Adama Ndako Victor

Work place: Department of Computer Science, Federal University of Technology Minna, Niger state ,920211 Nigeria.

E-mail: nigeria.vnadama@futminna.edu.ng

Website:

Research Interests: Network Security, Information Security

Biography

Adama Ndako Victor (born March 4, 1985) is a Lecturer at the Computer Science department, of the Federal University of Technology Minna, Niger State. His research area interests are in the following HCI and Security Systems.

Author Articles
A Mathematical Model for Capturing Cholera Spread and Containment Options

By Falaye Adeyinka A Akarawak E.E.E. COLE A.T. Evans O. Patience Oluyori David Adeyemi Falaye Roseline Adunola Adama Ndako Victor

DOI: https://doi.org/10.5815/ijmsc.2018.01.02, Pub. Date: 8 Jan. 2018

The explosive nature of cholera epidemic over the years in different parts of the world has been a subject of interest to scientists in proffering interventions towards controlling its spread. Over the years many models has been created by the following people Capaso and Pavari – Fontana (1973), Codeco (2001), Hartley, Tien (2009), Mukandivare (2009) etc. In the present study, we modify the Cholera model proposed by Mukandivare incorporating three (3) containment options such as vaccination, Therapeutic treatment and water treatment and solved the system analytically using Homotopy Perturbation Method. The results shows that with improved use of vaccination, therapy and proper sanitation we have a more healthy population. This research is therefore recommended to modelers who desire to know how homotopy perturbation methods works. The computations were done and further analyzed mathematically using a computer symbolic package MAPLE 13.

[...] Read more.
Parametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Network

By Falaye Adeyinka A Etuk Stella Oluyemi Adama Ndako Victor Ugwuoke Cosmas Uchenna Olujimi Ogedengbe Seun Ale

DOI: https://doi.org/10.5815/ijmsc.2017.04.04, Pub. Date: 8 Nov. 2017

One distress of network and data security professionals and advisers globally is about the abilities of infectious malicious agents (Malware) to invade the entire network terminals to wreak havoc extending from identity theft, financial fraud to systemic digital assault on critical national resources. This work studies the behavioural dynamics of the susceptible, infected, the recovered terminals on the mobile wireless network and the effective use of antivirus security signature as countermeasure. Solving for stability state, we found out that its Eigen value gives a positive value which means that the stability is at an unstable state. Using Homotopy perturbation to calculate the approximate solution of the system. The expression derived was simulated using a mathematical tool (mat lab).

[...] Read more.
Other Articles