Volume 6, Issue 2

Improved Early Detection of Gestational Diabetes via Intelligent Classification Models: A Case of the Niger Delta Region in Nigeria
Original Research
Diabetes is the most common endocrine-metabolic disorder that features a body characterized by hyperglycaemia – giving rise to risk of microvascular (retinopathy, neupathy and nephropathy) and microvascular (vascular disease, stroke and ischemic heart diseases). Nigeria has become aware of inherent threats of the Type-II diabetes and the consequent metamorphism into gestational diabetes in mothers with or without previous cases of Type-II. We presents a comparative study of classification models using both the supervised and unsupervised evolutionary models. We aim at improved early detection of the disorder via data-mining tools. Adopted dataset is from College of Health and Teaching Hospitals with selected Universities in Niger Delta. Results show that age, body mass index, family ties to second degree, environmental conditions of inhabitance among others are critical factors that increases its likelihood. Gestational diabetes in mothers were confirmed if: (a) history of babies weighing > 4.5kg at birth, (b) insulin resistance with polycystic ovary syndrome, and (c) abnormal tolerance to insulin.
Journal of Computer Sciences and Applications. 2018, 6(2), 82-90. DOI: 10.12691/jcsa-6-2-5
Pub. Date: September 05, 2018
10226 Views2137 Downloads
Modeling Traffic Shaping and Traffic Policing in Packet-Switched Networks
Original Research
Traffic shaping is a computer network traffic management technique which delays some packets to make the traffic compliant with the desired traffic profile. Traffic policing is the process of monitoring network traffic for compliance with a traffic contract and dropping the excess traffic. Both traffic shaping and policing use two popular methods, known as leaky bucket and token bucket. The paper proposes timed Petri net models of both methods and uses these models to show the effects of traffic shaping and policing on the performance of very simple networks.
Journal of Computer Sciences and Applications. 2018, 6(2), 75-81. DOI: 10.12691/jcsa-6-2-4
Pub. Date: October 26, 2018
11148 Views1405 Downloads2 Likes
Trust and Continuous Deployment of Cloud Computing: A Quantitative Analysis
Original Research
In recent time, many studies have investigated the criteria that should guide a user when selecting a trustworthy cloud service provider. Similarly, factors influencing the user’s decision to adopt cloud computing have been exhaustively discussed. However, it is still unclear if there is a correlation between a user’s trust in the capability of a cloud provider and the user’s decision to continuously deploy cloud computing. Using a multinomial logistic regression, this study analyzed responses from 176 information technology managers who were currently using cloud computing as at the time of the study. Results from the data analysis indicated a negative relationship between a user’s trust in the capability of a cloud provider and the user’s decision to continuously deploy cloud computing. Consequently, a cloud user who does not trust the capability of a cloud provider will be unwilling to continuously deploy cloud computing regardless of the benefits of the cloud platform. This study recommended a synergy between cloud users and cloud providers to bridge trust gaps and develop security plans and policies that will effectively tackle cyber-threats.
Journal of Computer Sciences and Applications. 2018, 6(2), 69-74. DOI: 10.12691/jcsa-6-2-3
Pub. Date: September 07, 2018
8692 Views2031 Downloads
Mitigating Social Engineering Menace in Nigerian Universities
Original Research
Advances in technology continues to facilitate data processing activities; and plays a critical role to serve users’ social needs. The advent of smartphones has further eased the adoption and caused a spike in the usage of these technologies as well as the deployment of Internet-based applications. Our study examines known social engineering attack techniques on users by focusing on comparison as used by intruders. Data is collected from some selected Nigerian undergraduates. Result of the conducted survey suggests that phishing method hits a higher success rate than other techniques; while other factors such as gender, also had an impact on the success rate of each technique used.
Journal of Computer Sciences and Applications. 2018, 6(2), 64-68. DOI: 10.12691/jcsa-6-2-2
Pub. Date: August 03, 2018
12016 Views2504 Downloads
Architecting Decision Support System for Allocating Budget at Egyptian Universities
Original Research
The main objective of this study is to optimize the budget allocation process for various organizational units in the university. For that, university budget allocation system based on multi-level quadratic optimization model is suggested. The objective function of the proposed system is to minimize the sum of the quadratic deviations of each allocation from its lower and upper limits. The proposed system is applied based on the budget of Sohag University as a case study. The results indicate that the proposed system can be used to support decision making for optimal financial planning.
Journal of Computer Sciences and Applications. 2018, 6(2), 56-63. DOI: 10.12691/jcsa-6-2-1
Pub. Date: July 14, 2018
7231 Views1782 Downloads