ported, calls made to that phone number must be“re-routed” to the NSP.3.2 Step One: Port InitiationTo start the porting process, a subscriber needs to contact anoperator to request the port. There are two basic approaches forthis process used around the world which includes, DonorInitiated in which the subscriber goes to his/her current operatoror OSP to request to port “out” and Recipient Initiated inwhich the subscriber goes to the NSP to request to port “in”his/her number.3.2.1 Donor InitiatedIn this model the donor operator or OSP starts the portingprocess. The subscriber contacts their current service providerand indicates their desire to change service providers and porttheir number.The OSP then initiates the administrative process with the NSP.In some places, the subscriber is given an authorization code ordocument showing they are eligible for porting (note: eligibilityis determined by fulfillment <strong>of</strong> the contract or ability to breakthe contract). The subscriber has a set period <strong>of</strong> time (e.g. up to30 days in the U.K.) to determine a desired service provider andpresent the written authorization. The NSP then coordinates theport with the OSP, using contact information provided in thewritten authorization form. In other cases, the OSP contacts theNSP directly upon initiation by the subscriber. This assumes thatthe subscriber has already selected a new service provider. Inboth <strong>of</strong> these cases, the net result is that the subscriber mustinitiate the porting process through the current service provider.3.2.2 Recipient Operator InitiatedIn this model the porting process starts when the subscribercontacts a desired new service provider (NSP) (recipientoperator) to initiate the porting process. The subscriber contactsa retail point <strong>of</strong> sale (a kiosk, a Web site, a retail center, anauthorized agent, etc.) and provides information regardinghis/her current operator (OSP), such as account number. TheNSP then begins the administrative process and must validatethe subscriber-provided-information with the OSP. At this point,the OSP still has the ability to reject the port, based upon agreedvalid reasons, such as incorrect subscriber information.3.3 Step Two: Exchange <strong>of</strong> Porting InformationRegardless <strong>of</strong> the method chosen for port initiation, the OSP andNSP must exchange information for validation and portcoordination. This information exchange is commonly referredto as inter-carrier communications or inter-operatorcommunications (IOC) [1].In the case <strong>of</strong> fixed-to-fixed porting, the amount <strong>of</strong> informationin the IOC can be several pages, including circuit and trunkinformation, physical locations <strong>of</strong> various network elements, aswell as subscriber information. In the case <strong>of</strong> mobile-to-mobileporting, the data in this exchange can be as simple as: subscribername and billing address, account number, the phone number tobe ported and the date and time <strong>of</strong> port. There are severaldifferent methodologies used around the world to accomplishIOC. One such example is a fully automated exchange through asingle central clearinghouse.This method uses a pre-determined format for the data and canbe completed in minutes. This fully automated exchange is“kicked-<strong>of</strong>f” by one operator’s back-<strong>of</strong>fice system (e.g. a billingsystem or a customized gateway) and is responded toautomatically by the other operator’s back-<strong>of</strong>fice system.Another automated approach involves entering the portinginformation into a GUI. The information is then exchangedthrough a centralized clearinghouse with the other operator. Inboth <strong>of</strong> these cases, s<strong>of</strong>tware systems play a major role invalidating the port, expediting the changeover in serviceproviders, and tracking the porting process end-to-end.17


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netIn some countries, a manual approach is used, <strong>of</strong>ten usingfacsimile or e-mail to exchange information. There are trade-<strong>of</strong>fsto both approaches. The automated solution results in less errorsand a much faster overall porting experience for the subscriber.This automation comes at a cost – s<strong>of</strong>tware systems need to bedeveloped, and modifications to operators’ existing back-<strong>of</strong>ficesystems need to be made to exchange the information. Themanual approach can be troublesome – faxes can be lost, e-mailscan be deleted, and in both cases, humans need to interpret andinput the information into various systems. And <strong>of</strong> course, amanual approach results in a much longer porting process.3.3.1 Port TimingThe time it takes to complete a port varies as widely as thedifferences in the implementation <strong>of</strong> the process – from as littleas two and a half hours to as lengthy as 30 days, with extremeexamples <strong>of</strong> four months. How long should the process take?There is no right or wrong answer; but generally from asubscriber’s perspective, a shorter timeframe is better. Theanswer to this question, in part, needs to be determined by theregulatory agency and in part, by the operators.3.3.2 Cooperation between OperatorsTypically competitors do not communicate, never mindcooperate. But in the case <strong>of</strong> number portability, competitorsneed to cooperate to accomplish the porting process. The degreeto which the operators cooperate has a direct correlation to thereliability and overall porting speeds. And although twooperators may be competitors, there is incentive to cooperate –the OSP assisting the NSP in porting a subscriber will benefitnext time the roles are reversed. Furthermore, two cooperatingcompetitors can decrease the cost <strong>of</strong> porting for both operators.This cooperation includes agreement on the forms to beexchanged, the method and protocol to be used for the exchange,timeframes for acknowledgement <strong>of</strong> the requests and responses,information to be used to validate the port request, valid reasonsfor rejection, hours / days <strong>of</strong> the week and holiday schedule tobe observed in the porting processed, etc. The need forcooperation is obvious – the degree to which competingoperators agree to cooperate varies greatly by country, and evenamong operators within a single country. However, we haveobserved that those operators most willing to cooperate find thattheir ports go through quickly and reliably, resulting in a betterporting experience for the subscriber.3.4 Step Three: Network Routing SchemesAfter the IOC process has been completed and the port is ineffect, calls made to the ported number must be re-routed – i.e.an incoming call must find its way to the NSP. The routinginformation used prior to the implementation <strong>of</strong> porting wouldroute the call to where it always went – the OSP. Although thereare many variations and hybrids, routing <strong>of</strong> incoming calls in aported environment can be categorized into three basicmethodologies or schemes such as Onward Routing (OR), Queryon Release (QoR) and All Call Query (ACQ).A description <strong>of</strong> the call processing for each <strong>of</strong> these schemesfollows, but first a brief explanation <strong>of</strong> the roles <strong>of</strong> the operatorsin the following diagrams. The originating network typicallyrefers to the network that places or originates the call, but forpurposes <strong>of</strong> this document, it could refer to the network prior tothe terminating network. If the call originates in another country,the network denoted by “originating network” in these diagramswould be the long distance carrier. If the call was originated by amobile operator that subtends all calls to the local PTT or localLEC, then that PTT or LEC would take on the role denoted by"originating network” in these diagrams. This role is referred toas the “N-1” network, i.e. the network one prior to theterminating network.The donor network is the network from which the number wasported. The donor switch is the switch to which the numberrange is assigned, and to which, by default, calls are routed. Thenew network is the network to which the number has beenported. Although the following diagrams are simplified, therecould be more than one donor and/or new network, if thesubscriber has ported, and then ported again.3.4.1 Onward Routing (OR)In the OR scheme, calls generated from an originating networkare routed just as if there was no porting, that is, according to thepath indicated by the dialed digits. The donor network checksagainst an internal database, notes that the number has beenported, determines to which network the call should be routed,and then routes (“trunks”) the call to the new network. Theinternal database may be a stand-alone database, shared by allswitches belonging to that donor operator, or may be switchresident,and only contain information about numbers ported out<strong>of</strong> that switch. This method has been referred to as a “callforwarding” scheme and has some positive aspects and somedrawbacks.Most switches have some call forwarding capability, thereforethis method is a very quick and relatively simple to implement.It does not involve a centralized database, as does the othermethods, and therefore does not require close cooperationamong competitive operators. This scheme does require thesetup <strong>of</strong> multiple call segments; this scheme can become veryinefficient with regard to transmission facilities (i.e. circuits andtrunks) and switch resources (i.e. cards, racks, and memory) –all expensive components in an operators network. Furthermore,a donor network that loses subscribers may incur costs foradditional transmission facilities and switch resources to handlethe routing for subscribers that it has lost – not a good positionto be in.3.4.2 Query on Release (QoR)In the QoR scheme, the originating network first routes the callas if porting had not happened. The donor network checks if thenumber was ported, and if so, the call is released back to theoriginating network. Note that the donor network does not keeptrack <strong>of</strong> where the subscriber has ported, just that the number isnot resident on the switch.18


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThe originating network queries a centralized database,determines the revised routing to the new network, and re-routesthe call correctly. With QoR, circuits are allocated to the donornetwork but are released immediately rather than remain tied upfor the length <strong>of</strong> the call, as in OR. And although the donornetwork is still involved in each call, its involvement isminimized. This method therefore is more efficient in terms <strong>of</strong>circuit and transmission facilities. But a new network element isneeded – a centralized database. This requires that all operatorsagree on a process by which the centralized database is updatedand maintained – typically by agreeing on a third party to ownand operate the database. Also, the costs to own and operate thecentralized database must be borne by all the operators.A special note on a hybrid model, proposed on paper but notseen implemented, known as Call Drop Back or Return to Pivot(RTP). As in OR, in RTP the donor operator maintains aninternal database, which is used to look-up new routinginformation. The call is released back to the originating operatoralong with the new routing information that is also passed backto the originating operator. The originating operator in turn usesthe routing information provided by the donor network toreroute the call. Therefore a centralized database is not needed,and a circuit from the donor operator to the new operator is notrequired. However, major changes to the signaling protocol arenecessary to make this scheme happen, which is the majorreason it has not been widely adopted. OR is efficient when alimited number <strong>of</strong> ported numbers exist, by comparison, QoRbecomes more cost effective as porting becomes more common.But as porting becomes even more prevalent in a country; QoRis less efficient than All Call Query.3.4.3 All Call Query (ACQ)In the scheme known as ACQ, the originating network does notroute calls to the donor network; in fact, once a number has beenported, the donor network is not involved at all. The originatingnetwork queries a centralized database and the call is re-routedto the new network. There are two forms <strong>of</strong> ACQ – in one,literally all calls are queried, in the other, the line range in whichthe number belongs is checked to see if that line range is eligiblefor porting prior to the database query. In reality, where ACQ isused, most operators query all calls to simplify administration.As in QoR, there is a process to update and maintain thedatabase and a third party to own and operate the database.All the operators must agree upon this. And as in QoR, the coststo own and operate the database must be borne fairly by all theoperators. As porting volumes increase, QoR becomes the mostefficient scheme for call routing. In some cases, countries havestarted with OR when porting volumes were low, and havemigrated to ACQ as volumes have increased. In some countries,QoR and ACQ coexist, and the choice <strong>of</strong> implementation is leftto each operator [6].3.5 Process Overview: Porting a NumberThis involves:a) When the recipient operator wins the business <strong>of</strong> one<strong>of</strong> the donor operator’s customers it enters portinginformation into its operations support system (OSS),at the point <strong>of</strong> sale (POS) (i.e., retail store, affiliateretailer, web, etc.).b) 2. Next, a port request is sent from the recipientoperator to the donor operator via the inter-operatorcommunications (IOC) process.c) 3. Upon acceptance and acknowledgement by thedonor operator, a port request response is returnedfrom the donor to the recipient via the IOC.Alternatively, the donor operator can ask for a delay orfurther information from the recipient operator instead<strong>of</strong> accepting the port request. Note that the recipientoperator cannot port the number if it does not receive amobile port response from the donor operator.d) 4. The recipient operator’s OSS provisioning systemfeeds the porting information to a SOA system. Ideallythe IOC process and SOA process should be integratedwith the POS system so data does not have to be rekeyedat various stages in the porting process. Thiswill save money and increases accuracy.e) 5. The recipient operator’s SOA forwards a portingsubscription request to the NPAC, specifying the dateand time when porting should occur.f) 6. The NPAC sends a notification <strong>of</strong> the portingrequest to the donor operator’s SOA. This starts a twohourtimer at the NPAC. The donor operator has onehour to respond. Then the recipient operator hasanother hour to confirm the subscription request.g) 7. The donor operator’s SOA informs its OSS <strong>of</strong> theporting request, including the date and time to stopbilling for the number. Note that the donor operatormay, at its own discretion, notify the customer that ithas received a notice to discontinue service and will beporting the number to the recipient operator and that itwill send a final bill and expects prompt payment.This action will increase the donor operator’s costs butmay help it collect final payments and prevent someporting mistakes. For the donor operator, this shouldkick <strong>of</strong>f the process <strong>of</strong> making final paymentarrangements with the end user. For example, if thecustomer is breaking a contract to leave, the donoroperator may want to make the subscriber aware that itwill be billing him or her for this. This may also be agood time to determine why the customer is leaving.Did they leave over service quality, cost or anotherreason? Is there anything you can do to win back theirbusiness? These are questions an operator may want toask in order to solve the underlying problems beforeloosing additional customers.h) 8. The donor operator’s SOA notifies the NPAC that ithas received the porting request and confirms the dateand time <strong>of</strong> the change.19


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.neti) 9. The NPAC notifies the recipient operator that thedonor operator has acknowledged the request andconfirmed the date and time and other arrangements.j) 10. The recipient operator sends a porting activationrequest to the NPAC.k) 11. The NPAC then sends the information to all <strong>of</strong> theLSMSs operating in the region so the number and thenew routing information <strong>of</strong> the recipient operator isavailable the next time the number is dialed. Thenumber is now ported. Once porting takes effect,when a call is placed to a number, a database querymust be performed to obtain the correct routinginformation for the call.4. BENEFITS OF NUMBER POTABILITYRegulatory agencies mandate NP because it is good forconsumers. It eliminates a particular barrier unique to thetelecommunication industry, that is, the ownership <strong>of</strong> the phonenumber. However, additional reasons to mandate and implementNP include market, regulatory and operator benefits.4.1 Consumer BenefitsNP clearly benefits the consumer. At the individual subscriberlevel, the biggest impact to changing phone numbers is not tothe subscriber, but to those individuals in the subscriber’s circle<strong>of</strong> friends, family and acquaintances. Updating written addressbooks, changing programmed contacts lists, remembering thenew number, are all unnecessary burdens. For a business thescope <strong>of</strong> changes forced by a change in phone number is evenmore considerable: business cards, stationary, print advertising,Web sites, signage, the sides <strong>of</strong> delivery vehicles, and invoices.All the changes that affect a business contribute to the reasonwhy a business, in general, would not change service providersif it means also changing phone numbers.4.2 Market BenefitsWith the advent <strong>of</strong> NP comes a more competitive marketplace.Without a doubt, the mobile industry is already a highlycompetitive industry. However, by lifting <strong>of</strong> the last remainingbarrier to what some would consider a completely free market,operators become even more focused on subscribers. Rather thancontinuing price wars, in countries where MNP has beenimplemented, operators tend to start consumer loyalty programs,improve customer service, reduce hold times, increase outboundcalling programs, focus on renewal incentives, work to improvenetwork coverage, roll-out additional differentiated servicessuch as Wi-Fi agreements, push-to-talk service, 3G, and othercustomer-pleasing new functionality.4.3 Regulatory BenefitsThe infrastructure developed for NP has been used to solve otherproblems in some countries. Where directory number resources(i.e. number ranges) were being exhausted, the infrastructure tomake NP possible was also used to allow numbering planadministrators to assign numbers in a more efficient manner (toassign a block <strong>of</strong> 1000 numbers to an operator rather than ablock <strong>of</strong> 10,000 numbers). In another example, in countrieswhere the mandate for NP also included fixed-to-mobile as wellas mobile-to-fixed porting, the regulatory agency couldencourage greater competition to incumbent fixed operators.With fixed-to-mobile portability mandated, mobile operatorsbecome a competitor to fixed service, since the subscriber canchange from fixed to mobile easily, and <strong>of</strong> course, keep the samedirectory phone number.4.4 Operator BenefitsOn the surface, it would seem that NP is a financial andimplementation burden to operators; and with the increasedcompetition comes lower prices and hence lower margins. Andcertainly, some operators have argued that the implementation <strong>of</strong>number portability is cost prohibitive and would be bad forconsumers since the cost <strong>of</strong> implementing NP would have to bepaid for by subscribers, and could ultimately put the operator out<strong>of</strong> business. However, some operators have used the mandate forNP as an opportunity to gain market share and target high ARPUsubscribers as well as multi-line business customers. As withany market where a barrier to competition is lifted, some <strong>of</strong> thefree market agents will gain and some will lose. In the U.S.,operators who took a proactive stance in preparing for NP wereable to increase net additions in the face <strong>of</strong> increasedcompetition. This was through a combination <strong>of</strong> customerservice improvements, network improvements, targetedadvertising, focus on fixed- to-mobile porting (also known asdisplacement), and to a lesser degree, more competitive rateplans. The graph shows that when comparing fourth quarter2002 (prior to the implementation <strong>of</strong> MNP in the U.S.) withfourth quarter 2003 (MNP was implemented Nov 24, 2003)some operators managed to increase their subscriber base, someoperators found themselves in negative net additions position,while some stayed relatively neutral. (Syniverse Tech. 2006).5. CONCLUSIONOne <strong>of</strong> the tenets that have been observed is that numberportability is inevitable. As subscribers become aware <strong>of</strong> NP inother countries, they too begin to ask, “Why can’t I keep mynumber when I change service providers?” NP lifts a barrier tocompetition, which is unique to the telecommunicationsindustry. And increasing competition is always in the bestinterest <strong>of</strong> consumers.The principle <strong>of</strong> number portability is fully applicable to mobiletelecommunications. Many operators have claimed that MobileNumber Portability (MNP) is unnecessary and is an unwarrantedexpense, using assertions that the sector is highly competitive.Some mobile operators have gone to considerable trouble tomake MNP difficult and have discouraged customers fromexercising this right. They have suggested alternatives such aspersonal numbering and Universal Personal Telephony (UPT).However, these are not substitutes for MNP, but are expensive,value-added services. MNP should therefore strongly beencouraged by governments and Regulatory Agencies torecognize that Mobile Number Portability (MNP) is an essentialpart <strong>of</strong> the competitive framework and should be made legallybinding on all operators and service providers.20


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netMobile Number portability is a fundamental prerequisite for truecompetition in the telecommunications sector. Without thisfacility users are locked into their existing suppliers and canchange operator with disruption and large expense. Businesseshave to reprint letterheads and business cards.They may also have to repaint Lorries and vans. A change <strong>of</strong>number, whether in business or by an individual, requires othersto change the number stored in their mobile phones, PDAs,s<strong>of</strong>tware on personal computers, in fax machines and so on.Consequently, it is increasingly difficult because others musteffect the change.portedfixed linefixed lineFig 1: Fixed – to – Fixed PortingportedMobile linefixed lineFig 2: Mobile – to – Fixed PortingFixed lineportedMobile lineFig 3: Fixed – to – Mobile PortingportedMobile phoneMobile phoneFig 4: Mobile – to – Mobile PortingIOC MessagingOperator “A”Operator “B”Fig 5: Exchange <strong>of</strong> Poring Information21


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netREFERENCES1. Alltel Communication, (2001) Alltel updates forbilling system for Number Portability, Alltel Portal, pg2 – 62. Belgian Mobile (2008) Belgian Mobile NumberPortability Project, Revised Edition, iir – events, pg 20– 233. G.I. Ilogbaka (2008) Seminar Report, pg 13-174. Kdamm Cegete SFR (2008) Network StructureProposal for MNP, Version 1.0, pg 7 - 165. Mobile <strong>Afr</strong>ica, (2000) Number Portability in South<strong>Afr</strong>ica. <strong>Journal</strong>, Mobile <strong>Afr</strong>ica Publication, pg 7 – 116. Syniverse Tech. (2006) A global perspective onNumber Portability, 1 st Edition, Syniverse Publication,Pg 3 – 147. Thisday Newspaper (11 th Aug. 2006) Mandate for theimplementation <strong>of</strong> Number Portability in Nigeria,Dailies, Thisday Publication, pg 7A8. Tekelec Communications (2007) Operator Guidelinesfor Number Portability, 2 nd Edition, ANSI network, pg12 – 149. T-Mobile, (2000) Number Portability in South <strong>Afr</strong>ica.<strong>Journal</strong>, Mobile <strong>Afr</strong>ica Publication, pg 7 -1110. VeriSign Communications Services, (2004) NumberPortability, pg 3Author’s BriefOnuoha Jacinta Chioma is on Faculty atthe Department <strong>of</strong> <strong>Comp</strong>uter Science,Federal University <strong>of</strong> Technology, Owerri,Imo State, Nigeria. Her research interest isModeling, Analysis and Rendering inheterogeneous Information and Social Networks Systems. Sheis a member <strong>of</strong> Nigeria <strong>Comp</strong>uter Society and also a member <strong>of</strong>Organisation for women in Science for Developing World(OWSDW). She can be contacted by phone on+2348037394691 and through E-mail: chiomajaco@yahoo.com.Mrs Juliet N. Odii is on Faculty at theDepartment <strong>of</strong> <strong>Comp</strong>uter Science, FederalUniversity <strong>of</strong> Technology, Owerri, ImoState, Nigeria. Her research interest is<strong>Comp</strong>uter Networks. She can be contactedby phone on +2348035373137 andthrough E-mail: jnodii@yahoo.com22


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netOn the Role <strong>of</strong> Linguistics in the Detection and Prevention<strong>of</strong> Cybercrimes in NigeriaFemi U. BalogunDepartment <strong>of</strong> Languages - School <strong>of</strong> General StudiesAuchi Polytechnic, Auchi, Nigeriaunufem@yahoo.comO. Abu (Esq)Department <strong>of</strong> Humanities and Social SciencesAuchi Polytechnic, Auchi, NigeriaEdmund I. G. BalogunSchool <strong>of</strong> Information TechnologyThe American University <strong>of</strong> Nigeria,Yola, Adamawa State, Nigeriaedmundbalogun@yahoo.co.ukOlusegun 0.AramideNational Teachers' Institute (NTI)Igarra, Edo StateApplied Linguistics/Communication Artse-mail: aramidedu@gmail.cornABSTRACTA linguist is not a policeman nor is linguistics a law enforcement agency. Linguistics is simply the scientific study <strong>of</strong> language while alinguist is someone concerned with such study. Since the commission <strong>of</strong> crime necessarily involves, among others, the use <strong>of</strong> language,this paper, theoretical in nature, argues that linguistics has a role to play in the detection and prevention <strong>of</strong> cyber crime in Nigeria. This itdoes by looking at: what is cybercrime? How is it committed and by whom? How can it be prevented with the aid <strong>of</strong> linguistics?The paper rounds <strong>of</strong>f with some suggestions.Key words: Cybercrime; Linguistics; Human <strong>Comp</strong>uter Interaction (HCI), <strong>Comp</strong>uter-Mediated Communication (CMC)1. INTRODUCTIONSince the industrial revolution <strong>of</strong> the 18 th century Europe, theworld has not stopped witnessing one form <strong>of</strong> revolution or theother in different areas <strong>of</strong> human endeavour. One <strong>of</strong> suchrevolutions currently taking place in the world is the informationtechnology revolution occasioned by the information explosion<strong>of</strong> the modern times. This revolution, like a coin, and everyother one before it, has two sides to it – the good and the bad.<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:F.U. Balogun, O. Abu (Esq), E.I.G. Balogun & O.O. Aramide(2012). On the Role <strong>of</strong> Linguistics in The Detection andrevention <strong>of</strong> Cybercrimes in Nigeria. <strong>Afr</strong> J. <strong>of</strong> <strong>Comp</strong> & <strong>ICTs</strong>.Vol 5, No. 3. pp 23-30.© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781With the aid <strong>of</strong> different types <strong>of</strong> computers ranging from theold mainframes, desktops, laptops, PDAs to ipad, iphones, etc,and the inception <strong>of</strong> the internet, the world has been reduced to aglobal village. Thus, business has become simplified; distancesbetween nations have been reduced or even closed and access tohitherto inaccessible information has been made possible. Theadvent <strong>of</strong> the internet, in particular, has revolutionizedcommunication in many ways; it changed the way peoplecommunicate and created new platforms with far-reaching socialimpact.Significant avenues include but are not limited to SMS TextMessaging, e-mails, chatgroups, virtual worlds and the web(Crystal, 2005). This is a good side to the coin <strong>of</strong> informationtechnology revolution <strong>of</strong> the modern times; many more certainlyexist. Cybercrime which manifests as spam, fraud, obscene or<strong>of</strong>fensive content, etc, belongs to the bad side <strong>of</strong> the coin. It is aglobal phenomenon that is threatening the economy <strong>of</strong> nations.23


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netFor instance, most ironically, the internet online businessservices such as e-commerce, e-banking which ought to be ablessing to mankind as it exposes people to a lot <strong>of</strong> opportunitiesin various fields <strong>of</strong> human endeavour, is fast turning a source <strong>of</strong>discomfort and regret as a result <strong>of</strong> atrocities being perpetratedthrough it. In Nigeria, it is becoming pervasive. Its category,victims, and nature are endless just as its perpetrators are manyand varied.This has forced Ehimen and Bola (2010:95) to lament that“cybercrime in Nigeria is difficult to prove as it lacks thetraditional paper audit trail, which requires the knowledge <strong>of</strong>specialists in computer technology and internet protocols.”Cybercrime has had some adverse social and economicconsequences on the country just as it has projected a bad image<strong>of</strong> the country. Security especially <strong>of</strong> lives and properties and <strong>of</strong>the nation as a whole, is everybody’s business. It is not that <strong>of</strong>the law-enforcement agents alone, even though it is theirprimary responsibility.But since the “prevention <strong>of</strong> cybercrime requires the cooperation<strong>of</strong> all the citizens and not necessarily the police alonewho presently lack specialists in its investigating units to dealwith cybercrime” Ehimen and Bola (2010:93), this paper arguesthat linguists, especially applied linguists, are some specialistswho also have a role to play in the task <strong>of</strong> combatingcybercrime. Consequently, the paper examines what cybercrimeis, how it is committed and by whom, how it can be detected andprevented with the assistance <strong>of</strong> linguistics.2. WHAT IS CYBERCRIMEEvery generation, since the history <strong>of</strong> man, has always had itspeculiar problems and challenges. During the voyages <strong>of</strong>exploration in the 14 th century when sea transportation was invogue, sea piracy was a common phenomenon. Today thatcomputers are everywhere and with the inception <strong>of</strong> the internet,cybercrime, like sea piracy <strong>of</strong> old, is on the rampage posing aserious challenge to this generation. It is sparing no one, nomatter the age, sex or nationality. If one is not perpetrating it,one is falling a victim; if one is not falling a victim, one is arelation or a friend <strong>of</strong> a victim. Many people and agencies,consequently, have attempted to define cybercrime in variousways.Their definitions do not seem to differ much from each other,however. Chaubey (2009: 135) defines cybercrime “as the use<strong>of</strong> computer and the Internet by criminals to perpetrate fraud andother crimes against companies and consumers”. Chaubey(2009) quoting Grant Adamson (2003) states that cyber crime isa broadly used term to describe criminal activities committed oncomputers or the Internet. Some <strong>of</strong> it is punishable by the laws<strong>of</strong> various countries, whereas others have a debatable legalstatus.According to Ehimen and Bola (2010:94) quoting Taylor(1999):Cybercrime or computer crime can broadly be definedas a criminal activity involving an informationtechnology infrastructure: including illegal access orunauthorized access; illegal interception thatinvolves technical means <strong>of</strong> non-public transmissions<strong>of</strong> computer data to, from or within a computersystem; data interference that include unauthorizeddamaging, deletion, deterioration, alteration orsuppression <strong>of</strong> computer data; systems interferencethat is interfering with the functioning <strong>of</strong> a computersystem by imputing, transmitting, damaging, deleting,deteriorating, altering or suppressing data; misuse <strong>of</strong>devices, forgery (ID theft), and electronic fraud.A generalized definition <strong>of</strong> cybercrime may be “unlawful actswherein the computer is either a tool or target or both.” Chaubey(2009) quoting Nagpal (2002) explains that the computer may beused as a tool in the following kinds <strong>of</strong> activity – financialcrime, sale <strong>of</strong> illegal articles, pornography, online gambling,intellectual property crime, e-mail spo<strong>of</strong>ing, cyber defamation,cyber stalking. The computer may however be target forunlawful acts in the following cases: unauthorized access tocomputer/computer, system/computer networks, theft <strong>of</strong>information contained in the electronic form, e-mail bombing,data diddling, salami attacks, logic bombs, Trojan attacks,internet time thefts, web jacking, theft <strong>of</strong> computer system,physically damaging the computer system.Chaubey (2009), again, quoting Townsend (2004) states that theconcept <strong>of</strong> cybercrime is not radically deferent from the concept<strong>of</strong> conventional crime. They both include conduct whether actor omission which causes breach <strong>of</strong> rules <strong>of</strong> law andcounterbalanced by the sanction <strong>of</strong> the state. Life is about a mix<strong>of</strong> good and evil so is the internet. For all the good it does us,cyber space has its dark sides too. Unlike conventionalcommunities though, there are no policemen patrolling theinformation superhighway, leaving it open to everything fromTrojan horses and viruses to hacking, cyber stalking, trademarkcounterfeiting and cyber terrorism. (Chaubey, 2009: 6)Cybercrimes may be financial or otherwise. Financialcybercrimes include: Online auction trade; Identity theft;Nigerian scam; Internet gambling and Digital forgery. Othersare: Phishing; S<strong>of</strong>tware piracy; Sale <strong>of</strong> illegal articles; Hacking;Online business opportunity schemes; Virus dissemination;Credit card fraud; Spo<strong>of</strong>ing; Online investment schemes; Cybermoney laundering; Violation <strong>of</strong> copyrights and Pornography.3. CYBER CRIME UNDER NIGERIAN LAWThere is no specific legislation on cybercrime in Nigeria. As aresult, what therefore constitutes cybercrime is not defined inany written law in Nigeria. This has been a major impedimentagainst the successful eradication and/or curtailment <strong>of</strong> themenace in Nigeria against the backdrop that section 36(8) <strong>of</strong> the24


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net1999 Constitution <strong>of</strong> the Federal Republic <strong>of</strong> Nigeria expresslyprovides that:No person shall be held to be guilty <strong>of</strong> a criminal<strong>of</strong>fence on account <strong>of</strong> any act or omission that did not,at the time it took place, constitute such an <strong>of</strong>fence.It further provides that “no penalty shall be imposed for anycriminal <strong>of</strong>fence heavier than the penalty in force at the time the<strong>of</strong>fence was committed.”The above provisions are part <strong>of</strong> the Fundamental Rightsguaranteed under Chapter IV <strong>of</strong> the Nigerian Constitution.What is currently used in Nigeria, to fight the menace <strong>of</strong>cybercrime are related provisions in other penal legislations inNigeria like the Criminal Code Act, the Advanced Fee Fraudand Other Fraud Related Offences Act 2005, the Economic andFinancial Crimes Commission (Establishment, etc) Act 2004 etc.3.1 The Economic and Financial Crimes Commission(Establishment, Etc) Act 2004The Act contains 47 sections. Section 6 (b) <strong>of</strong> the Act imposeson the commission the responsibility <strong>of</strong> investigating allfinancial crimes including advance fee fraud, money launderingcurrency counterfeiting, illegal charge transfers, futures marketfraud, fraudulent encashment <strong>of</strong> negotiable instruments, contractscan and most importantly computer credit card fraud, etc.Section 6 (c) <strong>of</strong> the Act also charges the commission with theresponsibility <strong>of</strong> co-ordination and enforcement <strong>of</strong> all economicand financial crimes laws and enforcement functions conferredon any other person or authority. Furthermore, Section 6 (e) <strong>of</strong>the Act charges the commission with the responsibility <strong>of</strong>adopting all measures that would ensure the eradication <strong>of</strong> allforms <strong>of</strong> economic and financial crimes in Nigeria.3.2 The Corrupt Practices and Other Related OffencesAct 2005The Act contains 56 sections. The relevant provisions are thosecontained in Section 16 and 17 <strong>of</strong> the Act. Section 16 deals withfraudulent receipt <strong>of</strong> property while section 17 prescribespenalties for <strong>of</strong>fences committed through postal system. Section16 provides as follows:Any person who receives anything which has beenobtained by means <strong>of</strong> any act constituting a felony ormisdemeanor, or by means <strong>of</strong> any act done at a placeoutside Nigeria, which if it had been done in Nigeriawould have constituted a felony or misdemeanor andwhich is an <strong>of</strong>fence under the laws in force in theplace where it was done, knowing the same to havebeen so obtained, is guilty <strong>of</strong> a felony.Section 17 <strong>of</strong> the Act provides that if the <strong>of</strong>fence by means <strong>of</strong>which the thing was obtained is a felony, the <strong>of</strong>fender shall onconviction be liable to imprisonment for three (3) years, exceptthe thing so obtained was postal matter, or any chattel, money orvaluable security contained therein, in which case the <strong>of</strong>fenderon conviction be liable to imprisonment for seven (7) years.3.3 The Advanced Fee Fraud and Other related OffencesAct 2005The Act contains 18 sections. Section 1 <strong>of</strong> the Actdeals with obtaining property by false pretence. The sectionprovides that:1. Notwithstanding anything contained in any otherenactment or laws, any person who by any falsepretence, and with intent to defraud:(a) Obtains, from any other person, in Nigeria or inany other country, for himself or any otherperson;(b) Induces any other person, in Nigeria or in anyother country, to deliver to any person; or(c) Obtains any property, whether or not the propertyis obtained or its delivery is induced through themedium <strong>of</strong> a contract induced by the falsepretence, is guilty <strong>of</strong> an <strong>of</strong>fence under this Act.2. A person who by false pretence, and with the intent todefraud, induces any other person, in Nigeria or in anyother country, to confer a benefit on him or on anyother person by doing or permitting a thing to be doneon the understanding that the benefit has been or willbe paid for is guilty <strong>of</strong> an <strong>of</strong>fence under this act.3. A person who is guilty <strong>of</strong> an <strong>of</strong>fence under subsection(1) or (2) <strong>of</strong> this section is liable on conviction toimprisonment for a term <strong>of</strong> not less than ten yearswithout the option <strong>of</strong> a fine.Section 4 which deals with fraudulent invitation provide that aperson who by false pretence, and with the intent to defraud anyother person invites or otherwise induces that person or anyother person to visit Nigeria for any purpose connected with thecommission <strong>of</strong> an <strong>of</strong>fence under this act is guilty <strong>of</strong> an <strong>of</strong>fenceand liable on conviction to imprisonment for a term <strong>of</strong> not lessthan seven years without the option <strong>of</strong> a fine.Section 5 <strong>of</strong> the Act states that:1. Where a false pretence which constitutes an <strong>of</strong>fenceunder this act is contained in a letter or otherdocument, it shall be sufficient in a charge <strong>of</strong> anattempt to commit an <strong>of</strong>fence under this act to provethat the letter or other documents was received by theperson to whom the false pretence was directed.2. Notwithstanding anything to the contrary in any otherlaw, every act, or thing done or omitted to be done bya person to facilitate the commission by him <strong>of</strong> an<strong>of</strong>fence under this act shall constitute an attempt tocommit the <strong>of</strong>fence.It is noteworthy that “other document” as used in section 5 (2) isinterpreted in section 5 (3) to include a document transmittedthrough a fax or telex machine or any other electronic orelectrical device, a telegram and a computer printout(emphasis ours).25


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netSection 11A <strong>of</strong> the Act places a duty on any person or entityproviding an electronic communication service or remotecomputing service either by e-mail or any other form to obtainfrom the customer or subscriber:(a) Full names;(b) Residential address, in the case <strong>of</strong> an individual;and(c) Corporate address, in the case <strong>of</strong> corporate bodiesThe failure by any customer or subscriber to furnish theinformation specified above or with the intent to deceive,supplies false information or conceals or disguises theinformation required above commits an <strong>of</strong>fence and is liable onconviction to imprisonment for a term <strong>of</strong> not less than threeyears or a fine <strong>of</strong> N100,000 and forfeiture <strong>of</strong> the equipment orfacility used in providing the service.Section 11B <strong>of</strong> the Act provides that any person or entity who inthe normal course <strong>of</strong> business provides telecommunications orinternet services or is the owner or person in the management <strong>of</strong>any premises being used as a telephone or internet café or bywhatever name called shall:(a) Be registered with the Economic and FinancialCrime Commission(b) Maintain a register <strong>of</strong> all fixed line customerswhich shall be liable to inspection by anyauthorized <strong>of</strong>ficer <strong>of</strong> the commission; and(c) Submit returns to the commission on demand onthe use <strong>of</strong> its facilities.Under section 11B (2) any person whose normal course <strong>of</strong>business involves the provision <strong>of</strong> non-fixed line or globalsystem <strong>of</strong> mobile communications (GSM) or is in themanagement <strong>of</strong> any such service, is required to submit ondemand to the commission such data and information as arenecessary or expedient for giving full effect to the performance<strong>of</strong> the functions <strong>of</strong> the commission under the Act. Personsspecified under subsection (1) and (2) <strong>of</strong> section IIB are requiredto exercise utmost duty <strong>of</strong> care to ensure that his services andfacilities are not utilized for unlawful activities. Finally, where aperson or entity has been convicted for more that once under theAct he shall have his operational license revoked or cancelled.Thus, from the foregoing, nowhere is specific mention made <strong>of</strong>cybercrime. This led Ehimen and Bola (2010: 97) to concludethat:Nigeria is a place where computers can be used tocommit all sorts <strong>of</strong> crimes without prosecution, asthere is no law on cybercrime. The Nigerianpolice simply lack internet policingcapability. Nigerian law enforcement agencies arebasically technology- illiterate; they lackcomputer forensics training and <strong>of</strong>ten resort toconducting police raids on Internet servicesite mainly for the purpose <strong>of</strong> extortion.4. WHO COMMITS CYBERCRIMES IN NIGERIA ANDHOWPerpetrators <strong>of</strong> cybercrimes in Nigeria are many and various.They include the following category <strong>of</strong> persons: disgruntledemployees; teenagers; political hacktwists; pr<strong>of</strong>essional hackers;business rival; ex-boy/girl friend; divorced husband/wife, etc(www.cybercellmumbai.com). These cybercriminals arecommonly referred to, in Nigeria, as “yahoo boys”. Yahoo boysply their trade in cybercafés, private <strong>of</strong>fices/homes and in recenttimes, with the availability <strong>of</strong> various modems and blackberry,iphone, ipad, they can carry on their criminal activities fromanywhere and at any time.In 2009, for instance, one <strong>of</strong> the writers <strong>of</strong> this paper, a studentat American University <strong>of</strong> Nigeria, (AUN), while workingonline with his laptop suddenly received a mail purportedly sentby Interswitch, the company handling ATM business in Nigeria.He was requested to supply his PIN number and other vitalinformation for the purpose <strong>of</strong> upgrading his ATM card. Hecomplied innocently, ignorant that it was a fraud. A while later,he received an alert on his mobile phone that One hundredthousand Naira (N100,000.00), was withdrawn in quicksuccession from his account. This is one way in which the“yahoo boys” or cybercriminals ply their trade. This particulartype <strong>of</strong> cyber crime – phishing was becoming too prevalent inNigeria that the EFCC had to rise up to the challenge. Some <strong>of</strong>the criminals were arrested and the crime has reduced. This ishow it was reported:A Youth Corps member, who is serving in the Financeand Supply section <strong>of</strong> Ibadan South East LocalGovernment has been arraigned by the Economic andFinancial Crimes Commission (EFCC) for allegedlydefrauding some new generation banks to the tune <strong>of</strong>N4 million. The 28 year old corps member (namewithheld), who graduated from the Federal University<strong>of</strong> Agriculture, Abeokuta, Ogun State has since beendragged before an Ibadan High Court to answer a 50-count charge (Nigerian Tribune 2009, May 14).Cybercriminals in Nigeria, otherwise known as “yahoo boys”could be university graduates or secondary school leavers whoare computer-literate and can browse the net. They use acombination <strong>of</strong> methods to trick their victims, who are unlucky,greedy, gullibly unskilled and inexperienced, into releasing vitalinformation about themselves and businesses before proceedingto strike. It is either they are hacking, spo<strong>of</strong>ing, phishing,spamming or defaming, threatening. Recently, it was reported ina national daily (Nigerian Tribune) that the mobile telephoneline <strong>of</strong> Justice Ayo Salami, the president <strong>of</strong> the Court <strong>of</strong> Appealwas hacked into. According to Adewole (2011), “Justice AyoSalami reportedly opened his defence by claiming that hismobile telephone line was ‘spo<strong>of</strong>ed’ to speak with chieftains <strong>of</strong>the Action Congress <strong>of</strong> Nigeria (ACN) before, during and afterthe governorship appeal judgements in Ekiti and Osun States”26


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netAlthough this claim was refuted by the mobiletelecommunication company (MTN) allegedly used in the crime,it shows how ‘hacking’ and ‘spo<strong>of</strong>ing’ have become common inNigeria. Copyright/s<strong>of</strong>tware piracy is no less common.Ewelukwa-Ofodile (2010) had lamented that the Nigerianentertainment industry is presently threatened by high rate <strong>of</strong>copyright piracy. Mumbal Police reveals that retail revenueloses worldwide are ever-increasing due to this crime, which isdone in various ways as end-user copying, hard disk loading,counterfeiting, illegal downloads from the internet, etc.(www.cybercellmumbai.com)4.1 The Nigerian ScamThe Nigerian Scam also known as 419 scam is named after itsNigerian Criminal Code, section 419 revised and expanded withthe issuance in April 1995, <strong>of</strong> the Presidential Decree No. 13titled Advanced Fee Fraud and other Fraud RelatedOffences Decree 1995 in which recipients <strong>of</strong> an unsolicited e-mail are asked to provide a safe bank account for the transfer <strong>of</strong>frozen or illegal funds.Quite <strong>of</strong>ten, the scammers will ask for a financial contribution inorder to bribe <strong>of</strong>ficial or to cover a processing fee. Once thisinitial money is collected, the scammers either disappear orclean out the victim’s bank account. A similar example <strong>of</strong>internet fraud involves the victim’s supposed winning <strong>of</strong> apreviously unknown foreign lottery. The scammers promise t<strong>of</strong>orward the winnings in exchange for a substantial processingfee.The “419” scam has circulated for years through snail mail, faxand e-mail. It has become so prevalent that even the US secretservice, which refers to it as the Nigerian Advance Fee Fraud,has dedicated an entire section to it on its financial crimesdivision page. It also calls it the fastest growing epidemicAshish (2006), quoted in Chaubey (2009).The hoax e-mail, which has many variants, appears to be sentout by a deposed <strong><strong>Afr</strong>ican</strong> <strong>of</strong>ficial or a relative or one. Messagesask its recipients for assistance in transferring or handling asizeable sum <strong>of</strong> money, <strong>of</strong>fering a corresponding share for suchservice. This scam e-mail has victimized many individuals,some <strong>of</strong> whom have given up millions <strong>of</strong> dollars and theirpersonal safety for lure <strong>of</strong> promised lucre. But it’s not just 419but a host <strong>of</strong> other such tempting <strong>of</strong>fers that <strong>of</strong>ten leave a hole inyour pocket – if, i.e., you are naïve enough to fall into this welloiledtrap, (Ashish, 2006, quoted in Chaubey, 2009).As for the infamous 419 scam, it is advance fee fraud schemethat has been in existence through regular mail for more than 20years and has multiplied after the advent <strong>of</strong> internet. Thousands<strong>of</strong> people receive 419 e-mails every month. Although theNigerian government claims to be cracking down on them, it iscommonly believed that they are actually protecting the culprits.Well, to start with it is alleged that it is the Nigerian government<strong>of</strong>ficials themselves who are the kingpins. Secondly, the 419scam is estimated to be the third largest source <strong>of</strong> revenue forthe Nigerian economy.This is just too large a business for it to crack down on.(Nigerian Advance Fee Fraud, Department <strong>of</strong> State Publication10465, Bureau <strong>of</strong> International Narcotics and Law EnforcementAffairs, April 1997). Not only are there many cases <strong>of</strong> peoplewho have had their bank accounts drained by 419. There arealso cases where they have been lured into actually travelling.Enforcement agencies report that some <strong>of</strong> the people have notleft that country alive. If in response to one <strong>of</strong> these letters, youwire-transfer or mail money to the Nigerians, then you’reprobably just lucky to have been this stupid but will be worse <strong>of</strong>fif you try to investigate so as to protect your investment.Persons who have travelled overseas to investigate orconsummate this scam have made a tragic mistake. Violenceand threats <strong>of</strong> physical harm have been employed to pressurevictims.Once you are overseas, there are a variety <strong>of</strong> ways the Nigerianswill get you. Typically, the Nigerians will bribe the Customs<strong>of</strong>ficials when you arrive so that you do not have to pass throughthem. This is the first huge mistake the victims commit. Youare now a foreigner in Nigeria without a passport – a veryserious <strong>of</strong>fence. The scamsters then threaten to turn you in toauthorities or you are told to cough up money. Even after youhave paid them the money, the local police are about as likely toextend this extortion racket themselves with the result that youwill not get out <strong>of</strong> the country until they have gotten every lastdime out <strong>of</strong> you, and maybe not even then. The key to thecontinuing Nigerian model success is the ingenuity andadaptability <strong>of</strong> the scammers. When victims realized that wiringmoney overseas was not a good idea, the scammers startedrecruiting US residents as go-betweens. They asked the victimsto send the money to US addresses thereby circumventingsuspicion. In the wake <strong>of</strong> all the above, the law and the lawenforcementagents (police) seem incapable <strong>of</strong> stamping outcompletely the menace <strong>of</strong> cybercrime.5. DETECTION AND PREVENTION OFCYBERCRIMES: LINGUISTICS TO THE RESCUEQuite expectedly, any discussion <strong>of</strong> cybercrime would bethought to involve law, legislations and computers only.Linguistics as a field <strong>of</strong> study would hardly be thought to haveany role to play whatsoever. Balogun (1998:75) reports thatBanjo (1983) was well aware <strong>of</strong> this low esteem in which thesubject was held when he lamented that “even from the point <strong>of</strong>view <strong>of</strong> relevance, the discipline <strong>of</strong> linguistics remains even tothe highly educated individual throughout the world, as anesoteric subject.”Today, however, notes Balogun (1998), it would be wrong tohold such a simplistic notion. This is because “linguistics nowshares with other sciences a concern to be objective, systematic,concise and explicit in its account <strong>of</strong> language” (Crystal, 1987).This being the case, it can be argued that linguistics – thescientific study <strong>of</strong> language – must have a role to play in thedetection and prevention <strong>of</strong> cybercrimes.27


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThis argument is further strengthened when it is recalled thatcybercrimes are committed by human beings against humanbeings by means <strong>of</strong> language, among others. Besides, since thebeginning <strong>of</strong> Human <strong>Comp</strong>uter Interaction (HCI) leading to<strong>Comp</strong>uter-Mediated Communication (CMC) and Internet-Mediated Communication (IMC), experts have acknowledgedthat linguistics has a contributing role in it, in terms <strong>of</strong> webinterface and usability (http://en.wikipedia.org)In every field <strong>of</strong> human activity that involves the use <strong>of</strong>language, linguistics is thus, necessarily relevant. Thisrelevance and pervasive nature <strong>of</strong> linguistics in all fields <strong>of</strong>human endeavours, according to Balogun (1998) can becompared only to the relevance <strong>of</strong> electricity to the life <strong>of</strong> man.Crystal (1987:412) had pointed out that since university teaching<strong>of</strong> linguistics emerged during the 1960s, the following branches<strong>of</strong> linguistics enquiry have been established:Anthropological linguistics; Applied linguistics;Biological linguistics; Clinical linguistics;<strong>Comp</strong>utational linguistics; Educational linguistics;Ethno linguistics; Geographical linguistics;Mathematical linguistics; Neurolinguistics;Psycholinguistics; Sociolinguistics; Statisticallinguistics; and Theo linguistics.Needless to say that many more branches such as ForensicLinguistics and Internet Linguistics keep evolving. With a fieldas relevant and pervasive in human endeavours as linguistics, itonly remains to highlight how it can assist in the detection andprevention <strong>of</strong> cybercrime in Nigeria. Language, the main rawmaterial <strong>of</strong> the linguist, happens to be what cybercriminalsdeploy to commit their crimes using mechanical devices <strong>of</strong>computers. This has led to the evolution <strong>of</strong> Internet linguisticswhich is concerned with new language styles and forms thathave arisen under the influence <strong>of</strong> the internet and other newmedia, such as short message service (SMS) and text messaging(Crystal, 2005)Insights gained from studying the emerging language on theinternet can help in improving the conceptual organization,transmission, translation and usability <strong>of</strong> messages. This willhelp in detecting the genuiness or otherwise <strong>of</strong> transmittedmessages. For example, trained Internet linguists are able, usingavailable s<strong>of</strong>tware, to determine whether a received e-mail isworthy <strong>of</strong> receiving attention or not. With accepted pr<strong>of</strong>essionaladvice from them, crimes can be detected and prevented.Richards and Schmidt (2002:102) report that “computerlanguages have many interesting formal properties, but do nothave the functional properties associated with naturallanguages.” This might lead to the erroneous conclusion thatcomputer languages are not amenable to a linguistic study.Indeed, they are. Areas and topics in internet linguistics such asstylistic diffusion, which involves the study <strong>of</strong> the spread <strong>of</strong>internet jargon and related linguistic forms into usage, languagechange, conversation discourse, which explores the changes inpatterns <strong>of</strong> social interaction and communicative practice in thenet prove that computer languages whether BASIC, FORTRAN,COBOL ALGORITHM are amenable to a linguistic study. Thisstudy, in turn, equips one to be able to detect cybercrimes likespam, scam, etc.As new s<strong>of</strong>tware and packages are daily being produced tocheckmate the activities <strong>of</strong> cybercriminals, internet linguists canbe relied upon for expert advice and guidance. One suchproduct recently launched in Nigeria is the Symantec EndpointProtection 12 (SEP12). “This product is designed to detect andblock sophisticated new threats earlier and more accurately thanany other security product in the I.T market” (NigerianTribune, 2011, July 28 pg. 20)Apart from Internet linguists, there are the Forensic linguistswho also play very invaluable roles in the detection andprevention <strong>of</strong> cybercrimes. Richards and Schmidt (2002:207)explain that Forensic linguistics “is a branch <strong>of</strong> appliedlinguistics that investigates issues <strong>of</strong> language in relation to thelaw”. While it is important that countries harmonize their legalframeworks to combat cybercrime and facilitate internationalcooperation, it is doubtful if this can succeed without theinvolvement <strong>of</strong> forensic linguists. This is why it is suspectedthat the ITU Toolkit for cybercrime legislation which aims toprovide countries and reference material that can assist in theestablishment <strong>of</strong> harmonized cybercrime laws and proceduralrules could have involved them. It was reported that “thesample language provided in the toolkit was developed after acomprehensive analysis <strong>of</strong> the most relevant regional andinternational legal frameworks currently present. The toolkitlanguage is consistent with these laws and is intended to serve asa guide for countries desiring to develop, draft or modify theirown laws” (http://www.itu/ITU-D/cyb/cybersecurity).6. CONCLUSIONIt is a fact that as society grows and becomes more complex,human activities, whether social, political, economic ortechnological are bound to become more sophisticated. This iswhy sophisticated technology has today brought with itincreasing sophisticated criminals who are using computersystems, networks and computers for illegitimate ends, chiefamong which is cyber crime, which, today, poses the biggestchallenge for police, prosecutors and legislators.This theoretical paper, examining what cyber crime is, how it iscommitted and by whom in Nigeria, posits that linguistics – thescientific study <strong>of</strong> language – can play a vital role in thedetection and prevention <strong>of</strong> cyber crimes. Experts in thebranches <strong>of</strong> linguistics called internet linguistics and forensiclinguistics (both branches <strong>of</strong> applied linguistics) with theirknowledge <strong>of</strong> internet protocols, cryptography can assist in thedevelopment <strong>of</strong> s<strong>of</strong>tware that can detect logic bombs, Trojanhorses and known viruses and consequently, help to preventcyber crimes, especially hacking. The paper does not lay anyclaim to exhaustiveness.28


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net7. RECOMMENDATIONS1. It is very interesting to note that Nigeria has recentlycreated a ministry <strong>of</strong> Information andCommunications Technology (ICT). The ministryshould set up a department for training people,especially the police in cyber forensics.2. Like India, where the police are trying to be cybercrime savvy and hire people who are trained in thearea, (Chaubey, 2009), Nigeria should sponsor peopleto specialize in Internet linguistics and Forensiclinguistics as experts in these fields are currentlyalmost non-existent.3. Some Nigerian Universities and polytechnics shouldbe designated centres <strong>of</strong> Applied Linguistic Researchwhere emphasis should be on training Internetlinguists, Forensic linguists and law with a view tocatching up with the increasing sophistication <strong>of</strong> cybercriminals.4. Nigeria should take steps to harmonize her legalframework with other countries to facilitateinternational cooperation to effectively combat cybercrimes.5. It is recommended that the following famous tencommandments <strong>of</strong> <strong>Comp</strong>uter Ethics (Chaubey, 2009:32) be taught and learnt before being allowed to ownand operate a computer or even a cyber café inNigeria. They are:a. We shall not interfere with other people’scomputer work and respect the right <strong>of</strong>privacy <strong>of</strong> information <strong>of</strong> other people.b. We shall not snoop around in other people’scomputer files.c. We shall not use a computer to stealsomething, means the computer cannot beused to perform theft.d. We shall not use a computer to bear falsewitness.e. We shall not copy or use proprietarys<strong>of</strong>tware for which you have not paid.f. We shall not use other people’s computerresources without authorization or propercompensation.g. We shall not appropriate other people’sintellectual output.h. We shall think about the socialconsequences <strong>of</strong> the program you arewriting or the system you are designing.i. We shall always use a computer in ways thatensure consideration and respect for yourfellow humans.j. We shall not use a computer to harm otherpeople i.e. we shall notusethe computer in the way that it will causeharm to other peoples.The above commandments which are mere admonitions and notlaws have no force. Nigerian National Assembly shouldlegislate on them and possibly convert them to laws withappropriate and commensurate sanctions. This will go a longway in preventing cyber crimes in Nigeria.6. Finally, Chaubey (2009: 179) in his recommendationon prevention <strong>of</strong> cyber crime states: “last but not theleast, suggestion is that <strong>of</strong> identification <strong>of</strong> citizens …it has to be realized that identification <strong>of</strong> citizens incertain areas such as cyber crime is equallynecessary.” This is where the internet and forensiclinguists who are experts in Voice – identification andhandwriting – verification come in. If the IT industryenlists the expertise <strong>of</strong> these pr<strong>of</strong>essionals, detectionand prevention <strong>of</strong> cyber crimes will be greatlyenhanced.REFERENCES1. Adewole, L. (2011, June 2). NJC Probe: My line washacked to call ACN Chieftains. Nigerian Tribune.2. Balogun, F. U. (1998) ‘The Role <strong>of</strong> LinguisticResearch in Sustainable Development in Nigeria’. InEmenogu, B. C. (ed) Research in Quality Education:Paradigm Directions for the Future. Nsukka:University Trust Publishers (APQEN)3. Balogun, F. U. (2002) ‘The Business <strong>of</strong> an AppliedLinguist in a Technological Institution in Nigeria’.Kiabara. Vol. 8, No. 1.4. Banjo A. (1993) Grammars and Grammarians.Inaugural Lecture. Ibadan: Ibadan University Press.5. Chaubey, R. K. (2009) An Introduction to CyberCrime and Cyber Law. Kolkata: Kamal LawHouse/Blue Line Printing Industries.6. Crystal, D. (1987) The Cambridge Encyclopaedia <strong>of</strong>Language. Cambridge: C.U.P.7. Crystal, D. (2005) ‘The Scope <strong>of</strong> InternetLinguistics’. Paper Presented at the AmericanAssociation <strong>of</strong> Science Meeting.8. Cyber Crime. Wikipedia: The Free Encyclopaedia.Available online at http://en.wikipedia.org/wiki/crime29


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net9. Ehimen, O. R. and Bola, A. (2010). ‘Cyber Crime inNigeria’. Business Intelligence <strong>Journal</strong>. Vol. 3,No.1.10. Ewelukwa-Ofodile, U. (2010, March 22) ‘NigerianEntertainment Industry and Piracy’. The GuardianOnline.Availableat http://www.ngrguardiannews.com/editorialopinion/article11. Federal Government <strong>of</strong> Nigeria (1999). Constitution<strong>of</strong> the Federal Republic <strong>of</strong> Nigeria.Olusegun 0.Aramide is a SeniorTutor and Co-ordinator at theNational Teachers' Institute (NTI)Igarra, Edo State, Nigeria. Hewas a part-time lecturer at AuchiPolytechnic. He is a doctoraldegree student <strong>of</strong> AppliedLinguistics/Communication. Hise-mail: aramidedu@gmail.corn12. Grant-Adamson, A. (2003) Cyber Crime. Mason:Crest Publishers13. ITU Cyber Crime Legislation Resources. Available athttp://www.itud/cyb/cybersecurity/project/cyberlaw.html.14. Mumbai Police (n.d) Cyber Crime Awareness.Available online at www.cybercellmumbai.com.Retrieved August 28.15. Nagpal, R. (2002, March 17) Beware!Cybercriminals are on the prowl, Navhind TimesPolytechnic.Ahmed O. Abu, Esq is a SeniorLecturer in the Department <strong>of</strong>Humanities and Social Sciences,Auchi Polytechnic, Auchi, EdoState, Nigeria. He is currently theHead, Legal Unit <strong>of</strong> the16. Nigerian Tribune (2009, May 14) EFCC arraignscorps member over N4 million ATM Fraud.17. Richards, J. C. and Schmidt, R. (2002) Dictionary <strong>of</strong>Language Teaching & Applied Linguistics (3 rd ed.)Longman.Author’s BriefFemi U. Balogun is aChief Lecturer in theDepartment <strong>of</strong> Languages,School <strong>of</strong> General Studies,Auchi Polytechnic, Auchi,Edo State, Nigeria. He iscurrently Director,Polyconsult, AuchiPolytechnic and a doctoraldegree student <strong>of</strong>AppliedLinguistics/Communication. He can bereached thru e-mail at unufem@yahoo.comEdmund I. Balogun is a Seniorin the School <strong>of</strong> InformationTechnology at the AmericanUniversity <strong>of</strong> Nigeria, Yola,Adamawa State, Nigeria. He ismajoring in Information Systemswith concentration in Databaseand Web Integration. With a vastknowledge in internet policies,system analysis, and enterpriseresource planning, he is currently carrying out a research on"Human <strong>Comp</strong>uter Interaction: Eradicating <strong>Comp</strong>lexitiesin Interface Designs." His e-mail:edmundbalogun@yahoo.co.uk30


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netA Model for Intelligent Motion Detection in Live Video Streaming SystemsOlufade, F.W. Onifade., Oladeji, P. Akomolafe & Ademola, S. OlaniyiDepartment <strong>of</strong> <strong>Comp</strong>uter Science,University <strong>of</strong> Ibadan, Ibadanfadowilly@yahoo.com; akomspatrick@yahoo.com; oademola2000@yahoo.comABSTRACTLatest technologies aimed at combating burglar, thefts and wanton destruction are the video surveillance and monitoring systems.With these technologies, it is possible to monitor and capture every inch <strong>of</strong> the target area. The ability to recognize objects andhumans, to describe their actions and interactions from information acquired by sensors is essential for a visual surveillance system.This paper focuses on an object-location-based (OLB) approach to crime and public safety that seek to simultaneously address theinterconnected relationships between people and their environments. This work establishes a framework for detecting the motion in alive streaming video and once motion has been detected in the live stream, the system will alert the user <strong>of</strong> suspicious activity andcapture the live streaming video thereby providing a near-real time monitoring <strong>of</strong> lives and properties on the move a possibility. It isaimed at increasing the efficiency <strong>of</strong> security guards performing surveillance operation on lives and properties.Keywords: Motion, Detection, System, Monitoring, object-location-based, Video, Crime, Surveillance.1. INTRODUCTIONIntelligent visual surveillance systems deal with the real-timemonitoring <strong>of</strong> transient objects within a specific environment.The primary aims <strong>of</strong> these systems are to provide automaticinterpretation <strong>of</strong> scenes and to understand and predict theactions and interactions <strong>of</strong> the observed objects based on theinformation acquired by sensors. The main components <strong>of</strong>processing in an intelligent visual surveillance system are:moving object detection and recognition, feature extraction,tracking and system indicationRecent interest in surveillance in public, military andcommercial scenarios is increasing the need to create anddeploy intelligent or automated visual surveillance systems. Inscenarios such as public transport, these systems can helpmonitor and store situations <strong>of</strong> interest involving the public,viewed both as individuals and as crowds. Current research inthese automated visual surveillance systems tend to combinemultiple disciplines such as signal processing,telecommunications, management and socio-ethical studies.Nevertheless there tends to be a lack <strong>of</strong> contribution from thefield <strong>of</strong> system engineering to the research [5].<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:Olufade, F.W. Onifade., Oladeji, P. Akomolafe & Ademola, S.Olaniyi (2012). A Model for Intelligent Motion Detection inLive Video Streaming Systems. <strong>Afr</strong> J. <strong>of</strong> <strong>Comp</strong> & <strong>ICTs</strong>. Vol5, No. 3. Pp3 1-36.© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781The increasing demand for security by society leads to agrowing need for surveillance activities in many environments.The demand for remote monitoring for safety and securitypurposes has received particular attention, especially in thefollowing areas: Transport applications such as airports [9] andmaritime environments [11]. Remote surveillance <strong>of</strong> human activities such asattendance at football matches [14]. Public places such as banks, supermarkets, homes,department stores and parking lots [15–16].As people become more and more security savvy, they willdemand real protection for their property. The new digitalvideo systems will have to raise the required security to a newlevel. They should make the customers feel good. Scare <strong>of</strong>f afew troublemakers, and those who do try to beat the systemshould face a far greater risk <strong>of</strong> getting caught. Hence, the newdigital video surveillance systems should be able to provide ahigh sense <strong>of</strong> security. The peace <strong>of</strong> mind can only be achievedwhen the person is assured that he will be informed <strong>of</strong> anythefts <strong>of</strong> his property while they are in progress. He would als<strong>of</strong>eel more secure if he can be guaranteed that the surveillancesystem that he uses will not only give him evidence against theperpetrators but also try to stop the thefts from taking place inthe first place. Therefore, to achieve such kind <strong>of</strong> securityMotion Detection in the live video stream is implemented. Themotion detection systems will not only be monitoring the areas<strong>of</strong> interest but will also keep an active lookout for any motionbeing produced [1].31


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThe rest <strong>of</strong> this work is as follows: in section II, we give relatedworks, while section III has the model development andmethodology. Section IV presents the result discussion and thework is concluded in section V.2. RELATED WORKSThe technological evolution <strong>of</strong> video-based surveillancesystems started with analogue CCTV systems. These systemsconsist <strong>of</strong> a number <strong>of</strong> cameras located in a multiple remotelocation and connected to a set <strong>of</strong> monitors, usually placed in asingle control room, via switches (a video matrix). Videosurveillance began with simple closed circuit televisionmonitoring (CCTV). As early as 1965, there were press reportsin various countries across the world suggesting police use <strong>of</strong>surveillance cameras in public places. When video cassetterecorders hit the market, video surveillance became reallypopular.Analog technology using taped video-cassette recordings meantsurveillance could be preserved on tape as evidence. Acomplete analog video-surveillance system consisted <strong>of</strong> acamera, monitor, and VCR. The old tube camera was onlyuseful in daylight, and the VCR could only store eight hours <strong>of</strong>footage at best. The drawback was that after a while, ownersand employees <strong>of</strong> such a system would become complacent andnot change the tapes daily or the tapes would wear out aftermonths <strong>of</strong> being re-used. There was also the problem <strong>of</strong>recording at night or in low light.While the concept was good, the technology hadn’t yet peaked.The next step was the Charged Coupled Device camera (CCD),which used microchip computer technology. In the 1990’svideo surveillance made great strides in practicality by theintroduction <strong>of</strong> digital multiplexing. When digital multiplexerunits became affordable, it revolutionized the surveillanceindustry by enabling recording on several cameras at once(more than a dozen at time in most cases) [1].Three key factors brought on the popular use <strong>of</strong> the digitalvideo recorder. They are: The advancement in compression capability,allowing more information to be stored on a harddrive. (Round-the-clock surveillance produces a lot<strong>of</strong> information.) The cost <strong>of</strong> a hard drive, which has droppeddramatically in recent years. The storage capacity <strong>of</strong> a hard drive, which hasincreased dramatically in recent years.Digital video surveillance made complete sense as the price <strong>of</strong>digital recording dropped with the computer revolution. Ratherthan changing tapes daily, the user could reliably record amonth's worth <strong>of</strong> surveillance on hard drive. The imagesrecorded digitally were much clearer than the <strong>of</strong>ten grainyimages recorded with analog that recognition was immediatelyimproved for identification purposes.Digitally stored images can also be enhanced in various ways(add light, change colors, reverse black and white) to makecrucial determinations. With videotape, what you see is whatyou get. It’s against this backdrop that this research is carriedout to bring into play a mobile monitoring <strong>of</strong> lives andproperties <strong>of</strong> subscribers <strong>of</strong> the proposed system.Some <strong>of</strong> the approaches for moving objects detection usesimple intensity comparison to reference images so that thevalues above a given threshold identify the pixels <strong>of</strong> movingobjects [8]. A large class <strong>of</strong> approaches is based on appropriatestatistics <strong>of</strong> colour or gray level values over time at each pixellocation. (e.g. the segmentation by background subtraction[10], eigenbackground subtraction [12], etc). Other modelsused a statistical model <strong>of</strong> the background instead <strong>of</strong> areference image [13].3. MODEL DESCRIPTIONA model description <strong>of</strong> our system is shown below. Thewebcam captures the live video feed in real time. This live feedis plugged into the server which redisplays the original livefeed in real-time, whilst doing image processing in thebackend.Hierarchically, the operational system model can be describedin the following ways:Capturing the live video feed through a webcam (motionsensor equipment): To detect motion we first have to capturelive video frames <strong>of</strong> the area to be monitored and kept undersurveillance. This is done by using a web cam whichcontinuously provides a sequence <strong>of</strong> video frames in aspecified speed <strong>of</strong> FPS (frames per second).<strong>Comp</strong>aring the current frames captured with previousframes to detect motion: For checking whether any motion ispresent in the live video feed, we compare the live vide<strong>of</strong>rames being provided by the web cam with each other so thatwe can detect changes in these frames and hence predict theoccurrence <strong>of</strong> some motion.32


Vol 5. No. 3, May, 2012ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netFigure 1: Basic System ModelStoring the frames on the memory if motion isdetected: If motion is detected, the video recorder incommence recording such motion so that the user canview it in the near future. This also helps the user inproviding a legal pro<strong>of</strong> <strong>of</strong> some inappropriate activitysince a video coverage can be used as a pro<strong>of</strong> in thecourt <strong>of</strong> law.Indicating through an alarm when the motion isdetected: This is the novel part <strong>of</strong> the development. Webelieved there should be provision for real-timemonitoring <strong>of</strong> such live feed in other to intimate the user<strong>of</strong> any impending danger. To this end, once an intrusionis detected by the system, the indication system which isincluded in the s<strong>of</strong>tware will trigger an alert which couldbe in form <strong>of</strong> an SMS or MMS sent to the user withpictures <strong>of</strong> sample threat. This helps in preventing anykind <strong>of</strong> breach <strong>of</strong> security at that moment <strong>of</strong> time.3.1 System ArchitectureThe detection <strong>of</strong> motion essentially requires the user toperform two major steps. They are: acquisition <strong>of</strong> thevideo data in which the motion is to be detected and thelater step is to actually device an algorithm by which themotion will be detected. The video stream is stored oracquired as a series <strong>of</strong> frames occurring in an orderedsequence one after the other. Algorithm for detectionbecomes imperative because other factors/movingobjects like dogs and other domestic animals/pets mighttrigger unnecessary movement with the set space. Thesystem is developed in such a way that once a snap-shotis taken, it is compared to existing, predefined images inthe database for validation before further actions. Thiseliminate the false-positive response that could resultfrom pets but take into cognizance the issue <strong>of</strong>“creeping-human” with a bid to disguise or fool thesystem. Keeping the work objective in mind, we presentthe basic system architecture as shown below.33


Vol 5. No. 3, May, 2012ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netObjectDetectionObjectCaptureImage processingand analysisFeatureExtractionObjectRecognitionTrackingStoringSystemIndicationFigure 2: Basic system architecture <strong>of</strong> our system4. DISCUSSIONThe system architecture which we developed wasadapted from [6], describes how the system componentinteracts and work together to achieve the overall systemgoals. It describes the system operation, what eachcomponent <strong>of</strong> the system does and what information isexchanged. The system is initialized to take a snapshot<strong>of</strong> an image which is referred to as Old. With thesystem’s inbuilt timer, the next image taken will bereferred to as Current. If there exists a difference in theOld and Current images’ RGB values, the motion is saidto occur which is detected by the sensors.Here motion detection algorithm is based on framedifference calculation in terms <strong>of</strong> RGB values andbrightness threshold values stored in byte arrays. Thealgorithm compares two consecutive frames Old andCurrent, pixel by pixel to generate a difference value. Ifthe difference value is greater than a fixed value(randomly taken), then motion is detected. Else if, thereis no difference between previous and current frame’sbyte arrays then Old is set to Current. The processrepeats according to the program’s set timer.34


Vol 5. No. 3, May, 2012ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTable 1: System Architecture DescriptionS/N FEATURE DESCRIPTION1 Object Detection/capture A digital image is produced by a security camera234Image processing andanalysisFeature extractionObject RecognitionRe-sampling in order to assure that the image coordinatesystem is correct.Noise reduction in order to assure that sensor noise doesnot introduce false information.Frame Differencing with binary thresholding to removestationary objects.Regions <strong>of</strong> interest (ROI) such as blobs.Motion History Image (MHI) to store blobs movementpattern.MHI is stored in a cyclic buffer - a single, fixed-sized arrayas if it were connected end-to-end5 Object tracking Using the MHI extracted from the image to determine themovement between images.Below, we discuss the methodology by elaborating onthe following key techniques used in developing thesystem:On capturing a frame, gray scaling is used to convertcolour images to its grayscale equivalent. The grayscaleimage shows the effective brightness or luminance <strong>of</strong>the colour image. The conversion, to a shade <strong>of</strong> greyfrom a colour image, is established by calculating theeffective brightness or luminance <strong>of</strong> the colour. Thisvalue is then used to create the shade <strong>of</strong> grey thatcorresponds to the desired brightness. Frame differenceis used when the still part <strong>of</strong> an image needs to beseparated from the moving part <strong>of</strong> the image. During theframe differencing process a binary threshold valueneeds to be used to get rid <strong>of</strong> unwanted noise whilstpreserving the foreground. Setting the threshold to thecorrect value is important so that we get acceptableresults in blob tracking.The motion history image is the final component forblob tracking. This method focuses on accumulating andrecognizing entire object patterns rather than focusingon detailed features. The advantages <strong>of</strong> this approach arethe low use <strong>of</strong> memory and blazingly fast yet descriptiverepresentation <strong>of</strong> capturing motion on a per blob basis. Ithas coordinates that can be used to measure the widthand the height <strong>of</strong> the blob component.The relative angle at which the blob is traversing is alsomeasured. The MHI is created by layering images oversuccessive image regions. This system can be embeddedin home monitoring systems which are gaining interestin recent years. This system can be used to detect motionin target areas. It prevents users from making blunderswhich can arise as a result <strong>of</strong> missing footage whenmonitoring several screens. It can also be used toprevent car hijacking in various parking stations. Onceunusual movement is detected by the system, the systemindicator triggers an alarm. Such monitoring keeps theheart <strong>of</strong> users at rest knowing full well that theirproperties are secured. The video recorder commencesrecording once motion has been detected. This recordedvideo can be used an evidence in the court <strong>of</strong> law.5. CONCLUSIONThis paper presents the framework for the design <strong>of</strong> avideo monitoring and detection system. This systemmainly provides an efficient method for surveillancepurposes and is aimed to be highly beneficial to anindividual or organization. As a future work, extendedefforts are being made to enhance the securityprovisions. Works can also be done to ensure that thevideo coverage is saved on multiple storage devices inreal time, in case <strong>of</strong> damage. This will serve as abackup.35


Vol 5. No. 3, May, 2012ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netREFERENCES[1] Asif Ansari1, T.C.Manjunath, C.Ardil (2008):Implementation <strong>of</strong> a Motion DetectionSystem; World Academy <strong>of</strong> Science,Engineering and Technology[2] Bing-Fei Wu, Hsin-Yuan Peng, Chao-JungChen (2006): A Practical Home SecuritySystem via Mobile Phones; Department <strong>of</strong>Electrical and Control Engineering NationalChaio-Tung University[3] Boop Button (2011): Terrorist 'pre-crime'detector field tested in United States.Screeningsystem aims to pinpoint passengers withmalicious intentions [online],http://www.nature.com/news/2011/110527/full/news.2011.323.html[4] Dane Brown, Mr James Connan, Mr MehrdadGhaziasgar (2010): Suspicious ActivityDetection; mini-thesis Department <strong>of</strong><strong>Comp</strong>uter Science; University <strong>of</strong> the WesternCape[5] M. Valera, S.A. Velastin (2005): Intelligentdistributed surveillance systems: a review IEEProceedings online no. 20041147. DigitalImaging Research Centre, School <strong>of</strong><strong><strong>Comp</strong>uting</strong> & Information Systems, KingstonUniversity, UK[6] Neha Singh, Ankita Gupta, P.K.Bishnoi(2011): Self Initiated SMS/MMS EnabledHome Security System (SISME-HSS)<strong>Comp</strong>uter Science Department, M.I.E.RUniversity, Lakshmangarh, Sikar District,Rajasthan 332311, India[7] US Department <strong>of</strong> Homeland Security. (2008):Newscientist.[Online].http://www.newscientist.com/blogs/shortsharpscience/2008/09/precrime-detector-isshowing-p.html[8] R. Jain, D. Militzer, and H. Nagel, “Separatingnonstationary from stationary scenecomponents in a sequence <strong>of</strong> real world TVimages”.[9] Weber, M.E., and Stone, M.L. (1995): Lowaltitude wind shear detection using airportsurveillance radars.[10] I. Haritaoglu, D. Harwood, and L. Davis,“W4: Real-Time Surveillance <strong>of</strong> People andTheir Activities”,[11] Pozzobon, A., Sciutto, G., and Recagno, V.(1998): Security in ports: the userrequirements for surveillance system (KluwerAcademic Publishers, Boston.[12] N. M. Oliver, B. Rosario, and A. P. Pentland,(2000): A Bayesian <strong>Comp</strong>uter Vision Systemfor Modeling Human Interactions.[13] C. Wren, A. Azarbayejani, T. Darrell, andA.P. Pentland, Pfinder (1997): Real-timeTracking <strong>of</strong> the Human Body.[14] Xu, M., Lowey, L., and Orwell, J. (2004):Architecture and algorithms for trackingfootball players with multiple cameras.[15] Brodsky, T., Cohen, R., Cohen- Solal, E.,Gutta, S., Lyons, D., Philomin, V., andTrajkovic, M. (2001): Visual surveillance inretail stores and in the home’, in: ‘AdvancedVideo-based Surveillance Systems.[16] Micheloni, C., Foresti, G.L., and Snidaro, L.(2003): A co-operative multi-camera systemfor video-surveillance <strong>of</strong> parking lots.36


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netA Model Checking Framework For Developing Scalable Antivirus SystemsE. OsaghaeDepartment <strong>of</strong> <strong>Comp</strong>uter ScienceUniversity <strong>of</strong> Port Harcourt\Port Harcourt, Nigeria.edgarbros@yahoo.comS.C.Chiemeke PhDDepartment <strong>of</strong> <strong>Comp</strong>uter ScienceUniversity <strong>of</strong> BeninBenin City, Nigeriaschiemeke@uniben.edu.ng.ABSTRACTConventional antivirus products rely on signature matching technique to detect malicious programs. Signature matching technique needsconstant connection to the internet so that the antivirus companies can send new updates to their clients’ computers antivirus database,and the database may be very large to the extent that it slows down the computer performance. This method therefore fails to detect newand unknown viruses. We propose and implemented a model checking framework as a novel technique to improve static malwaredetection. Model checking technique is employed to determine behavioural patterns <strong>of</strong> an executable program on assembly programminglevel. Deterministic finite automata technique is used to extract the set <strong>of</strong> Application Programming Interface (API) functions used formalicious activities, which has been identified by the model checking technique. Naïve Bayes technique is used to identify only APIfunctions used by a virus program based on self-modification, self-referential and self-replication. Chi square techniques is used toidentify Trojan, worm and unknown malicious attributes from the codes already examined by the Naïve Bayes technique. Weimplemented the proposed framework by developing a scalable antivirus system called “Intellect” using c++ 2008 programminglanguage and the results <strong>of</strong> detection is sent to a file. We tested one hundred benign files, one hundred viruses, one hundred Trojan horsesand one hundred worms. Preliminary results from our test runs shows that the antivirus is efficient at detecting viruses, Trojans, wormsand unknown malicious programs.Keywords: Virus detection, Model checking, Naïve Bayes, Deterministic Finite Automata, and Chi Square.1. INTRODUCTIONThe internet is proliferated with more computers beingconnected to it on daily basis although, this is an improvementto the world <strong>of</strong> information technology and there is also a darkside: malware. Malware is becoming increasingly common andposes a major threat to individuals and businesses, as it isemployed by both criminals and vandals to steal valuableinformation, commit fraud, send junk mail or attack computersystems (Bohne, 2008). A study between 2004 and 2007 showedthat antivirus companies required an average <strong>of</strong> six (6) hours toanalyze and extract a signature from a newly discovered virusand add it to their signature database. In 2006, a Federal Bureau<strong>of</strong> Investigation (FBI) survey reported computer viruses asnumber one cause <strong>of</strong> financial loss for American companies.<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:E. Osaghae & S.C. Chiemeke (2012). A Model CheckingFramework For Developing Scalable Antivirus Systems. <strong>Afr</strong> J.<strong>of</strong> <strong>Comp</strong> & <strong>ICTs</strong>. Vol 5, No. 3. pp 37-48© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781Kaspersky labs reported a strong rise in the number <strong>of</strong> newviruses and momentum in the second half <strong>of</strong> the year with emailworms topping the list. Despite this growing problem, antiviruscompanies continue to use signature databases as their primarytool for virus detection. In 2006, Kespersky labs averaged10,000 new record updates to its signature database per monthand 200 new malware samples per day. Even after solutionshave been released it is unknown how much time passes until allend user signature databases are updated. It is clear that antiviruscompanies will continue to improperly and slowly handle theever growing virus problem using signature databases as thecenterpiece for detection (Morales, 2008).Micros<strong>of</strong>t operating system applications are the targets <strong>of</strong> manyviruses because the operating system is widely used compared toother operating systems. There are about 60,000 viruses knownfor Windows, 40 or so for the Macintosh, about 5 forcommercial Unix versions, and perhaps 40 for Linux. Most <strong>of</strong>the Windows viruses have caused widespread monetarydamages. Two or three <strong>of</strong> the Macintosh viruses werewidespread enough to be <strong>of</strong> importance, none <strong>of</strong> the Unix orLinux viruses became widespread because most were confinedto the laboratory (Granneman, 2003).37


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netAn antivirus system is a s<strong>of</strong>tware product that essentiallysafeguards computer data and instructions against destruction ormodification by viruses and other malicious programs(Alessandro, 2009). Malicious program contains malicious codewhich is any code added, changed, or removed from a s<strong>of</strong>twaresystem to intentionally cause harm or subvert the computersystem’s function. A computer virus is a malicious program thatreproduces itself by injecting its codes into existing programsthereby infecting it, and propagate to other programs whenexecuted (Gaddam, 2008; Kolter and Malo<strong>of</strong>, 2006). A Trojanhorse is also a malicious program that is non-replicated programwhich enters a computer system by disguising or embeddingitself inside another legitimate program however, each Trojanhas its own characteristics that make it different from otherTrojans.A worm is another type <strong>of</strong> malicious program that reproducesitself just like a computer virus however, the only difference isthat it does not attach itself to other existing program. A wormuses network resources to infect other computer systems in anetwork (Raghunathan, 2007). A program that does not containany malicious code is called a benign and it would not corrupt ordamage the computer system in any way (Sathyanarayan et al,2008). Currently, most widely used antivirus s<strong>of</strong>tware usessignature-based and heuristic-based algorithms to recognize avirus file. Signatures are short strings <strong>of</strong> bytes which are uniqueto the programs and can be used to identify particular viruses inexecutable files however, signature-based method is expensive,slow and they are not effective against modified or unknownvirus (Alessandro, 2009).Heuristic-based recognition tends to provide protection againstnew and unknown viruses, this kind <strong>of</strong> virus detection is usuallyinefficient and inaccurate. Heuristic-based virus detection isbetter than signature-based detection because, it is preventive innature and it also has the ability to detect viruses before theyinfect any file (Varun et al, 2009). Although, virus prevention isbetter than virus cure (detection before infection), but virusprevention still has a lot <strong>of</strong> challenges. For a prevention systemto be effective, it must address two challenges comprehensively;accuracy and performance. Accuracy is concerned with bothfalse positives as well as false negatives <strong>of</strong> the virus detectionmechanism, while performance is the ability to functionefficiently without degrading the computer system (Koller,2008; Alessandro, 2009).In spite <strong>of</strong> the research improvements made by antiviruscommunities, computer viruses still pose a major threat tocomputer resources because they expose vulnerability <strong>of</strong> acomputer system. However, the goal <strong>of</strong> this research is to applydeterministic finite state automata Model checking technique,Naïve Bayes and chi-square techniques to accurately extractviral Application Programming Interface (API) attributes inorder to build a proposed intelligent virus detection systemtagged “Intellect Antivirus”. The antivirus was implemented inC programming language, tested using 100 viruses, 100 Trojansand 100 Worms.The results <strong>of</strong> the detection were compared with 44 updatedantivirus products using the virus total website(www.virustotal.com). After analyzing the comparison <strong>of</strong> theantivirus products, it revealed that the proposed antivirus is anaccuracy detector.2. ANTIVIRUS SOFTWARE DETECTION TECHNIQUESThere are two main usage models when running anti-viruss<strong>of</strong>tware they are on-demand, and on-access. The on-demandmodel involves the user specifying which files to scan then, theanti-virus s<strong>of</strong>tware will usually be running for a period <strong>of</strong> time,scanning numerous files. The on-access model can be thought <strong>of</strong>as a daemon process that monitors system level and user-leveloperations then intervenes (scans), when a predefined eventoccurs. An alternative strategy involves behavior blocking,wherein the behavior <strong>of</strong> a binary is analyzed and the rate <strong>of</strong>connections to a new host is limited. In the area <strong>of</strong> anti-viruss<strong>of</strong>tware characterization, the Antivirus-Test group haspublished online results <strong>of</strong> measuring the overhead associatedwith different anti-virus s<strong>of</strong>tware products (Uluski et al, 2005).When virus detection and analysis unit finds a known virus inthe file, it will be sent to virus removal or quarantine unit. Herethe viruses, which can be removed i.e., healed, are removed,however, there are some virus definitions on which healing isnot possible therefore, these files will be quarantined.Quarantining an infected file means to move the file into an areawhere it cannot cause more harm. A more advanced virusdetection method is to invite the virus to attack computer files ina simulated virtual machine. The success <strong>of</strong> implementing avirtual machine and opening it to all vulnerabilities is inmonitoring the activities occurring in the virtual environment.Activity monitor will continuously track the virus activity in thevirtual environment and it will create an activity log <strong>of</strong> thehappenings inside virtual environment (Kekre et al, 2009; F-PROT antivirus SDK, 2005).Most current anti-virus mechanisms use virus pattern matchingto detect viruses but their limitation is, they can only detectthose viruses for which patterns have been collected. Namely,without a specific virus pattern, a new virus can be neitherdetected nor removed and the problem becomes compounded,when the viruses and their variants have different virus patterns(Shakeel, 2009). A proactive method or mechanism must bedeveloped to tackle the problem caused by known and unknownviruses. Most virus-related research focuses directly on virusfiles, investigating specific virus patterns in the files, thestructure <strong>of</strong> the virus file and the behavior <strong>of</strong> the virus, which areall related at a low level to operating system and hardwarearchitecture (Lin and Chen, 2006).One shortcoming <strong>of</strong> antivirus research is that antivirusresearchers should obtain a copy <strong>of</strong> a malicious program beforeextracting the pattern necessary for its detection. Obtainingcopies <strong>of</strong> new or unknown malicious programs usually entailsthem infecting or attacking a computer system before theirsamples are extracted. Antivirus researchers have discovered38


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netthat simple obfuscation techniques foil commercial programs forvirus detection. However, this challenges have prompted someresearchers to investigate learning methods for detecting new orunknown viruses, and more generally, malicious code (Kolterand Malo<strong>of</strong>, 2006).3. RELATED WORKSathyanarayan et al (2008) proposed a behavioural detectionmethod based on chi-square technique to detect general malwarefamily, using the malware critical API calls. The results from thestatistical comparison were used to formulate the malwaredetection algorithm using the program behaviour model. Thesignatures were based on the characteristics <strong>of</strong> the entiremalware class created by determining their similar behaviors.The merit <strong>of</strong> this research is that details on the detection <strong>of</strong>individual malware such as virus were reported and the resultsshowed that the false negative rate <strong>of</strong> detection is zero. Thedrawbacks <strong>of</strong> this method is that its accuracy depends onconstant training <strong>of</strong> the malware samples and in some cases, itstill experiences high false positive alarm for virus samplesdetection.Lisitsa and Webster (2008), developed a supercompilationtechnique to detect metamorphic viruses. Supercompilationtechnique can be used to prove if two programs are equivalent,this is useful for virus detection, if signature <strong>of</strong> a virus family isfound in one <strong>of</strong> its variants, and other programs are checked forthe same signature. The advantage <strong>of</strong> this technique is that falsepositive alarms are unlikely, or even impossible. Thedisadvantages are: (i) The supercompilation algorithm cannotnormalize all equivalent programs to the same syntactic form,(ii) False negatives are possible because some codes are notanalyzable by the supercompiler, (iii) Formal prove forcorrectness <strong>of</strong> the detection by supercompilation has not beenestablished, (iv) The detection is a prototype, it has not yet beenimplemented and tested.Sekar et al (2001) built a detection system based on finite stateautomata to learn the normal behaviour <strong>of</strong> a benign program andraise detection alarm when a contrary behaviour is noticed. Toimplement the detector, uninfected program would be trained toobtain its normal behaviour then, recorded for subsequentverification. In a subsequent execution, when there is a deviationfrom the initial execution path recorded, the detection alarm <strong>of</strong>the system would be triggered. The advantages <strong>of</strong> the detectorare: (a) False positive detection rate using Finite State Automatais very low, (b) Space and runtime overhead <strong>of</strong> Finite StateAutomata-learning is minimal, (c) Finite State Automataapproach is effective in detecting attacks. The disadvantages are:(i) This method can not learn the behaviour <strong>of</strong> a program thathas too many transitions, (ii) The arguments <strong>of</strong> a function callscould not be included in the Finite State automata and (iii) Thesystem is designed for Linux operating system. However,observing system calls for Linux operating system cannot beused to judge system calls for other operating systems.Gao et al (2004) introduce a model <strong>of</strong> system call behaviourcalled execution graph. Execution graph is the monitoring andtraining <strong>of</strong> the system calls made by a program, in other toextract function call structures and build a similar graph thatwould be equivalent to the Control Flow Graph (CFG) generatedby the program. The advantage <strong>of</strong> the system is that it acceptsonly system call sequences that are consistent with the controlflow graph <strong>of</strong> the program. The drawback is that it is maximal,given a set <strong>of</strong> training data, meaning that any extensions to theexecution graph could permit some intrusion to go undetected.Dai et al (2008) developed a malware detector that wouldintercept the API calls made by an arbitrary executable programat runtime. The classifications <strong>of</strong> malicious programs are basedon the sequential order which the set <strong>of</strong> API calls were made andthe type <strong>of</strong> parameters passed to them. The problems with thedetection system are the detector is a proposed system, it has notyet been implemented and the detector can only monitor APIfunction calls imported from kernel32.dll and cannot detectmalicious programs whose API function calls are imported fromother system functions such as ntdll.dll.Kinder (2005) developed a model checking technique fordetecting email worms which uses the CopyFile andGetFileModuleName API functions. Model checking techniqueis an efficient method to verify the concordance <strong>of</strong> systems tospecifications, such as proving the correctness <strong>of</strong> protocols inconcurrent environments. The problem with this technique isthat it is a prototype and has not yet been implemented, and thecomputational effort to implement this technique is very high(Kinder, 2005).Abdulalla et al. (2010) developed a malware detection systemthat was inspired from the co-stimulation process <strong>of</strong> humanimmune system. The model developed could improve theaccuracy <strong>of</strong> detection systems, because it checks the suspectedfiles with two groups <strong>of</strong> API. The advantages are:i. Improving false alarm rate for detection system.ii. Improving the prediction rate for unknown malware,as the system will not depend on a threshold value orother probability application.iii. Minimizing the cost <strong>of</strong> computation for detectionsystems.iv. Building direct detectors that do not need optimization(Abdulalla et al., 2010).Murugen and Kuppusamy (2011) analyzed malware code atassembly language level by first disassembling the code andthen subjecting it to analysis. From the analysis <strong>of</strong> thedisassembled executable code, they observed that ApplicationProgramming Interface (API) system function calls take in sets<strong>of</strong> arguments and return the results <strong>of</strong> the functions through aneax register. The malicious program being examined makes use<strong>of</strong> the following set <strong>of</strong> API functions namely, CreateFileW,SetFilePointer, ReadFile, GlobalAlloc, CloseFile, WriteFile,GlobalFree, WinExec, DeleteFileW and ExitProcess.39


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThey observed that CreateFileW was first used to read from afile and later used to create a new file whereby the contents <strong>of</strong> amemory location is copied into it. SetFilePointer and ReadFilefunctions were called twice in order to enable the maliciousprogram being opened to read some sections <strong>of</strong> its own codewith the help <strong>of</strong> GlobalAlloc function. DeleteFileW functionwas used by the malicious program to delete a temporary filethat was created and had been used, and WinExec was used torun a newly replicated portion <strong>of</strong> the malicious (Murugen andKuppusamy, 2011). Although the analysis <strong>of</strong> the maliciousprogram was able to show which system functions it used, for itcouldnot identify the particular malicious program (virus, wormor trojan) used in these system functions.Fig 1. The Portable Executable file format5. RESEARCH DIRECTIONMS-DOSHeaderMS-DOSStubPE HeaderDATADirectorySectionTableThe antivirus companies use the signature-based technique astheir primary analysing method for detecting the presence <strong>of</strong>viruses and other malwares in portable executable files.However, there are some problems in using this technique:i. Signature-based technique is unable to detectobfuscated versions <strong>of</strong> known viruses.ii. Antivirus researchers have not been able to automatestatic analysis process for building signature-basedtechnique <strong>of</strong> antivirus products.iii. In static analysis, no single virus analyzing tool canperform other tools functions.iv. The existing heuristic detectors cannot distinguishbetween detected viruses and other malware samplesduring detection processes.v. Existing antivirus programs contain a large databasewith a lot <strong>of</strong> signatures which may degrade computerperformance when searching for match <strong>of</strong> a signaturewith that in a program being examined.We set out to reprogram Micros<strong>of</strong>t Dumpbin disassembler tohave features <strong>of</strong> other static analysis tools. The intention is todevelop a mathematical models that can help identify thepresence <strong>of</strong> viruses, worms and Trojan horses in an executableprogram. A momodel checking specifications is also developedfor the proposed intelligent virus detection models. Theproposed framework is then implemented by developing ascalable antivirus system called “Intellect Antivirus System”without a database and an Internet update.The Windows executable file format is called the PortableExecutable (PE) and it consists <strong>of</strong> five main sections as shown infigure 1. Every PE file starts with the MS-DOS header sectionwhich contains a pointer to the PE header section. MS-DOSStub section is provided for legacy reason and this sectioninforms the user that this file cannot be run in DOS mode, whenthe user attempts to run it with DOS command. The PE headercontains important information needed to run the executablesuch as: the base address <strong>of</strong> the PE File, the address <strong>of</strong> the entrypoint, and the number <strong>of</strong> sections in the section table (Eilam,2005).The section table is divided into individual sections to store thefile contents. The executable code is stored inside the codesection (.text section). Program's data (for example, globalvariables and initialized variables) are stored inside the datasection (.data section). As a result, data section can containsimportant strings that can assist in reversing. Program's idata(imported system functions used to access operating systemresources) are stored inside the idata section (.idata section). Asa result, idata section also contains important API functions thatcan assist in reversing an executable file. Each section hasdifferent access rights (readable, writeable, or executable) thatare based on the settings available inside the section header. Thelast section is the directory section which consists <strong>of</strong> 16directories holding information about PE file. Usually a fewdirectories are present inside the PE file, such as the importtable, export table, debugging information, and import addresstable (Eilam, 2005).The challenges faced by Windows operating system when<strong>of</strong>fering Win32 services to executable is how to differentiatebetween the set <strong>of</strong> system calls made by either a Benign or amalicious program. Benign and malicious programs may use thesame set <strong>of</strong> API system calls, and the only way to differentiatethe motive behind the usage <strong>of</strong> API system calls, is the type <strong>of</strong>parameters passed to the API function calls. Another way is howsubsequent API function calls utilize the results passed by set <strong>of</strong>functions, before it was called. With regards to this, Windowsoperating system does not have a routine which checks the type<strong>of</strong> parameters passed to the import API system functions. Itwould be a great accomplishment, if there is a way, Windowsoperating system can be enhanced to check for maliciousattributes with regards to the types <strong>of</strong> parameters passed to theset <strong>of</strong> API function calls made by executable programs.40


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net5.1 Our ApproachIn this research, the following research approaches were used:i. A close study <strong>of</strong> the Windows operating system thatuses 32-bit registers for its processor.ii. An in-depth study <strong>of</strong> antivirus s<strong>of</strong>tware products andtheir virus detection techniques in existing literature.iii. The Dumpbin disassembly tool <strong>of</strong> Micros<strong>of</strong>t Visualstudio was redesigned, implemented and applied tothis research.iv. An ultimate Packer for eXecutable (UPX) unpackings<strong>of</strong>tware product was used as plug-ins to unpack anexecutable program before sending it to aDisassembler tool.v. A Model checking technique was used to extractinterdependencies <strong>of</strong> some parameters passed bysystem call functions to determine malicious attributesin a disassembled program.vi. The Deterministic Finite State Automata techniquewas used to extract the specific malicious attributesfrom an executable program.vii. The Naïve Bayes technique was used to extract thevirus attributes from the results generated by theDeterministic Finite State Automata technique.viii. The chi square technique was used to extract the wormand Trojan attributes from the results generated by theNaïve Bayes technique.ix. The results <strong>of</strong> malicious programs generated by usingthe techniques, were evaluated with some existingantivirus s<strong>of</strong>tware products.The system being designed is called Intelligent<strong>Comp</strong>uter Virus Detection System (ICVDS) and it is tagged as“Intellect Antivirus Product”, which is displayed in Figure 2.ICVDS would run directly on Windows portable executable(PE) code and would scan any Windows portable executable(PE) file codes for its set <strong>of</strong> API calls, which are classified as afile either as virus, Trojan, worm, unknown malicious programor benign program. It consists <strong>of</strong> the following components:unknown programs, Unpacking, API Function Disassembling,Finite Automata Transition Mapping Engine and StatisticalClassifier Engine. The Finite Automata Transition MappingEngine is further divided into two sections namely, API calltransition section and API intelligent section. The StatisticalClassifier Engine is further divided into two sections namely,Separator Section and Virus Behaviour Pr<strong>of</strong>iling section.i. The unknown programs: is a file that is portableexecutable (PE) code format, which is expected to beanalyzed.ii. Unpacking: is a section which tries to unpack thepacked or encrypted executable program about to beexamined for malicious attributes.iii. The API Function Disassembling: helps decomposethe executable binaries into assembly codes so that anidea <strong>of</strong> the system resources used by benign ormalicious executable can be got.iv. API call transition section: the functionality <strong>of</strong> thissection is to map the sequential order in which the set<strong>of</strong> API functions calls were made. The observation <strong>of</strong>this order would help determine if an executableprogram is a benign or a malicious program. TheDeterministic Finite State Automata technique is usedto extract and determine if the executable file containsa malicious code or it is a benign file.v. API intelligent section: the functionality <strong>of</strong> this sectionis to extract the viral attributes from malicious codealready identified by the API call transition section.The Naïve Bayes method is use to compute theattributes <strong>of</strong> self-modification, self-referential andself-replication in order to identify a virus.vi. Separator Section: the functionality <strong>of</strong> this section isto ensure that the already analyzed executable file inthe Deterministic Finite Automata Transition MappingEngine are separated and accurately supplied to virusbehaviour pr<strong>of</strong>iling section.vii. Virus Attribute Behaviour Pr<strong>of</strong>iling Section: this isalso an intelligent section which pr<strong>of</strong>iles the API callsmade by Trojan program to differentiate the set <strong>of</strong> APIcalls made by worm program. It carries out thisfunctionality by interacting with the virus pr<strong>of</strong>ilingstorage and if a Trojan or worm program is found, it isresponsible for removing it.viii. API Behavioural Storage: this component would beresponsible for temporary storing the set <strong>of</strong> API callsmade by an executable program and at the same time,stores the patterns <strong>of</strong> viral or other malicious APIcalls, based on their common features (selfmodification,self-referencing and self-replication).ix. Virus Attribute Pr<strong>of</strong>iling Database: this component isresponsible for storing the pr<strong>of</strong>iles that woulddifferentiate a Trojan attribute from a worm attribute.Micros<strong>of</strong>t Windows operating system contains ApplicationProgramming Interfaces (API) that is a set <strong>of</strong> s<strong>of</strong>tware functions,used by an application program for providing access to asystem’s resources. These set <strong>of</strong> important API calls are presentin kernel32.dll and ntdll.dll and these API calls are made bysome Win32 executable programs. The detection process <strong>of</strong>intelligent computer virus detection system starts with theunknown program enters the feature extraction phase and it isbeing examined for malicious code. In the feature extractionphase, the unpacking section tries to unpack a packed unknownprogram and then move the unknown program to the APIfunction disassembling section. The API function disassemblingsection disassembles the API Function Call <strong>of</strong> the unknownwindows executable program to determine it set <strong>of</strong> APIfunctions and the parameter passed to them.If the disassembling process fails then the unknown program iseither packed with unknown packer s<strong>of</strong>tware, damaged orprotected and the unknown program is detected as a special type<strong>of</strong> malicious program. When the unknown program is notpacked, damaged or protected, it is passed to the API CallTransition Section <strong>of</strong> Finite Automata Transition MappingEngine, which contains API Call Transition Section and APIIntelligent Section.41


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThe API call transition section makes use <strong>of</strong> deterministic finiteautomata (DFA) to map all API calls made by the unknownprogram into the API behaviour storage. In addition, the APIcall transition section learns and represents the sequential orderin which a malicious API calls are made. The API IntelligentSection takes the responsibility for extracting the virus features<strong>of</strong> self-modification, self-reference and self-replication from aset <strong>of</strong> API calls made by a malicious program. It would extractthese features with the help <strong>of</strong> Naïve Bayes technique, whichwould mine the API calls already mapped by the API calltransition section. The automata pattern would be designed tomatch the API calls which would signify the presence <strong>of</strong> amalicious action by transiting through all the API calls made bythe unknown executable program. This malicious API patternsare used to define the structure <strong>of</strong> a virus attribute based <strong>of</strong> selfmodification,self-referencing and self-replication which arestored in the behavioural storage. When the deterministic finiteautomata transition mapping engine has finished processing theAPI calls made by the unknown program, if it matches the set <strong>of</strong>API calls defines as the API calls for a virus attribute, stored aspatterns in the API behavioural storage, the unknown programwould be detected as a virus program and removed from thesystem.Unknown programsUnpackingWhen the unknown program’s API calls did not match the virusAPIs, then, the unknown program is believed to be free fromvirus but would be subjected to another check in the statisticalclassifier engine.In the statistical classifier engine, the analyzedexecutable program and its API calls are sent to the separatorsection in the engine. The function <strong>of</strong> separator section is tomake sure that the API calls and the unknown program aresupplied separately to the virus behaviour pr<strong>of</strong>iling section.While the separator section is necessarily is to ensure that analready examined unknown program which has be identified tocontain a malicious code and it is not a virus, should be furthersubjected to more analysis in order to determine if it is a wormor a Trojan without re-disassembling it a second time. The viruspr<strong>of</strong>iling storage contains the critical API calls, with theminimum requirement to match the unknown programcontaining a Trojan, worm or unknown malicious code.FEATURES EXTRACTION PHASEAPI FunctionDisassemblingSuccessful DisassemblingFailed DisassemblingPacked/Damaged/ProtectedVirusdetected arereportedHigh false positiveerror correctedDeterministic Finite Automata Transition Mapping EngineAPI IntelligentSectionSystemAPI CallTransition SectionDETECTION PHASEAPIBehaviouralStorageAnalyzedexecutable program and their API callsHigh falsenegative errorcorrectedStatisticalSeparatorSectionClassifier EngineVirus behaviourPr<strong>of</strong>iling sectionVirusPr<strong>of</strong>ilingStorageVirus detected arereportedVirusAttributeBenignFig 2: Framework for Intelligent <strong>Comp</strong>uter Virus Detection42


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netThe virus behaviour pr<strong>of</strong>iling section test the membership <strong>of</strong> agiven set <strong>of</strong> API calls made by the unknown program, andcompare it with the pattern stored in the virus attributebehaviour pr<strong>of</strong>iling storage.The Statistical Pr<strong>of</strong>iling Algorithm(i) Define P i = (P 1 , P 2 ) …………………………… equation 1.To be the set <strong>of</strong> pr<strong>of</strong>iles <strong>of</strong> samples in the malicious attributewhere a virus attribute has been identified from the classes C 1 ,C 2 , C 3 .Define T = (T 1 , T 2 , T 3 , ...,T n ) …………………….. equation 2.To be tested samples <strong>of</strong> a generalized virus attributes belongingto the classes C 1 , C 2 , and C 3 respectively.Define B to be the set <strong>of</strong> API function calls used to identify abenign program.Define M to be the set <strong>of</strong> API function calls used to identify amalicious program.(ii) Get the program incomplete API function used, whichbelongs to either Trojan horse or worm program and has beenseparated by the separator section.(iii) <strong>Comp</strong>ute chi-square for each attribute classFor i = 1 to 2 doX i 2 = (A i – V i ) 2V iA i is the number <strong>of</strong> observed malicious attribute and i is 2; trojanand worm.V i is the number <strong>of</strong> expected worm or Trojan attribute issuppose to have.(iv) <strong>Comp</strong>ute degree <strong>of</strong> membership σ i = ∑X i 2 .(v) <strong>Comp</strong>ute the degree <strong>of</strong> freedom = number_ <strong>of</strong>_ attributes - 1Degree <strong>of</strong> freedom = 2 – 1=1(vi) <strong>Comp</strong>ute threshold value σ 1, where the null hypothesisjudgment would be based upon,by reading the degree <strong>of</strong> freedom from probability level <strong>of</strong> 0.5from the chi square table. A significant level <strong>of</strong> 0.90 wasselected which means that 90% <strong>of</strong> the time, X 2 is expected to beless than or equal to σ 1.We have X 1 . 90 = 1.386, σ 1 = 2.71.X 2 . 90 ≤ 2.71.IfOtherwise,i, 1 ≤ i ≤ 2, σ i ≥ σ 1=> T є B i.i, 1 ≤ i ≤ 2, σ i < σ 1=> T є M.The virus attribute behaviour pr<strong>of</strong>iling section makes use <strong>of</strong> chisquaretechnique to measure the difference between theproportions <strong>of</strong> the critical API calls made by a Trojan from thecritical API calls made by a worm. The mechanics <strong>of</strong> theproposed intelligent virus detection engine is strictly amanagement process whereby, deterministic finite statetransition mapping engine has the ability to detect virus infectedprograms and malicious programs which are not viruses aresubjected to another test in statistical classifier engine. On theother end, the statistical classifier engine detects critical APIcalls made by Trojan, worm and unknown malicious infectedprograms. When an executable program is malicious-free it isreported in the deterministic finite state transition mapping andstatistical classifier engines as a benign program. The StructureSystem Analysis and design methodology was used to developthe proposed antivirus.6. IMPLEMENTATIONThe hardware requirements necessary for the deployment <strong>of</strong> thesystem are Processor type <strong>of</strong> Pentium M processor with1.70GHz and size <strong>of</strong> 598MHz, memory size <strong>of</strong> 504 MB <strong>of</strong> RAMspace and hard disk space <strong>of</strong> 37.2GB. S<strong>of</strong>tware requirements areMicros<strong>of</strong>t Windows XP Pr<strong>of</strong>essional operating system andMicros<strong>of</strong>t visual C++ 2008 Express Edition. Applicationdevelopment tools are VMware Workstation 6.0, UltimatePacker for eXecutable version 3.7.0.0 and Micros<strong>of</strong>t DumpbinDisassembler.We install the VMware Workstation 6.0, Internetmodem s<strong>of</strong>tware, Ultimate Packer for eXecutable and Micros<strong>of</strong>tDumpbin Disassembler tools from their CD packs and followthe instructions displayed during the installation processes. Afolder is created (named Intellect Antivirus) and all theseinstalled s<strong>of</strong>tware products including the proposed antiviruss<strong>of</strong>tware tagged “Intellect”. To run the antivirus s<strong>of</strong>tware, theVMware workstation is installed executed, Intellect Antivirusfolder is installed inside the VMware environment and thenIntellect Antivirus folder icon is double-clicked on the desktop,inside the VMware environment. After double-clicking theIntellect Antivirus icon, an input screen appears which requires afile name as input to the antivirus s<strong>of</strong>tware. To test theapplication, either a benign, virus, Trojan or worm filename isentered and the result <strong>of</strong> malicious detection is sent to an outputfile. The results <strong>of</strong> the type <strong>of</strong> malicious programs detected aredisplayed in table 1.(viii) <strong>Comp</strong>ute the classification strategy:43


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTable1: Selected Malicious FilesMalicious file Benign Detection Virus detection Trojan Detection Worm DetectionBenign file:√ X X XDumpbin.exeVirus file:X √ X XVirus.win32.cabinfectorTrojan file:X X √ XTrojan-dropper.win32.apentWorm file:X X X √Worm.win32.ladex.aKey: X: no detection, √: Detection.From the results displayed in table 1, it shows that IntellectAntivirus s<strong>of</strong>tware accurately detected the various types <strong>of</strong>malicious files from samples files used.6.1 Implementation ResultsWe tested the accuracy <strong>of</strong> Intellect Antivirus by testing it on 100benign programs copied from a newly installed Windows XPoperating system, 100 viruses, 100 Trojan horses and 100 wormsdownloaded from VX Heaven website (www.vx.net.org).Table 2, shows the summary <strong>of</strong> the detection results produced byIntellect Antivirus s<strong>of</strong>tware and the relevant columns <strong>of</strong> the tableare:(i) SR1 means the number <strong>of</strong> self-referential attributesrecorded during the detection.(ii) SR2 means the number <strong>of</strong> self-replication attributesrecorded during the detection(iii) SM means the number <strong>of</strong> self-modification attributesrecorded during the detection.(iv) Tr means the number <strong>of</strong> Trojan attributes recordedduring the detection.(v) No-Dis means the number <strong>of</strong> executable files thatcould not be disassemble during detection.(vi)(vii)(viii)(ix)(x)(xi)(xii)(xiii)(xiv)Mal-C means the number <strong>of</strong> known malicious codeattributes detected.Unk-M means the number <strong>of</strong> unknown malicious codedetected.Packed-M means the number <strong>of</strong> packed or protectedmalicious code detected.Error means the number <strong>of</strong> files that could not beexamined for malicious attribute by the intellectantivirus.HC means the number <strong>of</strong> executable files that whoseheader section were coded.T means true identification <strong>of</strong> a malicious category(virus, Trojan or worm).B means set <strong>of</strong> benign executable file that misseddetection.Pi means unknown packer identified in maliciousprograms.M/S means set <strong>of</strong> Benign executable programswrongly identified as suspicious or maliciousprogramsThe summary would be extracting the above attributes fromdetected viruses, Trojans and worms.Table 2: Features detected in Malicious executabless/n SR1 SR2 SM Tr Wo No-Dis Mal Unk-M Packed-M Error HC T Pi M/S-CBenign 0 0 0 0 0 0 0 1 0 0 2 97 0 3s/n SR1 SR2 SM Tr Wo No-Dis Mal Unk-M Packed-M Error HC T Pi B-CViruses 9 7 1 21 9 7 23 9 5 5 0 3 2 4Trojans 0 0 0 5 1 9 77 2 2 0 3 3 0 1Worms 0 0 0 7 8 7 70 1 1 1 4 3 0 1During the running <strong>of</strong> malicious files used for this experiment,we observed how these files used certain features described intable 2.i. Self-Referential Feature (SR1): it was observed in theresults shown in table 2 that only virus files used forthis experiment exhibited the self-Referential featureand the number <strong>of</strong> virus files which showed thisfeature is 6 files, as shown in table 2. No Trojan orii.iii.worm files used in this experiment showed selfreferentialfeatures.Self-Replication Feature (SR2): similar to the SR1feature, only virus file exhibited this feature with atotal number <strong>of</strong> 6, while neither Trojan nor worm filehas this feature.Self-Modification Feature (SM): in this experiment,we are only interested in examining a virus file for this44


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netfeature and for this reason, we did not record thefeature for Trojan and worm. It was only 1 virus filewhich exhibited this feature.iv. Trojan horse Feature (Tr): in this experiment, weobserved that virus file scored the highest number toexhibit this feature with a score <strong>of</strong> 21, Trojan has 5while worm has 8.v. Worm Feature (Wo): we observed that virus set <strong>of</strong>files has the highest number <strong>of</strong> file which exhibit thisfeature with a total <strong>of</strong> 9, Trojan has 3 and worm has 8.vi. Executable code Not-Disassembled Feature (No-Dis):worm files have the highest number <strong>of</strong> malicious withthis feature, with a total <strong>of</strong> 11, while virus and Trojanhas the same number, which is 8.vii. Known Malicious code feature (MAL-C): Trojan filesuse more <strong>of</strong> this feature with the number <strong>of</strong> 30, and 16viruses and 24 worms also use this feature.viii. Unknown Malicious code feature (Unknow-M): virusfiles use more <strong>of</strong> this feature with the number <strong>of</strong> 10,and 5 trojans and 1 worm files also use this feature.ix. Packed or protected feature (Packed-M): virus filesalso uses more <strong>of</strong> this feature with the number <strong>of</strong> 5,and 1 trojans and 1 worm files use this feature.x. Error in Executable (Error): virus files use more <strong>of</strong> thisfeature with the number <strong>of</strong> 3, and no Trojan file usesthis feature and 1 worm files use this feature.xi. Header Section code feature (HC): worm files usemore <strong>of</strong> this feature with the number <strong>of</strong> 26, and 2Trojan file use this feature and no virus file uses thisfeature.xii.True Positive feature (True): 3 Trojans and 3 wormsfiles show their true nature <strong>of</strong> their maliciouscategories and no virus files showed their true naturewithout combining features <strong>of</strong> other maliciouscategories.xiii. Benign Executable feature (Benign): 3 virus and 3Trojans were missed during detection, only 1 wormfile was missed during detection.a. Benign: from the results shown in table 2, itshows that intellect antivirus was able to detect97% <strong>of</strong> the benign programs tested on it andrecorded a false alarm <strong>of</strong> 3%. This false alarm isattributed to three registry files in the system filesused.b. (b)Virus: from the results displayed in table 2, itwas observed that viruses has 3% <strong>of</strong> true virusattributes, 9% <strong>of</strong> self-referential attribute, 7% <strong>of</strong>replication attribute, 21% <strong>of</strong> Trojan attributes and9% <strong>of</strong> worm attributes.c. Trojan horse: it was further observed that Trojanscore 3% <strong>of</strong> true Trojan attribute, 5% <strong>of</strong> Trojancode mixed with other code, 0% <strong>of</strong> virusattributes and 1% <strong>of</strong> worm attributes.d. Worm: it was observed that worm recorded 3%<strong>of</strong> true worm attribute 8% <strong>of</strong> worm code mixedother malicious code, 7% <strong>of</strong> Trojan attribute and0% <strong>of</strong> virus attributes.The result <strong>of</strong> detection displayed in table 2 further shows thatregistry programs can exhibit sometimes malicious behaviourand these registry benign programs can exhibit unknownmalicious and header coded behaviour. Among all the maliciousprograms tested on the proposed antivirus, it reveals that most <strong>of</strong>the malicious programs were detected under the category <strong>of</strong>malicious code while the least was the unknown packercategory. It is very clear from this research which we haveearlier confirmed during the experimental stage that Trojans andworms do not exhibit self-referential and self-replicationattributes used by virus programs.6.2 Post Implementation EvaluationWe carried out a post implementation Evaluation <strong>of</strong> proposedIntellect antivirus product with 44 updated antivirus s<strong>of</strong>twareproducts. The evaluation was carried out by using the same set<strong>of</strong> malicious programs tested on Intellect antivirus to test theefficiency <strong>of</strong> the 44 antivirus products using virus total website(www.virustotal.org) and the detection results are comparedwith the ones got from the proposed intellect antivirus. Themalicious detection results got from the 44 updated antivirusproducts and results from intellect antivirus is displayed in table3. The relevant columns <strong>of</strong> table 3 are:i. ANTIVIRUS are set <strong>of</strong> antivirus that participated inthe malicious testing.ii. VIRUSES, TROJANS, WORMS are results <strong>of</strong>detection (Det.) or no-detection (No-Det) recorded forviruses, Trojans and worms used in the testing.iii. DET.AVG is the average detection rates <strong>of</strong> viruses,Trojans and worms recorded during the testingprocess.iv. Database Present is to indicate an antivirus producttaking part in the testing contains a viral signaturedatabase.v. Internet Update is record if an antivirus product needsan internet update to remain effective.From the results displayed in table 3, it shows that the kasperkeyrecorded an average <strong>of</strong> 100 percent detection score and nodetectionscore <strong>of</strong> 0 percent. SUPERAntisyware scored thelowest with 8 percent detection score and no-detection score <strong>of</strong>98 percent compared with other antivirus products used for thetesting. The proposed Intellect Antivirus product recorded anaverage detection <strong>of</strong> 98 percent, no-detection <strong>of</strong> 2 percent,requires no signature database and no internet update. Theincreasing number <strong>of</strong> malicious signature database duringantivirus update, and its size in megabytes (millions <strong>of</strong> bytes)and the time taken to compare each malicious signature withevery executable file can degrade the performance <strong>of</strong> a computersystem. When there is a cut in internet connection for few days,can render an antivirus ineffective and this can pose serious riskto the computer system safety.The best eleven antivirus products which recorded the highestdetection rate is ranked according their order <strong>of</strong> detection ratesand this is displayed in table 4.45


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTable 3: Detection results <strong>of</strong> some Malicious programsS/n ANTIVIRUS VIRUSES TROJANS WORMS DET. AVG Database InternetDet, No-Det Det, No-Det Det, No-Det Det, No-Det Present update1 AhnLab-V3 88, 12 97, 3 93, 7 92.7%, 7.3% Yes Yes2 AntiVir 99, 1 98, 2 98, 2 98.7%, 1.3% Yes Yes3 Antiy-AVL 61, 39 77, 23 85, 15 74.3%, 25.7% Yes Yes4 Avast 100, 0 95, 5 97, 3 97.3%, 2.7% Yes Yes5 Avast5 100, 0 95, 5 98, 2 97.7%, 2.3% Yes Yes6 AVG 100, 0 99, 1 98, 2 99%, 1% Yes Yes7 BitDefender 100, 0 97, 3 100, 0 99%, 1% Yes Yes8 CAT-QuickHeal 74, 26 76, 24 85, 15 78.3%, 21.7% Yes Yes9 ClamAV 49, 51 69, 31 79, 21 65.7%, 34.3% Yes Yes10 Commtouch 98, 2 75, 25 98, 2 90.3%, 9.7% Yes Yes11 Comodo 100, 0 98, 2 99, 1 99%, 1% Yes Yes12 DrWeb 95, 5 97, 3 97, 3 96.3%, 3.7% Yes Yes13 Emsis<strong>of</strong>t 100, 0 100, 0 95, 5 98.3%, 1.7% Yes Yes14 Esafe 81, 19 81, 19 88, 12 83.3%, 16.7% Yes Yes15 eTrust-Vet 75, 25 43, 57 72, 28 63.3%, 36.7% Yes Yes16 F-Prot 98, 2 86, 14 97, 3 93.7%, 6.3% Yes Yes17 F-Secure 96, 4 96, 4 100, 0 97.3%, 2.7% Yes Yes18 Fortinet 85, 15 97, 3 95, 5 92.3%, 7.7”% Yes Yes19 GData 100, 0 99, 1 99, 1 99.3%, 0.7% Yes Yes20 Ikarus 100, 0 100, 0 95, 5 98.3%, 1.7% Yes Yes21 Jiangmin 78, 22 93, 7 96, 4 89%, 11% Yes Yes22 K7Antivirus 97, 3 96, 4 98, 2 97%, 3% Yes Yes23 Kaspersky 100, 0 100, 0 100, 0 100% 0% Yes Yes24 McAfee 99, 1 99, 1 99, 1 99%, 1% Yes Yes25 McAfee-GWL-Ed. 100, 0 99, 1 98, 2 99%, 1% Yes Yes26 Micros<strong>of</strong>t 93, 7 93, 7 94, 6 93.3%, 6.7% Yes Yes27 NOD32 97, 3 93, 7 99, 1 96.3%, 3.7% Yes Yes28 Norman 99, 1 92, 8 96, 4 95.7%, 4.3% Yes Yes29 nProtect 71, 29 66, 34 86, 14 74.3%, 25.7% Yes Yes30 Panda 100, 0 93, 7 93, 7 96.7%, 3.3% Yes Yes31 PC Tools 97, 3 98, 2 97, 3 97.3%, 2.7% Yes Yes32 Prevx 13, 87 21, 79 2, 98 12%, 88% Yes Yes33 Rising 77, 23 75, 25 79, 21 77%, 23% Yes Yes34 Sophos 100, 0 95, 5 96, 4 97%, 3% Yes Yes35 SUPERAntiSyware 2, 98 8, 92 14, 86 8%, 92% Yes Yes36 Symantec 93, 3 99, 1 96, 4 97.3%, 2.7% Yes Yes37 The Hacker 24, 76 82, 18 89, 11 65%, 35% Yes Yes38 TrendMicro 94, 6 86, 14 93, 7 91%, 9% Yes Yes39 TrendMicroHouse 94, 6 86, 14 93, 7 91%, 9% Yes Yes40 VBA32 64, 36 61, 39 91, 9 72%, 28% Yes Yes41 VIPRE 91, 9 92, 8 95, 5 92.7%, 7.3% Yes Yes42 ViRobot 19, 81 50, 50 66, 34 45%, 55% Yes Yes43 Virus Buster 93, 7 92, 8 96, 4 93.7%, 6.3% Yes Yes44 Byte Hero 92, 8 97, 13 83, 17 87.3%, 12.7% Yes Yes45 Intellect Antivirus 96, 4 99, 1 99, 1 98%, 2% No No46


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net7. CONCLUSIONThe need to develop antivirus s<strong>of</strong>tware that can intelligentlydetect malicious programs and at the same time canautomatically identify the type <strong>of</strong> malicious program hasattracted a great deal <strong>of</strong> concern from the antivirus community.However, research efforts towards automatically indentifyingmalicious programs and categorizing them into their types basedon their bahaviour has not been successful. Through thoroughreview <strong>of</strong> this discipline, some weaknesses were seen whichdrove this study to develop a proposed antivirus product thatwould have a better performance with the absence <strong>of</strong> a malicioussignature database and an internet updating capabilities.This research work has exposed the secrets <strong>of</strong> how best todevelop an effective antivirus product by examining theargument <strong>of</strong> API functions used by an executable program andthen checking it for malicious attributes. Significantly, thisresearch is a contribution to the existing knowledge on computerantivirus development, we have been able to contribute thefollowing to:i) Derive two new algorithms that use Naïve Bayes andChi Square Techniques to aid virus detection.ii) Show that these the two new algorithms aid inautomatic identification <strong>of</strong> viruses, worms and Trojanhorses from available malicious attributes.iii) Re-design and re-implement Micros<strong>of</strong>t dumpbins<strong>of</strong>tware to have S<strong>of</strong>tIce features.iv) Implement Model checking analysis in this research,which before now was only a protoype.v) Develop an antivirus s<strong>of</strong>tware which neither uses amalicious signature database nor needs an internetupdating process.vi) Develop a new antivirus s<strong>of</strong>tware that can coexist withanother antivirus already installed and running in thesystem.KERNEL32.DLL BASEAPI Client<strong>Comp</strong>onentUser-ModeKernel-ModeNTDLL.DLLNative APIInterfaceNTOSKRNL.EXEThe Windows kernelKERNEL32.DLLBASE API Client<strong>Comp</strong>onentAccepts PEApplication ProcessPortableExecutableUSER32.DLLThe USER APIClient <strong>Comp</strong>onentWIN32K.SYSThe win32 kernelImplementationPortableExecutableProposed IntelligentVirus DetectionSystemGDI32.DLLGDI API Client<strong>Comp</strong>onentThe Win32 interface DLLs and their relation to the kernel components(source: Eilam, 2005)TransformationAborts PEThe existing Windows operating system provides systemresources for the portable executable programs by allowing themto have access to the DLL functions directly. The purpose <strong>of</strong>using API functions imported from these DLLs not checked byWindows operating system. Instead, they subject the operatingsystem users to install antivirus products to help alleviate thenumbers <strong>of</strong> infections caused by malicious samples in thecomputer system. When the proposed intelligent computer virusdetection system is implemented as part <strong>of</strong> the functionalcomponents <strong>of</strong> Windows operating system, it alters theoperations <strong>of</strong> the operating system as follows:a) The portable executable wishing to use the systemresources in the form <strong>of</strong> API system calls should passthrough the proposed intelligent computer virusdetection system.b) If the virus detector finds viruses, worms, Trojans orother malicious codes in the portable executableprogram, it would abort the executable program fromrunning in the Windowsc) operating system environment.User-ModeNTDLL.DLLNative APIInterfaceKernel-ModeNTOSKRNL.EXEThe Windows kernelUSER32.DLLThe USER APIClient <strong>Comp</strong>onentWIN32K.SYSThe win32kernelImplementationGDI32.DLLGDI API Client<strong>Comp</strong>onentFig 3.: Intelligent <strong>Comp</strong>uter Virus Detection System47


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netREFERENCES(d) If the virus detector could not find any traces <strong>of</strong>viruses, worms, Trojans and other maliciouscodes in the portable executable program, itwould accept the executable and allow it toaccess the DLLs functions <strong>of</strong> Windows operatingsystem.(e) Incompatibility <strong>of</strong> antivirus s<strong>of</strong>tware with theoperating system component would no longer bea problem because the virus detector is now a part<strong>of</strong> the operating system components and not anexternal s<strong>of</strong>tware that does alter the smoothrunning <strong>of</strong> Windows operating system.1. Abdulalla S. M., Kiah L. M., and Zakaria O. (2010), Abiological Model to Improve PE Malware Detection:Review, International <strong>Journal</strong> <strong>of</strong> Physical Sciences., Vol.5, Number 15, pages 2236-2247.2. Alessandro F., Federico M., Gian L. R. and Stefano Z.(2009). Selecting and improving System Call Model forAnomaly Detection, Springer-Verlag Berlin Heidelberg,pages 206-233.3. Eilam E. (2005), Reversing: Secrets <strong>of</strong> ReverseEngineering, Wiley Publishing, Inc., Indianapolis,Indiana, pages 109-138.4. F-PROT antivirus SDK (2005). Whitepaper: F-ProtAntivirus SDK Technology Licensing, FRISK S<strong>of</strong>twareInternational.5. Gaddam A (2008). Malware analysis, InformationSecurity Summit 2008 Malware Challenge.6. Gao D., Reiter K. M and Song D (2004). Gray-BoxExtraction <strong>of</strong> Execution Graphs for Anomaly Detection,Proceedings <strong>of</strong> ACM <strong>Comp</strong>uter and CommunicationSecurity (CCS),Washington, DC, USA, pages 318-329.7. Granneman S.(2003). Linux vs Windows Viruses,(retrieved from: www.theregister.co.uk.htm, on27/07/2011).8. Kekre H. B. and Sudeep D. T., and Anant S. (2009).Network Vaccination Architecture, Proceedings <strong>of</strong> theInternational Conference on Advances in <strong><strong>Comp</strong>uting</strong>,Communication and Control (ICAC3 09), New York,USA, Pages 516-520.9. Kinder J. (2005). Model Checking Malicious Code,Fakultat Fur Informatik, Technische UniversitatMunchen.10. Koller R., Raju R., Joseph M., Igor H., Ge<strong>of</strong>frey S.,Mandy B., Silviu N., Masoud S., Tao L and Krista M(2008). Anatomy <strong>of</strong> a Real-Time Intrusion PreventionSystem, International Conference on Autonomic<strong><strong>Comp</strong>uting</strong>, Chicago, USA, Pages 151-160.11. Kolter J. Z. and Malo<strong>of</strong> M. A. (2006). Learning to Detectand Classify Malicious Executables in the Wild, <strong>Journal</strong><strong>of</strong> Machine Learning Research.12. Lin D. and Chen Y. (2006). Detection <strong>of</strong> AnomalousMailing Behavior Using Novel Data MiningApproaches, <strong>Journal</strong> <strong>of</strong> Information, Technology andSociety.13. Lisitsa A. and Webster M. (2008). DetectionMetamorphic <strong>Comp</strong>uter viruses using Supercompilation,University <strong>of</strong> Liverpool, UK.14. Morales J. A. (2008). A Behaviour Based Approach ToVirus Detection, PhD Thesis, Florida InternationalUniversity, USA.15. Murugen S and Kuppusamy (2011), Malware AnalysisUsing Assembly Level Program, International <strong>Journal</strong> <strong>of</strong>Advanced Engineering Sciences and Technologies, Vol.2, No. 1, Pages 1-12.16. Raghumathan S. (2007). Protecting Antivius S<strong>of</strong>twareUnder Viral Attacks Master Thesis, Arizona StateUniversity, USA.17. Sathyanarayan V., S. Pankaj K and Bezawada B (2008).Signature Generation and Detection <strong>of</strong> Malware families,Springer-Verlag, Berlin Heidelberg, Pages 336-349.18. Sekar R., Bendre M., Dhurjati D. and Bollineni P. (2001).A fast Automaton-Based Method for DetectingAnomalous Program Behaviours, <strong>IEEE</strong> Symposium onSecurity and Privacy, California, Pages 144-155.19. Shakeel A (2009). Reversing The Malware: A Manualand Automated Detection Approach, Prima InfosaranaMedia, PT (InfoKomputer).20. Uluski D., M<strong>of</strong>fie and Kaeli D (2005). CharacterizingAntivirus Workload Execution, ACM SIGARCH<strong>Comp</strong>uter Architecture News, Vol. 33, No. 1, Pages 90-98.21. Varun C., Arindam B and Vipin K (2009). AnomalyDetection: A Survey, ACM <strong><strong>Comp</strong>uting</strong> Surveys.Authors’ BriefOsaghae Edgar obtained B.Sc and M.ScDegrees in <strong>Comp</strong>uter Science fromUniversity <strong>of</strong> Benin, Benin city, Nigeria. Heis also a Doctoral student in <strong>Comp</strong>uterScience <strong>of</strong> the same University. He ispresently a lecturer in the Department <strong>of</strong><strong>Comp</strong>uter Science, University <strong>of</strong> PortHarcourt, Rivers State, Nigeria. His main research interest is<strong>Comp</strong>uter security, formal verification methods, and <strong>Comp</strong>uterAlgorithms.Pr<strong>of</strong>. (Mrs.) Stella Chinye CHIEMEKEis a Pr<strong>of</strong>essor <strong>of</strong> <strong>Comp</strong>uter Science andcurrently the Director <strong>of</strong> UNIBEN ICTCentre, University <strong>of</strong> Benin, Benin City,Nigeria. Her teaching and researchinterests spans from s<strong>of</strong>twareengineering to industrial application <strong>of</strong>ICT. She is a member <strong>of</strong> theInternational Association <strong>of</strong> Engineers (IAENG), <strong>Comp</strong>uterPr<strong>of</strong>essional <strong>of</strong> Nigeria (CPN,)Nigeria <strong>Comp</strong>uter Society (NCS),International Network for Woman Engineers and Scientists(INWES) Canada etc.48


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netJust another Harmless Click <strong>of</strong> the Mouse ?An Empirical Evidence <strong>of</strong> Deviant Cyber Space Behaviour Using an Online TrapP. DanquahLecturer - Pentecost University College, Accra, GhanaDoctoral Candidate – Accra Institute <strong>of</strong> Technology, Accra, Ghanapadanquah@ait.edu.ghO.B. Longe PhDFulbright Fellow & Research ScholarSouthern University SystemSouthern University, Baton Rouge, USAlongeolumide@fulbrightmail.orgFred TotimehLecturer - Pentecost University CollegeAccra, Ghanaftotimeh@pentvars.edu.ghABSTRACTWe seek to understand cyber victimization by determining what users do online that makes them vulnerable to different forms <strong>of</strong> cyberattacks. We set up an online trap platform that presents users with legal and illegal contents and see whether people who visited theplatform for the purposes <strong>of</strong> gaining access to legal material would also attempt to access illegal and/or pornographic material. We thenempirically observed the behaviour <strong>of</strong> users with emphasis on those who attempted to indulge in cyber criminal activities. The onlinestatistical tool AWStats is used in addition to a specially developed platform called “resourcefulminds.com”. Premised on a similarresearch by Silke and Demetriou (2003), findings from our study and analysis <strong>of</strong> the study population showed that 76% <strong>of</strong> usersaccessing both legal and illegal material and 10% restricting their access to just legal and 6% accessed just illegal material. 8% <strong>of</strong> usersdid not access any material beyond the homepage. Two significant phenomena were the observation that half the total number <strong>of</strong>registered users registered via crime related links and over 77% <strong>of</strong> users who visited the website were only on the site for less than 30seconds. Our findings <strong>of</strong>fer insights into why users are victimized online.Keywords: Online deviant bevaviour, cybercrime, deindividuation.1. INTRODUCTIONCyber crimes are criminal activities that are perpetrated usingcommunication networks such as the Internet, telephone,wireless, satellite, and mobile networks are known as cybercrimes [1]. Cyber crime may consequently be defined to coversall sorts <strong>of</strong> crimes committed with computers–from viruses,trojan horses, from hacking into private email to underminingdefense and intelligence systems, from electronic thefts <strong>of</strong> bankaccounts to disrupting web sites. Scholars have categorizedcyber crime in its various forms as follows:<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT Reference Format:P. Danquah, O.B. Longe & F. Totimeh (2012). Just anotherHarmless Click <strong>of</strong> the Mouse ? - An Empirical Evidence <strong>of</strong>Deviant Cyber Space Behaviour Using an Online Trap. <strong>Afr</strong> J. <strong>of</strong><strong>Comp</strong> & <strong>ICTs</strong>. Vol 5, No. 3. pp 49-56© <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT May, 2012- ISSN 2006-1781• Cyber-Trespass: This involves crossing boundariesinto other people's property and/or causing damage,eg- hacking, defacement and viruses• Cyber-Deceptions and Theft: This type <strong>of</strong> cyber crimeinvolves stealing (money,property), eg-credit cardfraud,intellectual property violation, piracy• Cyber-Pornography: These are activities that breachlaws on obscenity and decency• Cyber Violence: This involves causing psychologicalharm to, or inciting physical harm against others,thereby breaching laws pertaining to the protection <strong>of</strong>the person. eg- hate speech [2][3]Our efforts in this paper is directed at developing a scheme tounderstand cyber victimization by determining what users doonline that makes them vulnerable to different forms <strong>of</strong> cyberattacks. Our approach is to set up a platform that presents userswith legal and illegal contents and see whether people whovisited the platform for the purposes <strong>of</strong> gaining access to legalmaterial would also attempt to access illegal and/or49


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netpornographic material. These methodology is then used to alsodetermine the background or pr<strong>of</strong>ile <strong>of</strong> users who typicallycommit cyber crimes as compared to those who are law abidingonline.The remaining parts <strong>of</strong> this paper is organized as follows. Insection 2, we explore related works in the domain <strong>of</strong> cybercrime. Section 3 presents the methodology adopted for theresearch. This is followed by section 4 where results arepresented and analysed. We ended the paper in section 5 withconcluding remarks.2. RELATED WORKSIn a much broader sense, cyber crime is a term that coversall sorts <strong>of</strong> crimes committed with computers. In [5], it wasdefined as just crimes over the Internet. The Brennerpublications <strong>of</strong> 2004 unveiled some unique characteristics<strong>of</strong> cyber crime that is usually present when cyber crimesare committed. These distinguishing characteristics areexplained below.• Transnational Nature and Jurisdictional Issues:Cybercrime spills over national borders particularly inthe matter <strong>of</strong> deciding which jurisdiction such crimeshould fall under. The law is not always prepared formeeting the demands <strong>of</strong> globalization as its crossbordercharacter creates a need for improved crossborderlaw enforcement. Attacks can also be designedsuch that they appear to be originating from sources.[6]• Proximity and Physical Constraints: The constraintsthat govern action in the real world, physical world donot restrict perpetrators <strong>of</strong> cyber crime. Cyber crimescan be committed instantaneously and thereforerequire a rapid response: law enforcement, however isaccustomed to dealing with real-world "crimes," theinvestigation <strong>of</strong> which proceeds at a more deliberatespace" [7] . Unlike real world crime, cyber crimes donot require any degree <strong>of</strong> physical proximity betweenthe victim and victimizer.• Scale, Velocity and Multiple Victimization: Cybercrime is different because it is automated crime.Whereas a real or terrestrial world fraudster wouldneed to manually defraud different people individuallyat different times, a cyber fraudster can automate theprocess defrauding many victims simultaneously andwith essentially the same effort via technology. Theautomation gives the perpetrators the ability to commitmany cyber crimes very quickly[8].• Perfect Anonymity: Cyberspace also provides roomfor perpetrators to conceal or disguise their identitiesin a way that is not possible in the real world. [9] [10].In the real world, an <strong>of</strong>fender can wear a mask andperhaps take other efforts to conceal his identity, butcertain characteristics such as height, weight, accent,and age - will still be apparent. In cyberspace one canachieve much perfect anonymity; a man can be awoman, a woman can be a man, a child can be anadult, a foreigner can pass for a native, all <strong>of</strong> whichmakes the apprehension <strong>of</strong> cyber criminals difficult.One essential theory that has linked behaviour with cyber crimeis the Space transition theory [11], the theory argues that, peoplebehave differently when they move from one space to another.The postulates <strong>of</strong> the theory are:1. Persons, with repressed criminal behavior (in thephysical space) have a propensity to commit crime incyberspace, which, otherwise they could not commitin physical space, due to their status and position.2. Identity Flexibility, Dissociative Anonymity and lack<strong>of</strong> deterrence factor in the cyberspace provides the<strong>of</strong>fenders the choice to commit cyber crime3. Criminal behavior <strong>of</strong> <strong>of</strong>fenders in cyberspace is likelyto be imported to Physical space which, in physicalspace may be exported to cyberspace as well.4. Intermittent ventures <strong>of</strong> <strong>of</strong>fenders in to the cyberspaceand the dynamic spatio-temporal nature <strong>of</strong> cyberspaceprovide the chance to escape.5. (a) Strangers are likely to unite together incyberspace to commit crime in the physicalspace.(b) Associates <strong>of</strong> physical space are likely tounite to commit crime in cyberspace.6. Persons from closed society are more likely to commitcrimes in cyberspace than persons from open society.7. The conflict <strong>of</strong> Norms and Values <strong>of</strong> Physical Spacewith the Norms and Values <strong>of</strong> cyberspace may lead tocyber crimes.This theory was further developed and modeled to become theSpace Transition Model with specifically derived variables thatcan be tested to determine if it forms a reliable basis for testing.The variables were tatus, anonymity, deterrence factor, open orclosed society and physical or cyber world associates. [12]. [13]remarked that online users who commit crime are usuallyconcerned about their social status in the physical world but arenot bothered about their status in the cyberspace because there isno one to watch and stigmatize them.50


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net3. METHODOLOGYThe website was named Resourceful Minds with the addresshttp://www.resourcefulminds.com and monitored over a sixmonth period. It was an experimental case study developed withthe use <strong>of</strong> HTML and PHP with embedded SQL scripts andhosted on a Linux server running Apache as the webserver andMySQL as the database.The links provided on the website included the following;Home: This link displayed and looped to the initial homepagewhich provided access to all links on the website.Stolen Passwords: This link was not a genuine one and did notwork, it rather asked one to register to gain access tomore details and in the process only collectedinformation about the user and displayed a messageNews:asking the user to try next time.This link provided users access to a page that providedaccess to news websites such as www.bbc.co.uk andwww.cnn.comPornography (child): This link was not a genuine one and didnot work, it rather asked one to register to gain accessto more details and in the process only collectedinformation about the user and displayed a messageasking the user to try next time.Academics: This provided users access to online libraries andresourceful academic material.Inspiration: This provided users to online motivationalspeeches and inspirational quotes.Illegal Shareware: This link was not a genuine one and did notwork, it rather asked one to register to gain access tomore details and in the process only collectedinformation about the user and displayed a messageasking the user to try next time.Disclaimer: This link provided access to a disclaimer statementabout access to the website.Usable Credit Cards: This link was not a genuine one and didnot work, it rather asked one to register to gain accessto more details and in the process only collectedinformation about the user and displayed a messageasking the user to try next time.S<strong>of</strong>tware Cracks: This link was not a genuine one and did notwork, it rather asked one to register to gain access tomore details and in the process only collectedinformation about the user and displayed a messageasking the user to try next time.Illegal Games Download: This link was not a genuine one anddid not work, it rather asked one to register to gainaccess to more details and in the process onlycollected information about the user and displayed amessage asking the user to try next time.Registration: The registration link was accessible from everypage and it provided users access to the registrationform. The system could however log the exact pagefrom which a registration was done via the a memoryvariable which stored the name <strong>of</strong> the accessed link.The database was modeled using the conceptual modelingmethod which was translated into a relational schema and theultimately a physical database as explained in [14].Participants were recruited via e-mail notification andadvertisement on facebook.com, click patterns were trackedbased on unique session identification numbers and activities onthe website where as registration count was based on uniqueidentification accounts. It needs to emphasized that this didguarantee that specific individuals could not register more thanonce using different identification.Every user who accessed the website for the first time wasassigned a unique session identification number, subsequently,every link that was clicked was stored in a memory variable wasdeclared for the purpose <strong>of</strong> tracking every single accessed pageby the users. The accessed links are stored hence all users couldbe tracked to determine all accessed pages on the website whilethe session lasted.4. RESULTS AND ANALYSISPresented below are the data showing different types <strong>of</strong>activities that users engage in on the “RESOURCEFULMINDS”website. Explanation are <strong>of</strong>fered for each table contents at theend <strong>of</strong> the set <strong>of</strong> tablesTable 1: Source <strong>of</strong> Access (Top 16 Countries)Countries Pages Hits BandwidthGhana Gh 1,634 6,349 51.18 MBUnited States Us 606 1,130 7.69 MBEuropean country Eu 56 58 281.76 KBGermany De 35 138 1.06 MBNorway No 23 83 862.27 KBGreat Britain Gb 22 122 1.18 MBRussian Federation Ru 7 37 448.93 KBCanada Ca 4 18 219.76 KBNew Zealand Nz 4 34 355.48 KBHungary Hu 2 16 210.86 KBSouth <strong>Afr</strong>ica Za 2 16 210.86 KBFrance Fr 2 2 8.91 KBIndia In 2 16 210.86 KBSenegal Sn 2 16 210.79 KBJapan Jp 1 1 4.45 KBNigeria Ng 1 8 105.43 KBOthers 0 0 0Source: AWStats Analysis51


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netMonthTable 2: Monthly Statistics <strong>of</strong> AccessUniquevisitorsNumber<strong>of</strong> visitsPages Hits BandwidthJan 2011 0 0 0 0 0Feb 2011 0 0 0 0 0Mar 2011 0 0 0 0 0Apr 2011 0 0 0 0 0May 2011 18 24 68 349 2.56 MBJun 2011 89 214 641 2,848 23.35 MBJul 2011 44 157 684 1,930 14.44 MBAug 2011 30 128 237 668 5.47 MBSep 2011 59 187 593 1,748 14.41 MBOct 2011 29 106 178 490 3.82 MBNov 2011 0 0 0 0 0Dec 2011 0 0 0 0 0Total 269 816 2,401 8,033 64.17 MBSource: AWStats AnalysisTable 3: Access Robots11 different robots Hits Bandwidth Last visit08 Nov 2011Googlebot 496 2.31 MB- 03:55Yahoo Slurp 204 1.83 MBUnknown robot (identifiedby 'bot*')Unknown robot (identifiedby 'spider')Unknown robot (identifiedby empty user agentstring)Unknown robot (identifiedby '*bot')Unknown robot (identifiedby 'crawl')171 709.33 KB158 711.30 KB74 809.82 KB44 166.21 KB6 26.72 KBNetcraft 5 22.27 KBAlexa (IA Archiver) 3 13.36 KBUnknown robot (identifiedby 'scanner')2 8.91 KBUnknown robot (identified1 4.45 KBby 'robot')Source: AWStats Analysis26 Oct 2011- 10:4808 Nov 2011- 05:4007 Nov 2011- 19:1628 Oct 2011- 05:1922 Oct 2011- 23:5511 Oct 2011- 08:1229 Oct 2011- 01:1305 Oct 2011- 10:5725 Sep 2011- 03:5403 Jun 2011- 09:45Table 4: Average Duration <strong>of</strong> VisitsNumber <strong>of</strong> visits: 818 - NumberPercentAverage: 169 s <strong>of</strong> visits0s-30s 636 77.7 %30s-2mn 49 5.9 %2mn-5mn 44 5.3 %5mn-15mn 49 5.9 %15mn-30mn 17 2 %30mn-1h 21 2.5 %1h+ 2 0.2 %Source: AWStats Analysis/register.php 301 7.68 KB 1 24/index.php 196 4.45 KB 30 42/loginz.php 178 2.99 KB 3 8/academics.php 134 4.02 KB 1 35/porn.php 120 4.12 KB 3 14/news.php 92 5.68 KB 4 15/cards.php 75 2.78 KB 2 8/cracks.php 75 4.80 KB 2 10/hackedapp.php 70 2.06 KB 1 6/shareware.php 66 4.16 KB 2 7/hackedgam.php 63 2.96 KB 6/inspiration.php 57 3.59 KB 1 8/notes/ 37 82 Bytes 3 16Table 5: Regularly Accessed Links (Files)17 different pagesurlsizeAverageViewedEntry Exit/ 852 2.09 KB 750 599/cgisys/suspendedpage.cgi36 3.55 KB 15 15/passwords.php 35 3.43 KB 3/disclaimer.php 16 4.56 KB 2Source: AWStats AnalysisTable 6: Users’ Operating System PlatformsOperating Systems Hits PercentWindows 6,553 81.4 %Unknown 680 8.4 %Java Mobile 346 4.3 %BlackBerry 193 2.3 %Macintosh 156 1.9 %Linux 104 1.2 %Java 12 0.1 %Source: AWStats Analysis52


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netTable 7: Users’ BrowsersBrowsers Grabber Hits PercentMS Internet Explorer No 3,182 39.5 %Firefox No 2,319 28.8 %Google Chrome No 1,094 13.6 %Unknown ? 554 6.8 %Opera No 512 6.3 %BlackBerry (PDA/Phone browser) No 185 2.2 %Safari No 130 1.6 %Mozilla No 26 0.3 %Nokia Browser (PDA/Phone browser) No 14 0.1 %LG (PDA/Phone browser) No 12 0.1 %Others 16 0.1 %Source: AWStats AnalysisTable 8: Referral SourcesOrigin Pages Percent Hits PercentDirect address / Bookmark / Link in email... 870 91.2 % 1,001 92.3 %Links from an Internet Search Engine - Full list- Google 32 / 32- Yandex 7 / 7- Micros<strong>of</strong>t Bing 1 / 1- Yahoo! 1 / 141 4.3 % 41 3.7 %Links from an external page (other web sites except search engines) - Full list- http://www.facebook.com/l.php 9 9- http://ait-open.net/elearning/mod/assignment/view.php 8 8- http://m.facebook.com/l.php 3 3- http://3cp9lcoq32dpn.yom.mail.yahoo.com/om/api/1.0/openmail.app.... 2 2- http://us.mg1.mail.yahoo.com/dc/blank.html 2 2- http://us.mc1202.mail.yahoo.com/mc/showMessage 2 2- http://www.asianefficiency.com/wp-admin/admin.php 1 1- http://us.mg3.mail.yahoo.com/dc/launch 1 1- http://uk.mc295.mail.yahoo.com/mc/welcome 1 1- http://us.mg1.mail.yahoo.com/neo/launch 1 1- http://www.text-link-ads.com 1 1- http://us.mg5.mail.yahoo.com/neo/launch 1 1- http://uk.mg6.mail.yahoo.com/dc/launch 1 1- http://us.mg5.mail.yahoo.com/dc/launch 1 1- http://whm.joykacatering.com/scripts2/suspendacct 1 1- http://uk.mg40.mail.yahoo.com/dc/blank.html 1 1- http://us.mg4.mail.yahoo.com/dc/launch 1 1- http://www.if-20.com 1 1- http://36ohk6dgmcd1n.yom.mail.yahoo.net/om/api/1.0/openmail.app.... 1 1- http://heritagemp.com 1 1- http://us.mg4.mail.yahoo.com/dc/blank.html 1 1- http://www.orangeask.com 1 142 4.4 % 42 3.8 %Unknown OriginSource: AWStats Analysis53


Vol 5. No. 3, May, 20122006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netISSNTable 9: Search Key Phrases17 different keywords Search Percentresourcefulminds.com 13 27.6 %www.resourcefulminds.com 10 21.2 %resourcesfulminds.com 3 6.3 %Time 2 4.2 %Resourceful 2 4.2 %Wast 2 4.2 %http 2 4.2 %Contained 2 4.2 %Information 2 4.2 %minds.com 2 4.2 %In 1 2.1 %resoucefulminds.com 1 2.1 %www.resourefulminds.com 1 2.1 %Account 1 2.1 %//resourcefulminds.com/ 1 2.1 %Suspended 1 2.1 %//www.resourcefulminds.com/ 1 2.1 %Source: AWStats AnalysisTable 10: Distribution <strong>of</strong> Session Identification AccessAccess Patterns based on Session IdentificationAccess Category Total Number PercentageAccessedCrime Related 20 6 %Access (Only)Resourceful Non- 26 10 %Crime RelatedAccess (Only)Both Crime and 193 76%Non-CrimeRelated AccessHome Page Only 22 8%Total 259 100 %Source: Resourceful Minds Tracking DatabaseTable 11: Distribution <strong>of</strong> Registered UsersLINKSNo. <strong>of</strong> PercentageRegistrationsSharewares 4 7 %Usable Credit6 11 %CardsChild9 16 %PornographyGood Resourceful 28 50 %Material(Non-CrimeRelated)Stolen Passwords 1 2 %Illegal Games5 9 %DownloadS<strong>of</strong>tware Cracks 4 7 %Source: Resourceful Minds Tracking DatabaseTables 1 shows that about 70% <strong>of</strong> hits to the site was fromGhana with the rest spread across the world, table 2 on theother hand shows that the peak <strong>of</strong> access was in June <strong>of</strong>2011. Googlebot turned out to provide the highest number<strong>of</strong> hits as depicted in table 3 with over 77% <strong>of</strong> hits on thesite lasting less that 30 seconds as shown in table 4. Table 5showed that the most regularly accessed link was theregistration link with the least accessed being thedisclaimer.Majority <strong>of</strong> users turned to be Micros<strong>of</strong>t Windows usersand the most commonly used browser was InternetExplorer as shown in tables 6 and 7 respectively. Majority<strong>of</strong> referrals were from google searches and yahoo mails asdepicted in table 8 with keywords such as time andresourceful being the exact strings that lead to the page asshown in table 9.Fig 1: Distribution <strong>of</strong> Hits on the SiteSource: Resourceful Minds Tracking Database54


Vol 5. No. 3, May, 20122006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netISSNTable 10 shows that about 76% <strong>of</strong> users accessed links thatwere both crime and non-crime related. Just about 6%accessed solely for crime related purposes. Table 11 furthershows that 50% <strong>of</strong> registered users did so via crime relatedlinks and the same was the case for non crime related links.The results indicate that over 70% <strong>of</strong> access to the websiteoriginated from Ghana and the United States most usersaccessing the sites directly with very limited access fromreferral sources and robots. The largest referral sourceswere facebook and googlebot. The most used search keyphrase was resourceful minds, it is understandably so dueto the method <strong>of</strong> recruiting participants. A striking trendwhich is worth noting is the fact that over 77% <strong>of</strong> userswho visited the website were only on the site for less than30 seconds. A significant number <strong>of</strong> users accessed fromMicros<strong>of</strong>t Windows platform and also used the browsersInternet Explorer and Mozilla.The result also indicates that the most regularly accessedlinks on the site were the “Homepage” and “register” links,nonetheless, a small percentage <strong>of</strong> users actually registeredto gain access to more resources. Ironically, 50 % <strong>of</strong>registered users accessed good resourceful materialwhereas 50 % registered as a result <strong>of</strong> crime relatedmaterial as shown in Table 11. Given the results in Table10 which revealed that 76% <strong>of</strong> users accessed both goodresourceful material and crime related material, this impliesmajority <strong>of</strong> users would indulge in crime related material ifit is made available.5. CONCLUDING REMARKSThis research has shown three categories <strong>of</strong> users on thewebsite, these are those who accessed crime related sitesonly, users who accessed resourceful non-crime relatedmaterial and lastly users indulged in both crime and noncrimerelated material. A significant phenomenon was theobservation that half the total number <strong>of</strong> registered usersregistered via crime related links. This phenomenonconfirms [14] assertion that as more people become aware<strong>of</strong>, and exposed to, a range <strong>of</strong> opportunities to commitvarious illegal and socially questionable behaviours, thetotal number <strong>of</strong> cyber crimes is very much likely toincrease in number.REFERENCES[1] Srinivasan M. L., (2008). CISSP in 21 Days. pp.245Packet shers .[2] Wall, D. S. 2001. “Cybercrimes and the Internet.”In Crime and the Internet, edited by D.Wall, London, Routledge.[3] Yar, M (2005). The novelty <strong>of</strong> cybercrime: Anassessment in light <strong>of</strong> routine activity theory.European <strong>Journal</strong> <strong>of</strong> Criminology 2(4): 407-27[4] Katyal, N.K., (2001). Criminal Law inCyberspace, University <strong>of</strong> PennsylvaniaLaw Review, Volume 149 pp. 1003-1114[5] Picker, R.C., 2004, CyberSecurity: OfHeterogeneity and Autarky, John M. OlinLaw & Economics Working Paper No. 223 (2DSeries)[6] McConnell Cyber Crime Report (2000), ”CyberCrime and Punishment? Archaic LawsThreaten Global Information” December2000. A report. Retrieved fromhttp://www.mcconnellinternational.com/services/cyber crime.htm[7] Brenner, S.W. (2004b), Toward a criminal lawfor cyberspace, Distributed Security.Boston University <strong>Journal</strong> <strong>of</strong> Science &Technology Law 10 (2).[8] IPWatchdog.com 2003. About cybercrime.IPWatchdog website. Retrieved December 15 th2006, fromhttp://www.engaust.com.au/ew/12crime.html[9] Brenner, S. W. (2002). The privacy privilege:Law enforcement, technology and theconstitution. <strong>Journal</strong> <strong>of</strong> Technology Lawand Policy 7 (2) 123-94.[10] Post, D.G. 1996. Pooling Intellectual capital:Thoughts on anonimity, pseudonymity,and limited liability in cyberspace, 11.University <strong>of</strong> Chicago Legal Forum 139: 149-52. Retrieved December 15th 2006, fromhttp://www.temple.edu/lawschool/dpost/pseudonym.ht ml[11] Jaishankar K., (2008), Space Transition Theory<strong>of</strong> Cyber Crimes, Crimes <strong>of</strong> the Internet,Pearson, ISBN- 13:978-0-13-231886-0pp.283-29955


Vol 5. No. 3, May, 20122006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netISSN[12] Danquah P., Longe O., (2011), An Empirical Test<strong>of</strong> the Space Transition Theory, <strong>IEEE</strong><strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong>, Volume 4 No. 2pp 37-48[13] Arbak, E. (2005), Social status and crime.Documents De Travail – Working PapersW.P. 5-10, November 2005, GATEGroupe d’Analyse et Theorie Economique Ecully– France[14] Beynon-Davies P. (2004). Database Systems.Houndmills, Basingstoke, UK: PalgraveAuthors’ BriefsMr. Fred Totimeh is anLecturer at Pentecost UniversityCollege Ghana, with over twentyyears industry experience as an ITManager and a Programmer withGhana Prisons Service and Office <strong>of</strong>the Ghanaian President respectively,he is a Masters Degree student inInformation Technology at SikkimManipal University. He holds a Bsc. HONS in <strong>Comp</strong>uterScience degree and Postgraduate Certificate in BusinessAdministration. He can be reached at ftotimeh@yahoo.com.Paul Asante Danquah is aLecturer with the Faculty <strong>of</strong> IT,Pentecost University College. Hishas a background <strong>of</strong> MScInformation Security from AngliaRuskin University (UK), BScHONs in <strong><strong>Comp</strong>uting</strong> from theUniversity <strong>of</strong> Greenwich (UK),Graduate Diploma in MIS and the pr<strong>of</strong>essionalcertifications MCSE and CCNP. He is a PhD candidateunder the supervision <strong>of</strong> Dr. Longe Olumide at the AccraInstitute <strong>of</strong> Technology, Ghana. Name: He can be reachedat padanquah@ait.edu.gh.Dr. Longe Olumide is on Faculty atthe Department <strong>of</strong> <strong>Comp</strong>uterScience, University <strong>of</strong> Ibadan,Nigeria. His research has focused onusing social theories and computersecurity theories to explaincausastion and apprehension <strong>of</strong> cybercrimes. He is currently a FulbrightFellow at the International Centre forInformation Technology & Development, College <strong>of</strong>Business, Southern University’ , Baton Rouge, LA, USA.He can be reached by phone on +18572078409 andthrough E-mail longeolumide@fulbrightmail.org56


Vol 5. No. 3, May, 20122006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netISSNThe <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICTS.Call for PapersThe <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> and ICT (AJCICT) wasestablished by the Nigeria <strong>Comp</strong>uter section <strong>of</strong> the Institute<strong>of</strong> Electrical and Electronics Engineers (<strong>IEEE</strong>) Inc, NewYork, USA. <strong>Afr</strong>. J <strong>of</strong> <strong>Comp</strong> and ICT publishes both onlineand print editions in April, August, December. The<strong>Journal</strong> solicits original research articles frominterested authors for her upcoming editions. The goal<strong>of</strong> the journal is to contribute to rapid IT developments inNigeria, <strong>Afr</strong>ica and the world through the publication <strong>of</strong>topical and relevant papers from theoretic/academic andpractical / industrial points <strong>of</strong> view. Submitted papersshould contain substantial ideas which have the potential <strong>of</strong>aiding an invention or a technological breakthrough forgeneral and specialized use .SCOPE OF ARTICLESPapers are welcome from pure/applied computing and ICT,and allied areas including but not limited to s<strong>of</strong>twareengineering, computer communication/networks, humancomputer interaction, data mining, discrete/data structures,design & analysis <strong>of</strong> algorithms, web security, systemsarchitecture, ubiquitous computing, systems design,information systems, bioinformatics, informationmanagement, information science and e-systems (e-health,e-learning, e-government).The journal considers original research papers, case reportsand review papers. Authors must clearly justify theimportance <strong>of</strong> their submission to the readership <strong>of</strong> thejournal. Prospective authors need not be a member <strong>of</strong> the(<strong>Comp</strong>uter Chapter) <strong>IEEE</strong> Nigeria Section before his/ herpaper is published. All papers are peer refereed andauthors <strong>of</strong> accepted paper(s) will be required to signcopyright forms before papers are published. TheAJCICT Publication guideline is on the next page(s).SUBSCRIPTION DETAILSPagination Fees and Information for Subscribers AndAdvertisersAuthors <strong>of</strong> accepted papers will be charged a pagination fee<strong>of</strong> $150 (N20000). The subscription fee for yearly volumes<strong>of</strong> the journal to institutions and organizations is US 200(N30000 Naira) excluding postage. Copies <strong>of</strong> individualvolumes can be obtained at a cost <strong>of</strong> $50 (N5000)Correspondence on paper publications, book review,subscription and advertisement should be directed to theDr. Longe Olumide, Vice Chairman, <strong>IEEE</strong> <strong>Comp</strong>uterSection Nigeria and Managing Editor, <strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong>ICT. Request for information pertaining to the <strong>Comp</strong>uterChapter <strong>of</strong> the <strong>IEEE</strong> Nigeria Section should be sent to theChair <strong>of</strong> the Chapter, Pr<strong>of</strong>. ‘Dele Oluwade (bamideleoluwade@computer.org ).General information on the aim and objective as well asmembership <strong>of</strong> <strong>IEEE</strong>, <strong>IEEE</strong> <strong>Comp</strong>uter Society and the<strong>IEEE</strong> Nigeria Section can be found on the followingwebsites respectively: http://www.ieee.org ; http://computer.org ; http://www.ieee.org/nigeria.57


Vol 5. No. 3, May, 20122006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netISSNPublication Template<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> Of <strong><strong>Comp</strong>uting</strong> and ICT <strong>IEEE</strong> Nigeria – <strong>Comp</strong>uter Section <strong>Journal</strong>Paper Title (font Size 24)Space (14 points font size)Author’s names (12 Points Font Size Bold )Affiliations (10 Points Font Size )E-mal Address and Phone Numbers (10 Points Font Size Italicize )ALL SECTIONS ABOVE IN A SINGLE COLUMN FORMATAbstractThis electronic document is a “live” template. The various components <strong>of</strong> your paper [title, text, heads, etc.] are alreadydefined on the style sheet, as illustrated by the portions given in this document.Keywords- component; formatting; style; styling; insert1. INTRODUCTIONAll manuscripts must be A4 size paper, one inch top and bottommargin and 0.75 left and right margins. It should be written inEnglish. These guidelines include complete descriptions <strong>of</strong> thefonts, spacing, and related information for producing yourmanuscripts for publication. Follow the style in this template forpreparing your articles/papers/manuscripts for submission.2. TYPE STYLE AND FONTSTimes New Roman 10 points is the acceptable font fortypesetting the entire body <strong>of</strong> the manuscript. If this is availableon your word processor, please use the font closest in appearanceto Times. Pictures and graphics, preferably in Jpeg format orBitmap format can be embedded as well as mathematical andscientific symbols. Equations should be numbered andacronyms/abbreviations should be explained /defined or writtenfully on first use.4. TABLES AND FIGURESTable headings/titles should be written above the tables. Figureheadings should be written below the tables. These titles shouldproceed sequentially within the body <strong>of</strong> the text. Fig. 1 for thefirst figure, the next Fig 2 etc. Figures should not be numberedbased on subsections <strong>of</strong> the manuscripts. Tables should also belabeled in the same sequence. Centralize Figures. Align Tables tothe LEFT.Table 1: How To Set TablesTableTable Column HeadHead Table column subhead Subhead Subheadcopy More table copy a Source – [5]3. CITATIONS IN THE BODY OF THE WORKReferencing style in the body <strong>of</strong> the work should use square [7 ]braces. Works cited should be listed in thebibliograpghy/referencing section at the end <strong>of</strong> the paperchronologically. Footnotes are not encouraged.3.1 Main and Sub-HeadingsMain Headings should be in UPPERCASE and proceeded by apoint number. For Sub-Headings, use toggle case – or capitalizethe first letter <strong>of</strong> each sentence/sub heading. Sub headings shouldbe bold and italicised. Provide a space between each section andsub-sections.3.3 ColumnsSubmission MUST follow the two column format depicted in thisdocument. Equal width <strong>of</strong> 3.38cm and column spacing <strong>of</strong> 2.5cm.Lines are not allowed between columns. Where necessary orunavoidable, the two column format can be merged to a columnto accommodate pictures, tables or graphics.Figure 1. Example <strong>of</strong> a figure Caption4.1 UnitsThe SI Unit is the acceptable Unit for specifying scientificmeasurements in this journal.3.4 ParagraphingThe block structure is adopted for this journal.58


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.net4.2 EquationsAuthors are encouraged to use the equation editor facilitiesprovided in MS Word to prepare equations for the manuscript. Invery extreme situations, you may use either the Times NewRoman or the Symbol font (please no other font) to prepareequations for publications. To create multileveled equations, itmay be necessary to treat the equation as a graphic and insert itinto the text after your paper is styled. Equations should benumbered equations consecutively. Equation numbers, withinparentheses, are to position flush right, as in (1), using a right tabstop. To make your equations more compact, you may use thesolidus ( / ), the exp function, or appropriate exponents. ItalicizeRoman symbols for quantities and variables, but not Greeksymbols. Use a long dash rather than a hyphen for a minus sign.Punctuate equations with commas or periods when they are part<strong>of</strong> a sentence. For example:Align equations to the left.AcknowledgementA section on acknowledgement for sponsored research,collaborations, funds, grants/ other research material sourcesREFERENCESList and number all bibliographical references in 10 point Times,single-spaced, at the end <strong>of</strong> your paper. When referenced in thetext, enclose the citation number in square brackets, for example[1] where appropriate, include the name(s) <strong>of</strong> editors <strong>of</strong>referenced books.Unless there are more than 3 authors or more give all authors’names; do not use “et al.”. Papers that have not been published,even if they have been submitted for publication, should not becited [4]. Papers that have been accepted for publication shouldbe cited as “in press” [5]. Capitalize only the first word in a papertitle, except for proper nouns and element symbols. For paperspublished in translation journals, please give the English citationfirst, followed by the original foreign-language citation [6].[1] G. Eason, B. Noble, and I. N. Sneddon, “On certainintegrals <strong>of</strong> Lipschitz-Hankel type involving products <strong>of</strong>Bessel functions,” Phil. Trans. Roy. Soc. London, vol.A247, pp. 529–551, April 1955. (references)[2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism,3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.[3] I. S. Jacobs and C. P. Bean, “Fine particles, thin films andexchange anisotropy,” in Magnetism, vol. III, G. T. Radoand H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.[4] K. Elissa, “Title <strong>of</strong> paper if known,” unpublished.[5] R. Nicole, “Title <strong>of</strong> paper with only first word capitalized,”J. Name Stand. Abbrev., in press.[6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electronspectroscopy studies on magneto-optical media and plasticsubstrate interface,” <strong>IEEE</strong> Transl. J. Magn. Japan, vol. 2,pp. 740–741, August 1987 [Digests 9th Annual Conf.Magnetics Japan, p. 301, 1982].[7] M. Young, The Technical Writer’s Handbook. Mill Valley,CA: University Science, 1989.[8] Electronic Publication: Digital Object Identifiers (DOIs):Article in a journal:Template Adapted from -http://www.computer.org/portal/web/cscps/frmatting59


Vol 5. No. 3, May, 2012 ISSN 2006-1781<strong><strong>Afr</strong>ican</strong> <strong>Journal</strong> <strong>of</strong> <strong><strong>Comp</strong>uting</strong> & ICT© 2012 <strong>Afr</strong> J <strong>Comp</strong> & ICT – All Rights Reservedwww.ajocict.netVolume 5. No. 2. March, 2012All Rights Reserved© 2012Published for the Institute <strong>of</strong> Electrical & Electronics Engineers (<strong>IEEE</strong>)Nigeria Section <strong>Comp</strong>uter ChapterByThe Trans-Atlantic Management Consultants2580 Fairham DriveBaton Rouge LA, USAFor further enquiries please contactDr. Longe OlumideDepartment <strong>of</strong> <strong>Comp</strong>uter ScienceUniversity <strong>of</strong> IbadanIbadan, NigeriaEmail: submissions@ajocict.net or longeolumide@fulbrightmail.orgTel: +2348024071175USA – Contact InformationDr. Longe OlumideFulbright SIR FellowInt. Centre for IT and DevelopmentSouthern University SystemBaton Rouge, Louisiana, USAEmail: submissions@ajocict.net or longeolumide@fulbrightmail.orgTel: +1857207840960

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!