Development of Software for Power System and Cybercrime Monitoring

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-66 Number-2
Year of Publication : 2018
Authors : Anumaka, M. C
DOI :  10.14445/22315381/IJETT-V66P211

Citation 

MLA Style: Anumaka, M. C "Development of Software for Power System and Cybercrime Monitoring" International Journal of Engineering Trends and Technology 66.2 (2018): 61-66.

APA Style:Anumaka, M. C (2018). Development of Software for Power System and Cybercrime Monitoring. International Journal of Engineering Trends and Technology, 66(2), 61-66.

Abstract
As the world becomes a global community through the advancement and complexity of power systems triggered the Internet and digital revolutions, which generated the tremendous benefits of the mankind are being challenged because of the formidable menace of energy theft and cybercrime. This project focuses on the development of a software system that will aid electric energy theft and cybercrime monitoring by using artificial intelligent (AI) as a tool of Support Vector Machines (SVMs). The data was obtained from Interpalse, which is an international social network for cultural exchange and practices. The obtained data was analyzed using LIBSVM.NET, which is a library for implementing the support vector machine (a type of machine learning algorithm) in the .NET framework. The C $ programming algorithm was also deployed. The results show that AI, which is Support Vector Machines (SVM) is an efficient and effective means for dictation and monitoring cyber- crime activities in the cybercafé. Implementation of this project work will ensure drastic reduction and final elimination of energy theft and cybercrime.

Reference
[1] Adegbeji, O. B (2008). “Computer Security in Cyberfafes”, In Security and Software for Cybercafes,E.E.Adomi, Ed. Hershey PA. IGI Global, pp. 18-29.
[2] Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, K., Wagman, S. &Zarsky, T. (2006). (eds) Cybercrime: Digital Cops in a Networked Environment, New York.
[3] Batool, S.H and Mahmood, K “Entertainment, communication r academics use? A Survey of Internet Café users in Lahore, Pakistan,” Inf. Dev, vol 26, no. 2. Pp 141-147, 2010.
[4] Bazelon, D.L, Choi, Y.J and Conaty, J.F (2006), „Computer Crimes?, 43 American Criminal Law Review, 259.
[5] Bola, O. O and Ogunlade,O.O (2012) “Accessibility and Utilization of Intent Service by Graduate Students in University of Lagos Nigeria”, Eur Res.,vol. 25. No 7.pp 1092-1098,
[6] Casey, E (2004), “Digital Evidence and Computer Crime”. St. Louis, MO: Elsevier Press.
[7] Colliers, D (2004), „Criminal Law and the Internet?, in Buys, R, (ed.) Cyberlaw @ SA (2? Ed.), Pretoria: Van Schaik Publishers.
[8] Council of Europe Convention on Cybercrime, (2001) ETS No. 185, 2001.
[9] Emiri, O.T (2008), “Prevention of cybercafes”. In Security and Software for Cybercafe E.E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 2.53-269
[10] Ewepu G, (2016) “Nigeria losesN127bn annually to cyber-crime” – NASA available at:http://www.vanguardngr.com/2016/04/nigeria-loses-n127bn-annually-cyber-crime-nsa/Retrieved Jun 29, 2017.
[11] Gencer, S.I and Koo, M (2012) “Internet Abuse among Teenagers and its Relations to Internet Usage Patterns and Demographics”, Educ. Technnol. Soc., vol 15, no. 2. Pp. 25-36, 2012.
[12] Hassan, A.B. Lass F.D. and Makinde J. (2012) Cybercrime in Nigeria Case, Effects and the Way Out, ARPN Journal of Science and Technology, vol 2(7), 626-631.
[13] Hendrix,R.C (2013) “A Guide to Starting an Internet Café Business”, 2013.
[14] Iroegbu, E (2016) “Cyber-security: Nigeria lose over N127bn annually through Cybercrime,” available at: http://www.thisdaylivecom/index.php/rertieved Jun. 9, 2016.
[15] Igun, S.E (2008) “Cybercrime control in developing countries cybercafes” In Security and Software for Cybercafe E.E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 283-294.
[16] Laskshmi P. and Ishwaeya M. (2015),”Cyber Crime Prevention” Communication Engineering, vol. 4(3).
[17] Lewis, B.C (2004), „Prevention of Computer Crime Amidst International Anarchy?, 41 American JournaL of Crimina1 Law Review, 1353.
[18] Lininger, R and Dean, R (2005), “Phishing, Cutting Identity Theft Line” Toronto, Wiley.
[19] Low, C, (2014)“Understanding Wireless Attacks and Detection”. Available at http://www.sans.org/reading/click/528Accessed on 10-04-2017.
[20] Maitanmi, O. Ogunlere, S. and Ayinde (2013) “Impact of Cyber Crimes” International Journal of Engineering and Science (1)JES, vol. 2(4), 45-51.
[21] Mbaskei, M.O. (2008) “Cybercrime: Effect on Youth Development”http://www.i-genius.org
[22] McQuade, S. (2006)“Understanding and Managing Cybercrime” Boston: Allyn & Bacon.
[23] Mohammed, L.A. (2008)“Cybercafé Systems Security”, In Security and Software for Cybercafes, E.E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 1-17.
[24] Okeshola F.B and Adeta A.K, (2013) “The Nature, Causes and Consequences of Cyber Crime in Tertiary Institutions in Zaria-Kaduna State, Nigeria” American International Journal of Contemporary Research, vol. 3(9), 98-114.
[25] Oluwafemi,O, and Adepoju, S.A. (2016) “cybercafés in Nigeria: Course to Internet?”, Internal Conference on Information and Communication Technology and its Applications” Federal University of Technology Mina, Nigeria, 117-123.
[26] Omodunbi, B.A, Odiase, P.O, Olaniyan, O. M and Esan (2016) “Cybercrime in Nigeria: Analysis, Detection and Prevention” , FUOYE Journal of Engineering and Technology, vol.1, Issue 1, 37-42.
[27] Otokunefor, H.O.C and Kari, H. K (2008). “Issues, Controversies, and Problems of Cybercafes Located in a University Campus”, In Security and Software for Cybercafe E.E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 62-83.
[28] Oyelude,A. A and Adewumi, C.O.B (2008) “Cybercafe Physical and Electronic Security Issues. Issues in security and software for cybercafes E.E Adomi Ed Hershey PA: IGI Global Pg 84-89
[29] Onojaefe D. Learning M (2008). Managing cybercafes: achieving mutual benefit through partnership Issues in security and software for cybercafes E.E Adomi Ed Hershey PA: IGI Global Pg 95-111
[30] Obuh, A.O (2008). Viruses and Virus protection in cybercafes, Issues in security and software for cybercafes E.E Adomi Ed Hershey PA: IGI Global Pg 70-185
[31] Utulu S.C.A (2008) Enhancing social security in Nigeria in security and software for cybercafes”, In Securociity and Software for Cybercafes. E.E Adomi Ed Hershey PA: IGI Global Pg 30-39
[32] Rangaswamy, N (2008) “Telecenters and Internet Cafes the case of ICTs in Small Business”, Asian J. Comm.,vol. 18, no. 4, pp. 46-61.
[33] Rauniar D (2008) “Cybercafes of Nepal: Passage to cyber crime.”In Security and Software for Cybercafe E.E. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 253-269.
[34] Sodiq.K. A, (2012) “Assessment of the Management of Information and Communication Technology (ICT) Infrastructure of Selected Cybercafes in Lagos State”, in Journal of Education and Social Research.Vol. 2, no. 9, 2012, pp. 181-188.
[35] Sommer. P (2004) „The Future for the Policing of Cybercrime?., Computer Fraud and Security,8.
[36] Tiemo, P. A. and Charles- Iyoha,C.U“Cybercafes and Cybercrimes in Nigeria”, Ed. Hershey PA IGI Global 2008, pp. 295-306.
[37] Utulu,S.C.A (2008)“Enhancing Social Security through Appropriate Cyber Security Policy and Nigeria” In Security and Softwae for Cybercafes,E.S. Adomi, Ed. Hershey PA: IGI Global, 2008, pp. 30.
[38] Wada,, F, and Odulaja, G.O, (2012)“Electronic Banking and Cyber Crimes in Nigeria: A Theoretical Policy Perspective on causation “African journal of Computing & ICT, 69-82.

Keywords
Cybercrime, Monitoring, Support vector machine, Artificial intelligence.